Story image

Centrify harnesses machine learning for user access protection

20 Feb 2017

Centrify has today launched its new analytics service to the ANZ region, which provides another solution to stop breaches in real time, based on machine learning and user behaviour.

The Centrify Analytics Service assigns a risk score based on its analysis of evolving user behaviour patterns. It then enforces a decision – whether it’s granting access, more authentication or blocking the user entirely.

“By tailoring security policy to each individual’s behaviour and automatically flagging risky behaviour, we’re helping IT professionals minimise the risk of being breached — with immediate visibility into account risk, without poring over millions of log files and massive amounts of historical data,” says Bill Mann, Centrify’s chief product officer.

Last week Centrify released the results of a Forrester study that showed attackers are appearing as legitimate users, raising no suspicion and all IT sees is regular user security.

The new service stops access requests in real time, while potentially compromised accounts are flagged as suspicious. Centrify says this speeds up analysis and reduces the effort required for risk assessment.

It also allows single sign-on to applications for typical user behaviour; multi-factor authentication for password checkout when the risk level is elevated; and multi-factor authentication for outsourced IT when requests come from an unknown or unseen device.

“Thanks to our broad set of enforcement points that include endpoints, applications and IT infrastructure, we can enforce risk-based policy in real time at the point of access. This means high-risk threats can be blocked while low-risk users get authorised access to apps, privileged credentials or privileged sessions,” Mann says.

The Centrify Analytics Service is now available in Australia and New Zealand as an add-on to Centrify Identity Service and Centrify Privilege Service.

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.