Find out in this report how the two Microsoft Security Suite solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The skill level of the support staff is also questionable.
Azure Key Vault's technical support by Microsoft Azure is very good.
I have a strong relationship with Microsoft since we are one of their best clients in Spain.
Level two support is knowledgeable and knows how the product works, which is very good.
If there were some customizations available, I would rate its scalability as nine out of ten.
It provides a high level of security and avoids phishing and scam emails.
The skill level of the support staff is also questionable.
It would be beneficial for me to have a more robust desktop interface for Key Vault, similar to the interfaces provided by Azure Storage or Amazon S3 for managing storages.
One of our certificates was not getting deployed, and during that time, the support team was unsure and had to connect with the back-end team for assistance.
Providing code customization would help keep pace with new vulnerabilities and threats.
I would classify it as low priced.
We are planning to buy protection for Entra.
It also helps me increase my security posture and assists with regulatory and compliance requirements.
All secrets are in the Key Vault, and access is managed by the integrated management in ITT, which Azure provides to the services.
Since implementing Azure Key Vault, I have observed that instead of storing plain values, we can store them securely as and when required.
One of the best features is that it provides a certain level of customization, allowing us to set our spam confidence levels.
Microsoft Azure Key Vault is a cloud-based data security and storage service that allows users to keep their secrets safe from bad actors.
Benefits of Microsoft Azure Key Vault
Some of the benefits of using Microsoft Azure Key Vault include:
Reviews from Real Users
Microsoft Azure Key Vault stands out among their competitors for a number of reasons. Two major ones are the overall robustness of the solution and its ability to protect and manage many different digital asset types. The many features that the solution offers allows users to tailor their experience to meet their specific needs. Its flexibility enables users to accomplish a wide variety of security and identity management related tasks. It empowers users to secure a wide array of assets. Users can keep many different types of secrets away from bad actors.
A cloud architect at a marketing services firm writes, “All its features are really valuable. It's really well thought-out. It's a complete turnkey solution that has all the concerns taken care of, such as access control and management. You can use it in infrastructure as code to create key vaults, APIs, PowerShells, CLIs, even Terraform. You can also use it in different services across the board. If you have app services, or virtual machines, Kubernetes, or Databricks, they can all use Key Vault effectively. In my opinion, in a DevSecOps, DevOps, or even in a modern Azure implementation, you have to use Azure Key Vault to make sure you're addressing security and identity management concerns. By "identity" I mean usernames, passwords, cryptography, etcetera. It's a full-blown solution and it supports most breeds of key management: how you store keys and certify.”
Roger L., the managing director of Cybersecurity Architecture at Peloton Systems, says, “The most valuable aspect of the product is its ability to keep our admin password accounts for keys and a lot of our high-value assets. It can manage those types of assets. So far, the product does a great job of managing keys.”
Microsoft Defender Threat Intelligence is a comprehensive security solution that provides organizations with real-time insights into the latest cyber threats. Leveraging advanced machine learning and artificial intelligence capabilities, it offers proactive threat detection and response, enabling businesses to stay one step ahead of attackers. With Microsoft Defender Threat Intelligence, organizations gain access to a vast array of threat intelligence data, including indicators of compromise (IOCs), security incidents, and emerging threats. This data is collected from a wide range of sources, such as Microsoft's global sensor network, industry partners, and security researchers, ensuring comprehensive coverage and accuracy. The solution's advanced analytics and machine learning algorithms analyze this threat intelligence data in real-time, identifying patterns, trends, and anomalies that may indicate a potential security breach. By continuously monitoring the network and endpoints, Microsoft Defender Threat Intelligence can quickly detect and respond to threats, minimizing the impact of attacks and reducing the time to remediation.
We monitor all Microsoft Security Suite reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.