Event banner
Trail tip: Secure access to any app—legacy to AI, no VPN needed
Event details
Thanks for joining today’s session! Here's an overview of topics and questions our panelists covered during this session:
Quick overview of the Microsoft Entra Suite & Demo - started at 1:18.
Q&A with Product experts - started at 18:36.
Question – How does unifying identity and network access make things better for our company on a day-to-day basis? - answered at 19:47.
Question – Does Microsoft have any preferred physical security keys that help prevent unauthorized access to company information? - answered at 22:14.
Question – I heard Conditional Access referred to as a "Zero Trust policy engine". What does that mean exactly? - answered at 23:31.
Question – What are the first steps we should take to move off legacy VPNs? Do companies that have done this successfully see the process as a large lift? - answered at 25:14.
Question – In the past, when remote users needed access to on prem apps, we relied on VPNs. Even with MFA in place, the challenge was that once a user connected, they often had broad access to the entire network. How does Private Access and ZTNA (Zero Trust Network Access) change this? - answered at 29:34.
Question – How does Private Access coexist with existing SSE providers? - answered at 33:09.
- To learn more, go to aka.ms/EntraSecureAccessPartners
Question – How does ID Protection help me with auditing? How can I help my SOC team? - answered at 35:09.
Question – I read about app discovery. Can you tell me more about how that works? - answered at 36:37.
Question – Can you share what else is new? - answered at 39:16.
Question – We are a global company. Does Entra Suite help us account for that so that our users don't encounter network latency? - answered at 41:32.
Question – Any final advice for organizations looking to integrate the Entra Suite and Private Access capabilities into their existing infrastructure? - answered at 44:02.