sb-au logo
Story image

Centrify expands mobile security offerings across ANZ

06 Mar 2017

Centrify has expanded its ANZ suite of mobile security offerings, and the company says both Windows and Apple-based devices can now get in on the fun.

The changes take effect in its Identity Service, Privilege Service and Server Suite offerings, which Centrify claims will let organisations use a single solution to apply policy to all devices, applications and endpoints.

Niall King, Centrify’s senior director of APAC sales, says security must now take into account millions of scattered connections in a hybrid enterprise that has few boundaries. He believes Centrify’s mission is to use identity services to stop breaches.

By tightly integrating mobile and identity policy into a single solution, we are creating a more robust way to ensure that only the right people have access to the right apps and data from managed devices.”

The new Windows management features allow organisations to manage Windows endpoints from the cloud, which includes blocking app access from unmanaged devices. 

Mac, iOS, Linux and Android endpoints are now supported, in addition to multi-factor authentication for Linux and Windows and privilege elevation.

Centrify has also been delving into the machine learning space, using risk assessment based on user behaviour patterns. Organisations can leverage Analytics Service as well as its extended service to stop anomalous access requests across apps, sites and resources. 

Centrify’s Identity Service has been built to capitalise on endpoint diversity without compromising security. The platform can extend security to BYOD or corporate-owned devices.

Centrify has also joined, a group of enterprise mobility management solution providers and app developers. The group collaborates to deliver business mobility to customers using a ‘standard approach’ to app configuration and management.

Centrify says AppConfig will help streamline app and device provisioning, extend IT security policy and provide end users with more device choices.

Link image
Why performance monitoring is essential to keep cloud costs down
Cloud comes with many different associated costs, which can sneak up on organisations and drive down efficiency. Here's how to reduce costs by up to 50%.More
Story image
High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020
The COVID-19 crisis has unleashed a wave of sophisticated and disruptive ransomware attacks, and the onus is on businesses to ramp up their security measures if they’re to avoid falling victim, writes Attivo Networks regional director for A/NZ Jim Cook.More
Story image
Why securing IoT installations will be ‘do or die’ in post-pandemic Australia
Unless IoT technology is visible on the network, organisations will find themselves at risk with an unmanageable high-tech morass, warns ExtraHop A/NZ regional sales manager Glen Maloney.More
Story image
Interview: Check Point profiles 5 battles that SOC teams face in 2020
Security operations centres (SOCs) are often the first lines of defence.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More