Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Can I Use Passpoint with Microsoft Azure?

    The best way to ensure roaming internet access for employees is by deploying Passpoint. Whether you just need to be covered across campus or want to extend your network to nearby partners, Passpoint allows you to stay seamlessly switch between ...

    Read More
  • The Best Way to Manage Microsoft Certificates

    A primary weakness of password-based authentication is the human element. Passwords can be forgotten, shared, or stolen, making them a nightmare for IT admins. Forgotten passwords can lead to service interruptions and a pile-up of support tickets. Stolen passwords can ...

    Read More
  • Can I Use Passpoint with Google Workspace

    Passpoint is the premier tool for ensuring your users have network access while roaming, but it can be a little difficult to deploy. Fortunately, SecureW2 has a solution that integrates into your existing infrastructure to allow you to utilize Passpoint ...

    Read More
  • Can I Use The Okta RADIUS Agent For My Wi-Fi?

    An Okta RADIUS server agent is a lightweight program that runs as a service outside of Okta. It is usually installed outside of a firewall which gives Okta a route to communicate between an on-premise server and Okta’s cloud network. ...

    Read More
  • Top 3 Mistakes Setting Up AD CS Certificate Templates

    In order to use certificates for authentication, a security trend caused by the inadequacies of password-based authentication, a public key infrastructure (PKI) must be in place. Active Directory Certificates Services (AD CS) is Microsoft’s on-premise PKI solution and while it ...

    Read More
  • Creating Private Certificates Authorities for Internal Use

    What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates to devices. These certificates cryptographically tie an identity to a public key, ensuring that individuals online are who they say they are. Certificate authorities ...

    Read More
  • List of Passpoint-Supported Operating Systems

    Passpoint is a great tool to enable your network users to have continued access to the internet – whether they’re roaming around the city or moving from building to building on campus. Passpoint has support for most every operating system ...

    Read More
  • Passpoint r1 & r2 Compared

    Enabling an online connection while users are away from their home networks has been a challenge for those that want a complete and efficient system. The use of mobile data is too expensive overtime, and the restrictions of hotspots limits ...

    Read More
  • Yubikey Certificate Attestation Improved

    Cyber security is ever-evolving to counter the attacks that are getting more aggressive by the day. One-step authentication is no longer enough to establish identity with absolute certainty. 2FA (two-factor authentication) or MFA (Multi-factor-authentication) are becoming more frequently used for ...

    Read More
  • Enterprise PKI Management in the Cloud

    As the importance of secure authentication continues to rise, many organizations are looking for lightweight, cost-efficient solutions to their cybersecurity concerns. This has caused many to question the efficacy of credential-based authentication and has sparked interest in certificate-based authentication. But ...

    Read More