CentrifyMastering Compliance, Auditing & Security  Securing UNIX, Linux and Mac Using Active Directory                    ...
• Evolving regulatory climate• Concern over insider threats• Adoption of cloud computing  platforms• Consumerization of IT...
• Auditors require                                           that organizations                                           ...
Centrify                                                         Unified Access Management                                ...
Centrify the Enterprise                             On-premise                                         CloudPersonal      ...
Security Best Practices    Enforce system security policies    Associate privileges with individuals    Lock down privi...
Why Customers Choose Centrify     Centrify is the “right vendor to choose" for Active Directory integration: Centrify’s so...
Thank you.
Upcoming SlideShare
Loading in …5
×

DSS ITSEC Conference 2012 - CENTRIFY

532 views

Published on


Presentation from Riga, Latvia. "Data Security Solutions" Ltd. ITSEC Conference.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
532
On SlideShare
0
From Embeds
0
Number of Embeds
17
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

DSS ITSEC Conference 2012 - CENTRIFY

  1. 1. CentrifyMastering Compliance, Auditing & Security Securing UNIX, Linux and Mac Using Active Directory Helder Gräf-Papaioannou Senior Systems Engineer (Sales) Centrify EMEA DACH and Eastern Europe helder.graef-papaioannou@centrify.com
  2. 2. • Evolving regulatory climate• Concern over insider threats• Adoption of cloud computing platforms• Consumerization of IT • Can I manage what users can do? • Can I verify for auditors what users did? • Can I manage personal devices?
  3. 3. • Auditors require that organizations show steady progress toward a well managed infrastructure• Fragmented enterprise is difficult to secure in a consistent manner
  4. 4. Centrify Unified Access Management Leverage infrastructure you already own! Microsoft Active Directory • Control • Who can access what • Secure • User access and privileges • Audit • What the users did© 2004-2012 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 4
  5. 5. Centrify the Enterprise On-premise CloudPersonal Mobile Devices Devices Active Directory HostedServers Systems Apps SaaS © 2004-2012 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 5
  6. 6. Security Best Practices Enforce system security policies Associate privileges with individuals Lock down privileged accounts Enforce separation of duties  Audit privileged user activities  Protect sensitive systems  Encrypt data-in-motion © 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 6
  7. 7. Why Customers Choose Centrify Centrify is the “right vendor to choose" for Active Directory integration: Centrify’s solution is “mature, technically strong, full featured, and possess(es) broad platform support.” – 2009 “We recommended that clients strongly consider Centrify … its products can fit well within a multivendor IAM portfolio.” – 2010 • 4000+ enterprise customers • Single architecture based on AD • Comprehensive suite • Proven success in deployments • Non-intrusive
  8. 8. Thank you.

×