Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • What Is Apple Captive Network Assistant?

    Maintaining a safe connection is of the utmost importance in the hyper-connected world we live in today, where we use the internet for almost everything. Yet, the security of public Wi-Fi networks, especially the open ones often found in places ...

    Read More
  • How Does Wi-Fi Certificate Authentication Work?

    Wireless network security is of the utmost importance in the rapidly evolving digital world. Wi-Fi certificate authentication has become a vital option that not only makes networks safer but also makes using them more accessible. Wi-Fi certificate authentication uses digital ...

    Read More
  • 2024 Security Analysis of PEAP-MSCHAPv2

    These days, wired and wireless (Wi-Fi) networks are ubiquitous. Organizations need these connections to perform critical business functions, but these connections are susceptible to various ever-evolving cyber threats. As a result, many different ways of protecting networks exist, including using ...

    Read More
  • Network Security Basics—Definition, Threats, and Solutions

    The adoption of remote work, cloud computing, and integrated IoT devices leads to complexities of securing computer networks and network security infrastructures. The evolution of cyber threats—from sophisticated malware attacks to zero-day exploits—requires a meticulous, multi-layered security approach. Chief Information ...

    Read More
  • How to Use IEEE 802.1x Authentication for a Wired or a Wireless Network 

    IEEE 802.1x authentication is a standard for port-based network access control. It essentially requires devices to authenticate themselves before gaining access to network resources. This standard is versatile, working seamlessly with both wired Ethernet networks and wireless networks. Incorporating IEEE ...

    Read More
  • Using VLANS to Keep Students off the Staff Network

    Keeping your students off the staff network is among the daily challenges IT administrators face monitoring their domain. Especially as we continue to integrate technology with education, many institutions are adopting methods such as 1:1 to assist students further in ...

    Read More
  • How to Set Up AD CS PKI Certificates with Jamf

    As credential-based authentication becomes increasingly insecure, many organizations see the benefit of moving to passwordless security methods such as digital certificates. Implementing certificates, however, requires the implementation of a Public Key Infrastructure (PKI) for the management of those certificates.  When ...

    Read More
  • Network Access Control: Explained

    Network Access Control (NAC) is an advanced cybersecurity measure designed to regulate who, what, and how entities gain access to network resources. As the traditional security perimeter is no longer sufficient, NAC provides an extra layer of security by enforcing ...

    Read More