}

Battle of the email solutions: Exchange vs. Google Apps

In the industry I am in, with the job functions I perform daily, I see more and more organizations moving from an in-house email solution such as Exchange to cloud-based email solutions like Office 365 and Google Apps. This is due to many reasons and an easy way to see why is to compare Exchange and Google Apps.

Exchange

Let's look at locally hosted Exchange. In the Microsoft "ecosystem" which is the majority of the business world, Outlook is the email client. It was designed with Exchange in mind and it shows. End users can share contacts, calendars, resources such as conference rooms, and much more. The end users can easily collaborate and share information via Outlook with Exchange on the back end, especially since Outlook and Exchange can easily integrate with other Microsoft products.

Even from an administrative perspective, hosting Exchange locally makes sense. The Exchange admin(s) is in full control of the email service. If there is an issue, he can simply address it immediately rather than have to lean on a support team for a remote product.

This brings to mind several drawbacks though. To locally host an Exchange environment, you need hardware. Sometimes lots of hardware, depending on how big your user base is and what services you want to provide. Couple the hardware with software licensing, and the bills can get rather large.

Google Apps

Google Apps has many of the features you can find in Exchange. It doesn’t end there though. In the range of $50 per user, you get a full suite of applications similar to Microsoft office, with no hardware to maintain or server licensing.  Administration of the mail domain and users is extremely simple, and many believe the webmail experience is better than Exchange. Couple that with easy and robust mobile access, and constant product improvements, organizations are starting to see why a cloud-based solution can be extremely attractive.

Regardless of what email service you use, an automated account management system can assist with provisioning accounts. With User Management Resource Administrator (UMRA) automation, the full life cycle of the end user is automated, including their Exchange, Office 365, Google, or Groupwise mailbox.

Read additional information on the automated user provisioning and life cycle management.

How to manage credentials the easy way

A seemingly simple, yet tedious task for anyone in the information technology field is credential management. End users are given usernames and passwords for various systems in an organizations environment, and the hope is that the end users can manage these credentials with very little issue or assistance.

Read more

Category

User Provisioning

Easy Password Management, Manage Passwords, Password Management Easily

Identity and Access Management vs. Identity and Access Governance

Identity and access management and identity and access governance are two terms which are often used in the tech world, which can be quite confusing. What do they mean? Are they the same thing? What do they encompass, and what can they do for my organization?

Read more

Category

User Provisioning

account management, IAG, IAM, What is Identity and Access Governance?, What is Identity and Access Management?, access governance, RBAC, SSO

Account Management in Education: How Can It Be Improved?

Many school districts and even some higher-learning institutions have their technological infrastructure run by a skeleton crew due to things such as politics and budgetary constraints. Situations such as this can often lead to many issues within the organization: Lack of network resources for end users Inability to properly support end users and systems No time to research and implement newer technology This causes frustrated overworked admins to think outside the box and turn to other solutions, such as software-based, automated or semi-automated identity management.

Read more

Category

User Provisioning

Account Management in Education, Automated Provisioning in Education, WFM in Education

Group Policy Object; What is it and how can it allow for seamless deployment of software

In any organization from a small business to a large enterprise, control over user’s access to various resources on the network is a key component of managing the corporate environment. Access to resources such as network shares and printers to things such as settings on local stations, are just some of the items an administrator wants to manage centrally and cohesively. A common method to manage domain resources like this is via Group Policy in Active Directory.

Read more

What is the Next Step in the Evolution of the Password?

Passwords are the most common form of authentication and the current de-facto standard. In fact, passwords have existed in tech since the early 1960’s when they were implemented at MIT for the time sharing system on their computer systems for researchers. In order to allow multiple researchers to have their own personal “profile” when logging in each user was given a login name and password. This allowed each registered user to access the system for their weekly time allotment.

Read more

Category

User Provisioning

Password management, security management, two factor authentication