Tag: Uncategorized

Industry veteran Stephen Newhauser, leads new channel program delivers a partner-first framework to drive and scale partner-led revenue.
Uncategorized February 12, 2026
SecureW2 Unveils Global Channel Program to Accelerate Partner Growth

SEATTLE, February 10, 2026 SecureW2, the passwordless security leader, today announced the launch of the Nexus Partner Program, its new global channel program, led by Stephen Newhauser, Senior Director, Worldwide...

Masquerade attacks explained, real-world impact, and how to prevent impersonation
Risks & Threats Uncategorized February 10, 2026
What Is a Masquerade Attack? How Credential Theft Could Cost You Millions

Masquerade attacks use stolen credentials or forged identities to impersonate trusted users or devices. This guide explains how they work, real-world examples, and how to prevent costly damage.

SecureW2 earns 14 industry awards in 2025 for PKI, Cloud RADIUS, and passwordless security.
Uncategorized January 26, 2026
Best PKI and Cloud RADIUS: SecureW2 Wins 14 Industry Awards in 2025

The SecureW2 JoinNow platform consistently won top awards from cybersecurity experts in 2025. Digital threats are constantly evolving, and that means cybersecurity must keep pace with relentless innovation. SecureW2 remains...

Adaptive Defense: Automate User Deprovisioning & Reassignment
Uncategorized January 6, 2026
JoinNow 8.2: ServiceNow Integration, Improved Adaptive Defense, and more!

JoinNow Platform 8.2 is now available, delivering a stronger foundation for Adaptive Defense by enabling external automation. This release introduces ServiceNow support as a real-time intelligence source, with improvements to...

Stop Unauthorized AI Access: Secure Inference Infrastructure with Certificates.
Uncategorized October 16, 2025
Securing AI Inference Infrastructure with Certificate-Based Access

Artificial intelligence has moved beyond research labs. It now drives decisions, powers customer experiences, and automates critical operations across industries. As AI becomes more integrated into business workflows, model inference...

Secure Jamf-managed Macs with YubiKey logins.
Endpoint & Device Management Uncategorized November 4, 2019
Configuring Yubikey Desktop Login on Jamf-Managed Devices

Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that...

Security keys deliver passwordless, phishing-resistant authentication—made stronger with certificate provisioning.
Endpoint & Device Management Uncategorized October 8, 2019
Unlock the Potential of Security Keys

Security keys, also called hardware security keys, are a method of authentication that offers an additional layer of hardened security. They can be used to login to desktops, Wi-Fi, and...

Reduce support burden: streamline device setup with automated onboarding and remote troubleshooting.
BYOD Onboarding Uncategorized October 2, 2019
Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a...

Make Wi-Fi onboarding effortless with self-service setup, simple URLs, and certificate-based access
BYOD Onboarding Uncategorized January 4, 2019
Simplifying the Onboarding Process

The most common questions we get in reference to onboarding new users aren’t related to using the software, but rather how to direct users to the software. SecureW2 has developed...