Welcome!

News Feed Item

Centrify Secures Industry's Broadest Range of Mission-Critical Servers From Identity-Related Insider and Outsider Threats

New Centrify Server Suite 2014 Uniquely Helps Organizations Enhance Risk Management and Meet Compliance Requirements for the Broadest Set of Cloud and On-Premise Servers and Apps

SAN FRANCISCO, CA -- (Marketwired) -- 02/25/14 -- RSA Conference 2014 Booth 2015 -- Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today introduced major new functionality in its Server Suite 2014 that protects the industry's broadest range of heterogeneous servers and applications in the datacenter and cloud from identity-related insider risks and outsider attacks. Centrify Server Suite 2014 also makes security and regulatory compliance repeatable and sustainable for organizations.

As evidenced by recent high-profile breaches and the end goal of Advanced Persistent Threats (APTs), access to privileged accounts gives hackers everything they need to steal or siphon off sensitive data from mission critical servers. At the same time, insider threats may be accidental or unintentional, but with the same damaging results. Implementing a least privilege access model, auditing and associating privileged activity to an individual, and providing comprehensive reporting are at the root of reducing threats and cost-effectively addressing regulatory compliance.

"Today's organizations can't keep up with managing the growing numbers of identities and associated access and audit policies that span applications and servers," said Matt Hur, Centrify Senior Director of Product Management. "The Centrify Server Suite 2014 release builds upon our market-leading privileged identity management solution and further helps organizations improve their risk management and compliance efforts to protect their systems and critical resources. This release marks another milestone for helping customers manage their risk posture and cost-effectively address regulatory mandates to make compliance a sustainable part of their businesses."

With Centrify, organizations gain visibility into identity-related risks and internal threats through automated discovery of violations of identity and access management best practices, and simplified privileged access management and auditing that links all privileged activity back to an individual (as opposed to a shared account). Regulatory compliance is streamlined with an architecture that enforces a least-privilege security model across Windows, Linux and UNIX systems and applications, while also enabling enterprise-wide privileged session auditing and compliance reporting. Organizations also reduce costs and increase productivity with a single, unified solution for identity management and audit that leverages existing investments in identity infrastructure, versus deploying a myriad of single purpose and platform specific products.

New functionality introduced in Centrify Server Suite 2014 includes streamlined creation and management of administrative entitlements, making it easier to implement least privilege access by delivering new pre-configured rights for Windows Server management consoles that can be used out of the box. New wizards automate the creation of new, complex rights for administrative users and reduce the process to the simple click of a button. Wizards can be used in conjunction with Centrify's powerful new match criteria that improves flexibility in building a least privilege access model by enabling privileges to be determined based on properties such as a digital signatures.

Centrify Server Suite 2014 also uniquely provides full privileged activity audit trails and video capture that ties all activity back to an individual. With this release Centrify enhances its powerful search capabilities and compliance reporting that combines access controls and the associated activity fully integrated across Windows, Linux, and UNIX platforms. The Centrify Server Suite supports more than 450 platforms, the most in the industry. New platform support in this release includes Red Hat Enterprise Linux Server 5.10, 6.0, 6.5; CentOS 5.10, 6.5; Oracle Linux 6.5; Scientific Linux 5.10; Fedora 20; Debian Linux 7.2, 7.3; Linux Mint 16; Ubuntu Desktop 13.10; and Ubuntu Server 13.10.

Availability and Pricing
Centrify Server Suite 2014 is available today from Centrify and authorized partners worldwide. The Centrify Server Suite is licensed on a per server basis and starts at $385 per server and $65 per workstation. For more information about the Centrify Server Suite, visit http://www.centrify.com/suite. To request a free Centrify Suite 2014 trial, visit http://www.centrify.com/trial.

About Centrify
Centrify provides Unified Identity Services across data center, cloud and mobile environments that results in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify's integrated identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions reduce costs and increase business agility and security by leveraging an organization's existing identity infrastructure to enable single sign-on, role-based access control, privileged identity management, auditing and compliance. Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent. Centrify is used by more than 5,000 customers worldwide, including approximately half of the Fortune 50 and more than 60 Federal agencies. For more information about Centrify and its solutions, visit www.centrify.com.

Centrify is a registered trademark and Centrify Server Suite and Centrify User Suite are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Dan Spalding
Email Contact
(408) 960-9297

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...
SYS-CON Events announced today that IoT Global Network has been named “Media Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. The IoT Global Network is a platform where you can connect with industry experts and network across the IoT community to build the successful IoT business of the future.
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...