Tag: ZTNA

Mutual TLS Ensure Client-Server Use Correct Certs to Connect With Each Other.
Protocols & Standards September 11, 2024
Understanding Mutual TLS (MTLS) Authentication: How It Works

Mutual TLS, or mTLS, is a trending talk of the town, especially regarding cryptographic encryption in general.  Since you’re here, there’s a good chance you’re concerned about the network at...

Automate Printer Security With 802.1X Authentication.
Endpoint & Device Management July 3, 2024
How to Configure 802.1x Printer Authentication?

When organizations establish their IT infrastructure, it’s essential to protect it, including network-connected devices and wired and wireless access points. Printers often fly under the radar among these devices regarding...

EAP-TLS: The Ultimate Defense Against MITM Attacks
Risks & Threats March 25, 2024
How To Prevent Man-in-the-Middle Attacks

Man-in-the-middle attacks (MITM) or on-path attacks are becoming common and complex. Organizations are putting in a lot of effort to mitigate these risks to no avail. Phishing kits are freely...

Beyond Passwords: The Power of Certificate-Based Authentication
PKI/Certificates February 16, 2024
What is Certificate-Based Authentication?

An IBM study says that stolen or compromised passwords are the most common reason for a data breach. Let’s be honest, usernames and passwords aren’t a good way to prove...

Why Your Does Organization Need Crypto Agility
Encryption/Hashing January 30, 2024
What is Cryptographic Agility and Why Does it Matter?

Cryptography is a cornerstone of securing information systems. It involves encoding data to ensure only authorized parties can access it. By converting data into an unreadable format, cryptography protects sensitive...

The Ultimate Guide to Device Trust & Intune
Endpoint & Device Management January 5, 2024
Invoking Device Trust with Intune as MDM

Imagine you are a parent working from home, and your child accidentally spills a drink on your work laptop. You have an approaching work deadline, so you finish it on...

Go Passwordless. Go PKI.
PKI/Certificates November 14, 2023
What is a PKI (Public Key Infrastructure)?

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to cybersecurity. It enables passwordless authentication, encrypted communication, and it has been listed by organizations such...

Why Passwordless Is the Future of Secure Access
Thought Leadership March 31, 2023
Passwordless Authentication: Explained

Do you want to move to effective Passwordless authentication solutions? Read to find out how a robust passwordless solution can enhance your network's security.

Azure AD Certificate-Based Auth: The Next Step Beyond MFA
Web App Access March 29, 2023
Securely Eliminate MFA with Azure AD CBA

Hackers acquired the personal data of over 37 million T-Mobile users, including names, dates of birth, Social Security numbers, and driver’s license information, in a recent incident that featured a...

See How Microsoft Defender Uses Certificates for Smarter Access Control
PKI/Certificates March 3, 2023
Using Certificates for Granular Application Access with Microsoft Defender

The cloud presents an enticing opportunity for businesses – it makes important resources available anywhere, allows them to offshore the cost of storage, and can even save them on hardware...

Passwordless Authentication, Powered by Azure AD CBA
Integrations February 27, 2023
Implement Microsoft Passwordless Authentication With Azure AD CBA

In this article, we’ll cover precisely what Microsoft Authenticator App is and how you can quickly onboard to digital certificates.

Eliminate Password Risks in OneLogin with Certificates
Endpoint & Device Management January 11, 2023
Configure Client Certificate Authentication with OneLogin

Configure Client Certificate Authentication on OneLogin and enforce Zero Trust Policy and make your network secure.

Eliminate MFA Fatigue in Ping with Certificate Authentication
PKI/Certificates January 11, 2023
Configure Client Certificate Authentication with Ping

As many organizations shift to the digital mode in the post-pandemic era, there is an exponential increase in cloud-based network solutions. Surprisingly, numerous cutting-edge wireless technologies, such as 5G, virtual...

Simplify Security with Automated Certificate Management (ACME).
Protocols & Standards January 10, 2023
Automated Certificate Management Environment (ACME) Explained

Want to understand what Automated Certificate Management Environment (ACME) Explained is all about? Read this to know more.

Apple Device Management Simplified: JAMF vs. Kandji
Thought Leadership January 10, 2023
JAMF vs. Kandji: Apple MDMs compared

Read and compare JAMF and Kandji as Apple MDM solutions here.

Portnox vs. Cisco: Choosing the Right NAC for Your Enterprise
Thought Leadership December 18, 2022
Portnox CORE vs. Cisco ISE: NAC Comparison

Read about two popular NAC solutions ad pick out the best one for your organizational needs.

802.1X Authentication Failures? Here’s How to Diagnose
RADIUS November 21, 2022
Identifying Network Issues with 802.1X

Open SSIDs don't offer the degree of troubleshooting visibility 802.1X does. Here's how 802.1X helps you troubleshoot network issues.

Passwordless Okta with YubiKeys at Scale
Integrations October 20, 2020
Okta Smartcard Authentication Expanded

Okta is a popular choice for organizations that want top-of-the-line cloud identity management. It’s one of the largest identity providers with a modern cloud directory and a plethora of handy...

Automate YubiKey PIN/PUK via Cloud SCMS
Protocols & Standards October 19, 2020
YubiKey PIN/PUK Configuration at Scale

Yubikeys are an all-in-one MFA device. In addition to serving as a physical authentication token, they can generate one-time-passwords (OTP) and require users to input a PIN.  It’s quite difficult...

No Single Point of Failure: RADIUS Redundancy Works
RADIUS September 30, 2020
What Is RADIUS Redundancy?

In all manner of security, redundancy is strength. It’s a way to ensure that no matter what goes wrong, there is a backup plan in action that can certify safety....

Multi-Tenant, Policy-Driven, MSP-Ready RADIUS
RADIUS July 29, 2020
Shared Hosted RADIUS for Managed Service Providers

It’s widely accepted that using a RADIUS server for network authentication is the most secure method, but there’s a significant number of organizations for which RADIUS isn’t feasible. SecureW2 has...

Device-Only? No Problem - Certify the Machine
PKI/Certificates July 7, 2020
Enabling Windows Machine Certificate Authentication

Looking to use certificate-based authentication on your managed windows devices? Machine authentication with x.509 certificates permits managed Windows machines that don’t belong to any users, to authenticate onto a 802.1X...

Certificates from SecureW2, Defense in Depth
PKI/Certificates June 1, 2020
Enabling Double Encryption for Zscaler with SecureW2’s PKI

Double encryption adds an extra layer of security to ensure that the connections between the Z App, Connectors, and ZPA ZENs stay protected. Although Zscaler already comes with a layer...

Clone AD CS Templates—Don’t Use Defaults
PKI/Certificates May 5, 2020
Top 3 Mistakes Setting Up AD CS Certificate Templates

In order to use certificates for authentication, a security trend caused by the inadequacies of password-based authentication, a public key infrastructure (PKI) must be in place. Active Directory Certificates Services...

R1 Works Now—R2 Is Still Rare
Wi-Fi & Wired Security April 21, 2020
Passpoint r1 & r2 Compared

Enabling an online connection while users are away from their home networks has been a challenge for those that want a complete and efficient system. The use of mobile data...

HSM-Secured PKI on ISO-Certified AWS Infrastructure
PKI/Certificates April 13, 2020
Enterprise PKI Management in the Cloud

As the importance of secure authentication continues to rise, many organizations are looking for lightweight, cost-efficient solutions to their cybersecurity concerns. This has caused many to question the efficacy of...

End-to-End VPN Encryption: Non-Negotiable
ZTNA & VPN April 6, 2020
Using VPN for Remote Work? Don’t Make this VPN Security Mistake

We have never been more connected with others than we are today. The workforce is quickly moving to mobile devices. Remote work has picked up dramatically due to the COVID-19...

Passwords are the Weak Link in Ransomware Defense
Risks & Threats March 16, 2020
How To Address America’s Ransomware Threats

Over the course of the 2010s, ransomware attacks on city and state governments have increased in number and effectiveness. The lack of proper cybersecurity measures has highlighted a weakness in...