© 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data...

19
© 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation www.centrify.com (408) 542-7500

Transcript of © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data...

Page 1: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

© 2004-2012. Centrify Corporation. All Rights Reserved.

Evolving Enterprise Identity:From the Data Center to Cloud and

MobileCentrify Corporation

www.centrify.com

(408) 542-7500

Page 2: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

2© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

• The unique role played by identity…and the opportunity it presents

• Data center, cloud and mobile trends re-shaping enterprise IT

• Current state of enterprise identity and the impact of fragmented identity

• Unified Identity Services across data center, cloud and mobile

• Demonstration – Centrify Your Users, Centrify Your Security, Centrify Your IT

• Questions

Today’s Discussion

Page 3: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

3© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

• Based in Sunnyvale, CA with offices in Seattle, London, Munich, Hong Kong, Brisbane and Sao Paulo• Founded in 2004 with over 300 personnel (2/3rds in engineering)

• Recently named Deloitte 2012 Technology Fast 500 Winner as one of North America’s Fastest Growing Companies

• Delivers software and cloud services that lets you securely leverage your existing identity infrastructure — Active Directory — across data center, cloud and mobile• Support for 400+ operating systems and 1000+ Apps

• Proven technology deployed by 4500+ customers, over 40% of Fortune 50

• Award-winning solutions and numerous industry certifications

About Centrify

Industry Awards Industry Certifications

Page 4: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

4© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Some of our 4500+ CustomersB A N K I N G & F I N A N C E P H A R M A & H E A LT H D E F E N S E & G O V E R N M E N T

R E TA I L & I N T E R N E T T E C H N O L O G Y & T E L E C O M A U T O M O T I V E & E N E R G Y

Page 5: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

5© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

The Unique Role of Identity

• The fundamental means of distinguishing authorized from unauthorized access

• The primary tool for defining and enforcing IT control

• The front line of security defense

• Increasingly central to intelligence• Security: Legitimate vs. malicious

activity

• IT Ops: Resource use consistent with policy

© 2012 Enterprise Management Associates, Inc.

Page 6: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

6© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Industry Trends• Cloud, mobile and compliance requirements are the

three top business and technology waves impacting enterprise IT

• Identity is at the center of all three waves

• How will you manage identities to optimize user productivity, IT efficiency and compliance across data center, cloud and mobile?

Page 7: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

7© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Current State of Enterprise IdentityMultiple Logins for Users. Multiple Identity Infrastructures for IT.

D ATA C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RIS

E

EN

DP

OIN

TS

ID

ID

ID

ID

ID

ID

ID

ID

ID

ID

ID

ID

ID

ID

Page 8: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

8© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

The Impact of Fragmented Identity

• The ideal can be hard to achieve when identity is scattered among• Applications

• Systems

• Endpoints

• Mobile devices

• Third party apps

• Networks

• On premises

• SaaS, Cloud

• Etc. …

From: The Rise of Data-Driven Security, EMA Research Report, 2012© 2012 Enterprise Management Associates, Inc.

Poor integration among security tools

Too difficult to distinguish which security actions or policies are working and which are ineffective or unnecessary

Most significant frustrations with IT security technologies? Top 2 responses:

Page 9: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

9© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Centrify: Unified Identity ServicesOne Single Login for Users. One Unified Identity Infrastructure for IT.

Software andCloud Services

D ATA C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RIS

E

EN

DP

OIN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center, cloud and mobile

Page 10: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

10© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Across Data Center

= Unified Identity Services

+

, Cloud and Mobile

Centrify Cloud Services

Centrify Software

• Authentication / Single Sign-On (SSO)

• Auditing and reporting

• Self-service portal

• Mobile application management

• Encryption of data-in-motion

• Policy enforcement

• Authorization and role-based access control

• Mobile Zero Sign-on (ZSO)

• Mobile device management

• Etc.

Page 11: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

11© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

• Single username/password across all their devices, systems and apps — on-premise and in the cloud

• Saves users time, improves their productivity, and gives them the freedom to use latest technology

• Self-service portal to manage their devices, update their AD attributes, provision access to SaaS apps and push company approved apps to their mobile devices

Centrify Your Users

Page 12: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

12© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Demonstration

Page 13: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

13© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Centrify Reduces Post-it Note Budget by 50%

Page 14: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

14© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

• A “Big Easy Button” to control and audit access to 400+ operating systems and 1000+ Apps …• For Mac and Mobile: Lock down and authenticate

your mobile devices and your Macs using the same tools you use for Windows

• For Servers: Granular role-based access control, auditing and privileged identity management for all your *nix and Windows servers

• For Apps: Role-based approach to setting up which users can access which apps as well as usage reporting

• … and do so by leveraging existing skillsets, processes and infrastructure you already own — Active Directory• More security, e.g. disable a user in AD and that user

will be automatically locked out of all apps/systems and devices wiped

• More quickly and easily meet regulatory and security requirements

Centrify Your Security

Page 15: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

15© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

• Makes IT’s life easier via a “single pane of glass” for policy and identity

• Reduces help desk burden and costs• Single sign-on = eliminating calls re: lost/forgotten

passwords

• User self-service = reducing calls re: lost devices, pushing corporate mobile apps, setting up users to access SaaS apps, etc.

• A standards and non-intrusive based approach• Supports standards such as Kerberos, SAML, LDAP, PAM,

etc.

• No schema changes to Active Directory or software on domain controllers, no appliances and no poked holes/software in DMZ

• Centrify’s integrated architecture across data center, cloud and mobile + leveraging existing Active Directory = faster and more successful deployments

Centrify Your IT

Page 16: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

16© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Demonstration

Page 17: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

17© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Centrify: Unified Identity ServicesOne Single Login for Users. One Unified Identity Infrastructure for IT.

Software andCloud Services

D ATA C E N T E R

DA

TA

CE

NT

ER

S

ER

VE

RS

DA

TA

CE

NT

ER

A

PP

S

M O B I L E

C L O U D

EN

TE

RP

RIS

E

EN

DP

OIN

TS

Active Directory

ID

Centrify lets you securely leverage your existing identity infrastructure across data center, cloud and mobile

Page 18: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

18© 2004-2012. Centrify Corporation. All Rights Reserved.

| Identify. Unify. Centrify.

Resources and Next Steps• Try Centrify Express for Free

http://www.centrify.com/express Centrify Express for UNIX, Linux and MacCentrify Express for SaaSCentrify Express for MobileCentrify Express for Mac Smartcard

• Request a Trialhttp://info.centrify.com/trial

• Chalktalks, Webinars, Whitepapers and Collateralhttp://www.centrify.com/resources

• Contact Us for More Information

Centrify Corporation

www.centrify.com

(408) 542-7500

Page 19: © 2004-2012. Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation .

© 2004-2012. Centrify Corporation. All Rights Reserved.

Thank You