Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • WEP vs. WPA vs WPA2- The Better Wifi Authentication

    One key component of wireless security is encryption, which is the process of encoding data before it is transmitted over the air. Only authorized parties with the correct decryption key can read the data, preventing unauthorized access. Common encryption standards ...

    Read More
  • Analysis Of Windows On-premise vs. Cloud PKI Servers.

    The definition for a Public Key Infrastructures (PKIs) varies among cyber security professionals, but is generally considered a collection of components that give everything an organization needs to issue and manage X.509 digital certificates. PKIs can be configured to provide ...

    Read More
  • An Overview of Server Certificate Validation in Android 13

    Integrating the capabilities of two leading operating systems, Android and Windows, have been a dream for most tech-savvy enthusiasts across the globe. Microsoft is going to offer this upgrade by offering smooth integration of Windows 11 and Android 13, along ...

    Read More
  • Configuring Passpoint/OpenRoaming on Android

    For individuals who possess an Android mobile device, the significance of Wi-Fi connectivity to their gadget is widely recognized. In addition to cost savings, utilizing this method yields faster data transmission rates compared to cellular data. Nonetheless, it can be ...

    Read More
  • Complete Guide to iOS 802.1X

    Securely connecting iOS devices to a network can be a difficult task, especially since the Covid-19 pandemic sped up the inevitable rise of hybrid work environments. Network security must be a top priority and a best practice is configuring IEEE ...

    Read More
  • Can you Authenticate RADIUS with YubiKeys?

    As YubiKeys achieve widespread adoption, the industry keeps finding more and more uses for the powerful little device. One of the more interesting use cases for YubiKey is AAA/RADIUS authentication. The key already has all the hardware necessary for secure ...

    Read More
  • 8 Top IAM Platforms

    In the expanding digital environment, users are signing in from various devices such as smartphones, laptops, and tablets. Whenever a user logs in, onboards, offboards, resets a password, or changes jobs within a company, sensitive data is at risk. For ...

    Read More
  • Best Practices for Certificate Authority Management

    An ever-growing trend in authentication cybersecurity is the replacement of credential-based authentication with certificates. Credentials are simply incapable of protecting a secure network. According to the 2019 Verizon Data Breach Investigations Report, 29% of 2019 network breaches involved the use ...

    Read More