Centrify Vault Suite

Centrify Vault Suite establishes core privileged access management (PAM) security controls across an expanding number of attack surfaces. Whether human or machine, in the cloud or on-premises, Vault Suite securely governs privileged access to shared accounts and credentials, application passwords and secrets, as well as secure remote sessions. Centrify Vault Suite enables the above and administrative access via jump box, workflow-driven access requests and approvals, and multi-factor authentication (MFA) at the vault.


Shared Account & Credential Vault

Discovery of systems and automated enrollment ensures privileged access governance where shared account credentials are either vaulted or eliminated. Secure access to these accounts is brokered for users, services, and applications.


Application Passwords & Secrets Vault

Store and manage application passwords and secrets (e.g., IP addresses, API keys, SSH credentials, AWS IAM credentials) and enable secure communication between applications, containers, and microservices without creating new service accounts.


Privileged Session Monitoring & Control

Identify suspicious user activity in real-time to stop in-progress attacks. Capture all actions within Centrify Vault Suite and remote sessions to govern privileged access and speed forensic analysis in the case of a security incident.


Access Request & Approval Workflow

Minimize your attack surface by eliminating static and long-lived privilege grants. Govern temporary access to roles that grant privilege, shared account credentials, and remote sessions with self-service access requests and multi-level approvals. Audit access approvals and reconcile approved access with actual access.

Distributed Jumpbox

Secure Administrative Access via Jump Box

Eliminate the risks associated with allowing direct connections to critical infrastructure from potentially infected workstations. Access to sensitive systems is granted through approved privilege admin consoles, which include web-based, native client or thick client via a Server Gateway as a jump box.


Secure Remote Access

Provide remote admins, outsourced IT, and third-party vendors with secure access to the specific infrastructure they manage — in the cloud and on-premises. Risk-based MFA combined with VPN-less access and flexible deployment models deliver the security your hybrid IT environment demands.

When you get a clear picture of the breadth of capabilities Centrify Privileged Access Management provides, you begin to understand just how many security check boxes it ticks. I’m still surprised at the number of issues I was able to address with just this single solution.

Matt Horn, IT Operations Manager, GSI

Learn More About Centrify Vault Suite

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us