+ All Categories
Home > Documents > Centrify Intellect event

Centrify Intellect event

Date post: 09-May-2015
Category:
Upload: intellectsecurity
View: 430 times
Download: 1 times
Share this document with a friend
15
© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary. Secure and Audit Access to Systems, Devices and Apps Barry Scott Technical Director EMEA Centrify Corporation
Transcript
Page 1: Centrify   Intellect event

© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Secure and Audit Access to Systems, Devices and Apps

Barry ScottTechnical Director EMEACentrify Corporation

Page 2: Centrify   Intellect event

2© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

• Centrify provides software and on-demand services that secure access from any endpoint to any on-premise/cloud resource • Strength is support for over 400+ platforms of systems,

apps and endpoints

• Delivers unique “unifying” capability• Unifies X-platform access with existing tool: Active Directory• Unifies control with auditing and analytics• Unifies on-premise & cloud systems, apps, endpoints

• Over 4500+ customers

• Proven management team and top tier investors

About Centrify

Page 3: Centrify   Intellect event

3© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Industry Trends and Where Centrify FitsCentrify is Focusing on Three Major Trends:

• The waves of heterogeneity sweeping the server, end point and application markets

• The increasing hybridization of IT resources deployed on premise and in the cloud

• The need to address security and compliance requirements for this increasing heterogeneous and hybridized world

Page 4: Centrify   Intellect event

4© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Heterogeneity Waves• Server: Mainframes + UNIX + Windows + Linux +

Virtualization• Server OS markets will remain a battleground; Windows (13%

growth rate) and Linux (Red Hat 20% growth rate) will have the most healthy growth (IDC)

• Server virtualization hitting 50-60% penetration (IDC)

• End Point: Windows + Blackberry + Mac + iOS + Android + Win8RT • Globally, 1 in 5 Info workers use 1 or more Apple devices

(Forrester)

• IT decision makers forecast 52% increase in Macs being deployed in 2012

• iOS is top 6 of 10 most activated devices 2012 (TechCrunch)

• Apps: Packaged apps (SAP, Oracle, etc.) + .Net + Java/J2EE + Salesforce.com + WebEx + Office365 + NetSuite + SuccessFactors• SaaS enterprise application purchases will grow 50% by 2015

(Gartner)

• Integration of SaaS and mobile devices is predicted to further accelerate SaaS adoption in the corporate environment

Net Net: IT is Becoming More Heterogeneous, Not Less

Page 5: Centrify   Intellect event

5© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Adoption of Cloud and SaaS Creates Hybrid IT Environment • Shift occurring from traditional infrastructure to hybrid

on-premise/cloud environment• Promise of a more agile infrastructure and application footprint

• IT will evolve from technology specialists to innovation / business enablers

Page 6: Centrify   Intellect event

6© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

But Major Concerns Still Exist with Cloud

Security

Control

Compliance

Page 7: Centrify   Intellect event

7© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

• Information Risk Management Moves From the Data Center to the Boardroom• Brand damage mitigation, customer confidence and regulatory oversight costs

will disrupt executive and board level discussion for an extended period of time

• European Governments Will Enact More Regulations to Require Enhanced Controls• Data Protection and Cyber-security legislation is getting more attention due to

increased and highly visible insider and hacktivist exploits

• In many countries, Notice of Privacy Breach regulations are being modified to raise the bar on minimum cyber-security prevention requirements as well as to increase the penalties

• Organizations Need to Tighten Baseline Controls and Implement Active Monitoring

And Compliance is Becoming More Rigorous

FISMASOX /JSOX HIPAAPCI DSS

Page 8: Centrify   Intellect event

8© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Centrify Vision: Unified Access ManagementControl, secure and audit access from any device to any resource

… and do so by leveraging existing infrastructure you already own

On-Premise Cloud

Endpoints

Servers

Apps

Software andOn-Demand Services

(GA Nov 12)

Page 9: Centrify   Intellect event

9© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

What We Do: SSO and Granular Access Control• Identity Consolidation:

Centrify’s agent enables users to login to 300+ non-Microsoft systems and apps with one username/ password – their Windows (i.e. Active Directory) account

• Role-based access control:Centrify also granularly controls who can login to what systems and apps and what roles and privileges those users have – all via Active Directory

BeforeAfter

Active DirectoryFred Joan

Distribution

Finance

Admin using Centrify console

Page 10: Centrify   Intellect event

10© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

What We Do: Auditing and Analysis

• Complete Visibility: Centrify’s reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

• Insight into a Security “Big Data” Problem: Centrify is also delivering solutions that provide the intelligence needed to analyze risks associated with user access and activity

Page 11: Centrify   Intellect event

11© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Centrify Suite Centrify for Mobile

• Secure & manage iPad, iPhone, Android

• Cloud-based service integrated w/on-premise AD

Single Sign-On ModulesFor Applications

With all editions you can purchase SSO modules for:

• Apache and J2EE web applications

• SAP NetWeaver & GUI• DB2

Centrify Insight

Splunk-based analytics solutions

Centrify Cloud Tools

Extends Centrify Suite to servers running in the cloud (e.g. Amazon EC2) and provides RightScale interop

EXPRESS STANDARD ENTERPRISE PLATINUM

DirectSecureServer Isolation and Protection of Data-in-Motion

DirectAuditDetailed Auditing of User Activity

DirectAuthorizeRole-based Authorization and Privilege Management

DirectControlCentralized Authentication and Access Control

DirectManageCentralized Management and Administration

Page 12: Centrify   Intellect event

12© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Mobile Security via Cloud-based Architecture

Centrify Cloud Proxy Server

Centrify Cloud Service

Apple Push

Notification

Service

Active Directory Security Infrastructure

DirectControl

for iOS

Centrify DirectManage Framework

DirectControl for Android

IN DEV DirectControl for SaaS

IN DEV DirectControl for OpenID

DirectManage ADUC Extension

DirectManage Group Policy ExtensionMicrosoft

Certificate Authority

Centrify Cloud

Manager

Cloud Administrator

Cloud Administrator’s AD Account

Page 13: Centrify   Intellect event

13© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Why Customers and Partners Choose Centrify

The Best Solution

• Single architecture based on AD

• Comprehensive suite

• Proven success in deployments

• Non-intrusive

Centrify is the “right vendor to choose" for Active Directory integration: Centrify’s solution is

“mature, technically strong, full featured, and possess broad platform support.”

“We recommended that clients strongly consider Centrify … its products can fit well within a multivendor IAM portfolio.”

Industry Awards Industry Certifications

Experience & Expertise

• 4500+ enterprise customers

• Largest dedicated team

• Unparalleled 24x7 support

• Record growth and profitable

Page 14: Centrify   Intellect event

14© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Learn More and Evaluate Centrify Yourself

WEB SITE www.centrify.com

TECHNICAL VIDEOS & MORE www.centrify.com/resources

SUPPORTED PLATFORMS www.centrify.com/platforms

REQUEST AN EVAL www.centrify.com/trial

FREE SOFTWARE www.centrify.com/express

CONTACT US www.centrify.com/contact

PHONE Worldwide: +1 (408) 542-7500

Europe:+44 (0) 1344 317950

Page 15: Centrify   Intellect event

© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.

Thank you.


Recommended