Security & Networks
Posts on both networks and security (consolidated)
cancel
Showing results for 
Search instead for 
Did you mean: 

Forum Posts

This week's key developments in cybersecurity

I’m back again to help you stay updated on the latest threats and breakthroughs in cybersecurity. This week, I’ve handpicked four stories that showcase just how inventive and relentless cybercriminals can be!   Jump in and explore what’s happening be...

JumpCloud’s Perspective on July’s Global IT Outage

Our CEO, @rajat, has a new blog post up on our corporate blog. In it, he gives a list of immediate steps that organizations should take once they’ve fully brought all of their systems online.  Here are some excerpts from the article:  When we look ba...

BScott by Community Manager
  • 1020 Views
  • 0 replies
  • 2 kudos

PIM or PAM

HelloIs there any plan to incorporate Privilege Access Management functions to JumpCloud?By this, I mean that, for example, the user needs to check in/check out certain critical roles/privileges.  Unless I am mistaken, this does not exist in JC. We s...

SlimJim by Novitiate II
  • 744 Views
  • 0 replies
  • 0 kudos

Resolved! Giving Partial Admin Rights To Users

My company recently deployed jumpcloud for our endpoints and I was wondering if anyone knew of a way through jumpcloud to give partial admin rights to my users.  I do not want my users to reach out to me each time they need the admin password to add/...

blee145 by Novitiate I
  • 5712 Views
  • 3 replies
  • 0 kudos

Passwordless Authentication, what does it mean?

Industry buzzword, or really necessary? Passwordless authentication is something that comes up a lot in the world of Identity and Access Management.  We all have difference of opinion in "true" password less authentication. What does it mean to you? ...

Mac Security Compliance Project (mSCP) and More

Mac Security ComplianceMac admins can begin their compliance journey by following NIST's SP-800-219 secure configuration guidance and using some open source tools that automate deploying controls, using commands through MDM (mobile device management)...

JCDavid by Iron II
  • 1978 Views
  • 0 replies
  • 1 kudos

Security in Cross-OS environments

Do you have difficulty having consistent security practices in a cross-OS environment? Is your security strategy different from user to user or from OS to OS? How much of this work is hands-on vs automated?