This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Uncategorized

Public Key Infrastructure: Explained

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to the security of the network and the effectiveness of public key encryption and certificate-based networks. The purpose of a PKI is to manage the public ...
Using a SCEP gateway to push certificates to MDMs

Using a SCEP Gateway to Distribute Certificates to Managed Devices

Jake Ludin Uncategorized

Using a SCEP Gateway to Distribute Certificates to Managed Devices

Efficiency is at the core of business technology, and requiring IT to manually onboard managed devices for secure network access significantly hinders progress. A solution to this inefficient process would be to automatically distribute network settings and a secure certificate ...

Streamline Your Network with a Single Sign-On Policy

Jake Ludin Uncategorized

Streamline Your Network with a Single Sign-On Policy

Organizations that seek out opportunities to improve the efficiency of their network should consider using SAML authentication to implement a Single Sign-On (SSO) policy. First and foremost, SAML is an XML-based markup language for security assertions, or statements that service ...
Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Uncategorized

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks have proven time and again to keep networks secure by protecting against over-the-air attacks. The caveat that has made many cautious ...
Authenticating with Server Certificate Validation

Demystifying Server Certificate Validation

Jake Ludin Uncategorized

Demystifying Server Certificate Validation

Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in ...
image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Uncategorized

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure ...
Credential theft of an SMB

Credential Theft Threats Facing SMBs

Jake Ludin Uncategorized

Credential Theft Threats Facing SMBs

Data and credential theft have become an increasingly prevalent concern for SMBs as more attackers choose to target them. It’s common to hear about large scale hacks, such as Target, Yahoo, or Equifax, but far less frequently reported are attacks ...