Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Problems Facing IT Departments

    No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find cost effective methods to meet the needs of an organization’s ...

    Read More
  • What is VLAN Steering?

    The VLAN (Virtual Local Area Network) is an important tool in the IT toolbox. By emulating the properties of a Local Area Network, you can segment users into any number of virtual networks and apply policies to swaths of users ...

    Read More
  • Securing VPN Authentication with RADIUS & MFA

    Due to the Covid-19 pandemic, organizations all over the world have closed their offices and sent their employees home to work remotely. The mass exodus from the office to remote working has caused a rise in VPN use; influencing the ...

    Read More
  • Top 3 Cyber Security Concerns for MSPs

      Managed service providers (MSPs) have been the focal point of a series of attacks that are starting to draw attention from the public. A study conducted by Vanson Bourne surveyed 200 MSPs across the United States and found that ...

    Read More
  • What is a TPM?

    A TPM, also known as a Trusted Platform Module, is an international standard for a secure cryptoprocessor and is a chip found on the computer’s motherboard. The function of a TPM is to generate encryption keys and keep a part ...

    Read More
  • How to Choose a Managed Cloud PKI

    As cloud technology and reliability continue to surpass their on-premise counterparts, more than 50% of organizations have made the switch to managed cloud PKI or plan to soon. If your organization isn’t counted among that number yet, you’re missing out ...

    Read More
  • Active Directory: Explained

    Directory servers make it easy for admins to store and access resources including user and device information, computers, files, server, and much more. Back in the old days, in order to look up a file, a user needed to know ...

    Read More
  • A Passpoint Solution for MAC Randomization

    Although MAC Randomization has been around for a few years, it has really grown in popularity with the beta version of Apple iOS 14 update because it’s a default enabled setting. MAC Randomization could be a revolutionary step for user ...

    Read More
  • Okta Smartcard Authentication Expanded

    Okta is a popular choice for organizations that want top-of-the-line cloud identity management. It’s one of the largest identity providers with a modern cloud directory and a plethora of handy features and useful integrations. Okta services can be combined with ...

    Read More
  • LDAP vs SAML, Access Protocol Comparison

    LDAP and SAML are major authentication protocols that securely authenticate users to a network. They determine how users interact with a resource by connecting them to the respective directory services, like an on-premise or a cloud-based directory. The Lightweight Directory ...

    Read More