Centrify

Centrify

By: Centrify Corporation

Centrify offers identity & access management to businesses by improving end-user productivity & securing access to company, mobile & cloud applications through multi-factor authentication, single sign-on together with user provisioning. It assists users in managing mobile devices and applications via identity stores, Active Directory or LDAP. With Centrify, users can improve security by getting rid of improperly stored, easily cracked or recycled passwords. Users can create accounts, revoke device access and automate application requests.

From: USA Web Visibility: 55.13%
Top Centrify Alternatives
  • Okta
  • OneLogin
  • Azure Active Directory
  • Varonis
  • Ping Identity
  • Exostar
  • Gigya
  • TeleSign
  • NetIQ
  • Clearlogin
  • LoginRadius
  • Janrain
  • ForgeRock
  • OneAll
  • Stormpath
Show More Show Less

Top Centrify Alternatives and Overview

1

Okta

Okta offers access and identity management services to businesses. This...

By: Okta, Inc. From USA
Based on 40 Votes
2

OneLogin

OneLogin, an identity management & single sign-on services aid employers in empowering customers, partners and employees by offering secure access to company as well as cloud applications.

By: OneLogin, Inc. From USA
Based on 10 Votes
3

Azure Active Directory

Azure Active Directory is a platform that allows users to build, deploy & manage services along with applications through a worldwide network datacenters.

By: Microsoft Corporation From USA
4

Varonis

Veronis provides data security and management features by using machine learning and AI.

By: Varonis
5

Ping Identity

By: Ping Identity
Based on 55 Votes
6

Exostar

By: Exostar
Based on 1 Vote
7

Gigya

The platform helps businesses for identifying customers using social as well as traditional registration...

By: Gigya, Inc From USA
8

TeleSign

It provides engagement solutions and customer identity solutions...

By: TeleSign
9

NetIQ

With NetIQ businesses can integrate IAM policies across various environments in a cost-effective manner...

By: Micro Focus International plc From USA
10

Clearlogin

It lets businesses to assign user base roles as well as permissions, as what users...

By: Clearlogin, Inc. From USA
Based on 9 Votes
11

LoginRadius

It can connect different domains as well as sites together for creating a flawless customer...

By: LoginRadius Inc. From Canada
Based on 9 Votes
12

Janrain

It lets users to streamline customer identities with social registration & login...

By: Janrain, Inc. From USA
13

ForgeRock

Using this system, you can import data from HR portals and external systems while giving...

By: ForgeRock
Based on 6 Votes
14

OneAll

The plug-in offers single-click login and makes the signup process easier by keep the long...

By: OneAll Sàrl From Luxembourg
Based on 2 Votes
15

Stormpath

It provides secure authentication and user management services for developers...

By: Stormpath, Inc. From USA

Centrify Review and Overview

Employees in most companies can remotely access tools and information for working from home. Concerns over security breaches have made companies prioritize safety for such remote access facility. However, one aspect that many companies are unable to prevent is the privileged access abuse, the risks associated with administrators, outsourced IT professionals, and third-party privileged users. To address this issue, Centrify comes with Zero Trust Privilege Solutions to secure remote access and demolish all sources of privacy breaches. Over 2000 companies worldwide trust its free Tier Privileged Access Service, available on the AWS marketplace.

Minimize your risk exposure without VPN

For remote access to IT infrastructure by your IT admins as well as outsourced IT workers, Centrify helps to reduce the exposure to cyber-attacks. You can launch SSH and RDP sessions straight away from the Centrify admin portal or your local clients to secure access to servers and network devices. It allows for identity federation, giving users in one domain controlled access to other domains, without the interference of redundant user administration. All this happens through targeted granular access controls through a VPN-free route. 

A cloud-ready solution for your enterprise

If you require a consistent security blanket across your hybrid work environment, Centrify, with its cloud transformation option, has got you covered. The cloud-ready Zero Trust Privilege Service will let your IT professionals log in and securely access DevOps, infrastructure, cloud, Big Data, and other enterprise uses. On the other hand, you can employ multi-factor authentication for privileged user logins outside your corporate network. You can expand your current on-premise security to the workloads in an IaaS and multi-cloud environment. Additionally, you can centralize the fragmented identities and simplify your enterprise's infrastructure management.

Go beyond password vaults with Centrify

Centrify redefines the approach the Privileged Access Management and lets you think beyond the mere application of shared accounts or password vaults for security. The Zero Trust Privilege combines the traditional password vaults with brokering of identities and MFA (multi-factor authentication) to seal all possibly exploitable gaps. It prioritizes innovation and time-to-value, enabling you to take real-time intelligent decisions. All in all, it gives you a complete Privileged Access Security for both remote and on-site premises.   

Company Information

Company Name: Centrify Corporation

Company Address: 3300 Tannery Way, Santa Clara, CA, USA

Founded in: 2004

Top Features

Mobility Management & SSO
  • Integrated Device Management
  • Managing Mobile Applications
  • Managing Device Certificates
  • Cloud & Mobile SSO
  • Adding Single Sign-on
  • Reports Customization
Identity Management
  • Active Directory Integration
  • LDAP Integration
  • Cloud Storage
  • Partner Federation
  • Customer Access
  • User Self-service
  • User Password Reset
Authentication
  • Multi-factor Authentication & Policy
  • Per-app Policies
  • Sending Secured OTP
  • Context-based Setu-up Authentication
Provisioning & Workflow
  • Managing Apps Lifecycle
  • Automated Apps Access
  • Automated Apps Authorization
  • Revoking Access
  • Workflow Management
App Gateway & Mac Management
  • Secured Access
  • Cloud Connector
  • On-premises Access
  • Active Directory Supported
  • Group Policy Control
  • Locking & Wiping Remotely
  • FileVault2 Encryption