Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

A Guide To Build A PKI Certificate Authority

What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates. A digital certificate certifies the ownership of a public key by tying it cryptographically to the subject it is administered to. Certificate authorities are ... Read More

Read More
Root And Intermediate Certificates: An Overview

One of the main problems in online communication is trust. Let’s say you communicate with your bank through their website: how can you be sure the bank’s page is real and that a third party is not imitating it and ... Read More

Read More
JAMF vs. Mosyle: Apple MDMs compared

Apple devices are becoming increasingly popular for enterprises as they are feature-rich and user-friendly. Over 81% of employees use company-owned or BYOD Apple devices to access their corporate network, which makes it essential to have a robust Mobile Device Management ... Read More

Read More
Configure Okta Client Certificate Authentication

In this article, you can learn integrating digital certificates with one of the leading identity providers, Okta.

Read More
 WPA2-Password Safety In An Enterprise Network

When you try to connect to a Wi-Fi network and are asked for a password, do you ever find it hard to figure out what to do? You’re not by yourself. These days, having access to the internet is as ... Read More

Read More
Why is the EAP-TTLS/PAP Not Safe in 2024

When designing a new network, there are countless features to consider that significantly impact the organization at large. Few functions of the network impact users more than the authentication method chosen by decision-makers. If an organization seeks the best network ... Read More

Read More
Apple Managed Device Attestation Explained

Apple Managed Device Attestation (MDA) was announced at WDC22 to a lot of excitement among the security community. MDA is something that Apple has developed so that organizations can get higher assurance about the devices they are trying to authorize ... Read More

Read More
Configure Microsoft GPO with RADIUS Authentication

Integrating Microsoft’s Group Policy Object (GPO) with RADIUS authentication effectively improves network security and access control. GPO enables administrators to apply policy settings for specific user groups, ensuring that individuals only have access to the required resources, preventing unauthorized access, ... Read More

Read More
Can I Set Up Microsoft NPS in the Cloud?

Microsoft Network Policy Server (NPS) is Microsoft’s AAA RADIUS server. It authorizes and authenticates users and devices for network connections. NPS is an on-premise RADIUS server and uses the Active Directory Domain Services (ADDS) for 802.1X authentication. Being an on-premise ... Read More

Read More
A Guide to TLS Authentication and How It Works

The essence of Transport Layer Security (TLS) requires understanding two key concepts: encryption and authentication. While encryption ensures that the data transmitted between your browser and the web server is unreadable to anyone else, authentication verifies the identity of the ... Read More

Read More