Centrify

Page 1

Unified Identity Services Across Data Center, Cloud and Mobile Steve Lethbridge Regional Manager – N EMEA Centrify Corporation

Š 2004-2012. Centrify Corporation. All Rights Reserved.


About Centrify • Based in Sunnyvale, CA with offices in Seattle, London, Munich,

Hong Kong, Brisbane and Sao Paulo • Founded in 2004 with over 300 personnel (2/3rds in engineering) • Recently named

• Delivers software and cloud services that lets you securely

leverage your existing identity infrastructure — Active Directory — across data center, cloud and mobile • Support for 400+ operating systems and 1000+ Apps

• Proven technology deployed by 4500+ customers including 40% of Fortune 50 • Award-winning solutions and numerous industry certifications

| Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved.

2


Some of our 4500+ Customers BANKING & FINANCE

RETAIL & INTERNET

| Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved.

PHARMA & HEALTH

TECHNOLOGY & TELECOM

DEFENSE & GOVERNMENT

AUTOMOTIVE & ENERGY

3


A Selection of Our EMEA Customers

| Identify. Unify. Centrify.

© 2004-2008 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. © 2004-2012. Centrify Corporation. All Rights Reserved.

SLIDE 4

4


Industry Trends • Cloud, mobile and compliance requirements are the three top

business and technology waves impacting enterprise IT • Identity is at the centre of all three waves • How will you manage identities to optimize user productivity, IT

efficiency and compliance across data centre, cloud and mobile?

| Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved.

5


Current State of Enterprise Identity ENTERPRISE ENDPOINTS

Multiple Logins for Users. Multiple Identity Infrastructures for IT. ID ID

DATA CENTER APPS

ID ID

DATA CENTER SERVERS

ID ID ID

DATA CENTER

| Identify. Unify. Centrify. Š 2004-2012. Centrify Corporation. All Rights Reserved.

6


Centrify: Unified Identity Services

DATA CENTER APPS

ENTERPRISE ENDPOINTS

One Single Login for Users. One Unified Identity Infrastructure for IT.

DATA CENTER SERVERS

Software and Cloud Services

ID Active Directory

DATA CENTER

| Identify. Unify. Centrify. Š 2004-2012. Centrify Corporation. All Rights Reserved.

7


Centrify: Unified Identity Services ENTERPRISE ENDPOINTS

One Single Login for Users. One Unified Identity Infrastructure for IT. ID ID

DATA CENTER APPS

ID ID CLOUD

DATA CENTER SERVERS

Software and Cloud Services

ID

ID Active Directory

DATA CENTER

| Identify. Unify. Centrify. Š 2004-2012. Centrify Corporation. All Rights Reserved.

ID MOBILE

8


Centrify: Unified Identity Services

DATA CENTER APPS

ENTERPRISE ENDPOINTS

One Single Login for Users. One Unified Identity Infrastructure for IT.

CLOUD

DATA CENTER SERVERS

Software and Cloud Services

ID Active Directory

DATA CENTER

MOBILE

Centrify lets you securely leverage your existing identity infrastructure across data center, cloud and mobile | Identify. Unify. Centrify. Š 2004-2012. Centrify Corporation. All Rights Reserved.

9


Access Control & Authorization • Centrify delivers granular control over who

can login into what system and what roles and rights they have — all via Active Directory

• Uniquely provides privilege management

across UNIX, Linux and Windows systems • Centrify Zones also enable delegated

administration — define which AD users have access to which systems for administration

| Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved.

10


Privileged User Auditing • Centrify’s reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

• Requires Microsoft SQL Server • Supports Windows plus UNIX/Linux too

| Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved.

11


Server Isolation & Encryption • Prevent unauthorized access to sensitive systems

• Logically isolate sensitive servers on the existing network infrastructure • Encrypt data-in-motion without modifying older applications Corporate Network

Trusted

Rogue Computer

Isolated Managed Computers

| Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved.

Managed Computer

12


Cloud and Mobile – The Centrify Solution  Improve Security and Compliance While Reducing Complexity  Decrease Costs While Improving User Satisfaction/Productivity

Centrify Cloud Service

Mobile Device

Personal Portal Microsoft Active Directory

| Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved.

13


Our Cloud Services

| Identify. Unify. Centrify. Š 2004-2012. Centrify Corporation. All Rights Reserved.

14


Unified Identity Services via Centrify

Active Directory

Authenticate          

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS / Android Applications SaaS Applications

Administrate          

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS / Android Applications SaaS Applications

| Identify. Unify. Centrify. © 2004-2012. Centrify Corporation. All Rights Reserved.

Authorise    

Windows Servers Unix Servers Linux Servers Saas Applications

Audit   

Windows Servers Unix Servers Linux Servers

Isolate   

Windows Servers Unix Servers Linux Servers

15


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.