Blog

How to Address MAC Randomization for Cloud Networks

Mac Address Randomization is an increasing trend among device manufacturers that’s quickly becoming the industry standard. While it can help in reducing the risks of data breaches and spying on users’ connections, it does complicate the authentication process and can ...

Read More

Is Okta A RADIUS Server?

A RADIUS server operates through connecting to a central database to inform who is allowed to connect to your network. It is a simple and easy-to-configure authentication solution that cannot be matched by other authentication setups. Implementing a RADIUS puts ...

Read More

How to Deploy Okta Device Trust on Windows

Device Trust is a concept in cybersecurity with a relatively simple premise; if a device can prove its identity, it can be trusted to have greater access to resources. If you know the source of a device and it’s postured ...

Read More

(Solved) Android 11 Samsung “Deep Sleep” Wi-Fi Connectivity Issue

Android devices have long had an “app sleep” feature designed to reduce power usage for infrequently used apps, and it’s not a new problem that it can cause apps to malfunction in one way or another. However, the Android 11 ...

Read More

Wi-Fi Authentication and Cloud RADIUS Support with Active Directory

Organizations that leverage Microsoft Active Directory (AD) often want to connect their core user identities to their Wi-Fi network. The goal is to enable users to authenticate uniquely to the network in order to increase security. The best practice for ...

Read More

5 Reasons AD CS Is Not A Complete PKI

Credential-based authentication is the most common form of authentication that everyone is accustomed to. But with most decades-old technologies, credentials are woefully ill-equipped to face modern security threats. While multi-factor authentication (MFA) methods can be used to boost the viability ...

Read More

Top 4 Network Security Tips for Returning to School

The rapid and unexpected transition to remote learning led many schools to scramble for solutions to a new teaching experience. This led to many schools being forced to stretch their cybersecurity capabilities to their absolute limits. This is a real ...

Read More

WPA3: The Ultimate Guide

The network type Wi-Fi Protected Access (WPA) has been upgraded once since its inception in 1999. In 2004, it was replaced by WPA2, which has stood as the standard for highly secure wireless networks ever since. To say that the ...

Read More

Google Workspace Network Security Best Practices

Considering the massive amount of revenue loss that can occur with just a single security breach and the continued prevalence of cyber attacks, organizations need to be emphasizing network security now more than ever. Many organizations have started to utilize ...

Read More

Cloud 802.1x Explained

What Is Cloud 802.1x? An 802.1x network is unique in one major way; it uses a Cloud RADIUS server as a means of authenticating users. The Cloud RADIUS checks a user’s credentials to see if they are an active member ...

Read More