The first multi-tenant, purpose-built platform for MSPs, MSSPs, NOCs, and SOCs to deploy and manage login security and privileged access for themselves, their customers, and their customer's customers
Trusted by managed services Partners across the globe
Identity and Access Management (IAM) is the parent name for a very important category of cybersecurity. Identity refers to ensuring users are in fact who they say they are when logging into something. Access refers to ensuring user permissions and abilities are restricted and monitored after successfully logging in. The identity component is typically called "Identity Management." The access component is called "Privileged Access Management," or "PAM." Common industry practice is to reference both Identity and Privileged Access Management as simply "Identity."
Identity in practice means either syncing users from their source of truth or creating a new source of truth, then using that source of truth to authenticate users into endpoints, web applications, network devices, and other critical resources. This means deploying multi-factor authentication (MFA), single sign-on (SSO), managing directories, and all the accompanying parts to make these systems work. Access in practice means applying role-based permissions and security groups for users, rotating administrative passwords, restricting access to critical resources, whitelisting or blacklisting applications, and applying policies.
Zero-Trust, explained in simple terms, is this: Never trust a user trying to enter a critical resource (workstation, server, network device, web application, etc.), and once that user is inside the resource, continue not trusting them by assigning the least amount of privilege possible. Identity and Access Management is actually the core essence of zero trust, whereby users are verified with MFA when trying to enter, and their access is limited once inside with PAM. It's also core to other cyber frameworks and models like Defense-in-Depth, the Cyber Defense Matrix, NIST, MITRE ATT&CK, and the Center for Internet Security (CIS) Controls. All of these models and frameworks are different and serve different purposes, however IAM is common across all of them.
Evo's Partner Identity Cloud (EPIC), is a cloud-based platform that consolidates both Identity and PAM point solutions commonly used by Managed IT Service Providers (Partners) to protect themselves and their customers. This includes, MFA, SSO, Elevated Access, Directory Services, Self-Service Onboarding, and Self-Service Password Reset. For Access, this includes Admin or Technician Role-based Permissions, Security Groups, Password Rotation, Endpoint and Application Visibility, and more. Our goal is to deliver high value, high security, and high margins to Partners all-in-one.
Identity and access-related breaches are the #1 attack vector and threat to IT Service Providers and their Customers. Unfortunately, gambling against this reality is a losing bet. The second reason is because IAM for MSPs, MSSPs, NOCs, and SOCs is really messy today. Partners are using several point solutions and force-fitting enterprise tools, which leads to higher friction, tool sprawl, admin credential sharing (poor internal security hygiene), lack of visibility, provisioning issues, multi-tenant issues, and more, all of which adds up to increased legal liability, compliance adherence challenges, best practice implementation challenges, and even risk to winning customers. Partners deserve better and Evo intends to provide a new way forward.
Evo is a platform with several "point tool capabilities" combined in one. We did the extremely hard engineering first so we can continuously layer on deep value for partners. With Evo, you can begin to consolidate tooling used for password rotation, MFA, SSO, admin credential management, and more.
We don't advertise pricing because we're 100% channel-only. What our Partners charge their customers is their business and it's our job to deliver a high-value platform and good margins. Our billing and terms are simple, fair, and flexible. Get in touch with our amazing team to find out more and get launched in minutes.
We've dramatically simplified rollout and deployment when compared to enterprise tools and constantly asking Partners how we can improve. All ideas, thoughts, or comments are welcomed and well recieved.
Learn more about what we can do for your MSP, how we protect your Customers, or how to become a Partner