Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • The Four Stages of a Certificate Life Cycle

    Digital certificates are electronic credentials that are used to authenticate the identities of individuals or devices using a particular network. It’s helpful to think of certificates with similar functionality as a passport or driver’s license. While these official documents are ...

    Read More
  • What is TLS Encryption?

    Transport Layer Security is a protocol that ensures privacy and data integrity between two communicating applications. It’s the most widely deployed security protocol used today and is incorporated into web browsers and other applications that require data to be securely ...

    Read More
  • Wi-Fi Onboarding Captive Portal Best Practices

    Accessing Wi-Fi networks easily and remotely has become a critical interaction point between organizations and their remotely located users. The captive portal is at the center of this process. It is a doorway that not only gives people access to ...

    Read More
  • NAC Vendors: Cisco ISE vs. Aruba Clearpass

    The rise in the popularity of remote work has caused a massive portion of the workforce to stay home. This is made possible by advanced BYOD devices with top-notch technical capabilities, such as laptops and smartphones. However, these devices are ...

    Read More
  • Troubleshooting Common SCEP Errors

    Simple Certificate Enrollment Protocol (SCEP) automates certificate distribution to issue and manage network certificates for users and devices securely. SCEP protocol addresses certificate enrollment without any intervention by end users.  A Mobile Device Management (MDM) solution uses SCEP for its ...

    Read More
  • Jamf vs. Intune: The Best Way to Manage Apple Devices

    The rise in hybrid work culture has increased the usage of mobile devices such as smartphones and tablets for corporate purposes. Organizations must strengthen the security of these devices to ensure that every endpoint is protected. Efficiently managed devices are critical in ...

    Read More
  • A Comprehensive Review of Certificate Pinning: The Challenges and Alternatives

    While digital certificates undoubtedly provide a more secure authentication method than passwords, some organizations still fear the possibility that certificates can be issued to unauthorized parties. Certificate pinning is a security strategy designed to prevent this from occurring by creating ...

    Read More
  • A Deep Dive into the Security of WPA2-PSK

    In Wi-Fi security, one protocol stands out for its widespread adoption and significant role in protecting data: WPA2-PSK. This protocol, short for Wi-Fi Protected Access 2 – Pre-Shared Key, has been instrumental in securing wireless networks against unauthorized access and ...

    Read More