Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • How to Configure 802.1x Printer Authentication?

    When organizations establish their IT infrastructure, it’s essential to protect it, including network-connected devices and wired and wireless access points. Printers often fly under the radar among these devices regarding security measures. However, these printers can be vulnerable if not ...

    Read More
  • Group Policy vs. Intune Profiles: A High-Level Comparison

    Microsoft has many policy management tools to secure client devices in an organizational environment. Microsoft Group Policy and Intune Profiles are commonly used solutions in different environments, catering to different devices. While Group Policy works for devices in a Windows ...

    Read More
  • How is a Smart CAC Card Used in the PKI?

    Public Key Infrastructure (PKI) is one of the most robust methods for safeguarding sensitive information,  particularly within the Department of Defense (DoD) ecosystem, where it secures sensitive data and communications across various platforms. The Common Access Card (CAC) is instrumental ...

    Read More
  • What is PKI-as-a-Service (PKIaaS)?

    Public Key Infrastructure (PKI) keeps data secure, authenticates identities, and ensures end-to-end encryption. It plays a vital role in securing digital communications and involves a set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, ...

    Read More
  • What are Wildcard Certificates? Are They Safe

    SSL certificates (Secure Sockets Layer) and their successor TLS certificates (Transport Layer Security) are critical for establishing secure communications over the Internet. They authenticate the identity of a website and encrypt the data exchanged, thereby safeguarding it from malicious entities. ...

    Read More
  • Best EAP Method to Configure a Secure WiFi

    Extensible Authentication Protocol (EAP) is a strong security layer and authentication framework used in Wi-Fi networks. It provides various methods to verify the identities of users and devices before granting access. These methods include wireless access using IEEE 802.1X, wired ...

    Read More
  • How to Set Up AD CS PKI Certificates with Jamf

    As credential-based authentication becomes increasingly insecure, many organizations see the benefit of moving to passwordless security methods such as digital certificates. Implementing certificates, however, requires the implementation of a Public Key Infrastructure (PKI) for the management of those certificates.  When ...

    Read More
  • A Complete Guide to Intune 802.1x

    The 802.1X standard provides secure authentication for users and devices looking to connect to wired and wireless networks. It uses an authentication server known as the RADIUS server that validates the users against their credentials and network policies to provide ...

    Read More
  • PKI Digital Signature

    Digital signatures are pivotal to cybersecurity. They offer a robust mechanism to verify the authenticity and integrity of a document or message. Imagine sending a handwritten letter; your signature assures the recipient that the letter is genuinely from you. Similarly, ...

    Read More
  • What is a Hardware Security Module(HSM)?

    Data security has never been more critical. Hardware Security Modules (HSMs) are pivotal in safeguarding the cryptographic infrastructure of numerous global enterprises. HSMs have come a long way, from niche, hardware-based security tools to integral components of modern cybersecurity architectures, ...

    Read More