Download presentation
Presentation is loading. Please wait.
1
Identity & Access Management
Technical data deck
2
(DO NOT SHOW) Identity and Access Management Technical Data Deck
Build 2012 12/1/2017 (DO NOT SHOW) Identity and Access Management Technical Data Deck Deck Contacts: Nasos Kladakis Usage Guide: Use the Identity & Access Management Solution Pitch Deck to present the value proposition and vision of Identity and Access Management as a part of Enterprise Mobility and Security. The slides at the main body of the Solution Pitch Deck are Level 200 and cover the most significant and most recent capabilities. This Technical Data Deck contains more detailed technical slides for Identity and Access Management which can be added based on the desired level of discussion and specific requirements of the customer. Augment content with local customer stories. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
3
Identity and access management in the cloud
1000s of apps, 1 identity Enable business without borders Manage access at scale Cloud-powered protection Cloud-connected seamless authentication experience Single sign-on Bring your own apps Secure remote access to on-premises apps Support for lift-and-shift to the cloud Ease of use for end users Cross-organization collaboration Any time, any place productivity with Windows 10 Support for consumer facing applications Advanced user lifecycle management Low IT overhead Monitor your identity bridge Control access to resources Safeguard user authentication Respond to advanced threats with risk-based policies and monitoring Mitigate administrative risks Governance of on-premises and cloud identities
4
What is Azure Active Directory?
A comprehensive identity and access management cloud solution for your employees, partners, and customers. It combines directory services, advanced identity governance, application access management, and a rich standards-based platform for developers. B2E B2B B2C
5
1000s of apps, 1 identity Connect your on-premises identities to the cloud for a seamless authentication experience Single sign-on to thousands of pre-integrated and custom SaaS apps. Bring your own apps: templates for SSO to any SaaS app Provide one persona to the modern workforce for SSO to 1000s of cloud and on-premises applications Secure remote access to on-premises apps SSO from mobile apps Support for lift-and-shift of traditional apps to the cloud
6
Making a hybrid identity simple
12/1/2017 1000s OF APPS, 1 IDENTITY Making a hybrid identity simple Azure Active Directory Connect Azure Active Directory Connect DirSync Consolidated deployment assistant for your identity bridge components. All currently available sync engines will be replaced by the sync engine included in the Connect tool. Assisted deployment of ADFS will be available through Azure Active Directory Connect. ADFS is an optional component for authentication in hybrid implementation. Password sync can replace ADFS for more scenarios. Azure Active Directory Sync Sync engine FIM+Azure Active Directory Connector ADFS ADFS © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
7
Delivering a seamless user-authentication experience
12/1/2017 1000s OF APPS, 1 IDENTITY Delivering a seamless user-authentication experience Microsoft Azure Active Directory User attributes are synchronized using identity synchronization services, including a password hash; authentication is completed against Azure Active Directory Identity synchronization with password (hash) sync User attributes are synchronized using identity synchronization tools; authentication is passed back through federation and completed against Windows Server Active Directory Identity synchronization Microsoft Azure Active Directory ADFS © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
8
Azure Active Directory Application Proxy
12/1/2017 1:25 PM 1000s OF APPS, 1 IDENTITY Azure Active Directory Application Proxy Microsoft Azure Active Directory A connector that auto-connects to the cloud service Application Proxy Multiple connectors can be deployed for redundancy, scale, multiple sites, and different resources Connectors are deployed usually on corpnet next to resources DMZ Users connect to the cloud service that routes their traffic to resources via the connectors Corporate network Connector Connector Resource Resource Resource © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
9
Pre-integrated SaaS apps in the application gallery
Build 2012 12/1/2017 1000s OF APPS, 1 IDENTITY Pre-integrated SaaS apps in the application gallery 2550+ apps are supported (Jan 2016) © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
10
Enable business without borders
Ease of use for end users Enable cross-organization collaboration Stay productive everywhere with easy access to every application and powerful collaboration capabilities across location, application, and device borders Any time, any place productivity with Windows 10 Better connect with your consumers
11
B2B: cross-organization collaboration
ENABLE BUSINESS WITHOUT BORDERS B2B: cross-organization collaboration B2B: cross-organization collaboration “I need to let my partners access my company’s apps using their own credentials” Your employees need to collaborate with partners: Easily share data and applications with the right people in the right companies Your Partners want simplicity No new accounts to manage, No federation to configure, No servers to install Admins want security Control and oversight, Granular auditing and monitoring of partner access,World class security and protection B2B collaboration Securing identities beyond your own employees and expanding to your network of partners and contractors is critical to protecting your company data. Azure Active Directory B2B collaboration as additional functionality available in all Azure AD editions, provides simplified management and security for partner and other external user access to your in-house resources using Azure AD as the control plane. This includes access to popular cloud applications such as Salesforce, Dropbox, Workday, and of course Office 365, in addition to mobile, cloud, and on-premises claims-aware applications. B2B collaboration improves security, as partners manage their own accounts and enterprises can apply security policies to partner identities access. Azure Active Directory B2B collaboration is easy to configure with simplified signup for partners of all sizes even if they don’t have their own Azure AD via an -verified process. It is also easy to maintain with no external directories or per partner federation configurations. Make your Azure Active Directory the center of your cross-organization collaboration. Azure Active Directory B2B collaboration will be provided at no additional cost with all Azure AD editions. Customer quote : Kodak Alaris, A company that is passionate about using technology to transform organizations and improve people's lives across the planet, in Imaging and information management industry, uses Azure AD B2B collaboration to provide access to shared resources to all their partners We needed to quickly and cost effectively stand up new IT infrastructure including extranet applications for thousands of business partners. Azure AD B2B provides a simple and secure way for partners, large and small, to use their own credentials to access Kodak Alaris systems. The Azure AD team has been an incredible partner in our re-creation of a more agile and cost-effective hybrid cloud IT infrastructure.” Steven C. Braunschweiger, Chief Enterprise Architect FREE FREE FREE FREE
12
B2B collaboration: email-verified provisioning
12/1/2017 1:25 PM ENABLE BUSINESS WITHOUT BORDERS B2B collaboration: -verified provisioning Partners receive created by Azure AD B2B collaboration feature. If his organization has an Azure Active Directory tenant (Office 365, EMS, Intune, Azure , Azure AD Premium or Basic) he can directly access the resource his invited for . If the partner organization doesn’t have an Azure AD directory then by accepting the invitation from the a free Azure AD directory is created for him Partner © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
13
Achieve simple and secure partner access
12/1/2017 1:25 PM ENABLE BUSINESS WITHOUT BORDERS Achieve simple and secure partner access Partners use their own credentials to access your org Users lose access when they leave the partner org No external directories No per-partner federation Partners manage their own credentials You control partner access in your directory: app assignment group membership custom attributes Organizations manage access Thousands of bulk invites at a time Partners with Azure Active Directory sign in to accept invite Other partners simply sign up to accept invite Partners of all sizes VALUE PROPOSITION Simple and secure partner access Partner managed identities Customer managed access All partners large and small And by apps I mean: SaaS apps (Office 365, Salesforce, Box) On-premises apps (claims aware only for preview) Mobile or cloud apps 1. Bulk invite 1000’s of users at a time 2. Bulk add invited users to groups and applications 3. Partner managed credentials to access your resources 4. verified sign up for Azure AD accounts © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
14
Manage access at scale Advanced user lifecycle management Low IT overhead Manage identities at scale in the cloud and on-premises Monitor your identity bridge HR application integration Provisioning and deprovisioning Dynamic Groups/Office Groups Application management Self-service capabilities for password reset Group management Application requests Connect Health
15
Cloud-powered protection
Conditional access to resources Safeguard user authentication Ensure accountability with better security and governance Protect against advanced threats with risk based policies and monitoring Mitigate administrative risks Governance of on-premises and cloud identities With conditional access policies With an additional security layer (MFA) Identity Protection Advanced Security Reports Privileged Identity Management
16
Monitor and protect access to enterprise apps
Windows Server Management Marketing 12/1/2017 CLOUD-POWERED PROTECTION Monitor and protect access to enterprise apps Built-in security features Security reporting that tracks inconsistent access patterns, analytics, and alerts Reporting API © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
17
Reveal shadow IT Microsoft Azure Active Directory
CLOUD-POWERED PROTECTION Reveal shadow IT Source: Help Net Security 2014 as many Cloud apps are in use than IT estimates Discover all SaaS apps in use within your organization Microsoft Azure Active Directory Cloud app discovery Comprehensive reporting SaaS app category Number of users Utilization volume
18
Monitor and protect access to enterprise apps
Windows Server Management Marketing 12/1/2017 CLOUD-POWERED PROTECTION Monitor and protect access to enterprise apps XXXXX XXXXX Built-in security features Security reporting that tracks inconsistent access patterns, analytics, and alerts Reporting API XXXXX Step up to Multi-Factor Authentication © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
19
What is Azure Multi-Factor Authentication?
CLOUD-POWERED PROTECTION What is Azure Multi-Factor Authentication? A standalone Azure identity and access management service, also included in Azure Active Directory Premium Prevents unauthorized access to both on- premises and cloud applications by providing an additional level of authentication Trusted by thousands of enterprises to authenticate employee, customer, and partner access
20
How it works Mobile apps Phone calls Text messages
CLOUD-POWERED PROTECTION How it works Benefit slide – conceptual illustration or icons? Icons will lead in nicely to the following slide which is the technical diagram for ATA Recommending that we use short benefit taglines here, supported by features/capabilities Include chapter breadcrumb Mobile apps Phone calls Text messages
21
Windows Server Active Directory or other LDAP
12/1/2017 CLOUD-POWERED PROTECTION Users sign in from any device using their existing username/password. User Users must also authenticate using their phone or mobile device before access is granted 1 2 On-premises apps RADIUS LDAP IIS RDS/VDI .NET, Java, PHP… Microsoft Azure Active Directory SAML Cloud apps Multi-factor authentication server Multi-factor authentication server Windows Server Active Directory or other LDAP © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
22
Azure MFA vs. MFA for Office 365
Build 2012 12/1/2017 CLOUD-POWERED PROTECTION Azure MFA vs. MFA for Office 365 MFA for Office 365/Azure Administrators Azure Multi-Factor Authentication Administrators can enable/enforce MFA to end users Yes Use mobile app (online and OTP) as second authentication factor Use phone call as second authentication factor Use SMS as second authentication factor Application passwords for non-browser clients (e.g., Outlook, Lync) Default Microsoft greetings during authentication phone calls Suspend MFA from known devices Custom greetings during authentication phone calls Fraud alert MFA SDK Security reports MFA for on-premises applications/ MFA server One-time bypass Block/Unblock users Customizable caller ID for authentication phone calls Event confirmation Trusted IPs © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
23
CLOUD-POWERED PROTECTION
Identity Governance Reduce risks of excessive access to your organization’s data Third-party apps & clouds Decisions at the business level (self-service) Policy driven review workflows for governance decisions Dashboards with insights Apps in Azure Richer auditing to address compliance reporting needs Apps on-premises
24
Azure Active Directory
12/1/2017 1:25 PM World of devices © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
25
Rich standards-based platform for developers
12/1/2017 1:25 PM EMPOWER USERS Rich standards-based platform for developers Custom LOB applications can integrate with Azure Active Directory Sign in to Active Directory-integrated applications with cloud identities Active Directory-integrated applications can access Office 365 and other web APIs Applications can extend Azure Active Directory schema Cross-platform support (iOS, Android, and Windows) Open standards (SAML, OAuth 2.0, OpenID Connect, Odata 3.0) SCIM OAuth2 and OpenID Connect SAML WS-Federation REST-based graph API Microsoft Azure Active Directory © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
26
© 2016 Microsoft Corporation. All rights reserved
© 2016 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
27
Appendix: ISV solutions
28
Top ISV solutions in Single Sign-On
DocuSign DocuSign helps businesses of all sizes deliver extraordinary ROI by making it easy, fast, and secure to collect and process information and signatures– anytime, anywhere, on any device. DocuSign's solution helps companies keep processes 100% digital from start to finish to accelerate transactions, reduce costs, and delight customers, partners, suppliers, and employees. Key Use Cases/ Benefits Send documents with DocuSign from any Account, Contact, Lead, Opportunity, or custom entity record. Use custom business process flow step to help standardize process. Track the status of documents. View signed documents and the associated certificate of completion attached to the originating entity as a PDF. Availability: Global Link to AppCatalog Via Access Via Access seamlessly verifies user identities with policy-based contextual assessments and strong authentication with smart mobile devices to deliver on demand, one-click SSO access to thousands of SaaS, Web and mobile applications. With a hybrid-cloud approach, Via Access allows organizations to maintain control of the privacy and security of identities. Key Use Cases/ Benefits Consistently enforcing access controls and strong authentication Providing on-premises -levels of access protection for your SaaS applications Simple end user authentication experience from mobile devices Wide range of requirements for context-based access security Availability: Global Link to AppCatalog
29
Top ISV solutions in Single Sign-On
Connect Bentley systems gets users connected to work faster, safer and smarter. The CONNECT Edition advances project delivery and simplifies project collaboration, enabling organizations to connect people, projects and enterprises through a unified, common project environment. Bentley CONNECT creates an optimal Enterprise Content Management portal for cloud storage and uninhibited sharing of engineering and project management documents. Key Use Cases/ Benefits Personalize all of your users for both in the office and in the field Align to your whole project team, no matter the location Leverage Microsoft Azure cloud services to deliver unlimited computational nodes for better design outcomes Availability: Global Average Deal Revenue: $50K Link to AppCatalog Business 360 Online Software Innovation delivers market-leading, standardized Enterprise Content Management (ECM) applications. It is committed to helping organizations manage, share and use information - turning it into their most valuable asset. It develops market-leading applications that improve and increase efficiency in document management, records management, case handling and technical document control. Key Use Cases/ Benefits Maintain a clear overview of an ever-growing business information Business information and content version management Highly configurable to align with the needs and processes in complex enterprises Information governance Availability: Global Average Deal Revenue: $20K Link to AppCatalog
30
Top ISV solutions in Identity Management
Enterprise Random Password Manager Lieberman Software proactively mitigates cyber threats that bypass traditional enterprise defenses by delivering automated intrusion remediation in real time. Controls privilege access across data center and cloud assets by continuously changing privileged credentials and SSH keys. Deploy on-premises or as Azure Certified VMs (hybrid or cloud only). Key Use Cases/ Benefits Proactive Cyber Defense Simplified Compliance Next Generation Privilege Management Enhanced IT Ops. Security and Efficiency Availability: Global Average Deal Revenue: $45K Link to AppCatalog Link to Marketplace IAM Cloud IAM Cloud is a wholly Azure-hosted IT Management platform. Features include enterprise-grade identity and access management, automated Microsoft licensing, cloud drive mapping, session control, and migrations. IAM Cloud excels in challenging environments where Azure AD requires expert professional services to deliver. Key Use Cases/ Benefits Fully featured identity management engine Federation & Enterprise SSO Cloud drive mapping to SharePoint Online and OneDrive for Business Automated Microsoft licensing Availability: Global Average Deal Revenue: $7K Link to AppCatalog
31
Top ISV solutions in Conditional Access, MFA
Biometric authentication Platform BioCatch is a leading provider of Cognitive Biometric™, Authentication and Malware Detection solutions for mobile and web applications. Available as a cloud-based solution, BioCatch proactively collects and analyzes more than 400 cognitive parameters to generate a unique user profile. Key Use Cases/ Benefits Test that a user cannot fail – unlike easily forgotten secret questions or failure prone technologies such as SMS OTP Form of identification that cannot be lost, imitated or stolen Completely transparent and un-intrusive to the end user (no need to for enrollment) Doesn’t infringe on user privacy (no PII) Availability: Global Average Deal Revenue: $100K Link to AppCatalog Via Access Via Access seamlessly verifies user identities with policy-based contextual assessments and strong authentication with smart mobile devices to deliver on demand, one-click SSO access to thousands of SaaS, Web and mobile applications. With a hybrid-cloud approach, Via Access allows organizations to maintain control of the privacy and security of identities. Key Use Cases/ Benefits Consistently enforcing access controls and strong authentication Providing on-premises -levels of access protection for your SaaS applications Simple end user authentication experience from mobile devices Wide range of requirements for context-based access security Availability: Global Link to AppCatalog
32
Top ISV solutions in Conditional Access, MFA
KeyCAPTCHA Our solution does away with the entry of captchas in alphanumeric codes. To enter a captcha with our product, one must complete a puzzle where an advertisement may be placed. Key Use Cases/ Benefits Easy to enter: instead of alphanumeric codes that are sometimes difficult to discern, the user solves a simple task by adding one or two elements to a puzzle. Users experience a friendlier environment: all data entered by the user on the website form are saved, even if the captcha puzzle was not properly completed. Availability: Global Link to AppCatalog
33
Top ISV solutions in App Access
IAM Cloud IAM Cloud is a wholly Azure-hosted IT Management platform. Features include enterprise-grade identity and access management, automated Microsoft licensing, cloud drive mapping, session control, and migrations. IAM Cloud excels in challenging environments where Azure AD requires expert professional services to deliver. Key Use Cases/ Benefits Fully featured identity management engine Federation & Enterprise SSO Cloud drive mapping to SharePoint Online and OneDrive for Business Automated Microsoft licensing Availability: Global Average Deal Revenue: $7K Link to AppCatalog Via Access Via Access seamlessly verifies user identities with policy-based contextual assessments and strong authentication with smart mobile devices to deliver on demand, one-click SSO access to thousands of SaaS, Web and mobile applications. With a hybrid-cloud approach, Via Access allows organizations to maintain control of the privacy and security of identities. Key Use Cases/ Benefits Consistently enforcing access controls and strong authentication Providing on-premises -levels of access protection for your SaaS applications Simple end user authentication experience from mobile devices Wide range of requirements for context-based access security Availability: Global Link to AppCatalog
34
Top ISV solutions in App Access
Next Generation Application Security DenyAll Next Generation Application Security, protects your Microsoft Azure applications from risks of defacement, data leakage & identity usurpation. DenyAll’s nextgen application security products (WAF, WSF, WAM), can be deployed easily from the Microsoft Marketplace to effectively protect your applications from OWASP Top 10 and business logic attacks aiming to steal your data and bring your applications down. Key Use Cases/ Benefits Help you detect and remedy network, system and application-layer vulnerabilities Schedule scans, assign remediation tasks, generate reports Virtually patch application vulnerabilities Availability: Global Average Deal Revenue: $100K Link to AppCatalog Link to Marketplace Soha Cloud Soha’s security service ensures that you can continue to develop, test and deploy applications on public clouds with maximum agility – while giving management the assurance they need. It provides the security missing in public cloud infrastructures. Key Use Cases/ Benefits Eliminate VPNs, Whitelists, Access Lists and Security Groups Enable micro-granular access to only the applications users are authorized to use – and nothing else Simple to use – Easy and fast to deploy Lower operating cost and no hardware or network changes required Availability: Global Average Deal Revenue: $5K/Quarter Link to AppCatalog Link to Marketplace
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.