Logo Inalogy
EN

    Inalogy Logo

    Your IAM Expert.

    +421 2 3810 1152
    info@inalogy.com

    INALOGY a.s.
    Černyševského 48
    851 01 Bratislava
    Slovakia

    • Home
    • About
    • Solutions
      • Identity Management Solutions
      • Access Management Solutions
      • Identity and Access Management Solutions
      • Identity Governance Solutions
      • Privileged Access Management Solutions
      • Network Security Solutions
    • What’s new
    • Case studies
    • Careers
    • Contact
    • Home
    • About
    • Solutions
      • Identity Management Solutions
      • Access Management Solutions
      • Identity and Access Management Solutions
      • Identity Governance Solutions
      • Privileged Access Management Solutions
      • Network Security Solutions
    • What’s new
    • Case studies
    • Careers
    • Contact

    +421 2 3810 1152 info@inalogy.com

    Legal information and personal data protection

    © INALOGY a.s. LinkedIn

    IAM Solution Inalogy
    • Home
    • Solutions
    • What’s new
    • Case studies
    • About
    • Contact
    EN
    InalogyWhat's newInalogy becomes Silverfort partner

    Inalogy becomes Silverfort partner

    4 mins read
    10 apr 25
    Inalogy has established a partnership with Silverfort to address specific technical challenges in identity and access management environments.

    This partnership enhances security capabilities by extending authentication coverage to previously unsecured resources.

    01

    Motivation

    Modern identity and access management solutions face several architectural limitations when securing diverse IT environments. Legacy systems, command-line interfaces, and homegrown applications often lack support for modern authentication protocols, creating security gaps in otherwise well-designed IAM architectures.

    Traditional approaches to securing these resources have historically required deploying multiple point solutions for different resource types, implementing custom code for legacy system integration, or accepting security gaps where integration isn’t feasible. The partnership with Silverfort offers a technical approach to address these limitations.

    02

    Core Capabilities

    Silverfort operates as an additional security layer that enhances the overall security posture without requiring direct integration into core IAM systems. It functions independently while providing complementary security controls.

    The Silverfort Security Layer performs network traffic analysis by monitoring Kerberos, LDAP, NTLM, and other authentication protocols. Its authentication inspection engine analyzes requests in real-time, while the policy enforcement point implements step-up authentication and access decisions. A risk analytics engine calculates behavioral risk scores based on authentication patterns, creating a dynamic security posture.

    03

    Authentication Flow

    Silverfort modifies the standard authentication workflow in a unique way. When an authentication request is initiated to any resource—whether legacy application, database, or file share—Silverfort’s engine intercepts the authentication traffic without requiring agents or proxies. The risk assessment engine then evaluates multiple factors including user, device, resource, and behavioral patterns. If the risk threshold is exceeded, step-up authentication is triggered. The final authentication decision is enforced and logged.

    This approach extends authentication controls to multiple protocols, including Kerberos, LDAP/LDAPS, NTLM, RDP, SSH, SQL authentication, and even proprietary authentication mechanisms that would otherwise remain outside IAM governance.

    04

    Implementation Architecture

    The solution uses a non-invasive deployment model where Silverfort operates as a parallel security layer alongside existing IAM platforms. Silverfort functions independently, monitoring authentication flows across the environment. Authentication requests flow from users to resources while the Silverfort platform observes this traffic and applies its own policy enforcement decisions (Accept/Deny/MFA) based on risk analysis. This complementary approach allows Silverfort to maintain its distinct functionality while improving overall security coverage.

    Inalogy Silverfort Infrastructure Schema
    05

    Technical Advantages

    This architectural approach delivers several technical benefits through its protocol-level integration. Rather than requiring application modifications or agent deployments, the solution operates by analyzing network traffic, which allows it to secure systems that cannot be modified. Silverfort provides an independent security layer that extends authentication protection to resources that traditional IAM solutions might not cover adequately. This approach allows for consistent security across all resources regardless of their modern protocol support.

    The risk analytics engine adapts authentication requirements based on multiple factors such as user behavior patterns, resource sensitivity, time and location context, device posture, and authentication method. This creates a dynamic security posture that responds to changing conditions without manual intervention.

    Authentication events from all resources—including those previously unable to generate detailed logs—are captured in a standardized format. This creates a comprehensive audit trail that bridges previously disconnected security datasets.

    06

    Vendor-Agnostic Security Layer

    An important technical characteristic of Silverfort’s approach is its independence from any specific IAM solution. Silverfort operates as a vendor-agnostic security layer that works with any existing IAM infrastructure. Organizations can deploy Silverfort regardless of their existing IAM vendors—whether they use Inalogy, another commercial IAM solution, or home-grown identity systems.

    This architecture provides significant flexibility for heterogeneous environments. Silverfort’s agentless monitoring capabilities observe authentication traffic across the network, functioning as an additional security layer without requiring changes to the existing IAM infrastructure. For customers with complex environments that include multiple identity providers or authentication systems, Silverfort can provide consistent security coverage across these diverse systems.

    07

    Summary

    The partnership between Inalogy and Silverfort addresses a specific gap in identity and access architectures by adding a complementary security layer that extends authentication controls to resources that lack support for modern identity protocols. By operating as an additional security element rather than requiring direct integration with IAM platforms, Silverfort’s protocol-level approach eliminates the need for application modifications or agent deployments, simplifying implementation while improving overall security coverage.

    Want to read more ?

    The end of Microsoft Identity Manager and SAP IDM, why consider MidPoint as a replacement

    The identity management world is experiencing a seismic shift. Two major enterprise identity platforms—SAP Identity…
    5 mins read
    29 may 25
    Read more

    Empower your Identity Management team with MidPoint Trainings

    The identity governance landscape is robust, and implementing an Identity Governance and Administration (IGA) solution…
    6 mins read
    16 may 25
    Read more

    Final solution for Keycloak push notifications

    Keycloak is a key component of our Inalogy IAM solution. We are continuously reducing the…
    3 mins read
    22 apr 25
    Read more
    IAM Solution Inalogy

    Your IAM Expert.

    Inalogy a.s.

    VAT ID: SK2121853778
    REG ID: 55043712

    Černyševského 48
    851 01 Bratislava
    Slovakia

    Our solutions

    • Identity Management Solutions
    • Access Management Solutions
    • Identity and Access Management Solutions
    • Identity Governance Solutions
    • Privileged Access Management Solutions
    • Network Security Solutions
    • Home
    • About
    • What’s new
    • Case studies
    • Careers
    • Contact
    • FAQ
    IAM Solution Inalogy

    Your IAM Expert.

    +421 2 3810 1152

    info@inalogy.com

    LinkedIn

      Request a demo

      Let's arrange a 30 minutes call and our consultants will show you how Inalogy IAM eases you from operations efforts and significantly increases security posture.

      This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.