Centrify is adding significant capabilities to Centrify for Mac. As a complement to its historic agent-based approach for providing Active Directory-based authentication and Group Policy management, Centrify has now added a cloud-based option for managing Macs. By extending the Centrify Cloud Service to manage remote Macs and providing administrators and users with self-service capabilities such as remote lock and remote wipe of a Mac, IT staff for the first time have the flexibility to use a single solution to manage Macs using a combination of both on-premise software and/or a cloud-based offering.
Also, Centrify is combining its Centrify for Mobile offering as part of the Centrify for Mac solution to deliver a new combined solution based on a per-user subscription pricing, allowing IT staff to manage their employees' multiple devices -- including Macs, iOS and Android devices -- under an economical single per-user license, making Centrify unique in the market. In addition, data on Mac systems is now secured through centrally managed File Vault 2 full-disk encryption security policies and institution encryption keys to ensure protection of data at rest on these highly portable systems.
"With more than 10,000 students, faculty and staff across 23 facilities, we had to standardize on a unified identity approach for authentication and access rights that would enhance our security for all our public records and to ensure confidentiality for our user base," said
"The Bring Your Own" trend involving Macs, mobile devices and new mobile applications means that IT organizations increasingly don't own the endpoint devices or back-end application resources on their networks. At the same time, end users are increasingly challenged to deal with the password sprawl associated with the on-premise and cloud-based services they need to access in order to perform their jobs. Centrify provides a unified approach to managing an employee's digital identity that spans their applications, Macs and mobile devices, providing the visibility and control required for IT organizations to achieve compliance, reduce costs and mitigate risks, while also increasing productivity and securing access for their user centric, mobile workforce.
Most Popular Stories
- Bipartisan Budget Deal Gets Key Support in House
- Bitcoin Clones Lurch Onto Financial Scene
- Clinton to Keynote Annual Simmons Leadership Conference
- GM to Stop Making Autos in Australia
- Selena Gomez, Shakira Among Top Hispanic Searches
- PhD Project Grooms Business Profs
- How Bitcoin and Other Cryptocurrencies Work
- Futures Fall, Holiday Spending and Unemployment Up
- Budget Deal Will Cut 220,000 Californians Out of Jobless Benefits
- Oil Nears $98 a Barrel