Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Zach DeMeyer

Introduction to WiFi Security

Posted on February 11, 2019 by Zach DeMeyer

WiFi networks are clearly the network norm in virtually all of today’s organizations. While the convenience and flexibility of WiFi have been game changing, concerns continue to abound about WiFi security. In this article, we’ll provide an … Continue reading Introduction to WiFi Security→

Posted in :Blog:, Security Bloggers Network, wifi

Benefits of User Management

Posted on February 8, 2019 by Zach DeMeyer

The average workday of IT admins are chock full of tasks and to-dos. With IT infrastructure now being more critical to businesses than ever, IT admins are in demand. So, the value of everything they do must be analyzed and understood, especially from a… Continue reading Benefits of User Management→

Posted in :Blog:, Security Bloggers Network, user-management

Why Use a Domain Controller?

Posted on February 7, 2019 by Zach DeMeyer

There is an expansive number of components to running an IT infrastructure. As a business owner or executive, you can’t possibly know about every one of the different IT systems and tools that are at play. That’s why you trust your MSP or I… Continue reading Why Use a Domain Controller?→

Posted in :Blog:, Cloud Infrastructure, cloud security, Identity and Access Management (IAM), Security Bloggers Network

IAM Capability: Mac® System Management

Posted on February 6, 2019 by Zach DeMeyer

Macs® are more popular than ever with end users as Microsoft®’s hold on the desktop market declines. With the uptick in Mac usage, the challenge for IT organizations becomes how to properly manage them—both from a user and system … Continue reading IAM Capability: Mac® System Management→

Posted in :Blog:, Mac management, Security Bloggers Network

What is Okta®?

Posted on February 5, 2019 by Zach DeMeyer

With a stock price that has been swooning, many people are asking, what is Okta®? In short, Okta is a cloud-delivered web application single sign-on (SSO) company. The company has been dominating the first generation Identity-as-a-Service (IDaaS) … Continue reading What is Okta®?→

Posted in :Blog:, Security Bloggers Network, Single Sign-On (SSO)

Is Azure AD Multi-Tenant?

Posted on February 5, 2019 by Zach DeMeyer

The Microsoft® cloud platform, Azure®, has steadily been growing in popularity over the past few years. As more companies adopt the Microsoft cloud, including the client organizations of managed service providers (MSPs), there are several con… Continue reading Is Azure AD Multi-Tenant?→

Posted in :Blog:, Azure, cloud security, Security Bloggers Network

Why You Should Use VLAN Steering

Posted on February 1, 2019 by Zach DeMeyer

Network security is a critical component of running an IT infrastructure. With so many security threats that IT organizations and MSPs need to defend against, network security remains a key aspect of that defensive posturing. One way of doing so is wit… Continue reading Why You Should Use VLAN Steering→

Posted in :Blog:, RADIUS, Security Bloggers Network

SCCM Replacement

Posted on February 1, 2019 by Zach DeMeyer

Is there a worthy SCCM replacement? This endpoint management solution, often called ConfigMgr, has been a core solution for Windows®-centric environments. But, as IT infrastructure shifts to non-Windows solutions, many IT admins and MSPs alike are… Continue reading SCCM Replacement→

Posted in :Blog:, Security Bloggers Network, system management

Overview of Cloud LDAP

Posted on January 31, 2019 by Zach DeMeyer

IT organizations are shifting a great deal of their infrastructure to the cloud. Along with leveraging cloud infrastructure from AWS® and productivity platforms such as G Suite™ and Office 365™, IT admins and MSPs are looking to shift … Continue reading Overview of Cloud LDAP→

Posted in :Blog:, ldap, Security Bloggers Network

Remote BitLocker Management

Posted on January 30, 2019 by Zach DeMeyer

The BitLocker full disk encryption (FDE) tool has easily become an indispensable feature of the Windows® operating system. With lost and stolen laptops with confidential data costing some organizations tens of millions of dollars in fines, enablin… Continue reading Remote BitLocker Management→

Posted in :Blog:, Security, Security Bloggers Network

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Linux Mint vs. Elementary OS: I compared both distros, and here’s my advice May 12, 2026
  • Another Gift To The World From CERN: Their Entire Set Of KiCad Libraries May 12, 2026
  • Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak May 12, 2026
  • Microsoft CEO Satya Nadella Testifies In OpenAI Trial May 12, 2026
  • OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation May 12, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up