{"id":37274,"date":"2020-09-22T14:57:12","date_gmt":"2020-09-22T14:57:12","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91834"},"modified":"2020-09-22T14:57:12","modified_gmt":"2020-09-22T14:57:12","slug":"identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/","title":{"rendered":"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity"},"content":{"rendered":"<p>These past months have changed the way we work in so many ways. When businesses and schools went remote overnight, many of you had to adapt quickly to ensure your users could stay productive while working from home. Bad actors are trying to exploit these seismic shifts, making it more important than ever to secure access to your digital estate.<\/p>\n<p>Those of us working in the Identity Division at Microsoft have learned from your resilience as we have tackled these challenges together. In July, I shared the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/07\/27\/guiding-principles-identity-products\/\" target=\"_blank\" rel=\"noopener noreferrer\">four principles guiding our identity investments<\/a>. Today on the virtual Microsoft Ignite stage, I\u2019m pleased to announce several Azure Active Directory innovations shaped by what we have learned from working alongside you.<\/p>\n<h2>Empower your workforce without sacrificing control<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust principles<\/a> are at the core of how we build and invest in identity. We never trust, and we always verify. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/zero-trust\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust<\/a> starts with cloud identity, using real-time risk assessment powering fine-grained access controls. Many of you use Azure AD Conditional Access as your Zero Trust policy engine. Now, with <a href=\"http:\/\/aka.ms\/CAInsights\" target=\"_blank\" rel=\"noopener noreferrer\">Conditional Access insights<\/a> in public preview, recommendations that identify gaps in your policies help you stay more protected. For example, a common recommendation is to <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/new-tools-to-block-legacy-authentication-in-your-organization\/ba-p\/1225302\" target=\"_blank\" rel=\"noopener noreferrer\">block legacy authentication by default<\/a> to protect your accounts from malicious authentication requests.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-91892\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-1-1024x401.png\" alt=\"See the breakdown of sign-ins for each Conditional Access condition.\" width=\"1024\" height=\"401\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-1-1024x401.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-1-300x118.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-1-768x301.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-1.png 1370w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p><em>See the breakdown of sign-ins for each Conditional Access condition.<\/em><\/p>\n<p>To help simplify configuration, the <strong>Azure AD Conditional Access API<\/strong> is now generally available in Microsoft Graph. You can use PowerShell or another custom scripting to automate and scale policy management.<\/p>\n<p>Since organizations are engaging with an&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/06\/turning-collaboration-customer-engagement-up-strong-identity-approach\/\" target=\"_blank\" rel=\"noopener noreferrer\">unprecedented number of&nbsp;external users<\/a>, we\u2019ve also made sure that Conditional Access works for <em>all<\/em> of your identities. <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/azure-active-directory-external-identities-goes-premium-with\/ba-p\/1604572\" target=\"_blank\" rel=\"noopener noreferrer\">Conditional Access and Identity Protection for Azure AD B2C<\/a>, now available in public preview, is included in our unified Azure AD External Identities offer, so you can protect your customers\u2019 accounts from compromise and make it easier for them to engage with your business. We\u2019ve also <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/identity-protection\/concept-identity-protection-risks#risk-types-and-detection\" target=\"_blank\" rel=\"noopener noreferrer\">enhanced our Identity Protection capabilities<\/a> for all identity types, with updates such as an enhanced real-time risk engine and password spray risk detection.<\/p>\n<h2>Enable single sign-on for all employee apps, from any device<\/h2>\n<p>A seamless user experience is essential to productivity, especially when employees are collaborating from multiple locations and devices. One of the best ways to keep your users both protected <em>and<\/em> seamlessly connected to all their applications is by enabling single sign-on (SSO).<\/p>\n<p>Azure AD is making it easier to provide secure and seamless access to applications of all types: to SaaS apps, to custom apps built decades ago, and to new cloud apps that you build. We enhanced <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/what-is-application-proxy\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD Application Proxy<\/a> so that in addition to configuring SSO to legacy on-premises apps, you can connect apps that use <strong>header-based authentication<\/strong>, the most popular legacy authentication protocol. This update will be available in October 2020, when it reaches public preview.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-91893\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-2-1024x458.png\" alt=\" Deliver consistent single sign-on experiences to legacy apps.\" width=\"1024\" height=\"458\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-2-1024x458.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-2-300x134.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-2-768x343.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-2-1536x687.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/09\/Ignite-Identity-2.png 1655w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p><em>Deliver consistent single sign-on experiences to legacy apps<\/em><\/p>\n<p>We\u2019ve continued to expand our ecosystem of <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/sso\/secure-hybrid-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">secure hybrid access partnerships<\/a>, adding Kemp, Palo Alto Networks, Cisco AnyConnect, Fortinet, and Strata. Any applications connected to existing networking and app delivery controllers from these partners can now benefit from cloud security powered by Azure AD.<\/p>\n<p>And we\u2019re continually working to make it effortless to manage your favorite SaaS apps. For example, we\u2019ve built deeper integrations with popular applications like Adobe and ServiceNow to ensure efficient lifecycle management. With ServiceNow, IT and hiring managers can automatically provision application access with the <a href=\"https:\/\/docs.servicenow.com\/bundle\/paris-hr-service-delivery\/page\/product\/human-resources\/task\/set-up-microsoft-azure-ad-integration-for-new-hire-onboarding.html\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD integration for new hires<\/a>. And Adobe customers will soon be able to provision accounts using the SCIM standard for the core Adobe Identity Management platform across Adobe Creative Cloud, Adobe Document Cloud, and Adobe Experience Cloud. We\u2019ve also worked with Apple to ensure that client apps connected to Azure AD have a <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/develop\/apple-sso-plugin\" target=\"_blank\" rel=\"noopener noreferrer\">seamless SSO experience on all iOS devices<\/a>.<\/p>\n<p>As application usage rises in the era of remote work\u2014and with it, application-based compromises\u2014it\u2019s critical to empower end-users to access applications that are secure and trustworthy. At <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/build-2020-fostering-a-secure-and-trustworthy-app-ecosystem-for\/ba-p\/1257360\">Build<\/a>, we announced the preview of <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/configure-user-consent\" target=\"_blank\" rel=\"noopener noreferrer\">application consent policies<\/a> that allow end-users to give applications you trust\u2014such as applications from your organization or from <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/develop\/publisher-verification-overview\" target=\"_blank\" rel=\"noopener noreferrer\">verified publishers<\/a>\u2014permissions to access data. You can set up the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/configure-admin-consent-workflow\" target=\"_blank\" rel=\"noopener noreferrer\">admin consent workflow<\/a> to give end-users a streamlined way to request admin approval for other applications. And with <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/develop\/publisher-verification-overview\" target=\"_blank\" rel=\"noopener noreferrer\">publisher verification<\/a> now generally available, app developers can signal to admins and end-users that they have verified their identity using a Microsoft Partner Network account associated with the app registration.<\/p>\n<h2>Eliminate friction through future-proofed identity<\/h2>\n<p>The pandemic has accelerated digital transformation, bringing additional focus to our investments in the future of identity. At Microsoft, we believe that decentralized identifiers are core to the future of identity systems. We all want to trust that our information will be secure and only shared with our consent, so decentralized identity systems will empower users to own their own identity and the information attached to it. This is a community effort, built on new open standards. The model will easily integrate with your existing identity systems, and it uses an open-source blockchain solution designed so that no single organization owns or controls it\u2014including Microsoft.<\/p>\n<p>This vision is already becoming real. For example, we are partnering with the United States Department Defense (DOD) to <strong>pilot decentralized identity for their MilGears educational program<\/strong>. The MilGears program helps US military veterans and retiring service members enroll in higher education as they transition to civilian careers. Microsoft and the DOD are piloting <a href=\"http:\/\/aka.ms\/DIDforDevs\" target=\"_blank\" rel=\"noopener noreferrer\">verifiable credentials<\/a>, a digital information validation feature so that MilGears participants can reduce the time it takes to confirm their skills and education from months to days. From the <a href=\"https:\/\/military.microsoft.com\/programs\/microsoft-software-systems-academy\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Software and Systems Academy<\/a> and <a href=\"https:\/\/blogs.microsoft.com\/blog\/2020\/06\/30\/microsoft-launches-initiative-to-help-25-million-people-worldwide-acquire-the-digital-skills-needed-in-a-covid-19-economy\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft global skills initiative<\/a> to our DOD pilot with MilGears, Microsoft is deeply invested in realizing the potential of this technology to eliminate career barriers for every individual.<\/p>\n<h2>Looking forward<\/h2>\n<p>2020 is a year we\u2019ll all remember for its intensity and accelerated pace of change. Keeping your users secure, wherever they are, has been our collective priority. No matter how the \u201cnew normal\u201d unfolds after this pandemic, identity will remain the heartbeat of all the services your users rely on. As you try out the new features we have announced at Microsoft Ignite, please <a href=\"http:\/\/twitter.com\/azuread\" target=\"_blank\" rel=\"noopener noreferrer\">send us your feedback<\/a> so we can continue to build advancements that help you keep your employees secure and connected.<\/p>\n<p><em>See these features in action when I take the Microsoft Ignite stage today by registering for free at <a href=\"https:\/\/myignite.microsoft.com\/home\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Ignite<\/a><\/em><em> and watching my session <a href=\"https:\/\/myignite.microsoft.com\/sessions\/6ff1bb44-d2cf-4002-9db5-ab90c96fccf2\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><\/em><em> starting at 11:30 am PT, with future airings for other regions. Follow Microsoft identity at&nbsp;<\/em><a href=\"https:\/\/twitter.com\/azuread\" target=\"_blank\" rel=\"noopener noreferrer\"><em>@AzureAD<\/em><\/a><em> on Twitter&nbsp;for more news and best practices.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/09\/22\/microsoft-identity-ignite-rising-challenges-secure-remote-access-employee-productivity\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keeping your users secure, wherever they are, has been our collective priority. Identity remains the heartbeat of all the services your users rely on.<br \/>\nThe post Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37275,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[3259,347,6696,3677],"class_list":["post-37274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-access-control","tag-cybersecurity","tag-identity-and-access-management","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-22T14:57:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity\",\"datePublished\":\"2020-09-22T14:57:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/\"},\"wordCount\":1142,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png\",\"keywords\":[\"access control\",\"Cybersecurity\",\"Identity and access management\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/\",\"name\":\"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png\",\"datePublished\":\"2020-09-22T14:57:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png\",\"width\":1024,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"access control\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/access-control\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/","og_locale":"en_US","og_type":"article","og_title":"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-22T14:57:12+00:00","og_image":[{"width":1024,"height":401,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity","datePublished":"2020-09-22T14:57:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/"},"wordCount":1142,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png","keywords":["access control","Cybersecurity","Identity and access management","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/","url":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/","name":"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png","datePublished":"2020-09-22T14:57:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity.png","width":1024,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/identity-at-microsoft-ignite-rising-to-the-challenges-of-secure-remote-access-and-employee-productivity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"access control","item":"https:\/\/www.threatshub.org\/blog\/tag\/access-control\/"},{"@type":"ListItem","position":3,"name":"Identity at Microsoft Ignite: Rising to the challenges of secure remote access and employee productivity"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37274"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37274\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37275"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}