Tag: JoinNow platform

Pioneering the Future of Continuous Trust
SecureW2 Tech September 10, 2025
JoinNow 8.0: Adaptive Defense, ACME for Server Certs, and More!

Trust rules how the world works. It’s the foundation of personal relationships, how we choose who to do business with, and how we grant people (and now non-human identities) access...

Secure access instantly with magic links and certificates.
RADIUS November 11, 2024
Passwordless Magic Link Authentication: Explained

Want to know how magic links work? Read on to know more about magic links other passwordless authentication methods for network security.

JAMF vs. Mosyle: Which Apple MDM Fits Your Organization Best?
Service Providers October 23, 2024
Compare Apple MDMs: JAMF vs. Mosyle

Apple devices are becoming increasingly popular for enterprises as they are feature-rich and user-friendly. Over 81% of employees use company-owned or BYOD Apple devices to access their corporate network, which...

Step-by-Step Guide: Configure Passpoint/OpenRoaming on Android
Wi-Fi & Wired Security October 13, 2024
Configuring Passpoint/OpenRoaming on Android

For individuals who possess an Android mobile device, the significance of Wi-Fi connectivity to their gadget is widely recognized. In addition to cost savings, utilizing this method yields faster data...

Streamline Wi-Fi Onboarding with Captive Portal Best Practices
BYOD Onboarding October 13, 2024
Wi-Fi Onboarding Captive Portal Best Practices

Accessing Wi-Fi networks easily and remotely has become a critical interaction point between organizations and their remotely located users. The captive portal is at the center of this process. It...

Android Network Settings Explained: The Complete 2024 Guide
Wi-Fi & Wired Security September 30, 2024
2024 Guide to Android Network Settings

Android network settings are critical  for ensuring a seamless connectivity and security for users. These settings cover a variety of parameters controlling VPN connections, mobile data, and Wi-Fi, among other...

Enterprise Wi-Fi Security Simplified: Best Practices for Microsoft Intune Profiles
Integrations September 26, 2024
Microsoft Intune Enterprise Wi-Fi Profile Best Practices

Microsoft Endpoint Manager (Intune) is a stellar MDM that we frequently encounter in managing managed devices, especially when the enterprise size is large, and we need to have centralized control...

Complete Guide: Setting Up 802.1X on MacOS for Secure Networks
Wi-Fi & Wired Security September 24, 2024
Complete Guide to MacOS 802.1X

Implementing robust authentication protocols is paramount in today’s hyper-connected digital environment, where data security and network integrity are paramount. MacOS 802.1X authentication stands out among these protocols as a crucial...

A Concise Guide to Our PKI Solution for Managed Devices.
SecureW2 Tech September 20, 2024
What to Expect When You’re Adopting the JoinNow Platform for Managed Devices

In a nutshell, SecureW2 helps organizations achieve passwordless network access by providing a managed Public Key Infrastructure (PKI) and RADIUS service. These two core products work together to empower wired...

Mutual Server Validation Connects Android Clients to The Correct Servers.
Protocols & Standards September 3, 2024
Server Certificate Validation with Android 12 Devices

Cyber-attacks have grown stronger over the years and are able to easily bypass the rudimentary security standards provided by the username/password mechanism. If an organization relies on passwords for network...

Future-Proof your Network With WPA3 Encryption.
Protocols & Standards September 3, 2024
WPA3: The Ultimate Guide

The network type Wi-Fi Protected Access (WPA) has been upgraded once since its inception in 1999. In 2004, it was replaced by WPA2, which has stood as the standard for...

Continuous Monitoring and Strong Authentication Make For Robust Network Security.
Thought Leadership August 7, 2024
Network Security Basics—Definition, Threats, and Solutions

The adoption of remote work, cloud computing, and integrated IoT devices leads to complexities of securing computer networks and network security infrastructures. The evolution of cyber threats—from sophisticated malware attacks...

NAC Implements Granular Access Control To Prevent Unauthorized Access.
Thought Leadership July 31, 2024
Network Access Control: Explained

Network Access Control (NAC) is an advanced cybersecurity measure designed to regulate who, what, and how entities gain access to network resources. As the traditional security perimeter is no longer...

Automated PKI and CAC Management That Meets DoD Standards
PKI/Certificates July 1, 2024
How is a Smart CAC Card Used in A PKI?

Public Key Infrastructure (PKI) is one of the most robust methods for safeguarding sensitive information,  particularly within the Department of Defense (DoD) ecosystem, where it secures sensitive data and communications...

Use Digital Certificates Instead Of PSK's For Identity-Backed Networks.
Risks & Threats May 14, 2024
Mitigate the Risks of a Pre-Shared Keys-Based Network

Wi-Fi security is designed to safeguard data as it traverses the airwaves in wireless networks. Wi-Fi Protected Access (WPA) emerged as a response to the glaring deficiencies of its predecessor,...

Simplify Chromebooks: Automated Certificate Enrollment with SecureW2
Endpoint & Device Management March 20, 2024
Configure Google SCEP Certificate Automatic Enrollment Profiles

Certificates are far superior to credentials and mitigate many vulnerabilities associated with pre-shared keys. They enhance the user experience by facilitating network access and removing password-related friction induced by password...

Unlock Device Trust with Azure and Digital Certificates
Endpoint & Device Management February 28, 2024
Configuring Azure AD CBA with Conditional Access Policies

Conditional Access Policies, the If-Then statements available in Microsoft Azure AD (Entra ID), enable a much more granular level of access control over the resources managed with Azure AD /...

WPA2-Enterprise made easy - Fast, Secure, and Error-free User Enrollment
Wi-Fi & Wired Security September 30, 2022
Best Practices for Enrolling Users for WPA2-Enterprise

Wifi is essential in daily life and is critical for any business today. At home, we use a single static password to protect your wifi. This security is called WPA2-Personal....

Control, Protect, and Manage Encryption Keys Effortlessly
SecureW2 Tech September 10, 2021
What is a Hardware Security Module?

More than ever, businesses and organizations have a responsibility to secure their data. Highly adaptable organizations have begun to implement a PKI as a means to upgrade network security. According...

Ensure safe and reliable connectivity for every student.
K-12 Schools June 7, 2021
Top 4 Network Security Tips for Returning to School

The rapid and unexpected transition to remote learning led many schools to scramble for solutions to a new teaching experience. This led to many schools being forced to stretch their...

The Right Authentication Protocol for Simplified Identity Management.
Protocols & Standards May 4, 2021
Comparing: OAuth, OpenID Connect, and SAML

Properly protecting a network requires administrators to make numerous decisions about their security. Knowing what protocol or system to implement at what stage is paramount to network safety. With Cybercrime...

The Right Authentication Protocol for Stronger Security.
Protocols & Standards April 28, 2021
OAuth Vs. OpenID? Which is better?

Authorization and authentication processes need to be more solid and safe than ever. OAuth and OpenID are two well-known names in this field. Before we get into the OAuth vs....

Secure every certificate, simplify every process.
PKI/Certificates April 16, 2021
Using Object Identifiers In PKI Management

Management of a PKI can be a full-time task for an IT team. Ensuring network users are able to authenticate to a secure network, easily maintaining their network identity, providing...

Smarter access management starts with stronger policies.
Integrations April 13, 2021
Tying IP Addresses to Azure Active Directory Users

Effectively tracking and managing identity context is one of the most important aspects of a secure Azure-based network. Without accurate identity context, it’s near impossible to determine if someone is...

Customize your device’s trust store for tailored security.
Integrations April 7, 2021
What is the Android Trusted Credentials Store?

Similar to Windows and macOS, Android devices need a system in place in order to determine if a certificate issued by a particular Certificate Authority (CA) is trusted. How does...

Reduce attack surface without impacting usability.
SecureW2 Tech April 7, 2021
MacOS Smart Card Services

Smart Card usage has been on the rise for a variety of different reasons, but undoubtedly the most prominent is for their identity management capabilities. Cybersecurity-oriented organizations are taking advantage...

Smart Wi-Fi security for modern classrooms.
K-12 Schools March 24, 2021
Setting up Secure BYOD Wi-Fi for K-12 Students

The days of getting in trouble for bringing technology into class are long gone. Many school districts actually rely on students to bring their own devices in order to incorporate...

Modern Wi-Fi, simplified for every network.
Protocols & Standards March 24, 2021
How To Use Google Wi-Fi Without Active Directory and NPS?

While technology changes rapidly, one constant is the use of Google and its spread across all facets of business technology. But how people connect to Google services and how they...

Streamline security with automated certificates.
Protocols & Standards March 22, 2021
Simplify Certificate Enrollment with AD CS

Many organizations recognize the inherent cybersecurity weakness of credential-based authentication and have made the switch to certificates as a result. The decision to move away from reliance on credentials is...

Leverage AD CS for secure VPN connections.
ZTNA & VPN March 15, 2021
Securing VPN Authentication with AD CS

The rise in remote working has been increasing since the dawn of the digital age, but the increase has seen an especially massive jump since the outbreak of the COVID-19...

One Step Could Save Your Network From Chaos.
Protocols & Standards February 26, 2021
How To Properly Delete a Certificate Authority

Securing communications via digital certificates is among the most secure processes used by organizations today. The use of public key cryptography makes certificates uncrackable and can be used to protect...

Secure, Open-Source PKI with Endless Possibilities.
PKI/Certificates February 25, 2021
What is OpenXPKI?

Deploying digital certificates for internal and external use is a growing trend throughout countless industries. Of course, as more people convert to using certificates, they find that using the proper...

Secure Your Certificates, Simplify Your PKI.
PKI/Certificates February 25, 2021
The Best Private CA / PKI Service

The use of certificates for network security is rapidly increasing due to their superiority over all other authentication methods. They’re incredibly versatile and can enable authentication customization that far surpasses...

The Key to Smoother Network Security.
Protocols & Standards February 18, 2021
What is a AWS Private CA?

Private certificate authorities (CA), also known as enterprise CAs, are CAs specifically meant for internal use. They are self-hosted and therefore not trusted externally. The usual use cases come from...

Ensure smooth PKI operations on your Microsoft devices
PKI/Certificates January 20, 2021
How to Setup Microsoft Enterprise PKI

The definition for a Public Key Infrastructures (PKI) varies among cyber security professionals, but is generally considered a collection of components that give everything an organization needs to issue and...

A Better Way to Manage Identity at Scale.
PKI/Certificates January 20, 2021
Running PKI-as-a-Service

Creating and operating a certificate-based network is no simple task. Without a highly knowledgeable staff that is well-versed in certificate management, an organization can get bogged down in integration, configuration,...

Why OAuth alone can’t secure user identities.
Protocols & Standards January 19, 2021
Top 3 Pitfalls of Authenticating with OAuth

What is OAuth? Let’s demystify OAuth by starting with a definition. At its core, OAuth provides clients secure access to a server’s resources on behalf of a resource owner. OAuth...

Smarter approach for stronger CA operations.
Protocols & Standards January 8, 2021
Maximizing an Internal Windows Certificate Authority

Maintaining a secure network that is easily accessible for users within an organization is more difficult than ever. As cybersecurity technologies improve to address current threats, malicious attackers continue to...

Enhanced Wi-Fi security with FreeRADIUS EAP-TLS.
Protocols & Standards November 30, 2020
Configuring FreeRADIUS for EAP-TLS Authentication

FreeRADIUS is one of the most widely used RADIUS authentication providers, with customers ranging from top enterprises to universities. While FreeRADIUS is certainly an effective authentication tool, cybersecurity hinges on...

From legacy systems to future-ready solutions.
Thought Leadership November 4, 2020
Problems Facing IT Departments

No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find...

Privacy Meets Seamless Roaming
Protocols & Standards October 20, 2020
A Passpoint Solution for MAC Randomization

Although MAC Randomization has been around for a few years, it has really grown in popularity with the beta version of Apple iOS 14 update because it’s a default enabled...

Click, Validate, Secure: Onboard Any Device
PKI/Certificates July 1, 2020
PKI Delivery Software for Every Device

While the advantages of certificate-based authentication over credential-based are well documented, many still experience the barrier to entry of provisioning devices with certificates. This is certainly a valid concern for...

Secure BYOD, ChromeBooks & IoT with Sectigo Certs
Integrations June 8, 2020
How to Issue Sectigo Certificates

Sectigo, formerly known as Comodo, is a leading provider of digital identity solutions. One of their main products are SSL/TLS certificates and Public Key Infrastructures (PKI), which allows the client...

Dynamic PKI, Cloud RADIUS, JoinNow: All-in-One
PKI/Certificates May 7, 2020
The Best Way to Manage Microsoft Certificates

A primary weakness of password-based authentication is the human element. Passwords can be forgotten, shared, or stolen, making them a nightmare for IT admins. Forgotten passwords can lead to service...

Discover which operating systems support Passpoint Wi-Fi
Wi-Fi & Wired Security April 28, 2020
List of Passpoint-Supported Operating Systems

Passpoint is a great tool to enable your network users to have continued access to the internet – whether they’re roaming around the city or moving from building to building...

Policies That Adapt—No Certificate Reissues Needed
RADIUS April 10, 2020
3 Security Advantages of a Cloud RADIUS Server

In order to successfully configure a WPA2-Enterprise network you must have a RADIUS server. The RADIUS authorizes and authenticates users signing into the network and eliminates any speculation into who...

SHA-1 Is Broken—It’s Time to Upgrade
Protocols & Standards March 23, 2020
It’s Time For SHA-1 Hash To End

SHA-1 is a commonly used cryptographic hash algorithm that has been used for nearly 2 decades to secure online communications. It was originally designed for government use, but an exploit...

Automate, Validate, Secure: Certificate-Based MFA
PKI/Certificates January 3, 2020
Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. According to IBM’s X-Force Threat Intelligence Index,...

Reduce support burden: streamline device setup with automated onboarding and remote troubleshooting.
BYOD Onboarding Uncategorized October 2, 2019
Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a...