IDaaS and the HIPAA Security Rule

IDaaS and the HIPAA Security Rule

The changing landscape of IT is giving organizations new opportunities to address compliance. One area to consider is IDaaS and the HIPAA Security Rule. The core of any compliance initiative is controlling user access to maintain and secure an organization’s sensitive resources, among other areas, as evidenced by HIPAA’s Technical ... Read More
Cloud Identity Provider Comparison

Cloud Identity Provider Comparison

The identity provider (IdP) market is a cornerstone of the world of IT. The market itself has largely been confined to Microsoft® Active Directory® (MAD or AD) and OpenLDAP™ over the last twenty years. In the cloud age, however, new challengers are entering the IdP scene. The thought of a ... Read More
Unified Access Management for Web Applications

Unified Access Management for Web Applications

Web application single sign-on (SSO) has been an important part of the identity and access management (IAM) ecosystem over the last decade. In fact, web app SSO may have been the hottest segment in the identity and access management space over that time period, continuing with that momentum even into ... Read More
cloud identity management

Hosted Identity Cloud

Is a hosted identity cloud useful to IT organizations? Well, it mostly depends on what your organization needs. Many IT organizations are shifting from on-prem identity management infrastructure to cloud alternatives. Due to this, a hosted identity cloud—or SaaS identity management solution—can be very helpful. The Identity Cloud Forms To ... Read More
Achieving ISO/IEC 27001 Certification with JumpCloud

Achieving ISO/IEC 27001 Certification with JumpCloud

Compliance. It’s a word that can send chills down anyone’s spine, especially that of an IT admin. The International Organization of Standardization/International Electrotechnical Commision (ISO/IEC) 27001 is the holy grail when it comes to IT compliance audits. The standard describes an information security management system (ISMS), a powerful method for ... Read More
Unified Access Management for G Suite

Unified Access Management for G Suite™

The concept of unified access management is one that’s being discussed by analysts and vendors a lot lately. The concept has largely been focused on just web and on-prem applications. However, what is interesting to many of today’s IT admins is an extension to this concept: how to center unified ... Read More
IDaaS or Directory Services?

IDaaS or Directory Services?

If you are an IT admin, there’s little doubt that you have faced or soon will face the question, IDaaS or directory services? Why? Well, the IT landscape has changed so much that legacy approaches to controlling user access and managing systems are under tremendous pressure. Let’s dive into the ... Read More
high sierra errors with filevault

High Sierra Authentication Errors with FileVault®

Many IT admins are encountering macOS® High Sierra authentication errors with FileVault® enabled. This problem is completely breaking the model and the processes that IT organizations use to manage Mac® users and systems. While the issue is certainly frustrating, there is a solution that can fix it across a fleet ... Read More
Is Azure AD the future of Active Directory?

Is Azure® AD the future of Active Directory®?

With all the talk of changing directory services in the identity management sector, there’s a great deal of confusion about what the future holds. Long time industry leader, Microsoft® Active Directory® (AD or MAD), seems to be losing its grip on the market, and it’s creating an apparent vacuum in ... Read More
Preparing for Your PCI DSS Audit with JumpCloud

Preparing for Your PCI DSS Audit with JumpCloud

For any company involved with online credit card transactions, the Payment Card Industry Data Security Standard (PCI DSS) audit is the IT admin’s annual hurdle. In order to be compliant, sysadmins need to make sure their networks are up to snuff. So, when approaching your PCI day (or weeks/months in ... Read More
Loading...