How to Automate Certificate Management and Provisioning

Eytan Raphaely Education

How to Automate Certificate Management and Provisioning

One of the biggest hurdles in certificate management is the lack of experience around finding the proper certificate management solutions. Often, administrators are of the notion that their only options for certificate management are pricey PKIs exclusive for enterprise, that …

How To Use Azure AD With 802.1x

Eytan Raphaely Education

How To Use Azure AD With 802.1x

Organizations from around the world are making the much needed transition to cloud-based network solutions. To ease the transition, Microsoft created Azure to aid clients moving their directories from the on-premise Active Directory (AD) to the cloud. However, Azure is …

Can I Use Passpoint with G-Suite?

Patrick Grubbs Education

Can I Use Passpoint with G-Suite?

Passpoint is the premier tool for ensuring your users have network access while roaming, but it can be a little difficult to deploy. Fortunately, SecureW2 has a solution that integrates into your existing infrastructure to allow you to utilize Passpoint …

Can I Use The Okta RADIUS Agent For My Wi-Fi?

Eytan Raphaely Education

Can I Use The Okta RADIUS Agent For My Wi-Fi?

An Okta RADIUS server agent is a lightweight program that runs as a service outside of Okta. It is usually installed outside of a firewall which gives Okta a route to communicate between an on-premise server and Okta’s cloud network. …

What is Passpoint?

Patrick Grubbs Education

What is Passpoint?

Simply put, Passpoint is a protocol developed by the Wi-Fi alliance to allow users to easily transition between partner networks. The vision is that people using mobile devices like smartphones and laptops will have reduced reliance on mobile data and ...

How to Manage Certificates on G-Suite

Sam Metzler Education

How to Manage Certificates on G-Suite

Many organizations with a Google Apps network use credential-based authentication for network access. While it is pretty straightforward, authenticating with passwords is incredibly risky nowadays. An overwhelming majority of cyber attacks were able to infiltrate the network through weak or …