Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • WPA3: The Ultimate Guide

    The network type Wi-Fi Protected Access (WPA) has been upgraded once since its inception in 1999. In 2004, it was replaced by WPA2, which has stood as the standard for highly secure wireless networks ever since. To say that the ...

    Read More
  • Android 11 Server Certificate Validation Error and Solution

    *Updated Feb 2021 The dust has settled on the Dec 2020 Android 11 update and, for better or worse, the effects on network authentication have not been as drastic as predicted. It appears that the requirement for server certificate validation ...

    Read More
  • EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

    Ensuring network users are able to securely authenticate to the wireless network is paramount to the overall safety and security of your organization. So many attacks are aimed at exploiting the authentication process. According to IBM’s X-Force Threat Intelligence Index, ...

    Read More
  • How to Manage Certificates with Intune (MEM Intune)

      Network administrators often feel certificate management to be challenging at times, especially in finding the right PKI for certificate deployment. They either end up paying for a pricey PKI with minimal features or a complex PKI demanding deep technical ...

    Read More
  • What Is Apple Captive Network Assistant?

    Maintaining a safe connection is of the utmost importance in the hyper-connected world we live in today, where we use the internet for almost everything. Yet, the security of public Wi-Fi networks, especially the open ones often found in places ...

    Read More
  • How Does Wi-Fi Certificate Authentication Work?

    Wireless network security is of the utmost importance in the rapidly evolving digital world. Wi-Fi certificate authentication has become a vital option that not only makes networks safer but also makes using them more accessible. Wi-Fi certificate authentication uses digital ...

    Read More
  • Network Security Basics—Definition, Threats, and Solutions

    The adoption of remote work, cloud computing, and integrated IoT devices leads to complexities of securing computer networks and network security infrastructures. The evolution of cyber threats—from sophisticated malware attacks to zero-day exploits—requires a meticulous, multi-layered security approach. Chief Information ...

    Read More