https://store-images.s-microsoft.com/image/apps.288.7d8a6e95-242b-4747-afa6-4ec91f424a2a.85ff966e-f384-46dd-9c81-ddec930b9fbc.3258569c-c66c-4ae8-a082-c07b183506c3

Global Secure Access with Microsoft Entra

One Step Beyond SA

Enhance security, optimize performance, and simplify operations by eliminating traditional VPNs and Legacy Proxies, providing application-level access through a Zero Trust architecture.

One Step Beyond Enables Organizations to Implement Microsoft Solutions

One Step Beyond enables organizations to deploy a comprehensive Global Secure Access (GSA) Proof of Value, combining Microsoft Entra Internet Access and Microsoft Entra Private Access solutions for a secure, identity-centric access to both internet and private network resources, while adhering to Zero Trust principles – realizing the benefits of a “secure access for any identity, from anywhere, to any app, AI, or resource”.

Outcomes

  • Enhanced security: Comprehensive protection of users and resources, built on the Zero Trust model.
  • Optimal performance: Reduced latency for critical services like Microsoft 365.
  • Simplified management: Unified management of connectivity and security tools.
  • Infrastructure modernization: Replacement of legacy VPN and Proxy.
  • Cost reduction: Consolidating multiple services saves on security and access management expenses.
  • Improved user experience: Eliminates complexities associated with traditional VPNs.

Timeline

Assessment and Planning – 1 week

Understand the current architecture and define the objectives for a successful Global Secure Access Proof of Value.

Key Activities:

  • IAM analysis (Microsoft 365 access, identities, usage, devices, Conditional Access).
  • Network environment analysis (network, segmentation, external/internal access).
  • Web filtering and security policy assessment.
  • Stakeholder meetings to align on security, compliance, and access requirements.

Outputs:

  • Microsoft 365 Access Design document.
  • Internet Access Design document.
  • Private Access Design document.

Configuration and Implementation – 2 weeks

Deployment of Global Secure Access (GSA) solutions for private and internet access.

Key Activities:

  • Web Content Filtering: enabling internet traffic forwarding, creating security policies.
  • Microsoft Traffic Profile Configuration for Exchange Online, SharePoint, OneDrive.
  • Private Access Configuration: setting up connectors, per-app access, PIM integration.
  • Kerberos Authentication (SSO).

Outputs:

  • Internet Access Implementation document.
  • Private Access Implementation document.

Testing and Validation – 2 weeks

Validation of security policies, user access integrity, and system performance.

Key Activities:

  • Web Content Filtering Testing.
  • Microsoft and Internet Traffic Profile Testing.
  • GSA Private Access Testing.
  • Secure Access Testing via Conditional Access & PIM.
  • SSO and DNS Testing.

Outputs:

  • Test case validation.

Documentation and Final Approval – 1 week

Finalization of documentation and final validation.

Key Activities:

  • Configuration documentation: GSA, Internet Access, and Private Access configurations.
  • Test and performance results.
  • Stakeholder review and validation of documentation.

Outputs:

  • Final documentation.
  • Administrator and user guides.
  • Approval sign-off and transition to operational support.

Customer Commitment

To ensure project success, the customer’s commitment is required in several key areas:

  • Defining clear objectives and success metrics.
  • Ensuring availability of resources and key stakeholders throughout the project.
  • Providing necessary access to systems, infrastructure, and personnel.
  • Adhering to change management processes for a smooth deployment.
  • Committing to ongoing support and feedback.

At a glance

https://store-images.s-microsoft.com/image/apps.30157.7d8a6e95-242b-4747-afa6-4ec91f424a2a.c5a6cd66-7685-4e00-8ff0-b8c4715347d0.16e1fcdb-3469-459d-a2df-7657960c9f61
https://store-images.s-microsoft.com/image/apps.47456.7d8a6e95-242b-4747-afa6-4ec91f424a2a.c5a6cd66-7685-4e00-8ff0-b8c4715347d0.98585a41-a4f2-49be-9f62-3e0d1f8d3239
https://store-images.s-microsoft.com/image/apps.55894.7d8a6e95-242b-4747-afa6-4ec91f424a2a.c5a6cd66-7685-4e00-8ff0-b8c4715347d0.9339b7f7-1ff2-4b19-a49b-4d55e689d53a