Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Friday, 27 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

RSAC – Centrify releases cloud-based privilege user management service

by The Gurus
April 22, 2015
in Editor's News
Share on FacebookShare on Twitter

Centrify has launched a cloud-based privileged identity service to enable users to addresses today’s growing gap in security, visibility and control over privileged accounts.
According to the company, Centrify Privilege Service (CPS) adds shared account password management for servers, network devices and Infrastructure-as-a-Service (IaaS) to its flagship Centrify Server Suite. It also addresses security and audit requirements for the management of both cloud-based and on-premises access to critical production systems and applications by remote employees and third parties.
This results in a comprehensive and tightly integrated privileged identity management solution that not only increases security and simplifies compliance, but is also built to span both cloud and data center infrastructure, said CEO and founder Tom Kemp.
“Centrify’s modern approach to managing and securing privileged accounts is in stark contrast to legacy privileged identity management software offerings that do not address increasingly hybrid IT environments of on-premises and cloud-based systems,” he said.
“These products also fail to secure and manage third-party access and utilise cumbersome on-premises architectures that require expensive perpetual license purchases and months of professional services. Analysts have been asking when will the privileged identity management market be disrupted by the cloud, and we believe CPS is the answer.”
In an email to IT Security Guru, CTO EMEA Barry Scott, said that it has been in the Privileged Identity Management (PIM) space on UNIX, Linux and Windows for over 11 years now with Centrify Server Suite; ensuring that privileged users have the minimum level of access needed and only on the systems where they have a good business reason to have that access.
“We believe the right approach to PIM is one of least privilege, where users log on as themselves and are given the ability to execute only those specific privileged commands appropriate to their role – that’s what Centrify Server Suite does,” he said.
Asked if users acknowledge that they need this solution, Scott said that businesses already acknowledge that identity and privilege is a problem, and are looking for solutions- it’s also becoming a focus for auditors. “The fact that privileged users may be anywhere, and systems they are accessing may also be anywhere, only complicates the issue,” he said.
“CPS caters for the modern enterprise, which includes on-premises and Cloud infrastructure, a mobile workforce, big data and IT users who are internal, contractors and outsourced IT partners. CPS is unique in the market in being the first PIM solution built from the ground up in the cloud, and takes advantage of our Cloud Identity platform which has been used by our Mobile Management and Cloud SSO (IDaaS) solutions for the last
four years.
“Previously, vendors in this area built for an entirely on-premises market which becomes less and less valid as time goes on. We are building for where the market is going, not where it’s been.”

FacebookTweetLinkedIn
Tags: CentrifyCloudComplianceIaaSIAMIDaaSidentity and access managementInfrastructure-as-a-ServiceManagementPrivilegeRSARSA ConferenceRSACUser
ShareTweetShare
Previous Post

RSAC – EU Data Protection could force changes for Facebook, Google and Microsoft

Next Post

Why source IT security auditing to external auditors?

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information