Identity-Centric Privileged Access Management (PAM) solutions

Wednesday, October 14, 2020 - 12:00

Organisations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. Accessing documents and sensitive information on the cloud brings about various issues that need precautionary measures to be put in place.

Underlying the foundation of digital transformation are privileged identities, as they’re meant to assure that only authorised individuals, machines, or services are permitted access to the right resources at the right times and for the right reasons.

Establishing a proper mechanism to do this in the most efficient and secure manner is therefore essential, and has become the Achilles heel to the success of many digital transformation projects.

Data breaches represent a significant threat to organisations and the information they manage, these could lead to devastating losses in business productivity, reputational damage and revenue. Cyber security has never been more important.

Centrify’s solutions are designed to protect organisations against unauthorised access and data breaches by managing permissions for humans and, increasingly, for machines, that are often fragmented across hybrid and multi-cloud environments.

With Centrify, administrative management and access is seamless, security and compliance postures are strengthened, and machines are empowered to defend themselves against cyber-threats.

Centrify’s Identity-Centric approach to PAM is based on Zero Trust principles of, ‘never trust, always verify, enforce least privilege.’

Centrify’s cyber security solutions deliver an innovative approach to their partner channels – which address the inherent security challenges that organisations inevitably encounter on their digital transformation journeys.

Centrify is modernising how organisations secure, orchestrate, and analyse privileged identities through:

Privilege Elevation and Delegation Management (PEDM)

  • Just-in-time privilege
  • Just enough privilege

Privileged Account and Session Management (PASM)

  • Vault away shared accounts
  • Broker access with credential injection

Privileged Access Compliance Auditing (PACA)

  • Continuously report who has access to what
  • Apply host-based monitoring and session recording for more granular auditing

Privileged Identity and Access Management (PIAM)

  • Identity consolidation
  • Federate access across DMZ, IaaS, and multi-cloud


In the context of Privileged Access Management, Zero Trust requires establishing a root of trust, and then granting least privilege access just-in-time based on verifying who is requesting access, the context of the request, as well as the risk of the access environment.

Implement Identity-Centric PAM in your organisation to minimise your attack surface, improve audit and compliance visibility, and reduce risk, complexity, and costs for the modern, hybrid enterprise. Contact Gyula Wendler on for more information and how to apply this cutting-edge technology in your organisation today.



Contact Us

First Floor, Willowbridge Centre

Carl Cronje Dr, Cape Town, 7530

Western Cape, South Africa


Email Address:

Tel: (021) 555-1884 | Fax: [field_contact_fax]

1 Montgomery Drive

Mount Edgecombe

Durban, 4300

KwaZulu-Natal, South Africa


Email Adress:

Tel: (031) 279-1660 | Fax: [field_contact_fax]

53-57 Yaldwyn Road

Hughes Extension

Jet Park, 1459

Gauteng, South Africa


Email Address:

Tel: (011) 923-9600 | Fax: [field_contact_fax]

Quality Management

Arrow Electronics


Altron POPIA Notice

Altron respects your privacy - refer to our website for a copy of the Altron Privacy PolicyPAIA and POPIA Manual which describes how Altron collects and uses your personal information, with whom we share it, and your choices and rights in relation to your personal information.  By providing your personal information to Altron you are providing consent for the processing of your personal information.