Authenticating with Server Certificate Validation

Demystifying Server Certificate Validation

Jake Ludin Uncategorized

Demystifying Server Certificate Validation

Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well as secures the authentication process. Often, WPA2-Enterprise is deployed in ...
image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Uncategorized

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure ...
Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Uncategorized

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning ...

Using Multi-Factor Authentication for Network Security

Micah Spady Uncategorized

Using Multi-Factor Authentication for Network Security

Many inquiries that we receive reference Multi-Factor Authentication (MFA) and how it can be used to improve the network security. MFA is a process that requires more than one form of identity to authenticate a user and approve network access. ...