JumpCloud
JumpCloud
Blog Post
  • It is interesting that cloud RADIUS competition is a trend in the IT network market these days. Even just a few years ago, RADIUS (Remote Authentication Dial-in User Service) protocols within IT networks were a fairly rare occurrence. Despite it being a major step-up in security and control over network access, RADIUS was often viewed […] The post Cloud RADIUS competition appeared first on JumpClo...

JumpCloud
JumpCloud
Blog Post
  • Unified access management (UAM) is a new term that has recently been discussed by a number of analysts and firms. However, the term has been causing some confusion because it is generally used to describe a “new” approach to managing access to applications, rather than unifying access management for all IT resources as the name […] The post Unified Access Management for macOS® appeared first on Ju...

JumpCloud
JumpCloud
Blog Post
  • A new term is being thrown around in the IT management world—identity cloud. But, what is an identity cloud, and how can it help you and your organization? With the advent of modern microservices, the concept of an identity cloud is quite interesting. What is an Identity Cloud? To answer this question, we must first […] The post What is an Identity Cloud? appeared first on JumpCloud.

JumpCloud
JumpCloud
Blog Post
  • Did you know the number one cause of companies being breached today is the compromise of identities? It’s true, and what’s more, identity compromise is first by a country mile: 81% of all breaches are based on identity theft or compromise (Verizon). With this in mind, it’s no wonder that every IT organization’s foundation revolves […] The post Identity Security Solution appeared first on JumpCloud...

JumpCloud
JumpCloud
Blog Post
  • Cloud-based directory services have drawn a lot of attention in recent years. The thought of a universal identity management solution that doesn’t require anything on-prem is certainly part of the appeal. Why is this approach advantageous? Let’s take a look at the development of traditional directory services to find out. Overview of Directory Services Historically, […] The post Cloud-Based Direct...

JumpCloud
JumpCloud
Blog Post
  • A new generation of IT management solutions are emerging to support modern approaches to networks. Spearheading this new generation is a solution called JumpCloud® Directory-as-a-Service®. Directory-as-a-Service is a SaaS cloud IAM platform that connects users to the IT resources they need. To understand why this new approach to identity and access management is so powerful, […] The post SaaS Clou...

JumpCloud
JumpCloud
Blog Post
  • When Azure® Active Directory® was released, many IT admins thought they would finally be able to move Active Directory to the cloud. Unfortunately, this hasn’t been the case. IT admins are not able to manage systems, leverage Group Policy Objects (GPO’s), or implement organizational units with Azure AD, like they have been able to with […] The post Customer Q&A: GMEDES Finds Cloud Alternative to A...

JumpCloud
JumpCloud
Blog Post
  • A new generation of solution is taking the concept of microservices further than previously thought possible. The original idea behind microservices was to make more modular, easy-to-build software by leveraging standards and components, rather than building monolithic solutions. The benefits of this approach are enormous, and now, as they’re beginning to be realized, the concept […] The post Clou...

JumpCloud
JumpCloud
Blog Post
  • Is there a way to have outsourced Mac® management? There are a large number of managed service providers (MSPs) that are in business today to help organizations manage their IT infrastructure. The challenge for these MSPs, however, is that many of them have not had the right tools to manage Mac infrastructure. Even if you […] The post Outsourced Mac® Management appeared first on JumpCloud.

JumpCloud
JumpCloud
Blog Post
  • System management refers to the process of administering devices such as laptops, desktops, servers and potentially other IT components. It is a foundational concept in any IT environment. The trouble is that traditional system management solutions have primarily focused on supporting the Microsoft® Windows® operating system (OS) and Windows-based systems. So, as more macOS® and […] The post Cross...

JumpCloud
JumpCloud
Blog Post
  • One of the biggest concerns for IT admins is managing end user passwords. With so many services that users are leveraging across their personal and professional lives, it is easy to be concerned that users are taking short cuts. The good news is that there are some simple password management techniques that IT admins can […] The post Simple Password Management appeared first on JumpCloud.

JumpCloud
JumpCloud
Blog Post
  • Amazon Web Services (AWS®) has been adept at providing all kinds of different microservices for IT, development, and DevOps organizations. Considering the microservice market, the concept of authentication as a microservice has been gaining some steam as the world shifts to the cloud. So, as these organizations continue to leverage cloud infrastructure many are asking, […] The post AWS® Cloud Serv...

JumpCloud
JumpCloud
Blog Post
  • The holy grail in the identity and access management space is to have centralized control and access from one identity to a variety of different IT resources. For a number of reasons, reaching this holy grail has been a challenge, but the destination is getting closer than ever before. A new concept is emerging that […] The post Unified Access Management for Office 365™ appeared first on JumpCloud...

JumpCloud
JumpCloud
Blog Post
  • The web application single sign-on (SSO) market continues to carry a great deal of momentum as it moves forward in the identity management space. As more IT organizations shift their applications to the cloud, first generation Identity-as-a-Service (IDaaS) solutions remain a common consideration. In a crowded market, Okta® appears to have emerged as one of […] The post Okta® Comparison appeared fi...

JumpCloud
JumpCloud
Blog Post
  • You might be asking—is there a cloud domain controller competition going on these days? Even though Microsoft® would have you believe there isn’t an active competition in the works, it’s the right question to ask. With their Azure® Active Directory® Domain Services offering, Microsoft is trying their best to shift their customers from the on-prem […] The post Cloud Domain Controller Competition ap...

JumpCloud
JumpCloud
Blog Post
  • As the IT world continues to migrate to the cloud, Microsoft® continues to push Azure® Active Directory as their platform of choice. But as many IT admins know, Azure AD just isn’t a viable replacement for the on-prem Active Directory®. The result is that IT organizations are left asking, “Is there an open source Azure […] The post Is there an Open Source Azure® Active Directory®? appeared first o...

JumpCloud
JumpCloud
Blog Post
  • Apple®’s recent change to the process of adding users to High Sierra is dramatically upending the approach and processes for user management. By creating a link between the Secure Token and FileVault®, High Sierra users are given improved security, but at the cost of restricting the ease-of-use of user management systems. And, like with all […] The post Problems macOS® Users have with FileVault® a...

JumpCloud
JumpCloud
Blog Post
  • One of the core aspects of IT infrastructure is the identity management capability for user management. In fact, outside of running the network itself, there may not be a more important task for IT admins than identity and access control. Securely connecting users to the IT resources they need is a fundamental requirement for IT […] The post Identity Management Capability for User Management appea...

JumpCloud
JumpCloud
Blog Post
  • With so many breaches occurring worldwide and so many organizations and consumers being impacted, IT admins are shifting their attention to a zero trust security model. This concept has been around for a few years, but as digital assets become increasingly difficult to protect, the zero trust security approach is picking up serious traction. Layered […] The post Zero Trust Security Model appeared ...

JumpCloud
JumpCloud
Blog Post
  • RADIUS authentication has been proven to significantly enhance network security. The challenge is that RADIUS servers have historically been on-prem implementations that are typically ancillary to an on-prem identity management infrastructure. This legacy approach can feel antiquated in the modern era of cloud computing. As a result, many IT organizations have chosen to leverage a […] The post Web...

JumpCloud
JumpCloud
Blog Post
  • What are Group Policy Objects (GPOs)? In short, GPOs are predefined commands, scripts, and task execution templates that control Windows® systems and their policies. They come standard with the Microsoft® Active Directory® (AD) platform, which has helped IT admins manage Windows users and systems for years. Recently, however, the challenge has become figuring out how […] The post What are Group Po...

JumpCloud
JumpCloud
Blog Post
  • A new category of identity management solution is creating a quite a stir in the world of IT. It’s called a virtual cloud identity provider, and it’s being used to integrate user identities into one platform while connecting them to a wide range of IT solutions. But why is the virtual cloud identity provider so […] The post Virtual Cloud Identity Provider appeared first on JumpCloud.

JumpCloud
JumpCloud
Blog Post
  • The shift to the cloud, and the growing importance of authentication services, is driving a new wave of innovation in the LDAP space. For a category of IT solution that hasn’t changed much in over twenty years, this is an exciting development. Now, a top cloud LDAP solution is changing how IT organizations leverage LDAP. […] The post Top Cloud LDAP Solution appeared first on JumpCloud.

JumpCloud
JumpCloud
Blog Post
  • There’s recently been some confusion about what a cloud directory is. Last year, Amazon announced their AWS® Cloud Directory service. Then, there is another cloud directory service called JumpCloud® Directory-as-a-Service® that is changing the way IT admins think about directory services.  So, what’s what here and is this a situation where it is AWS Cloud […] The post AWS® Cloud Directory vs JumpC...

JumpCloud
JumpCloud
Blog Post
  • As the identity management market continues to build up speed with 24 billion dollars of growth expected by the end of 2022 (Market Research Future: Identity and Access Management Market Research Report – Global Forecast 2022), open source availability has been a frequent concern. IT admins are surveying the options and rightfully asking, “Are there […] The post Open Source Directory Services appe...

JumpCloud
JumpCloud
Blog Post
  • When Apple® introduced FileVault® years ago, IT admins were thrilled. When it comes to security mechanisms, a way to automatically encrypt a drive is a powerful tool. Over the years, Apple has continued to evolve their functionality, and most recently have made big changes with macOS® High Sierra. By combining Secure Token and FileVault, they […] The post Secure Token and FileVault® appeared first...