Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Can I Use Passpoint with Microsoft Azure?

The best way to ensure roaming internet access for employees is by deploying Passpoint. Whether you just need to be covered across campus or want to extend your network to nearby partners, Passpoint allows you to stay seamlessly switch between ... Read More

Read More
The Best Way to Manage Microsoft Certificates

A primary weakness of password-based authentication is the human element. Passwords can be forgotten, shared, or stolen, making them a nightmare for IT admins. Forgotten passwords can lead to service interruptions and a pile-up of support tickets. Stolen passwords can ... Read More

Read More
Can I Use Passpoint with Google Workspace

Passpoint is the premier tool for ensuring your users have network access while roaming, but it can be a little difficult to deploy. Fortunately, SecureW2 has a solution that integrates into your existing infrastructure to allow you to utilize Passpoint ... Read More

Read More
Can I Use The Okta RADIUS Agent For My Wi-Fi?

An Okta RADIUS server agent is a lightweight program that runs as a service outside of Okta. It is usually installed outside of a firewall which gives Okta a route to communicate between an on-premise server and Okta’s cloud network. ... Read More

Read More
Top 3 Mistakes Setting Up AD CS Certificate Templates

In order to use certificates for authentication, a security trend caused by the inadequacies of password-based authentication, a public key infrastructure (PKI) must be in place. Active Directory Certificates Services (AD CS) is Microsoft’s on-premise PKI solution and while it ... Read More

Read More
Creating Private Certificates Authorities for Internal Use

What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates to devices. These certificates cryptographically tie an identity to a public key, ensuring that individuals online are who they say they are. Certificate authorities ... Read More

Read More
List of Passpoint-Supported Operating Systems

Passpoint is a great tool to enable your network users to have continued access to the internet – whether they’re roaming around the city or moving from building to building on campus. Passpoint has support for most every operating system ... Read More

Read More
Passpoint r1 & r2 Compared

Enabling an online connection while users are away from their home networks has been a challenge for those that want a complete and efficient system. The use of mobile data is too expensive overtime, and the restrictions of hotspots limits ... Read More

Read More
Yubikey Certificate Attestation Improved

Cyber security is ever-evolving to counter the attacks that are getting more aggressive by the day. One-step authentication is no longer enough to establish identity with absolute certainty. 2FA (two-factor authentication) or MFA (Multi-factor-authentication) are becoming more frequently used for ... Read More

Read More
Enterprise PKI Management in the Cloud

As the importance of secure authentication continues to rise, many organizations are looking for lightweight, cost-efficient solutions to their cybersecurity concerns. This has caused many to question the efficacy of credential-based authentication and has sparked interest in certificate-based authentication. But ... Read More

Read More
3 Security Advantages of a Cloud RADIUS Server

In order to successfully configure a WPA2-Enterprise network you must have a RADIUS server. The RADIUS authorizes and authenticates users signing into the network and eliminates any speculation into who is using your network. A properly configured Cloud RADIUS can ... Read More

Read More
Why ECC is the Solution for IoT Security

ECC, or Eliptical Curve Cryptography, isn’t a new technology – it’s relatively old, actually, Despite being around since 1985, it has just recently begun to gain popularity as an alternative, possibly superior, form of public key cryptography. So what’s the ... Read More

Read More