Access all Apps with Azure AD: A Single Identity Solution for Secure Access
- LANGUAGE: English DATE: Wednesday, April 29, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Most businesses already rely on Azure Active Directory for secure, seamless access to Microsoft services like Office 365 and Azure. But with more applications being used than ever before, organizations are asking themselves what bigger role Azure Active Directory can play in securing their entire application ecosystem.
Today, secure application access is a key challenge organizations face when implementing a Zero Trust strategy. Applications can live anywhere – in the cloud, on-premises, as a service, or on a mobile device – and are used from anywhere, at any time by employees and business partners. In this webinar, we will discuss how Azure Active Directory can provide secure, seamless access to all types of applications – from Office 365, popular SaaS apps and traditional on-premises applications to custom-built lines of business applications.
Join this webinar and learn about:
- The need for new paradigms in IAM: Providing Identity Fabrics for access of everyone and everything to every service
- Managing all applications with Azure AD: Benefits of managing all apps under a single integrated identity solution
- How to provide access to every application: Application integration models of Microsoft Azure Active Directory
In the first part of the webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will introduce the concept of Identity Fabrics as a strategic paradigm for a future-proof IAM and will look at the role Azure AD can play in such Identity Fabrics. He also will look at the roles Azure AD can take in an IAM strategy.
In the second part, Ilana Smith, Principal PM Manager at Microsoft, will go into detail and explain the breadth of application integration models supported by Microsoft Azure Active Directory in both modern and legacy environments.
One Microsoft Way • WA 98052-6 Redmond • USA
Every day, Microsoft practices security operations at a global scale to protect our customers, in the process analyzing more than 6.5 trillion signals to generate intelligence that we share with our customers and partners through technology solutions spanning identity and access management, threat protection, information protection, security management, and infrastructure security.
We drive a broad set of industry and policy partnerships in support of our unique responsibility to make the world a safer place.
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.