Centrify Zero Trust Privilege pricing, reviews and more.
20 reviews
Centrify Zero Trust Privilege is designed to help minimize the attack surface and control privileged access to the hybrid enterprise with identity assurance, just-in-time and just enough privilege, advanced monitoring and reporting.
What is Centrify Zero Trust Privilege?
Zero Trust and Privileged Access Management (PAM) approach to cyber attacks minimizes your attack surface. Our services include Privileged Access, Authentication, Privilege Elevation, Audit and Monitoring.
What tech stack does Centrify Zero Trust Privilege use?
Drupal
MariaDB
PHP
Varnish
Pantheon
Nginx
Fastly
Centrify Zero Trust Privilege pricing plans
Centrify Zero Trust Privilege Services
$22
Month/User
Minimize the attack surface and control privileged access to the hybrid enterprise with just-in-time and just enough privilege, identity assurance and advanced session monitoring, recording, and reporting.
- Identity Broker – Secure access & authentication to geographically dispersed infrastructure (on-premises & private/public cloud).
- Adaptive MFA for Privileged Access – Risk-based MFA for remote access to Windows & Linux servers and elevating or leveraging privileged credentials.
- Privilege Access & Elevation – Automatically fulfill self-service requests for specific roles, while being able to revoke those entitlements upon expiration.
- SAPM – Secure, auditable and always-on access to critical shared account passwords
- Secure Remote Access – Secure Privileged Access for On-Site and Remote Administration.
- Auditing & Reporting – Identify suspicious user activity, conduct forensic investigations and prove compliance faster with privileged session monitoring and auditing.
- Available Add-ons: User Analytics & Privilege Analytics
Centrify Privilege Analytics Service
$2
Month/User
Centrify Privilege Analytics Service stops account-based attacks leveraging user behavior data. Behavior-based scoring enables a frictionless user experience that is adjusted based on risk, improving productivity — while maintaining security.
- Identity Intelligence (Server Login, Server Privilege)
- Real-time Alerting, Response and Reporting for Anomalies
- Risk-based Access Control
- Investigative Analysis for Access and Anomalies