Cloud Directory feature macOS Device Management

Cloud Directory feature macOS® Device Management

A cloud directory that features macOS® device management would certainly be helpful in the modern enterprise. While many IT organizations have Macs®, they often don’t have great management tools for Macs. As ...
GDPR causes a flood of new policies

GDPR causes a flood of new policies

The upcoming GDPR deadline means you've probably seen an influx of changed policy announcements in your inbox. Here's why you might want to pay attention to the changes. Categories: Privacy Security world ...
policy management for modern infrastructure

Policy Management for Modern Infrastructure

The days of one platform prevailing over an IT environment are over. Today, the typical office is leveraging Mac®, Linux®, and Windows® systems. Unfortunately, this heterogeneous environment is causing problems for IT ...
Replace macOS Open Directory

Replace macOS® Open Directory

IT organizations that have been using Apple® macOS® Server are wondering what’s in store for them in the future. Apple has been quietly shifting away from macOS Server and deprecating various components ...
What is Mac User Management

What is Mac® User Management?

User management is a core activity for virtually all IT organizations. Having a good user management solution in place makes it incredibly easier to secure user access to valuable company digital assets ...
Cloud Mac Management

Cloud Mac Management

The IT network is changing, and it has been for over a decade now. All of the IT infrastructure that used to be dominated by Microsoft® Windows® has since grown... The post ...
Measure Security Performance, Not Policy Compliance

Measure Security Performance, Not Policy Compliance

I started my security (post-sysadmin) career heavily focused on security policy frameworks. It took me down many roads, but everything always came back to a few simple notions, such as that policies ...
disabling guest accounts on windows

Disabling Guest Accounts on Windows®

Guest accounts create the perfect opportunity for hackers to gain a backdoor into a system, and this is why IT admins prefer to have guest accounts completely disabled. If you... The post ...
Setting Screen Saver Lock

Setting Screen Saver Lock Across Your Windows Fleet

One of the easiest ways to compromise a network is for somebody to gain access to a machine that’s been left unattended. Not convinced this is a likely scenario? Have... The post ...
Cloud Directory Feature Cross Platform GPOs

Cloud Directory Feature: Cross Platform GPOs

The directory services space has become far more interesting lately. With the shift to the cloud, new cloud identity and access management (CIAM) solutions are appearing left and right. One... The post ...