Centrify

Centrify

Centrify is an enterprise identity platform that provides centralized access control, single sign-on, and multi-factor authentication across cloud, mobile, and on-premises environments. It integrates with Active Directory and LDAP to leverage existing directories.
Centrify image
single-signon multifactor-authentication access-control active-directory ldap

Centrify: Enterprise Identity Platform

Centrify provides centralized access control, single sign-on, and multi-factor authentication across cloud, mobile, and on-premises environments, integrating with Active Directory and LDAP.

What is Centrify?

Centrify is an enterprise identity and access management solution used by organizations to secure access to infrastructure, DevOps, cloud, and other modern application environments. It provides the following key capabilities:

  • Centralized access control and single sign-on (SSO) using standards like SAML, OpenID Connect, OAuth, and FIDO
  • Multi-factor authentication (MFA) and adaptive authentication to strengthen sign-in security
  • Just-in-time privileged access to implement least privilege principles
  • Role-based access control and fine-grained permissions
  • Auditing and reporting for visibility into user activity
  • Integrates with Active Directory, LDAP, and other directories to leverage existing identities
  • Supports hybrid IT by securing both cloud apps like Office 365 as well as on-prem apps behind the firewall

Key benefits include increased security, simplified access, governance and compliance, and works across any app, environment, or infrastructure. Centrify consolidates disparate tools for access management into unified platform available both on-premises or in the cloud.

Centrify Features

Features

  1. Single sign-on (SSO)
  2. Multi-factor authentication (MFA)
  3. Role-based access control
  4. Privileged access management
  5. Auditing and monitoring
  6. Secure remote access
  7. Cloud app integration

Pricing

  • Subscription-Based

Pros

Integrates with Active Directory

Centralized access control

Improves security

Increases productivity

Reduces IT costs

Cons

Can be complex to setup and manage

Requires training for users and admins

Not ideal for small businesses

Can be expensive for larger deployments


The Best Centrify Alternatives

Top Security & Privacy and Identity & Access Management and other similar apps like Centrify


10Duke Identity Provider icon

10Duke Identity Provider

10Duke Identity Provider is an open source identity and access management (IAM) solution designed to help organizations manage user identities and control access to applications and resources. It allows single sign-on (SSO) by integrating with various applications and services using federated identity standards like SAML, OAuth, and OpenID Connect.As an...
10Duke Identity Provider image
JumpCloud icon

JumpCloud

JumpCloud is a cloud-based directory and device management platform designed for IT teams in organizations of all sizes. It provides a single pane of glass to manage user identities and devices across an organization.Key features and benefits of JumpCloud include:Centralized user directory - Add and manage user identities and group...
JumpCloud image
LemonLDAP::NG icon

LemonLDAP::NG

LemonLDAP::NG is an open source single sign-on and access management solution developed in Perl. It provides a centralized authentication server that allows users to sign in once and access multiple applications and services without having to log in again.Some key features of LemonLDAP::NG include:Single sign-on (SSO) - Users sign in...
LemonLDAP::NG image
Shibboleth icon

Shibboleth

Shibboleth is an open source single sign-on system designed for educational institutions and organizations. It provides a federated identity framework that enables secure access to resources across organizational boundaries.Here are some key features of Shibboleth:Allows users to sign in once with their institutional credentials to gain access to multiple resources...
Shibboleth image
LoginRadius icon

LoginRadius

LoginRadius is a customer identity and access management (CIAM) platform designed to secure, manage and control access to web, mobile and IoT applications. It provides a unified interface to handle user registration, authentication, single sign-on (SSO), user management, analytics and more across devices and platforms.Key features of LoginRadius CIAM include:Support...
LoginRadius image
Identity Cloud icon

Identity Cloud

Identity Cloud is an identity and access management (IAM) solution offered by Oracle. It provides capabilities to manage user identities, secure access, enable governance, and gain visibility across all users and systems.Key capabilities and benefits of Identity Cloud include:Single sign-on (SSO) - Provides secure, one-click access to all applications without...
Portier icon

Portier

Portier is an open source single sign-on (SSO) authentication server designed to make centralized user authentication easy for both users and developers. It allows users to log into different connected websites and applications using the same credentials so they don't have to remember multiple passwords.Some key features of Portier include:Open...
Portier image
Hexnode UEM icon

Hexnode UEM

Hexnode UEM (Unified Endpoint Management) is a comprehensive enterprise mobility management (EMM) solution used by organizations to monitor, manage and secure all endpoints like laptops, desktops, servers, smartphones, tablets, etc. across platforms including Windows, macOS, iOS, iPadOS, Android and ChromeOS.It provides a unified console to enroll and manage corporate and...
Hexnode UEM image
Bitium icon

Bitium

Bitium is a cloud-based identity and access management (IAM) platform designed for small to medium-sized businesses. Some key features of Bitium include:Single Sign-On (SSO) - Allows users to access all their cloud applications with one set of login credentials. Reduces password fatigue.Multi-Factor Authentication - Adds an extra layer of security...
Bitium image
DigiPass by Vasco icon

DigiPass by Vasco

DigiPass by Vasco is a leading two-factor authentication solution used by organizations worldwide to enhance security and prevent unauthorized access. It adds an extra layer of protection beyond standard passwords by requiring users to provide a one-time passcode along with their username and password when logging into critical systems.DigiPass generates...
DigiPass by Vasco image
Droidlock MDM icon

Droidlock MDM

Droidlock MDM is a mobile device management (MDM) solution used by organizations to secure and manage employee Android devices. It provides a suite of features to enroll devices, enforce policies, distribute apps, and monitor device status:Device enrollment - Employees can easily enroll their personal or corporate Android devices with Droidlock....
Droidlock MDM image
Instasafe Secure Access icon

Instasafe Secure Access

Instasafe Secure Access is a cloud-based Zero Trust Network Access (ZTNA) solution designed to provide secure remote access to internal applications and resources. It is built on a software-defined perimeter model that hides internal applications and resources from unauthorized users.With Instasafe Secure Access, all access requests go through a centralized...
Instasafe Secure Access image
IDM365 icon

IDM365

IDM365 is an identity and access management (IAM) solution developed by Tools4Ever. It provides capabilities for managing user identities and access in an organization.Some key features of IDM365 include:User provisioning - Automatically creates, updates, and deletes user accounts across all connected systems and applications like Active Directory, Office 365, Salesforce,...
IDM365 image
Proofpoint icon

Proofpoint

Proofpoint is a publicly traded cybersecurity company founded in 2002. It is headquartered in Sunnyvale, California and has over 3,000 employees worldwide. Proofpoint focuses on providing software as a service (SaaS) solutions for email security, data loss prevention, social media security, threat protection, and compliance.Some of Proofpoint's key products include:Email...
Proofpoint image