Welcome!

Release Management Authors: Pat Romanski, Elizabeth White, David H Deans, Liz McMillan, Jnan Dash

News Feed Item

Centrify Introduces User Lifecycle Management and Provisioning Across Cloud and Mobile

Centrify's New Provisioning Functionality for Office 365, Box, Salesforce and More Gives IT an 'Easy Button' to Instantly Provide Users With New Accounts and Single Sign-On Access for Cloud and Mobile Apps

SANTA CLARA, CA -- (Marketwired) -- 06/03/14 -- Centrify Corporation, the leader in unified identity services across data center, cloud and mobile, today announced new user account management and provisioning features that give organizations the ability to more efficiently manage their entire cloud application user lifecycle. This includes automatic account provisioning and de-provisioning, single sign-on access to cloud apps, and self-service mobile management and security -- with added flexibility to store identity where IT wants it: On-premises Active Directory, in the cloud, and/or a hybrid combination of both. Support is available for a wide range of popular SaaS applications including Office 365, Google Apps for Business, Salesforce, Box, Zendesk and others.

Centrify's new account provisioning functionality offers many key benefits, enabling IT organizations to save time and money by automatically creating user accounts across cloud applications for new employees. The provisioning features can eliminate helpdesk calls by allowing the IT organization to deploy the right applications the very first time, as well as single sign-on to those apps, without the need for multiple passwords that can easily get lost or stolen. Centrify's provisioning capabilities also include unique license management for apps such as Office 365, further reducing the IT burden to quickly get users productive.

Employees get "Day One" productivity because they can quickly gain access to all their apps with a single password, and use any device they want to access those applications. What's more, by leveraging user identity, Centrify can automatically deliver role-based application access controls that allow IT to assign the correct permissions and licensing within applications. This prevents unauthorized access and gives IT the power to terminate or de-provision access to all applications across all platforms from a single directory.

"With these new provisioning features from Centrify, enterprise IT now has full account lifecycle management across cloud and mobile apps and devices," said Corey Williams, senior director of product management and marketing at Centrify. "Organizations can quickly and seamlessly onboard new users, secure the apps and devices used to access corporate data, deploy mobile apps to users' devices, and de-provision access when employees leave the organization. Additionally, they can let users easily enroll their own devices for both SaaS and mobile self-service and single sign-on."

Centrify's new user lifecycle management and provisioning solution represents a breakthrough in the industry. Traditionally, managing the user lifecycle across cloud and mobile apps and mobile devices required separate identity and access management (IAM), mobile device management (MDM) and mobile application management (MAM) solutions. Centrify, however, is the first to provide a single, integrated solution. With Centrify's complete security solution, cloud and mobile apps and device policy can all be managed from a single source, leveraging identity as the basis for all policy.

The new automated provisioning functionality rounds out Centrify's Identify-as-a-Service (IDaaS) solution with full user lifecycle management for popular cloud apps including Office 365, Google Apps, Salesforce and others. Centrify provides the only IDaaS solution that secures both application access, as well as the devices used to most commonly access and store the data within those apps. Key features include:

  • Automated role-based or Active Directory group-based provisioning of accounts across cloud and mobile apps
  • Active Directory permissions/roles are seamlessly mapped to cloud apps, ensuring proper policies are in force for the protection of corporate data
  • Users receive single sign-on access to the appropriate apps, based on roles and responsibilities
  • Users can be rapidly de-provisioned centrally, for all cloud apps
  • Admins can manage all users, apps, devices, roles and policies from a single portal

About Centrify
Centrify provides unified identity services across data center, cloud and mobile environments that result in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify's unified identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization's existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and mobile device management. Centrify customers can typically reduce their total cost of identity management and compliance by more than 50 percent, while improving business agility and overall security. Centrify is used by more than 5,000 customers worldwide, including approximately half of the Fortune 50 and more than 60 Federal agencies.

For more information, please visit http://www.centrify.com/

Centrify is a registered trademark and Centrify Server Suite and Centrify User Suite are trademarks of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.

Media Contact:
Jeff Seedman
Email Contact
(415) 249-6763

Analyst Contact:
Dan Spalding
Email Contact
(408) 960-9297

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...