How to Set Up RADIUS Authentication with Google

Eytan Raphaely Education, Uncategorized

How to Set Up RADIUS Authentication with Google

It is becoming more important than ever for organizations to make the transition from antiquated pre-shared key authentication methods to RADIUS-based, 802.1x authentication for their wireless networks. However, many can find the difficulties when integrating to a WPA2-Enterprise system when …

Many organizations are moving on from the cumbersome LDAP protocol

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

Jake Ludin Tech Trends

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been …

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Patrick Grubbs Security Threats

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping ...

3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Micah Spady Tech Trends

3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Over the past decade, we’ve helped hundreds of organizations around the world secure and set up WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many pitfalls an organization can make when they set it up. …

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

News Security Threats

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The 802.1x authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly ...

How to Configure WPA2-Enterprise and 802.1x on Each Operating System

Sam Metzler Education

How to Configure WPA2-Enterprise and 802.1x on Each Operating System

Automation is key for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication can operate the same way as long as you have the right tools. ...