Enterprise Wi-Fi standards and authentication From Paris to Amsterdam, we spent October at the forefront of enterprise Wi-Fi standards development - here's what carriers and enterprises need to know about the future of network authentication. T... Enterprises Industry Insights and Trends
Cisco ISE alternatives: 2026 comparison & buyer's guide Compare pricing, features, and migration paths for top network access control alternatives to Cisco ISE. "We have 50,000 users and the licensing alone is an enormous cost." This is the conversation s... Enterprises Network Security Best Practices
RADIUS Active Directory This comprehensive guide covers everything you need to know about RADIUS Active Directory integration, from basic concepts to enterprise-scale implementations. Microsoft Active Directory has long been... Enterprises FreeRADIUS Technical Guides
Human-centred security: Designing systems for how people actually work The future of cybersecurity lies not in more complex systems but in better integration between human psychology and technical solutions. By designing security solutions that work with human nature rat... Enterprises Network Security Best Practices
It’s Finally Time to Replace NTLM With Microsoft deprecating MS-CHAP and NTLM, it’s time for enterprise networks to switch to a more secure authentication method: TTLS. Microsoft is finally deprecating its 30-year-old MS-CHAP and NTLM... Enterprises Security Threats and Vulnerabilities
Steel-Belted RADIUS server end-of-life: What you need to know now Learn why Steel-Belted RADIUS server's end-of-life status puts your network at risk and how to plan your migration to a secure, future-proof authentication solution. If you're still running Steel-Belt... Enterprises Security Threats and Vulnerabilities
Don’t "set it and forget it" So you decided that whatever you were using for network security wasn’t getting the job done… either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Enterprises Network Security Best Practices
Can you use FreeRADIUS and Active Directory together? The short answer is Yes, FreeRADIUS and Active Directory arecompatible with each other . However, there are some constraints and implications for the rest of the system. Like any technology choice, Ac... Enterprises FreeRADIUS Technical Guides
Is NTLM secure? While Active Directory is widely used, it has still uses insecure protocols such as NTLM. The important question many people ask is “Does turning off NTLM increase security”? The answer is “maybe”, or... Enterprises Security Threats and Vulnerabilities
Enterprise ransomware prevention starts with network authentication When properly implemented, network authentication can serve as a powerful barrier against ransomware attacks, stopping bad actors before they gain the initial foothold they need. In 2024, the number o... Enterprises Security Threats and Vulnerabilities
How to connect FreeRADIUS to Active Directory for authentication Active Directory is widely used in the enterprise and university systems. This article describes how to connect FreeRADIUS with Active Directory, allowing you toauthenticate users against your existin... Enterprises FreeRADIUS Technical Guides
Using FreeRADIUS with FIPS mode on compliant systems In order to create more secure systems, standards such as Federal Information Processing Standard 140-2 ( FIPS-140) are being more widely used. The FIPS standard provides for limits on which cryptogra... Enterprises FreeRADIUS Technical Guides