South Africa’s local managed IT services provider, Troye, is helping clients to defend against external and insider security threats and mitigate phishing attacks and loss of data due to malicious behaviour
Using machine learning and artificial intelligence to detect anomalous behaviour and potential threats, Troye aims to deliver actionable intelligence from the information gathered via its cloud services and on premises products to help customers proactively identify and manage internal and external threats.
The Citrix Analytics service helps Troye’s customers to design security into their systems and monitor the security of their data on an ongoing basis. Citrix Analytics Service provides visibility into company-wide user and entity behaviour, system security, performance and operations and simplify IT infrastructure.
Troye technical director Kurt Goodall said that it uniquely enables customers to adopt a risk-based security model, allowing them to dynamically balance the needs of users to have rapid access to data with company’s need to secure and govern the environment.
With an end-to-end view of the location of and access to data, Citrix Analytics also allows organisations to monitor and manage data movement across endpoints, datacentre, mobile, hybrid and multi-cloud. This visibility into data logging and access requests help our customers understand data flows to meet their security and oversight obligations under several security standards and regulations, including PoPI, Sarbanes-Oxley (SOX) and GDPR.
Goodall said that the behavioural insights this service delivers help organisations a proactive way to monitor, detect and flag behaviours that fall outside the norm, including mitigation of phishing and ransomware attacks.
Citrix is enabling customers to enforce a trusted model of security designed to keep bad actors away from company applications and data wherever they are. The Citrix Analytics service uses machine learning and AI to give each customer unique insight into their organisation including where their data is within the environment and who is trying to access it at all times.
“Customers can use this insight to help proactively defend against attacks and flag anomalous behaviour to protect against data exfiltration,” he concluded.