Welcome!

News Feed Item

Centrify Secures Industry's Broadest Range of Mission-Critical Servers From Identity-Related Insider and Outsider Threats

New Centrify Server Suite 2014 Uniquely Helps Organizations Enhance Risk Management and Meet Compliance Requirements for the Broadest Set of Cloud and On-Premise Servers and Apps

SAN FRANCISCO, CA -- (Marketwired) -- 02/25/14 -- RSA Conference 2014 Booth 2015 -- Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today introduced major new functionality in its Server Suite 2014 that protects the industry's broadest range of heterogeneous servers and applications in the datacenter and cloud from identity-related insider risks and outsider attacks. Centrify Server Suite 2014 also makes security and regulatory compliance repeatable and sustainable for organizations.

As evidenced by recent high-profile breaches and the end goal of Advanced Persistent Threats (APTs), access to privileged accounts gives hackers everything they need to steal or siphon off sensitive data from mission critical servers. At the same time, insider threats may be accidental or unintentional, but with the same damaging results. Implementing a least privilege access model, auditing and associating privileged activity to an individual, and providing comprehensive reporting are at the root of reducing threats and cost-effectively addressing regulatory compliance.

"Today's organizations can't keep up with managing the growing numbers of identities and associated access and audit policies that span applications and servers," said Matt Hur, Centrify Senior Director of Product Management. "The Centrify Server Suite 2014 release builds upon our market-leading privileged identity management solution and further helps organizations improve their risk management and compliance efforts to protect their systems and critical resources. This release marks another milestone for helping customers manage their risk posture and cost-effectively address regulatory mandates to make compliance a sustainable part of their businesses."

With Centrify, organizations gain visibility into identity-related risks and internal threats through automated discovery of violations of identity and access management best practices, and simplified privileged access management and auditing that links all privileged activity back to an individual (as opposed to a shared account). Regulatory compliance is streamlined with an architecture that enforces a least-privilege security model across Windows, Linux and UNIX systems and applications, while also enabling enterprise-wide privileged session auditing and compliance reporting. Organizations also reduce costs and increase productivity with a single, unified solution for identity management and audit that leverages existing investments in identity infrastructure, versus deploying a myriad of single purpose and platform specific products.

New functionality introduced in Centrify Server Suite 2014 includes streamlined creation and management of administrative entitlements, making it easier to implement least privilege access by delivering new pre-configured rights for Windows Server management consoles that can be used out of the box. New wizards automate the creation of new, complex rights for administrative users and reduce the process to the simple click of a button. Wizards can be used in conjunction with Centrify's powerful new match criteria that improves flexibility in building a least privilege access model by enabling privileges to be determined based on properties such as a digital signatures.

Centrify Server Suite 2014 also uniquely provides full privileged activity audit trails and video capture that ties all activity back to an individual. With this release Centrify enhances its powerful search capabilities and compliance reporting that combines access controls and the associated activity fully integrated across Windows, Linux, and UNIX platforms. The Centrify Server Suite supports more than 450 platforms, the most in the industry. New platform support in this release includes Red Hat Enterprise Linux Server 5.10, 6.0, 6.5; CentOS 5.10, 6.5; Oracle Linux 6.5; Scientific Linux 5.10; Fedora 20; Debian Linux 7.2, 7.3; Linux Mint 16; Ubuntu Desktop 13.10; and Ubuntu Server 13.10.

Availability and Pricing
Centrify Server Suite 2014 is available today from Centrify and authorized partners worldwide. The Centrify Server Suite is licensed on a per server basis and starts at $385 per server and $65 per workstation. For more information about the Centrify Server Suite, visit http://www.centrify.com/suite. To request a free Centrify Suite 2014 trial, visit http://www.centrify.com/trial.

About Centrify
Centrify provides Unified Identity Services across data center, cloud and mobile environments that results in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify's integrated identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions reduce costs and increase business agility and security by leveraging an organization's existing identity infrastructure to enable single sign-on, role-based access control, privileged identity management, auditing and compliance. Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent. Centrify is used by more than 5,000 customers worldwide, including approximately half of the Fortune 50 and more than 60 Federal agencies. For more information about Centrify and its solutions, visit www.centrify.com.

Centrify is a registered trademark and Centrify Server Suite and Centrify User Suite are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Dan Spalding
Email Contact
(408) 960-9297

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
As the world moves toward more DevOps and Microservices, application deployment to the cloud ought to become a lot simpler. The Microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. Serverless computing is revolutionizing computing. In his session at 19th Cloud Expo, Raghav...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...