Whitepaper | Security
Centrify

Capturing the detailed actions of privileged users is critical in today's business environment as companies seek out cost efficiencies through IT outsourcing, leverage third-party cloud providers, and...

Read MorePublished: 12/04/2019
New Product | Applications
Centrify

Quickly consolidate complex and disparate UNIX and Linux user identities into Active Directory with Centrify's patented Zone technology — without having to first rationalize all user identities....

Read MorePublished: 08/02/2019
New Product | Security
Centrify

Cloud-ready Zero Trust Privilege is designed to handle the rudimentary use case of privileged access management (PAM), which lies in granting access to privileged user accounts via a shared account,...

Read MorePublished: 08/02/2019
Whitepaper | Security
Centrify

Security breaches show no signs of slowing, and credential theft headlines are the number one attack vector. Privileged access has become hackers’ brass ring for stealing the most data, most...

Read MorePublished: 08/02/2019
Whitepaper | Security
Centrify

Privileged identity management (PIM) solutions are based on a variety of fundamental technologies, with each technology suited to address a specific set of identity-related risks. This paper describes...

Read MorePublished: 08/02/2019
Whitepaper | Security
Centrify

Integrate Hadoop clusters into existing Active Directory infrastructure for centralized identity management, cross-platform privilege management, and auditing.

Read MorePublished: 08/02/2019
Whitepaper | Security
Centrify

Data breaches continue to be top of mind for organizations large and small. Three key dynamics are making that challenge much harder — the cloud, the growing sophistication of attackers, and dramatic...

Read MorePublished: 08/02/2019
Top
ITUpdate loading
Loading...