Identity and Access Management Alternative

In the hotly contested IT management tools marketplace, IT admins are searching for an identity and access management (IAM) alternative. For the last two decades, the core of identity management within an organization has been Microsoft® Active Di… Continue reading Identity and Access Management Alternative

Recognizing the Best in Identity & Access Management: Gemalto Wins Best IAM Solution

This week Gemalto was recognized at the 2018 Channelnomics Security Awards for Best Identity & Access Management offering for SafeNet Trusted Access. The Channelnomics Security Awards recognize the trailblazers in the security industry who are… Continue reading Recognizing the Best in Identity & Access Management: Gemalto Wins Best IAM Solution

Privileged Account Management and Identity Access Management: Same Family, Different Strengths

From a cyber criminal’s point of view, obtaining privileged account information has the highest ROI of any attack strategy. A malicious actor with privileged account passwords in hand could infiltrate key databases and access highly sensitive dat… Continue reading Privileged Account Management and Identity Access Management: Same Family, Different Strengths

Achieving ISO/IEC 27001 Certification with JumpCloud

Compliance. It’s a word that can send chills down anyone’s spine, especially that of an IT admin. The International Organization of Standardization/International Electrotechnical Commision (ISO/IEC) 27001 is the holy grail when it comes to … Continue reading Achieving ISO/IEC 27001 Certification with JumpCloud

Unified Access Management for Legacy Applications

In this modern era of IT technology, cloud-based solutions are considered king among most enterprises. Due to this, it seems like everybody has forgotten about on-prem, legacy applications. With all of the interest going towards modern web applications… Continue reading Unified Access Management for Legacy Applications

Comparing Ping Identity® and JumpCloud®

  Comparing Ping Identity® and JumpCloud® Directory-as-a-Service® isn’t really an apples to apples comparison. Each identity management solution has the ability to access different types of IT resources, so comparing them is n… Continue reading Comparing Ping Identity® and JumpCloud®

Top Identity Management Solutions

As the identity management space continues to enjoy a renaissance of sorts, a new generation of top identity management solutions has emerged for modern networks. The core of IAM (identity and access management) has primarily been owned by one solution… Continue reading Top Identity Management Solutions

What is Cloud IAM?

What is Cloud IAM? In short, it refers to the ability to manage user identities and their access to IT resources from the cloud. Why should cloud IAM be a priority? To answer that question, let’s take a look at the evolution of traditional identi… Continue reading What is Cloud IAM?

Cloud Directory Feature AD Extension

  The IAM (identity and access management) market is in a state of rapid change. Considering the constant flood of new IT resources, like web applications and Mac systems, it’s not surprising IAM is changing as fast as it is. The challenge i… Continue reading Cloud Directory Feature AD Extension