Centrify, the leader in securing hybrid enterprises through the power of identity services, announced today that it has expanded support for Windows endpoints — including laptops, desktops and mobile devices ― and joined AppConfig.org to streamline app and device provisioning, extend IT security policy and provide end-users with more device choices. These enhancements to Centrify’s mobile-centric identity management solutions will let organizations in the Middle East further realize seamless, context-aware policy across all the applications, endpoints and devices their users prefer — all from a single integrated solution.
“Centrify’s goal is to stop breaches through the power of identity services, and by tightly integrating mobile and identity policy into a single solution, we are creating a more robust way to ensure that only the right people have access to the right apps and data from managed devices,” said Kamel Heus, regional manager – MEA, Centrify.
Age of Access
In today’s age of access, enabling user choice, while maintaining a highly secure environment is critical. The new Windows management features let IT organizations manage Windows endpoints from the cloud — including blocking app access from unmanaged devices — and further extends Centrify’s Zero Sign-On capabilities to Windows, so once users are securely authenticated the first time, they never have to type in their ID again when launching an app.
More Mobile Endpoints
This new feature builds on and extends Centrify’s existing industry-leading identity support for Mac, iOS. Linux and Android endpoints, as well as its Multi-Factor authentication (MFA) support for Linux and Windows login and privilege elevation. Combined with Centrify’s released Analytics Service that uses machine learning to assess risk based on user behavior patterns, organizations get needed help in stopping anomalous access requests across apps, sites, and resources.
More devices protected, better security
Centrify Identity Service enables organizations to get more value from their investment by allowing greater endpoint choice, without compromising security.