Auditing and Reporting

Auditing and Reporting for Privileged Access Streamlines Regulatory Compliance

Improve accountability, conduct forensic investigations and prove compliance with government regulations and industry mandates.

FISMA Auditing & Reporting for Regulatory Compliance by Centrify

Enforce Accountability, Investigate Incidents and Prove Regulatory Compliance


Record and manage a holistic view of privileged access and activity, and tie everything back to the individual for accountability


Establish a single source of truth for individual and shared accounts — leveraging a common tool set regardless of account type


Identify abuse of privileged access or the source of a security incident with high-fidelity recordings of sessions


Prove privileged access is controlled and audited to satisfy regulatory compliance for SOX, HIPAA, FISMA, NIST, PCI, or MAS

Demonstrate Compliance and Simplify Forensic Investigations

Show that security controls are in place and working as designed, and provide proof of compliance. Search and find session recordings by servers, users or custom searches. You can find all sessions for a particular user or server, or for a set of custom criteria, simplifying forensic investigations and proactively identifying insider threats or suspicious activity.

Demonstrate federal regulatory compliance auditing with Centrify

Establish Individual Accountability

Recorded privileged sessions and activity are attributed to an individual to deliver individual accountability. Searchable playback feature gives IT security managers and auditors the ability to see exactly what users did, and identify the source of a security incident.

individual accountability for FISMA Audit & compliance by Centrify

Streamlined Integration with SIEM, Alerting and Reporting Tools

Privileged access data is captured and stored to enable robust querying by log management tools and integration with external reporting tools. Streamlined integration with SIEM and alerting tools such as HP ArcSight, IBM QRadar and Splunk help further identify risks or suspicious activity quickly.

Smooth integration for SIEM, alerting & reporting tools

Report on Access, Checkout/Session and Use of Privilege Across Infrastructure

Gain comprehensive visibility with unified access and activity reporting based on a common platform. Customizable and built-in queries and out-of-box reports for SOX and PCI regulatory compliance provide information on privileged account access controls, password checkout and privileged sessions across Windows, Linux, UNIX and network infrastructure.

Learn More
PCI & Sox regulatory compliance by Centrify

White Paper

Becoming PCI DSS Compliant

The PCI DSS 3.2 consists of 12 requirements spread across six domains. Since the core concern of PCI is the protection of cardholder data, these requirements focus on user access to the servers that host this data, or through which such data passes. This white paper examines each of the 12 requirements and identifies the associated Centrify Infrastructure Services and capabilities that customers can leverage to help achieve compliance.

Download White Paper