Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

What Is RADIUS Certificate-Based Authentication?

As cyber security risks increase and secure access to network resources is required, organizations are adopting different authentication methods. RADIUS certificate-based authentication is one of those methods that increase the security level of the RADIUS protocol. 80% of breaches in ... Read More

Read More
4 Best Practices For Eduroam Deployment

Scholars and students often visit different campuses for internships, seminars, conferences, and other events. Accessing secure Wi-Fi at foreign campuses has always been a challenge for these individuals who require guest access or temporary credentials. Eduroam is the solution—an international ... Read More

Read More
How to Integrate with Entra ID For Effective Certificate Management

The transition from on-premise Active Directory (AD) to cloud-based Azure AD (Microsoft Entra ID) can be tricky, leaving Azure admins searching for an easy way to migrate. Unlike AD, there isn’t a straightforward solution for deploying 802.1x authentication on Azure ... Read More

Read More
How to Configure Dynamic VLAN for EAP-TLS

Researching and implementing new cybersecurity technologies is a vital aspect of maintaining an effective network for your organization. But transitioning to more up to date security measures often comes with growing pains. Ensuring the network operates smoothly to specifications can ... Read More

Read More
Benefits of Digital Certificates For Secure Eduroam Wi-Fi

Eduroam has become crucial for colleges worldwide, providing students and staff with seamless, cross-campus Wi-Fi connectivity. However, as more institutions use Eduroam as their principal Wi-Fi network, security and accessibility problems emerge, particularly for networks that use the Protected Extensible ... Read More

Read More
Certificate Lifetimes – Is 20 Years Too long?

Over the last few years, software makers have begun cracking down on certificates that do not expire soon enough. Most browsers will reject any SSL certificate with a lifetime longer than 39 months. This may seem like a long time, ... Read More

Read More
Can I Use OAuth 2 With ADFS?

What is ADFS? Active Directory Federation Service (ADFS) is a software component developed by Microsoft to provide Single Sign-On (SSO) authorization services to users on Windows Server Operating Systems. ADFS allows users across organizational boundaries to access applications on Windows ... Read More

Read More
Best EAP Method to Configure a Secure WiFi Network

Extensible Authentication Protocol (EAP) is a strong security layer and authentication framework used in Wi-Fi networks. It provides various methods to verify the identities of users and devices before granting access. These methods include wireless access using IEEE 802.1X, wired ... Read More

Read More
The Importance of Device Attestation for Zero Trust

Here, you can learn the concepts of device trust and cryptographic principles of attestation in ensuring security of your organization.

Read More
Adding a Trusted Root Certificate Authority to Group Policy Objects

Organizations that want the best in authentication security should look no further than certificate-based authentication. When compared to using credentials for authentication, it’s simply no contest. The two pillars supported by certificates are efficiency and security. A certificate-based network can ... Read More

Read More
PKI Smart Card Authentication for Enterprise

Companies and governments around the world are finding more and more uses for PKI smart cards – especially for identity management. These tiny chips can be found in a multitude of applications ranging from ID cards, credit/debit cards, SIM cards, ... Read More

Read More
Passwordless Magic Link Authentication: Explained

Want to know how magic links work? Read on to know more about magic links other passwordless authentication methods for network security.

Read More