Identity Security Tool

Identity Security Tool

According to a recent report from Verizon, 81% of breaches are a result of stolen and/or weak passwords. That’s a staggering number and one that has only been increasing over the years. Traditionally, IT admins were focused on protecting the perimeter. However, the modern era requires a zero trust concept, ... Read More
Unified Access Management for Windows

Unified Access Management for Windows

There’s a new term that identity management vendors are throwing around. It’s called unified access management. Unfortunately, thus far, the term has been mainly used to reference centralized access to web and on-prem applications. But, wouldn’t it be nice to have unified access to all IT resources? After all, the ... Read More
Customer Q&A: GMEDES Finds Cloud Alternative to AD

Customer Q&A: GMEDES Finds Cloud Alternative to AD

When Azure® Active Directory® was released, many IT admins thought they would finally be able to move Active Directory to the cloud. Unfortunately, this hasn’t been the case. IT admins are not able to manage systems, leverage Group Policy Objects (GPO’s), or implement organizational units with Azure AD, like they ... Read More
Simple Password Management

Simple Password Management

One of the biggest concerns for IT admins is managing end user passwords. With so many services that users are leveraging across their personal and professional lives, it is easy to be concerned that users are taking short cuts. The good news is that there are some simple password management ... Read More
IAM Function Cloud User Management

IAM Function Cloud User Management

In the past, IT environments were on-prem and largely based on one type of provider and platform. Identity and access management (IAM) tools were created with this in mind, and user management was straightforward. Now, there is a flood of web-based applications, a variety of providers and platforms, and an ... Read More
What is DevOps and Why It's Important

What is DevOps and Why It’s Important

What is DevOps and Why It’s Important A recent survey from Suse reveals that 86% of IT leaders (1400 surveyed) see DevOps as part of their future IT strategy, and 77% plan to incorporate DevOps methodology into their application development and delivery. So, what is DevOps, and why do organizations ... Read More
Cloud system management

What is Cloud System Management?

Over the last few years, the cloud has proven itself to be a worthy ally among IT organizations. According to Suse, cloud resources improve efficiency, consolidation, productivity, and reduce costs. One IT component that has greatly benefited IT admins is cloud system management. What is cloud system management, exactly? How ... Read More
OneLogin

OneLogin™ Review

Over the last few years, web-based applications have flooded organizations. In fact, their adoption in the workplace has quadrupled over the last three years alone (Blissfully). With this statistic in mind, it makes sense that the web application single sign-on (SSO) market is one of the hottest categories in the ... Read More
macOS Server

macOS® Server EOL?

Is macOS® server EOL (end-of-life)? It’s an interesting question. After all, IT admins use macOS Server to handle a variety of tasks, and one of them is to run Open Directory™ (OD). Yet, with all of the latest news around macOS Server components being deprecated, it is easy to wonder ... Read More
is azure ad an outsourced directory

Is Azure® Active Directory® an Outsourced Directory?

As Microsoft® makes a big push with Azure®, we often hear IT admins ask, “Is Azure Active Directory® an outsourced directory?” In other words, can Azure AD replace its on-prem counterpart, Active Directory? These questions are good ones considering that IT organizations are interested in making the leap to the ... Read More
Loading...