Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • LDAP Injection Attacks: Explained

    LDAP, also known as Lightweight Directory Access Protocol, is an essential utility in network settings that facilitates getting hold of data about organizations, individuals, and resources. LDAP is commonly used for centralized authentication, providing an efficient method for validating users ...

    Read More
  • Wi-Fi Onboarding Captive Portal Best Practices

    Accessing Wi-Fi networks easily and remotely has become a critical interaction point between organizations and their remotely located users. The captive portal is at the center of this process. It is a doorway that not only gives people access to ...

    Read More
  • What is a PKI (Public Key Infrastructure)? | 2023 Update

    The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to cybersecurity. It enables passwordless authentication, encrypted communication, and it has been listed by organizations such as CISA, NSA, and NIST as a foundational piece of ...

    Read More
  • Windows Defender Credential Guard and PEAP MS-CHAPv2

    In today’s evolving world of cybersecurity, protecting data and user credentials is of utmost importance as it is the biggest threat to an organization’s security. Microsoft has implemented two security features to address this concern: Windows Defender Credential Guard and ...

    Read More
  • Simple Certificate Enrollment Protocol (SCEP): Explained

    Table of Contents What is SCEP? Components of SCEP Gateway SCEP Gateway API URL SCEP Shared Secret SCEP Certificate Request SCEP Signing Certificate SCEP Device Enrollment Process How to Configure SCEP Building the SCEP Gateway Configuring SCEP in Your MDM ...

    Read More
  • Network-as-a-Service (NaaS): Explained

    NaaS, or Network as a Service, is a cloud-based networking model that modifies how businesses handle and use their networks. Instead of having a lot of network equipment on-site, you can subscribe to network services on a pay-as-you-go basis. NaaS ...

    Read More
  • Why You Shouldn’t Use NPS with Azure AD(Microsoft Entra ID)

    Since cloud-based solutions are becoming the norm today, knowing how different identity and access management tools work together and what they do is important. This article details Microsoft NPS (Network Policy Server) and Azure AD (Entra ID), two infrastructure elements ...

    Read More
  • How to Manage Certificates with Google Workspace

    Google Workspace is one of the most common Identity Providers used by enterprises today. The Google ecosystem includes a number of easy tools organizations can use in their daily operation, including user-friendly devices like Chromebooks. Many organizations with a Google ...

    Read More