Professional Documents
Culture Documents
$86B
SPENT ON SECURITY
66%
YET 66% OF COMPANIES
IN 2017 ARE STILL BREACHED
81% 80%
breaches involve weak, breaches involve
default or stolen passwords privileged
Private vs. Public vs. Hybrid Cloud, Logicworks, March credential
2015; The Explosion ofmisuse
Apps: 27% are Risky, CloudLock, December 2016
Mobile Visual Networking Index (VNI) Forecast, Cisco, February 2017; 50 Billion Things Will Be Connected to the Internet by 2020, Cisco, 2013
© 2018 Centrify Corporations. All Rights Reserved. 4
Verizon 2017 Data Breach Investigations Report, Forrester Wave™: Privileged Identity Management, Q3 2016
THIS NEW THREATSCAPE REQUIRES
ZERO TRUST SECURITY
1 about you
2 about your device
3
must be authorized
Privileged User
Outsourced IT
Customer or Partner
Applications Cloud
(IAAS & PAAS)
SECURES ACCESS
SECURES ACCESS TO APPS TO INFRASTRUCTURE
Data Center Servers Big Data
Network Devices
Geo-velocity Time of
RISK SCORE Day
59
Day of
Device
Week
Geo-velocity Time of
RISK SCORE Day
59
Day of
Device
Week
MACHINE LEARNING
VERIFY THE USER VALIDATE THEIR DEVICE LIMIT ACCESS & PRIVILEGE
© 2018 Centrify Corporations. All Rights Reserved. 13
OUR UNIFIED PLATFORM FOR ZERO TRUST
ANALYTICS
Risk-based User Scoring › Behavior Analysis and Reporting
CORE SERVICES
Directory + Policy + Federation + Workflow + Reporting
AUDIT
EVERYTHING
ENFORCE
LEAST PRIVILEGE
LIMIT
LATERAL MOVEMENT
ESTABLISH
IDENTITY ASSURANCE
DANGER
Too Many Passwords
Too Much Privilege
MATURIT
Consolidate Identities Establish Access Zones Just-in-Time Privilege Analyze Risk Y
MFA Everywhere Trusted Endpoints Just Enough Privilege Monitor Sessions
Risk-based Access Conditional Access Don’t Break Glass Integrate with SIEM
SSO Everywhere Minimize VPN Access Lifecycle Management
No DevOps Passwords
© 2018 Centrify Corporations. All Rights Reserved. 15
FORRESTER FINDS IMPLEMENTING
BEST PRACTICES RESULTS IN
Big Data
Network Devices
LEADER GARTNER IDAAS MQ PC MAGAZINE EDITOR’S CHOICE NETWORK WORLD CLEAR CHOICE WINNER
The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester’s call on a Gartner “Magic Quadrant for Identity and Access Management as a Service” by Gregg Kreizman, June 2016. Gartner does not endorse
market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors
vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect the with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization
and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research,
© 2018 Centrify Corporations. All Rights Reserved. judgement at the time and are subject to change.
19 including any warranties of merchantability or fitness for a particular purpose.
5,000+
Trusted by over 5,000 customers
95%
Retention
© 2018 Centrify Corporations. All Rights Reserved. 20
6 of top10 7 of top10 100+
U.S. Financial Services Pharma Companies Federal Agencies
Companies