{"id":6319,"date":"2017-02-23T18:21:40","date_gmt":"2017-02-23T18:21:40","guid":{"rendered":"http:\/\/www.YourChennai.com\/?p=6319"},"modified":"2017-02-23T18:21:40","modified_gmt":"2017-02-23T18:21:40","slug":"centrify-analytics-service-stops-breaches-in-real-time-based-on-user-behavior","status":"publish","type":"post","link":"https:\/\/yourchennai.com\/index.php\/2017\/02\/23\/centrify-analytics-service-stops-breaches-in-real-time-based-on-user-behavior\/","title":{"rendered":"Centrify Analytics Service Stops Breaches in Real-time Based on User Behavior"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p style=\"text-align: justify;\"><strong><em>New solution uses machine learning to assess risk and provide real-time, actionable access decisions<\/em><\/strong><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-6321\" src=\"http:\/\/www.YourChennai.com\/wp-content\/uploads\/2017\/02\/Centrify-Logo.jpg\" alt=\"Centrify - Logo\" width=\"171\" height=\"86\" \/>Centrify, the leader in securing hybrid enterprises through the power of identity services, announced the release of its new Analytics Service. This new service uses machine learning to assess risk based on constantly-evolving user behavior patterns.\u00c2\u00a0 It then assigns a risk score, and enforces an appropriate decision \u00e2\u20ac\u201d determining whether the user\u00e2\u20ac\u2122s access is granted, requires step-up authentication, or is blocked entirely.<\/p>\n<p style=\"text-align: justify;\">According to a new\u00c2\u00a0<a href=\"http:\/\/www.centrify.com\/lp\/forrester-stop-the-breach-IAM-maturity-model?utm_campaign=forrester%20stop%20the%20breach&amp;utm_medium=pr&amp;utm_source=press%20release&amp;utm_content=&amp;utm_term=&amp;ls=928-006-pr\">Forrester study<\/a>, commissioned by Centrify, an astonishing two-thirds of organizations experienced an average of five security breaches in the past two years. And billions of usernames and passwords have been stolen and made available for these types of attacks, increasing risk of further breaches. The power of these attacks is in their perfect camouflage. Attackers \u00e2\u20ac\u0153look\u00e2\u20ac\u009d just like legitimate users, raising no suspicion, since all IT sees is regular user activity.<\/p>\n<p style=\"text-align: justify;\"><strong>Breaking the cycle of breach<\/strong><\/p>\n<p style=\"text-align: justify;\">Centrify gives IT the power to break the cycle of account exploitation and impersonation, to stop attacks that lead to data breaches. Not only are anomalous access requests stopped in real time, but potentially compromised accounts are flagged and elevated to IT\u00e2\u20ac\u2122s attention \u00e2\u20ac\u201d speeding analysis and greatly minimizing the effort required to assess risk across today\u00e2\u20ac\u2122s hybrid IT environment. And, arming IT with machine learning frees them from manually creating policy across all their endpoints, apps, sites, services and resources.<\/p>\n<p style=\"text-align: justify;\"><strong>Balancing security and optimal end-user experience<\/strong><\/p>\n<p style=\"text-align: justify;\">Building security policy for employees, contractors, partners and privileged IT users has typically favored security over user experience.\u00c2\u00a0 Behavior-based scoring means users get a frictionless experience when they present low risk, easing access and improving productivity \u00e2\u20ac\u201d while maintaining high security.<\/p>\n<p style=\"text-align: justify;\">\u00e2\u20ac\u0153By tailoring security policy to each individual\u00e2\u20ac\u2122s behavior and automatically flagging risky behavior, we\u00e2\u20ac\u2122re helping IT professionals minimize the risk of being breached \u00e2\u20ac\u201d with immediate visibility into account risk, without poring over millions of log files and massive amounts of historical data,\u00e2\u20ac\u009d said Bill Mann, chief product officer at Centrify. \u00e2\u20ac\u0153And thanks to our broad set of enforcement points that include endpoints, applications and IT infrastructure, we can enforce risk-based policy in real time, at the point of access. This means high-risk threats can be blocked, while low-risk users get authorized access to apps, privileged credentials, or privileged sessions.\u00e2\u20ac\u009d<\/p>\n<p style=\"text-align: justify;\">Risk-based access gives IT new insights through risk scoring for end and privileged users to control policy and what action should be taken for a given risk level. Examples of risk-based access include:<\/p>\n<ul style=\"text-align: justify;\">\n<li><a href=\"https:\/\/www.centrify.com\/products\/identity-service\/sso\/\"><strong>Single sign-on (SSO)<\/strong><\/a><strong>to applications:<\/strong>\u00c2\u00a0As long as end-user\u00e2\u20ac\u2122s behavior is in keeping with typical access, it presents low risk, and IT can provide easy one-click access to their apps.<\/li>\n<li><a href=\"https:\/\/www.centrify.com\/products\/identity-service\/adaptive-multi-factor-authentication\/\"><strong>Multi-factor Authentication (MFA)<\/strong><\/a><strong>for password checkout:<\/strong>\u00c2\u00a0When an IT admin checks out a privileged credential or initiates a privileged session to a server or other resource from a location that\u00e2\u20ac\u2122s not typical, the risk level is elevated, and the admin is prompted for further authentication.<\/li>\n<li><strong>MFA for outsourced IT:<\/strong>If an attacker attempts to leverage an outsourced IT credential from an unknown or previously unseen device, access can be blocked entirely, stopping the attack before it can gain traction.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Since this new service is part of the Centrify Identity Services Platform, customers can implement risk-based policy across their boundaryless hybrid enterprise of endpoints, cloud applications, IaaS, and IT servers and resources for more detailed heuristics \u00e2\u20ac\u201d and more effective policy. Available as an add-on to Centrify Identity Service and Centrify Privilege Service, the service is a natural extension of Centrify\u00e2\u20ac\u2122s adaptive Multi-Factor Authentication, adding machine learning that both eases configuration for IT and eliminates constant MFA challenges to simplify end user access.<\/p>\n<p style=\"text-align: justify;\">Learn more about Centrify\u00e2\u20ac\u2122s Analytics Service or start a trial on the\u00c2\u00a0<a href=\"https:\/\/www.centrify.com\/solutions\/\">Centrify solutions site<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New solution uses machine learning to assess risk and provide real-time, actionable access decisions Centrify, the leader in securing hybrid enterprises through the power<\/p>\n","protected":false},"author":1,"featured_media":6322,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[30,95],"tags":[8379,8378,8376,8373,8377,8375,8374],"class_list":["post-6319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-business-political-national-realestate","category-technology-mobiles-startup","tag-actionable-access-decisions","tag-assess-risk-and-provide-real-time","tag-based-on-user-behavior","tag-centrify-analytics-service","tag-machine-learning","tag-real-time","tag-stops-breaches"],"views":1381,"jetpack_featured_media_url":"https:\/\/yourchennai.com\/wp-content\/uploads\/2017\/02\/Bill-Mann-chief-product-officer-at-Centrify-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/posts\/6319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/comments?post=6319"}],"version-history":[{"count":1,"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/posts\/6319\/revisions"}],"predecessor-version":[{"id":6323,"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/posts\/6319\/revisions\/6323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/media\/6322"}],"wp:attachment":[{"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/media?parent=6319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/categories?post=6319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yourchennai.com\/index.php\/wp-json\/wp\/v2\/tags?post=6319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}