Table of Contents

Get Started

Why Identity Management?

In the SaaS enabled cybersecurity world, identity is the new currency.

We found that the flexibility of Intune made it simple to assign security polices and deploy different versions of our apps to different departments and user groups. We publish our apps, and any updates, to our company portal. Employees can download the apps to their smartphones when and where it’s convenient.
Callaway Golf

Gurdeep Kundi Senior Systems Engineer at Foxtons

The Foundation for Enterprise Productivity

Stealing credentials / identity is the #1 target for phishing and malware attacks. According to Verizon’s 2016 Data Breach Investigations Report, 90% of phishing attacks intend on stealing a user’s identity. As identity is managed in more and more SaaS applications, not only is it a hassle for users, but it’s impossible for IT administrators and security managers to control.

Without a single plane of glass to manage user identities in the cloud, admins must pick through various administrative portals to decommission users one at a time. On average, it takes 30+ minutes to decommission a user from all their SaaS and on premises applications. If that employee is disgruntled on their way out, that’s about 30 minutes too long.

Traditional identity and access management solutions providing single-sign on to on-premises applications and directory services such as Active Directory and others are used for the vast majority of organizations and huge investments were made to deploy and maintain them. These solutions are perfect for the on-premises world.

Now, IT can provide the same sign on and management experience to cloud applications hosted in the public cloud. Azure Active Directory addresses this challenge by extending the reach of on-premises identities to the cloud in a secure and efficient way. One simple connection is needed from an on-premises directory to Azure AD. Everything else will be handled by Azure AD. Secure single sign-on to thousands of SaaS applications hosted in any cloud by using the same credentials that exist on-premises. In addition, Azure AD provides Self-service capabilities and easy access to all the applications, consumer or business, they need, in the cloud and on-premises.

Video: Single Sign-on

Resources

Advanced Threat Protection – Attack Simulator

Do you know if your organization is under attack? Short answer is yes, even if you don’t know about it. If there is a potential monetary gain from your organization, there is a bad actor out there...

The Perimeter is Dead. Long Live the CASB!

Remember only a few months back when workers were safely inside the four walls, surrounded by firewalls, proxies, and IPS’s? Work from home has hastened the irrelevance of the network edge as a means...

Azure AD Conditional Access – Session Controls

In the previous article, we discussed the various controls to decide on whether to allow access to the user and/or device to the apps and data with Azure AD Conditional Access Grant controls. ...

Cloud Security e-guide

 

We hear about breaches ever day now.  Make sure you are doing your best to protect your organization.  Download the Cloud Security Do's and Don'ts e-guide to benchmark.

 

 

 

ref:_00D80KtFf._5000y1WwWQD:ref