Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Network Segmentation Best Practices

    VLANs are a great way to increase security because they reduce the risk of threats spreading throughout the network. A threat can quickly move around the network if users/devices are not segmented adequately, which can cause serious harm. This article ...

    Read More
  • Smart Card Authentication with Active Directory

    Chances are, your work requires you to have logins and passwords for multiple resources. On top of that, you probably have to update your password regularly, ensuring that each new password is compliant with rigorous security standards. Now, repeat this ...

    Read More
  • How to Build and Set Up Your Own PKI

    A Managed Public Key Infrastructure (PKI) is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s much more secure and widely-applicable than passwords. Configuring a PKI ...

    Read More
  • 802.1X EAP-TLS Authentication Flow Explained

    For many organizations, the IEEE 802.1X authentication mechanism for Port-Based Network Access Control is the first line of defense against outside attack. It’s also one of the most commonly targeted attack vectors, which makes it a security priority. One of ...

    Read More
  • Server Certificate Validation with Android 12 Devices

    Cyber-attacks have grown stronger over the years and are able to easily bypass the rudimentary security standards provided by the username/password mechanism. If an organization relies on passwords for network authentication, attacks can infiltrate the network with little to no ...

    Read More
  • WPA3: The Ultimate Guide

    The network type Wi-Fi Protected Access (WPA) has been upgraded once since its inception in 1999. In 2004, it was replaced by WPA2, which has stood as the standard for highly secure wireless networks ever since. To say that the ...

    Read More
  • Android 11 Server Certificate Validation Error and Solution

    *Updated Feb 2021 The dust has settled on the Dec 2020 Android 11 update and, for better or worse, the effects on network authentication have not been as drastic as predicted. It appears that the requirement for server certificate validation ...

    Read More
  • EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

    Ensuring network users are able to securely authenticate to the wireless network is paramount to the overall safety and security of your organization. So many attacks are aimed at exploiting the authentication process. According to IBM’s X-Force Threat Intelligence Index, ...

    Read More
  • How to Manage Certificates with Intune (MEM Intune)

      Network administrators often feel certificate management to be challenging at times, especially in finding the right PKI for certificate deployment. They either end up paying for a pricey PKI with minimal features or a complex PKI demanding deep technical ...

    Read More