Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • What is a DoD PKI?

    The Department of Defence Public Key Infrastructure (DoD PKI) is a vital component in strengthening the Department of Defense’s (DoD) digital communications and data-sharing infrastructure. Fundamentally, DoD PKI is an advanced system designed to protect data integrity throughout military networks ...

    Read More
  • Understanding PKI Certificates: How to Get Them and Why They Matter

    Imagine conducting important business online without identifying the person you’re interacting with. It would be like handing sensitive documents to a stranger on the street; every login would be risky. Fortunately, the internet establishes protocols to build trust in the ...

    Read More
  • Mitigate the Risks of a Pre-shared Keys-Based Network

    Wi-Fi security is designed to safeguard data as it traverses the airwaves in wireless networks. Wi-Fi Protected Access (WPA) emerged as a response to the glaring deficiencies of its predecessor, Wired Equivalent Privacy (WEP). Pre-Shared Key (PSK) security protocols have ...

    Read More
  • Should I Install AD CS on Domain Controller?

    IT administrators must decide on network security: should they install Active Directory Certificate Services (AD CS) on a Domain Controller (DC)? Microsoft PKI (Public Key Infrastructure) solutions are the cornerstone for managing and distributing the digital certificates which is essential ...

    Read More
  • Everything You Need to Know About SecureW2 Deployment

    Relying on passwords alone to safeguard access to your resources (including Wi-Fi, applications, and email security) is no longer secure. Cyber attacks designed to harvest credentials become increasingly complex by the day. Stealing a single set of credentials can have ...

    Read More
  • A Deep Dive into PKI Certificates

    Corporate data, social media pages, applications, and user data are crucial assets of an organization, and any theft or misuse of these could lead to huge financial losses. They not only result in loss of business opportunities, but organizations are ...

    Read More
  • Introducing WebAuth Wi-Fi with Cloud IDPs

    It’s no secret that open Wi-Fi networks are infamously insecure, and Pre-Shared Key (PSK) networks aren’t much better. If you tie your organization’s Wi-Fi to a single password and more than a handful of people know it, it’s only a ...

    Read More
  • LEAP Authentication and How It Works

    Wi-Fi connection integrity is critical for organizations securing sensitive data or individuals protecting personal information. This requirement has created many authentication methods, each attempting to balance usability and security. LEAP authentication is one example of a protocol created to provide ...

    Read More
  • 2024 Security Analysis of PEAP-MSCHAPv2

    These days, wired and wireless (Wi-Fi) networks are ubiquitous. Organizations need these connections to perform critical business functions, but these connections are susceptible to various ever-evolving cyber threats. As a result, many different ways of protecting networks exist, including using ...

    Read More