English

Analytics Services

Stop Breaches in Real-time Based on User Behavior

Compromised accounts are today’s leading cause of data breach. In this age of access, trying to build policy that keeps data secure, without stopping user productivity, requires a massive security rethink. Centrify Analytics Service — based on user behavior — stops account-based attacks. Behavior-based scoring enables a frictionless user experience that is adjusted based on risk, improving productivity — while maintaining security.

Watch Webinar Read Solution Brief

Product Features

Behavior-BASED ACCESS CONTROL

Risk-aware access uses machine learning to define and enforce access policies, based on user behavior.

Insights

Build custom dashboards to better understand IT risk, as well as user experience, across applications, endpoints and infrastructure.

Explorer

Explorer offers rich tools to drill into details so that IT security and risk managers can better comprehend access and events.

BEHAVIOR BASED ACCESS CONTROL

Leverage Machine Learning to Enable Access Based on User Behavior

Risk-aware access uses machine learning to define and enforce access policies, based on user behavior. Through a combination of analytics, machine learning, user profiles, and policy enforcement, access decisions can be made in real time, to streamline low-risk access, step up authentication requirements when risk is higher, or block access entirely.

INSIGHTS

Build Custom Dashboards for Greater Visibility

Enhance visibility across access information to ensure that policy is working as expected, with dashboards that tally alerts, and visualize trending, Widgets allow IT to see how often users are prompted for MFA to help balance security with productivity. Build custom dashboards to better understand IT risk, as well as user experience, across applications, endpoints and infrastructure.

EXPLORER

Rich Tools to Better Identify Access Requests and Events

Explorer offers rich tools to drill into details so that IT security and risk managers can better comprehend access and events.  Interactive reports, make it easy to identify anomalous events – across device, location, time, user and more. Quickly identify specific accounts that have been compromised, or why a user was prompted for MFA, blocked, or allowed access to infrastructure and applications.

Centrify Analytics Services

Add Analytics to Apps, Endpoints, and Infrastructure Services

Analytics Services

Add-On

$3 / month per user

Start Trial
Behavior-based Access Control, Insights, Explorer

Centrify Analytics Services In Action

Understanding Access Risk

Building Risk-based Policy

Risk-Based Access Control

Exploring Access Events

Can't Wait?
Get Centrify Identity Services Now

Try Centrify Identity Services Free for 30-Days.