Poor user adoption is a nightmare shared by most IT project managers. The idea of spending countless dollars and hours of labor only to go live with a new service or tool that lacks total end-user adoption is enough to keep anyone awake at night. Such a fear is prevalent even with the implementation of […]
The trouble with reverse proxying
One of the big use cases for having an SSL VPN is the ability to grant secure access to internal company websites to your remote users. This is generally done by reverse proxying and when it works right it’s a great way of securing your internal sites that you would rather not have directly facing […]
Is Outsourcing IT A Good Idea?
Security is an important part of any business and ensuring that the business is fully protected can be a very time consuming job, this is especially the case when organizations are not willing to expand and trust external security providers, thus most of their IT work is allocated to the in-house IT department. These tasks […]
The Requirements Quagmire: Sidestep a Common Single Sign-On Implementation Issue
A good foundation is just as crucial in implementing a technology, like Single Sign-On, as it is in building a sturdy structure. In implementing a technology initiative, that foundation starts with acquiring and documenting the business and technology requirements in a clear manner. All too often the lack of properly documented requirements right from the […]
Success to Having Maximum Security When it Comes to Mobility

Mobility can be challenging if it is not managed correctly. Incorporating mobility into the business strategy can effectively extend and establish the organisations potential as well as employee productivity. However, this can place excessive demands and pressure on the IT administrators, management and security team. The reason for the increased burden and pressure on the […]