Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • List of Devices Supporting 802.1x

    It is hard to imagine life without Wi-Fi, both in personal or professional spaces but we can not deny that it has parallelly caused the transmission of more and more sensitive information over the air. The evolution of WPA2-Enterprise has ...

    Read More
  • How to Enable Windows Machine Certificate Authentication

    Whether you use Windows, macOS, or any other operating system, deploying digital certificates for your device can be the most impactful step to strengthening your network security. Digital certificates use superior asymmetric encryption, which uses two pairs of public and ...

    Read More
  • LDAP Authentication with Azure AD

    LDAP (Lightweight Directory Access Protocol) authentication can confirm user identities across a network. It uses a centralized directory system for user authorization and authentication. On the other hand, Microsoft offers a cloud-based identity and access management solution called Azure Active ...

    Read More
  • Understanding Phishing-Resistant MFA in Azure AD

    On an average day, most employees have to log into numerous different applications and resources at work. The influx of applications necessary for work has led to an exponential increase in login and authentication methods, including things such as one-time ...

    Read More
  • How to Generate Root & Intermediate CAs

    With 10 million attacks targeting usernames and passwords occur every day. it’s not a bad idea to drop passwords wherever possible.  A proper PKI allows your network to utilize certificate-based authentication. Root CAs and Intermediate CAs are both parts of ...

    Read More
  • What’s the Difference between RADIUS, TLS, and EAP-TLS?

    There are many components involved in running a secure network. It’s very easy to get bogged down by different terminology and be confused about what exactly each component does. This is especially true in regards to 802.1X. 62% of breaches ...

    Read More
  • How To Set Up 802.1X Using Azure AD

    You can configure 802.1X using Azure AD by syncing it with an LDAP server or enrolling every device with an x.509 certificate.

    Read More
  • Windows Defender Credential Guard and PEAP MS-CHAPv2

    In today’s evolving world of cybersecurity, protecting data and user credentials is of utmost importance as it is the biggest threat to an organization’s security. Microsoft has implemented two security features to address this concern: Windows Defender Credential Guard and ...

    Read More
  • Active Directory Certificate Services (AD CS): Explained

    There are many components involved in running a certificate-based network. You need to establish trusted servers and certificate authorities (CA), make sure devices can enroll for certificates, authenticate users, manage the certificate life cycle, segment users for different group policies, ...

    Read More