15
© 2004-2012. Centrify Corporation. All Rights Reserved. Unified Identity Services Across Data Center, Cloud and Mobile Steve Lethbridge Regional Manager – N EMEA Centrify Corporation

Centrify

Embed Size (px)

DESCRIPTION

Privileged Account Management - Centrify

Citation preview

copy 2004-2012 Centrify Corporation All Rights Reserved

Unified Identity Services

Across Data Center Cloud and Mobile

Steve LethbridgeRegional Manager ndash N EMEACentrify Corporation

2copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Based in Sunnyvale CA with offices in Seattle London Munich Hong Kong Brisbane and Sao Paulo

bull Founded in 2004 with over 300 personnel (23rds in engineering)

bull Recently named

bull Delivers software and cloud services that lets you securely leverage your existing identity infrastructure mdash Active Directory mdash across data center cloud and mobile

bull Support for 400+ operating systems and 1000+ Apps

bull Proven technology deployed by 4500+ customers including 40 of Fortune 50

bull Award-winning solutions and numerous industry certifications

About Centrify

3copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

B A N K I N G amp F I N A N C E P H A R M A amp H E A L T H D E F E N S E amp G O V E R N M E N T

R E T A I L amp I N T E R N E T T E C H N O L O G Y amp T E L E C O M A U T O M O T I V E amp E N E R G Y

Some of our 4500+ Customers

4copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify copy 2004-2008 CENTRIFY CORPORATION ALL RIGHTS RESERVED SLIDE 4

A Selection of Our EMEA Customers

5copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Industry Trends

bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT

bull Identity is at the centre of all three waves

bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile

6copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

ID

ID

ID

ID

ID

ID

ID

7copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

8copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

M O B I L E

C L O U D

ID

ID

ID

ID

ID

ID

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

2copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Based in Sunnyvale CA with offices in Seattle London Munich Hong Kong Brisbane and Sao Paulo

bull Founded in 2004 with over 300 personnel (23rds in engineering)

bull Recently named

bull Delivers software and cloud services that lets you securely leverage your existing identity infrastructure mdash Active Directory mdash across data center cloud and mobile

bull Support for 400+ operating systems and 1000+ Apps

bull Proven technology deployed by 4500+ customers including 40 of Fortune 50

bull Award-winning solutions and numerous industry certifications

About Centrify

3copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

B A N K I N G amp F I N A N C E P H A R M A amp H E A L T H D E F E N S E amp G O V E R N M E N T

R E T A I L amp I N T E R N E T T E C H N O L O G Y amp T E L E C O M A U T O M O T I V E amp E N E R G Y

Some of our 4500+ Customers

4copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify copy 2004-2008 CENTRIFY CORPORATION ALL RIGHTS RESERVED SLIDE 4

A Selection of Our EMEA Customers

5copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Industry Trends

bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT

bull Identity is at the centre of all three waves

bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile

6copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

ID

ID

ID

ID

ID

ID

ID

7copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

8copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

M O B I L E

C L O U D

ID

ID

ID

ID

ID

ID

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

3copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

B A N K I N G amp F I N A N C E P H A R M A amp H E A L T H D E F E N S E amp G O V E R N M E N T

R E T A I L amp I N T E R N E T T E C H N O L O G Y amp T E L E C O M A U T O M O T I V E amp E N E R G Y

Some of our 4500+ Customers

4copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify copy 2004-2008 CENTRIFY CORPORATION ALL RIGHTS RESERVED SLIDE 4

A Selection of Our EMEA Customers

5copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Industry Trends

bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT

bull Identity is at the centre of all three waves

bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile

6copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

ID

ID

ID

ID

ID

ID

ID

7copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

8copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

M O B I L E

C L O U D

ID

ID

ID

ID

ID

ID

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

4copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify copy 2004-2008 CENTRIFY CORPORATION ALL RIGHTS RESERVED SLIDE 4

A Selection of Our EMEA Customers

5copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Industry Trends

bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT

bull Identity is at the centre of all three waves

bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile

6copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

ID

ID

ID

ID

ID

ID

ID

7copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

8copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

M O B I L E

C L O U D

ID

ID

ID

ID

ID

ID

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

5copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Industry Trends

bull Cloud mobile and compliance requirements are the three top business and technology waves impacting enterprise IT

bull Identity is at the centre of all three waves

bull How will you manage identities to optimize user productivity IT efficiency and compliance across data centre cloud and mobile

6copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

ID

ID

ID

ID

ID

ID

ID

7copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

8copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

M O B I L E

C L O U D

ID

ID

ID

ID

ID

ID

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

6copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Current State of Enterprise IdentityMultiple Logins for Users Multiple Identity Infrastructures for IT

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

ID

ID

ID

ID

ID

ID

ID

7copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

8copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

M O B I L E

C L O U D

ID

ID

ID

ID

ID

ID

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

7copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

8copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

M O B I L E

C L O U D

ID

ID

ID

ID

ID

ID

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

8copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

SE

NT

ER

PR

IS

E

EN

DP

OI

NT

S

Active Directory

ID

M O B I L E

C L O U D

ID

ID

ID

ID

ID

ID

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

9copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Centrify Unified Identity ServicesOne Single Login for Users One Unified Identity Infrastructure for IT

Software andCloud Services

D A T A C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RI

SE

E

ND

PO

IN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center cloud and mobile

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

10copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

bull Centrify delivers granular control over who can login into what system and what roles and rights they have mdash all via Active Directory

bull Uniquely provides privilege management across UNIX Linux and Windows systems

bull Centrify Zones also enable delegated administration mdash define which AD users have access to which systems for administration

Access Control amp Authorization

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

11copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Privileged User Auditing

bull Centrifyrsquos reporting and detail user-level auditing tells an auditor who has access to what and exactly what users have been doing which is especially critical for privileged IT users

bull Requires Microsoft SQL Server

bull Supports Windows plus UNIXLinux too

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

12copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Server Isolation amp Encryption

Trusted

Isolated

bull Prevent unauthorized access to sensitive systems

bull Logically isolate sensitive servers on the existing network infrastructure

bull Encrypt data-in-motion without modifying older applications

Corporate Network

Rogue Computer

Managed Computers

Managed Computer

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

13copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Improve Security and Compliance While Reducing Complexity

Decrease Costs While Improving User SatisfactionProductivity

Cloud and Mobile ndash The Centrify Solution

Microsoft Active

Directory

Centrify Cloud Service

Personal Portal Mobile Device

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

14copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Our Cloud Services

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

15copy 2004-2012 Centrify Corporation All Rights Reserved

| Identify Unify Centrify

Unified Identity Services via Centrify

Active Directory

Authenticate Administrate Authorise Audit Isolate

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications

Windows Servers Unix Servers Linux Servers Saas Applications

Windows Servers Unix Servers Linux Servers

Windows Servers Unix Servers Linux Servers

Windows Servers Windows PCs Unix Servers Unix Desktops Linux Servers Linux Desktops Macs IOS Android Applications SaaS Applications