PARIS, France–Global technology provider Arrow Electronics has announced a Pan-European distribution agreement with cyber security specialist Centrify, which covers its entire portfolio of Identity-Centric Privileged Access Management (PAM) solutions.
Centrify’s Identity-Centric approach to PAM is based on Zero Trust principles of, ‘never trust, always verify, enforce least privilege.’
They are designed to protect organizations against unauthorized access and data breaches by managing permissions for humans and, increasingly, for machines, that are often fragmented across hybrid and multi-cloud environments. With Centrify, administrative management and access is seamless, security and compliance postures are strengthened, and machines are empowered to defend themselves against cyber-threats.
Alexis Brabant, vice president sales of Arrow`s enterprise computing solutions business in EMEA, said: “Many data breaches are executed by gaining access to critical infrastructure and sensitive data via compromised privileged credentials. Centrify’s cyber security solutions deliver an innovative approach to our partner channel which address the inherent security challenges that organizations inevitably encounter on their digital transformation journeys.”
Chris Peterson, vice president of worldwide channels & alliances at Centrify, said: “The modern enterprise requires a modern approach to privileged access management. A password vault simply is no longer enough to secure the threatscape when attack surfaces like cloud, DevOps, containers and microservices have significantly expanded IT complexity. Centrify’s Identity-Centric PAM solutions can help any organisation optimise and secure privileged access, whether the requester is human or machine, in the cloud or on-premises. This relationship with Arrow significantly expands the depth, breadth, and scope of our channel strategy.”
Centrify’s solutions simplify privilege management by centralising both machine and human identities. By implementing least privilege access, organisations minimise the attack surface, improve audit and compliance visibility, and reduce risk, complexity and costs for the modern, hybrid enterprise.