Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

EAP-TLS Explained: How It Works and Why It’s Secure

Extensible Authentication Protocol–Transport Layer Security (EAP-TLS) is an IETF open standard defined in RFC 5216. More colloquially, EAP-TLS is the authentication protocol most commonly deployed on WPA2-Enterprise networks to enable the use of X.509 digital certificates for authentication. EAP-TLS is ... Read More

Read More
RADIUS Events Logs: How to View and Access Them

RADIUS servers are often called AAA (authentication, authorization and accounting) servers because they perform each of those three functions. Accounting – which refers to the process of tracking events as they occur – is something a RADIUS server achieves by ... Read More

Read More
A Complete Guide to Configuring RADIUS on Windows 2019

The term “RADIUS server” will probably be mentioned at some point in any conversation regarding wired or wireless authentication. Within a WPA-2 Enterprise network, RADIUS (also referred to as a “AAA server“), performs the crucial tasks of Authentication, Accounting, and ... Read More

Read More
Understanding Mutual TLS (MTLS) Authentication: How It Works

Mutual TLS, or mTLS, is a trending talk of the town, especially regarding cryptographic encryption in general.  Since you’re here, there’s a good chance you’re concerned about the network at your business’s security and want to look into more robust ... Read More

Read More
A Complete Guide to Configuring Microsoft RADIUS Server

Need a solution for your network authentication, authorization, and accounting (AAA) requirements? RADIUS has been around for decades, used by thousands of organizations. Without a RADIUS server, authentication would have to occur at the access point (this would require some ... Read More

Read More
Network Segmentation Best Practices

VLANs are a great way to increase security because they reduce the risk of threats spreading throughout the network. A threat can quickly move around the network if users/devices are not segmented adequately, which can cause serious harm. This article ... Read More

Read More
Smart Card Authentication with Active Directory

Chances are, your work requires you to have logins and passwords for multiple resources. On top of that, you probably have to update your password regularly, ensuring that each new password is compliant with rigorous security standards. Now, repeat this ... Read More

Read More
How to Build and Set Up Your Own PKI

A Managed Public Key Infrastructure (PKI) is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s much more secure and widely-applicable than passwords. Configuring a PKI ... Read More

Read More
802.1X EAP-TLS Authentication Flow Explained

For many organizations, the IEEE 802.1X authentication mechanism for Port-Based Network Access Control is the first line of defense against outside attack. It’s also one of the most commonly targeted attack vectors, which makes it a security priority. One of ... Read More

Read More
Server Certificate Validation with Android 12 Devices

Cyber-attacks have grown stronger over the years and are able to easily bypass the rudimentary security standards provided by the username/password mechanism. If an organization relies on passwords for network authentication, attacks can infiltrate the network with little to no ... Read More

Read More
WPA3: The Ultimate Guide

The network type Wi-Fi Protected Access (WPA) has been upgraded once since its inception in 1999. In 2004, it was replaced by WPA2, which has stood as the standard for highly secure wireless networks ever since. To say that the ... Read More

Read More
Android 11 Server Certificate Validation Error and Solution

*Updated Feb 2021 The dust has settled on the Dec 2020 Android 11 update and, for better or worse, the effects on network authentication have not been as drastic as predicted. It appears that the requirement for server certificate validation ... Read More

Read More