Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Understanding Phishing-Resistant MFA in Azure AD

    On an average day, most employees have to log into numerous different applications and resources at work. The influx of applications necessary for work has led to an exponential increase in login and authentication methods, including things such as one-time ...

    Read More
  • How to Generate Root & Intermediate CAs

    With 10 million attacks targeting usernames and passwords occur every day. it’s not a bad idea to drop passwords wherever possible.  A proper PKI allows your network to utilize certificate-based authentication. Root CAs and Intermediate CAs are both parts of ...

    Read More
  • What’s the Difference between RADIUS, TLS, and EAP-TLS?

    There are many components involved in running a secure network. It’s very easy to get bogged down by different terminology and be confused about what exactly each component does. This is especially true in regards to 802.1X. 62% of breaches ...

    Read More
  • How To Set Up 802.1X Using Azure AD

    You can configure 802.1X using Azure AD by syncing it with an LDAP server or enrolling every device with an x.509 certificate.

    Read More
  • Windows Defender Credential Guard and PEAP MS-CHAPv2

    In today’s evolving world of cybersecurity, protecting data and user credentials is of utmost importance as it is the biggest threat to an organization’s security. Microsoft has implemented two security features to address this concern: Windows Defender Credential Guard and ...

    Read More
  • Active Directory Certificate Services (AD CS): Explained

    There are many components involved in running a certificate-based network. You need to establish trusted servers and certificate authorities (CA), make sure devices can enroll for certificates, authenticate users, manage the certificate life cycle, segment users for different group policies, ...

    Read More
  • FreeRADIUS with Google LDAP: How Does it Work?

    Is an authentication system built around FreeRADIUS with Google LDAP more economical? Learn the truth about this setup here.

    Read More
  • What is the Most Secure Method of Wi-Fi Authentication?

    The first layer of defense for a wireless network is the authentication process. With a strong authentication barrier, an organization can feel confident that only approved network users are able to gain access to the network and the resources they ...

    Read More
  • What is RSA Asymmetric Encryption? How Does it Work?

    Encryption is the systematic process of converting plain, readable information, or data, into an unreadable format to prevent unauthorized access. This process is achieved by implementing a set of rules known as an encryption algorithm, using an encryption key. This ...

    Read More
  • PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

    In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The 802.1x authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly ...

    Read More