Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Best Practices For IoT Security

    The explosion of Internet of Things devices (IoT) onto the technology market has revolutionized how businesses operate. The endless possible applications of these incredibly diverse devices has led to a surge in quantity over the last 5 years that is ...

    Read More
  • 3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

    Over the past decade, we’ve helped hundreds of organizations around the world secure and set up WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many pitfalls an organization can make when they set it up. ...

    Read More
  • Certificate Security for IoT Devices

    Internet of Things (IoT) devices have been a rapidly growing industry trend that can provide invaluable and unique data to many organizations. While most devices are designed to maximize the efficiency of data distribution, they often leave security by the ...

    Read More
  • Cloud vs. On-Site RADIUS: Which is Better?

    A requirement for all WPA2-Enterprise networks is the use of a RADIUS server. A vital part of the network, the function of a RADIUS is to authenticate the user and their device and authorize them for network access. The authentication ...

    Read More
  • Update Your Browser to TLS 1.2 to Support 802.1x WPA2-Enterprise

    Organizations should be aware of an important update to TLS. TLS 1.2 is the most recent update that builds on top of TLS 1.0 and TLS 1.1 to increase network security. Updating your browsers and OS to TLS 1.2 is ...

    Read More
  • Reduce the Risks of a Certificate Authority

    Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, it can be exceedingly difficult to identify them. ...

    Read More
  • Using Digital Certificates on Yubikey

    Yubikeys are an incredibly secure method of protecting yourself from data theft, but you’re probably not using them to their full potential. Natively, Yubikeys only support credential-based authentication through keypairs and one-time passwords. However, SecureW2 has developed an industry-first solution ...

    Read More
  • Best Practices for AD CS Configuration

    Many companies use Windows servers as the main component of their IT infrastructures. If those companies want to use digital certificates for their network, they set up a public key infrastructure (PKI). PKIs deploy and manage certificates, which can be ...

    Read More
  • Stronger Multi-Factor Authentication With Certificates

    It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. According to IBM’s X-Force Threat Intelligence Index, 35% of exploitation activity involves Man-in-the-Middle Attacks which easily bypass ...

    Read More
  • Certificate-Based Authentication for Okta PIV Cards

    Efficiency is the name of the game when operating a wireless network. Designing every facet of the network with the user experience in mind will result in a streamlined system that works well for all that require access. A wrench ...

    Read More