Tag: wpa2-enterprise

OWE brings encryption to open Wi-Fi—no passwords, no hassle, just protection.
Wi-Fi & Wired Security May 22, 2025
What is Opportunistic Wireless Encryption (OWE) in WPA3?

Public Wi-Fi is available everywhere. However, behind the convenience lies a long-standing issue: unsecured Wi-Fi networks lack encryption, exposing user data to eavesdropping and attacks. Opportunistic Wireless Encryption (OWE), a...

No certificate check? Your ‘secure’ Wi-Fi isn’t secure.
Wi-Fi & Wired Security December 5, 2024
Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so...

Seamless Wi-Fi, powered by Passpoint and 802.1x.
Wi-Fi & Wired Security November 21, 2024
An Overview Of Passpoint In Network Infrastructure

Wi-Fi access has evolved from the manual selection of Service Set Identifiers (SSIDs) to the automated, secure connectivity of Passpoint. Initially, users had to browse a list of available SSIDs,...

Upgrade to WPA2: Stronger Wi-Fi security, smarter authentication.
Protocols & Standards November 21, 2024
WPA vs WPA2- The Better Wifi Authentication

Wireless networks are omnipresent. You may have access to many wireless networks, whether in a neighborhood coffee shop, a school, or home. However, it’s hard to tell which ones are...

Shared passwords fail. Certificates never do.
Enterprise November 6, 2024
WPA2-PSK is Not Good Enough

In this day and age, employees are accessing their corporate resources wherever they can get a strong wireless signal, whether it be a public hotspot, an airport, or a friend’s...

Leave passwords behind, go certificate-first!
Wi-Fi & Wired Security November 6, 2024
A Security Analysis of WPA-Personal

In the continuous effort to strengthen wireless network security, Wi-Fi Protected Access (WPA) represents a significant turning point. Data transmission over airwaves is becoming increasingly common in the ever-expanding digital...

Stop rotating passwords, start eliminating them.
Wi-Fi & Wired Security November 5, 2024
Does Rotating Preshared Keys Improve Security?

Wifi Protected Access 2 – Pre-Shared Key (WPA2-PSK), a wireless security standard from 2004, is still used by many organizations today. And although it’s safer than its predecessors, WPA2-PSK relies...

Extend Zero Trust to Wi-Fi: YubiKeys + EAP-TLS.
Wi-Fi & Wired Security November 4, 2024
Deploy Yubikeys For Secure Wi-Fi in WPA2-Enterprise Network

Security keys are useful tools for hardening your devices with an additional factor of authentication. Did you know that same protection can be extended to your network? SecureW2, a Yubico...

WPA2-Enterprise made simple, secure, and automatic.
Protocols & Standards November 4, 2024
Configuration Guide For WPA2-Enterprise On Operating Systems

Automation is critical for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication can operate the...

Still using WEP? Lock it with WPA3 + certificates.
Wi-Fi & Wired Security October 27, 2024
What is WEP Security?

As we all know, wireless networks simplify numerous business procedures while providing trustworthy security. As a result, a user must be familiar with wireless networks and how they might facilitate...

Is Your Coworking Wi-Fi Secure? Here’s How to Fix It.
Wi-Fi & Wired Security October 23, 2024
Coworking Wi-Fi Security Best Practices: How to Protect Shared Networks

Coworking spaces are on the rise with  the increase in the number of remote workers. Many organizations have moved towards coworking as the shared office model offers similar benefits as that of a...

Enterprise Wi-Fi Security: The Truth About WPA2 Password Safety
Wi-Fi & Wired Security October 21, 2024
WPA2-Password Safety In An Enterprise Network

When you try to connect to a Wi-Fi network and are asked for a password, do you ever find it hard to figure out what to do? You’re not by...

Wi-Fi Security Explained: WEP vs. WPA vs. WPA2
Protocols & Standards October 17, 2024
WEP vs. WPA vs WPA2- The Better Wifi Authentication

One key component of wireless security is encryption, which is the process of encoding data before it is transmitted over the air. Only authorized parties with the correct decryption key...

WPA2-PSK Security Explained: Strengths, Weaknesses & Risks
Protocols & Standards October 13, 2024
A Deep Dive into the Security of WPA2-PSK

In Wi-Fi security, one protocol stands out for its widespread adoption and significant role in protecting data: WPA2-PSK. This protocol, short for Wi-Fi Protected Access 2 – Pre-Shared Key, has...

From Authentication to Encryption: How WPA-Enterprise Protects You
Wi-Fi & Wired Security October 11, 2024
How Does WPA-Enterprise Secure Your Network

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. Authentication security has never been more important; In...

Wi-Fi Security Explained: The Safest Authentication Method
Wi-Fi & Wired Security September 30, 2024
What is the Most Secure Method of Wi-Fi Authentication?

The first layer of defense for a wireless network is the authentication process. With a strong authentication barrier, an organization can feel confident that only approved network users are able...

Wireless Security Explained: A Complete Guide to Wi-Fi Protection
Wi-Fi & Wired Security September 26, 2024
A Complete Guide To Wi-Fi Security

In the modern world, it seems as though it would be nearly impossible to function without access to the wireless internet. People everywhere rely on Wi-Fi for everything from entertainment...

Wi-Fi Security Made Easy: 8 Hacks and Effective Preventive Measure
Risks & Threats September 24, 2024
Wi-Fi Hacking: How it Works, Staying Secure, 8 Wi-Fi Hacks

Our lives now wouldn’t be the same without an internet connection, and WiFi networks give us quick and easy access. Nonetheless, hackers find WiFi networks a desirable target due to...

WPA2 vs 802.1X: Understanding the Key Differences in Wi-Fi Security
Wi-Fi & Wired Security September 24, 2024
WPA2 vs 802.1X: What’s the Difference?

Nowadays, there are numerous methods and types of encryption used to secure networks. Businesses should look beyond using WPA2-PSK, which isn’t secure enough for their needs. It’s easy to get...

Discover The Benefits of Using WPA2-Enterpise For your Home Wi-Fi.
Protocols & Standards September 3, 2024
Should WPA2-Enterprise Be Used For My Home Network?

Securing home wireless networks has never been as important. An increase in remote work requires more people to handle sensitive business data at home. On top of this, our lives,...

What you need to know about Wi-Fi Protected Access
Protocols & Standards May 6, 2024
What is WPA Authentication? 

The ubiquity of Wi-Fi networks in today’s world has made them popular targets for cyberattacks, especially if they rely on vulnerable mechanisms like passwords. In a 2021 study, security researchers...

The Ultimate Guide to Device Trust & Intune
Endpoint & Device Management January 5, 2024
Invoking Device Trust with Intune as MDM

Imagine you are a parent working from home, and your child accidentally spills a drink on your work laptop. You have an approaching work deadline, so you finish it on...

Passpoint: Secure. Simple. Future-Ready.
Wi-Fi & Wired Security June 2, 2023
How to Connect to Passpoint Wi-Fi on iOS

In a nutshell, Passpoint is a protocol developed by the Wi-Fi Alliance that allows users to connect securely to a Wi-Fi hotspot. Designed to operate like roaming works for cellular...

From Wi-Fi to Cloud: Certificates Are the Bridge to Zero Trust
Risks & Threats April 25, 2023
Why You Should Protect Your Local Area Network, Even if You’re Cloud-Based

Ensuring the security and integrity of a business’s data and network infrastructure is of utmost importance, and thus safeguarding the local network is imperative. The Wi-Fi network serves as the...

Block Risky Devices in Real Time
Wi-Fi & Wired Security November 4, 2022
Cloud RADIUS for Wi-Fi Authentication

A survey found that 74% of IT decision-makers whose organizations have been breached in the past say it involved privileged access credential abuse. While Wi-Fi revolutionized networking during the transition from...

WPA2-Enterprise made easy - Fast, Secure, and Error-free User Enrollment
Wi-Fi & Wired Security September 30, 2022
Best Practices for Enrolling Users for WPA2-Enterprise

Wifi is essential in daily life and is critical for any business today. At home, we use a single static password to protect your wifi. This security is called WPA2-Personal....

HIPAA Compliance Starts with Secure Wireless Access
Wi-Fi & Wired Security August 11, 2022
HIPAA Compliant Wireless 802.1X

The Health Insurance Portability and Accountability Act (HIPAA) has impacted the way healthcare organizations operate since its introduction in 1996. Its goal, ultimately, was to protect patient data by imposing...

From AD agent failures to MFA issues, troubleshoot Okta errors efficiently
Integrations May 2, 2022
[Solved] Okta Sign-in Error

Okta is one of the leading identity and authentication platforms compatible with both cloud and on-premise directories. They provide a great user experience and support, but you may still run...

Secure Wi-Fi and wired networks in the cloud, effortlessly and reliably
RADIUS April 18, 2022
Cloud 802.1x Explained

What Is Cloud 802.1x? An 802.1x network is unique in one major way; it uses a Cloud RADIUS server as a means of authenticating users. The Cloud RADIUS checks a...

Seamless Certificate Management, Zero Downtime.
PKI/Certificates April 18, 2022
What is Certificate Lifecycle Management?

Using X.509 digital certificates for authentication is an immediate and significant upgrade to credential (password) authentication, but it requires proper support infrastructure. Certificate Lifecycle Management systems (CLM/CLMS), also called Certificate...

Secure access starts with the right RADIUS choice.
RADIUS February 1, 2022
Foxpass RADIUS vs. Jumpcloud RaaS

Network authentication has evolved in lockstep with the development of software over the years. The networking protocols considered secure just a few years back have not withstood the test of...

Certificates managed. Security simplified.
PKI/Certificates September 23, 2021
What Is Certificate Management?

When considering the importance of authentication security and establishing device trust to protect your network, it’s no wonder organizations are moving away from credentials in droves. A solution that many...

Customize your device’s trust store for tailored security.
Integrations April 7, 2021
What is the Android Trusted Credentials Store?

Similar to Windows and macOS, Android devices need a system in place in order to determine if a certificate issued by a particular Certificate Authority (CA) is trusted. How does...

Private keys verified, trust simplified.
Protocols & Standards March 26, 2021
Private Key Attestation on macOS

Key attestation is a necessary part of creating valid X.509 digital certificates. Asymmetric cryptography requires that the client be able to prove its identity by attesting to the secure creation...

Smart Wi-Fi security for modern classrooms.
K-12 Schools March 24, 2021
Setting up Secure BYOD Wi-Fi for K-12 Students

The days of getting in trouble for bringing technology into class are long gone. Many school districts actually rely on students to bring their own devices in order to incorporate...

Dynamic role-based access with SSID-based policies.
Protocols & Standards March 10, 2021
Assigning Network Access Policies Based On SSID

Using network access policies to segment users into VLANs with appropriate permissions is a core part of every organization’s identity and access management (IAM) strategy. More options to customize access...

Build trust internally and secure every connection effortlessly.
PKI/Certificates December 23, 2020
How to Run Your Own Certificate Authority

What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates to devices. A digital certificate certifies the ownership of a public key by tying...

Eliminate password vulnerabilities by configuring RADIUS with Google Workspace.
RADIUS December 10, 2020
How to Configure RADIUS with G-Suite (Google Workspace)

Google Suite, also known as Google Workspace is many people’s go to cloud-based productivity suite. While Google Suite is known for its ease of use, it’s credential-based authentication creates another...

Passwordless Wi-Fi made simple with FreeRADIUS.
RADIUS December 10, 2020
G Suite + FreeRADIUS for WiFi Authentication

IT experts are stressing network security now more than ever, especially considering the massive amount of revenue loss that can occur with a security breach and how 10 million attacks...

Streamline certificate issuance using AD CS automation.
Protocols & Standards December 9, 2020
How to Auto-Enroll Certificates from AD CS

Active Directory Certificate Services (AD CS) is a Windows server software solution designed to issue x.509 digital certificates. Certificates have proven to be more secure and easier to use than...

Unlock LDAP’s power with Google’s cloud.
Integrations November 9, 2020
Can I Use Google With LDAP?

Google Suite, also known as Google Workspace, is many people’s go to cloud-based productivity suite. G-Suite is a collection of collaboration tools and software that organizations can use to increase...

Proactive measures for a stronger security posture.
Service Providers November 9, 2020
Best Cyber Security Practices for MSPs

Over 30 millions businesses have fewer than 1,000 employees and many don’t have the IT budget to provide effective network security. Managed Service Providers (MSP) are a godsend for small...

Network access that adapts to your role.
Protocols & Standards November 3, 2020
What is VLAN Steering?

The VLAN (Virtual Local Area Network) is an important tool in the IT toolbox. By emulating the properties of a Local Area Network, you can segment users into any number...

Cloud PKI: Stronger, Smarter, More Secure
PKI/Certificates October 20, 2020
How to Choose a Managed Cloud PKI

As cloud technology and reliability continue to surpass their on-premise counterparts, more than 50% of organizations have made the switch to managed cloud PKI or plan to soon. If your...

Real-Time Policies, Certificate-Powered Access
Service Providers October 13, 2020
Secure Authentication for Azure Networks

Wireless security is crucial now that most sensitive data can be accessed online. It’s imperative for network administrators to dictate who can access the network and how much they’re allowed...

Automated Passpoint Onboarding at Scale
Integrations May 7, 2020
Can I Use Passpoint with Microsoft Azure?

The best way to ensure roaming internet access for employees is by deploying Passpoint. Whether you just need to be covered across campus or want to extend your network to...

Automation > Human Error in BYOD Onboarding
BYOD Onboarding April 1, 2020
3 Best Practices for Onboarding BYODs

Bring Your Own Device (BYOD) systems can be an amazing tool for businesses or schools looking to increase productivity and reduce cost. According to a study by Forbes, 42 percent...

Ditch LDAP, Embrace EAP-TLS and the Cloud
Protocols & Standards March 27, 2020
Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations....

Healthy Teams ➝ Stronger Defenses
Thought Leadership March 16, 2020
Combating Burnout in Cybersecurity

Cybersecurity professionals are highly sought-after individuals that add an immense amount of value to an organization, but that value can be difficult to pin down in terms of dollars. As...

Don’t Wait for Credential Theft to Hit
Higher Education February 4, 2020
3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Over the past decade, we’ve helped hundreds of organizations around the world secure and set up WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many...

YubiKey + Certs = Real-World Versatility
PKI/Certificates January 22, 2020
Using Digital Certificates on Yubikey

Yubikeys are an incredibly secure method of protecting yourself from data theft, but you’re probably not using them to their full potential. Natively, Yubikeys only support credential-based authentication through keypairs...

Onboard thousands of devices securely. WPA2-Enterprise with automated onboarding and certificates streamlines setup and cuts support
Wi-Fi & Wired Security October 3, 2019
Use WPA-2 Enterprise To Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully onboarding thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but...

Reduce support burden: streamline device setup with automated onboarding and remote troubleshooting.
BYOD Onboarding Uncategorized October 2, 2019
Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a...

Avoid misconfiguration, boost efficiency, and stay secure by automating WPA2-Enterprise onboarding with certificates and EAP-TLS.
Protocols & Standards October 1, 2019
Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense – they’ve been proven time...

Server certificate validation is essential to keep devices from connecting to rogue networks
Protocols & Standards November 26, 2018
Demystifying Server Certificate Validation

Credential theft is a high priority concern across many industries, and to combat it, many institutions have deployed WPA2-Enterprise wireless networks. This network type encrypts all network communications, as well...