Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  •  Internal Or External CA- The Best Bet For Your Organization?

    Public Key Infrastructures (PKI) are widely used by organizations because they secure communications among servers and clients with digital certificates and certificate authorities (CA). Certificates are a combination of cryptographic keys which encrypt user information stored within them. For certificates ...

    Read More
  • SHA-256 vs. SHA-1: Which Is The Better Encryption?

    Sending information in clear text over the air is a tremendous risk in today’s complex cybersecurity environment. Hackers constantly evolve attack vectors to target sensitive data in transit, but encryption allows us to prevent this.  There are many different encryption ...

    Read More
  • A Stepwise Guide To Renew Certificates On Microsoft CA.

    Organizations can leverage digital certificates to build a robust network, as certificates use public-private key encryption to encrypt information sent securely over-the-air. Managing digital certificates for a smaller organization is more accessible, but a bigger organization needs a PKI for ...

    Read More
  • How To Enable RADIUS CBA On Google Workspace?

    If the cybersecurity community could be compared to a court, the jury has reached its verdict: it’s time to move past outdated pre-shared keys as a means to network authentication. What’s more, backing your network authentication with a RADIUS server ...

    Read More
  • An Overview Of RADIUS Certificate-based Authentication

    With an increasing number of cybersecurity risks and the necessity for secured access to network resources, organizations are implementing various authentication methods. RADIUS certificate-based authentication is one of these techniques, adding another level of security to the RADIUS protocol. 80% ...

    Read More
  • MAC Spoofing Attacks Explained: A Technical Overview

    New cyberattacks and breaches are reported every day in our news feeds. Cybercriminals target people as well as large corporations and other businesses. One of the many techniques hackers employ to exploit unsuspecting victims is MAC spoofing. In 2016, a ...

    Read More
  • Does LDAP work with Entra ID? Yes and No

    To make a long story short: Microsoft offers the ability to sync Azure AD (Microsoft Entra ID) with an LDAP server, which can suffice as a short-term solution. This means your Azure AD would be duplicated to an on-prem LDAP ...

    Read More
  • Microsoft Intune Enterprise Wi-Fi Profile Best Practices

    Microsoft Endpoint Manager (Intune) is a stellar MDM that we frequently encounter in managing managed devices, especially when the enterprise size is large, and we need to have centralized control over all the systems within the organization. Intune works really ...

    Read More
  • SCEP( Simple Certificate Enrollment Protocol): A Complete Guide

    Table of Contents What is SCEP? Components of SCEP Gateway SCEP Gateway API URL SCEP Shared Secret SCEP Certificate Request SCEP Signing Certificate SCEP Device Enrollment Process How to Configure SCEP Building the SCEP Gateway Configuring SCEP in Your MDM ...

    Read More
  • AD CS Certificate Templates: Security Best Practices

    Microsoft AD CS allows administrators to establish their domain’s CA to deploy a digital certificate with Microsoft PKI Infrastructure. To properly run their PKI infrastructure and after establishing their hierarchy, administrators will look to assign AD CS certificates to specific groups ...

    Read More