Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • How to Use IEEE 802.1x Authentication for a Wired or a Wireless Network 

    IEEE 802.1x authentication is a standard for port-based network access control. It essentially requires devices to authenticate themselves before gaining access to network resources. This standard is versatile, working seamlessly with both wired Ethernet networks and wireless networks. Incorporating IEEE ...

    Read More
  • Using VLANS to Keep Students off the Staff Network

    Keeping your students off the staff network is among the daily challenges IT administrators face monitoring their domain. Especially as we continue to integrate technology with education, many institutions are adopting methods such as 1:1 to assist students further in ...

    Read More
  • How to Set Up AD CS PKI Certificates with Jamf

    As credential-based authentication becomes increasingly insecure, many organizations see the benefit of moving to passwordless security methods such as digital certificates. Implementing certificates, however, requires the implementation of a Public Key Infrastructure (PKI) for the management of those certificates.  When ...

    Read More
  • Network Access Control: Explained

    Network Access Control (NAC) is an advanced cybersecurity measure designed to regulate who, what, and how entities gain access to network resources. As the traditional security perimeter is no longer sufficient, NAC provides an extra layer of security by enforcing ...

    Read More
  • What is Port-Based Network Access Control (PNAC)?

    Network security is one of the important factors for organizations of different sizes. As cyber threats evolve, authorized access to network devices and critical resources becomes very important. Port-Based Network Access Control (PNAC) is an effective authentication method that helps ...

    Read More
  • How to Monitor Network Traffic: Best Tips for IT Pros

    Network traffic monitoring is essential for IT professionals to protect the company’s environment against potential vulnerabilities. It tracks data movement across different networks, ensures the network operates efficiently and identifies performance issues. Reliable network traffic monitoring improves network performance, increases ...

    Read More
  • How to Configure 802.1x Printer Authentication?

    When organizations establish their IT infrastructure, it’s essential to protect it, including network-connected devices and wired and wireless access points. Printers often fly under the radar among these devices regarding security measures. However, these printers can be vulnerable if not ...

    Read More
  • How is a Smart CAC Card Used in the PKI?

    Public Key Infrastructure (PKI) is one of the most robust methods for safeguarding sensitive information,  particularly within the Department of Defense (DoD) ecosystem, where it secures sensitive data and communications across various platforms. The Common Access Card (CAC) is instrumental ...

    Read More
  • What is PKI-as-a-Service (PKIaaS)?

    Public Key Infrastructure (PKI) keeps data secure, authenticates identities, and ensures end-to-end encryption. It plays a vital role in securing digital communications and involves a set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, ...

    Read More
  • What are Wildcard Certificates? Are They Safe

    SSL certificates (Secure Sockets Layer) and their successor TLS certificates (Transport Layer Security) are critical for establishing secure communications over the Internet. They authenticate the identity of a website and encrypt the data exchanged, thereby safeguarding it from malicious entities. ...

    Read More