Identity Management Competition

Identity Management Competition

Identity management is becoming one of the hottest markets in the IT space, which is interesting because the identity and access management (IAM) category has historically been controlled by one major player for many years. Recently, though, there has been an explosion of identity management competition in the cloud. These ... Read More
what's better than OneLogin

What’s better than OneLogin™?

OneLogin™ has historically been a popular web application single sign-on (SSO) solution. Recently, they added some support for on-prem applications as well. This new approach to application access is what vendors and analysts are calling unified access management. However, managing access to applications, whether on-prem or remote, is but one ... Read More
Cloud Directory feature macOS Device Management

Cloud Directory feature macOS® Device Management

A cloud directory that features macOS® device management would certainly be helpful in the modern enterprise. While many IT organizations have Macs®, they often don’t have great management tools for Macs. As a result, Mac systems have generally been managed independently. By comparison, the Windows® system management capabilities native to ... Read More
Google Cloud Directory Sync Replacement

Google Cloud Directory Sync Replacement

Google Cloud Directory Sync (GCDS), formerly known as Google Apps Directory Sync™ (GADS), is a core component of the Google approach to identity management services. GCDS is a cloud identity bridge that federates on-prem user identities – generally from Microsoft® Active Directory® (AD) – to Google cloud services such as ... Read More
radius history evolution

The History and Evolution of the RADIUS Protocol

RADIUS stands for Remote Authentication Dial-in User Service. It is a network protocol that enables centralized authentication, authorization, and accounting regarding requests sent over a network. Leveraging the RADIUS protocol can be highly advantageous in the modern office, but how has a network protocol that was originally designed for dial-up ... Read More
simplified mac management

Simplified Mac® Management

Is there a simplified Mac® management solution available in the cloud? Due to the proliferation of Mac systems in the changing IT landscape, this question has been consuming a lot of time and energy for IT admins. As more Macs enter networks, the ability to manage them has become a ... Read More
G Suite™ Directory Review

G Suite™ Directory Review

With the recent introduction of Google® Cloud Identity, a G Suite™ Directory review may be in order. The various components of Google Cloud Identity management can be confusing. It’s also important to understand Google’s overall strategy and perspective when it comes to identity and access management (IAM) services. This blog ... Read More
Virtual Mac® Management

Virtual Mac® Management

Virtual Mac® Management solutions are becoming increasingly popular in IT organizations as administrators continue to struggle with mixed platform environments. The struggle comes from the fact that there are a large number of management solutions for Microsoft® Windows®, but the same cannot be said for alternative platforms such as macOS® ... Read More
IAM in the Cloud

IAM in the Cloud

Identity and access management (IAM) in the cloud is a new category of solution in the IT world. While seasoned IT veterans might argue that Identity-as-a-Service (IDaaS) has been around for years, we’re talking about a much more significant solution for IT organizations. In short, we’re talking about a truly ... Read More
securing endpoint user access

Securing Endpoint User Access

Securing endpoint user access is critical for modern IT organizations. Essentially, it refers to the ability to securely manage and connect users to their laptops, desktops, and other enterprise devices – including the ability to revoke access if necessary. Endpoints are the conduit to an organization’s critical applications and data ... Read More
Loading...