Tag: BYOD Onboarding

Step-by-Step Guide: Configure Passpoint/OpenRoaming on Android
Wi-Fi & Wired Security October 13, 2024
Configuring Passpoint/OpenRoaming on Android

For individuals who possess an Android mobile device, the significance of Wi-Fi connectivity to their gadget is widely recognized. In addition to cost savings, utilizing this method yields faster data...

Here's All That You Need To Know About Easy, Secure Onboarding for BYODs.
BYOD Onboarding September 20, 2024
What to Expect When You’re Adopting the JoinNow Platform for BYODs

If we were to define our platform briefly, we’d say that SecureW2 makes it easier to transition to passwordless security by providing an easy Public Key Infrastructure (PKI) and RADIUS...

CNA Secures Access. A Reliable Onboarding Solution Makes It Seamless”
Wi-Fi & Wired Security August 29, 2024
What Is Apple Captive Network Assistant?

Maintaining a safe connection is of the utmost importance in the hyper-connected world we live in today, where we use the internet for almost everything. Yet, the security of public...

Segregate Student From Staff Network To Protect Your Data From Unauthorized Access.
Higher Education August 6, 2024
Using VLANS to Keep Students off the Staff Network

Keeping your students off the staff network is among the daily challenges IT administrators face monitoring their domain. Especially as we continue to integrate technology with education, many institutions are...

Stop Sharing Passwords. Secure School Wi-Fi.
BYOD Onboarding June 27, 2023
Student BYOD Wi-Fi Security Solutions

It wasn’t too long ago that accessing a school network meant logging onto a stationary desktop in a computer lab. In today’s IT environment, however, more and more devices are...

Unmanaged devices are a risk. Device Trust fixes it.
Integrations July 12, 2021
How to Deploy Okta Device Trust on Windows

Device Trust is a concept in cybersecurity with a relatively simple premise; if a device can prove its identity, it can be trusted to have greater access to resources. If...

Private keys verified, trust simplified.
Protocols & Standards March 26, 2021
Private Key Attestation on macOS

Key attestation is a necessary part of creating valid X.509 digital certificates. Asymmetric cryptography requires that the client be able to prove its identity by attesting to the secure creation...

Smart Wi-Fi security for modern classrooms.
K-12 Schools March 24, 2021
Setting up Secure BYOD Wi-Fi for K-12 Students

The days of getting in trouble for bringing technology into class are long gone. Many school districts actually rely on students to bring their own devices in order to incorporate...

Streamline certificate issuance using AD CS automation.
Protocols & Standards December 9, 2020
How to Auto-Enroll Certificates from AD CS

Active Directory Certificate Services (AD CS) is a Windows server software solution designed to issue x.509 digital certificates. Certificates have proven to be more secure and easier to use than...

GPO-driven PKI makes certificate management effortless.
PKI/Certificates November 24, 2020
PKI for Microsoft GPO

Microsoft’s Group Policy Object (GPO) is a useful tool to allow administrators to control the level of access for users on the network. In addition to providing strong security from...

From legacy systems to future-ready solutions.
Thought Leadership November 4, 2020
Problems Facing IT Departments

No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find...

Tamper-Proof Security at the Chip Level
Protocols & Standards October 20, 2020
What is a TPM?

A TPM, also known as a Trusted Platform Module, is an international standard for a secure cryptoprocessor and is a chip found on the computer’s motherboard. The function of a...

802.11u: Pre-Connect Intelligence Beats Spoofing
Wi-Fi & Wired Security July 7, 2020
Mobile Authentication with 802.11u

As mobile device users continue to expect stronger roaming connections and faster data speeds, Wi-Fi Alliance developed PassPoint to meet these high standards. It allows users to easily transfer from...

Manage YubiKeys at Scale with Integrated SCMS
PKI/Certificates June 29, 2020
YubiKey PIV Certificate Management

Many organizations purchase security keys like the YubiKey to streamline and secure access to various applications, but they can be used for much more. The YubiKey in particular has the...

Secure BYOD, ChromeBooks & IoT with Sectigo Certs
Integrations June 8, 2020
How to Issue Sectigo Certificates

Sectigo, formerly known as Comodo, is a leading provider of digital identity solutions. One of their main products are SSL/TLS certificates and Public Key Infrastructures (PKI), which allows the client...

IoT and BYOD Secured with DigiCert Certs
Integrations June 8, 2020
How to Issue Digicert Certificates to Devices

Digicert offers a variety of SSL certificates to accommodate any organizational structure and fulfill their specific needs. They supply you with the tools to configure any Platform/OS combination, giving the...

Cloud PKI: Scalable Security Without the Server Hassle
PKI/Certificates May 22, 2020
Configuring a PKI for Wi-Fi

Wi-Fi security and availability is imperative for businesses now that online communication is the standard. Many organizations use passwords to authenticate user devices, but that is no longer a viable...

Zero-Touch Enrollment for Passpoint with G-Suite
Integrations May 7, 2020
Can I Use Passpoint with Google Workspace

Passpoint is the premier tool for ensuring your users have network access while roaming, but it can be a little difficult to deploy. Fortunately, SecureW2 has a solution that integrates...

Discover which operating systems support Passpoint Wi-Fi
Wi-Fi & Wired Security April 28, 2020
List of Passpoint-Supported Operating Systems

Passpoint is a great tool to enable your network users to have continued access to the internet – whether they’re roaming around the city or moving from building to building...

Policy-Driven Attestation: Secure Access Automatically
Endpoint & Device Management April 15, 2020
Yubikey Certificate Attestation Improved

Cyber security is ever-evolving to counter the attacks that are getting more aggressive by the day. One-step authentication is no longer enough to establish identity with absolute certainty. 2FA (two-factor...

Automation > Human Error in BYOD Onboarding
BYOD Onboarding April 1, 2020
3 Best Practices for Onboarding BYODs

Bring Your Own Device (BYOD) systems can be an amazing tool for businesses or schools looking to increase productivity and reduce cost. According to a study by Forbes, 42 percent...

SHA-1 Is Broken—It’s Time to Upgrade
Protocols & Standards March 23, 2020
It’s Time For SHA-1 Hash To End

SHA-1 is a commonly used cryptographic hash algorithm that has been used for nearly 2 decades to secure online communications. It was originally designed for government use, but an exploit...

Healthy Teams ➝ Stronger Defenses
Thought Leadership March 16, 2020
Combating Burnout in Cybersecurity

Cybersecurity professionals are highly sought-after individuals that add an immense amount of value to an organization, but that value can be difficult to pin down in terms of dollars. As...

Stop Settling: PEAP-MSCHAPv2 Falls Short
Higher Education February 12, 2020
Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from...

Don’t Wait for Credential Theft to Hit
Higher Education February 4, 2020
3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Over the past decade, we’ve helped hundreds of organizations around the world secure and set up WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many...

Certificate Automation Across All Devices
Integrations January 9, 2020
Best Practices for AD CS Configuration

Many companies use Windows servers as the main component of their IT infrastructures. If those companies want to use digital certificates for their network, they set up a public key...

Make BYOD safe and simple—ditch manual setup and embrace certificate-based, self-service onboarding.
BYOD Onboarding October 3, 2019
How To Avoid BYOD Onboarding Issues

In today’s mobile era, consumers are no longer chained to a bulky desktop in a cubicle or classroom. They are doing business, taking classes, and accessing resources on the go...

Higher Ed can cut Wi-Fi headaches by moving from passwords to effortless, certificate-based device onboarding
BYOD Onboarding May 22, 2019
Efficient Device Onboarding for Higher Education

An important first task for incoming students is to connect to the secure network they will use for all their on-campus studies. If the process is less than smooth, the...

SSL inspection strengthens security by decrypting traffic, blocking threats, and requires certificates that are easy to deploy at scale.
BYOD Onboarding April 2, 2019
Implementing SSL Inspection

The proliferation of HTTPS websites has been a benefit and a challenge for network administrators. Overall, HTTPS enhances the overall security of websites because it encrypts the communications between the...

Make Wi-Fi onboarding effortless with self-service setup, simple URLs, and certificate-based access
BYOD Onboarding Uncategorized January 4, 2019
Simplifying the Onboarding Process

The most common questions we get in reference to onboarding new users aren’t related to using the software, but rather how to direct users to the software. SecureW2 has developed...