www.glueckkanja.com Open in urlscan Pro
104.17.239.25  Public Scan

Submitted URL: https://estas-seguro.es/
Effective URL: https://www.glueckkanja.com/en/security/global-secure-access/
Submission: On December 05 via automatic, source certstream-suspicious — Scanned from ES

Form analysis 1 forms found in the DOM

POST /success/global-secure-access-en/

<form class="form__form js-validate mt-6" method="post" action="/success/global-secure-access-en/" novalidate="novalidate">
  <div class="row mx-n3">
    <div class="px-3 col-md-12">
      <div class="form-field js-form-message form-group vue-component" data-utility-animation-step="1"><label class="input-label" for="name">Name*</label><input type="text" id="name" name="name" class="form-control" data-msg="Please enter your name."
          required=""></div>
    </div>
  </div>
  <div class="row mx-n3">
    <div class="px-3 col-md-12">
      <div class="form-field js-form-message form-group vue-component" data-utility-animation-step="1"><label class="input-label" for="company">Company name*</label><input type="text" id="company" name="company" class="form-control"
          data-msg="Please provide your company name." required=""></div>
    </div>
  </div>
  <div class="row mx-n3">
    <div class="px-3 col-md-12">
      <div class="form-field js-form-message form-group vue-component" data-utility-animation-step="1"><label class="input-label" for="email">Email address*</label><input type="email" id="email" name="email" class="form-control"
          data-msg="Please enter your email address." required=""></div>
    </div>
  </div>
  <div class="row mx-n3">
    <div class="px-3 col-md-12">
      <div class="form-field js-form-message form-group mb-3 vue-component" data-utility-animation-step="1">
        <div class="form__checkbox-control custom-control custom-checkbox mb-1 vue-component"><input class="form__checkbox form-check-input custom-control-input" type="checkbox" name="dataprotection" id="dataprotection" required=""><label
            class="form__checkbox-label custom-control-label" for="dataprotection">Your data will be stored with us for the purpose of processing and responding to your request. For more information on data protection, please refer to our
            <a href="/en/privacy">Privacy Policy</a>.</label></div>
      </div>
    </div>
  </div>
  <div class="row mx-n3">
    <div class="px-3 col-md-12">
      <div class="form-field js-form-message form-group d-none vue-component" data-utility-animation-step="1"><input type="hidden" name="_subject" value="Anfrage Global Secure Access"></div>
    </div>
  </div>
  <div class="row mx-n3">
    <div class="px-3 col-md-12">
      <div class="form-field js-form-message form-group d-none vue-component" data-utility-animation-step="1"><input type="hidden" name="inbox_key" value="security-workshops"></div>
    </div>
  </div>
  <div class="row mx-n3">
    <div class="px-3 col-md-12"><!----></div>
  </div>
  <div class="form__submit mt-5 justify-content-end"><button role="button" class="cta btn w-100 w-lg-auto btn-primary is-light vue-component" data-text="Send" type="submit"><span class="cta__text">Send</span><!----></button></div><input type="text"
    class="form__super-field d-none" name="_gotcha">
</form>

Text Content

 * WorkplaceWorkplace
   Portfolio
    * Managed Workplace
    * Consulting Services
   
   Microsoft 365 Endpoint
    * Microsoft Entra ID
    * Microsoft Intune
    * Microsoft Windows
    * Windows 365 Cloud PC
    * Azure Virtual Desktop
   
   Microsoft 365 Collaboration
    * Microsoft 365 Copilot
    * Teams
    * SharePoint & Power Platform
    * Exchange Online
    * Information Protection & Compliance

 * AzureAzure
   Portfolio
    * Azure Managed Services
    * Azure Consulting
   
   Scenarios
    * Plan your Cloud
    * Migrate to the cloud
    * Innovate your business
   
   Practices
    * Azure Foundation
    * AVD Foundation
    * Azure Emergency Response Environment
    * Cloud Adoption Framework
    * Cloud Competence Center

 * SecuritySecurity
    * Managed Red Tenant
    * Azure Emergency Response Environment
    * Security Consulting
   
    * Cloud Security Operations Center
    * Global Secure Access
   
    * Preventive Services
    * Data Security Service
   
   Under Attack?
 * ProductsProducts
   RealmJoin
   Cloudbased Software distribution
   SCEPman
   Certificate distribution from the cloud
   KONNEKT
   Work with your local office 365 data
   RealMigrator
   Migrate your data from one server to another
   TerraProvider
   Terraform Provider for Microsoft 365
   RADIUSaaS
   Authentication for your network
   Unified Contacts
   Find contacts in Microsoft Teams
 * CompanyCompany
   About us
    * Facts & Figures
    * Contact & Locations
   
   Career
    * Career overview
      
    * Job offers
   
   Latest
    * Blog
    * Events

 * Career

Contact
deenes
enen
deenes
Workplace
Microsoft 365-powered for smart, secure, and flexible workspaces, seamlessly
integrating cutting-edge technologies and identity services.
ContactPortfolio
 * Managed Workplace
 * Consulting Services

Microsoft 365 Endpoint
 * Microsoft Entra ID
 * Microsoft Intune
 * Microsoft Windows
 * Windows 365 Cloud PC
 * Azure Virtual Desktop

Microsoft 365 Collaboration
 * Microsoft 365 Copilot
 * Teams
 * SharePoint & Power Platform
 * Exchange Online
 * Information Protection & Compliance

Azure
Fuel growth with Azure: Cut cloud costs, boost efficiency, and drive innovation
through IaaS and PaaS.
ContactPortfolio
 * Azure Managed Services
 * Azure Consulting

Scenarios
 * Plan your Cloud
 * Migrate to the cloud
 * Innovate your business

Practices
 * Azure Foundation
 * AVD Foundation
 * Azure Emergency Response Environment
 * Cloud Adoption Framework
 * Cloud Competence Center

Security
Vigilance in the cloud with an award-winning 24/7 managed service, incident
response and state-of-the-art protection for your infrastructure.
Under Attack?
 * Managed Red Tenant
 * Azure Emergency Response Environment
 * Security Consulting

 * Cloud Security Operations Center
 * Global Secure Access

 * Preventive Services
 * Data Security Service

Products
Innovative companion products for a completely secure, 100% cloud-native
Microsoft environment that enhance collaboration, network authentication and
software management.
Contact
RealmJoin
Cloudbased Software distribution
SCEPman
Certificate distribution from the cloud
KONNEKT
Work with your local office 365 data
RealMigrator
Migrate your data from one server to another
TerraProvider
Terraform Provider for Microsoft 365
RADIUSaaS
Authentication for your network
Unified Contacts
Find contacts in Microsoft Teams
Company
Pioneer in the Cloud: Your top Microsoft partner for comprehensive cloud
solutions with a Blueprint-based approach and Infrastructure-as-Code expertise.
ContactAbout us
 * Facts & Figures
 * Contact & Locations

Career
 * Career overview
   
 * Job offers

Latest
 * Blog
 * Events




Remote work has fundamentally transformed the workplace, prompting companies to
reconsider how to ensure secure access to data and applications. The answer lies
in Security Service Edge (SSE).

Say goodbye to outdated VPN solutions


GLOBAL SECURE ACCESS

Remote work has fundamentally transformed the workplace, prompting companies to
reconsider how to ensure secure access to data and applications. The answer lies
in Security Service Edge (SSE).




SECURITY FOR A CONNECTED WORK ENVIRONMENT

Microsoft introduces Global Secure Access, a central Security Service Edge (SSE)
solution for security management that operates both in the cloud and
on-premises. Comprehensive security is achieved through the integration of Zero
Trust principles, which emphasize robust identity protection and conditional
access. This allows for the granular establishment of different rule sets for
specific services, whether they are cloud-based or on-premises. Discover the
details of how Microsoft's Security Service Edge (SSE) functions in our webcast
on the topic.





MICROSOFT'S SECURITY SERVICE EDGE (SSE)

Global Secure Access is designed to deliver security services through the cloud,
supporting managed devices across all major platforms. This includes integration
with identity providers and security tools such as XDR or SIEM.

The architecture of the SSE solution is divided into two main areas, each with
different components:


 * Internet Access features an identity-centered Secure Web Gateway (SWG) that
   functions similarly to a forward proxy. It not only protects against malware
   and other threats but also performs URL category filtering.
 * Private Access is an identity-centered Zero Trust Network Access (ZTNA)
   solution that allows granular and consistent access to non-public
   applications regardless of their location, implementing detailed
   context-based access control.




INTEGRATION


ENTRA GOVERNANCE

 * Integration with Identity & Access Management and Identity Governance
   features of Entra
 * App segments are mapped as enterprise apps
 * Uses features such as dynamic groups and access packages


CONDITIONAL ACCESS

 * Integration in Conditional Access right from the start
 * Securing defined resources with Conditional Access
 * Use of the solution as an access condition for resources


XDR & SIEM

 * Integration with Microsoft's own security products
 * Use of the logs generated by Global Secure Access in Sentinel
 * Direct influence of the device risk from Defender for Endpoint on Conditional
   Access
 * Announced integration with Defender for Cloud Apps as a CASB component in XDR


USE CASES


Tenant Restrictions
Enhance the protection of your company data with the "Tenant Restrictions"
feature of Global Secure Access. This function extends the existing "Guest
Restrictions" and allows you to precisely control which tenants users can log in
from. This control is crucial for compliance adherence and effectively protects
your company resources from unauthorized access.
VPN Replacement
Private Access effortlessly replaces existing VPN infrastructures and
significantly increases security standards through integration with Conditional
Access. The "Quick Access" configuration enables step-by-step segmentation of
network access, supported by advanced integrated reporting. Each of these
segments can then be comprehensively secured using detailed control mechanisms.
SSE Coexistence
Many companies face challenges due to IP and location mismatches when using SWG
solutions in combination with Microsoft 365 services. The general recommendation
is therefore to exclude access via third-party proxies and SWGs. Microsoft has
recognized this and responded with the introduction of IP Address Restoration.
This solution can also be used effectively in coexistence scenarios, as
Microsoft has privileged access to the Windows network stack.



OUTLOOK

With the continuous advancement of Global Secure Access technologies, Microsoft
is adapting to the increasingly complex demands of network security. These
innovations not only ensure the security of your data but also enable specific
customization of access to corporate applications, paving the way for a more
detailed and effective security infrastructure. Stay tuned for the next steps in
the evolution of network security!



OUR OFFER TO YOU

We are eager to assist you in integrating Global Secure Access into your
comprehensive Identity and Access Management/Zero Trust strategy. We will
actively support you through both a Proof of Concept and the subsequent rollout.
Name*
Company name*
Email address*
Your data will be stored with us for the purpose of processing and responding to
your request. For more information on data protection, please refer to our
Privacy Policy.



Send
Jan Geisbauer
+49 69 4005520
info@glueckkanja.com
   
   
   
   
   
 * Germany, Switzerland, Austria, Spain, Australia
 * info@glueckkanja.com




--------------------------------------------------------------------------------

 * Privacy
 * Imprint
 * No Cookies

 * 
 * 
 * 
 * 

Copyright © 2024 glueckkanja AG. All rights reserved.

OOPS, ADBLOCKER DETECTED!

To keep our website running smoothly, add us to the whitelist. We won't annoy
you with ads. Promise!