Our solution allows organizations to protect Citrix Workspace with advanced machine learning using Acceptto's Cognitive Continuous AuthenticationTM. Proactively increase authentication requirements for unprecedented or unexpected access attempts—while simultaneously reduce friction and enhance productivity for well-behaved users.
Problem: traditional usernames and passwords represent real vulnerabilities
and password resets are increasingly costly for help desks.
- Problem: traditional usernames and passwords represent real vulnerabilitiesand password resets are increasingly costly for help desks.
- SOLUTION: eGUARDIAN® INTELLIGENT AUTHENTICATION FOR CITRIX
- Learn more about Acceptto and Citrix Workspace
- Acceptto's eGuardian® offers risk-based assessmentto authorize or deny access to resources such as websites, databases, or financial transactions.
Multi-factor authentication has become a more robust requirement, but not all multifactor solutions convey the same level of security. Most schemes treat all applications and users equally, independent of circumstance, location, or access method. In addition, phones, tokens, PINs, personal information, and even biometrics used as authentication factors can be stolen and used illicitly. This is why Continuous Authentication is a necessity for any organization.
SOLUTION: eGUARDIAN® INTELLIGENT AUTHENTICATION FOR CITRIX
Acceptto's eGuardian uses sophisticated machine learning to continuously monitor user behavior. The software can assess whether a given access attempt is legitimate, based on it’s context. The software performs continuous monitoring of user behavior and traffic, gathering intelligence from multiple external sources.
Any resource that is subject to authentication can be protected. For instance, eGuardian® would be able to detect a fraudulent access attempt with a computer served by an ISP located in the U.K., and a phone simultaneously on a mobile network in the United States, even if other factors appeared normal. With network forensics, eGuardian® also provides an audit trail of user actions, along with application behavior and transactions. The audit trail can be used to fine tune policies dependent on the criticality of a resource and the risk level of user behavior, device characteristics, and associated transactions. The auditing capability can work in a stand alone fashion, or it can be integrated with the ItsMeTM client authenticator to implement multi-factor authentication. software can assess whether a given access attempt is legitimate, based on it’s context. The software performs continuous monitoring of user behavior and traffic, gathering intelligence from multiple external sources. Acceptto's eGuardian® works with NetScaler Unified GatewayTM via the RADIUS protocol.