Identity and access management
Identity and access management ensures that the right people, machines, and software components get access to the right resources at the right time. Explore strategies and solutions that will help you secure access for all your employees, devices, and services
Refine results
Topic
Products and services
Publish date
-
Discover four key identity and access priorities for the new year to strengthen your organization’s identity security baseline. -
Access Fabric: A modern approach to identity and network access
An Access Fabric is a unified access security solution that continuously decides who can access what, from where, and under what conditions—in real time. -
Modernize your identity defense with Microsoft Identity Threat Detection and Response
Microsoft’s Identity Threat Detection and Response solution integrates identity and security operations to provide proactive, real-time protection against sophisticated identity-based cyberthreats. -
The future of AI agents—and why OAuth must evolve
Our industry needs to continue working together on identity standards for agent access across systems. -
3 priorities for adopting proactive identity and access security in 2025
Adopting proactive defensive measures is the only way to get ahead of determined efforts to compromise identities and gain access to your environment. -
Convincing a billion users to love passkeys: UX design insights from Microsoft to boost adoption and security
Passkeys offer faster, safer sign-ins than passwords. -
Microsoft’s guidance to help mitigate Kerberoasting
Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. -
How Microsoft Entra ID supports US government agencies in meeting identity security requirements
United States Government agencies are adopting Microsoft Entra ID to consolidate siloed identity solutions, reduce operational complexity, and improve control and visibility across all users. -
Microsoft Incident Response tips for managing a mass password reset
When an active incident leaves systems vulnerable, a mass password reset may be the right tool to restore security. -
The four stages of creating a trust fabric with identity and network security
The trust fabric journey has four stages of maturity for organizations working to evaluate, improve, and evolve their identity and network access security posture. -
6 insights from Microsoft’s 2024 state of multicloud risk report to evolve your security strategy
Discover the top multicloud security risks across DevOps, runtime environments, identity and access, and data in this new report from Microsoft. -
Secure SaaS applications with Valence Security and Microsoft Security
The rapid adoption of Software as a Service (SaaS) has revolutionized collaboration and innovation across industries.