Find out in this report how the two Microsoft Security Suite solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
The skill level of the support staff is also questionable.
I have a strong relationship with Microsoft since we are one of their best clients in Spain.
The policy working and detection technology need enhancements.
Sometimes the solution is not stable when the internal connection is not reliable, so this aspect needs improvement.
My security area wants to rotate passwords every day, every week, or every month, depending on the services.
The skill level of the support staff is also questionable.
One of our certificates was not getting deployed, and during that time, the support team was unsure and had to connect with the back-end team for assistance.
Endpoint Data Loss Prevention needs to be improved as it is not up to expectations.
I would classify it as low priced.
We are planning to buy protection for Entra.
It also helps me increase my security posture and assists with regulatory and compliance requirements.
All secrets are in the Key Vault, and access is managed by the integrated management in ITT, which Azure provides to the services.
It integrates well with Azure services and is easy to use and quick to provision.
Microsoft Purview Data Loss Prevention usually performs well, except for endpoint Data Loss Prevention, which may need improvements.
Microsoft Azure Key Vault is a cloud-based data security and storage service that allows users to keep their secrets safe from bad actors.
Benefits of Microsoft Azure Key Vault
Some of the benefits of using Microsoft Azure Key Vault include:
Reviews from Real Users
Microsoft Azure Key Vault stands out among their competitors for a number of reasons. Two major ones are the overall robustness of the solution and its ability to protect and manage many different digital asset types. The many features that the solution offers allows users to tailor their experience to meet their specific needs. Its flexibility enables users to accomplish a wide variety of security and identity management related tasks. It empowers users to secure a wide array of assets. Users can keep many different types of secrets away from bad actors.
A cloud architect at a marketing services firm writes, “All its features are really valuable. It's really well thought-out. It's a complete turnkey solution that has all the concerns taken care of, such as access control and management. You can use it in infrastructure as code to create key vaults, APIs, PowerShells, CLIs, even Terraform. You can also use it in different services across the board. If you have app services, or virtual machines, Kubernetes, or Databricks, they can all use Key Vault effectively. In my opinion, in a DevSecOps, DevOps, or even in a modern Azure implementation, you have to use Azure Key Vault to make sure you're addressing security and identity management concerns. By "identity" I mean usernames, passwords, cryptography, etcetera. It's a full-blown solution and it supports most breeds of key management: how you store keys and certify.”
Roger L., the managing director of Cybersecurity Architecture at Peloton Systems, says, “The most valuable aspect of the product is its ability to keep our admin password accounts for keys and a lot of our high-value assets. It can manage those types of assets. So far, the product does a great job of managing keys.”
At Microsoft, our mission is to empower every person and every organization on the planet to achieve more. Our mission is grounded in both the world in which we live and the future we strive to create. Today, we live in a mobile-first, cloud-first world, and the transformation we are driving across our businesses is designed to enable Microsoft and our customers to thrive in this world.
We monitor all Microsoft Security Suite reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.