Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • WPA2 vs 802.1X: What’s the Difference?

    Nowadays, there are numerous methods and types of encryption used to secure networks. Businesses should look beyond using WPA2-PSK, which isn’t secure enough for their needs. It’s easy to get confused about WPA2-Enterprise and 802.1X, which are both security protocols ...

    Read More
  • How Does SSH Certificate Authentication Work?

    Secure Shell (SSH) certificate authentication provides a robust method for authenticating users and hosts connecting to an SSH server. As a protocol, SSH prevents unauthorized parties from accessing systems remotely. But how does SSH implementation look in an organization environment? ...

    Read More
  • How to Configure RADIUS on Windows 2016: A Detailed Guide

    A WPA-2 Enterprise network is incomplete without a RADIUS server, thanks to its triple role of Authentication, Accounting, and Authorization (AAA). Any robust network security demands all three functions for smoother functioning of the entire network infrastructure, given the sharp ...

    Read More
  • What to Expect When You’re Adopting the JoinNow Platform for BYODs

    If we were to define our platform briefly, we’d say that SecureW2 makes it easier to transition to passwordless security by providing an easy Public Key Infrastructure (PKI) and RADIUS platform. Put together, PKI and RADIUS lay the foundation for ...

    Read More
  • What to Expect When You’re Adopting the JoinNow Platform for Managed Devices

    In a nutshell, SecureW2 helps organizations achieve passwordless network access by providing a managed Public Key Infrastructure (PKI) and RADIUS service. These two core products work together to empower wired and wireless networks and VPNs with an enhanced, passwordless authentication ...

    Read More
  • EAP-TLS Explained: How It Works and Why It’s Secure

    Extensible Authentication Protocol–Transport Layer Security (EAP-TLS) is an IETF open standard defined in RFC 5216. More colloquially, EAP-TLS is the authentication protocol most commonly deployed on WPA2-Enterprise networks to enable the use of X.509 digital certificates for authentication. EAP-TLS is ...

    Read More
  • RADIUS Events Logs: How to View and Access Them

    RADIUS servers are often called AAA (authentication, authorization and accounting) servers because they perform each of those three functions. Accounting – which refers to the process of tracking events as they occur – is something a RADIUS server achieves by ...

    Read More
  • A Complete Guide to Configuring RADIUS on Windows 2019

    The term “RADIUS server” will probably be mentioned at some point in any conversation regarding wired or wireless authentication. Within a WPA-2 Enterprise network, RADIUS (also referred to as a “AAA server“), performs the crucial tasks of Authentication, Accounting, and ...

    Read More
  • Understanding Mutual TLS (MTLS) Authentication: How It Works

    Mutual TLS, or mTLS, is a trending talk of the town, especially regarding cryptographic encryption in general.  Since you’re here, there’s a good chance you’re concerned about the network at your business’s security and want to look into more robust ...

    Read More
  • A Complete Guide to Configuring Microsoft RADIUS Server

    Need a solution for your network authentication, authorization, and accounting (AAA) requirements? RADIUS has been around for decades, used by thousands of organizations. Without a RADIUS server, authentication would have to occur at the access point (this would require some ...

    Read More