Table of Contents

Get Started

Why Identity Management?

In the SaaS enabled cybersecurity world, identity is the new currency.

We found that the flexibility of Intune made it simple to assign security polices and deploy different versions of our apps to different departments and user groups. We publish our apps, and any updates, to our company portal. Employees can download the apps to their smartphones when and where it’s convenient.
Callaway Golf

Gurdeep Kundi Senior Systems Engineer at Foxtons

The Foundation for Enterprise Productivity

Stealing credentials / identity is the #1 target for phishing and malware attacks. According to Verizon’s 2016 Data Breach Investigations Report, 90% of phishing attacks intend on stealing a user’s identity. As identity is managed in more and more SaaS applications, not only is it a hassle for users, but it’s impossible for IT administrators and security managers to control.

Without a single plane of glass to manage user identities in the cloud, admins must pick through various administrative portals to decommission users one at a time. On average, it takes 30+ minutes to decommission a user from all their SaaS and on premises applications. If that employee is disgruntled on their way out, that’s about 30 minutes too long.

Traditional identity and access management solutions providing single-sign on to on-premises applications and directory services such as Active Directory and others are used for the vast majority of organizations and huge investments were made to deploy and maintain them. These solutions are perfect for the on-premises world.

Now, IT can provide the same sign on and management experience to cloud applications hosted in the public cloud. Azure Active Directory addresses this challenge by extending the reach of on-premises identities to the cloud in a secure and efficient way. One simple connection is needed from an on-premises directory to Azure AD. Everything else will be handled by Azure AD. Secure single sign-on to thousands of SaaS applications hosted in any cloud by using the same credentials that exist on-premises. In addition, Azure AD provides Self-service capabilities and easy access to all the applications, consumer or business, they need, in the cloud and on-premises.

Video: Single Sign-on

Resources

Detecting and Protecting Against Solarigate

This blog provides a summary of the Microsoft tools and guidance to detect and protect against the recent attacks embedded within SolarWinds monitoring agents.

10 Critical Steps to Secure Windows Virtual Desktops

It's simple to spin up a VM host for WVD, but selecting and configuring proper security controls takes more time and effort. After some significant deployments of Windows Virtual Desktop, our...

Azure AD Identity Governance – Terms of Use

Most organizations have some form of Acceptable use policy when logging into a domain-joined PC or server.  However, when moving to the cloud, you have access and exposure to a vast array of data and...

Cloud Security e-guide

 

We hear about breaches ever day now.  Make sure you are doing your best to protect your organization.  Download the Cloud Security Do's and Don'ts e-guide to benchmark.

 

 

 

ref:_00D80KtFf._5000y1WwWQD:ref