Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced support for Microsoft External Authentication Methods (EAM) for its Conditional Access for Applications solution. This new integration extends Portnox’s commitment to delivering phishing-resistant passwordless authentication with risk-based assessment and compliance validation for enterprise applications.
Cyber Technology News: ProArch Joins Microsoft Intelligent Security Association
Microsoft’s EAM capability allows users to authenticate using non-Microsoft solutions, such as certificate-based authentication, FIDO2 keys, and third-party identity providers, further strengthening their access control policies across cloud, hybrid, and on-prem environments.
By incorporating Microsoft EAM into its Conditional Access for Applications solution, Portnox now provides customers with:
- Enhanced Controls: An added layer of authentication security provided by continuous endpoint risk posture assessment for customers using Microsoft Entra ID.
- Improved User Experience: A streamlined login experience that allows users to ditch passwords and replace hackable multi-factor methods with certificate-based authentication.
“With our support for Microsoft External Authentication Methods, customers can now improve access control and security across their entire suite of enterprise applications managed through Entra ID,” said Denny LeCompte, CEO at Portnox. “This is just one more way Portnox continues to lead the charge in making passwordless, cloud-native access control accessible, scalable, and secure for the modern enterprise.”
Cyber Technology News: Trend Micro: Devices & Accounts Are Top-Risk Assets
This integration supports Portnox’s broader vision of providing a unified access control platform that meets the security and operational needs of enterprise organizations. As threats to identity and access control continue to evolve, Portnox remains committed to ensuring that its customers can confidently adopt the latest, most secure authentication technologies to protect their critical IT assets.
Source – prnewswire
To share your insights, please write to us at news@intentamplify.com