Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • A Security Analysis of WPA-Personal

    In the continuous effort to strengthen wireless network security, Wi-Fi Protected Access (WPA) represents a significant turning point. Data transmission over airwaves is becoming increasingly common in the ever-expanding digital connection landscape, making transmission security critical. WPA was created in ...

    Read More
  • MobileIron vs MEM Intune: Top MDMs Compared

    Mobile devices like phones, tablets, and laptops are being used for work more than ever, especially after the COVID-19 pandemic. Remote work and hybrid workplaces are the new normal, making mobile devices ubiquitous in enterprise settings. Mobile devices improve employee ...

    Read More
  • What is the Trusted Root Certification Authorities Store?

    A Certificate Authority (CA) is the entity that handles the certificate distribution for a PKI. Certificate Authorities assist in validating the identities of different websites, individuals, and devices by providing a trusted source for certificates. Certificate authorities are a key ...

    Read More
  • Does Rotating Preshared Keys Improve Security?

    Wifi Protected Access 2 – Pre-Shared Key (WPA2-PSK), a wireless security standard from 2004, is still used by many organizations today. And although it’s safer than its predecessors, WPA2-PSK relies on pre-shared keys (PSKs), which use a shared password or ...

    Read More
  • Designing a Zero Trust 802.1x Network

    As hackers get more sophisticated and hands-on, network security strategies have to adapt to meet the new challenge. An old idea that has recently been given new life is the concept of zero trust networks. This article will briefly discuss ...

    Read More
  • OCSP vs CRL: The Best Bet To Revoke Certificates In A PKI

    OCSP support is not included in the current roadmap of SecureW2 for some key reasons. Here’s a brief overview of your options for certificate revocation: OCSP stands for Online Certificate Standard Protocol. It’s a protocol described in RFC 6960 that ...

    Read More
  • Passwords vs. Digital Certificates For RADIUS Authentication

    Businesses understand the importance of passwords for private data security but might not realize that using a network with passwords poses many security threats. As hacking techniques become more advanced, data is stolen at a rate of almost 6 million ...

    Read More
  • Deploy Yubikeys For Secure Wi-Fi in WPA2-Enterprise Network

    Security keys are useful tools for hardening your devices with an additional factor of authentication. Did you know that same protection can be extended to your network? SecureW2, a Yubico Partner, has developed an industry-first software solution that allows you ...

    Read More
  • A Guide To Client Certificate Mapping In Active Directory

    Certificate mapping, in a general sense, refers to the tying of an identity to an X.509 digital certificate. In practice, the term is mostly used in the context of Microsoft’s “client certificate mapping” feature, wherein a client’s Active Directory identity ...

    Read More
  • Is EAP-TLS Safer than PEAP-MSCHAPv2 in 2024?

    The short answer is: Yes. Organizations that are interested in moving from the unsecure PEAP-MSCHAPv2 protocol to the superior EAP-TLS protocol might be worried about huge infrastructure overhaul or the network downtime it might entail. We’ve helped many organizations over ...

    Read More