www.centrify.com Open in urlscan Pro
2a04:4e42:600::645  Public Scan

Submitted URL: http://centrify.com/
Effective URL: https://www.centrify.com/
Submission: On November 18 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET /search/

<form action="/search/" method="get" id="views-exposed-form-search-page" accept-charset="UTF-8">
  <div class="form--inline clearfix">
    <div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-keywords form-item-keywords">
      <label for="edit-keywords">Keywords</label>
      <input data-drupal-selector="edit-keywords" type="text" id="edit-keywords" name="keywords" value="" size="30" maxlength="128" class="form-text" placeholder="What are you looking for?">
    </div>
    <div data-drupal-selector="edit-actions" class="form-actions js-form-wrapper form-wrapper" id="edit-actions"><button id="edit-submit-search" class="button js-form-submit form-submit"><span>Search</span></button>
    </div>
  </div>
</form>

Text Content

Skip to main content

See how ThycoticCentrify is coming together. Merger Status Update page

Close
Search
Close
Keywords
Search
Open
 * Solutions
   Expand
   
   Starting a PAM Project? Read this Gartner Report!
   
   Gartner Buyers' Guide for Privileged Access Management
   
   Get the Report
    * By Need Expand
      * Efficiently Manage Identities on UNIX & Linux
      * Password Management for Hybrid IT
      * Establish Zero Standing Privileges
      * Fulfill the Most Stringent Compliance Mandates
      * Role-Based Access Management for DevOps
      * Secure Access for Remote Admins & Outsourced IT
      * Secrets & Credentials Management for DevOps
      * Privileged Access Management for Cloud Environments
   
    * By Industry Expand
      * Banking, Financial Services, & Insurance (BFSI)
      * Energy & Utilities
      * Government
      * Education
      * Healthcare
   
    * By Role Expand
      * Audit & Compliance
      * CloudOps
      * Cyber Security Management
      * DevOps
      * IT Management

 * Products
   Expand
   
   Privileged Access Management: A Radically Different Approach
   
   Product Overview
    * Product Overview
    * Cloud Suite Expand
      * Cloud Authentication Service
      * Cloud Privilege Elevation Service
      * Cloud Audit & Monitoring Service
    * Privilege Threat Analytics Service Expand
      * Adaptive Multi-Factor Authentication
      * User Behavior Analytics
   
    * Server Suite Expand
      * Authentication Service
      * Privilege Elevation Service
      * Audit & Monitoring Service
    * Vault Suite
   
    * How to Buy
    * Certifications
    * Deployment Options
   
    * Centrify Platform Expand
      * MFA
      * Directory
      * Gateway Connectors
      * Federation
      * Unified Policy Management
      * Workflow
      * Insights
      * Continuous Discovery

 * Services
   Expand
   
   Drive Your Centrify Investment to the Next Level
   
   Professional Services helps you deliver optimal return on investment and
   increase time-to-value.
   
   Learn More
    * Services Home
    * Professional Services Expand
      * Professional Services Request Form
      * Jump Start Packages
   
    * Training Expand
      * Training Courses
      * Training Requests

 * Partners
   Expand
   
   Experience the Power of Partnership with Centrify
   
   Learn More
    * Partners Home
    * Become a Partner Expand
      * Centrify Partner Network
      * Become a Centrify Channel Partner
      * Centrify MSSP Partner Program
      * OEM Technologies
   
    * Find a Partner Expand
      * Centrify Partner Finder
      * Centrify Technology Partners

 * Resources
   Expand
   
   A Leader in the 2021 Gartner Magic Quadrant for Privileged Access Management
   
   Get the Report
    * Read Expand
      * Analyst Reports
      * Blog
      * Case Studies
      * Industry Research
      * PAM 101
   
    * Download Expand
      * Data Sheets
      * eBooks
      * Infographics
      * Solution Briefs
      * White Papers
   
    * Watch Expand
      * Product Demos
      * Videos
      * On-Demand Webinars
   
    * All Resources

 * Support
   Expand
   
   Customer Focused. Value Driven.
   
   We empower your team to work smarter, faster, and do more with less.
   
   Learn More
    * Get Support Expand
      * Contact Support
      * Support Programs
   
    * Find Help Expand
      * Support FAQ
      * Customer Support Portal
      * Centrify Developer Hub
      * Centrify Community
      * Documentation
      * Downloads
   
    * Keep Up to Date Expand
      * What’s New
      * Centrify Trust Cloud Status
      * Support Policies

 * Company
   Expand
   
   Introducing ThycoticCentrify
   
   Get the most recent updates on our merger and integration status.
   
   Learn More
    * Merger Status
    * Why Centrify Expand
      * Centrify Vision
      * Centrify Benefits
      * Centrify Competitive Differentiators
   
    * Customers Expand
      * Industries
      * Case Studies
      * Testimonials
      * Centrify Peer Reviews
   
    * About Expand
      * About Centrify
      * Centrify Values
      * Investors
      * Industry Associations
      * Contact Us
   
    * News & Events Expand
      * Press Releases
      * Media Coverage
      * Awards
      * Events & Webinars
   
    * Our People Expand
      * Leadership
      * Careers
      * Current Openings

 * Blog
 * Contact
 * Login

 * Blog
 * Contact
 * Login

 * Contact


CENTRIFY NAMED A LEADER AGAIN IN THE 2021 GARTNER MAGIC QUADRANT FOR PRIVILEGED
ACCESS MANAGEMENT

For the third consecutive time, Centrify has been recognized as a Leader in
privileged access management for ability to execute and completeness of vision

Read the Report


TRUSTED BY OVER 2,000 ORGANIZATIONS, WORLDWIDE




SECURE AND MANAGE PRIVILEGED ACCESS WITH A RADICALLY DIFFERENT APPROACH

Centrify is redefining the legacy approach to Privileged Access Management (PAM)
with cloud-ready modern PAM founded on Zero Trust principles. This allows
establishing trust, and then granting least privilege access just-in-time based
on verifying who is requesting access, the context of the request, as well as
the risk of the access environment.


CLOUD-READY PAM PRODUCTS FOR THE MODERN ENTERPRISE

Modern. Agile. Hyper-Scalable. Modular. These are the words that describe
Centrify Identity-Centric PAM products. Leveraging Identity-Centric PAM helps
organizations protect against breaches, enables cloud transformation, simplifies
infrastructure management, and improves compliance postures.

Product Overview

A Leader in the Forrester
PIM Wave, Q4 2020

A Leader in the Gartner
PAM MQ, 2021

A Leader in the KuppingerCole
Leadership Compass for PAM, 2021

> Learn More
> 
> “Centrify has been a great enabler in helping us to achieve growth by
> accelerating so many of our daily IT tasks, allowing us to focus on building
> out services that increase our market share.”
> 
> — Khalid Jubayer, IT Infrastructure Project Manager, VIVA
> 
> Using Centrify to Simplify Daily IT Tasks

> Learn more
> 
> “Centrify was exactly what we desperately needed in a pinch. We bought it
> specifically for PCI compliance, and it ended up saving our business from a
> pandemic.”
> 
> — Dan Boutin, Vice President of IT, Lending Solutions, Inc.
> 
> Lending Solutions: Implementing Emergency Remote Access for Privileged Users

> Learn More
> 
> "There isn’t a regulation that Centrify hasn’t helped us to meet. Today, every
> time an administrator touches a server, I have a record of it. I can pull a
> report, print it, and hand it to the auditor."
> 
> — Peter Manina, IT Specialist and UNIX Systems Architect, State of Michigan
> Department of Technology, Management and Budget
> 
> Compliance and Auditing is Easier with Centrify

> Learn More
> 
> “Centrify has been a great enabler in helping us to achieve growth by
> accelerating so many of our daily IT tasks, allowing us to focus on building
> out services that increase our market share.”
> 
> — Khalid Jubayer, IT Infrastructure Project Manager, VIVA
> 
> Using Centrify to Simplify Daily IT Tasks

> Learn more
> 
> “Centrify was exactly what we desperately needed in a pinch. We bought it
> specifically for PCI compliance, and it ended up saving our business from a
> pandemic.”
> 
> — Dan Boutin, Vice President of IT, Lending Solutions, Inc.
> 
> Lending Solutions: Implementing Emergency Remote Access for Privileged Users

> Learn More
> 
> "There isn’t a regulation that Centrify hasn’t helped us to meet. Today, every
> time an administrator touches a server, I have a record of it. I can pull a
> report, print it, and hand it to the auditor."
> 
> — Peter Manina, IT Specialist and UNIX Systems Architect, State of Michigan
> Department of Technology, Management and Budget
> 
> Compliance and Auditing is Easier with Centrify

> Learn More
> 
> “Centrify has been a great enabler in helping us to achieve growth by
> accelerating so many of our daily IT tasks, allowing us to focus on building
> out services that increase our market share.”
> 
> — Khalid Jubayer, IT Infrastructure Project Manager, VIVA
> 
> Using Centrify to Simplify Daily IT Tasks

prev
next


> “It has been a seamless implementation. We chose SAAS installation which saved
> us lot of time and effort in configuration. It was easy switch from POC to
> production. Support teams have been exceptional and always willing to help and
> assist! Professional services engagement was easy and hassle free.”
> 
> IT Security Leader, Transportation
> December 13, 2019


FEATURED RESOURCES

View all resources

ZERO TRUST PRIVILEGE FOR DUMMIES

In this ebook, you’ll learn how to assess your organization's current Zero Trust
Privilege maturity level and plot your road map on the journey to Zero Trust.

Read eBook
Analyst Reports

A LEADER IN THE FORRESTER WAVE: PRIVILEGED IDENTITY MANAGEMENT (PIM), Q4 2020

Analyst Reports

2021 GARTNER MAGIC QUADRANT FOR PRIVILEGED ACCESS MANAGEMENT

eBooks

PAM BUYERS' GUIDE

Webinars

TWO SIDES OF THE PAM COIN


THE LATEST AT CENTRIFY

WHAT'S NEW

ThycoticCentrify Report: 57% of Organizations Suffered Security Incidents
Related to Exposed Secrets in DevOps
ThycoticCentrify Continues to Deliver Against Growth Opportunity
See more news

FROM OUR BLOG

Smarter, More Modern PAM: Secret Server Integration with the Platform Plus Cloud
Suite Enhancements
Third-Party Risk Management at Macmillan Cancer Support
Check out our blog

THE LATEST ON TWITTER


Read More


READY TO PROTECT AGAINST THE #1 ATTACK VECTOR?

Click here for more information about our products, pricing, demos, and more.

Contact Us

We place cookies on your device to understand how this website is used, improve
your user experience, and enable display of online ads. By using this website,
you consent to the use of the cookies. Find out more via our privacy policy.
Got it!
 * 1.669.444.5200
 * support@centrify.com
 * Contact Us

 * Facebook
 * Twitter
 * YouTube
 * LinkedIn

 * Products Open
   * Vault Suite
   * Cloud Suite
   * Server Suite
   * Privilege Threat Analytics Service
   * How To Buy
   * Certifications
   * Deployment Options
 * Services Open
   * Professional Services
   * Training
 * Partners Open
   * Become a Partner
   * Find a Partner
 * Resources Open
   * Analyst Reports
   * Blog
   * Case Studies
   * Data Sheets
   * eBooks
   * Infographics
   * PAM 101
   * Solution Briefs
   * Videos
   * Webinars
   * White Papers
 * Support Open
   * Get Support
   * Find Help
   * Keep Up To Date
 * Company Open
   * Why Centrify
   * Customers
   * About
   * Our People

©2021 Centrify Corporation. All Rights Reserved.

 * Privacy Policy
 * Do Not Sell My Info
 * Terms of Use
 * EULA
 * Sitemap