Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Windows Defender Credential Guard and PEAP MS-CHAPv2

    In today’s evolving world of cybersecurity, protecting data and user credentials is of utmost importance as it is the biggest threat to an organization’s security. Microsoft has implemented two security features to address this concern: Windows Defender Credential Guard and ...

    Read More
  • Active Directory Certificate Services (AD CS): Explained

    There are many components involved in running a certificate-based network. You need to establish trusted servers and certificate authorities (CA), make sure devices can enroll for certificates, authenticate users, manage the certificate life cycle, segment users for different group policies, ...

    Read More
  • FreeRADIUS with Google LDAP: How Does it Work?

    Is an authentication system built around FreeRADIUS with Google LDAP more economical? Learn the truth about this setup here.

    Read More
  • What is the Most Secure Method of Wi-Fi Authentication?

    The first layer of defense for a wireless network is the authentication process. With a strong authentication barrier, an organization can feel confident that only approved network users are able to gain access to the network and the resources they ...

    Read More
  • What is RSA Asymmetric Encryption? How Does it Work?

    Encryption is the systematic process of converting plain, readable information, or data, into an unreadable format to prevent unauthorized access. This process is achieved by implementing a set of rules known as an encryption algorithm, using an encryption key. This ...

    Read More
  • PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

    In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The 802.1x authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly ...

    Read More
  • 2024 Guide to Android Network Settings

    Android network settings are critical  for ensuring a seamless connectivity and security for users. These settings cover a variety of parameters controlling VPN connections, mobile data, and Wi-Fi, among other things. Comprehending and maintaining these settings is critical, as they ...

    Read More
  • How to Enable MFA for Google Workspace

    Cyber-attacks are becoming more sophisticated, with hackers exploiting every available option to infiltrate your network. One-step authentication methods, such as using a login ID and password, are no longer enough because passwords can be stolen or cracked easily to gain ...

    Read More
  • Troubleshooting Commonly Encountered Okta Sign-In Errors

    Okta is one of the leading identity and authentication platforms compatible with both cloud and on-premise directories. They provide a great user experience, but sometimes you might encounter networking errors due to some technical glitches in the network or any ...

    Read More
  • High Level Comparison Of User Certificate vs. Device Certificate

    The popularity of digital certificates has been soaring day by day with the advancement of cloud technology. It has already replaced the traditional usage of credential-based protection in various IT domains, which is justified given its high level of cryptographic ...

    Read More