Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Tag: onboarding

  • A Complete Guide to Intune 802.1x

    The 802.1X standard provides secure authentication for users and devices looking to connect to wired and wireless networks. It uses an authentication server known as the RADIUS server that validates the users against their credentials and network policies to provide ...

    Read More
  • SCEP Security Best Practices

    Simple Certificate Enrollment Protocol (SCEP) makes certificate issuance easier, scalable, and secure. SCEP relies on HTTP and uses RSA cryptography. It lacks support for online certificate revocation, thus limiting its Certificate Retrieval List (CRL) support. SCEP asks for the “challenge ...

    Read More
  • JAMF vs. Mosyle: Apple MDMs compared

    Apple devices are becoming increasingly popular for enterprises as they are feature-rich and user-friendly. Over 81% of employees use company-owned or BYOD Apple devices to access their corporate network, which makes it essential to have a robust Mobile Device Management ...

    Read More
  • Configuring Passpoint/OpenRoaming on Android

    For individuals who possess an Android mobile device, the significance of Wi-Fi connectivity to their gadget is widely recognized. In addition to cost savings, utilizing this method yields faster data transmission rates compared to cellular data. Nonetheless, it can be ...

    Read More
  • Understanding PKI Certificates: How to Get Them and Why They Matter

    Imagine conducting important business online without identifying the person you’re interacting with. It would be like handing sensitive documents to a stranger on the street; every login would be risky. Fortunately, the internet establishes protocols to build trust in the ...

    Read More
  • A Deep Dive into PKI Certificates

    Corporate data, social media pages, applications, and user data are crucial assets of an organization, and any theft or misuse of these could lead to huge financial losses. They not only result in loss of business opportunities, but organizations are ...

    Read More
  • Introducing WebAuth Wi-Fi with Cloud IDPs

    It’s no secret that open Wi-Fi networks are infamously insecure, and Pre-Shared Key (PSK) networks aren’t much better. If you tie your organization’s Wi-Fi to a single password and more than a handful of people know it, it’s only a ...

    Read More
  • How to Connect to Passpoint Wi-Fi on iOS

    In a nutshell, Passpoint is a protocol developed by the Wi-Fi Alliance that allows users to connect securely to a Wi-Fi hotspot. Designed to operate like roaming works for cellular networks, Passpoint provides seamless roaming between different Wi-Fi carriers and ...

    Read More