Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Centrify Centralizes Cloud Server Control with Microsoft Active Directory

Centrify Suite delivers “enterprise-out” centralized cloud server control using Microsoft Active Directory

Centrify Suite delivers “enterprise-out” centralized cloud server control using Microsoft Active Directory

Centrify today announced enhancements to its Centrify Suite software that enable organizations to dynamically secure Linux-based cloud servers using their existing Active Directory infrastructure. The Centrify Suite can leverage policy logic residing with Microsoft AD, such as role definition expressed through group membership and entitlements, to manage access control to off-premises services and infrastructure.Centrify Cloud Security Solutions

According to Centrify this “enterprise-out” approach to access control centralizes the administration of security policies, ensures consistent enforcement of security policies across hosted systems, and helps make all cloud-based servers, whether private or hosted, as secure and compliant with regulations as those in the data center, regardless of operating system.

The new offering also monitors and provides auditable information on all user activity via scheduled and customized reporting options, and enables enterprise single sign-on (SSO) to the operating system and applications.

To enable these capabilities, Centrify makes use of the VMware vCloud and/or Amazon EC2 APIs to discover servers in the cloud. The Centrify software then analyzes the readiness of the servers to be joined to Active Directory, downloads the appropriate software, joins the systems to the customer’s Active Directory domain, and provisions privileged users according to the customer’s established policies. Additionally, Centrify takes advantage of “Cloud templates” that define the configuration and deployment of servers so that organizations can easily enforce standards on new systems as they are provisioned.

“The ability to dynamically provision servers requires at the same time the ability to dynamically secure them,” said Frank Cabri, vice president of marketing at Centrify. “By securing and managing all of their servers within Active Directory, IT organizations can leverage their Active Directory investment to ensure that policies are uniformly applied wherever they are needed.”

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.