Find out what your peers are saying about Microsoft, Auth0, Cisco and others in Single Sign-On (SSO).
We leverage existing licensing, like Windows Server or SQL, and hybrid benefits, and our sales and marketing teams benefit from co-selling and partnership advantages.
We get a return from not needing to pay other vendors to do what we already had from Microsoft, which was better than the competition.
The return on investment comes from not needing as many IT staff to manage and verify user identity and ensuring seamless device connection without needing to administer device compliance manually.
The actual support when you get to that level is a ten out of ten.
There are immediate answers to any issues that arise with great knowledge and a deep understanding of the product and business needs.
It's not timely or professional.
They have been responsive to our needs as integrators and those of the client.
We experienced no scalability issues with Microsoft Entra ID.
Its scalability is impressive, aided by Microsoft's efforts to expand its data centers.
When dealing with tens of thousands of objects, it requires proper management and best practices to retrieve only necessary data.
It's a critical solution that we can't do without.
The stability of the solution is very high at 99.999%.
We rarely had significant problems or crashes.
A recent incident we dealt with took four months to resolve with a seven-day deadline, which was quite frustrating.
There is a need for better transformation support from on-premises Active Directory policies to the cloud, as Entra ID doesn't cover this sufficiently yet.
The frequent changes in branding cause confusion among customers who struggle to keep track of product names and functions.
There is a clear roadmap for improvements, including enhancing capabilities with AI and seamless functionality in an MSP model for deeper visibility across multiple agencies.
We are getting our money's worth.
Most features of Entra ID are part of Microsoft's ecosystem and included in Microsoft 365 bundles, which means there are no additional costs associated with pricing and licensing.
Compared to other Microsoft products, the cost is not too expensive.
We can secure the applications that we are building and make sure that if the application were to be compromised, there is no full access to a customer's environment causing issues and other security concerns.
It's integrated with Microsoft technologies like Authenticator, SSO, and MFA, streamlining operations and creating a seamless environment.
The granular control, such as preventing logins from specific locations, enhances security significantly.
With visibility into endpoint telemetry, SentinelOne does provide useful information to find threat actors and empowers those who are in the business of threat hunting.
Microsoft Entra ID is used for extending on-premises Active Directory to the cloud, managing application access, enabling multi-factor authentication, and single sign-on. It facilitates policy enforcement and secure access, ensuring centralized identity management across cloud and on-premises resources.
Organizations utilize Microsoft Entra ID for robust user and group management, identity synchronization, and conditional access. Its seamless integration with third-party apps, scalability, and support for remote work make it a preferred choice. The admin center streamlines identity and access tasks, enhancing efficiency and security with features like privileged identity management and audit logs.
What are the key features of Microsoft Entra ID?Microsoft Entra ID implementation varies across industries. Tech firms leverage it for secure, scalable access management, while healthcare organizations utilize its identity protection features to safeguard patient data. Educational institutions adopt Entra ID for streamlined user management and policy enforcement, ensuring secure access for students and staff across on-premises and cloud resources.
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
Singularity Identity’s primary use case is to protect credential data and disrupt identity-based attacks. The most valuable function of Singularity Identity is its ability to misdirect attackers by providing deceptive data to identity-based recon attacks. Additionally, it can hide and deny access to locally stored credentials or identity data on Active Directory domain controllers.
Singularity Identity also provides rapid detection and respond to identity attacks, capturing attack activity and feeding it directly to the Singularity platform’s Security DataLake for enterprise-wide analysis and response.
By implementing Singularity Identity, organizations benefit from enhanced security, reduced credential-related risks, and improved user productivity. It detects and responds to identity-based attacks, ensuring only authorized individuals can access critical identity data. With its cloaking capabilities to hide identity stored locally on endpoints or in the identity infrastructure and it’s ability to provide decoy results to identity-based attacks, organizations can effectively secure their sensitive or privileged identities, resulting in improved overall identity security.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.