Cloud Directory Feature Identity Security

identity securityThere’s never been a more risky time to be leveraging the internet and web. There are too many chances for your users to be compromised and subsequently your organization. Identities are the number one concern. It’s why the cloud directory feature identity security is so critical. In this blog post, we’ll explore how a cloud directory can help to make your IT infrastructure more secure.

Identity Security Challenges in a Modern IT World

Identity security is no easy task these days. Businesses, on average, use 1,427 cloud services,  a mix of Mac®, Linux®, and Windows® systems, and a variety of on-prem and virtual file storage products. In fact, users are not just leveraging different resources, but also a greater amount of resources to complete their work, thereby increasing the risk of data breaches and compromised credentials.

Also, a user’s work identity and resources aren’t confined to just work anymore. Now users will often leverage personal IT tools that are somehow connected to their business identity via a common laptop or even worse, common credentials. This gives anybody else who uses that laptop or those credentials potential access to those work IT resources. Similarly, end users are more mobile than they were a couple decades ago. So, they are connecting to a variety of different types of networks, many of which are insecure (e.g., public WiFi).  

Suffice to say, IT organizations have a tough task with strengthening identity security in their environment. The good news is that there are a variety of techniques that a cloud directory leverages to increase identity security.

Cloud Directory Strengthens Identity Security

Secure Authentication

security cloud directory servicesA cloud directory will one-way hash and salt all credentials. This ensures that credentials aren’t encrypted with a key available for decryption which can be a significant risk. On top of that, a modern cloud directory will leverage multi-factor authentication at the system level where available and the application layer. This ensures that even if a user’s password has been compromised that the second factor will be needed to gain access to (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 149 posts and counting.See all posts by natalie-bluhm