Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

12/30/2009
08:42 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Centrify Awarded Patent In Identity Management Of Unix, Linux Systems

Patented technology facilitates service accounts and root accounts to be authenticated within a centralized directory

SUNNYVALE, Calif., Dec. 30 /PRNewswire/ -- Centrify Corporation, the leading provider of Microsoft Active Directory-based identity and access management and auditing solutions for non-Microsoft platforms, today announced it has been awarded patent #7,591,005 from the United States Patent and Trademark Office. The patented technology facilitates the capability for UNIX and Linux service accounts and root accounts to be authenticated within a centralized directory.

About the Centrify Suite

The Centrify Suite is an integrated family of Active Directory-based auditing, access control and identity management solutions that secure cross-platform environments. Centrify DirectControl½ addresses the need to secure both physical and virtual environments by effectively turning a non-Microsoft system or hypervisor into an Active Directory client, enabling administrators to secure that system using the same authentication and Group Policy services currently deployed for their Windows systems, as well as adding granular access control through its patent-pending Zone technology. Centrify DirectAuthorize(TM) centrally manages and enforces role-based entitlements for fine-grained control of user access and privileges on UNIX and Linux systems as well as a wide range of hypervisors. Centrify DirectAudit½ delivers auditing, logging and real-time monitoring of user activity on non-Microsoft systems. Built on a common architecture, the integrated Centrify Suite of solutions helps to improve IT efficiency, strengthen regulatory compliance initiatives, and centrally secure a heterogeneous computing environment.

About Centrify

Centrify provides security and compliance software that centrally manages heterogeneous computing environments using Active Directory. More than 1500 enterprise customers, including 38% of the Fortune 50, have selected Centrify for its easy-to-manage, Active Directory-based cross-platform interoperability solutions. For more information about Centrify and its solutions, call +1 408 542-7500 or visit http://www.centrify.com/

Centrify and DirectControl are registered trademarks and Centrify Suite, DirectAudit and DirectAuthorize are trademarks of Centrify Corporation. Other names used in this document are trademarks of their respective companies.

SOURCE Centrify Corporation

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.