Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • User Lookup With Certificate-Based Authentication

    Traditionally, the process of authenticating certificates for network access is independent of the user directory. And in a normally-functioning network environment, this is perfectly acceptable. Certificate-based authentication is ironclad and protects the network from unauthorized entry. Only in very rare, ...

    Read More
  • Dynamic RADIUS Policy Enforcement with Static Certificates

    Certificate-based WPA2-Enterprise networks are extremely secure, but x.509 digital certificates can be a hassle to manage. Although SecureW2 has one of the best certificate management platforms in the industry, we’re always looking for ways to make EAP-TLS authentication safer and ...

    Read More
  • A Cloud PKI Solution for Azure AD

    Azure AD (Microsoft Entra ID) customers can ditch password-based authentication and switch to x.509 certificate-based authentication. Digital certificates offer vast improvements to network security, efficiency, and user experience. But in order to deploy certificates, organizations will need to implement a ...

    Read More
  • Active Directory Vs. LDAP

    Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) are two terms frequently used regarding directory services. These solutions are essential frameworks for managing user identities, resources, and network configurations in an IT infrastructure. While LDAP is a standardized protocol ...

    Read More
  • How to Use Google for 802.1x Wi-Fi

    Organizations are making the much-needed transition to cloud-based network solutions and Google is a forerunner in getting people’s devices and networks in the cloud. However, for some, getting your devices configured and ready for WPA2-Enterprise Wi-Fi can be tricky and ...

    Read More
  • What is Dynamic RADIUS?

    SecureW2 is pleased to announce the invention of a whole new kind of AAA server – Dynamic (Cloud) RADIUS. It will revolutionize the way you authenticate users and enforce policies to create a WPA2-Enterprise network that is more efficient and ...

    Read More
  • Shared Hosted RADIUS for Managed Service Providers

    It’s widely accepted that using a RADIUS server for network authentication is the most secure method, but there’s a significant number of organizations for which RADIUS isn’t feasible. SecureW2 has pioneered a RADIUS server that is infinitely scalable in both ...

    Read More
  • Generate x.509 Certificates with Okta

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][vc_column_text]A major challenge that organizations face in regards to certificates is enrolling users without Active Directory. In response, SecureW2 has developed a solution that can provide a certificate-based network regardless of the directory in use. SecureW2’s ...

    Read More
  • Are Passwords Secure?

    Credential-based authentication is the method nearly all network users are used to and has been a common tool for decades. But unlike other decades-old technology, passwords have not been phased out of regular use. Now more than ever, passwords pose ...

    Read More
  • The Importance of Authentication Security

    Authentication acts as the first line of defense to allow access to valuable data only to those who are approved by the organization. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) as an extra layer of protection to RADIUS ...

    Read More