Click here to close now.


News Feed Item

Centrify Secures Industry's Broadest Range of Mission-Critical Servers From Identity-Related Insider and Outsider Threats

New Centrify Server Suite 2014 Uniquely Helps Organizations Enhance Risk Management and Meet Compliance Requirements for the Broadest Set of Cloud and On-Premise Servers and Apps

SAN FRANCISCO, CA -- (Marketwired) -- 02/25/14 -- RSA Conference 2014 Booth 2015 -- Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today introduced major new functionality in its Server Suite 2014 that protects the industry's broadest range of heterogeneous servers and applications in the datacenter and cloud from identity-related insider risks and outsider attacks. Centrify Server Suite 2014 also makes security and regulatory compliance repeatable and sustainable for organizations.

As evidenced by recent high-profile breaches and the end goal of Advanced Persistent Threats (APTs), access to privileged accounts gives hackers everything they need to steal or siphon off sensitive data from mission critical servers. At the same time, insider threats may be accidental or unintentional, but with the same damaging results. Implementing a least privilege access model, auditing and associating privileged activity to an individual, and providing comprehensive reporting are at the root of reducing threats and cost-effectively addressing regulatory compliance.

"Today's organizations can't keep up with managing the growing numbers of identities and associated access and audit policies that span applications and servers," said Matt Hur, Centrify Senior Director of Product Management. "The Centrify Server Suite 2014 release builds upon our market-leading privileged identity management solution and further helps organizations improve their risk management and compliance efforts to protect their systems and critical resources. This release marks another milestone for helping customers manage their risk posture and cost-effectively address regulatory mandates to make compliance a sustainable part of their businesses."

With Centrify, organizations gain visibility into identity-related risks and internal threats through automated discovery of violations of identity and access management best practices, and simplified privileged access management and auditing that links all privileged activity back to an individual (as opposed to a shared account). Regulatory compliance is streamlined with an architecture that enforces a least-privilege security model across Windows, Linux and UNIX systems and applications, while also enabling enterprise-wide privileged session auditing and compliance reporting. Organizations also reduce costs and increase productivity with a single, unified solution for identity management and audit that leverages existing investments in identity infrastructure, versus deploying a myriad of single purpose and platform specific products.

New functionality introduced in Centrify Server Suite 2014 includes streamlined creation and management of administrative entitlements, making it easier to implement least privilege access by delivering new pre-configured rights for Windows Server management consoles that can be used out of the box. New wizards automate the creation of new, complex rights for administrative users and reduce the process to the simple click of a button. Wizards can be used in conjunction with Centrify's powerful new match criteria that improves flexibility in building a least privilege access model by enabling privileges to be determined based on properties such as a digital signatures.

Centrify Server Suite 2014 also uniquely provides full privileged activity audit trails and video capture that ties all activity back to an individual. With this release Centrify enhances its powerful search capabilities and compliance reporting that combines access controls and the associated activity fully integrated across Windows, Linux, and UNIX platforms. The Centrify Server Suite supports more than 450 platforms, the most in the industry. New platform support in this release includes Red Hat Enterprise Linux Server 5.10, 6.0, 6.5; CentOS 5.10, 6.5; Oracle Linux 6.5; Scientific Linux 5.10; Fedora 20; Debian Linux 7.2, 7.3; Linux Mint 16; Ubuntu Desktop 13.10; and Ubuntu Server 13.10.

Availability and Pricing
Centrify Server Suite 2014 is available today from Centrify and authorized partners worldwide. The Centrify Server Suite is licensed on a per server basis and starts at $385 per server and $65 per workstation. For more information about the Centrify Server Suite, visit To request a free Centrify Suite 2014 trial, visit

About Centrify
Centrify provides Unified Identity Services across data center, cloud and mobile environments that results in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify's integrated identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions reduce costs and increase business agility and security by leveraging an organization's existing identity infrastructure to enable single sign-on, role-based access control, privileged identity management, auditing and compliance. Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent. Centrify is used by more than 5,000 customers worldwide, including approximately half of the Fortune 50 and more than 60 Federal agencies. For more information about Centrify and its solutions, visit

Centrify is a registered trademark and Centrify Server Suite and Centrify User Suite are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.

Add to Digg Bookmark with Add to Newsvine

Dan Spalding
Email Contact
(408) 960-9297

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In demand-intensive mobile and web applications, an emerging pattern is to host the Systems of Engagement in the cloud (for maximum responsiveness) but keep the Systems of Record with the other important business systems in the company datacenter, often on a tightly secured mainframe. But what about the space in between? In this IBM Redpaper publication, we show that the IBM Bluemix cloud platform offers technologies that make it easy for cloud-based SoEs to securely connect to on-premises IBM...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at, examined how Docker has evolved into a highly effective tool for application del...
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radically transforms the way businesses manage, monitor, and test the performance of online applications. Truly understand and improve user experience with clear visibility into complex, distributed online systems.Founde...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...