Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Introducing WebAuth Wi-Fi with Cloud IDPs

    It’s no secret that open Wi-Fi networks are infamously insecure, and Pre-Shared Key (PSK) networks aren’t much better. If you tie your organization’s Wi-Fi to a single password and more than a handful of people know it, it’s only a ...

    Read More
  • LEAP Authentication and How It Works

    Wi-Fi connection integrity is critical for organizations securing sensitive data or individuals protecting personal information. This requirement has created many authentication methods, each attempting to balance usability and security. LEAP authentication is one example of a protocol created to provide ...

    Read More
  • 2024 Security Analysis of PEAP-MSCHAPv2

    These days, wired and wireless (Wi-Fi) networks are ubiquitous. Organizations need these connections to perform critical business functions, but these connections are susceptible to various ever-evolving cyber threats. As a result, many different ways of protecting networks exist, including using ...

    Read More
  • How to Authenticate to VPN with EAP-TLS

    In today’s world, VPNs (Virtual Private Networks) are very important for individuals and small and large-scale business owners. However, utilizing a VPN can be tricky due to some common difficulties in authentication. Extensible Authentication Protocol (EAP) helps to offer secure ...

    Read More
  • A Comprehensive Guide to the EAP Protocol in Networking

    Network security is crucial in the modern digital world, where wireless communication is commonplace. Security risks such as unauthorized access, data eavesdropping, and network breaches can affect wireless networks. Because of this, strong authentication procedures are essential to protecting sensitive ...

    Read More
  • WPA3 vs WPA2: What’s the Difference?

    The standards used to protect wireless/Wi-Fi networks have evolved over the years to keep up with emerging threats and protect sensitive data. WPA2 and WPA3 are some of the more recent additions to wireless network security settings. Distinguishing between WPA2 ...

    Read More
  • Kandji Enterprise Wi-Fi Profile Settings Guide

    With a focus on centralized control of Apple devices, Kandji stands out as an innovative leader in modern enterprise management. IT managers can easily automate device deployment, enforce security policies, and guarantee compliance using Kandji’s feature-rich device management interface for ...

    Read More
  • Best WiFi Security Settings MacOS

    In a world driven by digital connection, safeguarding the security of our Wi-Fi networks is critical, especially for Mac users. Despite its strong standing, the macOS environment is not immune to cyberattacks. There’s always a risk of identity theft or ...

    Read More
  • What is an X.509 Digital Certificate?

    X.509 certificates are forms of identification that leverage public-private key cryptography. They are a secure replacement for passwords.

    Read More
  • How To Prevent Man-in-the-middle Attacks

    Man-in-the-middle attacks (MITM) or on-path attacks are becoming common and complex. Organizations are putting in a lot of effort to mitigate these risks to no avail. Phishing kits are freely available, enabling on-path attackers to utilize tools to launch an ...

    Read More