How to Choose a Managed Cloud PKI

Patrick Grubbs Education

How to Choose a Managed Cloud PKI

As cloud technology and reliability continue to surpass their on-premise counterparts, more than 50% of organizations have made the switch to managed cloud PKI or plan to soon. If your organization isn’t counted among that number yet, you’re missing out …

azure ad b2c

Use Azure AD B2C for 802.1x Authentication

Patrick Grubbs Education

Use Azure AD B2C for 802.1x Authentication

Microsoft employs a myriad of acronyms for their product names, so it’s often difficult to tell them apart or to guess their function. “Azure AD B2C” is one such product. It doesn’t have a very information-rich name; if you tried …

How to Use Google for 802.1x Wi-Fi

Kainoa Lee Education

How to Use Google for 802.1x Wi-Fi

Organizations are making the much-needed transition to cloud-based network solutions and Google is a forerunner in getting people’s devices and networks in the cloud. However, for some, getting your devices configured and ready for WPA2-Enterprise Wi-Fi can be tricky and …

802.1x Without Active Directory

Kainoa Lee Uncategorized

802.1x Without Active Directory

Many organizations are still having trouble moving away from Active Directory (AD). Microsoft AD has been included “free” with Windows server and Microsoft exchange, which created a dilemma for those who have decided to use them as an IDP.   …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Education

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense - they’ve been proven time and again to keep networks secure by protecting against over-the-air ...
image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Education

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure …