Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Troubleshooting Common SCEP Errors

    Simple Certificate Enrollment Protocol (SCEP) automates certificate distribution to issue and manage network certificates for users and devices securely. SCEP protocol addresses certificate enrollment without any intervention by end users.  A Mobile Device Management (MDM) solution uses SCEP for its ...

    Read More
  • Jamf vs. Intune: The Best Way to Manage Apple Devices

    The rise in hybrid work culture has increased the usage of mobile devices such as smartphones and tablets for corporate purposes. Organizations must strengthen the security of these devices to ensure that every endpoint is protected. Efficiently managed devices are critical in ...

    Read More
  • A Comprehensive Review of Certificate Pinning: The Challenges and Alternatives

    While digital certificates undoubtedly provide a more secure authentication method than passwords, some organizations still fear the possibility that certificates can be issued to unauthorized parties. Certificate pinning is a security strategy designed to prevent this from occurring by creating ...

    Read More
  • A Deep Dive into the Security of WPA2-PSK

    In Wi-Fi security, one protocol stands out for its widespread adoption and significant role in protecting data: WPA2-PSK. This protocol, short for Wi-Fi Protected Access 2 – Pre-Shared Key, has been instrumental in securing wireless networks against unauthorized access and ...

    Read More
  • Can You Use Certificates for Single Sign-On (SSO)?

    Forgetting your password is one of the worst things about the internet. Unfortunately, it is encouraged to create complex passwords, making remembering them more difficult. Consequently, a considerable number of users elevate their vulnerability to cyber threats by either resorting ...

    Read More
  • [Solved] Enterprise PKI OCSP Error

    Certificate Management has emerged as one of the better alternatives to avoid the vulnerabilities of credentials in modern-day cyberspace. Here’s a recent incident of a high-profile data breach involving credentials compromise, which once again exposed the vulnerability of credentials in ...

    Read More
  • How Does WPA-Enterprise Secure Your Network

    Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. Authentication security has never been more important; In 2017, over 1,300 significant data breaches occurred in the US ...

    Read More
  • How To Solve the NPS Error Code 66 in Meraki?

    The RADIUS server plays a vital role in the authentication within a network infrastructure. NPS (Network Policy Server) is Microsoft’s own RADIUS solution that performs a similar role of filtering out non-compliant network connections and ensuring the enterprise’s network is ...

    Read More