How to Configure WPA2-Enterprise on Each Operating System

Samuel Metzler Education

How to Configure WPA2-Enterprise on Each Operating System

Automation is key for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication operates the same. Manually configuring operating systems can be a daunting task, even …

wpa2 enterprise protocols

WPA2-Enterprise Authentication Protocols Comparison

Jake Ludin Education

WPA2-Enterprise Authentication Protocols Comparison

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. The network authentication method is one of the first lines of defense that protect users and the network …

Protection for when network users access applications off-site

WPA2-PSK is Not Enough

News Education

WPA2-PSK is Not Enough

In this day and age, employees are accessing their corporate resources wherever they can get a strong wireless signal, whether that’s a public hotspot, the office, or a friend’s apartment. Methods of authentication based on a pre-shared key (PSK) are …

Reducing IT support tickets

How to Efficiently Onboard Thousands of Devices

Jake Ludin Education

How to Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …

Overcoming Support Tickets

Buried Under a Mountain of Support Tickets? We Can Help!

Jake Ludin Education

Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a net negative for all parties involved. Particularly at the beginning …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Jake Ludin Education

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense – they’ve been proven time and again to keep networks secure by protecting against over-the-air …

Mistakes made when configuring for WPA2

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

Patrick Grubbs Uncategorized

Top 3 Mistakes When Setting Up a WPA2-Enterprise Network

The importance of wireless security cannot be understated as the threat of data theft continues to rise. WPA2-Enterprise networks are the first line of defense – they’ve been proven time and again to keep networks secure by protecting against over-the-air …

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Adam Security Threats

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping …

Microsoft : PEAP-MSCHAPv2 Vulnerability Could Allow For Credential Theft

News Security Threats

Microsoft : PEAP-MSCHAPv2 Vulnerability Could Allow For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly configured …