Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

A Complete Guide to Intune 802.1x

The 802.1X standard provides secure authentication for users and devices looking to connect to wired and wireless networks. It uses an authentication server known as the RADIUS server that validates the users against their credentials and network policies to provide ... Read More

Read More
SCEP Security Best Practices

Simple Certificate Enrollment Protocol (SCEP) makes certificate issuance easier, scalable, and secure. SCEP relies on HTTP and uses RSA cryptography. It lacks support for online certificate revocation, thus limiting its Certificate Retrieval List (CRL) support. SCEP asks for the “challenge ... Read More

Read More
JAMF vs. Mosyle: Apple MDMs compared

Apple devices are becoming increasingly popular for enterprises as they are feature-rich and user-friendly. Over 81% of employees use company-owned or BYOD Apple devices to access their corporate network, which makes it essential to have a robust Mobile Device Management ... Read More

Read More
Configuring Passpoint/OpenRoaming on Android

For individuals who possess an Android mobile device, the significance of Wi-Fi connectivity to their gadget is widely recognized. In addition to cost savings, utilizing this method yields faster data transmission rates compared to cellular data. Nonetheless, it can be ... Read More

Read More
Understanding PKI Certificates: How to Get Them and Why They Matter

Imagine conducting important business online without identifying the person you’re interacting with. It would be like handing sensitive documents to a stranger on the street; every login would be risky. Fortunately, the internet establishes protocols to build trust in the ... Read More

Read More
A Deep Dive into PKI Certificates

Corporate data, social media pages, applications, and user data are crucial assets of an organization, and any theft or misuse of these could lead to huge financial losses. They not only result in loss of business opportunities, but organizations are ... Read More

Read More
What is WPA Authentication? 

The ubiquity of Wi-Fi networks in today’s world has made them popular targets for cyberattacks, especially if they rely on vulnerable mechanisms like passwords. In a 2021 study, security researchers were able to crack the Wi-Fi passwords of about 70% ... Read More

Read More
Introducing WebAuth Wi-Fi with Cloud IDPs

It’s no secret that open Wi-Fi networks are infamously insecure, and Pre-Shared Key (PSK) networks aren’t much better. If you tie your organization’s Wi-Fi to a single password and more than a handful of people know it, it’s only a ... Read More

Read More
What is Secure Sockets Layer (SSL)?

Security over the internet has drastically improved in the few decades that the internet has been widely available. The average user doesn’t realize how much goes on behind the scenes to ensure the integrity of their data and browsing experience ... Read More

Read More
How to Connect to Passpoint Wi-Fi on iOS

In a nutshell, Passpoint is a protocol developed by the Wi-Fi Alliance that allows users to connect securely to a Wi-Fi hotspot. Designed to operate like roaming works for cellular networks, Passpoint provides seamless roaming between different Wi-Fi carriers and ... Read More

Read More