Page Tag: Uncategorized

  • Configure Google SCEP Certificate Automatic Enrollment Profiles

    Certificates are far superior to credentials and mitigate many vulnerabilities associated with pre-shared keys. They enhance the user experience by facilitating network access and removing password-related friction induced by password reset and complexity policies. Certificates also grant identity context by ...

    No tags found.

    Read More
  • How Sharing Wi-Fi Passwords on iOS Makes Your Network Vulnerable

    If you are an Apple device user, you must know about the Airdrop feature, which lets you share files. You can also use the Airdrop feature to share your WiFi password with other Apple device users nearby. However, sharing your ...

    No tags found.

    Read More
  • Windows Defender Credential Guard and PEAP MS-CHAPv2

    In today’s evolving world of cybersecurity, protecting data and user credentials is of utmost importance as it is the biggest threat to an organization’s security. Microsoft has implemented two security features to address this concern: Windows Defender Credential Guard and ...

    No tags found.

    Read More
  • Which Devices Support Passpoint & OpenRoaming?

    OpenRoaming & Passpoint Wi-Fi makes the use of mobile devices on the go more secure. Find out what devices and OS support Passoint.

    No tags found.

    Read More
  • Network-as-a-Service (NaaS): Explained

    NaaS, or Network as a Service, is a cloud-based networking model that modifies how businesses handle and use their networks. Instead of having a lot of network equipment on-site, you can subscribe to network services on a pay-as-you-go basis. NaaS ...

    No tags found.

    Read More
  • Why You Shouldn’t Use NPS with Azure AD(Microsoft Entra ID)

    Since cloud-based solutions are becoming the norm today, knowing how different identity and access management tools work together and what they do is important. This article details Microsoft NPS (Network Policy Server) and Azure AD (Entra ID), two infrastructure elements ...

    No tags found.

    Read More
  • What Is Apple Captive Network Assistant?

    Maintaining a safe connection is of the utmost importance in the hyper-connected world we live in today, where we use the internet for almost everything. Yet, the security of public Wi-Fi networks, especially the open ones often found in places ...

    No tags found.

    Read More
  • RADIUS Accounting Best Practices

    RADIUS is a crucial networking protocol best known for centralized authentication, authorization, and accounting (AAA) administration. The final “A” in AAA signifies accounting, a fundamental aspect of network management. Network Access Servers (NAS) typically function as clients and manage user ...

    No tags found.

    Read More
  • AAA Server Best Practices

    An AAA server processes user requests for access to computer resources and provides an organization’s authentication, authorization, and accounting (AAA) services. The AAA server typically interacts with network access, gateway servers, and user-information-containing databases and directories. One type of AAA ...

    No tags found.

    Read More
  • Jamf RADIUS Server Best Practices

    For small and medium-sized enterprises, coordinating employees’ iPhone, iPad, and Mac devices may distract you from your primary responsibilities. Jamf assists businesses in addressing this issue. The affordable cloud-based solution streamlines the administration of mobile devices, allowing you to concentrate ...

    No tags found.

    Read More