Many organizations are moving on from the cumbersome LDAP protocol

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

Jake Ludin Tech Trends

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been …

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Patrick Grubbs Security Threats

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping ...

The 3 Biggest Mistakes Universities Make with WPA2-Enterprise

Micah Spady Tech Trends

The 3 Biggest Mistakes Universities Make with WPA2-Enterprise

Over the past decade, we’ve helped hundreds of organizations around the world secure and setup WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many pitfalls an organization can make when they set it up. Here …

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

News Security Threats

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The 802.1x authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly ...

How to Configure WPA2-Enterprise on Each Operating System

Samuel Metzler Education

How to Configure WPA2-Enterprise on Each Operating System

Automation is key for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication operates the same. Manually configuring operating systems can be a daunting task, even ...
wpa2 enterprise protocols

WPA2-Enterprise Authentication Protocols Comparison

Jake Ludin Education

WPA2-Enterprise Authentication Protocols Comparison

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. The network authentication method is one of the first lines of defense that protect users and the network …

Reducing IT support tickets

How to Efficiently Onboard Thousands of Devices

Jake Ludin Education

How to Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion of wireless devices in the past few years …