Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Zach DeMeyer

What is Idaptive?

Posted on March 7, 2019 by Zach DeMeyer

There’s a new identity management player on the market called Idaptive. Many IT admins haven’t heard that name before, but they actually may be using their products already. Or, at the very least, they may have heard of their predecessor&#8… Continue reading What is Idaptive?→

Posted in :Blog:, Security Bloggers Network, Single Sign-On (SSO)

SSO and LDAP Integration

Posted on March 3, 2019 by Zach DeMeyer

Why is SSO and LDAP integration interesting? Aren’t they sort of orthogonal concepts? In a perfect world, wouldn’t IT admins not care about protocols and simply enable their end users to login to whatever IT resources they need and want? If… Continue reading SSO and LDAP Integration→

Posted in :Blog:, ldap, Security Bloggers Network, Single Sign-On (SSO)

Active Directory® Tools for Macs®

Posted on March 3, 2019 by Zach DeMeyer

As more Macs® are used within organizations, many IT admins are struggling with how to manage them. Generally, organizations have been using Microsoft® Active Directory® as their identity provider. But, limitations within AD have forced … Continue reading Active Directory® Tools for Macs®→

Posted in :Blog:, active directory, Mac management, Security Bloggers Network

How Much Does a RADIUS Server Cost?

Posted on March 2, 2019 by Zach DeMeyer

How much does a RADIUS server cost? With network security becoming paramount to organizations, it’s a question that is on the mind of many an IT admin. As more IT organizations look to implement RADIUS infrastructure for their WiFi and VPN enviro… Continue reading How Much Does a RADIUS Server Cost?→

Posted in :Blog:, RADIUS, Security Bloggers Network, wifi

Advantages of Microsoft® Active Directory®

Posted on March 2, 2019 by Zach DeMeyer

In the modern era of the cloud, what are the advantages of Microsoft® Active Directory® (AD), the on-prem directory service, and when would you use it? Further, as it relates to this question, there is the follow-up on when to use on-prem Act… Continue reading Advantages of Microsoft® Active Directory®→

Posted in :Blog:, active directory, Security Bloggers Network

Introduction to OpenLDAP™

Posted on March 1, 2019 by Zach DeMeyer

The identity and access management (IAM) market has been heating up as of late. As IT admins explore their directory service options, many are going back to basics and wanting an introduction to OpenLDAP™. In this article, we will detail its ince… Continue reading Introduction to OpenLDAP™→

Posted in :Blog:, active directory, Security Bloggers Network

Overview of BeyondCorp™

Posted on March 1, 2019 by Zach DeMeyer

Many IT organizations are wondering about an overview of BeyondCorp™, Google®’s framework for Zero Trust Security. The model is gaining popularity, which makes sense given the meteoric rise of security breaches in the news. This articl… Continue reading Overview of BeyondCorp™→

Posted in :Blog:, Security, Security Bloggers Network

Introduction to Microsoft® Active Directory®

Posted on February 28, 2019 by Zach DeMeyer

Microsoft® has built a number of industry-leading solutions. One of them is their identity and access management (IAM) platform, Microsoft Active Directory® (MAD or AD). This article is an introduction to Microsoft Active Directory, what it&#… Continue reading Introduction to Microsoft® Active Directory®→

Posted in :Blog:, active directory, Security Bloggers Network

Overview of Azure® Active Directory

Posted on February 26, 2019 by Zach DeMeyer

With the shift to Azure® for many organizations, a common question is what is Azure Active Directory and what can it be used for? Microsoft® has been shifting a number of their solutions to the cloud including Office and Windows® Server,… Continue reading Overview of Azure® Active Directory→

Posted in :Blog:, Azure, cloud security, Security Bloggers Network

Why WiFi Security Matters

Posted on February 24, 2019 by Zach DeMeyer

With the shift to WiFi from wired networks, many IT admins have still been struggling with how to execute on network-based security. In this post, we’ll discuss some approaches to network security, and specifically, why WiFi security matters. Net… Continue reading Why WiFi Security Matters→

Posted in :Blog:, Security Bloggers Network, wifi

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android May 12, 2026
  • Reverse-Engineering and Documenting the Fisher Price Pixter May 12, 2026
  • A Data Center Drained 30 Million Gallons of Water Unnoticed May 12, 2026
  • ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th) May 12, 2026
  • Microsoft PowerToys now lets you control your monitor from the taskbar – here’s how May 12, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up