SAN FRANCISCO--(BUSINESS WIRE)--Jun 13, 2018--Centrify, a leading provider of Zero Trust Security through the power of Next-Gen Access, today announced that TMC, a global, integrated media company, has awarded Centrify Identity Services Platform a 2018 Products of the Year Award, presented by Cloud Computing Magazine.

The Cloud Computing Product of the Year Award honors vendors with the most innovative, useful, and beneficial cloud products and services that have been available to deploy within the past year. The recipients represent prominent players in the market who consistently demonstrate the advancement of technologies.

“Identity is the primary attack vector and preferred method of incursion used by hackers, as evidenced by high-profile breaches we’ve seen in headlines over the past year,” said Bill Mann, chief product officer at Centrify. “Our Next-Gen Access portfolio empowers organizations with a complete Zero Trust Security platform to stop breaches through the trifecta of Centrify Identity Services for applications, endpoints and infrastructure—both on-premises and in the cloud.”

The Centrify Identity Services Platform verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. The end result is Zero Trust Security through the power of Next-Gen Access. This mature and proven approach unifies single sign-on (SSO), multi-factor authentication (MFA), mobility management, privilege management and behavior analytics.

Organizations may consider approaching Zero Trust by implementing Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM) from separate vendors, but disparate solutions leave gaps and are expensive to separately license, implement, integrate and maintain. Only Centrify’s Next-Gen Access delivers an industry-recognized solution that uniquely converges IDaaS, EMM and PAM. This seamless integration secures access across applications, endpoints and infrastructure for all users, without sacrificing best-of-breed features.

To learn more about Centrify Zero Trust Security, please visit  www.centrify.com.

About Centrify

Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.

Centrify is a registered trademark of Centrify Corporation in the United States and other countries. All other trademarks are the property of their respective owners.

View source version on businesswire.com:https://www.businesswire.com/news/home/20180613005402/en/

CONTACT: Centrify

Media Contact:

Brad Shewmake, (408) 625-4191

brad.shewmake@centrify.com

or

Analyst Contact:

Becca Chambers, (669) 444-5446

Becca.Chambers@centrify.com

KEYWORD: UNITED STATES NORTH AMERICA CALIFORNIA

INDUSTRY KEYWORD: TECHNOLOGY DATA MANAGEMENT INTERNET SOFTWARE SECURITY

SOURCE: Centrify

Copyright Business Wire 2018.

PUB: 06/13/2018 08:00 AM/DISC: 06/13/2018 08:01 AM

http://www.businesswire.com/news/home/20180613005402/en