Most ISPs Hit a Scalability Wall at 100,000 Subscribers—This Webinar Shows You How to Architect for Millions FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com OTTAWA, CANADA – October 17, 2025 When an ISP goes down in the middle of the night, it’s no... Network Security Protocols
The unique challenges of campus networks By Terry Burton, Director of Security Table of contents What is a campus area network? 7characteristics of campus networks Universities function as their own ISPs Massive user community with constant ... Network Security Best Practices Network Security Protocols
RADIUS server installation: Expert solutions for enhanced network security Professional RADIUS server installation services RADIUS server installation is more involved than just setting up a few software packages. The default RADIUS products are intended to be the basis for ... Network Security Best Practices Network Security Protocols
DHCP enhancements in FreeRADIUS 3 for high performance As part of our contributions to the FreeRADIUS community, InkBridge Networkstook on the task of overhauling its DHCP support. The result is the same highly flexible and configurable DHCP server, but n... Network Security Protocols
Press release: Network Authentication Leader InkBridge Networks Names Its Director of Security FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Network Authentication Leader, InkBridge Networks, Names Its Director of Security As cybert... Network Security Protocols
How to customize an OEM instance of FreeRADIUS As the most popular RADIUS server in the world, FreeRADIUS is used by many hardware vendors. They ship their products with FreeRADIUS as an embedded or “OEM” product. It is common for them to need som... Network Security Protocols
How a RADIUS server works A RADIUS server utilizes a central database to authenticate remote users. RADIUS functions as a client-server protocol, authenticating each user with a unique encryption key when access is granted. Ho... Network Security Protocols