Cloud Ready Zero Trust Privilege

Centrify logo

Somerford are a certified Premier Partner with Centrify, providing Privileged Access Management (PAM) by delivering cloud-ready Zero Trust Privilege to secure modern enterprises. Somerford have a team of certified engineers for professional services and support.

Users have too many passwords and too much privilege, attributing to a critical security risk.

Centrify’s Zero Trust Privilege model: start from a basis of an untrustworthy connection and build confidence in a users authentication and access requests on a number of baseline factors.

Somerford Associates are a Centrify UK Partner

Centrify’s Zero Trust Privilege steps

Verify who, by leveraging enterprise directories services and performing adaptive MFA
Contextualise request by ensuring it meets a requirement for access and include workflow to grant it
Secure the administrative environment by providing secure remote access and reducing the requirement of a VPN
Grant least privilege, provide just in time and just enough privilege to target resources held within access zones
Step 1
Step 2
Step 3
Step 4

Throughout the whole process audit everything and utilise adaptive risk based controls, by providing session capture and integration with SIEM technologies such as Splunk.

Zero Trust Privilege ready for the future

Legacy Privileged Access Management (PAM) is only focussed on the infrastructure, databases and network devices. In today’s networks it is a requirement to extend this into cloud environments, big data frameworks and container based architectures. With DevOps methodologies, it is fundamental to be able to automate and provide fully robust secure APIs to authenticate and secure privilege requests for services.

Centrify zero trust partner profile

Centrify Capabilities

Capability
Description
Authentication
Broker authentication and consolidate identities, leveraging enterprise authentication services.
Adaptive Multi-Factor Authentication (MFA) for Privileged Access
Risk based MFA policies reducing the burden on users for everyday tasks but increasing the security in high risk access requests.
Privilege Elevation
Grant just enough and just in time privilege across Windows, Linux and UNIX systems.
Shared Password Management
Vault, rotate and provide seamless access to shared accounts.
Privileged Access Request
Govern access to privileged accounts and privileged roles with approval workflows.
Secure Remote Access
Establish privileged sessions to targeted infrastructure without the requirement of a VPN.
Session Recording and Monitoring
Monitor and record privileged sessions
Auditing and Reporting
Enforce accountability for privileged activity and prove compliance
Try a free 30 day Centrify trial

Not sure how to contact us?

Schedule a call with one of our Centrify certified engineers and pre sales team. Or drop us a line if you have any questions.

Scroll to Top