Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.

Slides:



Advertisements
Similar presentations
© Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Identity and Access Management Business Ready Security Solutions.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
Unify and Simplify: Security Management
Dell Connected Security Solutions Simplify & unify.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
Building a Fully Trusted Authentication Environment
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager
User and Device Management
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Go mobile. Stay in control. Craig Morris EMPOWER ENTERPRISE MOBILITY.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Blue Coat Cloud Continuum
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Reduce Risk Across Hybrid IT
Reduce Risk Across Hybrid IT
Identity & Access Management for a cloud-first, mobile-first world
Module 1: Identity is the New Perimeter
Journey to Microsoft Secure Cloud
SaaS Application Deep Dive
Reduce Risk Across Hybrid IT
Virtualization & Security real solutions
Centrify Identity Service Balancing Security & Productivity
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Access and Information Protection Product Overview October 2013
Identity & Access Management
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
In the attack index…what number is your Company?
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Zero Trust in Practice: Identity Drives an Adaptive Workforce
Microsoft Virtual Academy
Presentation transcript:

Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users

Copyright © 2015 Centrify Corporation. All Rights Reserved. 2 Identity at Center of Cyber Attacks… ID END USERS PRIVILEGED USERS

Copyright © 2015 Centrify Corporation. All Rights Reserved. 3 Desktops Data Center Apps Data Center Servers …and Harder to Manage as Infrastructure Evolves Cloud (IaaS & PaaS)Cloud (SaaS)MobileBig Data ID

Copyright © 2015 Centrify Corporation. All Rights Reserved. 4 Identity Challenges are Major User Productivity More accounts/passwords means users are less productive/secure Users want self-service for devices + apps, but hard to do given sprawl Users need remote access to on-premises apps + systems without hassle of VPNs app Security & Compliance Admins sharing/using more privileged accounts (e.g. local, root) = greater attack surface for APTs and insider threats “Shadow IT” proliferation = lack of control and visibility Islands of identity = more difficult compliance and security Operational Efficiency No single pane of glass = operational inefficiencies and security risks IT wants single “easy button” to completely provision/de-provision users Multiple infrastructures/processes across disparate systems + apps app

Copyright © 2015 Centrify Corporation. All Rights Reserved. 5 …and a Top Priority for IT Management Q: What are your top security-related projects in next 12 months? Select up to three. 13% SIEM 13% Firewall Management 12% DLP 10% Intrusion Management 8% Log Management 8% Keeping Up with New Technology 7% Security Awareness 6% Vulnerability Assessment 6% Monitoring Improvements 6% Encryption 6% Application Security 5% Web Content Filtering 4% Data Classification 4% PCI Compliance 4% Data Security 4% Cloud Computing Control 3% VPN/Remote Access 3% GRC 3% Directory Services 3% Datacenter Expansion/Consolidation 3% Anti-DDos 14% Identity Management 9% Mobile Device Management 9% Authorization/Access Control 8% Policy Management INFORMATION SECURITY PROJECTS Source: TheInfoPro (451 Research), Information Security Wave 16, 2014

Copyright © 2015 Centrify Corporation. All Rights Reserved. 6 Cloud (IaaS & PaaS)Big Data Centrify Unifies Identity Management… Desktops Data Center Apps Data Center Servers Cloud (SaaS) Mobile ID Active Directory ID Identity Platform ID

Copyright © 2015 Centrify Corporation. All Rights Reserved. 7 …via Single Identity Platform for End and Privileged Users Centrify Identity Platform Identity Service Privilege Service Server Suite SSO (SaaS and on-prem apps) MFA Provisioning Enterprise Mobility Mgmt Mac Mgmt Secure Remote Access Secure Remote Access Session Monitoring Shared Account Password Mgmt. Active Directory Bridge Privilege Mgmt Auditing Server Isolation

Copyright © 2015 Centrify Corporation. All Rights Reserved. 8 Centrify: Win-Win for Users + IT User Productivity Self-service for devices and apps equals instant productivity Single (or zero) sign-on for all apps (SaaS or rich mobile) Secure remote access — without hassle of VPNs — to on-premises apps and systems app Security & Compliance Fewer passwords, more granular policy equals less risk Individual and secure shared accounts for admins, SSO + mobile policy for users Comprehensive auditing equals greater control, better compliance Operational Efficiency Consolidated identity infrastructure across OS, app, device, location, etc. Lower TCO (H/W, S/W, time) and leveraging existing skillsets Faster time to provision/de-provision and faster replies to audits app

Copyright © 2015 Centrify Corporation. All Rights Reserved. 9 Automotive & EnergyTechnology & TelecomRetail & Internet Banking & FinancePharma & HealthDefense & Government Centrify: 5,000+ Customers, 97% Retention 6 of Top 10 Pharma Companies 2 of Top 4 Energy Companies 7 of Top 12 Worldwide Telcos 3 of Top 5 U.S. Retailers More Than 60 U.S. Federal Agencies 4 of Top 10 Financial Services Companies

Copyright © 2015 Centrify Corporation. All Rights Reserved. 10 Why Centrify? Addressing two major IT challenges: the shift to cloud and mobile and security as the perimeter dissolves Unique portfolio that unifies identity across cloud, mobile and data center — for end users and privileged users 11 year enterprise security company with over 450 personnel, global sales and support Trusted technology with 5,000+ customers – ~50% of Fortune 50 – and 97% retention rate Strategic alliances with Microsoft, Apple, AVG and Samsung; 250+ reseller partners

Copyright © 2015 Centrify Corporation. All Rights Reserved. 11 Thank You

Copyright © 2015 Centrify Corporation. All Rights Reserved. 12 Centrify: Unified Identity Management Centrify Identity Service Identity-as-a-Service for SaaS, mobile and on-prem apps Fully integrated mobile device and app management Mac authentication and Group Policy management Improve SaaS and mobile app/device security Centrify Server Suite Consolidated identity and Active Directory bridge Privilege management Comprehensive auditing Server isolation Minimize privileged user risk and improve compliance Centrify Privilege Service Shared account password management Secure remote access Privileged session monitoring Mitigate risk of shared accounts and improve compliance Centrify Identity Platform Cloud-based platform for directory, authentication, MFA and policy, reporting and secure cloud store across both end users and privileged users