Centrify Named a Visionary in the 2018 Magic Quadrant for Access Management, Worldwide

Download the 2018 Gartner Magic Quadrant for Access Management

2018 Gartner Magic Quadrant for Access Management - Centrify Visionary

Centrify has been named a Visionary by Gartner, Inc. in the 2018 Magic Quadrant for Access Management, Worldwide. According to Gartner, “visionaries are noted for their innovative approach to access management technology, methodology and/or means of delivery.”

We believe being recognized as a visionary in access management is a testament to the progress Centrify has made in delivering an innovative and class-leading solution while validating Centrify’s position as a top vendor in the access management market. Centrify’s innovative approach to access management is rooted in our Zero Trust Security approach and Next-Gen Access platform that stops breaches not just for workforce users, but privileged users, partners and consumers — across all applications and infrastructure, both on-premises and in the cloud.

It should also be noted that in this MQ, Gartner makes a single planning assumption: “By 2022, identity and access management as a service (IDaaS) will be the chosen delivery model for more than 80% of new access management purchases globally, up from 50% today.”

So, a buyer should be cautious when selecting an access management vendor, as the most common method of consuming access management (on-premises software) is quickly giving way to Identity as a Service (IDaaS) — and for good reasons! IDaaS is where the majority of innovation and investment is happening today. For example, Centrify is working hard to deliver on the promise of Zero Trust Security through the power of Next-Gen Access.

Zero Trust Security assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. Centrify’s Zero Trust Security presumes that everything (users, endpoints, networks, resources) is untrusted and must be verified first so that security is not compromised.

Zero Trust Security model, Zero Trust diagram, Zero trust architecture

Centrify’s Zero Trust Security verifies every user, validates every device, limits their access and privilege intelligently, and continually learns and adapts, using machine learning to discover risky behavior without impacting user experience. Centrify offers Zero Trust Security through the power of Next-Gen Access — a unified set of mature and proven technologies and capabilities — including single sign-on, multifactor authentication, mobility management, privilege management and behavior analytics.

Organizations may consider approaching Zero Trust Security by implementing IDaaS, MFA, EMM, PAM and User Behavior Analytics (UBA) technologies from separate vendors, but disparate solutions leave gaps and are expensive to separately license, implement, integrate and maintain. Only Centrify delivers an industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM,) providing Next-Gen Access across applications, endpoints and infrastructure for all users, without sacrificing best-of-breed features.

 

Access your complimentary copy of the 2018 Gartner Access Management Magic Quadrant, Worldwide here

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner, Magic Quadrant for Access Management, Worldwide, Gregg Kreizman, 18 June 2018