Cloud GPOs (Group Policy Objects)

The concept of GPOs (Group Policy Objects) is a critical part of the Microsoft Active Directory® platform. GPOs help IT admins execute tasks across their Windows device fleet. They are…

The post Cloud GPOs (Group Policy Objects) appeared first on JumpCloud.

The post Cloud GPOs (Group Policy Objects) appeared first on Security Boulevard.

Continue reading Cloud GPOs (Group Policy Objects)

SaaS Identity Management

IT solutions have been moving to the cloud and as-a-Service models rapidly as of late. There are Infrastructure-as-a-Service solutions such as AWS, Google Cloud Platform, and Azure. There are Platform-as-a-Service…
The post SaaS Identity Management a… Continue reading SaaS Identity Management

Active Directory as a Service Replacement

A new model of identity management is emerging. This new model is being driven from the cloud and is delivered in the “as a service” form. It’s arriving at the…

The post Active Directory as a Service Replacement appeared first on JumpCloud.

The post Active Directory as a Service Replacement appeared first on Security Boulevard.

Continue reading Active Directory as a Service Replacement

Security Briefing: 5 Ways to Improve WiFi Security in Response to KRACK

In this security briefing, JumpCloud’s Chief Product Officer Greg Keller speaks with Senior Success Engineer Scott Reed about the KRACK vulnerabilities in the WPA2 protocol. Watch the video above to…

The post Security Briefing: 5 Ways to Improve WiFi Security in Response to KRACK appeared first on JumpCloud.

The post Security Briefing: 5 Ways to Improve WiFi Security in Response to KRACK appeared first on Security Boulevard.

Continue reading Security Briefing: 5 Ways to Improve WiFi Security in Response to KRACK

LDAP Authentication for NAS Devices

Network attached storage (NAS) devices from Synology, QNAP, and FreeNAS, among many others, are a popular choice for on-prem storage. These NAS devices are cost-effective and easy to implement. But…
The post LDAP Authentication for NAS Devices appear… Continue reading LDAP Authentication for NAS Devices

Auditing Your WiFi Security Posture in Response to the WPA2 KRACK Vulnerability

News of a major vulnerability within the standard WPA2 protocol has been rippling around the world. IT organizations are scrambling to audit their WiFi security posture in light of this…
The post Auditing Your WiFi Security Posture in Response to th… Continue reading Auditing Your WiFi Security Posture in Response to the WPA2 KRACK Vulnerability

Auditing Your WiFi Security Posture in Response to the WPA2 KRACK Vulnerability

News of a major vulnerability within the standard WPA2 protocol has been rippling around the world. IT organizations are scrambling to audit their WiFi security posture in light of this…
The post Auditing Your WiFi Security Posture in Response to th… Continue reading Auditing Your WiFi Security Posture in Response to the WPA2 KRACK Vulnerability

Identity Management Function Samba File Server Support

A core part of any identity management strategy is connecting users to the IT resources that they need. This role can include both physical and virtual file storage systems. A…
The post Identity Management Function Samba File Server Support appeared … Continue reading Identity Management Function Samba File Server Support

LDAP Authentication for Samba File Servers

Samba file servers are a popular option for cost-effective on-prem storage. These file servers can be created with the open source Samba platform, or purchased as NAS (network attached storage)…
The post LDAP Authentication for Samba File Servers app… Continue reading LDAP Authentication for Samba File Servers

Cloud IAM Feature: Access to Files and Data

A key part of the IT infrastructure is access to files and data. With digital assets becoming more important every day, and more breaches of critical data occurring every year,…
The post Cloud IAM Feature: Access to Files and Data appeared first on J… Continue reading Cloud IAM Feature: Access to Files and Data