Unified Access Management for macOS

Unified Access Management for macOS®

Unified access management (UAM) is a new term that has recently been discussed by a number of analysts and firms. However, the term has been causing some confusion because it is generally used to describe a “new” approach to managing access to applications, rather than unifying access management for all ... Read More
Cloud-based directory services

Cloud-Based Directory Services

Cloud-based directory services have drawn a lot of attention in recent years. The thought of a universal identity management solution that doesn’t require anything on-prem is certainly part of the appeal. Why is this approach advantageous? Let’s take a look at the development of traditional directory services to find out ... Read More
Cross-platform system management

Cross-Platform System Management

System management refers to the process of administering devices such as laptops, desktops, servers and potentially other IT components. It is a foundational concept in any IT environment. The trouble is that traditional system management solutions have primarily focused on supporting the Microsoft® Windows® operating system (OS) and Windows-based systems ... Read More
Web-based RADIUS Server

Web-based RADIUS Server

The post Web-based RADIUS Server appeared first on JumpCloud ... Read More
Top Cloud LDAP Solution

Top Cloud LDAP Solution

The shift to the cloud, and the growing importance of authentication services, is driving a new wave of innovation in the LDAP space. For a category of IT solution that hasn’t changed much in over twenty years, this is an exciting development. Now, a top cloud LDAP solution is changing ... Read More
SaaS Endpoint Management

SaaS Endpoint Management

Software-as-a-Service (SaaS) has revolutionized the way IT organizations do business, and just about every traditional IT resource or solution can be delivered as a cloud-based service. Yet, IT admins still face numerous challenges with managing modern networks, especially with respect to their endpoints (i.e., Windows®, Mac®, Linux®). So, given the ... Read More
Cloud Directory Replacement

Cloud Directory Replacement

Most IT admins will tell you that implementing a cloud directory replacement for traditional, on-prem identity providers, such as Microsoft® Active Directory® (AD), makes a lot of sense. The challenge is that AD is so entrenched in so many IT organizations that the thought of shifting to a cloud directory ... Read More
Unified Access Management for Linux

Unified Access Management for Linux

Unified access management (UAM) is a new term that has recently been created by analysts and vendors to describe a narrow view of the identity and access management (IAM) space, specifically, with respect to controlling web and on-prem applications. However, IT admins are curious if it is possible to expand ... Read More
Top Identity Management Solutions

Top Identity Management Solutions

As the identity management space continues to enjoy a renaissance of sorts, a new generation of top identity management solutions has emerged for modern networks. The core of IAM (identity and access management) has primarily been owned by one solution for many years, and the only excitement came from solutions ... Read More
Outsourced Cloud Directory – JumpCloud® Directory-as-a-Service®

Outsourced Cloud Directory – JumpCloud® Directory-as-a-Service®

Organizations have been outsourcing IT resources over the past decade, and just about every IT category has made the leap to the cloud. And, while directory services platforms have historically been one of the slowest categories to shift to the ‘as-a-Service’ model, a new outsourced cloud directory is enabling IT ... Read More
Loading...