Inalogy has established a partnership with Silverfort to address specific technical challenges in identity and access management environments.
This partnership enhances security capabilities by extending authentication coverage to previously unsecured resources.

Motivation
Modern identity and access management solutions face several architectural limitations when securing diverse IT environments. Legacy systems, command-line interfaces, and homegrown applications often lack support for modern authentication protocols, creating security gaps in otherwise well-designed IAM architectures.
Traditional approaches to securing these resources have historically required deploying multiple point solutions for different resource types, implementing custom code for legacy system integration, or accepting security gaps where integration isn’t feasible. The partnership with Silverfort offers a technical approach to address these limitations.
Core Capabilities
Silverfort operates as an additional security layer that enhances the overall security posture without requiring direct integration into core IAM systems. It functions independently while providing complementary security controls.
The Silverfort Security Layer performs network traffic analysis by monitoring Kerberos, LDAP, NTLM, and other authentication protocols. Its authentication inspection engine analyzes requests in real-time, while the policy enforcement point implements step-up authentication and access decisions. A risk analytics engine calculates behavioral risk scores based on authentication patterns, creating a dynamic security posture.
Authentication Flow
Silverfort modifies the standard authentication workflow in a unique way. When an authentication request is initiated to any resource—whether legacy application, database, or file share—Silverfort’s engine intercepts the authentication traffic without requiring agents or proxies. The risk assessment engine then evaluates multiple factors including user, device, resource, and behavioral patterns. If the risk threshold is exceeded, step-up authentication is triggered. The final authentication decision is enforced and logged.
This approach extends authentication controls to multiple protocols, including Kerberos, LDAP/LDAPS, NTLM, RDP, SSH, SQL authentication, and even proprietary authentication mechanisms that would otherwise remain outside IAM governance.
Implementation Architecture
The solution uses a non-invasive deployment model where Silverfort operates as a parallel security layer alongside existing IAM platforms. Silverfort functions independently, monitoring authentication flows across the environment. Authentication requests flow from users to resources while the Silverfort platform observes this traffic and applies its own policy enforcement decisions (Accept/Deny/MFA) based on risk analysis. This complementary approach allows Silverfort to maintain its distinct functionality while improving overall security coverage.
Technical Advantages
This architectural approach delivers several technical benefits through its protocol-level integration. Rather than requiring application modifications or agent deployments, the solution operates by analyzing network traffic, which allows it to secure systems that cannot be modified. Silverfort provides an independent security layer that extends authentication protection to resources that traditional IAM solutions might not cover adequately. This approach allows for consistent security across all resources regardless of their modern protocol support.
The risk analytics engine adapts authentication requirements based on multiple factors such as user behavior patterns, resource sensitivity, time and location context, device posture, and authentication method. This creates a dynamic security posture that responds to changing conditions without manual intervention.
Authentication events from all resources—including those previously unable to generate detailed logs—are captured in a standardized format. This creates a comprehensive audit trail that bridges previously disconnected security datasets.
Vendor-Agnostic Security Layer
An important technical characteristic of Silverfort’s approach is its independence from any specific IAM solution. Silverfort operates as a vendor-agnostic security layer that works with any existing IAM infrastructure. Organizations can deploy Silverfort regardless of their existing IAM vendors—whether they use Inalogy, another commercial IAM solution, or home-grown identity systems.
This architecture provides significant flexibility for heterogeneous environments. Silverfort’s agentless monitoring capabilities observe authentication traffic across the network, functioning as an additional security layer without requiring changes to the existing IAM infrastructure. For customers with complex environments that include multiple identity providers or authentication systems, Silverfort can provide consistent security coverage across these diverse systems.
Summary
The partnership between Inalogy and Silverfort addresses a specific gap in identity and access architectures by adding a complementary security layer that extends authentication controls to resources that lack support for modern identity protocols. By operating as an additional security element rather than requiring direct integration with IAM platforms, Silverfort’s protocol-level approach eliminates the need for application modifications or agent deployments, simplifying implementation while improving overall security coverage.
Want to read more ?