Securing Endpoint User Access

Securing endpoint user access is critical for modern IT organizations. Essentially, it refers to the ability to securely manage and connect users to their laptops, desktops, and other enterprise devices – including the ability to revoke access if… Continue reading Securing Endpoint User Access

Replacing AD with Google IDaaS

Everybody knows that Microsoft® Active Directory® (AD) is the king of the identity management space. For a variety of reasons, AD has been carving out its position at the top of the IAM mountain over the last two decades. But, we also know th… Continue reading Replacing AD with Google IDaaS

The Future of macOS® Open Directory

With the recent announcements from Apple® surrounding macOS® Server, there is a legitimate question about the future of macOS Open Directory™ (OD). Apple has slowly been deprecating various components of macOS Server, and it would appea… Continue reading The Future of macOS® Open Directory

Future of Managing AWS® Servers

Amazon Web Services® (AWS) has over a million users, and their growth is not showing any signs of slowing down. It’s even expected that cloud data centers will process 94% of workloads and compute instances by 2021. With that projection, it&… Continue reading Future of Managing AWS® Servers

What is GCDS (Google Cloud Directory Sync)?

What is GCDS (Google Cloud Directory Sync)? Well, formerly known as Google Apps Directory Sync™, GCDS is a core part of Google’s approach to integrating G Suite™ (formerly Google Apps) into an organization’s IT infrastructure. G… Continue reading What is GCDS (Google Cloud Directory Sync)?

IDaaS Competitors

The Identity-as-a-Service (IDaaS) market is one of the most important in the IT sector. IDaaS solutions are now sitting at the center of most IT networks, and are critical when it comes to controlling access, security, and efficiency. With so much focu… Continue reading IDaaS Competitors

IDaaS Competition

IDaaS competition is heating up. There is no doubt that the category is receiving a lot of attention, especially with multiple vendors being acquired and going public recently. Perhaps the most interesting part of this identity management market is how… Continue reading IDaaS Competition