Multi-Factor Authentication for Your VPN: 3 Keys to Getting It Right

How many multi-factor authentication solutions does it take to secure VPN access today? Just one, if it?s the right kind of solution. Here?s what you need in today?s access environment to ensure ...
mac management solution

Mac® Management Solutions

With virtually every IT organization on the planet utilizing Macs®, it is no wonder that IT organizations are searching for Mac management solutions. The challenge has been finding a Mac management solution ...
Future of User Management? Cloud Directory Services

Future of User Management? Cloud Directory Services

Controlling access to IT resources is one of the most important roles in the enterprise today. It’s not just about user efficiency. With more data security breaches than ever before,... The post ...
Unthinkable! Hackers Loot Charity’s Funds Right Before Christmas Season

Unthinkable! Hackers Loot Charity’s Funds Right Before Christmas Season

Hackers have done the unthinkable by making off with a charity’s funds right before the start of the 2017 Christmas season. The Utah Association for Intellectual Disabilities (UAID) first noticed something was ...
samba file server directory services

Samba File Servers and Directory Services

Samba file servers and Network Attached Storage (NAS) devices are appliances that are specialized for data storage and for serving files. Many organizations leverage Samba file servers and NAS devices... The post ...
cloud iam server authentication

Cloud IAM feature Server Authentication

Server authentication is one of the most important functions of identity management. Servers often run an organization’s most critical applications, and as a result access to those systems is incredibly... The post ...
Do you live in one of the most-hacked states?

Two-Factor Authentication: Why & How You Should Use it

Conventional wisdom about passwords is shifting, as they are increasingly seen as a less-than-ideal security measure for securing digital accounts. Even the recommended rules for creating strong passwords were recently thrown out ...
virtual system management

Virtual System Management

Managing systems has long been the bread-and-butter for IT admins – but it has changed a lot. In the early 2000’s, managing systems was simpler insofar as the infrastructure was... The post ...
virtual true single sign-on

Virtual True Single Sign-On

Single sign-on has been around for a while. However, the concept of single sign-on has morphed over the years to be less about one identity connecting your users to everything... The post ...
Loading...