Welcome!

Cloud Expo Authors: Elizabeth White, Plutora Blog, Javier Paniza, Pat Romanski, Rich Waidmann

Blog Feed Post

Centrify Delivers Windows Privilege Management to Mitigate Internal Threats to Systems On-Premise and in the Cloud

New Centrify Suite 2013 Uniquely Helps Organisations Meet Compliance Requirements and Reduce Costs for the Broadest Set of Cloud and On-Premise Platforms

London, UK - Jan 29, 2013 - Centrify Corporation, the leader in Unified Identity Services across data center, cloud and mobile, today announced the general availability of the latest version of the Centrify Suite security and compliance solution in use today by more than 4,500 organisations worldwide. Featuring new advanced privileged user management and auditing for Windows systems, as well as new "sudo" migration tools for Linux systems, Centrify Suite 2013 enables organisations to quickly and effectively meet compliance requirements, mitigate risks from internal threats, and reduce operational costs across the broadest set of cross-platform systems deployed on-premise and in the cloud.

In today's heterogeneous IT environments, achieving security best practices and compliance by linking access privileges and actions to named users is a complex task. Managing user privileges for Windows, UNIX and Linux systems can be difficult to implement since identities and privileges often reside in disparate silos or are managed locally system by system. Point solutions exist for privilege management of Windows systems or UNIX and Linux systems, but no solutions exist that span across both Windows and UNIX/Linux that utilise a unified architecture leveraging existing directory infrastructure. Centrify Suite 2013 offers a comprehensive approach to identity management that includes integrated authentication, access control, privilege management, policy enforcement and compliance — all based on a single, unified architecture that leverages Microsoft Active Directory. This eliminates the need for IT staff to install, configure and manage multiple single-purpose products from a collection of other vendors.

According to Gartner, "…there is a need for the organisation to have more granular control over and visibility into the way that these privileges are granted and used. Super User Privilege Management (SUPM) tools offer a flexible method for granting and/or limiting these privileges in a way that matches the organisation's needs." [1]

Windows Privileged Management
Centrify Suite 2013 now includes DirectAuthorize for Windows, a new integrated solution that eliminates problems associated with too many users having broad and unmanaged administrative powers by delivering secure delegation of privileged access and granularly enforcing who can perform what administrative functions. Key features of DirectAuthorize for Windows include:

  • Secure delegation of privileged administration for Windows Servers. DirectAuthorize eliminates wide-open privileges of Windows and Domain administrators and grants privileges to only the roles, rights and resources required for each administrator's job function. It also allows administrators to easily elevate privilege without having to re-enter passwords or know an administrative password.

  • Granular authorisation and enforcement of administrative functions. DirectAuthorize goes beyond capabilities found natively in Windows by time limiting privileges for any user, restricting the access rights of high-privilege roles to specific systems, services or applications. It also delivers secure delegation using Centrify's patented Zones technology that provides the necessary flexibility and granularity for administrative functions.

  • Seamless integration with user-level auditing. DirectAuthorize integrates with Centrify DirectAudit to easily add user-session capture, search and playback, and can automatically trigger high-value session recording based on user, role, system or privilege elevation.

Enhanced Privilege Management for UNIX and Linux
In addition to the new Windows privilege management capabilities, Centrify Suite 2013 builds on its core capabilities to further empower organisations to easily migrate and manage identities and secure privileged user access across UNIX and Linux systems. New Linux- and UNIX-specific functionalities now available in Suite 2013 include:

  • Centralised UNIX/Linux authorisation with simple SUDO migration and SUDO replacement features. New import wizards automate the retrieval and import of sudoers' files for centralised enforcement via the Centrify Suite.

  • Enhanced user policy enforcement and administrative session audits. DirectAudit policies can now trigger auditing sessions for specific user, computer and DirectAuthorize roles.

  • Additional UNIX and Linux platform support. Already supporting the most platforms in the industry, the new solution now supports more than 400 platforms, applications and devices, including new platforms such as Fedora 18; Red Hat Enterprise Linux 5.8, 5.9 and 6.3; CentOS 5.8, 5.9 and 6.3; Scientific Linux 5.8, 5.9 and 6.3; Oracle Linux 6.3; Ubuntu 12.10; Linux Mint 13 and 14; Mandriva One 2012; and OpenSuSE 12.2 and 12.3.

"Centrify Suite 2013 raises the bar in delivering enhanced functionality for organisations to secure their systems and protect their resources across cloud and on-premise environments, including Windows least-privilege access management," said Matt Hur, Centrify senior director of product management. "With Centrify, organisations take advantage of their existing Microsoft Active Directory investments across the industry's broadest set of platforms in heterogeneous environments to centralise disparate identities and control privileged access for improved security and compliance."

Pricing and Availability
Centrify Suite 2013 is available today from Centrify and authorised partners worldwide. For more information about the Centrify Suite and a five-minute demo of the new DirectAuthorize for Windows, visit http://www.centrify.com/suite. To request a free Centrify Suite 2013 trial, visit http://www.centrify.com/trial.

Note 1 - Gartner, "Hype Cycle for Identity and Access Management Technologies, 2012," by Gregg Kreizman, et al, July 23, 2012.

About Centrify
Centrify provides Unified Identity Services across the data center, cloud and mobile that results in one single login for users and one unified identity infrastructure for IT. Centrify's solutions reduce costs and increase agility and security by leveraging an organisation's existing identify infrastructure to enable centralised authentication, access control, privilege management, policy enforcement and compliance. Centrify customers typically reduce their costs associated with identity lifecycle management and compliance by more than 50 percent. With more than 4,500 customers worldwide, including 40 percent of the Fortune 50 and more than 60 Federal agencies, Centrify is deployed on more than one million server, application and mobile device resources on-premise and in the cloud. For more information about Centrify and its solutions, visit http://www.centrify.com/.

###

Centrify, DirectAudit, DirectControl and DirectSecure are registered trademarks and DirectAuthorize and DirectManage are trademarks of Centrify Corporation in the United States and other countries.

Contact:
Michael Rennett
[email protected]
020 8392 4086

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@CloudExpo Stories
BMC Software plans to acquire assets of CDB Software, Inc., a mainframe data management company that has developed utilities for managing IBM DB2 databases with virtually no outage. Focusing on the availability of mission-critical applications is strategic for BMC as it continues to help its customers transform IT into a competitive advantage for their business. CDB's technology complements BMC's existing mainframe data management portfolio, which includes software utilities for DB2 administrat...
Amazon, Google and Facebook are household names in part because of their mastery of Big Data. But what about organizations without billions of dollars to spend on Big Data tools - how can they extract value from their data? In his session at 6th Big Data Expo®, Ali Ghodsi, Co-Founder and Head of Engineering at Databricks, discussed how the zero management cost and scalability of the cloud is addressing the challenges and pain points that data engineers face when working with Big Data. He also s...
IBM has announced software that allows people to hide or anonymize their personal information on the Web, ensuring protection from identity theft and other misuse. Developed by researchers at IBM's laboratory in Zurich, Switzerland, the software – called Identity Mixer – will enable consumers to purchase goods and services on the Internet without disclosing personal information. As consumers hand over personal details in exchange for downloading music or subscribing to online newsletters, they...
In this scenarios approach Joe Thykattil, Technology Architect & Sales at TimeWarner / Navisite, presented examples that will allow business-savvy professionals to make informed decisions based on a sound business model. This model covered the technology options in detail as well as a financial analysis. The TCO (Total Cost of Ownership) and ROI (Return on Investment) demonstrated how to start, develop and formulate a business case that will allow both small and large scale projects to achieve...
IBM has announced a new strategic technology services agreement with Anthem, Inc., a health benefits company in the U.S. IBM has been selected to provide operational services for Anthem's mainframe and data center server and storage infrastructure for the next five years. Among the benefits of the relationship, Anthem has the ability to leverage IBM Cloud solutions that will help increase the ease, availability and speed of adding infrastructure to support new business requirements.
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
"Our premise is Docker is not enough. That's not a bad thing - we actually love Docker. At ActiveState all our products are based on open source technology and Docker is an up-and-coming piece of open source technology," explained Bart Copeland, President & CEO of ActiveState Software, in this SYS-CON.tv interview at DevOps Summit at Cloud Expo®, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The BPM world is going through some evolution or changes where traditional business process management solutions really have nowhere to go in terms of development of the road map. In this demo at 15th Cloud Expo, Kyle Hansen, Director of Professional Services at AgilePoint, shows AgilePoint’s unique approach to dealing with this market circumstance by developing a rapid application composition or development framework.
Eighty-five percent of companies store information in some sort of unstructured manner. In this demo at 15th Cloud Expo, Mark Fronczak, Product Manager at Solgenia, discussed their enterprise content management solution, which was created to help companies organize and take control of their digital assets.

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's

Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet rigid data sovereignty and data integrity requirements while offering flexible, on-demand cloud resources to users, Leysin identified OpenStack as the clear choice to round out the school's cloud strategy. Additional...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps become...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...