JumpCloud
JumpCloud
Blog Post
  • A cloud-based RADIUS server would certainly help IT secure wireless networks. The trouble is that RADIUS servers have historically been on-prem implementations that are typically adjunct to an on-prem directory services database and infrastructure. Fortunately, there are next generation cloud identity management platforms available that offer RADIUS authentication as a cloud-based service. We’ll d...

JumpCloud
JumpCloud
YouTube Video
  • This JumpCloud video discusses the Best Practices for Mac Security. These steps can be easily implemented across your organization to dramatically improve your Mac Security. Continue watching and subscribe to our channel for more JumpCloud videos. JumpCloud® Directory-as-a-Service® is a next generation cloud identity management platform that securely manages and connects users to their systems, a...

JumpCloud
JumpCloud
Blog Post
  •   The IAM (identity and access management) market is in a state of rapid change. Considering the constant flood of new IT resources, like web applications and Mac systems, it’s not surprising IAM is changing as fast as it is. The challenge is how to connect all of those new IT resources to the age-old […] The post Cloud Directory Feature AD Extension appeared first on JumpCloud.

JumpCloud
JumpCloud
Blog Post
  • Linux® identity and access management (IAM) can be challenging in modern IT organizations. It used to be that Linux systems and servers were such a small fraction of enterprise networks that IT could effectively manage them independently. Now, Linux servers run ninety percent of the public cloud (according to The Linux Foundation) and Linux desktop […] The post Linux® Identity and Access Managemen...

JumpCloud
JumpCloud
YouTube Video
  • This JumpCloud video discusses the Three Best Practices for WiFi Security. These steps can be easily implemented across your organization to dramatically improve your WiFi Security. Continue watching and subscribe to our channel for more JumpCloud videos. JumpCloud® Directory-as-a-Service® is a next generation cloud identity management platform that securely manages and connects users to their sy...

JumpCloud
JumpCloud
Blog Post
  • What is Linux® system management? Well, other than a common challenge in the modern office, Linux system management refers to the ability to manage Linux-based systems such as desktops, laptops, and servers. Why is this a challenge? We invite you to continue reading for the answer to this question, and to discover how the JumpCloud® […] The post What is Linux® System Management? appeared first on ...

JumpCloud
JumpCloud
Blog Post
  • What is the RADIUS protocol? RADIUS is a network protocol that is used to authenticate and authorize user access to a remote network. The term, RADIUS, is an acronym that stands for Remote Authentication Dial-In User Service. First introduced in 1991, RADIUS has remained a powerful tool for managing network user access. To understand why, […] The post What is the RADIUS Protocol? appeared first on...

JumpCloud
JumpCloud
Blog Post
  • Modern IT organizations have their hands full. With mixed platforms, on-prem and cloud-based applications, an array of file storage systems, networks that can span multiple locations, and more, modern IT environments have never been more complex. One challenge that has been causing a lot of friction is how to effectively manage Linux® users and systems. […] The post Linux Management from the Cloud...

JumpCloud
JumpCloud
Blog Post
  • Identity management is becoming one of the hottest markets in the IT space, which is interesting because the identity and access management (IAM) category has historically been controlled by one major player for many years. Recently, though, there has been an explosion of identity management competition in the cloud. These next-generation solutions offer a variety […] The post Identity Management ...

JumpCloud
JumpCloud
Blog Post
  • OneLogin™ has historically been a popular web application single sign-on (SSO) solution. Recently, they added some support for on-prem applications as well. This new approach to application access is what vendors and analysts are calling unified access management. However, managing access to applications, whether on-prem or remote, is but one piece of the overall identity […] The post What’s bette...

JumpCloud
JumpCloud
Blog Post
  • Between the proliferation of Mac and Linux systems and the move to cloud-based resources, the IT landscape has witnessed a tremendous amount of change over the last two decades. With changes like these, can IT organizations continue to manage their modern environment with the long-time leading identity provider, Microsoft® Active Directory®? Or, should they look […] The post Active Directory vs. O...

JumpCloud
JumpCloud
Blog Post
  • Many IT organizations are considering identity and access management in the cloud. After all, the cloud offers increased productivity, agility, and resource consolidation while helping IT organizations save money compared to legacy alternatives. The thing is, not all cloud IAM solutions are created equal. With an ocean of options, it’s certainly no easy task deciding […] The post Identity and Acce...

JumpCloud
JumpCloud
Blog Post
  • Infrastructure-as-a-Service (IaaS) enables organizations to improve productivity, strengthen security, enhance system speed, reduce operating costs, and provide more time to work on other, value adding projects (Oracle). It’s not surprising then, that research suggests 94% of workloads and compute instances will be processed in the cloud by 2021 (Cisco). While IaaS providers have removed the […] T...

JumpCloud
JumpCloud
Blog Post
  • A cloud directory that features macOS® device management would certainly be helpful in the modern enterprise. While many IT organizations have Macs®, they often don’t have great management tools for Macs. As a result, Mac systems have generally been managed independently. By comparison, the Windows® system management capabilities native to the Microsoft® Active Directory® (AD) […] The post Cloud D...

JumpCloud
JumpCloud
Blog Post
  • Google Cloud Directory Sync (GCDS), formerly known as Google Apps Directory Sync™  (GADS), is a core component of the Google approach to identity management services. GCDS is a cloud identity bridge that federates on-prem user identities – generally from Microsoft® Active Directory® (AD) – to Google cloud services such as G Suite™ (formerly Google Apps) […] The post Google Cloud Directory Sync Rep...

JumpCloud
JumpCloud
Blog Post
  • Microsoft® is making a big push to shift their customers to Azure® services. The Office® to Office 365™  transformation may be the most significant example of this. In the identity and access management (IAM) space, Microsoft is pushing their new solution Azure Active Directory® (Azure AD). Can Azure AD completely replace their on-prem solution, Active […] The post Which is better AD or Azure® AD?...

JumpCloud
JumpCloud
Blog Post
  • RADIUS stands for Remote Authentication Dial-in User Service. It is a network protocol that enables centralized authentication, authorization, and accounting regarding requests sent over a network. Leveraging the RADIUS protocol can be highly advantageous in the modern office, but how has a network protocol that was originally designed for dial-up internet managed to stay relevant? […] The post Th...

JumpCloud
JumpCloud
Blog Post
  • Is there a simplified Mac® management solution available in the cloud? Due to the proliferation of Mac systems in the changing IT landscape, this question has been consuming a lot of time and energy for IT admins. As more Macs enter networks, the ability to manage them has become a priority. The good news is […] The post Simplified Mac® Management appeared first on JumpCloud.

JumpCloud
JumpCloud
Blog Post
  • Is there device management in Azure® Active Directory®? Well, sort of, but it’s probably not the device management setup you’re hoping for. Most people think of device management as GPOs (group policy objects) or SCCM for Windows machines, and unfortunately, that’s not really how Microsoft® Azure thinks of device management. However, before we discuss how […] The post Device Management in Azure® A...

JumpCloud
JumpCloud
Blog Post
  • Google has been making a lot of headway with their Google Cloud Identity offering, so it’s time for a Google Cloud Identity review. What can Google Cloud Identity do for your environment? Can Google Cloud Identity completely replace your on-prem identity provider? To answer these questions we need to take a look at Google’s intentions […] The post Google Cloud Identity Review appeared first on Jum...

JumpCloud
JumpCloud
Blog Post
  • In the average organization, IT admins believe their company uses around 50 cloud services; in reality, it’s closer to 1,000 (Cisco). It’s not a surprise, then, that the web application single sign-on (SSO) market is a highly competitive, active market. From afar, it is interesting to see the various players, including OneLogin and Okta, battling […] The post OneLogin™ Competition appeared first o...

JumpCloud
JumpCloud
Blog Post
  • With the recent introduction of Google® Cloud Identity, a G Suite™ Directory review may be in order. The various components of Google Cloud Identity management can be confusing. It’s also important to understand Google’s overall strategy and perspective when it comes to identity and access management (IAM) services. This blog post offers a G Suite […] The post G Suite™ Directory Review appeared fi...

JumpCloud
JumpCloud
Blog Post
  • Virtual Mac® Management solutions are becoming increasingly popular in IT organizations as administrators continue to struggle with mixed platform environments. The struggle comes from the fact that there are a large number of management solutions for Microsoft® Windows®, but the same cannot be said for alternative platforms such as macOS® and Linux®. Fortunately, a next […] The post Virtual Mac® ...

JumpCloud
JumpCloud
Blog Post
  • Identity and access management (IAM) in the cloud is a new category of solution in the IT world. While seasoned IT veterans might argue that Identity-as-a-Service (IDaaS) has been around for years, we’re talking about a much more significant solution for IT organizations. In short, we’re talking about a truly comprehensive cloud identity management solution. […] The post IAM in the Cloud appeared ...

JumpCloud
JumpCloud
Blog Post
  • As Macs® infiltrate organizations, many IT admins are looking for a secure, cloud Mac management solution. After all, an increase in Mac adoption has brought along with it a 72% increase in productivity and happier end users, so it’s safe to say that Macs are here to stay. However, IT has had a challenging time […] The post Secure, Cloud Mac® Management appeared first on JumpCloud.

JumpCloud
JumpCloud
Blog Post
  • Securing endpoint user access is critical for modern IT organizations. Essentially, it refers to the ability to securely manage and connect users to their laptops, desktops, and other enterprise devices – including the ability to revoke access if necessary. Endpoints are the conduit to an organization’s critical applications and data. In an age when over […] The post Securing Endpoint User Access ...

JumpCloud
JumpCloud
Blog Post
  • Everybody knows that Microsoft® Active Directory® (AD) is the king of the identity management space. For a variety of reasons, AD has been carving out its position at the top of the IAM mountain over the last two decades. But, we also know that Google is aiming to dethrone Microsoft from a number of markets. […] The post Replacing AD with Google IDaaS appeared first on JumpCloud.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.