HOW-TO
One-Touch, Frictionless Multi-Factor Authentication Using JumpCloud Protect
IT admins can use JumpCloud Protect as an MFA solution to implement push notifications and TOTPs, for iOS and Android mobile devices.
In our modern world, IT departments need to equip themselves with the right identity and access management tools to support their end users and keep them secure, no matter where they find themselves. These blogs cover IT best practices for enforcing security in a fully remote workforce, non-disruptive administration workflows, and optimizing remote work performance while staying conscious of cost.
IT admins can use JumpCloud Protect as an MFA solution to implement push notifications and TOTPs, for iOS and Android mobile devices.
Ineffective. Obsolete. Unrealistic. These are just some of the words commonly thrown around by IT admins in response to perimeter-based security approaches that incorporate VPNs.
Modernize your infrastructure by learning about what the RADIUS protocol is, how it functions, and what implementation options exist.
Get strong perimeter security with zero trust access control at sustainable costs with JumpCloud and Pritunl.
Learn more about what the bring your own device (BYOD) phenomenon is, and why it’s the go-to solution for enterprise mobility.
PLG means everyone works to create a customer journey that feels so seamless, frictionless, and value-additive that the product sells itself.
Explore conditional access policies through common use cases and examples. Use these examples as guidelines for creating your own conditional access policies.
Ready to scale your AWS resources? Learn how to extend an EBS volume without the need for an EC2 instance reboot.
Ready to simplify database management? Learn how to install phpMyAdmin on your Amazon EC2 instance in this tutorial.
SonicWall firewalls are widely used by MSPs for affordable perimeter security. JumpCloud adds RADIUS authentication with MFA.
Lateral movement is an advanced persistent threat that is particularly dangerous for its ability to target the organization’s crown jewels. Learn how it works, how to detect it, and how to prevent it with Zero Trust.
Advances in biometrics can help companies meet new security, adoption, and ethics demands. Learn more about the future of biometrics.