Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • How to Issue Sectigo Certificates

    Sectigo, formerly known as Comodo, is a leading provider of digital identity solutions. One of their main products are SSL/TLS certificates and Public Key Infrastructures (PKI), which allows the client to securely share an encryption key with a server so ...

    Read More
  • How to Issue Digicert Certificates to Devices

    Digicert offers a variety of SSL certificates to accommodate any organizational structure and fulfill their specific needs. They supply you with the tools to configure any Platform/OS combination, giving the organization security and visibility benefits all while offering a range ...

    Read More
  • How to Prevent VPN Phishing Attacks

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][vc_column_text] What is a Phishing Attack A phishing attack is a type of social engineering attack that is used to steal an unsuspecting user’s data by masquerading as a trusted platform. Oftentimes, the attacker will send ...

    Read More
  • Enabling Double Encryption for Zscaler with SecureW2’s Cloud PKI

    Double encryption adds an extra layer of security to ensure that the connections between the Z App, Connectors, and ZPA ZENs stay protected. Although Zscaler already comes with a layer of TLS encryption, cyber attacks have evolved to the point ...

    Read More
  • Man-in-the-Middle (MITM) Attacks: Explained

    If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. According to UPS Capital, cyber attacks cost small businesses an average of $84,000 to $148,000, and 60% of those attacked ...

    Read More
  • PKI-Supported CMS for Yubikey

    A CMS (Credential Management System) or SCMS (Smart Card Management System) is an invaluable tool for organizations using smart cards and security keys. They have many functions to control credentials for all of your devices in one centralized place. SCMSs ...

    Read More
  • Configuring a PKI for Wi-Fi

    Wi-Fi security and availability is imperative for businesses now that online communication is the standard. Many organizations use passwords to authenticate user devices, but that is no longer a viable option as cyber attacks can easily bypass passwords. This has ...

    Read More
  • How to Automate Certificate Management and Provisioning

    One of the biggest hurdles in certificate management is the lack of experience in finding the proper certificate management solutions. Often, administrators are of the notion that their only option for certificate management is pricey PKIs exclusive for enterprise, that ...

    Read More
  • Can I Use Passpoint with Microsoft Azure?

    The best way to ensure roaming internet access for employees is by deploying Passpoint. Whether you just need to be covered across campus or want to extend your network to nearby partners, Passpoint allows you to stay seamlessly switch between ...

    Read More
  • The Best Way to Manage Microsoft Certificates

    A primary weakness of password-based authentication is the human element. Passwords can be forgotten, shared, or stolen, making them a nightmare for IT admins. Forgotten passwords can lead to service interruptions and a pile-up of support tickets. Stolen passwords can ...

    Read More