Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • What is Public Key Cryptography?

    Public key cryptography, a synonym for asymmetric cryptography, is a clever cryptographic system that allows two parties to exchange encrypted information publicly without worry of interception. Many cryptographic systems are symmetric. Two or more parties share a private key, then ...

    Read More
  • Configuring Yubikey Desktop Login on Jamf-Managed Devices

    Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer of physical security. They’re commonly used to securely ...

    Read More
  • Unlock the Potential of Security Keys

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][vc_column_text]Security keys, also called hardware security keys, are a method of authentication that offers an additional layer of hardened security. They can be used to login to desktops, Wi-Fi, and be integrated into the sign-in process ...

    Read More
  • How To Avoid BYOD Onboarding Issues

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][vc_column_text]In today’s mobile era, consumers are no longer chained to a bulky desktop in a cubicle or classroom. They are doing business, taking classes, and accessing resources on the go from their personal mobile devices, oftentimes ...

    Read More
  • Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

    Each year, college campuses must navigate the trials associated with successfully onboarding thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years ...

    Read More
  • iOS 9.x Wi-Fi Connectivity Issue with EAP-TTLS and EAP-PEAP: Explained

    The iOS 9+ bug: Why do PEAP or TTLS users get locked out of Wi-Fi when their password is updated? Why and how does TLS authentication still work? Should you Update to iOS 9? The unfortunate trade-off of the cool ...

    Read More
  • Buried Under a Mountain of Support Tickets? We Can Help!

    Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning ...

    Read More
  • Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px”][vc_column_text]The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense – they’ve been proven time and again to keep networks secure by ...

    Read More
  • Streamline Your Network with a Single Sign-On Policy

    Organizations that seek out opportunities to improve the efficiency of their network should consider using SAML authentication to implement a Single Sign-On (SSO) policy. First and foremost, SAML is an XML-based markup language for security assertions, or statements that service ...

    Read More
  • Effective Cybersecurity Starts With People

    Large banking institutions like Capital One are among the most targeted organizations by cyber-criminals looking to profit through data theft. Banks are responsible for protecting heaps of personal information about their customers, as well as financial wealth and transactions. This ...

    Read More