Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Active Directory: Explained

    Directory servers make it easy for admins to store and access resources including user and device information, computers, files, server, and much more. Back in the old days, in order to look up a file, a user needed to know ...

    Read More
  • A Passpoint Solution for MAC Randomization

    Although MAC Randomization has been around for a few years, it has really grown in popularity with the beta version of Apple iOS 14 update because it’s a default enabled setting. MAC Randomization could be a revolutionary step for user ...

    Read More
  • Okta Smartcard Authentication Expanded

    Okta is a popular choice for organizations that want top-of-the-line cloud identity management. It’s one of the largest identity providers with a modern cloud directory and a plethora of handy features and useful integrations. Okta services can be combined with ...

    Read More
  • LDAP vs SAML, Access Protocol Comparison

    LDAP and SAML are major authentication protocols that securely authenticate users to a network. They determine how users interact with a resource by connecting them to the respective directory services, like an on-premise or a cloud-based directory. The Lightweight Directory ...

    Read More
  • AD DS: Explained

    The purpose of online directories is to store resources on the network in a way that it’s simple to access. Microsoft’s Active Directory (AD) has risen through the ranks to become the top online directory in the software industry. What ...

    Read More
  • Can I Use NPS with Cloud Directories?

    The RADIUS protocol is used by thousands of organizations to protect their networks. Network admins set up RADIUS servers to verify approved network users, drastically reducing the risk of a compromised network. RADIUS can be configured to authenticate access to ...

    Read More
  • YubiKey PIN/PUK Configuration at Scale

    Yubikeys are an all-in-one MFA device. In addition to serving as a physical authentication token, they can generate one-time-passwords (OTP) and require users to input a PIN.  It’s quite difficult to enable all of these methods of authentication and have ...

    Read More
  • Strong Network Security with Azure

    Azure AD is a highly effective IDP that was built as a successor to Active Directory (AD) to accommodate newer, cloud-centric organizations. AD does not work natively in the cloud, so Azure is an effective solution for many organizations looking ...

    Read More
  • Enhanced Azure Authentication with Yubikey

    The cross section of organizations that use Azure AD (Microsoft Entra ID) for identity management and Yubikeys for MFA is already sizable and growing by the day. Recent advancements in authentication security technology has expanded the versatility of Yubikeys, allowing ...

    Read More
  • Secure Authentication for Azure Networks

    Wireless security is crucial now that most sensitive data can be accessed online. It’s imperative for network administrators to dictate who can access the network and how much they’re allowed to access. Organizations need a system that authenticates users to ...

    Read More