Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • What are the three components in the 802.1X system for 802.1x?

    The 802.1X system has three primary components: the supplicant, the authenticator, and the authentication server. The supplicant is the part of the device that requests access, the authenticator is the network device (such as a switch or access point) that ...

    Read More
  • Is EAP-TLS The Same as PEAP?

    Extensible Authentication Protocol-Transport Layer Security (EAP-TLS ) and Protected Extensible Authentication Protocol (PEAP ) are both authentication protocols used in the 802.1x framework, but they are not the same. The key difference between them is their authentication procedures. EAP-TLS requires ...

    Read More
  • What Is The Gold Standard Of Network Security?

    Extensible Authentication Protocol-Transfer Layer Security (EAP-TLS) is considered the gold standard for network security. It allows digital certificates to be deployed on WPA2-Enterprise with 802.1X authentication. EAP-TLS uses asymmetric cryptography to encrypt and decrypt messages and prevent unauthorized access to ...

    Read More
  • How Does WPA3 Improve Wi-Fi Security Compared To Previous Protocols?

    Wireless Protocol 3 (WPA3) improves Wi-Fi security compared to the WPA2 protocol, as it provides individual data encryption, side channel protection, and a more robust authentication mechanism through its 192-bit encryption than the WPA2 protocol. Here are some improvements offered ...

    Read More
  • What is 802.1x Authentication Used For?

    802.1x Authentication is a network security standard that grants access to wired and wireless networks by validating authorized users and devices. The 802.1X protocol is the IEEE Standard for Port-Based Network Access Control (PNAC). Network administrators widely use 802.1x for ...

    Read More
  • Understanding NIST SP 800-171 3.5.2: Device Identification & Authentication

    NIST SP 800-171 is a cybersecurity framework that protects Controlled Unclassified Information (CUI). It applies to organizations handling sensitive government data and has been widely adopted as a best practice for securing IT environments. One of the most critical components ...

    Read More
  • Your Guide To Wi-Fi Security

    Wi-Fi is now a necessity.  However, its convenience also makes it a prime target for cyber threats. As the number of Wi-Fi-enabled devices skyrockets, so do security risks. Attackers exploit weak passwords, rogue access points, and outdated security protocols to ...

    Read More
  • How Does a Man-in-the-Middle (MITM) Attack Compromise Wi-Fi Networks?

    An MITM happens when attackers hijack a communication channel to intercept and steal data. In this type of attack, they position themselves between a user and an application, silently capturing or altering the data by deploying a rogue access point ...

    Read More
  • What is an Evil Twin attack in Wi-Fi, and how can I protect against it?

    Imagine you’re out shopping, getting coffee, or waiting for a flight. You quickly want to check your messages or search for something, so hop on a free public Wi-Fi network. But what if that network was only there to gather ...

    Read More
  • SCEP vs. Dynamic SCEP

    Simple Certificate Enrollment Protocol (SCEP) streamlines secure certificate issuance across networked devices, enabling scalable authentication and encryption. Instead of relying on manual provisioning, SCEP automates the process, allowing devices to request certificates directly from the Certificate Authority (CA) through a ...

    Read More