Upload
intellectsecurity
View
439
Download
1
Embed Size (px)
Citation preview
© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Secure and Audit Access to Systems, Devices and Apps
Barry ScottTechnical Director EMEACentrify Corporation
2© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
• Centrify provides software and on-demand services that secure access from any endpoint to any on-premise/cloud resource • Strength is support for over 400+ platforms of systems,
apps and endpoints
• Delivers unique “unifying” capability• Unifies X-platform access with existing tool: Active Directory• Unifies control with auditing and analytics• Unifies on-premise & cloud systems, apps, endpoints
• Over 4500+ customers
• Proven management team and top tier investors
About Centrify
3© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Industry Trends and Where Centrify FitsCentrify is Focusing on Three Major Trends:
• The waves of heterogeneity sweeping the server, end point and application markets
• The increasing hybridization of IT resources deployed on premise and in the cloud
• The need to address security and compliance requirements for this increasing heterogeneous and hybridized world
4© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Heterogeneity Waves• Server: Mainframes + UNIX + Windows + Linux +
Virtualization• Server OS markets will remain a battleground; Windows (13%
growth rate) and Linux (Red Hat 20% growth rate) will have the most healthy growth (IDC)
• Server virtualization hitting 50-60% penetration (IDC)
• End Point: Windows + Blackberry + Mac + iOS + Android + Win8RT • Globally, 1 in 5 Info workers use 1 or more Apple devices
(Forrester)
• IT decision makers forecast 52% increase in Macs being deployed in 2012
• iOS is top 6 of 10 most activated devices 2012 (TechCrunch)
• Apps: Packaged apps (SAP, Oracle, etc.) + .Net + Java/J2EE + Salesforce.com + WebEx + Office365 + NetSuite + SuccessFactors• SaaS enterprise application purchases will grow 50% by 2015
(Gartner)
• Integration of SaaS and mobile devices is predicted to further accelerate SaaS adoption in the corporate environment
Net Net: IT is Becoming More Heterogeneous, Not Less
5© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Adoption of Cloud and SaaS Creates Hybrid IT Environment • Shift occurring from traditional infrastructure to hybrid
on-premise/cloud environment• Promise of a more agile infrastructure and application footprint
• IT will evolve from technology specialists to innovation / business enablers
6© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
But Major Concerns Still Exist with Cloud
Security
Control
Compliance
7© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
• Information Risk Management Moves From the Data Center to the Boardroom• Brand damage mitigation, customer confidence and regulatory oversight costs
will disrupt executive and board level discussion for an extended period of time
• European Governments Will Enact More Regulations to Require Enhanced Controls• Data Protection and Cyber-security legislation is getting more attention due to
increased and highly visible insider and hacktivist exploits
• In many countries, Notice of Privacy Breach regulations are being modified to raise the bar on minimum cyber-security prevention requirements as well as to increase the penalties
• Organizations Need to Tighten Baseline Controls and Implement Active Monitoring
And Compliance is Becoming More Rigorous
FISMASOX /JSOX HIPAAPCI DSS
8© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Centrify Vision: Unified Access ManagementControl, secure and audit access from any device to any resource
…
… and do so by leveraging existing infrastructure you already own
On-Premise Cloud
Endpoints
Servers
Apps
Software andOn-Demand Services
(GA Nov 12)
9© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
What We Do: SSO and Granular Access Control• Identity Consolidation:
Centrify’s agent enables users to login to 300+ non-Microsoft systems and apps with one username/ password – their Windows (i.e. Active Directory) account
• Role-based access control:Centrify also granularly controls who can login to what systems and apps and what roles and privileges those users have – all via Active Directory
BeforeAfter
Active DirectoryFred Joan
Distribution
Finance
Admin using Centrify console
10© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
What We Do: Auditing and Analysis
• Complete Visibility: Centrify’s reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
• Insight into a Security “Big Data” Problem: Centrify is also delivering solutions that provide the intelligence needed to analyze risks associated with user access and activity
11© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Centrify Suite Centrify for Mobile
• Secure & manage iPad, iPhone, Android
• Cloud-based service integrated w/on-premise AD
Single Sign-On ModulesFor Applications
With all editions you can purchase SSO modules for:
• Apache and J2EE web applications
• SAP NetWeaver & GUI• DB2
Centrify Insight
Splunk-based analytics solutions
Centrify Cloud Tools
Extends Centrify Suite to servers running in the cloud (e.g. Amazon EC2) and provides RightScale interop
EXPRESS STANDARD ENTERPRISE PLATINUM
DirectSecureServer Isolation and Protection of Data-in-Motion
DirectAuditDetailed Auditing of User Activity
DirectAuthorizeRole-based Authorization and Privilege Management
DirectControlCentralized Authentication and Access Control
DirectManageCentralized Management and Administration
12© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Mobile Security via Cloud-based Architecture
Centrify Cloud Proxy Server
Centrify Cloud Service
Apple Push
Notification
Service
Active Directory Security Infrastructure
DirectControl
for iOS
Centrify DirectManage Framework
DirectControl for Android
IN DEV DirectControl for SaaS
IN DEV DirectControl for OpenID
DirectManage ADUC Extension
DirectManage Group Policy ExtensionMicrosoft
Certificate Authority
Centrify Cloud
Manager
Cloud Administrator
Cloud Administrator’s AD Account
13© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Why Customers and Partners Choose Centrify
The Best Solution
• Single architecture based on AD
• Comprehensive suite
• Proven success in deployments
• Non-intrusive
Centrify is the “right vendor to choose" for Active Directory integration: Centrify’s solution is
“mature, technically strong, full featured, and possess broad platform support.”
“We recommended that clients strongly consider Centrify … its products can fit well within a multivendor IAM portfolio.”
Industry Awards Industry Certifications
Experience & Expertise
• 4500+ enterprise customers
• Largest dedicated team
• Unparalleled 24x7 support
• Record growth and profitable
14© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Learn More and Evaluate Centrify Yourself
WEB SITE www.centrify.com
TECHNICAL VIDEOS & MORE www.centrify.com/resources
SUPPORTED PLATFORMS www.centrify.com/platforms
REQUEST AN EVAL www.centrify.com/trial
FREE SOFTWARE www.centrify.com/express
CONTACT US www.centrify.com/contact
PHONE Worldwide: +1 (408) 542-7500
Europe:+44 (0) 1344 317950
© 2004-2012. Centrify Corporation. All Rights Reserved. Confidential and Proprietary.
Thank you.