Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • How to Use Google for 802.1x Wi-Fi

    Organizations are making the much-needed transition to cloud-based network solutions and Google is a forerunner in getting people’s devices and networks in the cloud. However, for some, getting your devices configured and ready for WPA2-Enterprise Wi-Fi can be tricky and ...

    Read More
  • Can I Use Azure With A RADIUS Server?

    Organizations from around the world are making the much-needed transition to cloud-based network solutions. To ease the transition, Microsoft created Azure to aid clients in moving their directories from on-premise Active Directory (AD) to the cloud. However, Azure is limited ...

    Read More
  • What is Dynamic RADIUS?

    SecureW2 is pleased to announce the invention of a whole new kind of AAA server – Dynamic (Cloud) RADIUS. It will revolutionize the way you authenticate users and enforce policies to create a WPA2-Enterprise network that is more efficient and ...

    Read More
  • Shared Hosted RADIUS for Managed Service Providers

    It’s widely accepted that using a RADIUS server for network authentication is the most secure method, but there’s a significant number of organizations for which RADIUS isn’t feasible. SecureW2 has pioneered a RADIUS server that is infinitely scalable in both ...

    Read More
  • Generate x.509 Certificates with Okta

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][vc_column_text]A major challenge that organizations face in regards to certificates is enrolling users without Active Directory. In response, SecureW2 has developed a solution that can provide a certificate-based network regardless of the directory in use. SecureW2’s ...

    Read More
  • Are Passwords Secure?

    Credential-based authentication is the method nearly all network users are used to and has been a common tool for decades. But unlike other decades-old technology, passwords have not been phased out of regular use. Now more than ever, passwords pose ...

    Read More
  • The Importance of Authentication Security

    Authentication acts as the first line of defense to allow access to valuable data only to those who are approved by the organization. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) as an extra layer of protection to RADIUS ...

    Read More
  • Mobile Authentication with 802.11u

    As mobile device users continue to expect stronger roaming connections and faster data speeds, Wi-Fi Alliance developed PassPoint to meet these high standards. It allows users to easily transfer from wireless network to wireless network as they travel and enjoy ...

    Read More
  • Enabling Windows Machine Certificate Authentication

    Looking to use certificate-based authentication on your managed windows devices? Machine authentication with x.509 certificates permits managed Windows machines that don’t belong to any users, to authenticate onto a 802.1X network. Just as organizations need to be able to moderate ...

    Read More
  • PKI Delivery Software for Every Device

    While the advantages of certificate-based authentication over credential-based are well documented, many still experience the barrier to entry of provisioning devices with certificates. This is certainly a valid concern for organizations that institute manual configuration policies and neglect to use ...

    Read More