Leveraging Zero Trust Access Control Capabilities from Entra ID P2 to Secure our Edge Network.
Overall Satisfaction with Microsoft Entra ID
We use MSFT EntraID P2 to apply a Zero-trust access control toolkit to our API interface. In particular, we use EntraID auto enrollment feature to onboard edge devices in our edge network. We use EntraID auto enrollment in conjunction Intune to allow conditional access for edge devices and protect data in Zero trust framework. We use EntraID across our web applications.
Pros
- Zero trust access controls.
- Auto-enrollment of edge devices.
- Interoperable with endpoint security products.
Cons
- EntraID P2 does not provide comprehensive protection against lateral attacks.
- Cross-tenant synchronization can be used in breach scenarios to gain malicious entry via tenant-to-tenant literal movement.
- EntraID has reduced our endpoint device onboarding from 2 hours to 19 minutes via automated operations provisioning.
- EntraID has enabled a seamless auto-enrollment workflow for endpoint devices.
- EntraID has provided us with cross-tenant synchronization by admin for organization-wide resources.
We have Entra ID P2 integrated with our cloud native stack and automated deployment pipeline.
No.
Salesforce SaaS applications: We don't have on-premises apps.
Yes, we have experienced a much greater level of customer satisfaction from end-business customers following deployments, primarily due to seamless endpoint device onboarding following Entra ID deployment.
Do you think Microsoft Entra ID delivers good value for the price?
Yes
Are you happy with Microsoft Entra ID's feature set?
Yes
Did Microsoft Entra ID live up to sales and marketing promises?
Yes
Did implementation of Microsoft Entra ID go as expected?
Yes
Would you buy Microsoft Entra ID again?
Yes



Comments
Please log in to join the conversation