Choosing the Best MFA Approach: Device-Based vs Application-Level Multi-Factor Authentication
IT organizations need to consider two major types of Multi-factor Authentication: device-based MFA and application-level MFA.
IT organizations need to consider two major types of Multi-factor Authentication: device-based MFA and application-level MFA.
Explore the feasibility of a passwordless future, the factors driving it, barriers to its adoption, and what’s bringing it closer to reality.
Explore the accessibility of different MFA factors, what they demand of users, and how to accommodate or provide alternatives to inaccessible factors.
Use this actionable checklist tailored towards startups to secure your new and growing organization.
JumpCloud’s CISO discusses ramifications and takeaways of REvil’s supply-chain ransomware attack on Kaseya.
FreeRADIUS doesn’t come preconfigured with a GUI, which can be a hindrance for some IT admins. Learn more about it and find better options.
Cloud-based RADIUS infrastructure is the present and future, and traditional on-prem RADIUS solutions are a thing of the past. Start a free 30 Day Trial today.
Dreading remote domain controller setup for a remote office? Skip it altogether with a modern AD extension or even outright replacement.
Compare LDAP with LDAPS and learn why and how to secure your directory’s legacy LDAP binds using Secure LDAP, including LDAP over SSL and STARTTLS.
People are tired of passwords. So much so that the term “password fatigue” has been developed. But what is password fatigue?
Learn how to sync a remote user’s AD password, which usually requires a VPN, and how to sync VPN authentication to your central directory.
Today’s IT environment demands secured networks, and dynamic VLAN assignment is helping IT admins to do so. But, what is dynamic VLAN assignment?