CITRIX READY PARTNER
Acceptto's eGuardian® platform is a verified and compatible solution within the Citrix Ready partner program. The partner designation is awarded to third-party solutions that have successfully met test criteria set by Citrix and provides added confidence to Citrix customer’s in the compatibility of the joint solution.

Cognitive AuthenticationTM
for a dynamic level of assurance

Our solution allows organizations to protect Citrix Workspace with advanced machine learning using Acceptto's Cognitive Continuous AuthenticationTM. Proactively increase authentication requirements for unprecedented or unexpected access attempts—while simultaneously reduce friction and enhance productivity for well-behaved users.

Problem is that traditional usernames and passwords represent real vulnerabilities
and password resets are increasingly costly for help desks.

Multi-factor authentication has become a more robust requirement, but not all multifactor solutions convey the same level of security. Most schemes treat all applications and users equally, independent of circumstance, location, or access method. In addition, phones, tokens, PINs, personal information, and even biometrics used as authentication factors can be stolen and used illicitly. This is why Continuous Authentication is a necessity for any organization.

SOLUTION: eGUARDIAN® INTELLIGENT AUTHENTICATION FOR CITRIX

Acceptto's eGuardian uses sophisticated machine learning to continuously monitor user behavior. The software can assess whether a given access attempt is legitimate, based on it’s context. The software performs continuous monitoring of user behavior and traffic, gathering intelligence from multiple external sources.

Learn more about Acceptto and Citrix Workspace
New call-to-action
Acceptto's eGuardian® offers risk-based assessment
to authorize or deny access to resources such as websites, databases, or financial transactions.

Any resource that is subject to authentication can be protected. For instance, eGuardian® would be able to detect a fraudulent access attempt with a computer served by an ISP located in the U.K., and a phone simultaneously on a mobile network in the United States, even if other factors appeared normal. With network forensics, eGuardian® also provides an audit trail of user actions, along with application behavior and transactions. The audit trail can be used to fine tune policies dependent on the criticality of a resource and the risk level of user behavior, device characteristics, and associated transactions. The auditing capability can work in a stand alone fashion, or it can be integrated with the ItsMeTM client authenticator to implement multi-factor authentication. software can assess whether a given access attempt is legitimate, based on it’s context. The software performs continuous monitoring of user behavior and traffic, gathering intelligence from multiple external sources. Acceptto's eGuardian® works with NetScaler Unified GatewayTM via the RADIUS protocol.

New call-to-action