Credential-based authentication is the method nearly all network users are used to and has been a common tool for decades. But unlike other decades-old technology, passwords have not been phased out of regular use. Now more than ever, passwords pose …
The Importance of Authentication Security
The Importance of Authentication Security
July 9, 2020Authentication acts as the gateway to allow access to valuable data only to those who are approved by the organization. But bad actors seem to be a step ahead of network security professionals. Many security professionals experience burnout in their …
Passpoint r1 & r2 Compared
Passpoint r1 & r2 Compared
April 21, 2020Enabling an online connection while users are away from their home networks has been a challenge for those that want a complete and efficient system. The use of mobile data is too expensive overtime, and the restrictions of hotspots limits …
Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities
Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities
February 12, 2020Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable …
EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?
EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?
January 31, 2020Ensuring network users are able to securely authenticate to the wireless network is paramount to the overall safety and security of your organization. The most widely used wireless network protocols today are the Extensible Authentication Protocols (EAP) used in WPA2-Enterprise. …