wpa2 enterprise protocols

WPA2-Enterprise Authentication Protocols Comparison

Jake Ludin Education

WPA2-Enterprise Authentication Protocols Comparison

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. An 802.1x network authentication method is one of the first lines of defense that protect users and the …

Using Multi-Factor Authentication for Network Security

Micah Spady Education

Using Multi-Factor Authentication for Network Security

Many inquiries that we receive reference Multi-Factor Authentication (MFA) and how it can be used to improve the network security. MFA is a process that requires more than one form of identity to authenticate a user and approve network access. …

Reducing IT support tickets

Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

Jake Ludin Education

Use WPA-2 Enterprise To Efficiently Onboard Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully onboarding thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …

Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Education

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Education

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense - they’ve been proven time and again to keep networks secure by protecting against over-the-air ...
This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Education

Public Key Infrastructure: Explained

To start, let’s answer the question, “What does a PKI stand for”? PKI stands for Public Key Infrastructure, the use of aPKI by an organization demonstrates a dedication to the security of the network and the effectiveness of public key …

Using a SCEP gateway to push certificates to MDMs

Using a SCEP Gateway to Distribute Certificates to Managed Devices

Jake Ludin Education

Using a SCEP Gateway to Distribute Certificates to Managed Devices

Efficiency is at the core of business technology, and requiring IT to manually onboard managed devices for secure network access significantly hinders progress. A solution to this inefficient process would be to automatically distribute network settings and a secure certificate …

Protection for when network users access applications off-site

WPA2-PSK is Not Good Enough

News Education

WPA2-PSK is Not Good Enough

In this day and age, employees are accessing their corporate resources wherever they can get a strong wireless signal, whether it be a public hotspot, an airport, or a friend’s apartment. Methods of authentication based on a pre-shared key (PSK) ...