Centrify Infrastructure Services

Centrify Infrastructure Services

4.5 / 5 25 reseñas

¿Quién utiliza este software?

We serve IT Infrastructure, Operations and Security stakeholders throughout the entire organization.


Valoración media

25 reseñas
  • 4.5 / 5
    En general
  • 4.5 / 5
    Facilidad de uso
  • 4.5 / 5
    Atención al cliente
  • 4.5 / 5
    Características
  • 4 / 5
    Relación calidad-precio

Detalles del producto

  • Precio de partida
    $4/mes
  • Detalles de precios
    Inquire: https://www.centrify.com/about-us/contact
  • Versión gratuita
    No
  • Implementación
    Instalado: Mac
    En la nube, SaaS, web
    Instalado: Windows
    Móvil: nativo de iOS
    Móvil: nativo de Android
  • Formación
    En persona
    En directo en línea
    Seminarios web
    Documentación
  • Asistencia
    En horario ininterrumpido (atiende un representante)
    Horas laborables
    En línea

Datos del proveedor

  • Centrify
  • http://www.centrify.com/
  • Fundada en 2004

Información sobre este software

Centrify Infrastructure Services minimize the attack surface. How does this work? Identity Broker, secures access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud). Adaptive/Risk-based MFA is used for remote access to Windows & Linux servers and elevating or leveraging privileged credentials. Privilege Access & Elevation automates fulfilling of requests for specific roles, while revoking entitlements upon expiration. Other capabilities: SAPM, Aud...


Funciones de Centrify Infrastructure Services

  • Biometría
  • Credential Management
  • Identity Federation
  • Multifactor Authentication
  • Password Management
  • Policy Management
  • Social Sign On
  • User Management
  • Compliance Management
  • Dashboard
  • Exceptions Management
  • Internal Controls Management
  • Issue Management
  • Multi-Year Planning
  • Risk Assessment
  • Archiving & Retention
  • Controls Testing
  • Environmental Compliance
  • FDA Compliance
  • HIPAA Compliance
  • ISO Compliance
  • OSHA Compliance
  • Registro de auditoría
  • Risk Alerts
  • Sarbanes-Oxley Compliance
  • Version Control
  • Access Request Management
  • Account Management
  • Compliance Management
  • Multifactor Authentication
  • Password Management
  • Role Management
  • Single Sign On
  • User Activity Monitoring
  • User Provisioning
  • Activity Log
  • Antivirus
  • Análisis de comportamientos
  • Application Security
  • Cifrado
  • Gestión de dispositivos
  • Signature Matching
  • Web Threat Management
  • Whitelisting / Blacklisting
  • Antispam
  • Antivirus
  • Event Tracking
  • IP Protection
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Protección de archivos adjuntos
  • Spyware Removal
  • Two-Factor Authentication
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Data Management
  • Deployment Management
  • Gestión de inventario
  • Maintenance Utilities
  • Procurement Management
  • Reconocimiento automático de dispositivos
  • Remote Update / Installation
  • Software Management
  • Synchronization Management
  • Wireless Network Support
  • Análisis de capacidades
  • Análisis de rendimiento
  • Billing & Provisioning
  • Control de acceso
  • Cost Management
  • Demand Monitoring
  • Gestión de varias plataformas en la nube
  • SLA Management
  • Supply Monitoring
  • Workflow Approval
  • Benchmarking
  • Data Blending
  • Demand Forecasting
  • Exploración de datos (data mining)
  • For Education
  • For Healthcare
  • Inteligencia artificial y aprendizaje por máquina
  • Modeling & Simulation
  • Sentiment Analysis
  • Application Portfolio Management
  • Architecture Governance
  • Asignación de capacidades
  • Diagramming
  • Idea Management
  • Modeling & Simulation
  • Project Management
  • Risk Assessment
  • Transformation Roadmapping
  • Version Control
  • Análisis de comportamientos
  • Endpoint Management
  • IOC Verification
  • Incident Management
  • Inteligencia artificial y aprendizaje por máquina
  • Tokenization
  • Vulnerability Scanning
  • Whitelisting / Blacklisting
  • Análisis de comportamientos
  • Application Access Control
  • Credential Management
  • Endpoint Management
  • Granular Access Controls
  • Least Privilege
  • Multifactor Authentication
  • Password Management
  • Policy Management
  • Remote Access Management
  • Threat Intelligence
  • User Activity Monitoring
  • CPU Monitoring
  • Credential Management
  • Database Servers
  • Event Logs
  • History Tracking
  • Patch Management
  • Scheduling
  • Supervisión de correo electrónico
  • User Activity Monitoring
  • Virtual Machine Monitoring

Últimas reseñas disponibles sobre Centrify Infrastructure Services

Traducción realizada automáticamente. Mostrar la reseña original

Easy to setup with great features and amazing support

5/5
En general
5 / 5
Facilidad de uso
5 / 5
Características y funcionalidad
5 / 5
Asistencia al cliente
5 / 5
Relación calidad-precio

Comentarios: We initially started using Centrify for federating our environment with Azure/Office 365; but we now also use it for MFA, SAML, OATH, MDM, and for our application user portal. These additional features have no additional cost, but work incredibly well.

Puntos a favor: Very easy to setup. A resilient solution with excellent support, and it provides granular MFA for superior support. This is the third review I've written for Centrify. They offered me an incentive for this review; however I would have been willing to give them a glowing review without an incentive. I rarely have to contact Centrify support, but when I have I've found it to be some of the best I've ever used. We have been customers for over 5 years and are still very happy with our decision to use their services.

Puntos en contra: It's difficult to find anything to complain about with the Centrify software/services. If I had to choose one thing, it would be that the MDM offerings could be a bit more robust, but it still fits our needs very well.

Traducción realizada automáticamente. Mostrar la reseña original

The best tool for linux environment authentication on the market.

5/5
En general
5 / 5
Facilidad de uso
5 / 5
Características y funcionalidad
4 / 5
Asistencia al cliente
5 / 5
Relación calidad-precio

Comentarios: Centralized management.
Centralized installation.
Easy of updating
When you are tired of managing local users and want to maintain an organized and standardized environment you should analyze the use of centrify for your company.

Puntos a favor: I recommend Centrify, in my opinion and the best authentication platform on the market. with all the simplicity of installation and configuration I already use in my linux environments and in 3 years I must have opened 3 cases.

Puntos en contra: Missing options for automation for linux
Missing examples in the ADedit documentation for scripting.
I believe that centrify should start looking at the automation market. I believe that an infrastructure as a code and the future