Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • (Solved) Android 11 Samsung “Deep Sleep” Wi-Fi Connectivity Issue

    Android devices have long had an “app sleep” feature designed to reduce power usage for infrequently used apps, and it’s not a new problem that it can cause apps to malfunction in one way or another. However, the Android 11 ...

    Read More
  • What is Microsoft NPS?

    In an era dominated by cloud-centric solutions, Microsoft NPS sets out as an on-premise network security tool for Windows Server. Its primary goal is centralizing network regulations, user identities, and authorization protocols. As organizations increasingly use cloud computing, integrating Microsoft ...

    Read More
  • How to Use Yubikeys for VPN

    Yubikeys are a useful and secure tool for protecting yourself from data theft. They add a layer of authentication and can be used with other authentication methods to further protect your data. While Yubikeys are already a powerful multi-factor authentication ...

    Read More
  • FreeRADIUS vs. Cisco ISE

    Cyber-attacks cost small businesses an average of $84,000 to $148,000, and 60% of those attacked go out of business in 6 months. As organizations continue to grow, it becomes more important for IT administrators to look for better solutions for ...

    Read More
  • Device-Based vs User-Based RADIUS Lookup

    If all the users in your network fit into one single group, RADIUS authentication would be simple. Alas, things aren’t that easy; administrators often find themselves needing to specifically distinguish between devices and users, especially in an organization with both ...

    Read More
  • WPA2-PSK is Not Good Enough

    In this day and age, employees are accessing their corporate resources wherever they can get a strong wireless signal, whether it be a public hotspot, an airport, or a friend’s apartment. Methods of authentication based on a pre-shared key (PSK) ...

    Read More
  • Why NTLM Authentication is Vulnerable

    One of the biggest problems with Windows environments is the insistence to continue to build upon older systems despite the emergence of cloud solutions. Attackers can easily gain access to Active Directory domains by finding security gaps in older systems, ...

    Read More
  • Everything You Need to Know About PEAP Security

    Since most transactions and communication are done over networks today, the security of these networks can’t be overlooked. Securing your network connections has never been more critical, as the data traversing these networks is often sensitive and personal. The Protected ...

    Read More
  • A Security Analysis of WPA-Personal

    In the continuous effort to strengthen wireless network security, Wi-Fi Protected Access (WPA) represents a significant turning point. Data transmission over airwaves is becoming increasingly common in the ever-expanding digital connection landscape, making transmission security critical. WPA was created in ...

    Read More
  • MobileIron vs MEM Intune: Top MDMs Compared

    Mobile devices like phones, tablets, and laptops are being used for work more than ever, especially after the COVID-19 pandemic. Remote work and hybrid workplaces are the new normal, making mobile devices ubiquitous in enterprise settings. Mobile devices improve employee ...

    Read More