Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Best Practices for AD CS Configuration

    Many companies use Windows servers as the main component of their IT infrastructures. If those companies want to use digital certificates for their network, they set up a public key infrastructure (PKI). PKIs deploy and manage certificates, which can be ...

    Read More
  • Stronger Multi-Factor Authentication With Certificates

    It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. According to IBM’s X-Force Threat Intelligence Index, 35% of exploitation activity involves Man-in-the-Middle Attacks which easily bypass ...

    Read More
  • Digital Certificates vs Password Authentication

    Read More
  • Using a Yubikey to Access Wi-Fi on WPA2-Enterprise

    Security keys are useful tools for hardening your devices with an additional factor of authentication. Did you know that same protection can be extended to your network? SecureW2, a Yubico Partner, has developed an industry-first software solution that allows you ...

    Read More
  • Certificate-Based Authentication for Okta PIV Cards

    Efficiency is the name of the game when operating a wireless network. Designing every facet of the network with the user experience in mind will result in a streamlined system that works well for all that require access. A wrench ...

    Read More
  • Don’t Use PEAP Credentials for eduroam Authentication

    Eduroam has quickly become the standard for 802.1X implementation among top-tier universities, allowing students and staff to access remote campus wifi networks using their home university credentials. Increasingly, many universities choose to use eduroam as their sole SSID. However, this also means ...

    Read More
  • What is Public Key Cryptography?

    Public key cryptography, a synonym for asymmetric cryptography, is a clever cryptographic system that allows two parties to exchange encrypted information publicly without worry of interception. Many cryptographic systems are symmetric. Two or more parties share a private key, then ...

    Read More
  • How to Configure WPA2-Enterprise and 802.1x on Each Operating System

    Read More
  • Configuring Yubikey Desktop Login on Jamf-Managed Devices

    Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer of physical security. They’re commonly used to securely ...

    Read More
  • Public vs Private Certificate Authority

    What’s a Certificate Authority (CA)? A certificate authority is an institution that distributes digital certificates. Certificate issuance is a critical part of securing interactions on the internet because certificates cryptographically tie an identity to a public key. Certificates are commonly ...

    Read More