Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Combining FIDO2 and PKI: Supporting All Your Applications

    The world of IT is constantly evolving. This is true due to both advancements in technology and the emerging remote work landscape of the world. Remote work is now commonplace with 90% of IT leaders seeing an increase in cyberattacks ...

    Read More
  • How to Create a PKI Certificate Authority

    What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates. A digital certificate certifies the ownership of a public key by tying it cryptographically to the subject it is administered to. Certificate authorities are ...

    Read More
  • What is a Hardware Security Module?

    More than ever, businesses and organizations have a responsibility to secure their data. Highly adaptable organizations have begun to implement a PKI as a means to upgrade network security. According to the 2019 Verizon Data Breach Investigations Report, 29% of ...

    Read More
  • The Security Risks of Pre-Shared Keys (PSKs)

    It’s no secret that pre-shared keys are insecure, especially compared to digital certificates. However, with many services being moved to the cloud, fewer and fewer resources are being stored in-network. Shared files aren’t stored on an intranet these days, they’re ...

    Read More
  • How to Address MAC Randomization for Cloud Networks

    Mac Address Randomization is an increasing trend among device manufacturers that are quickly becoming the industry standard. While it can help in reducing the risks of data breaches and spying on users’ connections, it does complicate the authentication process and ...

    Read More
  • Is Okta A RADIUS Server?

    A RADIUS server operates through connecting to a central database to inform who is allowed to connect to your network. It is a simple and easy-to-configure authentication solution that cannot be matched by other authentication setups. Implementing a RADIUS puts ...

    Read More
  • How to Deploy Okta Device Trust on Windows

    Device Trust is a concept in cybersecurity with a relatively simple premise; if a device can prove its identity, it can be trusted to have greater access to resources. If you know the source of a device and it’s postured ...

    Read More
  • (Solved) Android 11 Samsung “Deep Sleep” Wi-Fi Connectivity Issue

    Android devices have long had an “app sleep” feature designed to reduce power usage for infrequently used apps, and it’s not a new problem that it can cause apps to malfunction in one way or another. However, the Android 11 ...

    Read More
  • 5 Reasons AD CS Is Not A Complete PKI

    Credential-based authentication is the most common form of authentication that everyone is accustomed to. But with most decades-old technologies, credentials are woefully ill-equipped to face modern security threats. While multi-factor authentication (MFA) methods can be used to boost the viability ...

    Read More