RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
Project

"K2 Cybersecurity" finds replacement for Microsoft Azure 2FA - Indeed AM

Customers: K2 Cybersecurity

Moscow; Information security

Product: Indeed Access Manager (Indeed AM)

Project date: 2024/01  - 2024/07

2024: Transition to Indeed AM

K2 Cybersecurity implemented and tested the solution two-factor authentication for the Company. Indid The pilot's premise was March statements Microsoft about a possible shutdown for cloud services Microsoft 365 the Russian corporate clients. This list includes the 2FA Microsoft Azure to protect remote access. K2 Tekh announced this on August 22, 2024.

Based on the results of testing, K2 Cybersecurity specialists came to the conclusion that two-factor authentication from Indid Company (Indeed AM Platform) is a worthy replacement for a foreign solution.

Among the features of Indeed AM, K2 Cybersecurity experts highlighted:

  • functionality;
  • Integration with Microsoft Active Directory, Microsoft Active Directory Federation Service, Internet Information Services, NPS
  • stable operation;
  • regular updates;
  • Simple management interface.

File:Aquote1.png
We use two-factor authentication to protect the remote access of external users to internal information systems. The risk of turning off Microsoft's cloud tools forced us to quickly find an effective replacement from a Russian developer so as not to depend on the foreign policy situation. Several different solutions were propilated, including cloud. As a result, we settled on two-factor authentication Indeed AM, because it has all the functionality we need. Testing of the solution was successful and confirmed our choice. Therefore, we plan to use it not only for our own tasks, but also actively offer it to our customers, - commented Sergey Kutsenko, a leading expert in the field of IT infrastructure protection in the Cybersecurity K2.
File:Aquote2.png

File:Aquote1.png
We are glad that our partnership with K2 Cybersecurity allows companies in Russia to use advanced technologies to strengthen information security. This helps them meet the criteria of the import substitution program, ensure compliance with regulatory requirements and implementation of compliance with regulatory documents (GOST, FSTEC, etc.), - said Kirill Michurin, head of the sales group of Indid Company.
File:Aquote2.png