Strategic CIO // IT Strategy
Commentary
5/13/2014
12:56 PM
Dan Tesch
Dan Tesch
Commentary
Connect Directly
RSS
E-Mail

Centralized Authentication: A Double-Edged Sword

Active Directory is a great centralized authentication service for security and compliance, but Macs, mobile devices, and remote access cause headaches.
2 of 2

2 of 2
Comment  | 
Print  | 
Transformative CIOs Organize for Success
Transformative CIOs Organize for Success
Trying to meet todayís business technology needs with yesterdayís IT organizational structure is like driving a Model T at the Indy 500. Time for a reset.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - August 20, 2014
CIOs need people who know the ins and outs of cloud software stacks and security, and, most of all, can break through cultural resistance.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.