Atos announces support through its technological brand Bull ― for the Microsoft Office 365 suite on any device with Evidian Web Access Manager (WAM), its Web Single Sign-On & Identity Federation solution.
Evidian WAM is now helping organizations move seamlessly to the Cloud and increase the security of access to internal company messages and applications over the internet as well as to external web applications outside the company’s premises. This performance is achieved without impacting users.
Deploying Office 365 with Evidian WAM is touted as simple and cost-efficient by optimizing provisioning cost and access management. With Evidian Identity Governance and Administration, businesses can manage and keep control of federation mechanisms: Office 365 licenses are provided when users are granted access, and then decommissioned when they lose their rights, thus not only limiting the risk of dormant accounts but also optimizing costs. Combined with Evidian Web Access Manager, users have instant access to their Microsoft Office 365 account using Self-service to request the right to use applications while being offered increased security through adaptive authentication which determines the required strength of the authentication mechanism.
Businesses of all sizes are currently adopting Cloud services as they become critical for long-term success. More and more Software as a Service (SaaS) applications such as Microsoft’s Office 365 and Google Apps are hosted outside of the company’s walls requiring a secure access. Companies also face the challenge of integrating existing identities into the authentication process of the Cloud platform.
Louis-Marie Fouchard, Business unit Manager Identity & Access Management (IAM) at Atos, explains, “When clients move to Office 365, identity integration can be difficult to manage. With Evidian Web Access Manager, all Cloud application accesses are managed by the company’s identity provider applying its own policy rules with optimized costs. This means clients have full control of Cloud accesses and can monitor all activity through security reporting and auditing. We offer customers a secure and seamless transition to Cloud, while enabling them to be compliant with the regulations.’’