Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Enabling Double Encryption for Zscaler with SecureW2’s Cloud PKI

    Double encryption adds an extra layer of security to ensure that the connections between the Z App, Connectors, and ZPA ZENs stay protected. Although Zscaler already comes with a layer of TLS encryption, cyber attacks have evolved to the point ...

    Read More
  • Man-in-the-Middle (MITM) Attacks: Explained

    If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. According to UPS Capital, cyber attacks cost small businesses an average of $84,000 to $148,000, and 60% of those attacked ...

    Read More
  • PKI-Supported CMS for Yubikey

    A CMS (Credential Management System) or SCMS (Smart Card Management System) is an invaluable tool for organizations using smart cards and security keys. They have many functions to control credentials for all of your devices in one centralized place. SCMSs ...

    Read More
  • Configuring a PKI for Wi-Fi

    Wi-Fi security and availability is imperative for businesses now that online communication is the standard. Many organizations use passwords to authenticate user devices, but that is no longer a viable option as cyber attacks can easily bypass passwords. This has ...

    Read More
  • How to Automate Certificate Management and Provisioning

    One of the biggest hurdles in certificate management is the lack of experience in finding the proper certificate management solutions. Often, administrators are of the notion that their only option for certificate management is pricey PKIs exclusive for enterprise, that ...

    Read More
  • Can I Use Passpoint with Microsoft Azure?

    The best way to ensure roaming internet access for employees is by deploying Passpoint. Whether you just need to be covered across campus or want to extend your network to nearby partners, Passpoint allows you to stay seamlessly switch between ...

    Read More
  • The Best Way to Manage Microsoft Certificates

    A primary weakness of password-based authentication is the human element. Passwords can be forgotten, shared, or stolen, making them a nightmare for IT admins. Forgotten passwords can lead to service interruptions and a pile-up of support tickets. Stolen passwords can ...

    Read More
  • Can I Use Passpoint with Google Workspace

    Passpoint is the premier tool for ensuring your users have network access while roaming, but it can be a little difficult to deploy. Fortunately, SecureW2 has a solution that integrates into your existing infrastructure to allow you to utilize Passpoint ...

    Read More
  • Can I Use The Okta RADIUS Agent For My Wi-Fi?

    An Okta RADIUS server agent is a lightweight program that runs as a service outside of Okta. It is usually installed outside of a firewall which gives Okta a route to communicate between an on-premise server and Okta’s cloud network. ...

    Read More
  • Top 3 Mistakes Setting Up AD CS Certificate Templates

    In order to use certificates for authentication, a security trend caused by the inadequacies of password-based authentication, a public key infrastructure (PKI) must be in place. Active Directory Certificates Services (AD CS) is Microsoft’s on-premise PKI solution and while it ...

    Read More