Addressing Theft Threats From All Angles

Jake Ludin Uncategorized

Addressing Theft Threats From All Angles

The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and many more types of valuable data are a potential target for hackers, so ...
This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Uncategorized

Public Key Infrastructure: Explained

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to the security of the network and the effectiveness of public key encryption and certificate-based networks. The purpose of a PKI is to manage the public ...
Using a SCEP gateway to push certificates to MDMs

Using a SCEP Gateway to Distribute Certificates to Managed Devices

Jake Ludin Uncategorized

Using a SCEP Gateway to Distribute Certificates to Managed Devices

Efficiency is at the core of business technology, and requiring IT to manually onboard managed devices for secure network access significantly hinders progress. A solution to this inefficient process would be to automatically distribute network settings and a secure certificate ...

Streamline Your Network with a Single Sign-On Policy

Jake Ludin Uncategorized

Streamline Your Network with a Single Sign-On Policy

Organizations that seek out opportunities to improve the efficiency of their network should consider using SAML authentication to implement a Single Sign-On (SSO) policy. First and foremost, SAML is an XML-based markup language for security assertions, or statements that service ...