Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • All that You Need To Know About Public Key Encryption

    We are living in a time where wireless security is imperative because private data and personal information are uploaded online. As the amount of online data increases, so does the monetary cost of cybercrime. Cyber crime is now the most ...

    Read More
  • Drawbacks of NPS In A  Cloud Environment

    Organizations want different technologies to work well together and integrate smoothly so they can be used more efficiently. The combination of Microsoft Azure and Network Policy Server (NPS) frequently generates interest and confusion simultaneously. While both are effective tools in ...

    Read More
  • Why is It Safe to Migrate AD CS from SHA-2 to SHA-1 In 2024?

    It’s imperative for organizations to fully switch from SHA-1 to SHA-2. The National Institute of Standards and Technology (NIST) stated SHA-1 should not be trusted, PCI Compliance scanners no longer accept SHA-1 certificates, and Google has deprecated the SHA-1 algorithm. ...

    Read More
  • Why Do You Need S/MIME Encryption In Network Security

    S/MIME stands for “Secure/Multipurpose Internet Mail Extensions”. It’s an IETF standard for public key encryption and creating a digital signature for MIME data. In essence, S/MIME uses a PKI to enroll an email client for certificates (sometimes more than one). ...

    Read More
  • WPA vs WPA2- The Better Wifi Authentication

    Wireless networks are omnipresent. You may have access to many wireless networks, whether in a neighborhood coffee shop, a school, or home. However, it’s hard to tell which ones are secure. Looking closely at Wi Fi security settings can often ...

    Read More
  • How To Use RadSec For A Secure Roaming Network

    RadSec is an 802.11x protocol designed to securely transfer information from a RADIUS through TCP (Transmission Control Protocol) and TLS (Transport Layer Security) for protected communications. At a basic level, it protects RADIUS packets sent through public networks. When a ...

    Read More
  • How to Use Active Directory Set-up For Wi-Fi and CloudRADIUS

    Organizations that leverage Microsoft Active Directory (AD) often want to connect their core user identities to their Wi-Fi network. The goal is to enable users to authenticate uniquely to the network in order to increase security. The best practice for ...

    Read More
  • An Overview Of Certificate Revocation List In A PKI

    What is a Certificate Revocation List? A certificate revocation list, more commonly called a CRL, is exactly what it sounds like: a list of digital certificates that have been revoked. A CRL is an important component of a public key ...

    Read More
  • What Is RADIUS Certificate-Based Authentication?

    As cyber security risks increase and secure access to network resources is required, organizations are adopting different authentication methods. RADIUS certificate-based authentication is one of those methods that increase the security level of the RADIUS protocol. 80% of breaches in ...

    Read More
  • 4 Best Practices For Eduroam Deployment

    Scholars and students often visit different campuses for internships, seminars, conferences, and other events. Accessing secure Wi-Fi at foreign campuses has always been a challenge for these individuals who require guest access or temporary credentials. Eduroam is the solution—an international ...

    Read More