As early adopters, baseVISION took a decisive step by acquiring licenses for Microsoft Entra Private Access and the Governance Suite for all users. This strategic move marked the beginning of a transformative journey toward a fully integrated and secure identity infrastructure.
We transitioned from manually managing users to a fully automated lifecycle management solution powered by Microsoft Entra ID. This shift enabled seamless provisioning and maintenance of users and groups throughout the entire employee lifecycle from our HR System (Zoho People).
What once required hundreds of manual actions and was prone to data inconsistencies is now executed with a single click – ensuring consistency, accuracy, and operational efficiency.
With Microsoft Entra ID Governance, we successfully streamlined our identity lifecycle processes and significantly reduced manual effort. Lifecycle workflow delivers a state-of-the-art Joiner, Mover, and Leaver experience. Entitlement Management ensures employees receive the right access precisely when needed through. Thanks to its effortless integration with both cloud and on-premises environments, implementation was fast, smooth, and aligned perfectly with our existing ecosystem.
Janic Verboon, Endpoint Consultant
baseVISION AG
Reports such as from our baseVISION Security Operation Center, the Microsoft Digital Defense Report and the Swiss NCSC highlight that phishing remains a frequent method for initiating cyber attacks. In response, we implemented phish-resistant authentication, which decreased our vulnerability to phishing attempts. This initiative not only enhanced overall security and supported confidence within our digital ecosystem but also simplified user onboarding since we no longer need to distribute passwords over unsecure channels. We recommend everyone to start the phish-resistant authentication journey as soon as possible.
Additionally, we utilise Microsoft Entra Private Access to safeguard assets, facilitate remote connectivity, and eliminate reliance on third-party VPN solutions. This approach mitigates the risk of data leakage by implementing a secure transport layer and enforcing access controls founded on Zero Trust principles with Conditional Access.