Tag: Enterprise & Mid-Market

SCEP explained: enrollment, servers, and protocol comparison
PKI/Certificates September 26, 2024
What is SCEP and How Does it Work? SCEP Certificates

SCEP automates X.509 certificate enrollment for managed devices and integrates with MDMs for secure Wi-Fi, VPN, and enterprise authentication.

RADIUS Centralizes Access Control With Digital Certificates On A WPA2-Enterprise Network.
Integrations September 12, 2024
A Complete Guide to Configuring RADIUS on Windows 2019

The term “RADIUS server” will probably be mentioned at some point in any conversation regarding wired or wireless authentication. Within a WPA-2 Enterprise network, RADIUS (also referred to as a...

Secure Logins with Certificate-Based Smart Card Authentication In AD.
PKI/Certificates September 3, 2024
Smart Card Authentication with Active Directory

Chances are, your work requires you to have logins and passwords for multiple resources. On top of that, you probably have to update your password regularly, ensuring that each new...

Set Up a PKI to Issue Identity-bound Certificates to Devices and Users.
PKI/Certificates September 3, 2024
How to Build and Set Up Your Own PKI

A Managed Public Key Infrastructure (PKI) is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s...

Mutual Server Validation Connects Android Clients to The Correct Servers.
Protocols & Standards September 3, 2024
Server Certificate Validation with Android 12 Devices

Cyber-attacks have grown stronger over the years and are able to easily bypass the rudimentary security standards provided by the username/password mechanism. If an organization relies on passwords for network...

Wi-Fi certificate authentication replaces passwords with digital certificates to securely verify devices and users.
Wi-Fi & Wired Security August 29, 2024
How Does Wi-Fi Certificate Authentication Work?

Wi-Fi certificate authentication replaces passwords with digital certificates to verify devices and users before granting network access. This guide explains how certificate-based authentication works using 802.1X, RADIUS servers, PKI, and...

Monitoring Network Traffic Is Crucial To A Secure Network.
Thought Leadership July 26, 2024
How to Monitor Network Traffic: Best Tips for IT Pros

Network traffic monitoring is essential for IT professionals to protect the company’s environment against potential vulnerabilities. It tracks data movement across different networks, ensures the network operates efficiently and identifies...

Automate Printer Security With 802.1X Authentication.
Endpoint & Device Management July 3, 2024
How to Configure 802.1x Printer Authentication?

When organizations establish their IT infrastructure, it’s essential to protect it, including network-connected devices and wired and wireless access points. Printers often fly under the radar among these devices regarding...

Automated PKI and CAC Management That Meets DoD Standards
PKI/Certificates July 1, 2024
How is a Smart CAC Card Used in A PKI?

Public Key Infrastructure (PKI) is one of the most robust methods for safeguarding sensitive information,  particularly within the Department of Defense (DoD) ecosystem, where it secures sensitive data and communications...

PKIaaS explained: architecture, benefits, and migration
PKI/Certificates Thought Leadership July 1, 2024
What Is PKI as a Service (PKIasS)?

PKIaaS is a cloud-hosted approach to managing certificates and trust infrastructure without operating on-premise CAs.

Digital Certs: The Secure Alternative to Risky Wildcard Certs.
Thought Leadership July 1, 2024
What Is a Wildcard SSL/TSS Certificate? | Definition & Use Cases

SSL certificates (Secure Sockets Layer) and their successor TLS certificates (Transport Layer Security) are critical for establishing secure communications over the Internet. They authenticate the identity of a website and...

Learn how to get PKI Certificates and why they matter.
PKI/Certificates May 20, 2024
What Is a PKI Certificate? Public Key Infrastructure Explained

Imagine conducting important business online without identifying the person you’re interacting with. It would be like handing sensitive documents to a stranger on the street; every login would be risky....

A Cloud PKI Integration With AD CS Lets You Manage Network Access Efficiently.
Integrations May 8, 2024
Should I Install AD CS on Domain Controller?

IT administrators must decide on network security: should they install Active Directory Certificate Services (AD CS) on a Domain Controller (DC)? Microsoft PKI (Public Key Infrastructure) solutions are the cornerstone...

EAP-TLS: The Gold Standard in Network Authentication
Protocols & Standards April 15, 2024
A Comprehensive Guide to the EAP Protocol in Networking

Network security is crucial in the modern digital world, where wireless communication is commonplace. Security risks such as unauthorized access, data eavesdropping, and network breaches can affect wireless networks. Because...

The Dangers of AD CS Misconfigurations
Risks & Threats December 26, 2023
AD CS: Domain Escalation Attack Scenario 1 (ESC1)

Active Directory Certificate Services (AD CS) is an essential tool for domain administrators to enhance network security, ensuring secure communication, code signing, and user authentication. Organizations can leverage the 802.1x...

PKI explained: trust chains, certificates, and encryption
PKI/Certificates November 14, 2023
What is PKI? Public Key Infrastructure Meaning & How It Works

PKI is the trust framework that enables certificate-based authentication, encryption, and secure communication across modern networks.

From Wi-Fi to Cloud: Certificates Are the Bridge to Zero Trust
Risks & Threats April 25, 2023
Why You Should Protect Your Local Area Network, Even if You’re Cloud-Based

Ensuring the security and integrity of a business’s data and network infrastructure is of utmost importance, and thus safeguarding the local network is imperative. The Wi-Fi network serves as the...

Managed PKI vs on-prem: cost, scale, and security
PKI/Certificates September 24, 2021
What Is Managed PKI and How Does It Work?

Managed PKI services simplify certificate lifecycle management, reduce infrastructure costs, and scale securely compared to on-prem PKI deployments.