Tag: certificate authentication

Keep trusted devices on your network.
PKI/Certificates June 3, 2025
Can Continuous Authentication Help Enforce Policy-Based Access with Certificates?

Modern hybrid networks comprise a mix of both managed and unmanaged devices. With static one-time authentication being inadequate, users and devices are only authenticated at the start of a session,...

802.1X + Intune = Wi-Fi security without passwords.
Protocols & Standards October 28, 2024
A Complete Guide to Intune 802.1x

The 802.1X standard provides secure authentication for users and devices looking to connect to wired and wireless networks. It uses an authentication server known as the RADIUS server that validates...

Control And Monitor Data Effectively With RADIUS Accounting Practices.
Protocols & Standards August 29, 2024
RADIUS Accounting Best Practices

RADIUS is a crucial networking protocol best known for centralized authentication, authorization, and accounting (AAA) administration. The final “A” in AAA signifies accounting, a fundamental aspect of network management. Network...

Here Are Some Tips To Enhance AAA Server Security.
RADIUS August 29, 2024
AAA Server Best Practices

An AAA server processes user requests for access to computer resources and provides an organization’s authentication, authorization, and accounting (AAA) services. The AAA server typically interacts with network access, gateway...

Here are Some Best Practices To Secure Your Wi-Fi From Attacks And Unauthorized Access.
Risks & Threats June 4, 2024
4 Ways to Secure Wi-Fi Connectivity

Wi-fi networks are ubiquitous as more and more users connect to networks remotely for work, access data and applications, and manage IoT devices. As their popularity grows, so do the...

What you need to know about deploying our platform
Endpoint & Device Management May 8, 2024
Everything You Need to Know About SecureW2 Deployment

Relying on passwords alone to safeguard access to your resources (including Wi-Fi, applications, and email security) is no longer secure. Cyber attacks designed to harvest credentials become increasingly complex by...

Why X.509 Certificates are the Future of Security
PKI/Certificates March 26, 2024
What is an X.509 Digital Certificate?

X.509 certificates are forms of identification that leverage public-private key cryptography. They are a secure replacement for passwords.

The Complete Guide to SSL/TLS Certificates
Protocols & Standards January 29, 2024
What is Secure Sockets Layer (SSL)?

Security over the internet has drastically improved in the few decades that the internet has been widely available. The average user doesn’t realize how much goes on behind the scenes...

PEAP vs. EAP-TLS: What You Need to Know
Protocols & Standards July 24, 2023
PEAP Exploit Explained

An enterprise needs a safe, secure, and proper network infrastructure implementation to ensure a functional business environment. The Protected Extensible Authentication Protocol (PEAP) is a form of EAP protocol used...

From Single Point of Failure to Passwordless Security
ZTNA & VPN May 17, 2023
Are Password Managers Secure?

Everyone uses numerous accounts on the internet these days. Take yourself as an example; you most certainly have a minimum of one social network account, one email address, one for...

Why PSKs Fail Against Layer 2 Attacks
Risks & Threats May 5, 2023
Layer 2 Attacks that Defeat PSK Networks

Move away from traditional PSKs to digital certificates and protect your network from Layer 2 attacks. Know more here!

From Static Trust to Dynamic Device Identity
Endpoint & Device Management February 14, 2023
How to Improve Device Identity Context for Network Security

Protect your network from security breach by getting more visibility over your unmanaged and BYOD devices. Device Identity Context can help you improve network security. Continue reading to know more.

Public key cryptography powers secure communication.
Encryption/Hashing November 5, 2019
What is Public Key Cryptography?

Public key cryptography, a synonym for asymmetric cryptography, is a clever cryptographic system that allows two parties to exchange encrypted information publicly without worry of interception. Many cryptographic systems are...

SCEP Gateways Automate Certificate Distribution for Managed Devices.
Protocols & Standards January 30, 2019
Using a SCEP Gateway to Distribute Certificates to Managed Devices

The Simple Certificate Enrollment Protocol (SCEP) automates the distribution of certificates at scale. Instead of manual provisioning, SCEP allows devices to request certificates directly from a Certificate Authority (CA) using...

SMBs can deploy enterprise-grade MDM security in minutes with certificate-based authentication
SMB November 27, 2018
Introducing an MDM Solution for SMBs

A common trend for SMBs seen across many industries is opting into a MDM infrastructure to replace or supplement a BYOD policy. For many organizations, a MDM system offers a...