Privileged access management (PAM) is the combination of processes and technology used to secure, control and monitor administrator or super user access to an organisation’s information systems and resources. Privileged user accounts are significant targets for attack as they have elevated permissions, access to confidential information and the ability to change configuration settings. If compromised, an attacker could cause a high degree of damage and substantially impact your organisation’s business operations and reputation.
Secure and Manage Privileged Access with a Radically Different Approach
Centrify is redefining the legacy approach to Privileged Access Management (PAM) with cloud-ready Identity-Centric PAM founded on Zero Trust principles. This allows establishing trust, and then granting least privilege access just-in-time based on verifying who is requesting access, the context of the request, as well as the risk of the access environment.
- Shared Account and Password Vault
- Secure Password Storage
- Application Passwords and Secrets Vault
- Credential Management
- Secure Remote Access
- Secure Administrative Access via Jump Box
- Access Request and Approval Workflow
- Privilege Elevation
- Session Recording and Auditing
- Adaptive Multi-Factor Authentication
- User Behaviour Analytics
Centrify was Named a Leader in The Forrester Wave™: Privileged Identity Management (PIM), Q4 2020
CyberRisk has partnered with Centrify to bring their technology to Australia. Together we can secure your privileged access.
Ask us for a demonstration.
Contact us if you would like more information or a demonstration.