Zero Trust Network Access (ZTNA)

Are you looking for information about ZTNA of Microsoft Azure and Microsoft 365? In this archive you will find all our posts about ZTNA.

  • Microsoft Azure

    Enhancing Security with Microsoft Entra Protected Actions and Conditional Access

    Microsoft Entra Protected Actions safeguard highly sensitive administrative operations in Microsoft Entra by requiring an additional layer of authentication. When a user attempts to perform such an action, they must first meet the defined policies. For example, specific actions can be restricted to devices that are either Microsoft Entra Joined or Microsoft Entra Hybrid Joined, or may require phishing-resistant multi-factor authentication prior to execution.

  • Microsoft 365,  Microsoft Azure

    Windows Hello for Business: Enhanced Security with Multi-Factor Unlock

    Passwords alone no longer provide sufficient protection against data loss and unauthorized access. This is where Windows Hello for Business comes into play. This modern authentication method from Microsoft enables companies to authenticate their employees more securely using biometric data such as facial recognition or fingerprints, along with additional unlock factors like PIN codes or trusted signals. Furthermore, Windows Hello for Business supports multi-factor unlock, combining several authentication factors to make device access even more secure. This multi-factor unlock offers a significant security advantage by integrating multiple layers of protection, thereby significantly reducing the risk of security breaches.

  • Microsoft 365,  Microsoft Azure

    Kerberos Cloud Trust and Windows Hello for Business: Secure and Seamless Authentication in Hybrid Environments

    Kerberos Cloud Trust is a hybrid authentication protocol developed by Microsoft to enable secure and passwordless sign-ins. Kerberos Cloud Trust combines the strengths of Kerberos and Windows Hello for Business to offer a modern, secure, and user-friendly authentication solution. It is particularly useful in hybrid environments where both cloud and on-premises resources are utilized. Users authenticate securely and seamlessly both locally and in the cloud.