Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • What’s In Store With WPA3-Enterprise?

    The network type WPA has been upgraded once since its inception in 1999. In 2004, it was replaced by WPA2, which has stood as the standard for highly secure wireless networks ever since and can be easily implemented with powerful ...

    Read More
  • Addressing Theft Threats From All Angles

    The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and other types of valuable data are a potential target for hackers, so many ...

    Read More
  • How To Trust Your Cybersecurity

    Cybersecurity is one of the most dynamic and complex industries in the world today. A business that provides cybersecurity software or products is not just competing against other companies; they’re competing against countless peoples’ ingenuity. To protect networks, servers, users, ...

    Read More
  • Efficient Device Onboarding for Higher Education

    An important first task for incoming students is to connect to the secure network they will use for all their on-campus studies. If the process is less than smooth, the already busy schedule is bogged down by large numbers of ...

    Read More
  • Equifax’s Story: The Risks of Lax Security

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][vc_column_text]On July 29th, 2017, Equifax discovered that data was leaking out of the credit bureau’s databases and had been since approximately mid-May of that year. They publicly reported the incident on September 7th, and it quickly ...

    Read More
  • Implementing SSL Inspection

    The proliferation of HTTPS websites has been a benefit and a challenge for network administrators. Overall, HTTPS enhances the overall security of websites because it encrypts the communications between the web server and client while HTTP sites do not. The ...

    Read More
  • Using a SCEP Gateway to Distribute Certificates to Managed Devices

    Efficiency is at the core of business technology, and requiring IT to manually onboard managed devices for secure network access significantly hinders progress. A solution to this inefficient process would be to automatically distribute network settings and a secure certificate ...

    Read More
  • Simplifying the Onboarding Process

    The most common questions we get in reference to onboarding new users aren’t related to using the software, but rather how to direct users to the software. SecureW2 has developed an intuitive process for users to self-configure their devices for ...

    Read More
  • Introducing an MDM Solution for SMBs

    A common trend for SMBs seen across many industries is opting into a MDM infrastructure to replace or supplement a BYOD policy. For many organizations, a MDM system offers a sense of security because the devices’ sole use is focus ...

    Read More
  • Demystifying Server Certificate Validation

    Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in ...

    Read More