sb-au logo
Story image

Centrify gets flexible with privileged access deployment

Centrify is a leader in securing enterprise identities against cyber threats, and it’s just made significant enhancements to its privileged identity management (PIM) solution.

An industry first, Centrify’s Privilege Service is a cloud-based privileged access security solution that boasts additional support for hybrid IT environments.

According to the organisation, customers can install and manage their own dedicated instance of Centrify Privilege Service, while also getting the same benefits and capabilities delivered by the industry’s only PIM-as-a-Service solution that’s available.

Lachlan McKenzie, Centrify’s Country Manager for Australia and New Zealand, says organisations have been asking for more flexible deployment options for their privileged identity management solution.

“Not every customer is ready for a cloud-based service to store their root passwords,” he says.

“The ability to deploy the Centrify Privilege Service either on-premises or in a private cloud is an attractive option for customers who are still concerned about the cloud or who must comply with certain rules and restrictions when it comes to managing their privileged accounts in the cloud,” explains McKenzie.

According to research firm Forrester, securing apps in the modern enterprise is more important than ever.

A total of 80% of security breaches involve privileged credentials that typically belong to the IT personnel who administer the systems, databases and networks of an organisation.

Forrester states that it is these people that hold the proverbial ‘keys to the kingdom’ — and intruders know that hacking their accounts provides far deeper and broader access to critical data.

Centrify asserts that it is constantly working to effectively address these challenges by offering unique support for hybrid IT environments and securely managing access by internal employees and third parties.

The company also adds that its Privilege Service addresses security and audit requirements for the management of both cloud-based and on-premises access to critical production systems and applications - all without the hassle of a VPN.

Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
Gartner: By 2023, 65% of the world will have personal data covered under modern privacy regulations
“Security and risk management (SRM) leaders need to help their organisation adapt their personal data handling practices without exposing the business to loss."More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More
Story image
Video: 10 Minute IT Jams - Who is Bitglass?
Today, Techday speaks to Bitglass senior director of marketing Jonathan Andresen, who discusses insider attacks and the best solutions and practices to employ to protect organisations and employees.More
Link image
Data is an organisation's most significant asset - here's how to protect it
Data resilience strategies are becoming more crucial as more value is ascribed to a company's data. If it's not stored securely and cost-effectively, expect problems.More