Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1
Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong seed that in an increasingly cloud-y and mobile-y world, many of the traditional security solutions (e.g. AV, firewall, etc.) are no longer as applicable and important In this new world order, focus should be on securing the user and their digital identity vs. securing the perimeter (as the perimeter is dissolving) vs. securing endpoints (as endpoints are not owned and can t be managed by IT organizations) Copyright 2015 Centrify Corporation. All Rights Reserved. 2
De-Perimeterization Mac Mobile SaaS IaaS Access Anywhere No physical boundaries Copyright 2015 Centrify Corporation. All Rights Reserved. 3
Key Point #2: Identity is in Fact at Core of 75% of Cyber Attacks PRIVILEGED USERS END USERS Copyright 2015 Centrify Corporation. All Rights Reserved. 4
Key Point #3: Surveys Confirm Identity is Top Priority Q: What are your top security-related projects in next 12 months? Select up to three. INFORMATION SECURITY PROJECTS Identity Management SIEM Firewall Management DLP Intrusion Management Mobile Device Management Authorization/Access Control Policy Management Log Management Keeping Up with New Technology Security Awareness Vulnerability Assessment Monitoring Improvements Encryption Application Security Web Content Filtering Data Classification PCI Compliance Data Security Cloud Computing Control VPN/Remote Access GRC Directory Services Datacenter Expansion/Consolidation Anti-DDos 3% 3% 3% 3% 3% 4% 4% 4% 4% 5% 6% 6% 6% 6% 8% 8% 8% 7% 9% 9% 10% 12% 13% 13% 14% Source: TheInfoPro (451 Research), Information Security Wave 16, 2014 Copyright 2015 Centrify Corporation. All Rights Reserved. 5
Enterprise of Things = More Complexity Desktops Mobile + Data Center Apps Cloud (SaaS) Apache by Red Hat + Data Center Servers Cloud (IaaS & PaaS) + Copyright 2015 Centrify Corporation. All Rights Reserved. 6
Making Identity Even Harder to Manage Desktops Mobile Data Center Apps Cloud (SaaS) Apache by Red Hat Data Center Servers Cloud (IaaS & PaaS) Copyright 2015 Centrify Corporation. All Rights Reserved. 7
Centrify: Unified Identity Management Desktops Mobile Data Center Apps Cloud (SaaS) Apache by Red Hat Identity Platform Data Center Servers Cloud (IaaS & PaaS) Active Directory Copyright 2015 Centrify Corporation. All Rights Reserved. 8
Identity Challenges are Major app app app User Productivity More accounts/passwords means users are less productive/secure Users want self-service for devices + apps, but hard to do given sprawl Security & Compliance Admins sharing/using more privileged accounts (e.g. local, root) = greater attack surface for APTs and insider threats Shadow IT proliferation = lack of control and visibility Islands of identity = more difficult compliance and security app app app Operational Efficiency No single pane of glass = operational inefficiencies and security risks IT wants single easy button to completely provision/de-provision users Multiple infrastructures/processes across disparate systems + apps Copyright 2015 Centrify Corporation. All Rights Reserved. 9
Centrify: Unified Identity Management Centrify Identity Service Identity-as-a-Service for SaaS, mobile and on-prem apps Fully integrated mobile device and app management Mac authentication and Group Policy management Improve SaaS and mobile app/device security Centrify Privilege Service Shared account password management Secure remote access Privileged session monitoring Mitigate risk of shared accounts and improve compliance Centrify Server Suite Consolidated identity and Active Directory bridge Privilege management Comprehensive auditing Server isolation Minimize privileged user risk and improve compliance Centrify Identity Platform Cloud-based platform for directory, authentication, MFA and policy, reporting and secure cloud store across both end users and privileged users Copyright 2015 Centrify Corporation. All Rights Reserved. 10
Centrify: Win-Win for Users + IT app app app User Productivity Self-service for devices and apps equals instant productivity Single (or zero) sign-on for all apps (SaaS or rich mobile) Security & Compliance Fewer passwords, more granular policy equals less risk Least privilege for admins/sso plus mobile policy for users Comprehensive auditing equals greater control, better compliance app app app Operational Efficiency Consolidated identity infrastructure across OS, app, device, location, etc. Lower TCO (H/W, S/W, time) and leveraging existing skillsets Faster time to provision/de-provision and faster replies to audits Copyright 2015 Centrify Corporation. All Rights Reserved. 11
Centrify: 5,000 + Customers, 97% Retention Banking & Finance Pharma & Health Defense & Government Retail & Internet Technology & Telecom Automotive & Energy Copyright 2015 Centrify Corporation. All Rights Reserved. 12
A Selection of Our EMEA Customers Copyright 2015 Centrify Corporation. All Rights Reserved. 13
Banking and Finance We ve done it before All of the customers below undertook a deep and comprehensive competitive and technical evaluation with Centrify winning on each occasion due to our technical superiority, ease of deployment and simplicity During our PoC, it was very evident that Centrify Suite is built on a common architecture and code base, whereas other solutions we tested were clearly a bunch of acquired technologies loosely glued together with the only integration points being marketing integration points! We were able to deploy and join to Active Directory up to 500 systems per night with Centrify once our architectural design was complete. During our technical evaluation and score-carding process involving 6 vendors, Centrify came top in 14 out of 15 technical score-card categories. The vendor ranked second was a considerable way behind Centrify both technically and from an ease of deployment perspective due to Centrify s unique zoning capabilities Copyright 2015 Centrify Corporation. All Rights Reserved. 14
Complete Solution Must Provide ON-PREM SaaS MOBILE End User Requirements Single sign-on Fast self-service IT Requirements Full visibility Leverage Active Directory across cloud and mobile Integrated mobile device and app management Auto-provision end user apps and devices Solution = Much bigger than just SSO for SaaS! Copyright 2015 Centrify Corporation. All Rights Reserved. 15
D A T A C E N T E R S E R V E R S N E T W O R K D E V I C E S D A T A C E N T E R A P P S Competitive Landscape Centrify is the only vendor who addresses both on-premise as well as mobile and cloud. Addressing all three is critical as the vast majority of customers identity needs will today and in the future span across all three i.e. need to be a platform vs. point solution for cloud or mobile DATA CENTER CLOUD MOBILE Partial overlap with MDM Open Source Utilities Copyright 2015 Centrify Corporation. All Rights Reserved. 16
Centrify Summary Addresses one of the biggest IT problems in moving to cloud and BYOD Optimizing user productivity while enabling IT to control who can access what from which device Unique portfolio that unifies identity across cloud, mobile and data center for end and privileged users 10-year company with over 400 personnel, global sales, and support Trusted technology Deployed by 5,000+ customers with 97% retention rate including ~50% of Fortune 50 Strategic alliances with Microsoft, Apple, AVG and Samsung and 250+ resellers Industry Awards Industry Certifications Copyright 2015 Centrify Corporation. All Rights Reserved. 17
115093, Москва, Партийный пер., д.1, к.46 Тел.: +7 495 767-16-19 www.itgrd.ru Copyright 2015 Centrify Corporation. All Rights Reserved. 18