Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Tag: azure

  • Should I Bind Non-Windows Devices to Active Directory?

    Digital certificates are starting to take over as the preferred method of network authentication because of their proven superiority to passwords in security and user experience. Many organizations are wanting to migrate to the cloud to start implementing certificate-based solutions, ...

    Read More
  • Tying IP Addresses to Azure Active Directory Users

    Effectively tracking and managing identity context is one of the most important aspects of a secure Azure-based network. Without accurate identity context, it’s near impossible to determine if someone is an unauthorized user.

    Read More
  • I Have Active Directory, How do I Move to the Cloud?

    It’s no secret that organizations are making the transition to cloud-based network environments. This is especially true considering the dramatic increase in remote work due to the global pandemic. Network administrators that use Active Directory (AD) want to be able ...

    Read More
  • The NPS Extension for Cloud Authentication

    Authentication security is an incredibly diverse field with countless options for organizations to choose from. How to authenticate your users to a secure network is a difficult decision to make as authentication is one of the primary lines of defense ...

    Read More
  • How to Configure Azure AD Attributes on Certificates

    Attribute mapping in Azure AD (Microsoft Entra ID) is easier than you might think. With a simple SAML application, you can use customizable Azure attributes to enforce dynamic policy options on your 802.1X network. What are Azure AD (Microsoft Entra ...

    Read More
  • Can I Use Group Policy Objects with Azure?

    As technology continues to migrate to cloud-based networking, many organizations have sought to take advantage of efficient cloud solutions. As a result, Microsoft-based organizations have been transitioning to Azure for their directory services because Active Directory does not work natively ...

    Read More
  • How To Use Azure AD Conditional Access for a Zero Trust 802.1x Network

    The standard method of thinking about network security is long overdue for an update. The usual “perimeter protection” approach consists of defining, and then controlling, a virtual boundary to make it airtight against the outside. This introduces a fallacy; the ...

    Read More
  • TLS/SSL Encryption with Azure

    Improving cyber security is crucial for organizations as one cyber attack could trigger the downfall and bankruptcy of an entire business. That’s why end-to-end encryption has become a network security standard because it involves encrypting an online connection between two ...

    Read More
  • Authenticating Guest Users for VPN with Azure AD B2B and SecureW2

    Cross-organization collaboration can be tricky for the IT department because they need to make sure the partner’s security policies match their own, then create temporary guest user accounts and ensure they are disabled once the collaboration is complete. If these ...

    Read More
  • Enable 802.1X For Guest Users with Azure AD B2B and SecureW2

    Business-to-Business collaboration is essential for company growth. Thousands of companies have collaborated on projects to increase company value and spread risk. At the core of these collaborations is identity and access control management. When partnering up, companies need to ensure ...

    Read More