Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Best Practices for Certificate Authority Management

An ever-growing trend in authentication cybersecurity is the replacement of credential-based authentication with certificates. Credentials are simply incapable of protecting a secure network. According to the 2019 Verizon Data Breach Investigations Report, 29% of 2019 network breaches involved the use ... Read More

Read More
AD CS Certificate and Security Configuration Exploits

Active Directory Certificate Services (AD CS) is a critical platform  in cybersecurity, providing infrastructure for managing certificates within an organization. At the heart of AD CS lies the Public Key Infrastructure (PKI), which uses pairs of public and private keys ... Read More

Read More
Do RADIUS Servers use AD

Do you know what facilitated back-office IT functions for any business twenty years ago? It was Active Directory, Microsoft’s user directory system. Because Active Directory simplified the task for organizations to manage their resources from a single console, offices everywhere used ... Read More

Read More
The Four Stages of a Certificate Life Cycle

Digital certificates are electronic credentials that are used to authenticate the identities of individuals or devices using a particular network. It’s helpful to think of certificates with similar functionality as a passport or driver’s license. While these official documents are ... Read More

Read More
What is TLS Encryption?

Transport Layer Security is a protocol that ensures privacy and data integrity between two communicating applications. It’s the most widely deployed security protocol used today and is incorporated into web browsers and other applications that require data to be securely ... Read More

Read More
Wi-Fi Onboarding Captive Portal Best Practices

Accessing Wi-Fi networks easily and remotely has become a critical interaction point between organizations and their remotely located users. The captive portal is at the center of this process. It is a doorway that not only gives people access to ... Read More

Read More
NAC Vendors: Cisco ISE vs. Aruba Clearpass

The rise in the popularity of remote work has caused a massive portion of the workforce to stay home. This is made possible by advanced BYOD devices with top-notch technical capabilities, such as laptops and smartphones. However, these devices are ... Read More

Read More
How AAA Servers Work

WPA2-Personal is common in homes and cafes  – a security type requiring a preshared key (PSK). But some networks cannot be secured with a password, they want a username and a unique password for every user. That’s likely a WPA2-Enterprise ... Read More

Read More
The History of RADIUS Authentication Protocol: IEEE 802.1X

The Internet has been one of our most transformative and fast-evolving technologies. According to Satista.com, the internet user base increased from 413 million in 2000 to nearly 4.9 billion in 2022. Using an SSID and a shared password was the ... Read More

Read More
Troubleshooting Common SCEP Errors

Simple Certificate Enrollment Protocol (SCEP) automates certificate distribution to issue and manage network certificates for users and devices securely. SCEP protocol addresses certificate enrollment without any intervention by end users.  A Mobile Device Management (MDM) solution uses SCEP for its ... Read More

Read More