Microsoft Entra ID, previously known as Azure AD (Active Directory), is Microsoft's cloud-based identity and access management (IAM) solution. Designed to help organizations of all sizes manage user identities and create an intelligent security perimeter around their cloud and on-premise resources. Microsoft Entra ID or Azure AD is integral to the Microsoft 365 and Azure ecosystems. It provides a robust set of capabilities to manage users and groups and secure access to applications in a centralized, streamlined manner.
Microsoft Entra ID (Azure AD) is a login system, morphing into a sophisticated identity and access management (IAM) solution for the modern, hybrid workplace. Imagine a single vault for all your digital keys – that's the essence of Entra ID's identity management. It acts as a central repository for user identities, encompassing usernames, passwords, and even additional attributes like department or employee role.
These capabilities enabled simplified administration using a unified platform for adding, modifying, and deleting user accounts. Users no longer need to remember login credentials for a plethora of applications. Entra ID streamlines access by using the same identity across various cloud services and on-premises resources (if integrated). Centralized identity management allows for stricter enforcement of security policies and password complexity requirements across the organization.
Authentication sits at the heart of the solution, ensuring only authorized users gain access to sensitive resources. It employs a multi-pronged approach:
For organizations with on-premises infrastructure, Microsoft Entra ID (Azure AD) offers hybrid identity options. This allows for a smooth integration between on-premises Active Directory and Entra ID, providing a consistent identity for users across both environments. It enables organizations to leverage their existing investments in on-premises infrastructure while taking advantage of cloud scalability and flexibility.
In conclusion, Microsoft Entra ID (Azure AD) is a comprehensive IAM solution that addresses the complex challenges of managing and securing identities in a cloud-centric world. Its blend of ease of use, security, and integration capabilities makes it an essential component of modern IT infrastructure, supporting both operational efficiency and strategic business objectives.
The licensing cost is a bit prohibitive.
Licensing is easy.
The licensing cost is a bit prohibitive.
Licensing is easy.
Prisma Access by Palo Alto Networks provides consistent security for all users and applications across your remote networks. Prisma Access grants users safe access to the cloud and data center applications and the internet as well. In addition, the solution combines all of your security and networking capabilities into a single cloud-delivered platform, enabling flexible hybrid workforces.
Actually the solution is very expensive. I don't know the particulars since the purchasing team dealt with it.
The pricing for this solution is on the higher end.
Actually the solution is very expensive. I don't know the particulars since the purchasing team dealt with it.
The pricing for this solution is on the higher end.
Zscaler Internet Access is a cloud-native security service edge (SSE) platform. Its main purpose is to provide AI-powered protection for all users, all applications, and all locations. The solution replaces other legacy network security solutions to stop advanced attacks and prevent data loss by using a comprehensive zero trust approach.
The pricing is an issue. It is expensive compared to other firewalls on the market.
Our monthly fee is around R3000.
The pricing is an issue. It is expensive compared to other firewalls on the market.
Our monthly fee is around R3000.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Microsoft Defender for Cloud Apps is a comprehensive security solution that provides protection for cloud-based applications and services. It offers real-time threat detection and response, as well as advanced analytics and reporting capabilities. With Defender for Cloud Apps, organizations can ensure the security of their cloud environments and safeguard against cyber threats. Whether you're running SaaS applications, IaaS workloads, or PaaS services, Microsoft Defender for Cloud Apps can help you secure your cloud environment and protect your business from cyber threats.
We have an educational licensing agreement. It's a customer agreement for multiple years.
This product is not expensive.
We have an educational licensing agreement. It's a customer agreement for multiple years.
This product is not expensive.
The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement.
The pricing is expensive and on the higher end. Honestly, in my opinion, it is not worth the price.
The cost is expensive. It depends on the number of users.
The pricing is expensive and on the higher end. Honestly, in my opinion, it is not worth the price.
The cost is expensive. It depends on the number of users.
Okta Workforce Identity is a powerful solution that provides single sign-on capabilities and centralized access control for multiple applications. Its most valuable features include workflows, multiple SSO protocols, and Active Directory integrations. It helps organizations by simplifying access management, improving security with multi-factor authentication, and streamlining user provisioning. It is particularly beneficial for large employers, retail chains, and organizations with a significant number of employees. Okta Workforce Identity is easy to use, scalable, and reliable, making it an essential tool for identity and access management.
License is around US$20,000 annually.
It is costly for large companies.
License is around US$20,000 annually.
It is costly for large companies.
Netscope is a Secure Access Service Edge (SASE) platform that includes core products such as Cloud Access Security Broker (CASB) and Security Service Edge (SSE).
Pricing is a little expensive but it is affordable.
They should work on licensing costs.
Pricing is a little expensive but it is affordable.
They should work on licensing costs.
Cato Networks is a leading SASE (Secure Access Service Edge) platform, combining SD-WAN and network security to obtain a cloud-native service. Cato Networks optimizes and secures application access for users and identities. The platform delivers a next-generation secure networking architecture that minimizes legacy IT infrastructures’ complexity, costs, and risks. The goal of Cato Suite is to connect any user to any application securely and optimally.
The price is not an issue for us, as it is priced more competitively than some other vendors.
If you compare with VeloCloud, the price is the same or even cheaper.
The price is not an issue for us, as it is priced more competitively than some other vendors.
If you compare with VeloCloud, the price is the same or even cheaper.
VMware Software-Defined Wide Area Network (SD-WAN) is a secure access service edge (SASE) platform that combines many types of software-based network technologies in an attempt to enable users to virtualize their wide area networks and reduce their reliance on hardware. In essence, this solution makes it possible for users to reliably access their applications from anywhere in the world by leveraging cloud technologies. Users can simply, efficiently, and completely control their network devices and traffic. It ensures that organizations are always able to use the best possible connection to their data centers. VMware SD-WAN steers traffic so that it is always using the most reliable connections and at the same time takes steps to remediate any problems that it detects in other network links. This guarantees that organizations can access high-priority applications at all times.
VeloCloud performs as well as the Cisco SD-WAN but it is cheaper in price.
The price of this solution is higher than that of other SD-WAN vendors.
VeloCloud performs as well as the Cisco SD-WAN but it is cheaper in price.
The price of this solution is higher than that of other SD-WAN vendors.
Illumio Zero Trust Segmentation is a cloud and data center security solution that helps stop breaches from spreading across hybrid and multi cloud IT environments. The solution is designed to stop ransomware, contain cyber attacks, and reduce risk. With Illumio Zero Trust Segmentation, users can understand relationships and communications to map exposure risk of systems and data, identify the right security posture and secure applications through least-privilege policies, and ensure a Zero Trust security posture.
There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive.
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
There is a subscription needed to use Illumio Adaptive Security Platform and we pay every three years. Overall the solution is expensive.
The product's pricing is around 10,000-15,000 USD. The pricing is on a yearly basis.
Appgate SDP is a network access control tool for local and remote access, multifactor authentication, and micro-segmentation. It is a flexible, robust, and configurable tool with good documentation, interface improvements, and ease of deployment.
It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so.
We pay $100 per user per month. One license for the site is around $17.
It is a pretty expensive tool. It is maybe about $20,000 per year for a hundred users or so.
We pay $100 per user per month. One license for the site is around $17.
Cloudflare Access is a powerful identity and access management solution that provides secure and seamless access to internal resources. It eliminates the need for traditional VPNs and allows organizations to enforce granular access controls based on user identity and device posture. With Cloudflare Access, users can authenticate using their existing identity providers, such as Google or Okta, and access resources without exposing them to the public internet. This ensures that only authorized users can access sensitive data and applications.
The prices are slightly expensive.
The pricing is somewhere in the middle. I would rate the pricing a seven out of ten.
The prices are slightly expensive.
The pricing is somewhere in the middle. I would rate the pricing a seven out of ten.
iBoss is a leading provider of cloud-based cybersecurity solutions that help organizations protect their networks and data from cyber threats. The company's products include web security, email security, mobile security, and advanced threat protection. iBoss's solutions are designed to be easy to use and manage, while providing comprehensive protection against a wide range of cyber threats. One of the key features of iBoss's products is their ability to provide real-time threat intelligence and analysis. This allows organizations to quickly identify and respond to potential threats, before they can cause damage to their networks or data. iBoss's solutions also include advanced analytics and reporting capabilities, which help organizations gain insights into their network activity and identify potential vulnerabilities. Another important aspect of iBoss's products is their scalability and flexibility. The company's solutions are designed to work seamlessly with a wide range of network architectures and devices, making them ideal for organizations of all sizes and types. iBoss's cloud-based approach also means that organizations can easily scale their cybersecurity solutions as their needs evolve over time. iBoss's products provide a comprehensive and effective solution for organizations looking to protect their networks and data from cyber threats. With their advanced threat intelligence, analytics, and reporting capabilities, as well as their scalability and flexibility, iBoss's solutions are an excellent choice for any organization looking to enhance its cybersecurity posture.
It is expensive compared to one of its competitors.
It is expensive compared to one of its competitors.
Menlo Security Remote Browser Isolation (RBI) fully enables the way people work by giving administrators the ability to set acceptable use policies to block malicious activity—including compromised websites, cybersquatting, file uploads and downloads, social posting, and other unknown threats. All web content and documents, across a broad browser ecosystem, are safely and accurately rendered in the cloud, away from your endpoints. Admins get all the granular controls and policies they need, while minimizing power draw and keeping the user experience intact. Enable rapid provisioning of users, while guaranteeing connectivity from any location. The Global Elastic Cloud promises secure, optimal web access for remote sites and mobile users worldwide.
Menlo Security RBI can be very costly.
Menlo Security RBI can be very costly.
IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.Provides a wide range of built-in authenticators and supports external authenticators.Provides permit and deny decisions for protected resources requests in the secure domain through the authorization API.Manages secure access to private internal network-based resources by using the public Internet's broad connectivity and ease of use with a corporate firewall system.
The product is not expensive. It depends on the number of users.
The product is not expensive. It depends on the number of users.
Netskope Private Access is an integral component of the Netskope Security Cloud platform that provides zero-trust secure access to enterprise applications and data in hybrid IT (public cloud and data center) environments. It offers comprehensive policy management, compliance assessment, and supports any application, protocol, and device to reduce risk and simplify security operations.
When it comes to pricing, Netskope Private Access is relatively cheap compared to other solutions.
I believe that the price for Netskope Private Access is included in the features or functionality my company purchased from NetSkope.
When it comes to pricing, Netskope Private Access is relatively cheap compared to other solutions.
I believe that the price for Netskope Private Access is included in the features or functionality my company purchased from NetSkope.
Google’s mission is to organize the world‘s information and make it universally accessible and useful.
I think that the cost is metered based on the data, but I don't have the details.
Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us.
I think that the cost is metered based on the data, but I don't have the details.
Its price is good. For each server, we are saving $300 a month. We have at least thousands of servers. It is a huge cost reduction for us.
Forcepoint CASB (Cloud Access Security Broker) is a security solution which is designed to secure and monitor the use of cloud services within an organization. It helps organizations gain visibility and control over the cloud applications and services being used by their employees. Forcepoint CASB integrates with cloud service providers' APIs and employs various techniques such as traffic analysis, proxying, and API-based controls to provide security and visibility into cloud application usage. It can be deployed as a standalone solution or integrated with other security technologies within an organization's existing infrastructure.
The pricing really depends on the size of the customer's business because it is price-relevant to the environment.
The pricing really depends on the size of the customer's business because it is price-relevant to the environment.
Google BeyondCorp Remote Access is a secure solution that enables organizations to provide remote access to their internal resources without the need for a traditional VPN. The primary use case for this product is to allow employees to securely access company resources from anywhere, ensuring productivity and flexibility.
The most valuable functionality of Google BeyondCorp Remote Access is its zero-trust approach. It verifies every user and device attempting to connect, irrespective of their location, ensuring only authorized users gain access to resources. This eliminates the need for complex VPN configurations and reduces the risk of unauthorized access.
By adopting Google BeyondCorp Remote Access, organizations can enhance their security posture and simplify access management. It provides granular control over user access, allowing administrators to set policies based on device health, user context, and other attributes. This reduces the attack surface and minimizes the risk of data breaches or unauthorized access to sensitive information. Furthermore, the product integrates seamlessly with other Google Cloud services, making it easy to manage and scale as per organizational requirements.