www.glueckkanja.com
Open in
urlscan Pro
104.17.239.25
Public Scan
Submitted URL: https://estas-seguro.es/
Effective URL: https://www.glueckkanja.com/en/security/global-secure-access/
Submission: On December 05 via automatic, source certstream-suspicious — Scanned from ES
Effective URL: https://www.glueckkanja.com/en/security/global-secure-access/
Submission: On December 05 via automatic, source certstream-suspicious — Scanned from ES
Form analysis
1 forms found in the DOMPOST /success/global-secure-access-en/
<form class="form__form js-validate mt-6" method="post" action="/success/global-secure-access-en/" novalidate="novalidate">
<div class="row mx-n3">
<div class="px-3 col-md-12">
<div class="form-field js-form-message form-group vue-component" data-utility-animation-step="1"><label class="input-label" for="name">Name*</label><input type="text" id="name" name="name" class="form-control" data-msg="Please enter your name."
required=""></div>
</div>
</div>
<div class="row mx-n3">
<div class="px-3 col-md-12">
<div class="form-field js-form-message form-group vue-component" data-utility-animation-step="1"><label class="input-label" for="company">Company name*</label><input type="text" id="company" name="company" class="form-control"
data-msg="Please provide your company name." required=""></div>
</div>
</div>
<div class="row mx-n3">
<div class="px-3 col-md-12">
<div class="form-field js-form-message form-group vue-component" data-utility-animation-step="1"><label class="input-label" for="email">Email address*</label><input type="email" id="email" name="email" class="form-control"
data-msg="Please enter your email address." required=""></div>
</div>
</div>
<div class="row mx-n3">
<div class="px-3 col-md-12">
<div class="form-field js-form-message form-group mb-3 vue-component" data-utility-animation-step="1">
<div class="form__checkbox-control custom-control custom-checkbox mb-1 vue-component"><input class="form__checkbox form-check-input custom-control-input" type="checkbox" name="dataprotection" id="dataprotection" required=""><label
class="form__checkbox-label custom-control-label" for="dataprotection">Your data will be stored with us for the purpose of processing and responding to your request. For more information on data protection, please refer to our
<a href="/en/privacy">Privacy Policy</a>.</label></div>
</div>
</div>
</div>
<div class="row mx-n3">
<div class="px-3 col-md-12">
<div class="form-field js-form-message form-group d-none vue-component" data-utility-animation-step="1"><input type="hidden" name="_subject" value="Anfrage Global Secure Access"></div>
</div>
</div>
<div class="row mx-n3">
<div class="px-3 col-md-12">
<div class="form-field js-form-message form-group d-none vue-component" data-utility-animation-step="1"><input type="hidden" name="inbox_key" value="security-workshops"></div>
</div>
</div>
<div class="row mx-n3">
<div class="px-3 col-md-12"><!----></div>
</div>
<div class="form__submit mt-5 justify-content-end"><button role="button" class="cta btn w-100 w-lg-auto btn-primary is-light vue-component" data-text="Send" type="submit"><span class="cta__text">Send</span><!----></button></div><input type="text"
class="form__super-field d-none" name="_gotcha">
</form>
Text Content
* WorkplaceWorkplace Portfolio * Managed Workplace * Consulting Services Microsoft 365 Endpoint * Microsoft Entra ID * Microsoft Intune * Microsoft Windows * Windows 365 Cloud PC * Azure Virtual Desktop Microsoft 365 Collaboration * Microsoft 365 Copilot * Teams * SharePoint & Power Platform * Exchange Online * Information Protection & Compliance * AzureAzure Portfolio * Azure Managed Services * Azure Consulting Scenarios * Plan your Cloud * Migrate to the cloud * Innovate your business Practices * Azure Foundation * AVD Foundation * Azure Emergency Response Environment * Cloud Adoption Framework * Cloud Competence Center * SecuritySecurity * Managed Red Tenant * Azure Emergency Response Environment * Security Consulting * Cloud Security Operations Center * Global Secure Access * Preventive Services * Data Security Service Under Attack? * ProductsProducts RealmJoin Cloudbased Software distribution SCEPman Certificate distribution from the cloud KONNEKT Work with your local office 365 data RealMigrator Migrate your data from one server to another TerraProvider Terraform Provider for Microsoft 365 RADIUSaaS Authentication for your network Unified Contacts Find contacts in Microsoft Teams * CompanyCompany About us * Facts & Figures * Contact & Locations Career * Career overview * Job offers Latest * Blog * Events * Career Contact deenes enen deenes Workplace Microsoft 365-powered for smart, secure, and flexible workspaces, seamlessly integrating cutting-edge technologies and identity services. ContactPortfolio * Managed Workplace * Consulting Services Microsoft 365 Endpoint * Microsoft Entra ID * Microsoft Intune * Microsoft Windows * Windows 365 Cloud PC * Azure Virtual Desktop Microsoft 365 Collaboration * Microsoft 365 Copilot * Teams * SharePoint & Power Platform * Exchange Online * Information Protection & Compliance Azure Fuel growth with Azure: Cut cloud costs, boost efficiency, and drive innovation through IaaS and PaaS. ContactPortfolio * Azure Managed Services * Azure Consulting Scenarios * Plan your Cloud * Migrate to the cloud * Innovate your business Practices * Azure Foundation * AVD Foundation * Azure Emergency Response Environment * Cloud Adoption Framework * Cloud Competence Center Security Vigilance in the cloud with an award-winning 24/7 managed service, incident response and state-of-the-art protection for your infrastructure. Under Attack? * Managed Red Tenant * Azure Emergency Response Environment * Security Consulting * Cloud Security Operations Center * Global Secure Access * Preventive Services * Data Security Service Products Innovative companion products for a completely secure, 100% cloud-native Microsoft environment that enhance collaboration, network authentication and software management. Contact RealmJoin Cloudbased Software distribution SCEPman Certificate distribution from the cloud KONNEKT Work with your local office 365 data RealMigrator Migrate your data from one server to another TerraProvider Terraform Provider for Microsoft 365 RADIUSaaS Authentication for your network Unified Contacts Find contacts in Microsoft Teams Company Pioneer in the Cloud: Your top Microsoft partner for comprehensive cloud solutions with a Blueprint-based approach and Infrastructure-as-Code expertise. ContactAbout us * Facts & Figures * Contact & Locations Career * Career overview * Job offers Latest * Blog * Events Remote work has fundamentally transformed the workplace, prompting companies to reconsider how to ensure secure access to data and applications. The answer lies in Security Service Edge (SSE). Say goodbye to outdated VPN solutions GLOBAL SECURE ACCESS Remote work has fundamentally transformed the workplace, prompting companies to reconsider how to ensure secure access to data and applications. The answer lies in Security Service Edge (SSE). SECURITY FOR A CONNECTED WORK ENVIRONMENT Microsoft introduces Global Secure Access, a central Security Service Edge (SSE) solution for security management that operates both in the cloud and on-premises. Comprehensive security is achieved through the integration of Zero Trust principles, which emphasize robust identity protection and conditional access. This allows for the granular establishment of different rule sets for specific services, whether they are cloud-based or on-premises. Discover the details of how Microsoft's Security Service Edge (SSE) functions in our webcast on the topic. MICROSOFT'S SECURITY SERVICE EDGE (SSE) Global Secure Access is designed to deliver security services through the cloud, supporting managed devices across all major platforms. This includes integration with identity providers and security tools such as XDR or SIEM. The architecture of the SSE solution is divided into two main areas, each with different components: * Internet Access features an identity-centered Secure Web Gateway (SWG) that functions similarly to a forward proxy. It not only protects against malware and other threats but also performs URL category filtering. * Private Access is an identity-centered Zero Trust Network Access (ZTNA) solution that allows granular and consistent access to non-public applications regardless of their location, implementing detailed context-based access control. INTEGRATION ENTRA GOVERNANCE * Integration with Identity & Access Management and Identity Governance features of Entra * App segments are mapped as enterprise apps * Uses features such as dynamic groups and access packages CONDITIONAL ACCESS * Integration in Conditional Access right from the start * Securing defined resources with Conditional Access * Use of the solution as an access condition for resources XDR & SIEM * Integration with Microsoft's own security products * Use of the logs generated by Global Secure Access in Sentinel * Direct influence of the device risk from Defender for Endpoint on Conditional Access * Announced integration with Defender for Cloud Apps as a CASB component in XDR USE CASES Tenant Restrictions Enhance the protection of your company data with the "Tenant Restrictions" feature of Global Secure Access. This function extends the existing "Guest Restrictions" and allows you to precisely control which tenants users can log in from. This control is crucial for compliance adherence and effectively protects your company resources from unauthorized access. VPN Replacement Private Access effortlessly replaces existing VPN infrastructures and significantly increases security standards through integration with Conditional Access. The "Quick Access" configuration enables step-by-step segmentation of network access, supported by advanced integrated reporting. Each of these segments can then be comprehensively secured using detailed control mechanisms. SSE Coexistence Many companies face challenges due to IP and location mismatches when using SWG solutions in combination with Microsoft 365 services. The general recommendation is therefore to exclude access via third-party proxies and SWGs. Microsoft has recognized this and responded with the introduction of IP Address Restoration. This solution can also be used effectively in coexistence scenarios, as Microsoft has privileged access to the Windows network stack. OUTLOOK With the continuous advancement of Global Secure Access technologies, Microsoft is adapting to the increasingly complex demands of network security. These innovations not only ensure the security of your data but also enable specific customization of access to corporate applications, paving the way for a more detailed and effective security infrastructure. Stay tuned for the next steps in the evolution of network security! OUR OFFER TO YOU We are eager to assist you in integrating Global Secure Access into your comprehensive Identity and Access Management/Zero Trust strategy. We will actively support you through both a Proof of Concept and the subsequent rollout. Name* Company name* Email address* Your data will be stored with us for the purpose of processing and responding to your request. For more information on data protection, please refer to our Privacy Policy. Send Jan Geisbauer +49 69 4005520 info@glueckkanja.com * Germany, Switzerland, Austria, Spain, Australia * info@glueckkanja.com -------------------------------------------------------------------------------- * Privacy * Imprint * No Cookies * * * * Copyright © 2024 glueckkanja AG. All rights reserved. OOPS, ADBLOCKER DETECTED! To keep our website running smoothly, add us to the whitelist. We won't annoy you with ads. Promise!