Presentation is loading. Please wait.

Presentation is loading. Please wait.

Company Overview & Strategy

Similar presentations


Presentation on theme: "Company Overview & Strategy"— Presentation transcript:

1 Company Overview & Strategy
Mike Ratte Regional Sales Manager

2 Today’s Security Landscape
#1 LEADING POINT OF ATTACK IS COMPROMISED CREDENTIALS Nearly half of breaches are caused by compromised credentials. MULTIPLE POINTS IN THE CYBERATTACK CHAIN Hackers target both end and privileged user’s credentials. Breach Accomplished Identity is the New Perimeter DISSOLVING IT PERIMETER SaaS IaaS Access Anywhere Mobile, Mac Traditional perimeter-based security is not enough. ENTERPRISES NOT TRUSTING THEIR NETWORKS Zero Trust Model Today’s security should be based upon context-based policies. Mobile Identity Resources

3 Today’s Threats Require a Next-Generation Identity Platform
Unified solution is preferred state given hackers targeting both end and privileged Users LOW RISK Consolidate identities Context-aware policy Least privilege security MFA everywhere Access request User-level auditing Too many passwords Password reuse and sharing Basic authentication PASSWORDS Hybrid IT Internal & external users Too much privilege No contextual policy No auditing Single Sign-on Multi-factor authentication Shared password management Proxy-based session monitoring DANGER GOOD OPTIMAL HIGH RISK PRIVILEGE & POLICY LOW RISK

4 Centrify Secures Enterprise Identities against Cyberthreats
BIG DATA APPLICATIONS CLOUD (IAAS & PAAS) NETWORK DEVICES DATA CENTER SERVERS Secure Access to Apps & Infrastructure From Any Device For All Users PARTNER END USER PRIVILEGED IT USER CUSTOMER OUTSOURCED IT

5 Centrify Solutions Overview
Identity Service Mac Management Enterprise Mobility Management Provisioning Single Sign-On Privilege Service Privileged Access Request Session Monitoring Secure Remote Access Shared Password Management Server Suite Server Isolation Privilege Management Auditing Active Directory Bridge Centrify Identity Platform Cloud Directory Federation Engine Workflow Engine MFA/Policy Engine Reporting Engine Authentication Engine Secure Data Storage

6 The Power of the Centrify Identity Platform
Cloud Directory Federation Engine Workflow Engine MFA/Policy Engine Reporting Engine Authentication Engine Secure Data Storage Single architecture secures end and privileged user access MFA everywhere Workflow everywhere Federation everywhere Improved ROI Increased Security Context-aware security policy spanning Apps and infrastructure Endpoint device, location End and Privileged Identities Gain visibility and control across hybrid IT Govern access Monitor and terminate sessions Report on access and activity Continuous Compliance Supports both internal and external users

7 Trusted by over 5,000 Customers with 97% Retention
Banking & Finance Pharma & Health Defense & Government 4 of Top 10 U.S. Financial Services Companies 7 of Top 10 Pharma Companies More Than 80 U.S. Federal Agencies Retail & Internet Technology & Telecom Automotive & Energy 3 of Top 5 U.S. Retailers 5 of Top 12 Worldwide Telcos 5 of Top 10 U.S. Oil and Gas Companies 7

8 Why Choose Centrify? Protects against the leading point of attack used in data breaches— compromised credentials Uniquely protects both end users and privileged users — for both internal and external use cases Secure cloud, mobile and on-premises resources Trusted by over 5000 customers, including more than half of the Fortune 50 Validated by leading industry analysts as the market leader

9


Download ppt "Company Overview & Strategy"

Similar presentations


Ads by Google