Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • What is the Most Secure Method of Wi-Fi Authentication?

    The first layer of defense for a wireless network is the authentication process. With a strong authentication barrier, an organization can feel confident that only approved network users are able to gain access to the network and the resources they ...

    Read More
  • Cloud-Hosted LDAP is Vulnerable with Credentials

    Organizations are always looking for a new strategy to increase the convenience of using their network without compromising security. As a result, many have sought out cloud solutions. Read here how a SecureW2 client transitioned to cloud-based networking and improved ...

    Read More
  • Complete Guide to iOS 802.1X

    Securely connecting iOS devices to a network can be a difficult task, especially since the Covid-19 pandemic sped up the inevitable rise of hybrid work environments. Network security must be a top priority and a best practice is configuring IEEE ...

    Read More
  • Complete Guide to Windows 802.1X Authentication

    802.1X is a network security protocol that enhances the security of a network by requiring authentication before granting access, preventing unauthorized network access. In Windows environments, 802.1X is widely employed to ensure the security of both wired and wireless connections. ...

    Read More
  • Why NTLM Authentication is Vulnerable

    One of the biggest problems with Windows environments is the insistence to continue to build upon older systems despite the emergence of cloud solutions. Attackers can easily gain access to Active Directory domains by finding security gaps in older systems, ...

    Read More
  • Can I Use Google Secure LDAP for Wi-Fi?

    LDAP’s importance cannot be denied. As a protocol, it has greatly simplified the directory search process. Unfortunately, as time goes on, LDAP has begun to grow outdated, especially given its association with on-premise hardware and legacy systems. This is why ...

    Read More
  • Why a Managed PKI (MPKI) is Probably Right for You

    If you’ve decided to make the move to secure certificate-based authentication, one of the first things you need to figure out is whether you’re going to build your own Public Key Infrastructure (PKI) or use a managed PKI (MPKI). PKIs, ...

    Read More
  • Enabling Okta Device Trust for any MDM

    In the modern cybersecurity environment, the network perimeter is becoming increasingly blurred and difficult to maintain. Countless workers are remote and require access to resources outside the traditional office environment. This renders the traditional security method of not allowing outsiders ...

    Read More
  • What Is Certificate Management?

    When considering the importance of authentication security and establishing device trust to protect your network, it’s no wonder organizations are moving away from credentials in droves. A solution that many are turning to is replacing credentials with certificates for authentication. ...

    Read More
  • Can PKI Replace Passwords?

    There is a new trend that’s taking the IT world by storm: Passwordless Authentication. NordPass estimates that the average user has between 70 and 80 passwords. That’s why people so often reuse, share, or choose easy-to-remember passwords. While this may ...

    Read More