Identity management and multi factor authentication capabilities

Identity Management Capability Multi-Factor Authentication

Identity security is arguably the number one network security issue that IT admins face daily. A recent study claimed that compromised identities represent the top reason for security breaches. While the problem ...
Admins are searching for a hosted cloud endpoint management solution

Hosted Cloud Endpoint Management

The IT world has changed. No longer are companies packed wall to wall with cubicles and Windows® desktops. Today’s workforce is armed with a variety of platforms, systems, and most importantly of ...
PCI Section 8 Compliance Requirements

Can IDaaS Support PCI Section 8 Compliance?

Security is at the forefront of every IT admin’s mind. In addition to the huge ramifications of a breach, many organizations are required to implement security measures in order to achieve security ...
iSupportU Case Study with Brett Ramberg | JumpCloud Partner Video

MSP Video Case Study: iSupportU Adapts to Cloud Demand with Directory-as-a-Service®

Managed Service Providers (MSPs) are speaking up about how cloud directory services are changing the way they do business. JumpCloud® is helping open the door to a new frontier of operational efficiency ...
IDaaS vs Active Directory

Can IDaaS Replace Active Directory®?

Like many Windows® products, Microsoft® Active Directory® (MAD or AD) has dominated the IT industry for decades. In the modern era, however, innovations led by an overall shift of IT resources to ...
phishing protection and password management

Phishing Protection

Phishing email scams have plagued the internet since its inception. Almost everyone has heard of the “wealthy Nigerian prince trying to send his diamonds to America” or the “free trip to the ...
JumpCloud featured on built in Colorado

JumpCloud® Featured on Built in Colorado

Nobody knows homegrown pride quite like Coloradans. You can find the red, white, gold, and blue state flag being represented from Miami to Seattle and everywhere in between. Builtincolorado.com is the hub ...
How IDaaS Supports GDPR Article 32

How IDaaS Supports GDPR Article 32

General Data Protection Regulation (GDPR) is one of the most critical privacy and data security compliance requirements that organizations must adhere to right now. GDPR has garnered a great deal of attention ...
High Sierra could not turn on FileVault

High Sierra and FileVault® Compatibility Issues

Many IT admins have been faced with a barrage of issues with managing Mac® users and systems as they have been upgrading their macOS® systems to High Sierra. One such issue is ...
IDaaS and the HIPAA Security Rule

IDaaS and the HIPAA Security Rule

The changing landscape of IT is giving organizations new opportunities to address compliance. One area to consider is IDaaS and the HIPAA Security Rule. The core of any compliance initiative is controlling ...
Loading...