Acceptto's eGuardian® allows organizations to protect the Citrix Workspace as a part of the Citrix Secure Digital Perimeter. Advanced machine learning from Acceptto drives Continuous Cognitive AuthenticationTM, proactively increasing authentication challenges for unprecedented or unexpected access attempts—while simultaneously reducing friction and enhancing productivity for well-behaved users.
Traditional usernames and passwords now represent real vulnerabilities
and password resets are increasingly costly for help desks.
- Traditional usernames and passwords now represent real vulnerabilitiesand password resets are increasingly costly for help desks.
- ACCEPTTO eGUARDIAN® AND CITRIX
- Learn more about Acceptto eGuardian® and Citrix Workspace
- Acceptto's eGuardian® offers risk-based assessmentto authorize or deny access to resources such as websites, databases, or financial transactions.
Multi-factor authentication has become a more robust requirement, but not all multifactor solutions convey the same level of security. Most schemes treat all applications and users equally, independent of circumstance, location, or access method. Moreover, phones, tokens, PINs, personal information, and even biometrics used as authentication factors can be stolen and used illicitly, thwarting otherwise robust multi-factor approaches.
ACCEPTTO eGUARDIAN® AND CITRIX
Acceptto's eGuardian uses sophisticated machine learning to continuously monitor user behavior. The software can assess whether a given access attempt is legitimate, based on it’s context. The software performs continuous monitoring of user behavior and traffic, gathering intelligence from multiple external sources.
Any resource that is subject to authentication can be protected. For instance, eGuardian® would be able to detect a fraudulent access attempt with a computer served by an ISP located in the U.K., and a phone simultaneously on a mobile network in the United States, even if other factors appeared normal. With network forensics, eGuardian® also provides an audit trail of user actions, along with application behavior and transactions. The audit trail can be used to fine tune policies dependent on the criticality of a resource and the risk level of user behavior, device characteristics, and associated transactions. The auditing capability can work in a stand alone fashion, or it can be integrated with the ItsMeTM client authenticator to implement multi-factor authentication. software can assess whether a given access attempt is legitimate, based on it’s context. The software performs continuous monitoring of user behavior and traffic, gathering intelligence from multiple external sources. Acceptto's eGuardian® works with NetScaler Unified GatewayTM via the RADIUS protocol.