Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • EAP-TLS vs. EAP-TTLS/PAP

    Choosing the right authentication protocol is more than a matter of security. Authentication is the critical check ensuring only rightful users can access certain data or networks. The decision between implementing EAP-TLS or EAP-TTLS/PAP is more than a technical dilemma—it’s ...

    Read More
  • 8 WiFi Hacks: How They Work and Preventive Measures

    Our lives now wouldn’t be the same without an internet connection, and WiFi networks give us quick and easy access. Nonetheless, hackers find WiFi networks a desirable target due to their vulnerability to internet attacks. Any method used to enter ...

    Read More
  • What is NAS-ID?

    The Network Access Server (NAS) is the frontline of authentication – it’s the first server that fields network authentication requests before they pass through to the RADIUS. The NAS Identifier (NAS-ID) is a feature that allows the RADIUS server to ...

    Read More
  • How To Revoke Certificate in Windows (AD-CS)

    Digital Certificates are an integral part of a Public Key Infrastructure (PKI) and cybersecurity as a whole. The certificates can encrypt communications and authenticate the identity of users and machines. In some instances, however, a certificate needs to be removed, ...

    Read More
  • Complete Guide to MacOS 802.1X

    Implementing robust authentication protocols is paramount in today’s hyper-connected digital environment, where data security and network integrity are paramount. MacOS 802.1X authentication stands out among these protocols as a crucial mechanism for enhancing network security. Any individual or organization attempting ...

    Read More
  • WPA2 vs 802.1X: What’s the Difference?

    Nowadays, there are numerous methods and types of encryption used to secure networks. Businesses should look beyond using WPA2-PSK, which isn’t secure enough for their needs. It’s easy to get confused about WPA2-Enterprise and 802.1X, which are both security protocols ...

    Read More
  • How Does SSH Certificate Authentication Work?

    Secure Shell (SSH) certificate authentication provides a robust method for authenticating users and hosts connecting to an SSH server. As a protocol, SSH prevents unauthorized parties from accessing systems remotely. But how does SSH implementation look in an organization environment? ...

    Read More
  • How to Configure RADIUS on Windows 2016: A Detailed Guide

    A WPA-2 Enterprise network is incomplete without a RADIUS server, thanks to its triple role of Authentication, Accounting, and Authorization (AAA). Any robust network security demands all three functions for smoother functioning of the entire network infrastructure, given the sharp ...

    Read More
  • What to Expect When You’re Adopting the JoinNow Platform for BYODs

    If we were to define our platform briefly, we’d say that SecureW2 makes it easier to transition to passwordless security by providing an easy Public Key Infrastructure (PKI) and RADIUS platform. Put together, PKI and RADIUS lay the foundation for ...

    Read More
  • What to Expect When You’re Adopting the JoinNow Platform for Managed Devices

    In a nutshell, SecureW2 helps organizations achieve passwordless network access by providing a managed Public Key Infrastructure (PKI) and RADIUS service. These two core products work together to empower wired and wireless networks and VPNs with an enhanced, passwordless authentication ...

    Read More