Logo Inalogy
EN
  • SK

Inalogy Logo

Your IAM Expert.

+421 2 3810 1152
info@inalogy.com

INALOGY a.s.
Černyševského 48
851 01 Bratislava
Slovakia

  • Home
  • About
  • Solutions
    • Identity Management Solutions
    • Access Management Solutions
    • Identity and Access Management Solutions
    • Identity Governance Solutions
    • Privileged Access Management Solutions
    • Network Security Solutions
  • What’s new
  • Case studies
  • Careers
  • Contact
  • Home
  • About
  • Solutions
    • Identity Management Solutions
    • Access Management Solutions
    • Identity and Access Management Solutions
    • Identity Governance Solutions
    • Privileged Access Management Solutions
    • Network Security Solutions
  • What’s new
  • Case studies
  • Careers
  • Contact

+421 2 3810 1152 info@inalogy.com

Legal information and personal data protection

© INALOGY a.s. LinkedIn

IAM Solution Inalogy
  • Home
  • Solutions
  • What’s new
  • Case studies
  • About
  • Contact
EN
InalogyWhat's newInalogy becomes Silverfort partner

Inalogy becomes Silverfort partner

4 mins read
10 apr 25
Inalogy has established a partnership with Silverfort to address specific technical challenges in identity and access management environments.

This partnership enhances security capabilities by extending authentication coverage to previously unsecured resources.

01

Motivation

Modern identity and access management solutions face several architectural limitations when securing diverse IT environments. Legacy systems, command-line interfaces, and homegrown applications often lack support for modern authentication protocols, creating security gaps in otherwise well-designed IAM architectures.

Traditional approaches to securing these resources have historically required deploying multiple point solutions for different resource types, implementing custom code for legacy system integration, or accepting security gaps where integration isn’t feasible. The partnership with Silverfort offers a technical approach to address these limitations.

02

Core Capabilities

Silverfort operates as an additional security layer that enhances the overall security posture without requiring direct integration into core IAM systems. It functions independently while providing complementary security controls.

The Silverfort Security Layer performs network traffic analysis by monitoring Kerberos, LDAP, NTLM, and other authentication protocols. Its authentication inspection engine analyzes requests in real-time, while the policy enforcement point implements step-up authentication and access decisions. A risk analytics engine calculates behavioral risk scores based on authentication patterns, creating a dynamic security posture.

03

Authentication Flow

Silverfort modifies the standard authentication workflow in a unique way. When an authentication request is initiated to any resource—whether legacy application, database, or file share—Silverfort’s engine intercepts the authentication traffic without requiring agents or proxies. The risk assessment engine then evaluates multiple factors including user, device, resource, and behavioral patterns. If the risk threshold is exceeded, step-up authentication is triggered. The final authentication decision is enforced and logged.

This approach extends authentication controls to multiple protocols, including Kerberos, LDAP/LDAPS, NTLM, RDP, SSH, SQL authentication, and even proprietary authentication mechanisms that would otherwise remain outside IAM governance.

04

Implementation Architecture

The solution uses a non-invasive deployment model where Silverfort operates as a parallel security layer alongside existing IAM platforms. Silverfort functions independently, monitoring authentication flows across the environment. Authentication requests flow from users to resources while the Silverfort platform observes this traffic and applies its own policy enforcement decisions (Accept/Deny/MFA) based on risk analysis. This complementary approach allows Silverfort to maintain its distinct functionality while improving overall security coverage.

Inalogy Silverfort Infrastructure Schema
05

Technical Advantages

This architectural approach delivers several technical benefits through its protocol-level integration. Rather than requiring application modifications or agent deployments, the solution operates by analyzing network traffic, which allows it to secure systems that cannot be modified. Silverfort provides an independent security layer that extends authentication protection to resources that traditional IAM solutions might not cover adequately. This approach allows for consistent security across all resources regardless of their modern protocol support.

The risk analytics engine adapts authentication requirements based on multiple factors such as user behavior patterns, resource sensitivity, time and location context, device posture, and authentication method. This creates a dynamic security posture that responds to changing conditions without manual intervention.

Authentication events from all resources—including those previously unable to generate detailed logs—are captured in a standardized format. This creates a comprehensive audit trail that bridges previously disconnected security datasets.

06

Vendor-Agnostic Security Layer

An important technical characteristic of Silverfort’s approach is its independence from any specific IAM solution. Silverfort operates as a vendor-agnostic security layer that works with any existing IAM infrastructure. Organizations can deploy Silverfort regardless of their existing IAM vendors—whether they use Inalogy, another commercial IAM solution, or home-grown identity systems.

This architecture provides significant flexibility for heterogeneous environments. Silverfort’s agentless monitoring capabilities observe authentication traffic across the network, functioning as an additional security layer without requiring changes to the existing IAM infrastructure. For customers with complex environments that include multiple identity providers or authentication systems, Silverfort can provide consistent security coverage across these diverse systems.

07

Summary

The partnership between Inalogy and Silverfort addresses a specific gap in identity and access architectures by adding a complementary security layer that extends authentication controls to resources that lack support for modern identity protocols. By operating as an additional security element rather than requiring direct integration with IAM platforms, Silverfort’s protocol-level approach eliminates the need for application modifications or agent deployments, simplifying implementation while improving overall security coverage.

Want to read more ?

Empower your Identity Management team with MidPoint Trainings

The identity governance landscape is robust, and implementing an Identity Governance and Administration (IGA) solution…
6 mins read
16 may 25
Read more

Final solution for Keycloak push notifications

Keycloak is a key component of our Inalogy IAM solution. We are continuously reducing the…
3 mins read
22 apr 25
Read more

Adaptive midPoint SSH connector – final solution for all SSH based systems (example)

Large organizations hugely rely on systems managed via SSH interface. MidPoint only provides a lightweight…
15 mins read
14 apr 25
Read more
IAM Solution Inalogy

Your IAM Expert.

Inalogy a.s.

VAT ID: SK2121853778
REG ID: 55043712

Černyševského 48
851 01 Bratislava
Slovakia

Our solutions

  • Identity Management Solutions
  • Access Management Solutions
  • Identity and Access Management Solutions
  • Identity Governance Solutions
  • Privileged Access Management Solutions
  • Network Security Solutions
  • Home
  • About
  • What’s new
  • Case studies
  • Careers
  • Contact
  • FAQ
IAM Solution Inalogy

Your IAM Expert.

+421 2 3810 1152

info@inalogy.com

LinkedIn

    Request a demo

    Let's arrange a 30 minutes call and our consultants will show you how Inalogy IAM eases you from operations efforts and significantly increases security posture.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.