Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Enhanced Azure Authentication with Yubikey

The cross section of organizations that use Azure AD (Microsoft Entra ID) for identity management and Yubikeys for MFA is already sizable and growing by the day. Recent advancements in authentication security technology has expanded the versatility of Yubikeys, allowing ... Read More

Read More
Secure Authentication for Azure Networks

Wireless security is crucial now that most sensitive data can be accessed online. It’s imperative for network administrators to dictate who can access the network and how much they’re allowed to access. Organizations need a system that authenticates users to ... Read More

Read More
Use Azure AD B2C for 802.1x Authentication

Microsoft employs a myriad of acronyms for their product names, so it’s often difficult to tell them apart or to guess their function. “Azure AD (Microsoft Entra ID) B2C” is one such product. It doesn’t have a very information-rich name; ... Read More

Read More
What Is RADIUS Redundancy?

In all manner of security, redundancy is strength. It’s a way to ensure that no matter what goes wrong, there is a backup plan in action that can certify safety. Network security is no different; a properly redundant RADIUS server ... Read More

Read More
Multi-Factor Authentication for Okta VPN

When it comes to authentication security, one of the simplest upgrades you can make that will drastically improve your network’s safety is to implement Multi-Factor Authentication (MFA). Simply put, MFA is any security system that requires multiple forms of identification ... Read More

Read More
How to Use VPN With Azure AD

As cloud-based solutions are gaining popularity, many organizations are having trouble transitioning to their on-prem servers. To help alleviate some stress, Microsoft created Azure AD (Microsoft Entra ID) to aid clients in moving their AD instance to the cloud. However, ... Read More

Read More
Okta SSO With Certificate Authentication

A major issue that organizations face for authentication is managing different credentials for various web applications. Traditionally, web app authentication requires a unique and complex set of credentials to ensure only those with approved access can log in. However, this ... Read More

Read More
Okta Vs. LDAP

For many years, LDAP has been the dominant protocol for secure user authentication for on-premise directories. Organizations have used LDAP to store and retrieve data from directory services and it is a critical part of the Active Directory (AD) ecosystem. ... Read More

Read More
User Lookup With Certificate-Based Authentication

Traditionally, the process of authenticating certificates for network access is independent of the user directory. And in a normally-functioning network environment, this is perfectly acceptable. Certificate-based authentication is ironclad and protects the network from unauthorized entry. Only in very rare, ... Read More

Read More
Dynamic RADIUS Policy Enforcement with Static Certificates

Certificate-based WPA2-Enterprise networks are extremely secure, but x.509 digital certificates can be a hassle to manage. Although SecureW2 has one of the best certificate management platforms in the industry, we’re always looking for ways to make EAP-TLS authentication safer and ... Read More

Read More
A Cloud PKI Solution for Azure AD

Azure AD (Microsoft Entra ID) customers can ditch password-based authentication and switch to x.509 certificate-based authentication. Digital certificates offer vast improvements to network security, efficiency, and user experience. But in order to deploy certificates, organizations will need to implement a ... Read More

Read More
Active Directory Vs. LDAP

Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) are two terms frequently used regarding directory services. These solutions are essential frameworks for managing user identities, resources, and network configurations in an IT infrastructure. While LDAP is a standardized protocol ... Read More

Read More