Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

MFA Options for Cyber Insurance Requirements

More cyber insurance providers require MFA. But why, and what other cyber insurance requirements should you prepare for?

Read More
Best Practices for Enrolling Users for WPA2-Enterprise

Wifi is essential in daily life and is critical for any business today. At home, we use a single static password to protect your wifi. This security is called WPA2-Personal. However, organizations are using a more advanced protocol called WPA2-Enterprise. ... Read More

Read More
FreeRADIUS vs. Jumpcloud

As technology progresses, hackers have constantly upgraded their modes of attack, which include social engineering techniques to compromise the network space of an organization. Here’s a recent incident of a high-profile data breach involving credentials compromise, which once again exposed ... Read More

Read More
Configuration Guide: Windows RADIUS Server 2012

Anytime there’s a discussion about a wired or wireless authentication, it’s probable that the word “RADIUS server” will come up sooner or later. RADIUS, also known as a “AAA server,” carries out the essential functions of Authentication, Accounting, and Authorization ... Read More

Read More
HIPAA Compliant Wireless 802.1X

The Health Insurance Portability and Accountability Act (HIPAA) has impacted the way healthcare organizations operate since its introduction in 1996. Its goal, ultimately, was to protect patient data by imposing requirements for how that data is accessed and maintained. Complying ... Read More

Read More
Azure AD Conditional Access with 802.1X

The post-pandemic world is witnessing an exponential surge in cloud-based network solutions as many businesses transition into digital mode. Interestingly, many cutting-edge wireless technologies like 5G, virtual reality, and AI are also changing the pattern of data consumption with each ... Read More

Read More
Device Authentication with User Attributes for Cloud Directories

When users and devices authenticate to your network, you should ideally have as much information from them as possible to make context-rich security decisions. Certificate-based authentication (CBA) empowers administrators to make those decisions by providing a detailed snapshot of each ... Read More

Read More
Auto-Enrolling Certificates in Jamf

Jamf customers experience a number of benefits by centralizing their device and authentication system under one roof. But Jamf doesn’t have the capability to handle the entire authentication process. An effective compromise is to combine Jamf with third-party solutions to ... Read More

Read More
Digital Signatures: Explained

An effective Zero Trust architecture is built on a foundation of identity context. Digital signatures support a Zero Trust initiative by cryptographically assuring the identity of the signee, answering questions such as: “How do you know if the person who ... Read More

Read More
[Solved] Okta Sign-in Error

Okta is one of the leading identity and authentication platforms compatible with both cloud and on-premise directories. They provide a great user experience and support, but you may still run into errors from time to time. These errors can provide ... Read More

Read More
Cloud 802.1x Explained

What Is Cloud 802.1x? An 802.1x network is unique in one major way; it uses a Cloud RADIUS server as a means of authenticating users. The Cloud RADIUS checks a user’s credentials to see if they are an active member ... Read More

Read More
What is Certificate Lifecycle Management?

Using X.509 digital certificates for authentication is an immediate and significant upgrade to credential (password) authentication, but it requires proper support infrastructure. Certificate Lifecycle Management systems (CLM/CLMS), also called Certificate Management Systems (CMS), provide that support. They allow admins to ... Read More

Read More