Risk-Based Access for Apps

Strengthen security with context and behavior based access controls to all applications. Leverage analytics and machine learning to detect abnormal and risky user behavior while prompting an MFA challenge or blocking access in real-time. Improve security with seamless access tailored to each individual.

Top 5 App Security Risks
Adaptive MFA, Adaptive Multi Factor Authentication, Adaptive MFA solutions

Multi-factor Authentication Without the Hassles


Increase security by blocking high-risk access attempts from attackers


Minimize the hassles of MFA, and simplify legitimate user access, with policy based on user behavior profiles


Select from a broad range of authentication methods


Get adaptive MFA based on risk — automated policy only challenges for MFA when user behavior is outside typical norms


Improve user experience without compromising security, thanks to flexible authentication policies


Enforce policy in real time, and flag anomalies for later investigation

Take Control with Per-App Policy

App access is about balance. Users need simplicity, IT needs security. Per-app policy means you can tailor access policy to improve user experience, without compromising security. Build granular policy, tailor security based on user behavior, leverage integrated machine learning, and more.

Whether for internal employees, business partners or customers, balance user simplicity with IT control — from a single, integrated control point for all your apps.

Adaptive MFA for Mobile Phones

Authenticate Your Way

Users want choice. Centrify gives you choice and flexibility, allowing you to implement a solution that best meets your needs. We’ve got something for everyone. Choose from push notification, Centrify mobile authenticator, SMS/text message, email, interactive phone call, YubiKeys and other USB devices, digital certificates, Smart Cards, derived credentials and biometrics.
Learn More

Centrify Identity Services Platform

The next generation of enterprise security platform, built to protect against the leading point of attack for cyberthreats & data breaches — compromised credentials.

Learn More