RADIUS has proven to be versatile and adaptable to meet today’s challenges. Modern security controls such as multi-factor authentication (MFA) bolster its defenses.
The post History of the RADIUS Protocol appeared first on JumpCloud.
The post History o…
Tag: Identity and Access Management (IAM)
North America
How to Create Identity and Access Governance In and Across Clouds
by Angelika Steinacker •
In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for an enterprise. Many of the points we raised at that time are still valid. However, the industry has developed and learned a lot since then. More companies and analysts now recognize cloud identity and […]
The post How to Create Identity and Access Governance In and Across Clouds appeared first on Security Intelligence.
Europe, Global Security News, North America
How to Take Back Your Time as a Managed Service Provider (MSP) Owner
by Ashley Gwilliam •
The best way to ease being an MSP without compromising productivity is to achieve more by doing less.
The post How to Take Back Your Time as a Managed Service Provider (MSP) Owner appeared first on JumpCloud.
The post How to Take Back Your Time as a Ma…
Europe, Global Security News, North America
Where Does JumpCloud Fit Within Your Zero Trust Strategy?
by David Worthington •
JumpCloud’s platform helps to satisfy some of the most important tenets of the Zero trust architecture.
The post Where Does JumpCloud Fit Within Your Zero Trust Strategy? appeared first on JumpCloud.
The post Where Does JumpCloud Fit Within Your Zero T…
Europe, Global Security News, North America
Welcome to Groups!
by David Worthington •
JumpCloud’s groups work differently by adding context and automations, proactively recommending changes to memberships, with options for MFA and conditional access.
The post Welcome to Groups! appeared first on JumpCloud.
The post Welcome to Groups! ap…
Europe, Global Security News, North America
Create a JumpCloud-Managed VPN Using Pritunl
by David Worthington •
Get strong perimeter security with zero trust access control at sustainable costs with JumpCloud and Pritunl.
The post Create a JumpCloud-Managed VPN Using Pritunl appeared first on JumpCloud.
The post Create a JumpCloud-Managed VPN Using Pritunl appea…
Europe, Global Security News, North America
Supercharge Fortinet NGFW Security with JumpCloud SSO and Conditional Access
by David Worthington •
JumpCloud’s IAM security controls supercharge firewall and SSL VPN security through its directory, conditional access, and MFA.
The post Supercharge Fortinet NGFW Security with JumpCloud SSO and Conditional Access appeared first on JumpCloud.
The post …
Europe, Global Security News, North America
How-To: Migrate from AD FS to JumpCloud
by David Worthington •
This article outlines two migration paths to help you move on from Microsoft’s AD FS to JumpCloud single sign-on.
The post How-To: Migrate from AD FS to JumpCloud appeared first on JumpCloud.
The post How-To: Migrate from AD FS to JumpCloud appeared fi…
North America
Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale
by Mark Stone •
As businesses embrace more remote users and a hybrid work model, managing user identity and access is more important than ever. Add authentication for millions of third parties and non-employees, and thousands of applications and IoT devices to the mix and you start to understand how important identity and access management (IAM) is. What Exactly […]
The post Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale appeared first on Security Intelligence.
Europe, Global Security News, North America, Vulnerabilities
Survey Surfaces Raft of Cloud Security Challenges
by Michael Vizard •
A survey of 154 North American IT and security decision-makers conducted by Forrester Consulting on behalf of Sonrai Security and Amazon Web Services (AWS) published today found 96% of respondents acknowledged their organization faced security inciden…
Europe, Global Security News, North America, Vulnerabilities
Mismanaged IAM Can Lead to Data Breaches
by Nathan Eddy •
Without proper identity and access management (IAM) policies in place, organizations run the risk of deploying a wide range of security tools without achieving a comprehensive security stance. This was among the chief findings of a report from Palo Al…
Europe, Global Security News, North America
Manage and Secure Access to SonicWall NSv with JumpCloud
by David Worthington •
SonicWall firewalls are widely used by MSPs for affordable perimeter security. JumpCloud adds RADIUS authentication with MFA.
The post Manage and Secure Access to SonicWall NSv with JumpCloud appeared first on JumpCloud.
The post Manage and Secure Acce…
North America
IAM Secures the New, Perimeter-less Reality
by Jonathan Reed •
Necessity may be the mother of invention, and it also drives change. To remain competitive in 2021, companies had to transform rapidly. Today, many of us work from home. Remote and hybrid work models have become the new normal. But what about security? In one recent survey, 70% of office workers admitted to using their […]
The post IAM Secures the New, Perimeter-less Reality appeared first on Security Intelligence.
North America
Integrating IAM and SIEM to Boost Event and Anomaly Detection
by Tobias Ernstberger •
Sending information from your identity and access management (IAM) system to your security information and event management (SIEM) system can help you to find events and anomalies that you might not find otherwise. This can help you detect that an attacker has breached your systems. Your SIEM system might already be collecting a lot of […]
The post Integrating IAM and SIEM to Boost Event and Anomaly Detection appeared first on Security Intelligence.
Europe, Global Security News, North America
What Is SAML Assertion?
by David Worthington •
Assertions make it possible to adopt single sign-on (SSO) that combines convenience with extremely granular user permissions.
The post What Is SAML Assertion? appeared first on JumpCloud.
The post What Is SAML Assertion? appeared first on Security Boul…
Europe, Global Security News, North America
Shields Up: Remember Your Cyber Security Fundamentals
by David Worthington •
It’s an uncertain time. Taking the time to review your cybersecurity posture limits the potential for cyber attacks.
The post Shields Up: Remember Your Cyber Security Fundamentals appeared first on JumpCloud.
The post Shields Up: Remember Your Cyber Se…
Europe, Global Security News, North America
What Are the Different Types of Access Control?
by Kate Lake •
Learn about discretionary, mandatory, rule-based, role-based, and attribute-based access control. Compare advantages and drawbacks of each.
The post What Are the Different Types of Access Control? appeared first on JumpCloud.
The post What Are the Diff…
Europe, Global Security News, North America
Should Microsoft Own Your Identity?
by David Worthington •
IT departments need identity federation with direct, cost-effective access to services from multiple vendors of their choosing.
The post Should Microsoft Own Your Identity? appeared first on JumpCloud.
The post Should Microsoft Own Your Identity? appea…
Europe, Global Security News, North America
Avoiding Cloud Security Pitfalls
by Charlene O’Hanlon •
Charlene O’Hanlon and Keith Neilson from CloudSphere talk about the numerous pitfalls enterprises face in keeping their cloud environments secured, including lack of visibility and monitoring for unauthorized or misplaced access, failure to enfo…
Europe, Global Security News, North America
JumpCloud Q1 Product Roadmap Webinar Recap
by David Worthington •
JumpCloud’s 2022 Q1 product roadmap webinar focused on how the platform will streamline the entire process of managing the user lifecycle
The post JumpCloud Q1 Product Roadmap Webinar Recap appeared first on JumpCloud.
The post JumpCloud Q1 Product Roa…
Europe, Global Security News, North America
MSPs Must Prevent IAM Tool Sprawl
by David Worthington •
Piling on vendors only makes it more difficult for your team to focus on the highest value jobs. Learn to prevent tool sprawl with JumpCloud.
The post MSPs Must Prevent IAM Tool Sprawl appeared first on JumpCloud.
The post MSPs Must Prevent IAM Tool Sp…
Europe, Global Security News, North America
What Is Shadow IT?
by Kate Lake •
Get the definition of shadow IT, examples of common instances of shadow IT, its effects on an organization, and how to identify and prevent it.
The post What Is Shadow IT? appeared first on JumpCloud.
The post What Is Shadow IT? appeared first on Secu…
North America
What You Need to Know About Data Encryption Right Now
by Patrick Ancipink •
You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your fruits and vegetables.” But if you’re like a lot of people, you roll your eyes because you have the good intention of taking care of […]
The post What You Need to Know About Data Encryption Right Now appeared first on Security Intelligence.
Europe, Global Security News, North America
Master Your Craft and Avoid Security Tool Sprawl
by David Worthington •
Learn to manage and keep data safe as well as how to better leverage specific security features within JumpCloud to implement smart access control.
The post Master Your Craft and Avoid Security Tool Sprawl appeared first on JumpCloud.
The post Master …
Europe, Global Security News, North America
Securing Onboarding and Offboarding in the Cloud
by Art Poghosyan •
One of the most fundamental challenges of securing the identity-defined perimeter is efficiently managing and securing the cloud identity life cycle. This priority comes into sharpest focus with offboarding users—or, more accurately, the failure of s…
Europe, Global Security News, North America
NY AG Warns Credential Stuff Compromised 1.1M Accounts
by Teri Robinson •
New York Attorney General Letitia James has put 17 companies on notice that 1.1 million online accounts have been compromised by cyberattacks involving credential stuffing. In a “Business Guide for Credential Stuffing Attacks” that described her offic…
Europe, Global Security News, North America
The Immediate Advantages of Attribute-Based Access Control
by David Worthington •
Attribute-based access control (ABAC) provides an instant cross-check of users within a group to the apps and resources they need.
The post The Immediate Advantages of Attribute-Based Access Control appeared first on JumpCloud.
The post The Immediate A…
Europe, Global Security News, North America
When Not to Trust Zero-Trust
by Sue Poremba •
Zero-trust is an increasingly popular cybersecurity model. Even the National Security Agency encourages the use of a zero-trust architecture, largely because of its data-centric approach to protecting critical assets across the network. Yet, no matter…
North America
IAM OT Security Risks Call for Strategic Defenses
by Spyros Rapsomanikis •
Today’s technology requires today’s identity and access management (IAM). In the past, operational technology (OT) systems were physically and logically separated from a company’s enterprise corporate business environment and the external world. That served as a control to protect them from common cyberattacks. Starting in the 1970s, serial-based analog processes controlled, managed and monitored these […]
The post IAM OT Security Risks Call for Strategic Defenses appeared first on Security Intelligence.
North America
7 Holiday Cybersecurity Tips to Try Before The Year Ends
by Jonathan Reed •
The holiday rush is upon us, and so is the risk of cyberattack. Threat actors often get to work during the holidays. IT staff is heading out for vacation, and everyone is in a hurry. This means we might skimp on security. Still, there are some holiday cybersecurity tips that will help make the season […]
The post 7 Holiday Cybersecurity Tips to Try Before The Year Ends appeared first on Security Intelligence.
Europe, Global Security News, North America
Understanding IAM Security
by Molly Murphy •
IAM security is the policies and systems you have to mitigate risk. Learn the benefits and best practices of implementing IAM security.
The post Understanding IAM Security appeared first on JumpCloud.
The post Understanding IAM Security appeared first …
Europe, Global Security News, North America
Crash Course: What Is Identity Management?
by Molly Murphy •
Identity Management is verifying and permissioning users, and it’s the secret weapon against cyber attacks. Learn why you need it.
The post Crash Course: What Is Identity Management? appeared first on JumpCloud.
The post Crash Course: What Is Identity…
Europe, Global Security News, North America
JumpCloud is an Official IdP for AWS SSO
by Brenna Lee •
JumpCloud is an official Identity Provider (IdP) for AWS SSO identity management via our SCIM integration.
The post JumpCloud is an Official IdP for AWS SSO appeared first on JumpCloud.
The post JumpCloud is an Official IdP for AWS SSO appeared first o…
Europe, Global Security News, North America
What is True Single Sign-On (SSO)?
by Brenna Lee •
True SSO should describe exactly what the name implies – the ability to leverage a single set of credentials to sign on to various resources.
The post What is True Single Sign-On (SSO)? appeared first on JumpCloud.
The post What is True Single Sign-On …
North America
Identity and Access Management: What’s Driving the Rush?
by Jonathan Reed •
A recent Fortune Business Insights report projects that the global Identity and Access Management (IAM) market (valued at $9.53 billion in 2018) will reach $24.76 billion by the end of 2026, showing a CAGR of 13.17%. What’s behind this massive demand? In a nutshell, people don’t want their identities stolen. But the real drivers are […]
The post Identity and Access Management: What’s Driving the Rush? appeared first on Security Intelligence.
North America
Nobelium Espionage Campaign Persists, Service Providers in Crosshairs
by Limor Kessem •
In an advisory released on October 24, Microsoft announced ongoing campaigns it has attributed to the Nobelium state-sponsored threat group. IBM X-Force tracks this group as Hive099. If the name sounds familiar, that’s because it is the same group that targeted SolarWinds in 2020. The U.S. government has identified Nobelium as part of Russia’s foreign […]
The post Nobelium Espionage Campaign Persists, Service Providers in Crosshairs appeared first on Security Intelligence.
North America
Supply Chain Attack: What It Is (and What to Do About It)
by Douglas Bonderud •
The past two years have delivered major disruptions for supply chains. The pandemic pushed supply chain attack issues front-and-center, with disruptions up 67% in 2020 and problems expected to persist as global markets adjust to ‘new normal’ operations. Increasing reliance on digital supply solutions, however, has also set the stage for increasing supply chain attacks. […]
The post Supply Chain Attack: What It Is (and What to Do About It) appeared first on Security Intelligence.
Europe, Global Security News, North America
IAM for Multi-Cloud Environments
by Art Poghosyan •
When organizations began moving operations to the cloud, it quickly became clear that the practices used to secure on-premises networks would be inadequate. Networks once defined by physical locations were now geo-agnostic; users needed to access data…
North America
What is Web Application Security? A Protective Primer for Security Professionals
by Douglas Bonderud •
Evolving threats put applications at risk. Robust web application security can help prevent compromise before it happens. Not sure where to start? Our protective primer has you covered. What Is Web Application Security? Web application security focuses on the reduction of threats through the identification, analysis and remediation of potential weaknesses or vulnerabilities. While the bulk […]
The post What is Web Application Security? A Protective Primer for Security Professionals appeared first on Security Intelligence.
North America
6 Benefits of Using Privileged Access Management
by Jennifer Gregory •
When you think of access, passwords are likely the first thing that pops into your head. While passwords are a large and important part of managing access, there are other aspects to consider as well. Using the full spectrum offered by Privileged Access Management (PAM) can help. It’s easy to focus on the glitzier sides […]
The post 6 Benefits of Using Privileged Access Management appeared first on Security Intelligence.