2022-10-07T11:57:58Z

What do you like most about Azure Active Directory Identity Protection?

Miriam Tover - PeerSpot reviewer
  • 0
  • 0
PeerSpot user
4

4 Answers

Anvar Sadique - PeerSpot reviewer
Real User
Top 10
2023-07-21T18:37:00Z
Jul 21, 2023

I use conditional access most of the time.

Search for a product comparison
HarinathReddy - PeerSpot reviewer
Real User
Top 10
2023-06-15T14:06:00Z
Jun 15, 2023

The solution helps us with authentication.

Amin Massad - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-06-09T12:00:00Z
Jun 9, 2023

The tool is simple and you can find a lot of tutorials, and videos on YouTube that can help you.

MP
Consultant
Top 20
2022-10-07T11:57:58Z
Oct 7, 2022

The reverse proxy feature provides additional security that is not available in other solutions.

Find out what your peers are saying about Microsoft, CrowdStrike, Intercede and others in Identity Management (IM). Updated: March 2024.
765,234 professionals have used our research since 2012.
Identity Management (IM)
What is identity management (IM)? Identity management (IM), also referred to as identity and access management (IAM), is an organizational process used to securely connect electronic or digital identities with the right levels of access.
Download Identity Management (IM) ReportRead more