Overview: Centrify enables organizations to reduce IT expenses, strengthen security and enhance compliance by centrally securing their cross-platform data centers through Active Directory-based identity and access management.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Centrify Corporation.
Research offered by Centrify Corporation
Active Directory Expert Best Practices and Security Tips by Centrify Corporation. December 03, 2012 - Access this expert e-guide for Active Directory best practices and security tips. Learn about securing domain controllers, group policy security settings and more.
Centrify Express 2010.1 by Centrify Corporation. August 06, 2010 - Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems. It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Considerations for enterprise mobile access and SSO technology by Centrify Corporation. February 22, 2013 - This expert E-Guide offers access management tips and best practices in the age of the cloud and mobility. Learn how you can deliver single sign-on (SSO) to enable safe access, and uncover considerations for two-factor mobile authentication by reading on.
How to Enable Cloud Deployments with Active Directory by Centrify Corporation. December 03, 2012 - This expert e-guide discusses the improvements to server virtualization and cloud support in Windows Server 2012. Also, learn more about managing access control to data within Active Directory with Windows Rights Management Services.
Identity Access Management for Windows Environments by Centrify Corporation. February 22, 2013 - In this e-guide learn about new tools that are expanding identity access management beyond the corporate firewall to help you better manage mobile device and cloud apps as well as some Windows networking identity basics to integrate Windows desktops and Linux servers into Active Directory.
Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security by Centrify Corporation. September 21, 2011 - View this paper to describe how Centrify DirectAudit can solve the security, compliance and third-party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems and discover why traditional approaches cannot address the requirements of today's changing environment.
Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite by Centrify Corporation. March 19, 2009 - This paper gives an overview of the features and benefits of using the Centrify Suite to centralize and automate the management of ESX Server systems to strengthen security and streamline IT operations and management. It provides an overview of VMware administration and then addresses Centrify’s approach to securing administrators.
Stop Password Sprawl with SaaS Single Sign-On via Active Directory by Centrify Corporation. February 13, 2013 - Access this white paper that presents an easy-to-deploy, cloud-based architecture that will ensure your on-premise Active Directory infrastructure is protected and brings your SaaS applications in line with security best practices and compliance.
Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation. September 20, 2012 - This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities.
Windows Least Privilege Management and Beyond by Centrify Corporation. January 23, 2013 - Uncover a solution that solves the "too much privilege" problem in your Windows environment by assigning roles and rights to users in a "least-privilege" manner.