Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Everything You Need to Know About PEAP Security

Since most transactions and communication are done over networks today, the security of these networks can’t be overlooked. Securing your network connections has never been more critical, as the data traversing these networks is often sensitive and personal. The Protected ... Read More

Read More
A Security Analysis of WPA-Personal

In the continuous effort to strengthen wireless network security, Wi-Fi Protected Access (WPA) represents a significant turning point. Data transmission over airwaves is becoming increasingly common in the ever-expanding digital connection landscape, making transmission security critical. WPA was created in ... Read More

Read More
MobileIron vs MEM Intune: Top MDMs Compared

Mobile devices like phones, tablets, and laptops are being used for work more than ever, especially after the COVID-19 pandemic. Remote work and hybrid workplaces are the new normal, making mobile devices ubiquitous in enterprise settings. Mobile devices improve employee ... Read More

Read More
What is the Trusted Root Certification Authorities Store?

A Certificate Authority (CA) is the entity that handles the certificate distribution for a PKI. Certificate Authorities assist in validating the identities of different websites, individuals, and devices by providing a trusted source for certificates. Certificate authorities are a key ... Read More

Read More
Does Rotating Preshared Keys Improve Security?

Wifi Protected Access 2 – Pre-Shared Key (WPA2-PSK), a wireless security standard from 2004, is still used by many organizations today. And although it’s safer than its predecessors, WPA2-PSK relies on pre-shared keys (PSKs), which use a shared password or ... Read More

Read More
Designing a Zero Trust 802.1x Network

As hackers get more sophisticated and hands-on, network security strategies have to adapt to meet the new challenge. An old idea that has recently been given new life is the concept of zero trust networks. This article will briefly discuss ... Read More

Read More
OCSP vs CRL: The Best Bet To Revoke Certificates In A PKI

OCSP support is not included in the current roadmap of SecureW2 for some key reasons. Here’s a brief overview of your options for certificate revocation: OCSP stands for Online Certificate Standard Protocol. It’s a protocol described in RFC 6960 that ... Read More

Read More
Passwords vs. Digital Certificates For RADIUS Authentication

Businesses understand the importance of passwords for private data security but might not realize that using a network with passwords poses many security threats. As hacking techniques become more advanced, data is stolen at a rate of almost 6 million ... Read More

Read More
Deploy Yubikeys For Secure Wi-Fi in WPA2-Enterprise Network

Security keys are useful tools for hardening your devices with an additional factor of authentication. Did you know that same protection can be extended to your network? SecureW2, a Yubico Partner, has developed an industry-first software solution that allows you ... Read More

Read More
A Guide To Client Certificate Mapping In Active Directory

Certificate mapping, in a general sense, refers to the tying of an identity to an X.509 digital certificate. In practice, the term is mostly used in the context of Microsoft’s “client certificate mapping” feature, wherein a client’s Active Directory identity ... Read More

Read More