Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • The Most Secure RADIUS Authentication Methods

    Due to the COVID-19 pandemic, employees are working from home now more than ever before. According to a Stanford study, an incredible 42 percent of the U.S. labor force now works from home full-time. Unfortunately, cybercriminals have quickly picked up ...

    Read More
  • How To Revoke Certificate in Windows (AD-CS)

    Digital Certificates are an integral part of a Public Key Infrastructure (PKI) and cybersecurity as a whole. The certificates can encrypt communications and authenticate the identity of users and machines. In some instances, however, a certificate needs to be removed, ...

    Read More
  • Code Signing with Digital Certificates: Explained

    Imagine you’re installing an application and a pop-up like the screenshot above comes up. How can you be sure that the application you’re about to download is really safe? The answer is code signing certificates, which attest that the software ...

    Read More
  • Wi-Fi Authentication and Cloud RADIUS Support with Active Directory

    Organizations that leverage Microsoft Active Directory (AD) often want to connect their core user identities to their Wi-Fi network. The goal is to enable users to authenticate uniquely to the network in order to increase security. The best practice for ...

    Read More
  • Eduroam Deployment Best Practices

    Scholars and students often visit different campuses for internships, seminars, conferences, and other events. Accessing secure Wi-Fi at foreign campuses has always been a challenge for these individuals requiring guest access or temporary credentials. Eduroam is the solution – an ...

    Read More
  • x.509 Certificate Templates: Explained

    In order to run a certificate-based network, admins need to understand how to create and configure X.509 certificates. X.509 is a cryptography standard for defining a public key certificate. X.509 falls in the X.500 network standards that covers electronic directory ...

    Read More
  • You Don’t Need LDAP for 802.1X Anymore

    Without protection, your organization’s network is vulnerable to cyber attacks. The 802.1X protocol heightens network security by introducing RADIUS servers for authentication, and Lightweight Directory Access Protocol (LDAP) has commonly been used alongside RADIUS due to its ability to quickly ...

    Read More
  • Jamf vs. Intune: The Best Way to Manage Apple Devices

    The rise in hybrid work culture has increased the usage of mobile devices such as smartphones and tablets for corporate purposes. Organizations must strengthen the security of these devices to ensure that every endpoint is protected. Efficiently managed devices are critical in ...

    Read More
  • Intune vs. Workspace ONE: The Best MDM for Windows Devices

    The technological advancements in the last decade have evolved the use of mobile devices such as smartphones and laptops in the corporate world. Before the pandemic, some organizations were skeptical about using these devices for official purposes, mainly due to ...

    Read More