Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  •  WPA2-Password Safety In An Enterprise Network

    When you try to connect to a Wi-Fi network and are asked for a password, do you ever find it hard to figure out what to do? You’re not by yourself. These days, having access to the internet is as ...

    Read More
  • Why is the EAP-TTLS/PAP Not Safe in 2024

    When designing a new network, there are countless features to consider that significantly impact the organization at large. Few functions of the network impact users more than the authentication method chosen by decision-makers. If an organization seeks the best network ...

    Read More
  • The Dangers of Self-Signed Certificates

    What are Self-Signed Certificates? A self-signed certificate is a digital certificate created by the same entity it is issued to. It establishes identity, but it does it with circular logic (“I am me because I said so”). It’s the cybersecurity ...

    Read More
  • Configure Microsoft GPO with RADIUS Authentication

    Integrating Microsoft’s Group Policy Object (GPO) with RADIUS authentication effectively improves network security and access control. GPO enables administrators to apply policy settings for specific user groups, ensuring that individuals only have access to the required resources, preventing unauthorized access, ...

    Read More
  • Can I Set Up Microsoft NPS in the Cloud?

    Microsoft’s Network Policy Server (NPS) is a AAA RADIUS server used for a number of different types of network connections. It can be used for wireless authentication, VPN connections, dial-up, and more. But as organizations continue to move to cloud-based ...

    Read More
  • A Guide to TLS Authentication and How It Works

    The essence of Transport Layer Security (TLS) requires understanding two key concepts: encryption and authentication. While encryption ensures that the data transmitted between your browser and the web server is unreadable to anyone else, authentication verifies the identity of the ...

    Read More
  • X.509 Digital Certificates Explained

    In order to run a certificate-based network, admins need to understand how to create and configure X.509 certificates. X.509 is a cryptography standard for defining a public key certificate. X.509 falls in the X.500 network standards that covers electronic directory ...

    Read More
  • WEP vs. WPA vs WPA2- The Better Wifi Authentication

    One key component of wireless security is encryption, which is the process of encoding data before it is transmitted over the air. Only authorized parties with the correct decryption key can read the data, preventing unauthorized access. Common encryption standards ...

    Read More
  • Analysis Of Windows On-premise vs. Cloud PKI Servers.

    The definition for a Public Key Infrastructures (PKIs) varies among cyber security professionals, but is generally considered a collection of components that give everything an organization needs to issue and manage X.509 digital certificates. PKIs can be configured to provide ...

    Read More