Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • How To Trust Your Cybersecurity

    Cybersecurity is one of the most dynamic and complex industries in the world today. A business that provides cybersecurity software or products is not just competing against other companies; they’re competing against countless peoples’ ingenuity. To protect networks, servers, users, ...

    Read More
  • Efficient Device Onboarding for Higher Education

    An important first task for incoming students is to connect to the secure network they will use for all their on-campus studies. If the process is less than smooth, the already busy schedule is bogged down by large numbers of ...

    Read More
  • Equifax’s Story: The Risks of Lax Security

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][vc_column_text]On July 29th, 2017, Equifax discovered that data was leaking out of the credit bureau’s databases and had been since approximately mid-May of that year. They publicly reported the incident on September 7th, and it quickly ...

    Read More
  • Implementing SSL Inspection

    The proliferation of HTTPS websites has been a benefit and a challenge for network administrators. Overall, HTTPS enhances the overall security of websites because it encrypts the communications between the web server and client while HTTP sites do not. The ...

    Read More
  • Using a SCEP Gateway to Distribute Certificates to Managed Devices

    Efficiency is at the core of business technology, and requiring IT to manually onboard managed devices for secure network access significantly hinders progress. A solution to this inefficient process would be to automatically distribute network settings and a secure certificate ...

    Read More
  • WPA2-PSK is Not Good Enough

    In this day and age, employees are accessing their corporate resources wherever they can get a strong wireless signal, whether it be a public hotspot, an airport, or a friend’s apartment. Methods of authentication based on a pre-shared key (PSK) ...

    Read More
  • Simplifying the Onboarding Process

    The most common questions we get in reference to onboarding new users aren’t related to using the software, but rather how to direct users to the software. SecureW2 has developed an intuitive process for users to self-configure their devices for ...

    Read More
  • Introducing an MDM Solution for SMBs

    A common trend for SMBs seen across many industries is opting into a MDM infrastructure to replace or supplement a BYOD policy. For many organizations, a MDM system offers a sense of security because the devices’ sole use is focus ...

    Read More
  • Demystifying Server Certificate Validation

    Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in ...

    Read More
  • Launching Certificate-Based Security Shouldn’t be Intimidating

    Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure ...

    Read More