28.02.2017 Views

SECURITY

centrify-rethink-security-ebook

centrify-rethink-security-ebook

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5 | THE BREACH STOPS HERE<br />

Endpoint Services<br />

Stop the breach from endpoints<br />

Centrify Identity Services also help you manage access from PCs and Macs.<br />

Integrated Mac and mobile device management allows your enterprise to<br />

design and deliver a consistent and secure BYOD policy. 28 Centrify Identity Services<br />

enforces Robust Smart Card Support for PC and Mac and derived credential<br />

support for mobile devices enabling a strong authentication environment. 29<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!