Cloud Directory Feature AD Extension

  The IAM (identity and access management) market is in a state of rapid change. Considering the constant flood of new IT resources, like web applications and Mac systems, it’s not surprising IAM is changing as fast as it is. The challenge i… Continue reading Cloud Directory Feature AD Extension

Linux® Identity and Access Management

Linux® identity and access management (IAM) can be challenging in modern IT organizations. It used to be that Linux systems and servers were such a small fraction of enterprise networks that IT could effectively manage them independently. Now, Lin… Continue reading Linux® Identity and Access Management

Identity Management Competition

Identity management is becoming one of the hottest markets in the IT space, which is interesting because the identity and access management (IAM) category has historically been controlled by one major player for many years. Recently, though, there has … Continue reading Identity Management Competition

Identity and Access Management in the Cloud

Many IT organizations are considering identity and access management in the cloud. After all, the cloud offers increased productivity, agility, and resource consolidation while helping IT organizations save money compared to legacy alternatives. The th… Continue reading Identity and Access Management in the Cloud

How GDPR Affects IAM Usage

GDPR is placing a lot of demands on companies to protect the privacy of individuals. But what does that mean for identity management? The European Union’s General Data Protection Regulation (GDPR) takes effect May 25 and aims to protect the identity o… Continue reading How GDPR Affects IAM Usage

G Suite™ Directory Review

With the recent introduction of Google® Cloud Identity, a G Suite™ Directory review may be in order. The various components of Google Cloud Identity management can be confusing. It’s also important to understand Google’s overall … Continue reading G Suite™ Directory Review

IAM in the Cloud

Identity and access management (IAM) in the cloud is a new category of solution in the IT world. While seasoned IT veterans might argue that Identity-as-a-Service (IDaaS) has been around for years, we’re talking about a much more significant solu… Continue reading IAM in the Cloud

Securing Endpoint User Access

Securing endpoint user access is critical for modern IT organizations. Essentially, it refers to the ability to securely manage and connect users to their laptops, desktops, and other enterprise devices – including the ability to revoke access if… Continue reading Securing Endpoint User Access

Cloud Identity Management Competition

There is no doubt that cloud identity management competition is heating up. New players are entering the game in droves, and just about every IT company in the world is placing bets on the outcome. The challenge for IT is, of course, to find the cloud … Continue reading Cloud Identity Management Competition

Open Source Identity Management

Are there viable, open source identity management solutions for IT organizations? Many IT admins are familiar with the usual open source IAM solutions such as OpenLDAP™, Samba, and FreeIPA, to name a few, but are there others that could be helpfu… Continue reading Open Source Identity Management