Who is this service for?

We serve IT Infrastructure, Operations and Security stakeholders throughout the entire organization.

About Centrify Identity Service

Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.

Product details

Starting price:

1usd / per month
more about prices

Free trial:

Yes, get demo

Desktop & Mobile Platforms:

Mac

Windows

Linux

App - Android

App - IOS

Cloud, SaaS, Internet

Training:

Documentation

Online

Support:

Working hours

Online

Software Developer

Centrify
http://www.centrify.com/
Set up in 2004
United States

Features

Access Certification
Access Controls/Permissions
Activity Monitoring
AI/Machine Learning
Alerts/Notifications
Application Access Control
Application Management
Architecture Governance
Archiving & Retention
Asset Tracking
Audit Management
Audit Planning
Behavioral Analytics
Benchmarking
Biometrics

Capability Mapping
Compliance Management
Compliance Tracking
Controls Audit
CPU Monitoring
Credential Management
Dashboard
Data Blending
Data Discovery
Demand Forecasting
Diagramming
Email Monitoring
Endpoint Management
Environmental Compliance
Event Logs
FDA Compliance
Firewalls
For Education
For Healthcare
Forms Management
HIPAA Compliant
Idea Management
Identity Federation
Incident Management
Intrusion Detection System
IOC Verification
ISO Compliance
Issue Management
Least Privilege
Mobile Access
Modeling & Simulation
Multi-Factor Authentication
OSHA Compliance
Password Management
Patch Management
Policy Management
Privileged Account Management
Process/Workflow Automation
Project Management
Remote Access Management
Reporting/Analytics
Risk Assessment
Risk Management
Sarbanes-Oxley Compliance
Scheduling
Self-Service Access Request
Sentiment Analysis
Server Monitoring
Single Sign On
Social Sign On
Surveys & Feedback
Task Management
Threat Intelligence
Threat Response
Tokenization
Transformation Roadmapping
User Activity Monitoring
User Management
User Provisioning
Version Control
Virtual Machine Monitoring
VPN
Vulnerability Scanning
Whitelisting/Blacklisting
Workflow Management

Alternatives Centrify Identity Service