Evaluation Based on Completeness of Vision and Ability to Execute
Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, announced that it has been positioned by Gartner, Inc. in the Leaders quadrant of the 2018 Gartner Magic Quadrant for Privileged Access Management. The report evaluated 14 vendors based on completeness of vision and ability to execute.1
“We are delighted to be acknowledged as a Leader in Gartner’s first-ever Magic Quadrant for Privileged Access Management”
“We are delighted to be acknowledged as a Leader in Gartner’s first-ever Magic Quadrant for Privileged Access Management,” said Tim Steinkopf, President at Centrify. “We believe our position in the Leaders quadrant is due to our best-in-class Active Directory bridging for Unix/Linux systems, a truly cloud-architected solution that can be deployed on-premises or SaaS, and our machine learning-based analytics services. Furthermore, we think our integration with common DevOps tools and integrated multi-factor authentication round out what we believe is the most complete offering for the privileged access challenges facing enterprises today.”
Catastrophic data breaches have become more common in a mobile-first, cloud-first world. Cyber attackers are no longer hacking their way in; they are logging in using weak or compromised passwords, then moving laterally across the network to gain privileged access to steal data and cover their tracks. From a hacker’s perspective, privileged access is one of the easiest ways to reach sensitive and potentially-valuable information that can then be exploited.
To stop this leading cause of breaches, Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure infrastructure, DevOps, cloud, containers, Big Data and other modern attack surfaces.
“The legacy methods of managing privileged access do not address the new threatscape enterprises are facing that is no longer constrained to systems and resources inside the network. A cloud-ready solution must emerge that empowers a ‘never trust, always verify, enforce lease privilege’ approach, and we call that Zero Trust Privilege,” Steinkopf continued.