Tag: policy engine

Continuous Trust for Identity-less Infrastructure and Userless Agent
Thought Leadership August 18, 2025
Securing Identity-less Infrastructure and Userless Agents

The security landscape is profoundly transforming as AI and cloud-native technologies reshape organizations’ operations. Today, infrastructure consists of identity-less components such as containers, serverless functions, and ephemeral compute instances that...

Real-World Breach Proves Passwords are Still a Top Risk.
Thought Leadership August 6, 2025
The Password That Collapsed a Company: What We Can Learn from the KNP Logistics Ransomware Attack

“A ransomware attack on the group’s IT systems had such a devastating impact that the group concluded it could not continue to trade,” – BBC KNP Logistics (formerly known as...

PKI Policy That Adapts. Security That Scales.
Thought Leadership June 24, 2025
How Do You Enforce Consistent PKI Policy Across Distributed Teams?

You can enforce a consistent PKI policy across distributed teams by using centralized, automated enforcement with dynamic tools that integrate with your existing IT ecosystem. Manual management methods often lead...

Master AD CS Policies: Enforce Security the Right Way.
Integrations October 25, 2024
Guide to AD CS Policies and Enforcement

What is AD CS Used For? Active Directory Certificate Services (AD CS), a Windows server software solution, is used for issuing and managing x.509 digital certificates and provides Active Directory...

The Complete Guide to Setting Up Microsoft Defender App Control.
Integrations October 23, 2024
Setup Microsoft Defender for Cloud Conditional Access App Control

Managed PKI solution for Microsoft Defender for Cloud Conditional Access App Control

Group Policy vs. Intune: Which Is Right for Your Organization?
Service Providers October 23, 2024
Group Policy vs. Intune Profiles: A High-Level Comparison

Microsoft has many policy management tools to secure client devices in an organizational environment. Microsoft Group Policy and Intune Profiles are commonly used solutions in different environments, catering to different...

Enforce Secure Access: Build Network Policies with Intune Compliance
Integrations October 13, 2024
How to Create Network Policies Based on Intune Device Compliance

Intune's device compliance attribute is a powerful tool for managing the devices on your network. Here's how you can turn it into a robust network policy with SecureW2.

Do RADIUS Servers Use Active Directory? Here’s the Answer
RADIUS October 13, 2024
Do RADIUS Servers use AD?

Do you know what facilitated back-office IT functions for any business twenty years ago? It was Active Directory, Microsoft’s user directory system. Because Active Directory simplified the task for organizations to...

How AAA Servers Work: Authentication, Authorization & Accounting Explained
RADIUS October 13, 2024
How AAA Servers Work

WPA2-Personal is common in homes and cafes  – a security type requiring a preshared key (PSK). But some networks cannot be secured with a password, they want a username and...

Troubleshooting macOS AD Bind Problems After Microsoft Kerberos Updates
Integrations October 1, 2024
MacOS AD Bind Issues Post Microsoft Kerberos Update

On October 11th, 2022 Microsoft pushed an update to enforce domain controller validation for Active Directory. The purpose of this update is to shore up a security bypass vulnerability that...

Comprehensive List of Devices Supporting 802.1X Authentication
Protocols & Standards September 30, 2024
List of Devices Supporting 802.1x

It is hard to imagine life without Wi-Fi, both in personal or professional spaces but we can not deny that it has parallelly caused the transmission of more and more...

LDAP Authentication with Azure AD: A Complete Guide
Integrations September 30, 2024
LDAP Authentication with Azure AD

LDAP (Lightweight Directory Access Protocol) authentication can confirm user identities across a network. It uses a centralized directory system for user authorization and authentication. On the other hand, Microsoft offers...

Phishing-Resistant MFA in Azure AD: What You Need to Know
DevOps Access September 30, 2024
Understanding Phishing-Resistant MFA in Azure AD

On an average day, most employees have to log into numerous different applications and resources at work. The influx of applications necessary for work has led to an exponential increase...

Step-by-Step Guide: Setting Up 802.1X with Azure AD
Protocols & Standards September 30, 2024
How To Set Up 802.1X Using Azure AD

You can configure 802.1X using Azure AD by syncing it with an LDAP server or enrolling every device with an x.509 certificate.

PEAP-MSCHAPv2 Vulnerability Explained: How Credentials Can Be Compromised
Risks & Threats September 30, 2024
PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The 802.1x authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to...

MAC Spoofing Attacks Explained: Understanding the Threats to Your Network
Risks & Threats September 26, 2024
MAC Spoofing Attacks Explained: A Technical Overview

New cyberattacks and breaches are reported every day in our news feeds. Cybercriminals target people as well as large corporations and other businesses. One of the many techniques hackers employ...

Master Windows Access Control: Understanding ACL, DACL, SACL, & ACE
Protocols & Standards September 26, 2024
Windows Access Control: ACL, DACL, SACL, & ACE

Read this to know more about access control list and its components and the best way to secure your enterprise network.

RADIUS Setup Simplified: Easy Wins for Your Network
RADIUS August 18, 2022
Configuration Guide: Windows RADIUS Server 2012

Anytime there’s a discussion about a wired or wireless authentication, it’s probable that the word “RADIUS server” will come up sooner or later. RADIUS, also known as a “AAA server,”...

Keep your software safe and users protected.
PKI/Certificates April 4, 2022
Code Signing with Digital Certificates: Explained

Imagine you’re installing an application and a pop-up like the screenshot above comes up. How can you be sure that the application you’re about to download is really safe? The...

Unlock simplified Windows management with the right MDM
Integrations February 4, 2022
Intune vs. Workspace ONE: The Best MDM for Windows Devices

The technological advancements in the last decade have evolved the use of mobile devices such as smartphones and laptops in the corporate world. Before the pandemic, some organizations were skeptical...

Dynamic role-based access with SSID-based policies.
Protocols & Standards March 10, 2021
Assigning Network Access Policies Based On SSID

Using network access policies to segment users into VLANs with appropriate permissions is a core part of every organization’s identity and access management (IAM) strategy. More options to customize access...

Build trust internally and secure every connection effortlessly.
PKI/Certificates December 23, 2020
How to Run Your Own Certificate Authority

What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates to devices. A digital certificate certifies the ownership of a public key by tying...

Elevate MSP security with seamless integrations.
Service Providers December 10, 2020
Best Network Security Solutions for MSPs

Among small businesses that have been targeted by cyber-criminals, 70% were used as an entry point into a larger enterprise system they supply to. Nearly half (48%) of the cases...

Secure every connection with policy-driven 802.1X access.
Integrations December 9, 2020
How To Use Azure AD Conditional Access for a Zero Trust 802.1x Network

The standard method of thinking about network security is long overdue for an update. The usual “perimeter protection” approach consists of defining, and then controlling, a virtual boundary to make...

The right way to do AD, without the guesswork.
PKI/Certificates November 24, 2020
Top 3 Tips on Configuring Policies in Active Directory Certificate Services

Active Directory Certificate Services (AD CS) is a Windows server software solution designed to issue x.509 digital certificates. Certificates have proven to be more secure and easier to use than...

Guest access, zero compromise.
Guest Access November 24, 2020
Authenticating Guest Users for VPN with Azure AD B2B and SecureW2

Cross-organization collaboration can be tricky for the IT department because they need to make sure the partner’s security policies match their own, then create temporary guest user accounts and ensure...

Azure AD B2B meets 802.1X security.
Guest Access November 24, 2020
Enable 802.1X For Guest Users with Azure AD B2B and SecureW2

Business-to-Business collaboration is essential for company growth. Thousands of companies have collaborated on projects to increase company value and spread risk. At the core of these collaborations is identity and...

Ditch the directory. Embrace the cloud.
Integrations November 9, 2020
Can I Replace LDAP/OpenLDAP with Azure?

OpenLDAP is a free, open-source LDAP server that is used and trusted by organizations around the world. Historically, OpenLDAP has been a good solution for directory services and has succeeded...

Network access that adapts to your role.
Protocols & Standards November 3, 2020
What is VLAN Steering?

The VLAN (Virtual Local Area Network) is an important tool in the IT toolbox. By emulating the properties of a Local Area Network, you can segment users into any number...