Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Zach DeMeyer

Intune® vs. MobileIron®

Posted on March 19, 2019 by Zach DeMeyer

The mobile device management (MDM) market is gaining a lot of traction among IT admins. Similar to Intune® vs AirWatch®, the heavyweight MDM battle of Intune vs MobileIron® is one to watch. For IT admins looking to control mobile devices… Continue reading Intune® vs. MobileIron®→

Posted in :Blog:, Identity and Access Management (IAM), Security Bloggers Network

Red Hat® Directory Server as-a-Service

Posted on March 18, 2019 by Zach DeMeyer

Red Hat ® recently decided to end distribution of OpenLDAP™, sending many IT organizations into a tailspin. Effectively, the images for Linux now are defaulting to Red Hat’s own directory service solutions, 389 Directory and Directory … Continue reading Red Hat® Directory Server as-a-Service→

Posted in :Blog:, Directory Services, Security Bloggers Network

Video Spotlight: The Last Mile

Posted on March 16, 2019 by Zach DeMeyer

Here at JumpCloud®, we are proud to hear of the successes of our customers. One customer in particular that has truly used JumpCloud to their advantage is The Last Mile (TLM). TLM is based out of California, where they teach inmates the ropes of s… Continue reading Video Spotlight: The Last Mile→

Posted in :Blog:, Directory-as-a-Service (DaaS), Partners, Security Bloggers Network

High Availability RADIUS Server

Posted on March 15, 2019 by Zach DeMeyer

Is there a high availability (HA) RADIUS server that is easy to implement and cost-effective? As more IT organizations leverage RADIUS servers to help them control and manage their network infrastructure, the question around HA for RADIUS is critical. … Continue reading High Availability RADIUS Server→

Posted in :Blog:, RADIUS, Security Bloggers Network

Intune® vs AirWatch®

Posted on March 13, 2019 by Zach DeMeyer

In the MDM (mobile device management) space there are a wide range of solutions. With iOS® and Android devices in just about every business professional’s hands, it is easy to understand why MDM is such a hot market. In this post, we’l… Continue reading Intune® vs AirWatch®→

Posted in :Blog:, Identity and Access Management (IAM), Security Bloggers Network

Why Use Directory-as-a-Service®?

Posted on March 12, 2019 by Zach DeMeyer

With so many new technologies hitting the market and IT becoming a much more critical part of every organization, business owners and executives want to evaluate the bottom line, weighing why different solutions are valuable to their organization. Ofte… Continue reading Why Use Directory-as-a-Service®?→

Posted in :Blog:, Directory-as-a-Service (DaaS), Security Bloggers Network

Active Directory® for Linux®

Posted on March 11, 2019 by Zach DeMeyer

Is there an Active Directory® for Linux® that makes sense? Clearly, the Windows-based Microsoft® Active Directory (AD), often the on-prem identity provider for organizations, isn’t a great fit with Linux. Perhaps, however, there is… Continue reading Active Directory® for Linux®→

Posted in :Blog:, linux, Security Bloggers Network

IAM Capability: Mac® User Management

Posted on March 10, 2019 by Zach DeMeyer

Apple® has become the biggest company in the world. It’s honestly no surprise; the iPhone is everywhere, and there are more Macs® in the workplace than ever before. Given this fact, IT admins have to include managing Mac users as a part… Continue reading IAM Capability: Mac® User Management→

Posted in :Blog:, Mac management, Security Bloggers Network, user-management

Overview of Active Directory® Domain Services

Posted on March 9, 2019 by Zach DeMeyer

With so many changes in the IT landscape, it is sometimes difficult to have a finger on the pulse of the various identity management solutions available. As admins explore their options, many IT organizations are seeking an overview of Active Directory… Continue reading Overview of Active Directory® Domain Services→

Posted in :Blog:, active directory, Security Bloggers Network

Introduction to BeyondCorp™

Posted on March 8, 2019 by Zach DeMeyer

It is apparent that traditional models of security have failed modern IT organizations. With breaches a frequent feature of the newscycle, locking down the network is critical. Many IT admins are starting to hear about the Zero Trust Security model and… Continue reading Introduction to BeyondCorp™→

Posted in :Blog:, Security, Security Bloggers Network

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Reverse-Engineering and Documenting the Fisher Price Pixter May 12, 2026
  • A Data Center Drained 30 Million Gallons of Water Unnoticed May 12, 2026
  • ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th) May 12, 2026
  • Microsoft PowerToys now lets you control your monitor from the taskbar – here’s how May 12, 2026
  • The Walls Don’t Have Ears, But Fiber Optic Does May 12, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up