Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

March 2024

The IT Hour | Identity Federation 03.29.24

Trevor Wiemann, Product Manager at JumpCloud tells us about what's new with Identity Federation. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

What is Cloud Identity Management?

As businesses embrace remote work and the transformation to the cloud, the need for robust identity management is key. But what exactly is cloud identity management, and why is it critical? Essentially, cloud identity management orchestrates identity and access management (IAM) in cloud environments and supports the shifting of authentication and authorization processes to the cloud.

The IT Hour | Disconnecting AD 03.22.24

Rodger Bright, Senior Sales Engineer at JumpCloud joins us to talk about disconnecting Active Directory. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

How To Work with Amazon S3 on Amazon Linux

Jump to Tutorial Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service designed for online backup and archiving of data and applications on Amazon Web Services (AWS). It is designed to make web-scale computing easier for developers and allows you to store and retrieve any amount of data, at any time, from anywhere on the web. Amazon Linux, on the other hand, is a Linux server operating system from AWS, which is engineered for high performance and stability.

IT Asset Management vs. Device Management

Devices are the gateways to our work, and IT professionals understand the importance of managing and securing endpoints as part of a holistic identity and access management (IAM) strategy. Yet, it’s impossible to control what you aren’t aware of. Shadow IT, the unauthorized use of devices, apps, and services that people use to perform their jobs, can bypass even the best security programs.

JumpCloud Acquires Resmo for Integrated Asset Management

JumpCloud has acquired Resmo, an asset management and SaaS security solution, to provide customers a unified solution of SaaS, IT security, and asset management that empowers them to eliminate shadow IT and gain full visibility into all apps and cloud infrastructure in an all-in-one solution. The inclusion of Resmo’s technologies will enhance JumpCloud’s ability to help customers deliver secure and streamlined user provisioning, access request management, and utilization monitoring.

The IT Hour | The Latest on Android 03.15.24

Sergey Belous, Product Manager, tells us about all the cool new updates to JumpCloud's Android management capabilities. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable. You can expect from our weekly conversations.

Bringing Secure, Streamlined, and Scalable Access Management to the Next Level with the Circles Team

Urvashi H.V., Technical Community Champion, JumpCloud talks to Thomas Dias, Senior Technology & Operations Professional, Gautham Shet - Cyber Security Integration Lead, and Ketan Karnick - Head of Enterprise Security from the Circles.co IT team about how they use JumpCloud to solve their security challenges. The team tells us about how JumpCloud has helped them tighten security, as well as speed up repeated processes via integrations and automation.

How to Manage APT Repositories on Debian or Ubuntu

Jump to Tutorial Advanced Package Tool (APT) is the backbone of package management on Debian and Ubuntu systems. It simplifies the process of installing, updating, and removing software. APT works with repositories — designated locations that host packages and update information. Mastering APT repository management ensures you have access to the software you need and that your system remains secure and up to date.
Featured Post

SMEs Invest in Tech Opportunities but Risk Missing Security Safeguards

Across Europe, 100 million people are employed by small and medium-sized enterprises (SMEs). The UK has over five million SMEs, providing three-fifths of employment and £2.4 trillion in turnover. As a vital component in the national economy, SMEs must continue to invest in automation, technology-led innovation, and underpin this with strong security.

How to Modernize Your AD Instance

Whether you want to extend your Active Directory instance to support additional capabilities, need to prepare for an eventual migration without replacing your current implementation, or are ready to move away from AD completely, we've built a roadmap for you. Find your path to modernizing Active Directory by following along with the journeys of Tyrone, Kate, and Eric, fictional IT professionals navigating three different real-world situations where AD needs an update. Grab your copy for detailed insights on the different ways you can prepare your organization to modernize AD.

State of IT 2024

2023 was a year of wild transformation, most notably with huge advances in the availability of AI technologies, persistent security threats, and economic uneasiness. But how will this affect IT professionals in the field in 2024? In this edition of the biannual SME IT Trends Report, JumpCloud surveyed 1200+ IT professionals across the U.S., U.K., and India for insights on how the industry is faring, how others working in IT are preparing for 2024, and quantitative data on IT budgets, OS usage, AI adoption, and more.

What Is Linux Identity and Access Management?

Identity and access management (IAM) provides a consistent, centralized solution to manage user identities and automate access control throughout the organization. This helps security leaders introduce role-based access control and meet governance, risk, and compliance goals. Your organization may already have centralized management policies in place. For example, requiring employees to use a VPN when accessing company assets remotely shows an IAM solution in action.

OneLogin Alternatives: Comparing JumpCloud vs. OneLogin

Assigning users to the right devices, applications, networks, VPNs, and files is a critical part of every company’s IT workflow. Get it wrong, and you’ve instantly tarnished a new hire’s experience — or worse, opened the door to security and compliance violations. With so much riding on this one component of IT or MSP work, organizations of any size need to be judicious about the identity and access management (IAM) tools they select.

The IT Hour | App Lifecycle Releases 03.08.24

Josh Roland, Product Manager at JumpCloud tells us about the latest updates to App Lifecycle Management. Join us at 11:30 am ET. The #IT Hour hosted by #JumpCloud is a #communityprogram focused on the life of #ITAdministrators. With the ever changing #ITlandscape, having community and professional networking opportunities is very valuable.

Using the AWS CLI with Amazon Linux

Amazon Web Services (AWS) provides a wide array of cloud computing solutions. Mastering the AWS Command Line Interface (CLI) is an essential skill for developers, system administrators, and cloud engineers working within its ecosystem. Amazon Linux, an open source Linux distribution provided by AWS, is optimized for running on AWS infrastructure, making it a popular choice for cloud-based applications.

Bridging Security and IT Operations feat. Defensible Technology

In this JumpCloud Partner Success Interview we meet with Stephen Doty, CEO and Founder of Defensible Technology, as he talks about JumpCloud as a "swiss army knife" for IT, their diverse clientele, and how their journey with JumpCloud started with a single request for SSO and MFA.

What is Privileged Identity Management?

Every organization has to assign privileges to its user accounts. Good security practice requires each account to have only the privileges necessary for the role it’s assigned to. Ideally, that means only a few accounts have wide-ranging privileges capable of significantly changing the organization’s security configuration. These typically include systems administrators, database administrators, and service accounts. These accounts are especially vulnerable to security and compliance risks.

How to Install PostgreSQL 16 on RHEL 9

PostgreSQL is one of the leading and widely used open source relational database management systems (RDBMS) that stores structured data in tables, just like MySQL. It is used by developers in their tech stacks and even by large enterprises and corporations to store website and application data. PostgreSQL uses SQL query language to store and manipulate data and also provides JSON support.

Modernize Active Directory: Break Free from the Limitations of AD

Just because you use Active Directory doesn't mean you have to forgo the ability to seamlessly support your ever-changing environment. Just ask Kate, a fictional IT admin representing the journey many AD users take to enable better flexibility and control without deprecating their Active Directory instance. Uncover how you can take the path to modernizing and expanding your Active Directory instance to better support modern work challenges by integrating with JumpCloud's open directory platform.