Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Small Business

    Centrify Updates Privileged Identity Management Platform

    By
    Nathan Eddy
    -
    January 19, 2016
    Share
    Facebook
    Twitter
    Linkedin
      centrify and it security

      Centrify, which specializes in securing enterprise identities against cyber threats, announced an upgrade to its Privileged Identity Management solution, which now supports federated privileged access across an organization’s security eco-system, including secure outsourcing of IT and application development.

      The solution is designed for an enterprise’s hybrid IT environment of cloud, mobile and on-premises systems, and leverages the Centrify Identity Platform.

      The update is coupled with other new features such as application-to-application password management (AAPM) and multi-factor authentication (MFA) for servers.

      “We heard from several of our customers that they use outsourced IT support, as well as application development, and that managing identities and access is a challenge,” David McNeely, vice president of product strategy at Centrify, told eWEEK. “We commissioned a study by Forrester, which found that 100 percent of respondents reported to be using at least one outsourced IT and one outsourced application development.”

      He explained that several of the recent high profile data breaches can be directly linked to outsourced third-party organizations with VPN connectivity, Centrify wanted to help their customers by addressing this issue using both federated authentication for the outsourced third party organizations, as well as Web-based secure remote access that doesn’t require VPN connectivity.

      Federated Privileged Access enables organizations to set up a trusted relationship with their outsourcers while also protecting against cyber threats.

      According to a report from IT research firm Gartner, IT outsourcing will be a $335 billion industry by 2019.

      Centrify said organizations can reduce risk by enabling secure remote access for outsourced IT administrators and outsourced developers to its infrastructure through federated authentication.

      The outsourcing service retains management of their employee identities, and the customer organization uses Centrify to grant Web-based access and privilege for systems and applications.

      Privileged access is governed through request and approval workflows, monitoring with optional termination of privileged sessions and reconciliation of approved access versus actual access to critical infrastructure.

      “Our cloud service enables us to terminate external user connections at the cloud and then grant terminal access within the browser after federated authentication,” McNeely said. “This means that the cloud will authenticate the third- party outsourced IT vendor employee before they are granted access to the portal. Then we control which resources they can access, but then only grant that access through our application layer connectivity so that there is no need to establish a VPN connection, which stops any malware that might be on the vendor’s computers from establishing a foothold within the enterprise.”

      Avatar
      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×