Manage macOS®

Manage macOS®

Apple® has come a long way from the legendary Los Altos, CA garage. A recent study has found that 91% of enterprises surveyed have adopted macOS® into day to day use. The ...
How to Move to the Cloud as an MSP

How to Move to the Cloud as an MSP

Everything from AWS to G Suite, from Office 365 to the kitchen sink, is moving to the cloud. As the IT landscape shifts beneath them, organizations are pulling up their on-prem roots ...
Directory-as-a-Service® Overview and Demo | JumpCloud Webinar

Directory-as-a-Service® Overview and Demo Webinar

The cloud directory service is creating a stir in the identity and access management (IAM) space. Many of today’s IT admins are finding that traditional, on-prem approaches to IAM have reached the ...
Password reset for Mac

Reset Your Mac® Password

Many people assume that identity security pertains solely to your online identity. While online identities represent one of the more common attack vectors for hackers, there’s another one that represents a vulnerability ...
JumpCloud Ranked #46 on SaaS 1000 for Q3 2018

JumpCloud Ranked #46 on SaaS 1000 for Q3 2018

The SaaS 1000 is a list that indexes the fastest growing companies in the Software-as-a-Service space. The project was started by Tom Blue, founder of Lead411, and utilizes a proprietary algorithm to ...
Can Google Cloud IAM Be Used as a Directory

Can Google Cloud IAM Be Used as a Directory?

Google® has recently introduced a new solution to their Cloud Platform. The solution is called Google Cloud Identity and Access Management (IAM), and it is currently in the beta stage. Because of ...
Is there an outsourced cloud active directory?

Outsourced Cloud Active Directory®

Since its inception in the 1990s, Microsoft® Active Directory® (AD) has been a dominant force in the directory services market. AD’s championship belt, however, has been put under contention as of late ...
Identity management and LDAP

Identity Management Capability Cloud LDAP

LDAP (lightweight directory access protocol) has been a mainstay in the IT industry because it serves as a great tool for authenticating and authorizing users via credentials like a usernames and passwords ...
Identity management and multi factor authentication capabilities

Identity Management Capability Multi-Factor Authentication

Identity security is arguably the number one network security issue that IT admins face daily. A recent study claimed that compromised identities represent the top reason for security breaches. While the problem ...
Admins are searching for a hosted cloud endpoint management solution

Hosted Cloud Endpoint Management

The IT world has changed. No longer are companies packed wall to wall with cubicles and Windows® desktops. Today’s workforce is armed with a variety of platforms, systems, and most importantly of ...
Loading...