Addressing Theft Threats From All Angles

Jake Ludin Uncategorized

Addressing Theft Threats From All Angles

The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and many more types of valuable data are a potential target for hackers, so ...
This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Uncategorized

Public Key Infrastructure: Explained

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to the security of the network and the effectiveness of public key encryption and certificate-based networks. The purpose of a PKI is to manage the public ...
Using a SCEP gateway to push certificates to MDMs

Using a SCEP Gateway to Distribute Certificates to Managed Devices

Jake Ludin Uncategorized

Using a SCEP Gateway to Distribute Certificates to Managed Devices

Efficiency is at the core of business technology, and requiring IT to manually onboard managed devices for secure network access significantly hinders progress. A solution to this inefficient process would be to automatically distribute network settings and a secure certificate ...
Authenticating with Server Certificate Validation

Demystifying Server Certificate Validation

Jake Ludin Uncategorized

Demystifying Server Certificate Validation

Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in ...
image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Uncategorized

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure ...