List of Microsoft Azure Multi-Factor Authentication Customers
Redmond, 98052-6399, WA,
United States
Since 2010, our global team of researchers has been studying Microsoft Azure Multi-Factor Authentication customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Microsoft Azure Multi-Factor Authentication for Identity and Access Management (IAM) from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Microsoft Azure Multi-Factor Authentication for Identity and Access Management (IAM) include: The Walsh Group, a United States based Construction and Real Estate organisation with 8000 employees and revenues of $5.30 billion, MattressFirm, a United States based Retail organisation with 6500 employees and revenues of $4.50 billion, Lululemon Canada, a Canada based Retail organisation with 9000 employees and revenues of $1.42 billion and many others.
Contact us if you need a completed and verified list of companies using Microsoft Azure Multi-Factor Authentication, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the software purchases.
The Microsoft Azure Multi-Factor Authentication customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight | Insight Source |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Lululemon Canada | Retail | 9000 | $1.4B | Canada | Microsoft | Microsoft Azure Multi-Factor Authentication | Identity and Access Management (IAM) | 2018 | n/a | In 2018, Lululemon Canada implemented Microsoft Azure Multi-Factor Authentication under the Identity and Access Management (IAM) category to enforce risk based authentication across its user base. The deployment was implemented alongside Azure Active Directory, with risk based Azure Multi-Factor Authentication applied to protect high sensitivity applications including finance and HR. The rollout used Microsoft Azure Multi-Factor Authentication as the MFA enforcement engine, with explicit deployment of MFA registration and Azure AD conditional access policies to require step up authentication for elevated access. Configuration work centered on conditional access policy scopes, user authentication registration flows, and risk based enforcement rules to balance security and productivity. Integration architecture was anchored on Azure AD as the central identity platform, using conditional access to gate access to finance and HR application workloads. Operational coverage was organization wide, applied to approximately 18,000 users, and targeted at business functions handling sensitive financial and human resources data. Governance and operationalization included centralized policy management in Azure AD conditional access and mandatory MFA registration workflows for end users. As stated in the source, the implementation improved productivity and reduced password related helpdesk calls across the organization. | |
|
|
MattressFirm | Retail | 6500 | $4.5B | United States | Microsoft | Microsoft Azure Multi-Factor Authentication | Identity and Access Management (IAM) | 2019 | n/a | In 2019, Mattress Firm deployed Microsoft Azure Multi-Factor Authentication alongside Azure Active Directory to secure firstline workers' access to SaaS applications. The implementation targeted access to cloud HR and productivity systems including Workday, and focused on off premises sign ins across the United States. This deployment sits in the Identity and Access Management (IAM) layer supporting IT and frontline operations. Configuration included enabling Azure Multi-Factor Authentication with Microsoft Authenticator as the primary second factor and enforcing conditional access policies to reduce sign in risk. Azure AD was used to federate and manage identities for SaaS app access, streamlining onboarding workflows and centralizing authentication and policy enforcement. Functional capabilities implemented align with Identity and Access Management (IAM) practices such as credential verification, second factor verification, conditional access, and centralized identity governance. The rollout used Microsoft Authenticator for second factor verification and applied conditional access to limit elevated risk for off premises sign ins, reducing identity team workload and speeding onboarding as reported by the company. Operational scope was United States firstline worker access to SaaS apps, with identity and access management controls enforced from Azure AD and Microsoft Azure Multi-Factor Authentication. Azure MFA usage is explicitly referenced in the source. | |
|
|
The Walsh Group | Construction and Real Estate | 8000 | $5.3B | United States | Microsoft | Microsoft Azure Multi-Factor Authentication | Identity and Access Management (IAM) | 2017 | n/a | In 2017, The Walsh Group implemented Microsoft Azure Multi-Factor Authentication as part of a broader Microsoft 365 identity stack. The deployment was focused on strengthening access controls across its US offices and construction sites and was integrated with Azure Active Directory to centralize authentication. Microsoft Azure Multi-Factor Authentication was configured to enforce second factor prompts and to feed into Azure AD conditional access policies. Core capabilities implemented included MFA enforcement, conditional access risk evaluation to block risky sign ins, and centralized authentication management within the Identity and Access Management (IAM) environment. The implementation tied MFA to Azure AD sign in events and Microsoft 365 identity signals, extending protection to site operations as well as corporate IT systems. Operational coverage explicitly included US offices and field construction sites, impacting security operations, IT operations, and help desk workflows by shifting authentication to a policy driven model. Governance was addressed through policy driven conditional access and centralized monitoring to support Zero Trust conditional access policies. The Walsh Group reported reduced help desk password resets and the ability to block risky sign ins using Microsoft Azure Multi-Factor Authentication. |
Buyer Intent: Companies Evaluating Microsoft Azure Multi-Factor Authentication
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||