Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Why You Shouldn’t Use NPS with Azure AD(Microsoft Entra ID)

    Since cloud-based solutions are becoming the norm today, knowing how different identity and access management tools work together and what they do is important. This article details Microsoft NPS (Network Policy Server) and Azure AD (Entra ID), two infrastructure elements ...

    Read More
  • [Solved] Wi-Fi Security Certificate Error

    Functioning in the current world would be virtually impossible without access to wireless internet or Wi-Fi. Wi-Fi is used by people all over the world for everything from entertainment to showing up for work. However, with the internet’s pervasiveness comes ...

    Read More
  • Resolving SCEP Certificate Enrollment Initialization for Workgroup Error

    Utilizing MDMs to establish a highly secure environment is an excellent safeguard for mitigating user error risks and developing consistency in device management. This common practice amongst enterprises is a great way to protect sensitive data for themselves and their ...

    Read More
  • Configuring SCEP Profiles in Intune: A High-Level Overview

    Nowadays, network admins have started to come around to the benefits of digital certificates, which is a justified response given the superior cryptographic protection compared to traditional passwords and usernames. Still, one major obstacle that most organizations face in deploying ...

    Read More
  • EAP-TLS vs. EAP-TTLS/PAP

    Choosing the right authentication protocol is more than a matter of security. Authentication is the critical check ensuring only rightful users can access certain data or networks. The decision between implementing EAP-TLS or EAP-TTLS/PAP is more than a technical dilemma—it’s ...

    Read More
  • 8 WiFi Hacks: How They Work and Preventive Measures

    Our lives now wouldn’t be the same without an internet connection, and WiFi networks give us quick and easy access. Nonetheless, hackers find WiFi networks a desirable target due to their vulnerability to internet attacks. Any method used to enter ...

    Read More
  • What is NAS-ID?

    The Network Access Server (NAS) is the frontline of authentication – it’s the first server that fields network authentication requests before they pass through to the RADIUS. The NAS Identifier (NAS-ID) is a feature that allows the RADIUS server to ...

    Read More
  • How To Revoke Certificate in Windows (AD-CS)

    Digital Certificates are an integral part of a Public Key Infrastructure (PKI) and cybersecurity as a whole. The certificates can encrypt communications and authenticate the identity of users and machines. In some instances, however, a certificate needs to be removed, ...

    Read More
  • Complete Guide to MacOS 802.1X

    Implementing robust authentication protocols is paramount in today’s hyper-connected digital environment, where data security and network integrity are paramount. MacOS 802.1X authentication stands out among these protocols as a crucial mechanism for enhancing network security. Any individual or organization attempting ...

    Read More