Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Equifax’s Story: The Risks of Lax Security

    Read More
  • Implementing SSL Inspection

    The proliferation of HTTPS websites has been a benefit and a challenge for network administrators. Overall, HTTPS enhances the overall security of websites because it encrypts the communications between the web server and client while HTTP sites do not. The ...

    Read More
  • Using a SCEP Gateway to Distribute Certificates to Managed Devices

    Efficiency is at the core of business technology, and requiring IT to manually onboard managed devices for secure network access significantly hinders progress. A solution to this inefficient process would be to automatically distribute network settings and a secure certificate ...

    Read More
  • Simplifying the Onboarding Process

    The most common questions we get in reference to onboarding new users aren’t related to using the software, but rather how to direct users to the software. SecureW2 has developed an intuitive process for users to self-configure their devices for ...

    Read More
  • Introducing an MDM Solution for SMBs

    A common trend for SMBs seen across many industries is opting into a MDM infrastructure to replace or supplement a BYOD policy. For many organizations, a MDM system offers a sense of security because the devices’ sole use is focus ...

    Read More
  • Demystifying Server Certificate Validation

    Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in ...

    Read More
  • Launching Certificate-Based Security Shouldn’t be Intimidating

    Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure ...

    Read More
  • Credential Theft Threats Facing SMBs

    Read More