Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

List of Devices Supporting 802.1x

It is hard to imagine life without Wi-Fi, both in personal or professional spaces but we can not deny that it has parallelly caused the transmission of more and more sensitive information over the air. The evolution of WPA2-Enterprise has ... Read More

Read More
How to Enable Windows Machine Certificate Authentication

Whether you use Windows, macOS, or any other operating system, deploying digital certificates for your device can be the most impactful step to strengthening your network security. Digital certificates use superior asymmetric encryption, which uses two pairs of public and ... Read More

Read More
Why Apple Wants You to Use ACME vs. SCEP

In this article, we will discuss the latest ACME protocol that you can use for your iOS devices for a smooth transition to digital certificates with minimum effort.

Read More
LDAP Authentication with Azure AD

LDAP (Lightweight Directory Access Protocol) authentication can confirm user identities across a network. It uses a centralized directory system for user authorization and authentication. On the other hand, Microsoft offers a cloud-based identity and access management solution called Azure Active ... Read More

Read More
Understanding Phishing-Resistant MFA in Azure AD

On an average day, most employees have to log into numerous different applications and resources at work. The influx of applications necessary for work has led to an exponential increase in login and authentication methods, including things such as one-time ... Read More

Read More
How to Generate Root & Intermediate CAs

With 10 million attacks targeting usernames and passwords occur every day. it’s not a bad idea to drop passwords wherever possible.  A proper PKI allows your network to utilize certificate-based authentication. Root CAs and Intermediate CAs are both parts of ... Read More

Read More
What’s the Difference between RADIUS, TLS, and EAP-TLS?

There are many components involved in running a secure network. It’s very easy to get bogged down by different terminology and be confused about what exactly each component does. This is especially true in regards to 802.1X. 62% of breaches ... Read More

Read More
How To Set Up 802.1X Using Azure AD

You can configure 802.1X using Azure AD by syncing it with an LDAP server or enrolling every device with an x.509 certificate.

Read More
Windows Defender Credential Guard and PEAP MS-CHAPv2

In today’s evolving world of cybersecurity, protecting data and user credentials is of utmost importance as it is the biggest threat to an organization’s security. Microsoft has implemented two security features to address this concern: Windows Defender Credential Guard and ... Read More

Read More
Active Directory Certificate Services (AD CS): Explained

There are many components involved in running a certificate-based network. You need to establish trusted servers and certificate authorities (CA), make sure devices can enroll for certificates, authenticate users, manage the certificate life cycle, segment users for different group policies, ... Read More

Read More
FreeRADIUS with Google LDAP: How Does it Work?

Is an authentication system built around FreeRADIUS with Google LDAP more economical? Learn the truth about this setup here.

Read More
What is the Most Secure Method of Wi-Fi Authentication?

The first layer of defense for a wireless network is the authentication process. With a strong authentication barrier, an organization can feel confident that only approved network users are able to gain access to the network and the resources they ... Read More

Read More