Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • OCSP vs CRL: The Best Bet To Revoke Certificates In A PKI

    OCSP support is not included in the current roadmap of SecureW2 for some key reasons. Here’s a brief overview of your options for certificate revocation: OCSP stands for Online Certificate Standard Protocol. It’s a protocol described in RFC 6960 that ...

    Read More
  • Passwords vs. Digital Certificates For RADIUS Authentication

    Businesses understand the importance of passwords for private data security but might not realize that using a network with passwords poses many security threats. As hacking techniques become more advanced, data is stolen at a rate of almost 6 million ...

    Read More
  • Deploy Yubikeys For Secure Wi-Fi in WPA2-Enterprise Network

    Security keys are useful tools for hardening your devices with an additional factor of authentication. Did you know that same protection can be extended to your network? SecureW2, a Yubico Partner, has developed an industry-first software solution that allows you ...

    Read More
  • 4 Best Practices For Eduroam Deployment

    Scholars and students often visit different campuses for internships, seminars, conferences, and other events. Accessing secure Wi-Fi at foreign campuses has always been a challenge for these individuals requiring guest access or temporary credentials. Eduroam is the solution – an ...

    Read More
  • A Guide To Client Certificate Mapping In Active Directory

    Certificate mapping, in a general sense, refers to the tying of an identity to an X.509 digital certificate. In practice, the term is mostly used in the context of Microsoft’s “client certificate mapping” feature, wherein a client’s Active Directory identity ...

    Read More
  • Is EAP-TLS Safer than PEAP-MSCHAPv2 in 2024?

    The short answer is: Yes. Organizations that are interested in moving from the unsecure PEAP-MSCHAPv2 protocol to the superior EAP-TLS protocol might be worried about huge infrastructure overhaul or the network downtime it might entail. We’ve helped many organizations over ...

    Read More
  • Configuration Guide For WPA2-Enterprise On Operating Systems

    Automation is critical for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication can operate the same way as long as you have the right tools. ...

    Read More
  • A Guide To Configure Certificates In Your Yubikey PIV Slots

    Physical security tokens like the Yubikey have smartcards that can be configured to store several certificates, the quantity of which depends on the specifications of the secure cryptoprocessor at the heart of the smartcard. It’s a virtual “slot”, so there’s ...

    Read More
  • Configure 802.1X Authentication with Microsoft Office 365 Suite

    We are living in an age where basically every person has an online footprint, whether it be for entertainment or to conduct business. Since millions of people are taking their businesses online, that means a lot of private data is ...

    Read More