Upload
metastore-nv
View
212
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Privileged Account Management - Centrify
Citation preview
copy 2004-2012 Centrify Corporation All Rights Reserved
Unified Identity Services
Across Data Center Cloud and Mobile
Steve LethbridgeRegional Manager ndash N EMEACentrify Corporation
2copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Based in Sunnyvale CA with offices in Seattle London Munich Hong Kong Brisbane and Sao Paulo
bull Founded in 2004 with over 300 personnel (23rds in engineering)
bull Recently named
bull Delivers software and cloud services that lets you securely leverage your existing identity infrastructure mdash Active Directory mdash across data center cloud and mobile
bull Support for 400+ operating systems and 1000+ Apps
bull Proven technology deployed by 4500+ customers including 40 of Fortune 50
bull Award-winning solutions and numerous industry certifications
About Centrify
3copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
B A N K I N G amp F I N A N C E P H A R M A amp H E A L T H D E F E N S E amp G O V E R N M E N T
R E T A I L amp I N T E R N E T T E C H N O L O G Y amp T E L E C O M A U T O M O T I V E amp E N E R G Y
Some of our 4500+ Customers
4copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify copy 2004-2008 CENTRIFY CORPORATION ALL RIGHTS RESERVED SLIDE 4
A Selection of Our EMEA Customers
5copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Industry Trends
bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT
bull Identity is at the centre of all three waves
bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile
6copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
ID
ID
ID
ID
ID
ID
ID
7copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
8copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
M O B I L E
C L O U D
ID
ID
ID
ID
ID
ID
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
2copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Based in Sunnyvale CA with offices in Seattle London Munich Hong Kong Brisbane and Sao Paulo
bull Founded in 2004 with over 300 personnel (23rds in engineering)
bull Recently named
bull Delivers software and cloud services that lets you securely leverage your existing identity infrastructure mdash Active Directory mdash across data center cloud and mobile
bull Support for 400+ operating systems and 1000+ Apps
bull Proven technology deployed by 4500+ customers including 40 of Fortune 50
bull Award-winning solutions and numerous industry certifications
About Centrify
3copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
B A N K I N G amp F I N A N C E P H A R M A amp H E A L T H D E F E N S E amp G O V E R N M E N T
R E T A I L amp I N T E R N E T T E C H N O L O G Y amp T E L E C O M A U T O M O T I V E amp E N E R G Y
Some of our 4500+ Customers
4copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify copy 2004-2008 CENTRIFY CORPORATION ALL RIGHTS RESERVED SLIDE 4
A Selection of Our EMEA Customers
5copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Industry Trends
bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT
bull Identity is at the centre of all three waves
bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile
6copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
ID
ID
ID
ID
ID
ID
ID
7copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
8copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
M O B I L E
C L O U D
ID
ID
ID
ID
ID
ID
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
3copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
B A N K I N G amp F I N A N C E P H A R M A amp H E A L T H D E F E N S E amp G O V E R N M E N T
R E T A I L amp I N T E R N E T T E C H N O L O G Y amp T E L E C O M A U T O M O T I V E amp E N E R G Y
Some of our 4500+ Customers
4copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify copy 2004-2008 CENTRIFY CORPORATION ALL RIGHTS RESERVED SLIDE 4
A Selection of Our EMEA Customers
5copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Industry Trends
bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT
bull Identity is at the centre of all three waves
bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile
6copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
ID
ID
ID
ID
ID
ID
ID
7copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
8copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
M O B I L E
C L O U D
ID
ID
ID
ID
ID
ID
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
4copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify copy 2004-2008 CENTRIFY CORPORATION ALL RIGHTS RESERVED SLIDE 4
A Selection of Our EMEA Customers
5copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Industry Trends
bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT
bull Identity is at the centre of all three waves
bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile
6copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
ID
ID
ID
ID
ID
ID
ID
7copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
8copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
M O B I L E
C L O U D
ID
ID
ID
ID
ID
ID
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
5copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Industry Trends
bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT
bull Identity is at the centre of all three waves
bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile
6copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
ID
ID
ID
ID
ID
ID
ID
7copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
8copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
M O B I L E
C L O U D
ID
ID
ID
ID
ID
ID
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
6copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
ID
ID
ID
ID
ID
ID
ID
7copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
8copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
M O B I L E
C L O U D
ID
ID
ID
ID
ID
ID
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
7copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
8copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
M O B I L E
C L O U D
ID
ID
ID
ID
ID
ID
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
8copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
SE
NT
ER
PR
IS
E
EN
DP
OI
NT
S
Active Directory
ID
M O B I L E
C L O U D
ID
ID
ID
ID
ID
ID
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
9copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT
Software andCloud Services
D A T A C E N T E R
DA
TA
CE
NT
ER
S
ER
VE
RS
DA
TA
CE
NT
ER
A
PP
S
M O B I L E
C L O U D
EN
TE
RP
RI
SE
E
ND
PO
IN
TS
Active Directory
ID
Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
10copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory
bull Uniquely provides privilege management across UNIX Linux and Windows systems
bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration
Access Control amp Authorization
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
11copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Privileged User Auditing
bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users
bull Requires Microsoft SQL Server
bull Supports Windows plus UNIXLinux too
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
12copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Server Isolation amp Encryption
Trusted
Isolated
bull Prevent unauthorized access to sensitive systems
bull Logically isolate sensitive servers on the existing network infrastructure
bull Encrypt data-in-motion without modifying older applications
Corporate Network
Rogue Computer
Managed Computers
Managed Computer
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
13copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Improve Security and Compliance While Reducing Complexity
Decrease Costs While Improving User SatisfactionProductivity
Cloud and Mobile ndash The Centrify Solution
Microsoft Active
Directory
Centrify Cloud Service
Personal Portal Mobile Device
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
14copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Our Cloud Services
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
15copy 2004-2012 Centrify Corporation All Rights Reserved
| Identify Unify Centrify
Unified Identity Services via Centrify
Active Directory
Authenticate Administrate Authorise Audit Isolate
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications
Windows Servers Unix Servers Linux Servers Saas Applications
Windows Servers Unix Servers Linux Servers
Windows Servers Unix Servers Linux Servers
Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications