Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Intune vs. Workspace ONE: The Best MDM for Windows Devices

    The technological advancements in the last decade have evolved the use of mobile devices such as smartphones and laptops in the corporate world. Before the pandemic, some organizations were skeptical about using these devices for official purposes, mainly due to ...

    Read More
  • Foxpass RADIUS vs. Jumpcloud RaaS

    Network authentication has evolved in lockstep with the development of software over the years. The networking protocols considered secure just a few years back have not withstood the test of time. This has resulted in a massive spike in cases ...

    Read More
  • This Security Flaw is Preventing Organizations from Switching to Azure AD

    The migration from on-premise to cloud-based network infrastructure is becoming more and more common. With better security, scalability, and user experience, the benefits of the cloud cannot be denied. For many Active Directory (AD) customers, this migration can cause issues ...

    Read More
  • Top 3 Tips for Enrolling Chromebooks with AD CS

    There has been a huge increase in the use of wireless devices to connect to organization’s secure networks and it’s created a new security challenge for network admins. Securely connecting devices like Chromebooks required certain processes to ensure they are ...

    Read More
  • Cloud-Hosted LDAP is Vulnerable with Credentials

    Organizations are always looking for a new strategy to increase the convenience of using their network without compromising security. As a result, many have sought out cloud solutions. Read here how a SecureW2 client transitioned to cloud-based networking and improved ...

    Read More
  • Can I Use Google Secure LDAP for Wi-Fi?

    LDAP’s importance cannot be denied. As a protocol, it has greatly simplified the directory search process. Unfortunately, as time goes on, LDAP has begun to grow outdated, especially given its association with on-premise hardware and legacy systems. This is why ...

    Read More
  • Why a Managed PKI (MPKI) is Probably Right for You

    If you’ve decided to make the move to secure certificate-based authentication, one of the first things you need to figure out is whether you’re going to build your own Public Key Infrastructure (PKI) or use a managed PKI (MPKI). PKIs, ...

    Read More
  • Enabling Okta Device Trust for any MDM

    In the modern cybersecurity environment, the network perimeter is becoming increasingly blurred and difficult to maintain. Countless workers are remote and require access to resources outside the traditional office environment. This renders the traditional security method of not allowing outsiders ...

    Read More
  • What Is Certificate Management?

    When considering the importance of authentication security and establishing device trust to protect your network, it’s no wonder organizations are moving away from credentials in droves. A solution that many are turning to is replacing credentials with certificates for authentication. ...

    Read More
  • Can PKI Replace Passwords?

    There is a new trend that’s taking the IT world by storm: Passwordless Authentication. NordPass estimates that the average user has between 70 and 80 passwords. That’s why people so often reuse, share, or choose easy-to-remember passwords. While this may ...

    Read More