{"id":15185,"date":"2018-12-17T04:16:04","date_gmt":"2018-12-17T01:16:04","guid":{"rendered":"https:\/\/www.proya.com.tr\/?page_id=15185"},"modified":"2021-11-05T03:16:45","modified_gmt":"2021-11-05T00:16:45","slug":"centrify","status":"publish","type":"page","link":"https:\/\/www.proya.com.tr\/en\/centrify\/","title":{"rendered":"Centrify"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1544810019609{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2018\/12\/centrify.jpg?id=12997) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">Centrify<\/span><\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h5><span style=\"color: #ffffff; font-weight: 400;\">Zero Trust Security<\/span><\/h5>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476278814474{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1544999726615{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h2><span style=\"color: #ae0000;\">Centrify<\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1598395631402{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Limited access for adequate, just-in-time privilege<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1636071227892{padding-bottom: 10px !important;}&#8221;]Control privileged access to critical administrator-level accounts in your corporate network with sufficient privileges and using advanced monitoring and reporting features. Thus, you minimize your privileged access security risk.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1636071238777{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #ae0000;\">Product features<\/span><\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1544999909357{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Authentication<\/span><\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13000&#8243; img_size=&#8221;full&#8221;][vc_column_text css=&#8221;.vc_custom_1636071263850{padding-bottom: 10px !important;}&#8221;]Simplify user authentication from your Active Directory, LDAP, and cloud directories to your Linux servers. Centralize access on your Linux, Unix, MAC and mobile devices with Active Directory Bridge.[\/vc_column_text][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1598395672344{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Adaptive MFA for Privileged Access<\/span><\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13002&#8243; img_size=&#8221;full&#8221;][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1636071294271{padding-bottom: 10px !important;}&#8221;]Strengthen privileged access by adding an extra layer for access, if necessary, according to the user profile accessing your critical systems with Multi Factor Authentication.[\/vc_column_text][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1598395690454{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Privileged Authorization<\/span><\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13005&#8243; img_size=&#8221;full&#8221;][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1636071321041{padding-bottom: 10px !important;}&#8221;]Manage privileges according to the roles of people in your organization by granting only enough privileges and minimize security vulnerabilities that may arise from excess authority.[\/vc_column_text][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1598395706172{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Enterprise Password Management<\/span><\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13007&#8243; img_size=&#8221;full&#8221;][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1636071336778{padding-bottom: 10px !important;}&#8221;]Manage the passwords of many critical shared accounts such as service accounts, super user accounts, servers, network devices and cloud services in your institution, and change your passwords regularly according to the policies you set.[\/vc_column_text][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1598395726320{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Privileged Access Request<\/span><\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13008&#8243; img_size=&#8221;full&#8221;][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1636071354208{padding-bottom: 10px !important;}&#8221;]Respond to instant password requests with the possibility of a fully self-service employee and multiple approval mechanism. Manage temporary login sessions[\/vc_column_text][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1598395741450{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Secure Remote Access<\/span><\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13009&#8243; img_size=&#8221;full&#8221;][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1636071368687{padding-bottom: 10px !important;}&#8221;]Provide secure remote access to your systems without the need for a VPN. Keep your remote connections free of risks regardless of their location to remote IT employees and 3rd party companies.[\/vc_column_text][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1598395761974{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Session Recording and Monitoring<\/span><\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13010&#8243; img_size=&#8221;full&#8221;][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1636071383752{padding-bottom: 10px !important;}&#8221;]Instantly monitor and record the sessions of users connecting to your systems. Prevent suspicious behavior with instant monitoring. You can archive high quality video recordings and watch historical recordings over and over again.[\/vc_column_text][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1598395780132{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h4><span style=\"color: #ae0000;\">Auditing and Reporting<\/span><\/h4>\n<p>[\/vc_column_text][vc_single_image image=&#8221;13012&#8243; img_size=&#8221;full&#8221;][vc_empty_space][vc_column_text css=&#8221;.vc_custom_1636071398254{padding-bottom: 10px !important;}&#8221;]Report user activities with advanced reporting methods. Search for video recordings by servers, users.[\/vc_column_text][vc_empty_space height=&#8221;40px&#8221;]<a href=\"https:\/\/www.proya.com.tr\/en\/contact\/\" title=\"Proya Contact\"  data-id=\"mpc_button-9369dcf49b97137\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Get Information Now<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space][\/vc_column][vc_column width=&#8221;1\/4&#8243; enable_sticky=&#8221;true&#8221; sticky_offset=&#8221;100&#8243; css=&#8221;.vc_custom_1476278940659{padding-right: 10% !important;padding-left: 10% !important;border-radius: 5px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1475715004235{padding-bottom: 20px !important;}&#8221;]<\/p>\n<h6><span style=\"color: #294b8b; font-weight: 500;\"> D\u0130\u011eER \u00dcRET\u0130C\u0130LER<\/span><\/h6>\n<p>[\/vc_column_text]<a href=\"http:\/\/www.proya.com.tr\/hemss-lumension\/\" title=\"Heat Software\"  data-id=\"mpc_button-1969dcf49b97332\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  icnm icnm-IcoMoon\"><\/i><span class=\"mpc-button__title mpc-transition\">HEAT Software (Lumension)<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"http:\/\/www.proya.com.tr\/beyondtrust\/\" title=\"beyondtrust\"  data-id=\"mpc_button-7469dcf49b97459\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  icnm icnm-play2\"><\/i><span class=\"mpc-button__title mpc-transition\">BeyondTrust<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"http:\/\/www.proya.com.tr\/alien-vault\/\" title=\"alien vault\"  data-id=\"mpc_button-4469dcf49b9754d\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  icnm icnm-reddit\"><\/i><span class=\"mpc-button__title mpc-transition\">AlienVault<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"https:\/\/www.proya.com.tr\/forescout\/\" title=\"ForeScout\"  data-id=\"mpc_button-8769dcf49b97660\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  lnr lnr-eye\"><\/i><span class=\"mpc-button__title mpc-transition\">ForeScout<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"http:\/\/www.proya.com.tr\/mojo\/\" title=\"mojo\"  data-id=\"mpc_button-2669dcf49b97786\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  fa fa-angle-double-up\"><\/i><span class=\"mpc-button__title mpc-transition\">Mojo (Airtight)<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><a href=\"http:\/\/www.proya.com.tr\/watchful\/\" title=\"watchful\"  data-id=\"mpc_button-5269dcf49b97871\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_16 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--stay mpc-effect-side--left\"><i class=\"mpc-button__icon mpc-transition  icnm icnm-eye\"><\/i><span class=\"mpc-button__title mpc-transition\">WatchFul<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a>[vc_empty_space][\/vc_column][\/vc_row][vc_row enable_bottom_separator=&#8221;true&#8221; bottom_separator_style=&#8221;arrow-right&#8221; bottom_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1544810019609{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2018\/12\/centrify.jpg?id=12997) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text] Centrify [\/vc_column_text][vc_column_text] Zero Trust Security [\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row enable_top_separator=&#8221;true&#8221; top_separator_style=&#8221;slope-right&#8221; top_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1476278814474{padding-right: 10% !important;padding-left: 10% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1544999726615{padding-bottom: 20px !important;}&#8221;] Centrify [\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1598395631402{padding-bottom: 20px !important;}&#8221;] Limited access for adequate, just-in-time privilege<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":[],"categories":[],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/15185"}],"collection":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/comments?post=15185"}],"version-history":[{"count":0,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/15185\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/media?parent=15185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/categories?post=15185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/tags?post=15185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}