Story image

Centrify harnesses machine learning for user access protection

20 Feb 17

Centrify has today launched its new analytics service to the ANZ region, which provides another solution to stop breaches in real time, based on machine learning and user behaviour.

The Centrify Analytics Service assigns a risk score based on its analysis of evolving user behaviour patterns. It then enforces a decision – whether it’s granting access, more authentication or blocking the user entirely.

“By tailoring security policy to each individual’s behaviour and automatically flagging risky behaviour, we’re helping IT professionals minimise the risk of being breached — with immediate visibility into account risk, without poring over millions of log files and massive amounts of historical data,” says Bill Mann, Centrify’s chief product officer.

Last week Centrify released the results of a Forrester study that showed attackers are appearing as legitimate users, raising no suspicion and all IT sees is regular user security.

The new service stops access requests in real time, while potentially compromised accounts are flagged as suspicious. Centrify says this speeds up analysis and reduces the effort required for risk assessment.

It also allows single sign-on to applications for typical user behaviour; multi-factor authentication for password checkout when the risk level is elevated; and multi-factor authentication for outsourced IT when requests come from an unknown or unseen device.

“Thanks to our broad set of enforcement points that include endpoints, applications and IT infrastructure, we can enforce risk-based policy in real time at the point of access. This means high-risk threats can be blocked while low-risk users get authorised access to apps, privileged credentials or privileged sessions,” Mann says.

The Centrify Analytics Service is now available in Australia and New Zealand as an add-on to Centrify Identity Service and Centrify Privilege Service.

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.