Active Directory vs. Okta

Active Directory vs. Okta

Between the proliferation of Mac and Linux systems and the move to cloud-based resources, the IT landscape has witnessed a tremendous amount of change over the last two decades. With changes like ...
Identity and Access Management in the Cloud

Identity and Access Management in the Cloud

Many IT organizations are considering identity and access management in the cloud. After all, the cloud offers increased productivity, agility, and resource consolidation while helping IT organizations save money compared to legacy ...
Cloud Directory Feature AWS® Server Management

Cloud Directory Feature AWS® Server Management

Infrastructure-as-a-Service (IaaS) enables organizations to improve productivity, strengthen security, enhance system speed, reduce operating costs, and provide more time to work on other, value adding projects (Oracle). It’s not surprising then, that ...

Trusted Computing Primary Use Cases

/ / Blog
*This blog was originally published by Onboard Security, a TCG member. There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by ...
Cloud Directory feature macOS Device Management

Cloud Directory feature macOS® Device Management

A cloud directory that features macOS® device management would certainly be helpful in the modern enterprise. While many IT organizations have Macs®, they often don’t have great management tools for Macs. As ...
Google Cloud Directory Sync Replacement

Google Cloud Directory Sync Replacement

Google Cloud Directory Sync (GCDS), formerly known as Google Apps Directory Sync™ (GADS), is a core component of the Google approach to identity management services. GCDS is a cloud identity bridge that ...
ad azure ad

Which is better AD or Azure® AD?

Microsoft® is making a big push to shift their customers to Azure® services. The Office® to Office 365™ transformation may be the most significant example of this. In the identity and access ...
radius history evolution

The History and Evolution of the RADIUS Protocol

RADIUS stands for Remote Authentication Dial-in User Service. It is a network protocol that enables centralized authentication, authorization, and accounting regarding requests sent over a network. Leveraging the RADIUS protocol can be ...
simplified mac management

Simplified Mac® Management

Is there a simplified Mac® management solution available in the cloud? Due to the proliferation of Mac systems in the changing IT landscape, this question has been consuming a lot of time ...
Device Management in Azure Active Directory

Device Management in Azure® Active Directory®

Is there device management in Azure® Active Directory®? Well, sort of, but it’s probably not the device management setup you’re hoping for. Most people think of device management as GPOs (group policy ...
Loading...