Compare Centrify Authentication Service vs. One Identity Defender

Cancel
You must select at least 2 products to compare!
Ranking
39th
Views
46
Comparisons
35
Reviews
0
Average Words per Review
0
Rating
N/A
35th
Views
62
Comparisons
42
Reviews
0
Average Words per Review
0
Rating
N/A
Find out what your peers are saying about Fortinet, Ping Identity, Cisco and others in Authentication Systems. Updated: January 2021.
456,812 professionals have used our research since 2012.
Popular Comparisons
Learn
Centrify
One Identity
Overview

Cloud-ready Zero Trust Privilege is designed to handle requesters that are not only human but also machines, services and APIs. There will still be shared accounts, but for increased assurance, best practices now recommend individual identities, not shared accounts, where least privilege can be applied. Centrify Authentication Service allows properly verifying who requests privileged access. This can be achieved by leveraging enterprise directory identities, eliminating local accounts and decreasing the overall number of accounts and passwords, therefore reducing the attack surface.

Defender enhances security by requiring two-factor authentication to gain access to your network resources. Defender uses your current identity store within Microsoft Active Directory (AD) to enable two-factor authentication.

Offer
Learn more about Centrify Authentication Service
Learn more about One Identity Defender
Sample Customers
GOGOBakersfield Police Department, Village of Westmont, Illinois
Find out what your peers are saying about Fortinet, Ping Identity, Cisco and others in Authentication Systems. Updated: January 2021.
456,812 professionals have used our research since 2012.

Centrify Authentication Service is ranked 39th in Authentication Systems while One Identity Defender is ranked 35th in Authentication Systems. Centrify Authentication Service is rated 0.0, while One Identity Defender is rated 0.0. On the other hand, Centrify Authentication Service is most compared with BeyondTrust Active Directory (AD) Bridge, whereas One Identity Defender is most compared with .

See our list of best Authentication Systems vendors.

We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.