Download presentation
Presentation is loading. Please wait.
Published byGwenda Heath Modified over 8 years ago
1
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer
2
Copyright © 2015 Centrify Corporation. All Rights Reserved. 2 MULTIPLE POINTS IN THE CYBERATTACK CHAIN Hackers target both end and privileged user’s credentials. Breach Accomplished #1 LEADING POINT OF ATTACK IS COMPROMISED CREDENTIALS Nearly half of breaches are caused by compromised credentials. Today’s Security Landscape DISSOLVING IT PERIMETER SaaS IaaS Access Anywhere Mobile, Mac Traditional perimeter-based security is not enough. ENTERPRISES NOT TRUSTING THEIR NETWORKS Zero Trust Model Today’s security should be based upon context-based policies. Mobile Identity Resources Identity is the New Perimeter
3
Copyright © 2015 Centrify Corporation. All Rights Reserved. 3 LOW RISK HIGH RISK PRIVILEGE & POLICY DANGERGOOD OPTIMAL PASSWORDS Today’s Threats Require a Next-Generation Identity Platform Unified solution is preferred state given hackers targeting both end and privileged Users Hybrid IT Internal & external users Single Sign-on Multi-factor authentication Shared password management Proxy-based session monitoring Too much privilege No contextual policy No auditing Too many passwords Password reuse and sharing Basic authentication Consolidate identities Context-aware policy Least privilege security MFA everywhere Access request User-level auditing
4
Copyright © 2015 Centrify Corporation. All Rights Reserved. 4 BIG DATA APPLICATIONS CLOUD (IAAS & PAAS) NETWORK DEVICES DATA CENTER SERVERS PARTNER END USER PRIVILEGED IT USER CUSTOMER OUTSOURCED IT From Any Device For All Users Secure Access to Apps & Infrastructure Centrify Secures Enterprise Identities against Cyberthreats
5
Copyright © 2015 Centrify Corporation. All Rights Reserved. 5 Centrify Solutions Overview Server Suite Server Isolation Privilege Management Auditing Active Directory Bridge Privilege Service Privileged Access Request Session Monitoring Secure Remote Access Shared Password Management Identity Service Mac Management Enterprise Mobility Management Provisioning Single Sign-On Cloud DirectoryFederation EngineWorkflow EngineMFA/Policy EngineReporting Engine Authentication Engine Secure Data Storage Centrify Identity Platform
6
Copyright © 2015 Centrify Corporation. All Rights Reserved. 6 Single architecture secures end and privileged user access MFA everywhere Workflow everywhere Federation everywhere Improved ROI Gain visibility and control across hybrid IT Govern access Monitor and terminate sessions Report on access and activity Continuous Compliance Increased Security Context-aware security policy spanning Apps and infrastructure Endpoint device, location End and Privileged Identities The Power of the Centrify Identity Platform Supports both internal and external users Cloud DirectoryFederation EngineWorkflow EngineMFA/Policy EngineReporting Engine Authentication Engine Secure Data Storage Centrify Identity Platform
7
Copyright © 2015 Centrify Corporation. All Rights Reserved. 7 Automotive & EnergyTechnology & TelecomRetail & Internet Banking & FinancePharma & HealthDefense & Government Trusted by over 5,000 Customers with 97% Retention 7 of Top 10 Pharma Companies 5 of Top 10 U.S. Oil and Gas Companies 5 of Top 12 Worldwide Telcos 3 of Top 5 U.S. Retailers More Than 80 U.S. Federal Agencies 4 of Top 10 U.S. Financial Services Companies
8
Copyright © 2015 Centrify Corporation. All Rights Reserved. 8 Why Choose Centrify? Protects against the leading point of attack used in data breaches— compromised credentials Uniquely protects both end users and privileged users — for both internal and external use cases Secure cloud, mobile and on-premises resources Trusted by over 5000 customers, including more than half of the Fortune 50 Validated by leading industry analysts as the market leader
9
Copyright © 2015 Centrify Corporation. All Rights Reserved. 9 Thank You
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.