How-To

BEST PRACTICES

Definition of WiFi Authentication

Many people take WiFi for granted due to its ubiquity, and to access a network you need authentication. What is the definition of WiFi authentication?

BEST PRACTICES

Cloud Identity Provider Comparison

As new challanges emerge across the identity provider (IdP) market, it's an exciting time for a cloud identity provider comparison.

HOW-TO

AWS® Cloud Directory vs Active Directory®

Amazon has recently introduced a new service on its AWS® platform, called Cloud Directory. So it's time to compare Cloud Directory vs Active Directory®

HOW-TO

The New Okta Upselling Pricing Model

Okta's pricing model reflects where the company is going more so than where it's been. Let's take a look at it and see what we can learn.

HOW-TO

Open Source Alternative to Okta®

IT admins often want to know their options for SSO providers. The challenge for some organizations, though, is finding an open source alternative to Okta.

HOW-TO

Can I Replace AD with Ping Identity®?

With many players in the IAM market, some IT admins are wondering "Can I replace AD with Ping Identity?" This blog post will answer that question.

BEST PRACTICES

NAS File Servers and Directory Services

NAS file servers fill an critical role of data management for IT organizations. But, for many who want to move to the cloud, can the cloud and NAS coexist?

BEST PRACTICES

Manage Samba from the Cloud

Modern IT organizations are shifting the majority of their infrastructure to the cloud. However, one question is how to manage Samba file server access.