Definition of Active Directory®

IT admins are the arbiters of control when it comes to user access of IT resources. Their main tool of doing so is the directory service, most often the legacy, on-prem Microsoft® Active Directory® (MAD or AD). For those that don’t know… Continue reading Definition of Active Directory®

Definition of Active Directory®

IT admins are the arbiters of control when it comes to user access of IT resources. Their main tool of doing so is the directory service, most often the legacy, on-prem Microsoft® Active Directory® (MAD or AD). For those that don’t know… Continue reading Definition of Active Directory®

Phishing Protection

Phishing email scams have plagued the internet since its inception. Almost everyone has heard of the “wealthy Nigerian prince trying to send his diamonds to America” or the “free trip to the Bahamas, just send us your bank account num… Continue reading Phishing Protection

Definition of Domain Controller

Like a feudal lord, the IT admin is the ruler of their domain. Unlike medieval times, however, the IT admin’s domain is not one of fiefs and farmers, but filled with users, systems, networks, databases, and more. These facets of the domain are al… Continue reading Definition of Domain Controller

IDaaS and the HIPAA Security Rule

The changing landscape of IT is giving organizations new opportunities to address compliance. One area to consider is IDaaS and the HIPAA Security Rule. The core of any compliance initiative is controlling user access to maintain and secure an organiza… Continue reading IDaaS and the HIPAA Security Rule

Hosted Identity Cloud

Is a hosted identity cloud useful to IT organizations? Well, it mostly depends on what your organization needs. Many IT organizations are shifting from on-prem identity management infrastructure to cloud alternatives. Due to this, a hosted identity clo… Continue reading Hosted Identity Cloud

Achieving ISO/IEC 27001 Certification with JumpCloud

Compliance. It’s a word that can send chills down anyone’s spine, especially that of an IT admin. The International Organization of Standardization/International Electrotechnical Commision (ISO/IEC) 27001 is the holy grail when it comes to … Continue reading Achieving ISO/IEC 27001 Certification with JumpCloud

Unified Access Management for G Suite™

The concept of unified access management is one that’s being discussed by analysts and vendors a lot lately. The concept has largely been focused on just web and on-prem applications. However, what is interesting to many of today’s IT admin… Continue reading Unified Access Management for G Suite™

IDaaS or Directory Services?

If you are an IT admin, there’s little doubt that you have faced or soon will face the question, IDaaS or directory services? Why? Well, the IT landscape has changed so much that legacy approaches to controlling user access and managing systems a… Continue reading IDaaS or Directory Services?

High Sierra Authentication Errors with FileVault®

Many IT admins are encountering macOS® High Sierra authentication errors with FileVault® enabled. This problem is completely breaking the model and the processes that IT organizations use to manage Mac® users and systems. While the issue… Continue reading High Sierra Authentication Errors with FileVault®