Complete Cloud Security with Centrify + Imperva


The Imperva Skyfence Cloud Gateway is a Cloud Access Security Broker (CASB) that provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.

Centrify Application Services and the Imperva Skyfence Cloud Gateway together provide an integrated approach for ensuring the safe and productive use of cloud apps. From Office 365 to any unsanctioned app, Imperva Skyfence helps organizations monitor and analyze user activity, protect data in motion and at rest, and enforce user access control policies for both unmanaged and managed endpoints.

“The adoption of cloud apps has made security a shared responsibility between the app provider and the subscribing organization. The integration of Centrify’s identity platform and the Imperva Skyfence CASB ensures IT staff have the right controls to ‘do their part’ in securing users and data in the cloud.”

- Frank Cabri, VP Marketing , Imperva Skyfence

Centrify Application Services integrates with Imperva Skyfence to provide a comprehensive solution for provisioning, governing, and securing enterprise cloud apps.

Imperva customers can use Centrify Application Services to:

  • Provide secure access to business-critical applications via directory integration
     Control access to cloud and mobile apps, and manage the devices used to access them. Keep sensitive directory info where you want it: on-site in LDAP or Active Directory, in the cloud, or any combination
  • Provision and de-provision users
     Automatically create accounts, manage access to those accounts, and revoke access from all devices when necessary — all from a central control point
  • Deploy Skyfence’s Cloud Gateway solution
     Centrify's turnkey integration with Skyfence ensures seamless deployment of the joint solution and enhanced cloud security.
  • Enforce deeper security with per-app policies
     Centrify Identity Service provides context-aware, step-up authentication based on per-app policy. Users can re-authenticate simply using a mobile, phone, SMS, or email