BEST PRACTICES
Apple Open Directory versus Microsoft Active Directory
With a complex IT environment of heterogenous networks and devices, and cloud-based apps, on-premises directory services solutions fall short.
In our modern world, IT departments need to equip themselves with the right identity and access management tools to support their end users and keep them secure, no matter where they find themselves. These blogs cover IT best practices for enforcing security in a fully remote workforce, non-disruptive administration workflows, and optimizing remote work performance while staying conscious of cost.
With a complex IT environment of heterogenous networks and devices, and cloud-based apps, on-premises directory services solutions fall short.
Installing and configuring a RADIUS server is complex and painful. Radius-as-a-Service makes it easy, with easy integrating with Cisco Meraki as well.
In this article we discuss the three primary ways that most people use to secure wireless networks and the pros and cons of each method.
Now that GCE has released their (beta) VPN service, it's a good time to try to get a VPN between the Google Compute Engine and AWS.
Authenticating Linux via AWS can be done quickly with the install of an agent via JumpCloud. The nice part is that it only takes a couple of minutes.
Learn how to build and automate complex workflow tasks with JumpCloud when finding solutions for distributed job scheduling systems.