Idaptive Application Services: Single Sign-On Overview and Analysis

See our complete list of Top SSO Solutions

Bottom Line

In January 2019 Centrify spun out its Identity-as-a-Service solutions into a new company called Idaptive. The former Centrify Application Services secures access to cloud, mobile and on-premises applications, and is best for small and midsized companies where users need to deploy browser-based apps, native mobile apps and custom apps with a single username and password, controlled by IT.

Product Description

Single sign-on (SSO) from Idaptive secures access to thousands of cloud, mobile and on-premises applications from a single identity infrastructure. With a unique identity, users enter a single username and password to access all applications and devices from anywhere. This secures identities for employees, contractors, partners and customers. Idaptive lets users deploy browser-based apps, native mobile apps and custom apps with a single username and password, controlled by IT. It comes with integrated enterprise mobility management (EMM) capabilities, such as security configuration and enforcement, device X.509 credential issuance/renewal, remote device location/wiping and application containerization.

Security Qualifications

Idaptive certifications and accreditations include: Common Criteria, SOC II, FedRAMP, FIPS, DITSCAP, NIACAP, FDCC, DIACAP.

Intelligence

Idaptive utilizes machine learning to discover risky user behavior and apply conditional access.

Delivery

Identity-as-a-service (IDaaS) offering.

Agents

Yes

Pricing

Subscription pricing, starting at $4 per user per month.

Drew Robb
Drew Robb
Drew Robb has been a full-time professional writer and editor for more than twenty years. He currently works freelance for a number of IT publications, including ServerWatch and CIO Insight. He is also the editor-in-chief of an international engineering magazine.

Latest articles

Top Cybersecurity Companies

Get the Free Newsletter!
Subscribe to Cybersecurity Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter!
Subscribe to Cybersecurity Insider for top news, trends & analysis
This email address is invalid.

Related articles