Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Securing VPN Authentication with RADIUS & MFA

Due to the Covid-19 pandemic, organizations all over the world have closed their offices and sent their employees home to work remotely. The mass exodus from the office to remote working has caused a rise in VPN use; influencing the ... Read More

Read More
Top 3 Cyber Security Concerns for MSPs

  Managed service providers (MSPs) have been the focal point of a series of attacks that are starting to draw attention from the public. A study conducted by Vanson Bourne surveyed 200 MSPs across the United States and found that ... Read More

Read More
What is a TPM?

A TPM, also known as a Trusted Platform Module, is an international standard for a secure cryptoprocessor and is a chip found on the computer’s motherboard. The function of a TPM is to generate encryption keys and keep a part ... Read More

Read More
How to Choose a Managed Cloud PKI

As cloud technology and reliability continue to surpass their on-premise counterparts, more than 50% of organizations have made the switch to managed cloud PKI or plan to soon. If your organization isn’t counted among that number yet, you’re missing out ... Read More

Read More
Active Directory: Explained

Directory servers make it easy for admins to store and access resources including user and device information, computers, files, server, and much more. Back in the old days, in order to look up a file, a user needed to know ... Read More

Read More
A Passpoint Solution for MAC Randomization

Although MAC Randomization has been around for a few years, it has really grown in popularity with the beta version of Apple iOS 14 update because it’s a default enabled setting. MAC Randomization could be a revolutionary step for user ... Read More

Read More
Okta Smartcard Authentication Expanded

Okta is a popular choice for organizations that want top-of-the-line cloud identity management. It’s one of the largest identity providers with a modern cloud directory and a plethora of handy features and useful integrations. Okta services can be combined with ... Read More

Read More
LDAP vs SAML, Access Protocol Comparison

LDAP and SAML are major authentication protocols that securely authenticate users to a network. They determine how users interact with a resource by connecting them to the respective directory services, like an on-premise or a cloud-based directory. The Lightweight Directory ... Read More

Read More
AD DS: Explained

The purpose of online directories is to store resources on the network in a way that it’s simple to access. Microsoft’s Active Directory (AD) has risen through the ranks to become the top online directory in the software industry. What ... Read More

Read More
Can I Use NPS with Cloud Directories?

The RADIUS protocol is used by thousands of organizations to protect their networks. Network admins set up RADIUS servers to verify approved network users, drastically reducing the risk of a compromised network. RADIUS can be configured to authenticate access to ... Read More

Read More
YubiKey PIN/PUK Configuration at Scale

Yubikeys are an all-in-one MFA device. In addition to serving as a physical authentication token, they can generate one-time-passwords (OTP) and require users to input a PIN.  It’s quite difficult to enable all of these methods of authentication and have ... Read More

Read More
Strong Network Security with Azure

Azure AD is a highly effective IDP that was built as a successor to Active Directory (AD) to accommodate newer, cloud-centric organizations. AD does not work natively in the cloud, so Azure is an effective solution for many organizations looking ... Read More

Read More