Burgeoning Software Company Hardens Network Infrastructure with EAP-TLS

The company wanted to secure its wireless network using RADIUS to authenticate its users against its Okta directory. They first turned to a competitor but we’re having difficulty with their device authorization and needed to make a change. They decided to switch to SecureW2 in May 2021, and have successfully deployed a Cloud RADIUS backed network for their offices in the US and overseas.

Read Case Study
Cloud Radius
Enterprise
Okta
PKI

Employment Platform Secures VPN For Remote Employees

The client reached out to SecureW2 in late 2020, spurred by concerns about managing an increasingly mobile workforce after the onset of the Covid-19 pandemic. After a two-week trial period, they decided to go with SecureW2 to help authenticate remote employees to the company VPN. They were able to implement the products they purchased a few weeks later in the fall of 2020. SecureW2 assisted them during the implementation every step of the way

Read Case Study
Consumer App
Jamf
MDM
Okta
School
Security Infrastructure
Wi-Fi

Urban Development Organization Moves to 802.1x With SecureW2

SecureW2 was able to provide the client with an 802.1X solution that didn’t need expensive on-premise servers to manage. With a fully customized solution that allows them to leverage OpenID with Okta, they are certain that no bad actors will gain access to valuable company assets. Their users are able to enroll and renew certificates without ever having to configure anything themselves. They no longer have to worry about any credential leaks or password related issues. The customer is currently in the process of using SecureW2 enrolling all of the IoT devices, printers, fax machines, copiers etc. with certificates.

Read Case Study
BYOD
Consumer App
Enterprise
Security Infrastructure

Industry-Leading Real Estate Investor Remodels their Authentication with SecureW2’s Managed PKI

The customer contacted SecureW2 in early March of 2020 during the initial stages of the Covid-19 pandemic. They had tried to configure their own PKI through Active Directory Certificate Services, only to find it was more challenging than they anticipated. At first, they spent a couple of weeks looking through all their options, then they determined that SecureW2 likely had the solutions to their issues. They were correct. Shortly after contacting SecureW2, the deal was closed. By the beginning of April that year, the customer had their certificate-based VPN authentication set up and their MDMs enrolled for certificates.

Read Case Study
Azure
Cloud Radius
Enterprise
Intune
MDM
PKI
VPN
Wi-Fi

School District Secures Wi-Fi With Cloud RADIUS

This school district was looking to transition to a certificate-backed EAP-TLS network, while still leveraging their current network environment. Originally, they attempted to utilize their already existing FreeRADIUS to authenticate certificates but found the process too difficult. They considered hiring a FreeRADIUS expert to help them transition but found this to be too expensive a solution. They contacted SecureW2 in June 2021 and were fully equipped with an EAP-TLS network ready for students in the Fall.

Read Case Study
Google
K-12
Meraki
PKI

Engineering Firm Ties Network Authentication Directly to Google and Azure

The client reached out to SecureW2 early in the summer of 2021. They had been looking at a few different companies that could help them move to passwordless Wi-Fi authentication for both MDMs and BYODs, but came to the conclusion that SecureW2 could best fulfill their needs. After their initial contact, the client worked with SecureW2 for approximately three weeks. By the end of July that summer, they had everything they needed to implement certificate-based authentication and effortless self-configuration for BYODs.

Read Case Study
BYOD
Cloud Radius
Enterprise
MDM
Wi-Fi

Hospital IT Staff Heals Insecure Network

The client, a university with a hospital program attached, was looking for a way for users from the university and users from the hospital to be able to authenticate to either network without having extraneous authentication steps. They decided to work with SecureW2 to deploy an EAP-TLS certificate-based solution for both networks. They started deployment in February 2020 and were able to have certificates on all corporate-owned and managed devices by June 2020.

Read Case Study
Cloud Radius
Healthcare
Jamf

School District Secures Over 20,000 Devices With Certificates

This school district was looking to use certificates for Wi-Fi security, meaning RADIUS server technology and a CA (Certificate Authority) would be needed to issue certificates after validating users against their Rapid Identity SAML identity provider. The IT team was originally skeptical about completing the network integration using a cloud network. They contacted SecureW2 in August 2019 and were surprised that with our deployment assistance, she was able to complete a network integration that would support more than 20 campuses in a matter of hours.

Read Case Study
BYOD
Google
K-12

Global Fintech Leader Switches All Devices to EAP-TLS with SecureW2

With a completely cloud-based network and a fully functional PKI, the client is ready for any potential threat. They are currently transitioning to a more Okta based environment and can rest easy knowing they’re Okta directory is easily integrated with SecureW2. The customer is moving towards a zero-trust network and is pushing to use certificates wherever possible to reinforce their security and move away from insecure passwords. The firm has reached the point where they aim to use certificates wherever possible to strengthen and mature their security by completely moving away from passwords.

Read Case Study
BYOD
Enterprise
Jamf
Okta
PKI

SecureW2 Secures Infrastructure for $20 Billion Dollar Tech Startup

Starting as a small start-up company, the client had been using a WPA2-PSK network for some time. However, their business was growing rapidly, so they were looking for a more secure alternative. With the increase in employees, they feared the security risk of passwords becoming compromised. Each time they administered a password to a new employee, they knew it was another entrance point for a potential security breach. They wanted to take advantage of a certificate-based solution as they believed credentials were insecure and quickly becoming obsolete. The company had no existing on-premise infrastructure to leverage. An IT representative from the company explained, “After we crunched the numbers and found out running a server on our campus would cost us thousands in hardware and manpower, we decided we needed a more cost effective solution that could easily integrate with our cloud environment.”

Read Case Study
Enterprise
Google
Jamf
Okta

Global Insurance Company Gains Visibility Over Network with Certificates

The company evaluated a number of different options to implement a certificate solution. To start, they considered propping up their own PKI to have full control over the certificate solution. But further research deterred them as their complex device environment would make the process exceedingly difficult to set up and manage over time. They contemplated setting up Windows NPS and a CA supported through Active Directory, but the diversity of their managed devices continued to be a hurdle. This setup would require a ton of additional resources and effort to integrate with Jamf and Chromebooks, so the suggestion was promptly set aside. Lastly, they evaluated open-source certificate options that they could customize to meet their network requirements. But this would require Simply Business to write their own extensions to accommodate their needs. The amount of manual work and maintenance over time discouraged this choice. SecureW2 met the companies’ criteria and had a solution capable of integrating every device type. Their Cloud-based PKI and RADIUS server can be easily integrated and configured to deliver certificates within hours. Using SCEP and WSTEP API Gateways, they could deliver certificates to managed devices with no interaction from the end-user. And those certificates are securely authenticated using EAP-TLS, the strongest authentication method available. After just a few hours of setups, the company had certificates deployed to all of their managed devices and no longer has to deal with password-related issues. The process was inefficient and influenced a switch to Mist Systems, but this still was not a sufficient solution. Mist provided a more reliable method of determining who is connected to the secure network with little effort from IT, and a more organized place to read network data.

Read Case Study
Google
Meraki
SMB

Fortune 100 Powerhouse Moves to EAP-TLS with SecureW2

SecureW2 provided them with gateway APIs that natively integrates with Cisco ISE for managed device certificate enrollment and self-service BYOD clients that allow end-users to enroll themselves for certificates in a matter of minutes. One of this organization’s main concerns was certificate expiration, which is why SecureW2’s management portal was ideal as it provides a fully functional GUI so that IT admins have complete visibility on certificate activity and validity. SecureW2 also utilizes advanced device enrollment tokens that can be used to request a One Time Enrollment Token (OTET) from JoinNow Cloud Connector. A silent Windows client and the OTET silently re-enroll certificates after a certain time to ensure no certificates expire unnoticed, plus newly enrolled certificates are more secure than older ones.

Read Case Study
BYOD
Cloud Radius
Enterprise

University Uses SecureW2 to Slash Wi-Fi Support Tickets

To accomplish the goal of offering a network that is secure, efficient, and cost effective, this university began researching network onboarding solutions. With an exceptional onboarding client in place, they could offer a much more efficient method for users to configure their devices. After considering a few onboarding solutions, the school’s engineers ultimately judged that JoinNow MultiOS from SecureW2 would be a sound solution. The JoinNow solution fits the issue perfectly due to its vendor-neutral support, streamlined user experience, intuitive management interface, and professional technical support.

Read Case Study
Higher Ed
Jamf
Meraki
PKI

University Deploys 802.1x Onboarding for BYODs on a Massive Scale

At the beginning of the 2013 semester, this university was preparing for a massive proliferation of smartphones, laptops, and tablets to the company’s network. As the Bring Your Own Device (BYOD) phenomenon continued to spread, students were requesting instantaneous network connection that was secure and easily accessible. The university was in the middle of migrating everyone to secure Wi-Fi when they decided to deploy SecureW2’s JoinNow. The deployment was successful and the university was ready for their students to start logging in the following semester.

Read Case Study
BYOD
Higher Ed
Jamf
Microsoft Active Directory

Implementing Eduroam At Top University

This university used SecureW2’s PKI and found the process to be surprisingly simple. “As far as setting up the infrastructure, it was Plug-and-Play,” they said. “The fact that you all run the CA is fantastic. We don’t have to stand up something on campus to do, that is great.” They also used SecureW2’s Managed Device Gateways to automatically enroll their AD-Domain and Jamf managed devices for certificates. Previously, they had issues in which postal workers would experience network disconnects due to password-change policies and the use of managed devices, causing interruptions to the mail service. Certificate-based authentication fixed their password-related disconnects while also improving network security.

Read Case Study
BYOD
Higher Ed
Microsoft Active Directory

Marketing Firm Secures Offices Globally with Cloud RADIUS

The company had been issuing certificates with an on-premise directory server for their Portland office. Rather than finding a way to tie the on-premise server with another one for their New York office, the network team attempted to find a cloud-based solution. They learned about Foxpass and SecureW2 through the Mac Admin Slack community and decided to first give Foxpass a shot. The first transition to Foxpass worked well, but the company’s employees were forced to use password-based authentication, which is far less secure than certificate based-authorization. Foxpass also didn’t offer a PKI solution that they deemed suitable for their needs. They attempted to remedy this by creating and implementing their own PKI to work in tandem with Foxpass. Their PKI solution proved to be more harm than good as the IT department, which consists of three people, simply didn’t have the time needed to maintain a PKI of the size that they required.

Read Case Study
Cloud Radius
Jamf
PKI
SMB

Top Australia University Launches WPA2-Enterprise Network

One of Australia’s top universities, Deakin University, saw the signs of the mobile device boom and anticipated the change in the technology landscape by implementing a BYOD policy. Of course, this can’t just be accomplished on a whim, so they researched their options and resolved that the best course of action would be to implement a WPA2-Enterprise network. It’s considered to be the high standard for secure wireless and second to none when securing a BYOD policy. They found that configuration was merely half the process, as it quickly became evident that additional support was needed to onboard users and manage the network.

Read Case Study
BYOD
Higher Ed

University Heightens Network Security With 802.1X

Every day, I had dozens and dozens of people lining up for hours on end, and I just don’t have that anymore.

Read Case Study
BYOD
Higher Ed
MDM

School District Takes Network Security To The Next Level

We started trying to figure out how we were going to be able to easily onboard our students… it was real a nightmare…Once we found JoinNow, the lights went on. We were really impressed, and it works great for us.

Read Case Study
BYOD
K-12

Technical College Graduates To Stronger Network Security

Convenience for our users, all the BYOD devices… that sheer convenience for them to get connected easily, it’s pretty hard to put a price on that.

Read Case Study
BYOD
Higher Ed