itb-au logo
Story image

Centrify gets flexible with privileged access deployment

Centrify is a leader in securing enterprise identities against cyber threats, and it’s just made significant enhancements to its privileged identity management (PIM) solution.

An industry first, Centrify’s Privilege Service is a cloud-based privileged access security solution that boasts additional support for hybrid IT environments.

According to the organisation, customers can install and manage their own dedicated instance of Centrify Privilege Service, while also getting the same benefits and capabilities delivered by the industry’s only PIM-as-a-Service solution that’s available.

Lachlan McKenzie, Centrify’s Country Manager for Australia and New Zealand, says organisations have been asking for more flexible deployment options for their privileged identity management solution.

“Not every customer is ready for a cloud-based service to store their root passwords,” he says.

“The ability to deploy the Centrify Privilege Service either on-premises or in a private cloud is an attractive option for customers who are still concerned about the cloud or who must comply with certain rules and restrictions when it comes to managing their privileged accounts in the cloud,” explains McKenzie.

According to research firm Forrester, securing apps in the modern enterprise is more important than ever.

A total of 80% of security breaches involve privileged credentials that typically belong to the IT personnel who administer the systems, databases and networks of an organisation.

Forrester states that it is these people that hold the proverbial ‘keys to the kingdom’ — and intruders know that hacking their accounts provides far deeper and broader access to critical data.

Centrify asserts that it is constantly working to effectively address these challenges by offering unique support for hybrid IT environments and securely managing access by internal employees and third parties.

The company also adds that its Privilege Service addresses security and audit requirements for the management of both cloud-based and on-premises access to critical production systems and applications - all without the hassle of a VPN.

Story image
Mentorship key to bringing women into cybersecurity - Microsoft
“Diverse teams make better and faster decisions 87% of the time compared with all male teams, yet the actual number of women in our field fluctuates between 10 and 20%. What ideas have we missed by not including more women?”More
Story image
Acronis: Lack of backup process within organisations causing data losses
Traditional strategies and solutions to data protection are no longer able to keep up with the modern IT needs of individuals and organisations. More
Story image
Safety app made free for business to support remote working during COVID-19
Many businesses have turned to remote working as the impacts of the COVID-19 pandemic continue to affect the business community. More
Link image
COVID-19: The tools ensuring security for remote working
Cyber threats are multiplying during the pandemic, and remote workers are at a heightened risk of cyber attack. Here are the security solutions to defend against the wave of virus-related threats.More
Story image
Acronis appoints new APAC General Manager and launches Partners Programme
One of Morarji’s first objectives has been to launch the new Acronis Partner Programmes in APAC, in which the Acronis team will help channel partners and managed service providers (MSPs) expand their portfolios and deliver fast ROI.More
Story image
Google Cloud says it's ready for the coming strain on infrastructure
The cloud giant says that they are working with governments and network operators around the world to minimise stress on the system.More