Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Comparing: OAuth, OpenID Connect, and SAML

Properly protecting a network requires administrators to make numerous decisions about their security. Knowing what protocol or system to implement at what stage is paramount to network safety. With Cybercrime being the most prevalent crime in the US, with a ... Read More

Read More
OAuth Vs. OpenID? Which is better?

Authorization and authentication processes need to be more solid and safe than ever. OAuth and OpenID are two well-known names in this field. Before we get into the OAuth vs. OpenID debate, it’s essential to know what OAuth and OpenID ... Read More

Read More
Using Object Identifiers In PKI Management

Management of a PKI can be a full-time task for an IT team. Ensuring network users are able to authenticate to a secure network, easily maintaining their network identity, providing access to resources they need, and protecting everyone from a ... Read More

Read More
Configuring MFA with AD FS

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploitable by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) to provide an extra layer of protection. Each ... Read More

Read More
Tying IP Addresses to Azure Active Directory Users

Effectively tracking and managing identity context is one of the most important aspects of a secure Azure-based network. Without accurate identity context, it’s near impossible to determine if someone is an unauthorized user.

Read More
Everything You Need to Know About FIDO2

Security Keys are a method of authentication that is becoming increasingly more commonplace due to the additional layer of security they provide. They are a versatile security component that can be used to log in to Wi-Fi, desktops, websites, and ... Read More

Read More
I Have Active Directory, How do I Move to the Cloud?

It’s no secret that organizations are making the transition to cloud-based network environments. This is especially true considering the dramatic increase in remote work due to the global pandemic. Network administrators that use Active Directory (AD) want to be able ... Read More

Read More
What is the Android Trusted Credentials Store?

Similar to Windows and macOS, Android devices need a system in place in order to determine if a certificate issued by a particular Certificate Authority (CA) is trusted. How does a device decide that a certificate is trusted? When a ... Read More

Read More
MacOS Smart Card Services

Smart Card usage has been on the rise for a variety of different reasons, but undoubtedly the most prominent is for their identity management capabilities. Cybersecurity-oriented organizations are taking advantage of smart cards through the use of physical security tokens, ... Read More

Read More
Zero Trust Strategy Best Practices With AD CS

Zero trust is a burgeoning security practice among cybersecurity-focused organizations. The main concept behind zero trust is limiting a user’s resources to only what they need access to. For example, a manufacturer implementing zero trust would ensure that their floor ... Read More

Read More