Our solution allows organizations to protect Citrix Workspace with advanced machine learning using Acceptto's Cognitive Continuous AuthenticationTM. Proactively increase authentication requirements for unprecedented or unexpected access attempts—while simultaneously reduce friction and enhance productivity for well-behaved users.
Enhance your Citrix Workspace and Netscaler with Continuous Behavioral Authentication
Acceptto's authentication technology provides additional security for remote employees offering digital and compliant secure Citrix workplace. Secure access to apps and data with Citrix and Acceptto Continuous Behavioral Authentication. The solution allows passwordless authentication to verify the credentials of your users. For more information reach out to us or explore our integration documentation.
Problem: traditional usernames and passwords represent real vulnerabilities
and password resets are increasingly costly for help desks.
Multi-factor authentication has become a more robust requirement, but not all multifactor solutions convey the same level of security. Most schemes treat all applications and users equally, independent of circumstance, location, or access method. In addition, phones, tokens, PINs, personal information, and even biometrics used as authentication factors can be stolen and used illicitly. This is why Continuous Behavioral Authentication is a necessity for any organization.
SOLUTION: eGUARDIAN® INTELLIGENT AUTHENTICATION FOR CITRIX
Acceptto's eGuardian uses sophisticated machine learning to continuously monitor user behavior. The software can assess whether a given access attempt is legitimate, based on it’s context. The software performs continuous monitoring of user behavior and traffic, gathering intelligence from multiple external sources.
Acceptto's eGuardian® offers risk-based assessment to authorize or deny access to resources such as websites, databases, or financial transactions. Guard Your Citrix Workspace against Identity Theft with Acceptto. Click here to watch our joint webinar.
Any resource that is subject to authentication can be protected. For instance, eGuardian® would be able to detect a fraudulent access attempt with a computer served by an ISP located in the U.K., and a phone simultaneously on a mobile network in the United States, even if other factors appeared normal. With network forensics, eGuardian® also provides an audit trail of user actions, along with application behavior and transactions. The audit trail can be used to fine tune policies dependent on the criticality of a resource and the risk level of user behavior, device characteristics, and associated transactions. The auditing capability can work in a stand alone fashion, or it can be integrated with the ItsMeTM client authenticator to implement multi-factor authentication. software can assess whether a given access attempt is legitimate, based on it’s context. The software performs continuous monitoring of user behavior and traffic, gathering intelligence from multiple external sources. Acceptto's eGuardian® works with NetScaler Unified GatewayTM via the RADIUS protocol.