FB pixel

Centrify service assesses user behavior to prevent breaches

Centrify service assesses user behavior to prevent breaches
 

Centrify launched its new Analytics Service, which uses machine learning to assess and respond to risk based on user behaviour.

The Centrify Analytics Service constantly analyzes the user’s continually evolving behavior patterns and assigns a risk score.

The service then enforces an appropriate decision on whether the user is granted access, requires step-up authentication, or is blocked entirely.

Now available in Australia and New Zealand, the Analytics Service can be added on to Centrify Identity Service and Centrify Privilege Service.

“By tailoring security policy to each individual’s behaviour and automatically flagging risky behaviour, we’re helping IT professionals minimise the risk of being breached — with immediate visibility into account risk, without poring over millions of log files and massive amounts of historical data,” Centrify chief product officer Bill Mann said. “Thanks to our broad set of enforcement points that include endpoints, applications and IT infrastructure, we can enforce risk-based policy in real time at the point of access. This means high-risk threats can be blocked while low-risk users get authorised access to apps, privileged credentials or privileged sessions.”

The Centrify Analytics Service equips IT departments with the ability to prevent attacks that lead to data breaches by breaking the cycle of account exploitation and impersonation.

The service stops anomalous access requests in real time while flagging and alerting potentially compromised accounts to the attention of IT departments. This speeds up the analysis process and significantly reduces the effort needed to assess risks from across the hybrid IT environment.

Equipping IT departments with machine learning technology ensures that they no longer need to manually create policy across all their endpoints, apps, sites, services and resources.

The risk-based access enabled by the Centrify Analytics Service provides IT departments with new insights through risk scoring for end users and privileged users to control policy and determine the appropriate action for a given risk level.

Examples of risk-based access include single sign-on (SSO) to applications, multi-factor authentication (MFA) for password checkout, and MFA for outsourced IT.

As part of the Centrify Identity Services Platform, Centrify Analytics Service customers can implement risk-based policy across their hybrid enterprise of endpoints, cloud applications, IaaS, and IT servers and resources, for more detailed heuristics and more effective policy.

As a natural extension of Centrify’s adaptive multi-factor authentication, the service adds machine learning capabilities that both simplifies configuration for IT departments and eliminates constant MFA challenges related to end user access.

Article Topics

 |   |   |   | 

Latest Biometrics News

 

STCon edges in among established facial recognition accuracy leaders in NIST 1:N

A handful of new facial recognition algorithms have been added to the NIST FRTE 1:N Identification this year, but most…

 

EC’s use case manual explains age verification with EUDI Wallet 

The European Commission has published an age verification Use Case Manual, showcasing how citizens will be able to prove they…

 

UK Fraud Strategy considers business digital identity and IDV 

In a new fraud strategy, the UK government is showing its commitment in fighting fraud and the way it has…

 

Turks and Caicos President unveils major digital transformation agenda

Prime Minister Charles Washington Misick of Turks and Caicos Islands says the government is undertaking a major digital transformation project…

 

Deepfakes force enterprises to rethink cybersecurity

Organizations must move beyond simple detection tools to defend against AI-generated impersonations and synthetic media attacks. As generative AI continues…

 

Are deepfakes already in your system? Learn how to find out, what to do

The threat that deepfakes pose to biometric onboarding processes is well known at this point. Less well understood, according to…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events