Why open-source software wins at proof of concept Here's why open source changes everything about proof-of-concept testing. ByAlan DeKok, CEO, InkBridge Networks I've watched a lot of CTOs react to technical demonstrations over 25 years. Most nod pol... Network Security Best Practices Network Security Protocols
Cisco ISE alternatives: 2026 comparison & buyer's guide Compare pricing, features, and migration paths for top network access control alternatives to Cisco ISE. "We have 50,000 users and the licensing alone is an enormous cost." This is the conversation s... Network Security Best Practices Network Security Protocols
RADIUS Active Directory This comprehensive guide covers everything you need to know about RADIUS Active Directory integration, from basic concepts to enterprise-scale implementations. Microsoft Active Directory has long been... Network Security Best Practices
We toppled a $500 million industry with free software Why your "enterprise-grade" million-dollar solution is getting outmaneuvered by free software running on commodity hardware by Alan DeKok, CEO Twenty-five years ago, I started building FreeRADIUS in m... Network Security Best Practices Network Security Protocols
Client Case Study: Enterprise network security Global enterprises could lose millions of dollars in minutes without ironclad network security. Learn how industry leaders—including Goldman Sachs, Siemens, and a national US bank—protect critical dat... Network Security Best Practices
The unique challenges of campus networks By Terry Burton, Director of Security Table of contents What is a campus area network? 7characteristics of campus networks Universities function as their own ISPs Massive user community with constant ... Network Security Best Practices Network Security Protocols
Don’t "set it and forget it" So you decided that whatever you were using for network security wasn’t getting the job done… either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Network Security Best Practices
Can you use FreeRADIUS and Active Directory together? The short answer is Yes, FreeRADIUS and Active Directory arecompatible with each other . However, there are some constraints and implications for the rest of the system. Like any technology choice, Ac... Network Security Best Practices Network Security Protocols
FreeRADIUS hardware requirements A common question for people installing the server is “what are the hardware requirements for FreeRADIUS?” The answer is both simpler, and more complex than you would think. The performance of a RADIU... Network Security Best Practices
What are TLS session tickets? In many environments, the same group of users will authenticate to the Wi-Finetwork multiple times a day. TLS session tickets help to streamline this process by doing a full authentication only once a... Network Security Best Practices
Enterprise ransomware prevention starts with network authentication When properly implemented, network authentication can serve as a powerful barrier against ransomware attacks, stopping bad actors before they gain the initial foothold they need. In 2024, the number o... Network Security Best Practices Security Threats and Vulnerabilities
Database design principles for RADIUS systems Database design is often overlooked as a critical element of a RADIUS ecosystem. In practice, when we work with our clients, we usually spend the bulk of our time optimizing the database architecture.... Network Security Best Practices