BEST PRACTICES
Definition of WiFi Authentication
Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?
Who doesn't want to be the best? Learn more about the best practices of the identity and access management (IAM) space.
Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?
As new challenges emerge across the identity provider (IdP) market, it's an exciting time for a cloud identity provider comparison.
By combining Secure Token and FileVault®, Apple® is completely revamping the way that disk encryption and user management work.
For IT admins wondering if unified access management (UAM) for Linux is truly viable, this post will explore the concept in depth.
As a secure, endpoint solution, JumpCloud has introduced a Policies feature to help IT manage systems. So, how do JumpCloud Policies work?
Is the end of life for macOS Open Directory upon us? Apple's recent announcements about the product certainly seem to point that way.
As Apple has been quietly shifting away from macOS Server, should IT organizations look to replace macOS Open Directory?
Group Policy Objects (GPOs) for Linux® would be a dream come true for IT admins. Unfortunately, GPOs are a unique […]
As the identity management space heats up, with new approaches, technologies, and marketing terms being thrown around, it is critical […]
Guest accounts are a perfect opportunity to gain a backdoor into a system. This post looks at disabling guest accounts on Windows machines.
Setting screen saver lock across your Windows fleet is a great system policy, and has never been easier thanks to JumpCloud Policies.