Centrify Zero Trust Privilege

Centrify Zero Trust Privilege is designed to help minimize the attack surface and control privileged access to the hybrid enterprise with identity assurance, just-in-time and just enough privilege, advanced monitoring and reporting.

Languages supported: Arabic, German, English, French, Italian, Japanese, Korean, Portuguese, Russian, Spanish, Chinese (Simplified)

8.6/10 (Expert Score) ★★★★★
Product is rated as #17 in category Privileged Access Management (PAM) Software
Ease of use
8.6
Support
8.3
Ease of Setup
0.0

Images

Check Software Images

Centrify is redefining the legacy approach to Privileged Access Management (PAM) by delivering cloud-ready Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases.

As traditional network perimeters dissolve, organizations must discard the old model of “trust but verify” which relied on well-defined boundaries. Zero Trust mandates a “never trust, always verify, enforce least privilege” approach to privileged access, from inside or outside the network.

Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment. By implementing least privilege access, Centrify minimizes the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise.

Organizations may consider approaching Privileged Access Management by solely implementing password vaults, leaving gaps that can easily be exploited. Centrify Zero Trust Privilege combines password vaulting with brokering of identities, multi-factor authentication enforcement and “just enough” privilege, all while securing remote access and monitoring of all privileged sessions.

Centrify’s industry-recognized solution redefines legacy Privileged Access Management and goes beyond simple password vaulting to converge the core tenets of Zero Trust Privilege. Over half of the Fortune 100, the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies, all trust Centrify to stop the leading cause of breaches – privileged credential abuse.

Organizations turn to Centrify Zero Trust Privilege to …
– Secure access
– Stop breaches
– Empower business operations
– Increase business confidence
– Secure the vote!

Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is customer funded by over 5,000 customers and backed by leading private equity investment firm Thoma Bravo.

Centrify Zero Trust Privilege
Centrify Zero Trust Privilege

Show more categories

Customer Reviews

Centrify Zero Trust Privilege Reviews

Administrator in Non-Profit Organization Management

Advanced user of Centrify Zero Trust Privilege
★★★★★
Simple and Straightforward PAM Solution That's Simple to Setup

What do you like best?

I think the most helpful part of Centrify Zero Trust is how simple it was to setup. We were looking at one of their major competitors, and they were saying it could be months to a year to setup. We were able to get 98% of of the product up and running and implemented with professional services in less than 2 weeks around July 4th. The product is absolutely what we needed in terms of PAM. We were able to pull in servers and even workstations to be able to grant PAM privileges. The workflow customization is pretty awesome in how granular you want to be in terms of approval, etc. The MFA setup was great and fairly easy. In addition, deploying out to systems is as simple as pushing a button and then verifying the system. When we looked at other systems, none of them were as simple and straightforward to use as Centrify's offering

What do you dislike?

I wouldn't say there's something not helpful about Centrify's Zero trust, but one thing I dislike about the product is there relatively recent split of services into both Centrify and Idaptive. It's been somewhat of a pain to track the URL's and it was a pain to go through this with the two vendors and trying to get a straight answer. If you are a new customer, this probably isn't an issue, but this has been my biggest disappointment since using the product.

Recommendations to others considering the product:

Compare Centrify's offering to some of the other big players in the PAM space. Compare the solutions and ask about implementation time, cost, professional services cost, and compare the interfaces. I think you will see Centrify as a more cost effective, easier solution to implement

What problems are you solving with the product? What benefits have you realized?

We didn't have a PAM solution before Centrify Zero Trust. After implementing, we gained insight and security restrictions on who can access a system, when, and what for. We even rolled this out to our workstations/laptops as we removed local admin privileges for these. This tool has helped us to allow elevated privileges for end users temporarily if needed with limiting exposure. In addition, we are now able to force MFA for servers, gain screenshots and what was done while a user is on a server, again helping with security and insight into systems.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide