Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

LDAP vs SAML, Access Protocol Comparison

LDAP and SAML are major authentication protocols that securely authenticate users to a network. They determine how users interact with a resource by connecting them to the respective directory services, like an on-premise or a cloud-based directory. The Lightweight Directory ... Read More

Read More
AD DS: Explained

The purpose of online directories is to store resources on the network in a way that it’s simple to access. Microsoft’s Active Directory (AD) has risen through the ranks to become the top online directory in the software industry. What ... Read More

Read More
Can I Use NPS with Cloud Directories?

The RADIUS protocol is used by thousands of organizations to protect their networks. Network admins set up RADIUS servers to verify approved network users, drastically reducing the risk of a compromised network. RADIUS can be configured to authenticate access to ... Read More

Read More
YubiKey PIN/PUK Configuration at Scale

Yubikeys are an all-in-one MFA device. In addition to serving as a physical authentication token, they can generate one-time-passwords (OTP) and require users to input a PIN.  It’s quite difficult to enable all of these methods of authentication and have ... Read More

Read More
Strong Network Security with Azure

Azure AD is a highly effective IDP that was built as a successor to Active Directory (AD) to accommodate newer, cloud-centric organizations. AD does not work natively in the cloud, so Azure is an effective solution for many organizations looking ... Read More

Read More
Enhanced Azure Authentication with Yubikey

The cross section of organizations that use Azure AD (Microsoft Entra ID) for identity management and Yubikeys for MFA is already sizable and growing by the day. Recent advancements in authentication security technology has expanded the versatility of Yubikeys, allowing ... Read More

Read More
Secure Authentication for Azure Networks

Wireless security is crucial now that most sensitive data can be accessed online. It’s imperative for network administrators to dictate who can access the network and how much they’re allowed to access. Organizations need a system that authenticates users to ... Read More

Read More
Use Azure AD B2C for 802.1x Authentication

Microsoft employs a myriad of acronyms for their product names, so it’s often difficult to tell them apart or to guess their function. “Azure AD (Microsoft Entra ID) B2C” is one such product. It doesn’t have a very information-rich name; ... Read More

Read More
What Is RADIUS Redundancy?

In all manner of security, redundancy is strength. It’s a way to ensure that no matter what goes wrong, there is a backup plan in action that can certify safety. Network security is no different; a properly redundant RADIUS server ... Read More

Read More
Multi-Factor Authentication for Okta VPN

When it comes to authentication security, one of the simplest upgrades you can make that will drastically improve your network’s safety is to implement Multi-Factor Authentication (MFA). Simply put, MFA is any security system that requires multiple forms of identification ... Read More

Read More