Identity and Access Management in the Cloud

Identity and Access Management in the Cloud

Many IT organizations are considering identity and access management in the cloud. After all, the cloud offers increased productivity, agility, and resource consolidation while helping IT organizations save money compared to legacy ...
Google Cloud Directory Sync Replacement

Google Cloud Directory Sync Replacement

Google Cloud Directory Sync (GCDS), formerly known as Google Apps Directory Sync™ (GADS), is a core component of the Google approach to identity management services. GCDS is a cloud identity bridge that ...
OneLogin Competition

OneLogin™ Competition

In the average organization, IT admins believe their company uses around 50 cloud services; in reality, it’s closer to 1,000 (Cisco). It’s not a surprise, then, that the web application single sign-on ...
IAM in the Cloud

IAM in the Cloud

Identity and access management (IAM) in the cloud is a new category of solution in the IT world. While seasoned IT veterans might argue that Identity-as-a-Service (IDaaS) has been around for years, ...
cloud identity management competition

Cloud Identity Management Competition

There is no doubt that cloud identity management competition is heating up. New players are entering the game in droves, and just about every IT company in the world is placing bets ...
open source identity management

Open Source Identity Management

Are there viable, open source identity management solutions for IT organizations? Many IT admins are familiar with the usual open source IAM solutions such as OpenLDAP™, Samba, and FreeIPA, to name a ...
Identity Provider in the Cloud

Identity Provider in the Cloud

The concept of an identity provider in the cloud is one that is relatively new to the market. IT organizations have traditionally seen solely on-prem identity providers, but, as the IT market ...
Simple Cloud Identity Management

Simple Cloud Identity Management

Is there a simple cloud identity management solution available? It would definitely be a breath of fresh air for IT administrators drowning in the sea of complexity that is modern identity management ...
The Foundation of IT The Identity Provider

The Foundation of IT: The Identity Provider

We often hear the phrase, “Work on what is important, not necessarily urgent.” IT organizations know this axiom all too well. In a business that is highly interruption driven and reactive, IT ...
Increasing Security through Next Generation IAM

Increasing Security through Next Generation IAM

Compromised identities are the number one way that hackers are gaining entry to IT networks. It is the easiest, most direct way that a bad actor can access confidential digital data. Unfortunately, ...
Loading...