Google Taps Centrify for Android at Work

Written by

Centrify is working with Google to deliver integrated identity and mobile management for Android for Work.

Centrify also delivers single sign-on (SSO) and multi-factor authentication (MFA) for Chromebooks, shared account password management and auditing of privileged users for Google Compute Engine’s virtual servers, and enhanced user provisioning for Google Apps.

As companies continue to adopt cloud and mobile technology, IT is challenged to secure access to applications, devices and servers, and can no longer rely on traditional perimeter security. Instead, they need to protect their data by leveraging access policies that combine user identity and device context, such as location, time and security posture. Centrify’s Android for Work partnership allow customers to adopt multiple Google for Work products, including Android devices, Chromebooks, Google Compute Engine, and Google Apps for Work, by providing a critical layer of security and management.

 “We are delighted that Google has selected Centrify as an Android for Work partner,” said Tom Kemp, CEO of Centrify. “Centrify protects against the leading point of attack used in data breaches ? compromised credentials. Centrify’s identity platform can help companies enable Android for Work, as well as Google’s other cloud and mobile technologies for the enterprise, by providing security and management across users, apps, devices and infrastructure.”

“We have adopted many components of Google for Work, including Google Apps as well as a large variety of Google devices,” added Erich Hilkemeyer, vice president of information technology at Apttus, a Centrify customer. “With Centrify, we now have a 100% cloud-based solution that provides integrated policy and management across users, apps and devices, giving us the ability to instantly track which users are logging into which apps and services. Centrify saves us time and money by unifying security and management of apps and devices in a single solution.”

What’s hot on Infosecurity Magazine?