cloud directory

What is a Cloud Directory?

As cloud adoption in IT continues to rise, vendors are introducing cloud directory offerings to the space. Some of these, however, aren’t exactly what you’d expect. This head scratching has led IT ...
Password reset for Mac

Reset Your Mac® Password

Many people assume that identity security pertains solely to your online identity. While online identities represent one of the more common attack vectors for hackers, there’s another one that represents a vulnerability ...
Is there an outsourced cloud active directory?

Outsourced Cloud Active Directory®

Since its inception in the 1990s, Microsoft® Active Directory® (AD) has been a dominant force in the directory services market. AD’s championship belt, however, has been put under contention as of late ...
Identity management and LDAP

Identity Management Capability Cloud LDAP

LDAP (lightweight directory access protocol) has been a mainstay in the IT industry because it serves as a great tool for authenticating and authorizing users via credentials like a usernames and passwords ...
Admins are searching for a hosted cloud endpoint management solution

Hosted Cloud Endpoint Management

The IT world has changed. No longer are companies packed wall to wall with cubicles and Windows® desktops. Today’s workforce is armed with a variety of platforms, systems, and most importantly of ...
identity management and user attributes

What are User Attributes?

Like snowflakes, no one person is quite the same as any other. Yet, when creating a user identity in a directory service, everyone starts out the same. How can an IT admin ...
Is it possible to have one identity for both Office 365 and G suite?

One Identity for Both Office 365™ and G Suite™

In the modern age, many organizations are now leveraging both Google’s G Suite™ and Microsoft® Office 365™. One may initially doubt the plausibility of this. After all, aren’t Google and Microsoft natural ...
Identity management and directory service

Best Directory Service

Today’s IT market is rapidly changing. With a general increase in security breaches and respondent uptick in compliance requirements, the identity management space is certainly becoming a hot spot of industry focus ...
PCI Section 8 Compliance Requirements

Can IDaaS Support PCI Section 8 Compliance?

Security is at the forefront of every IT admin’s mind. In addition to the huge ramifications of a breach, many organizations are required to implement security measures in order to achieve security ...
What is the definition of user management?

User Management Defined

In this day and age, the number of IT resources and tools used by the average employee is constantly growing. In 2017 alone, the typical enterprise used 1,427 distinct cloud services and ...