Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Device-Based vs User-Based RADIUS Lookup

    If all the users in your network fit into one single group, RADIUS authentication would be simple. Alas, things aren’t that easy; administrators often find themselves needing to specifically distinguish between devices and users, especially in an organization with both ...

    Read More
  • WPA2-PSK is Not Good Enough

    In this day and age, employees are accessing their corporate resources wherever they can get a strong wireless signal, whether it be a public hotspot, an airport, or a friend’s apartment. Methods of authentication based on a pre-shared key (PSK) ...

    Read More
  • Why NTLM Authentication is Vulnerable

    One of the biggest problems with Windows environments is the insistence to continue to build upon older systems despite the emergence of cloud solutions. Attackers can easily gain access to Active Directory domains by finding security gaps in older systems, ...

    Read More
  • Everything You Need to Know About PEAP Security

    Since most transactions and communication are done over networks today, the security of these networks can’t be overlooked. Securing your network connections has never been more critical, as the data traversing these networks is often sensitive and personal. The Protected ...

    Read More
  • A Security Analysis of WPA-Personal

    In the continuous effort to strengthen wireless network security, Wi-Fi Protected Access (WPA) represents a significant turning point. Data transmission over airwaves is becoming increasingly common in the ever-expanding digital connection landscape, making transmission security critical. WPA was created in ...

    Read More
  • MobileIron vs MEM Intune: Top MDMs Compared

    Mobile devices like phones, tablets, and laptops are being used for work more than ever, especially after the COVID-19 pandemic. Remote work and hybrid workplaces are the new normal, making mobile devices ubiquitous in enterprise settings. Mobile devices improve employee ...

    Read More
  • What is the Trusted Root Certification Authorities Store?

    A Certificate Authority (CA) is the entity that handles the certificate distribution for a PKI. Certificate Authorities assist in validating the identities of different websites, individuals, and devices by providing a trusted source for certificates. Certificate authorities are a key ...

    Read More
  • Does Rotating Preshared Keys Improve Security?

    Wifi Protected Access 2 – Pre-Shared Key (WPA2-PSK), a wireless security standard from 2004, is still used by many organizations today. And although it’s safer than its predecessors, WPA2-PSK relies on pre-shared keys (PSKs), which use a shared password or ...

    Read More
  • Designing a Zero Trust 802.1x Network

    As hackers get more sophisticated and hands-on, network security strategies have to adapt to meet the new challenge. An old idea that has recently been given new life is the concept of zero trust networks. This article will briefly discuss ...

    Read More
  • OCSP vs CRL: The Best Bet To Revoke Certificates In A PKI

    OCSP support is not included in the current roadmap of SecureW2 for some key reasons. Here’s a brief overview of your options for certificate revocation: OCSP stands for Online Certificate Standard Protocol. It’s a protocol described in RFC 6960 that ...

    Read More