Select the directory option from the above "Directory" header!

Centrify Whitepapers


Sort by: Date | Company | Title


Stop Password Sprawl with SaaS Single Sign-On via Active Directory
By Centrify | 10/12/2012

This whitepaper addresses how to deal with the cost and complexity of managing additional identity silos during the adoption of new SaaS, including integration costs, increased help desk load and lower productivity as users struggle with multiple passwords, password policies and frustrating login interfaces for browsers and client applications on mobile devices.

Download this now


A Practical Path to Unified Identity Across Data Center, Cloud and Mobile
By Centrify | 10/12/2012

This whitepaper looks at the major trends challenging IT organizations today and the increasing heterogeneity and hybridization of platforms inside and outside the organization, the rush to deploy SaaS applications and the explosion in smart phone and tablet devices users are bringing to work to for personal productivity.

Download this now


IDG Strategy Guide: Privileged Identity Management Guide
By Centrify | 15/10/2012

This strategy guide outlines the key criteria for implementing a secure and effective privileged identity system and avoiding the most common pitfalls.

Download this now


IDG Strategy Guide: Identity and Access Management Guide
By Centrify | 12/10/2012

This whitepaper details the importance to business of having a cohesive and centralised identity and access management system.

Download this now


Management of Security Risk in IT covered in the Australian Prudential Regulation Authority Requirements
By Centrify | 22/8/2012

This white paper details how Centrify Suite and Active Directory can address a large portion of security controls and risk management requirements addressed in APRA- PPG234. In addition, requirements related to monitoring of IT security controls are discussed in the context of capabilities of Centrify DirectAudit. It further demonstrates how to address these requirements in a robust and cost-effective manner by leveraging existing Active Directory infrastructure to centrally manage non-Windows systems, applications and databases.

Download this now