It is a cloud solution for managing identification and different devices, protecting information and secure access to applications and resources.
Service provides additional protection for Office 365, detecting violations before they bring harm. It allows to provide secure delivery of data to any device, protect corporate assets worldwide and infrastructure both on-premise and cloud.
Allows to control users’ identification and access to cloud environment: single identity for each user, risk-free access to internal resources for partners, self-service password resert and remote access requests to applications by employees.
Allows to control mobile devices, applications and computers from cloud minimizing problems with protection of corporate information and preventing information leakage.
Service provides remote access to the desktop of the employee from any place and device. It allows to allocate virtual desktops both locally using company’s servers and on provider’s hosting site or in cloud service to provide better scalabitity
Confidential data can be protected by means of data classification, secure joint information usage, complete control and management of internal data.
Protection from modern and complex attacks based on identification is provided by means of multi-factor authentication, management of cloud and mobile applications, user’s behavioral analysis, classification of files during their creation, their tracking and usage.
Service helps to detect advanced attacks in a hybrid environment by investigation and identification suspicious users and device activity, leveraging threat intelligence across the cloud and on-premises environments, protection user identities and credentials stored in Active Directory, monitoring multiple entry points.