Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Configuring Certificate Auto-Enrollment with Microsoft GPO

    Enterprises that use Public Key Infrastructures (PKI) will have to issue and manage tens or even hundreds of thousands of digital certificates. Keeping track of all those certificates may seem overwhelming, which is why many smaller organizations with limited IT ...

    Read More
  • Complete Guide To Certificate Authorities

    Imagine walking into a vast library, seeking a single book among millions. Without a librarian or a catalog system, you’d be lost. In many ways, the internet is that library, and a certificate authority is the librarian guiding us to ...

    Read More
  • Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

    Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping ...

    Read More
  • Microsoft PKI Best Practices

    A Public Key Infrastructure (PKI) is an 802.1x network security solution that uses public-private key cryptography to authenticate users for online resources. PKIs can be configured to authenticate for Wi-Fi, web applications, VPN, desktop logon, and much more. However, setting ...

    Read More
  • How to Configure Kandji SCEP Profile

    Digital certificates have, time and again, proven to be more secure than credential or password-based authentication as they are phishing-resistant. However, manually distributing digital certificates is a considerable challenge for network administrators in larger organizations. Simple Certificate Enrollment Protocol (SCEP) ...

    Read More
  • What Are Virtual Smart Cards?

    In the world of authentication cybersecurity, a device growing in popularity is the Smart Card. A smart card, like those produced by Yubico, is a cryptographic tool that allows users to securely authenticate their identity. It can be used for ...

    Read More
  • SHA-2 vs ECC: Digital Certificate Encryption Advancements

    Cryptographic systems are at the heart of digital certificates, enabling encryption, authentication, and integrity. SHA-2 and ECC are two pivotal technologies that protect everything from SSL certificates to system integrity checks. These tools act as digital shields, ensuring private communication ...

    Read More
  • 2024 Security Analysis of PEAP-MSCHAPv2

    These days, wired and wireless (Wi-Fi) networks are ubiquitous. Organizations need these connections to perform critical business functions, but these connections are susceptible to various ever-evolving cyber threats. As a result, many different ways of protecting networks exist, including using ...

    Read More
  • Network-as-a-Service (NaaS): Explained

    NaaS, or Network as a Service, is a cloud-based networking model that modifies how businesses handle and use their networks. Instead of having a lot of network equipment on-site, you can subscribe to network services on a pay-as-you-go basis. NaaS ...

    Read More
  • [Solved] Jamf Casper Certificate Error

    Apple devices and gadgets have been unparalleled in cutting-edge technology and customer satisfaction over the years. In a recent interview, the CIO of Jamf Linh Lam predicted Apple to reach the pinnacle of enterprise endpoint by 2030. On a similar ...

    Read More