Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • How to Secure 802.1X for Remote Workers

    Though remote work wasn’t started by the Covid-19 pandemic, it has increased drastically to the point that working from home will be commonplace for many workers. Unfortunately that leaves organizations needing to figure out how to securely connect remote workers ...

    Read More
  • What is Always On VPN?

    The rise in remote working has steadily increased with new innovations in technology, but has seen a massive increase since the Covid-19 pandemic. Companies the world over have sent their workers home, however, enabling remote workers to securely access company ...

    Read More
  • AD CS: Migrate from SHA1 to SHA2 (SHA256)

    It’s imperative for organizations to fully switch from SHA-1 to SHA-2. The National Institute of Standards and Technology (NIST) stated SHA-1 should not be trusted, PCI Compliance scanners no longer accept SHA-1 certificates, and Google has deprecated the SHA-1 algorithm. ...

    Read More
  • How to Fix the “X.509 Certificate Signed by Unknown Authority” Error Code

    X.509 digital certificates are a fantastically secure method of authentication, but they require a little more infrastructure to support than your typical username and password credentials. A frequent error encountered by users attempting to configure and install their own certificates ...

    Read More
  • How To Properly Delete a Certificate Authority

    Securing communications via digital certificates is among the most secure processes used by organizations today. The use of public key cryptography makes certificates uncrackable and can be used to protect countless network operations. Of course, any network that is not ...

    Read More
  • What is OpenXPKI?

    Deploying digital certificates for internal and external use is a growing trend throughout countless industries. Of course, as more people convert to using certificates, they find that using the proper tools to back them up is just as important as ...

    Read More
  • The Best Private CA / PKI Service

    The use of certificates for network security is rapidly increasing due to their superiority over all other authentication methods. They’re incredibly versatile and can enable authentication customization that far surpasses what is possible with credentials like passwords. Of course, certificates ...

    Read More
  • What is a AWS Private CA?

    Private certificate authorities (CA), also known as enterprise CAs, are CAs specifically meant for internal use. They are self-hosted and therefore not trusted externally. The usual use cases come from larger organizations or universities that need secure communication for their ...

    Read More
  • 802.1X Network Attack Vectors

    When used correctly, 802.1X authentication is the gold standard for network security. However, even seasoned IT professionals fail to recognize some key points of attack. If they are left unchecked, they can lead to an 802.1X network vulnerability. With 95% ...

    Read More
  • What is PIV (Personal Identity Verification)?

    Personal Identity Verification (PIV) is a security standard detailed in NIST FIPS 201-2 that creates a framework for multi-factor authentication (MFA) on a smartcard. While PIV was originally designed for the US government, it has seen widespread use in commercial ...

    Read More