Centrify Suite 2012
October 01, 2012
Starts at $385 per server and $65 per workstation.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Ease of deployment and feature rich solutions.
- Weaknesses: No online forums were found to offer ideas for creativity; and support cost was high.
- Verdict: Outstanding product and excellent support staff.
Centrify Suite 2012 provides user provisioning and access control across the enterprise. The company's approach to identity management and protection of user accounts, as well as system resources, made reviewing this product interesting and engaging. In a security market flooded with contenders, Centrify's IdM approach is creative and practical. It is easy to install, and configuration takes the sting out of centralizing various identity stores. Key to Centrify's ability to aggregate the management of identities is the graphic interface. The easy-to-navigate screens help the IT and security admins quickly and easily manage the network resources. The evaluation included the integration of Linux into Microsoft's Active Directory. This took just minutes to complete and we were on our way to controlling user creation, authorization and permissions. Reporting was very intuitive and easy to read. One did not see a bunch of cryptic details that required a security engineer to interpret. The Centrify enhanced central control extends to mobile devices and applications.
Centrify Suite provides a true single sign-on architecture for centralized access and privilege management for more than 375 platforms across Windows, UNIX, Linux and Mac OS X operating systems. For those that are concerned about agent-managed systems, the product can operate with or without the use of agents. Centrify postures itself as an essential prerequisite for secure access and data leakage prevention strategies by managing privileges and encrypting communication between systems to protect sensitive information.
It is important to have an installer that understands Windows, Linux, UNIX and/or Mac (depending on the customer's environment). Our basic setup included a Windows workstation for administration, Microsoft Active Directory, a DNS Server configured to allow dynamic updates for Active Directory services, and a Linux system hosted on both virtual and traditional hardware environments. Centrify provided a simple installation application along with scripts that helped set up the Linux environment. Because the tool automated the entire process of deployment, it was not necessary to manually touch the SQL Server at any time.
Complete documentation was included on a CD provided by Centrify. This was rich with instructions, pictures and diagrams. Once the initial setup was completed, the intuitive user interface (UI) made the job of enrolling systems a snap. Where there was a need for specific agents, tools and instructions, Centrify provided access to the customer support portal, as well as access to friendly and knowledgeable support staff.
The company offers a basic, no-cost support service in addition to its standard and premium options. Standard provides eight-hours-a-day/five days- a-week phone assistance. Premium provides 24/7 phone aid. Both options provide email support. In addition, Centrify offers a fairly comprehensive knowledge base and FAQ on its website.
Basic cost for the product is $385 per server and $65 per workstation. Support costs are based on a percentage of the list price - 20 percent for standard and 25 percent for premium support.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure