Resources

Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.

  • Request Demo

  • Brochures

  • Utilities

Centrify DirectAudit

Centrify DirectAudit enables detailed, real-time auditing of privileged user sessions on Windows, UNIX and Linux systems providing a full accounting of user activity and system access. DirectAudit’s detailed capture of historical user activity establishes accountability and strengthens compliance reporting by recording user access to systems, specific commands and privileges used and the exact modifications to key files and configurations that were made. With DirectAudit enterprises can closely monitor IT contractors and offshore workers, pinpoint suspicious activity through real-time monitoring and troubleshoot system failures by replaying actions for root-cause analysis.

Centrify DirectAuthorize

Centrify DirectAuthorize centrally manages and enforces role-based entitlements for fine-grained control of user access and privileges on UNIX and Linux systems.

Centrify DirectControl

Centrify DirectControl centrally secures privileged user access to cross-platform systems and applications by leveraging Active Directory.

Centrify DirectSecure

Secures sensitive information by dynamically isolating cross-platform systems and encrypting data in motion

Centrify Suite

Centrally control, secure and audit access to cross-platform systems, mobile devices and applications.

Centrify Express for Mobile

Centrify Express for Mobile is a free version of easy-to-deploy, cloud-based service that lets to centrally secure and manage smart phones and tablets using Active Directory.
Download directly from vendor web-page.

Centrify Express for SaaS

Centrify Express for SaaS is a free version of our easy-to-deploy service that delivers single sign-on to cloud-based apps while letting IT centrally control access using Active Directory.
Download directly from vendor web-page.

Centrify Express for UNIX, Linux & Mac

Centrify Express for UNIX and Linux provides identity and access control for cross-platform data centers using Active Directory.

Download directly from vendor web-page.

Go to regional site
OK (Redirect in 3 sec)
Cancel

headtechnology UA

Levanevskogo Str., 6, office 79

03058 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41

mail: info@headtechnology.com.ua

  • All

  • Hard

  • SaaS

  • Soft

  • Virtual