Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Code Signing with Digital Certificates: Explained

Imagine you’re installing an application and a pop-up like the screenshot above comes up. How can you be sure that the application you’re about to download is really safe? The answer is code signing certificates, which attest that the software ... Read More

Read More
Intune vs. Workspace ONE: The Best MDM for Windows Devices

The technological advancements in the last decade have evolved the use of mobile devices such as smartphones and laptops in the corporate world. Before the pandemic, some organizations were skeptical about using these devices for official purposes, mainly due to ... Read More

Read More
Foxpass RADIUS vs. Jumpcloud RaaS

Network authentication has evolved in lockstep with the development of software over the years. The networking protocols considered secure just a few years back have not withstood the test of time. This has resulted in a massive spike in cases ... Read More

Read More
This Security Flaw is Preventing Organizations from Switching to Azure AD

The migration from on-premise to cloud-based network infrastructure is becoming more and more common. With better security, scalability, and user experience, the benefits of the cloud cannot be denied. For many Active Directory (AD) customers, this migration can cause issues ... Read More

Read More
Top 3 Tips for Enrolling Chromebooks with AD CS

There has been a huge increase in the use of wireless devices to connect to organization’s secure networks and it’s created a new security challenge for network admins. Securely connecting devices like Chromebooks required certain processes to ensure they are ... Read More

Read More
Cloud-Hosted LDAP is Vulnerable with Credentials

Organizations are always looking for a new strategy to increase the convenience of using their network without compromising security. As a result, many have sought out cloud solutions. Read here how a SecureW2 client transitioned to cloud-based networking and improved ... Read More

Read More
Can I Use Google Secure LDAP for Wi-Fi?

LDAP’s importance cannot be denied. As a protocol, it has greatly simplified the directory search process. Unfortunately, as time goes on, LDAP has begun to grow outdated, especially given its association with on-premise hardware and legacy systems. This is why ... Read More

Read More
Why a Managed PKI (MPKI) is Probably Right for You

If you’ve decided to make the move to secure certificate-based authentication, one of the first things you need to figure out is whether you’re going to build your own Public Key Infrastructure (PKI) or use a managed PKI (MPKI). PKIs, ... Read More

Read More
What Is Certificate Management?

When considering the importance of authentication security and establishing device trust to protect your network, it’s no wonder organizations are moving away from credentials in droves. A solution that many are turning to is replacing credentials with certificates for authentication. ... Read More

Read More
Can PKI Replace Passwords?

There is a new trend that’s taking the IT world by storm: Passwordless Authentication. NordPass estimates that the average user has between 70 and 80 passwords. That’s why people so often reuse, share, or choose easy-to-remember passwords. While this may ... Read More

Read More