Tag: Uncategorized

Secure Jamf-managed Macs with YubiKey logins.
Endpoint & Device Management Uncategorized November 4, 2019
Configuring Yubikey Desktop Login on Jamf-Managed Devices

Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that...

Security keys deliver passwordless, phishing-resistant authentication—made stronger with certificate provisioning.
Endpoint & Device Management Uncategorized October 8, 2019
Unlock the Potential of Security Keys

Security keys, also called hardware security keys, are a method of authentication that offers an additional layer of hardened security. They can be used to login to desktops, Wi-Fi, and...

Reduce support burden: streamline device setup with automated onboarding and remote troubleshooting.
BYOD Onboarding Uncategorized October 2, 2019
Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a...

Make Wi-Fi onboarding effortless with self-service setup, simple URLs, and certificate-based access
BYOD Onboarding Uncategorized January 4, 2019
Simplifying the Onboarding Process

The most common questions we get in reference to onboarding new users aren’t related to using the software, but rather how to direct users to the software. SecureW2 has developed...