Centrify Launches “MFA Everywhere,” an Initiative to Secure Enterprise Identities and Credentials
Today, at the RSA Conference, Centrify has announced MFA Everywhere, a new initiative that makes Multi-Factor Authentication available throughout the entirety of the Identity and Access Management provider’s solution portfolio.
Multi-Factor Authentication, or MFA, adds an additional step (or factor) to the authentication process, typically by pairing something the user knows, such as username and password, with an action, or something the user has, such as an SMS message to their phone, an email, or a token.
Centrify already provided MFA capabilities with its cloud-based identity as a service (IDaaS) platform, but has been diligently expanding support for MFA—last week they announced support for derived credentials on mobile devices, and now Centrify has added MFA support for any application that can authenticate with OAUTH-compliant tokens.
Centrify also delivers MFA support with robust Smart Card integration. Centrify was one of the first vendors to support CAC and PIV Smart Cards for both Apple’s Mac OS and Red Hat’s Enterprise Linux environments.
With this announcement Centrify’s MFA solutions now supports all types of enterprise users — including employees, contractors, outsourced IT, partners and customers — across a broad range of enterprise resources — including cloud and on-premises apps, VPNs, network devices, and cloud and on-premises servers.
“Not only do organizations need to implement MFA across all users and resources, they need to do it in a way that doesn’t hinder their users’ ability to work seamlessly and effectively,” said Bill Mann, chief product officer for Centrify. “As attackers get more aggressive and sophisticated, organizations need to get serious about layering on additional factors of authentication for all their enterprise assets. Unlike other vendors that deliver islands of MFA for a subset of users and resources, we are proud to embark and deliver on an expansive MFA Everywhere vision.”
Want to know more about Identity and Access Management? Check out Solutions Review’s all-new 2016 IAM Buyer’s Guide, featuring a full market overview, profiles, and best use cases for the top 28 vendors, and top questions for prospective buyers.