How to Configure WPA2-Enterprise and 802.1x on Each Operating System

Sam Metzler Education

How to Configure WPA2-Enterprise and 802.1x on Each Operating System

Automation is key for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication can operate the same way as long as you have the right tools. ...
certificate authority

Public vs Private Certificate Authority

Patrick Grubbs Education

Public vs Private Certificate Authority

What’s a Certificate Authority (CA)? A certificate authority is an institution that distributes digital certificates. Certificate issuance is a critical part of securing interactions on the internet because certificates cryptographically tie an identity to a public key. Certificates are commonly …

wpa2 enterprise protocols

WPA2-Enterprise Authentication Protocols Comparison

Jake Ludin Education

WPA2-Enterprise Authentication Protocols Comparison

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. An 802.1x network authentication method is one of the first lines of defense that protect users and the …

Using Multi-Factor Authentication for Network Security

Micah Spady Education

Using Multi-Factor Authentication for Network Security

Many inquiries that we receive reference Multi-Factor Authentication (MFA) and how it can be used to improve the network security. MFA is a process that requires more than one form of identity to authenticate a user and approve network access. …

Reducing IT support tickets

Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

Jake Ludin Education

Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully onboarding thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …

Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Education

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Education

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense - they’ve been proven time and again to keep networks secure by protecting against over-the-air ...
This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Education

Public Key Infrastructure: Explained

To start, let’s answer the question, “What does a PKI stand for”? PKI stands for Public Key Infrastructure, the use of aPKI by an organization demonstrates a dedication to the security of the network and the effectiveness of public key …