Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

How to Set up Device Identification in Defender for Cloud Apps

Want better visibility and control on all devices in your network for efficient device management? Try Defender Device Management with us.

Read More
Windows RADIUS Server Pros and Cons

There are thousands of deployed instances of Windows RADIUS Server across the world, but users still debate its capabilities to keep their large networks intact and secure, giving rise to questions like: “Is a Windows RADIUS Server sufficient for my ... Read More

Read More
Group Policy vs. Intune Profiles: A High-Level Comparison

Microsoft has many policy management tools to secure client devices in an organizational environment. Microsoft Group Policy and Intune Profiles are commonly used solutions in different environments, catering to different devices. While Group Policy works for devices in a Windows ... Read More

Read More
SHA-256 vs. SHA-1: Which Is The Better Encryption?

Sending information in clear text over the air is a tremendous risk in today’s complex cybersecurity environment. Hackers constantly evolve attack vectors to target sensitive data in transit, but encryption allows us to prevent this.  There are many different encryption ... Read More

Read More
Windows Access Control: ACL, DACL, SACL, & ACE

Read this to know more about access control list and its components and the best way to secure your enterprise network.

Read More
A Complete Guide to Configuring Microsoft RADIUS Server

Need a solution for your network authentication, authorization, and accounting (AAA) requirements? RADIUS has been around for decades, used by thousands of organizations. Without a RADIUS server, authentication would have to occur at the access point (this would require some ... Read More

Read More
Everything You Need to Know About SecureW2 Deployment

Relying on passwords alone to safeguard access to your resources (including Wi-Fi, applications, and email security) is no longer secure. Cyber attacks designed to harvest credentials become increasingly complex by the day. Stealing a single set of credentials can have ... Read More

Read More
PEAP Exploit Explained

An enterprise needs a safe, secure, and proper network infrastructure implementation to ensure a functional business environment. The Protected Extensible Authentication Protocol (PEAP) is a form of EAP protocol used by organizations to protect their data over-the-air. The PEAP authentication ... Read More

Read More
Are Password Managers Secure?

Everyone uses numerous accounts on the internet these days. Take yourself as an example; you most certainly have a minimum of one social network account, one email address, one for online shopping, and most likely one for online banking. There’s ... Read More

Read More
Layer 2 Attacks that Defeat PSK Networks

Move away from traditional PSKs to digital certificates and protect your network from Layer 2 attacks. Know more here!

Read More