Centrify has announced that it has expanded support for Windows endpoints — including laptops, desktops and mobile devices ― and joined AppConfig.org to streamline app and device provisioning, extend IT security policy and provide end-users with more device choices.
These enhancements to Centrify’s mobile-centric identity management solutions, according to the company, will let organisations in the Middle East further realise seamless, context-aware policy across all the applications, endpoints and devices their users prefer — all from a single integrated solution.
In today’s age of access, enabling user choice, while maintaining a highly secure environment is critical. The new Windows management features let IT organisations manage Windows endpoints from the cloud — including blocking app access from unmanaged devices — and further extends Centrify’s Zero Sign-On capabilities to Windows, so once users are securely authenticated the first time, they never have to type in their ID again when launching an app.
This new feature builds on and extends Centrify’s existing industry-leading identity support for Mac, iOS. Linux and Android endpoints, as well as its Multi-Factor authentication (MFA) support for Linux and Windows login and privilege elevation. Combined with Centrify’s released Analytics Service that uses machine learning to assess risk based on user behaviour patterns, organisations get needed help in stopping anomalous access requests across apps, sites, and resources.
Furthering its commitment to securing access to the boundaryless hybrid enterprise, Centrify has also joined AppConfig, a collection of industry leading enterprise mobility management solution providers and app developers that have come together to make it easier for developers and customers to drive mobility in business. The community’s mission is to streamline the adoption and deployment of mobile enterprise applications by providing a standard approach to app configuration and management, building upon the extensive app security and configuration frameworks available in the OS.
“The world of security needs to move away from a legacy static perimeter-based approach to addressing the need to protect millions of scattered connections in an increasingly boundaryless hybrid enterprise. Centrify’s goal is to stop breaches through the power of identity services, and by tightly integrating mobile and identity policy into a single solution, we are creating a more robust way to ensure that only the right people have access to the right apps and data from managed devices,” said Kamel Heus, Regional Manger, MEA, Centrify.