Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Zach DeMeyer

Healthcare Identity Management

Posted on August 10, 2019 by Zach DeMeyer

Identity management is a practice that permeates through many industries. After all, in our technological age, an average employee at almost any organization needs to access a computer using a set of personal credentials. Healthcare identity management… Continue reading Healthcare Identity Management→

Posted in :Blog:, Identity and Access Management (IAM), Security Bloggers Network, user-management

Single Sign-On (SSO) Pros & Cons

Posted on August 8, 2019 by Zach DeMeyer

The single sign-on (SSO) space is heating up the whole identity and access management (IAM) industry. With many vendors, new and old, flooding the scene, IT admins have a lot to consider with regards to SSO. But, while some are evaluating options like … Continue reading Single Sign-On (SSO) Pros & Cons→

Posted in :Blog:, Security Bloggers Network, Single Sign-On (SSO)

What is AD Sync for Passwords?

Posted on August 7, 2019 by Zach DeMeyer

Integration of non-Windows® resources like Mac® and Linux® systems into Active Directory® (AD) can be a major headache for IT admins. Binding to cloud infrastructure (e.g. AWS®) as well as networking equipment such as WiFi… Continue reading What is AD Sync for Passwords?→

Posted in :Blog:, active directory, Security Bloggers Network

AWS® SSO vs OneLogin®

Posted on August 7, 2019 by Zach DeMeyer

As if Amazon® didn’t already have their fingers in many, many pies, the goliath has expanded its AWS® solution into the web application single sign-on (SSO) space with AWS SSO. With AWS SSO, many of the incumbents of the SSO scene are s… Continue reading AWS® SSO vs OneLogin®→

Posted in :Blog:, Security Bloggers Network, Single Sign-On (SSO)

Top Three System Policies You Need On Your Macs®

Posted on August 6, 2019 by Zach DeMeyer

JumpCloud® Policies are one of the many useful features that are available with Directory-as-a-Service®. Policies are analogous to the popular group policy object (GPO) feature from Microsoft® Active Directory®, except they can be u… Continue reading Top Three System Policies You Need On Your Macs®→

Posted in :Blog:, Mac management, Security Bloggers Network

Office 365™ Active Directory® Integration

Posted on August 5, 2019 by Zach DeMeyer

When it comes to groundbreaking IT solutions, Microsoft® tops the list in many categories. For instance, their on-prem directory service, Active Directory® is still one of the most widely used identity and access management (IAM) tools around… Continue reading Office 365™ Active Directory® Integration→

Posted in :Blog:, active directory, Security Bloggers Network

macOS® Catalina™ Active Directory® Integration

Posted on August 1, 2019 by Zach DeMeyer

Few things have a greater effect on an IT admin’s workflow than the introduction of a new macOS® version. With completely new requirements for authentication, zero-day vulnerabilities, and last minute updates, a new macOS, like the upcoming … Continue reading macOS® Catalina™ Active Directory® Integration→

Posted in :Blog:, Mac management, Security Bloggers Network

Okta® vs AWS® Directory Service

Posted on July 31, 2019 by Zach DeMeyer

We’ve been keeping tabs on common faceoffs in the identity management space, and one that has some folks curious is Okta® vs. AWS® Directory Service. In reality, the two solutions themselves aren’t really positioned head-to-head i… Continue reading Okta® vs AWS® Directory Service→

Posted in :Blog:, Identity and Access Management (IAM), Security Bloggers Network

Using MFA for VPN Security

Posted on July 29, 2019 by Zach DeMeyer

Virtual private networks (VPNs) are still widely used in today’s organizations. They can securely connect their remote users to their core infrastructure components, whether that is a headquarters office or perhaps their cloud infrastructure host… Continue reading Using MFA for VPN Security→

Posted in :Blog:, Multi-Factor Authentication (MFA), Security Bloggers Network

Okta® vs Auth0®

Posted on July 27, 2019 by Zach DeMeyer

Okta® and Auth0®: two juggernaut names of the identity and access management (IAM) industry. For a while, the two occupied similar, yet adjacent parts of the market, existing together in a semblance of harmony. As both companies have grown, O… Continue reading Okta® vs Auth0®→

Posted in :Blog:, Security Bloggers Network, Single Sign-On (SSO), user-management

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Google Says Hackers Used AI To Create Zero Day Security Flaw For the First Time May 11, 2026
  • How to prepare for brutal summer blackouts – and figure out your power needs now May 11, 2026
  • Apple Now Requires Verification For Education Store May 11, 2026
  • First Ring Daily 1962: Set Your Phasers May 11, 2026
  • Thousands of DICOM servers exposed due to shameful lack of basic security measures May 11, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up