Two Factor Authentication

Using device as the 2nd factor for
Easy & secure authentication.
Protect SfB & Exchange EWS

Explore >

Ethical Wall

Granular policy for all activities
(IM, File sharing, presence etc.) controlling
external (Federation) and internal traffic

Explore >

Block DoS, DDoS & Brute Force Attacks

Prevent network account lockout
from DDoS attacks

Explore >

Application Firewall

Sanitize, inspect and validate all
anonymous requests in the DMZ

Explore >

Protect AD Credentials

Avoid using domain password by
creating dedicated app password

Explore >

MDM Conditional Access

Verify that only managed devices
that are compliant with
security policy can connect to SfB

Explore >

RSA Token Authentication

Secure OTP & TFA utilizing
RSA infrastructure

Explore >

Data Leak Prevention

Inspect content passing through
Skype for Business
DLP (Data Lost Prevention) policy

Explore >

Device Access Control

Manage devices connected using
device enrollment process

Explore >