MS-CHAP is dead MS-CHAP has been in use since 1998. It was Microsoft's answer to the challenge of authenticating users over networks, built into every version of Windows and deeply embedded in VPN and Wi-Fi infrastru... Network Security Best Practices Network Security Protocols
Why open-source software wins at proof of concept Here's why open source changes everything about proof-of-concept testing. ByAlan DeKok, CEO, InkBridge Networks I've watched a lot of CTOs react to technical demonstrations over 25 years. Most nod pol... Network Security Best Practices Network Security Protocols
Cisco ISE alternatives: 2026 comparison & buyer's guide Compare pricing, features, and migration paths for top network access control alternatives to Cisco ISE. "We have 50,000 users and the licensing alone is an enormous cost." This is the conversation s... Network Security Best Practices Network Security Protocols
InkBridge Networks in 2025 2025 is the year InkBridge Networks launched the world's first RADIUS conference and championed critical standards work, reinforcing our position as the authentication experts the industry turns to wh... Network Security Protocols
The RADIUS protocol: How it works and why it's secure Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Best Practices Network Security Protocols
30-year RADIUS design flaw fixed at the IETF Montreal 124 hackathon For the past 30 years, RADIUS has had a fundamental problem: in some cases, servers must discard well-formed, authentic packets from known clients. When something goes wrong in a multi-hop proxy envir...
RADIUS Active Directory This comprehensive guide covers everything you need to know about RADIUS Active Directory integration, from basic concepts to enterprise-scale implementations. Microsoft Active Directory has long been... Network Security Best Practices
It’s Finally Time to Replace NTLM With Microsoft deprecating MS-CHAP and NTLM, it’s time for enterprise networks to switch to a more secure authentication method: TTLS. Microsoft is finally deprecating its 30-year-old MS-CHAP and NTLM... Network Security Protocols
Steel-Belted RADIUS Server End-of-Life: What You Need to Know Now Learn why Steel-Belted RADIUS server's end-of-life status puts your network at risk and how to plan your migration to a secure, future-proof authentication solution. If you're still running Steel-Belt... Network Security Best Practices Security Threats and Vulnerabilities
Importing the root CA The final step to configuring EAP for FreeRADIUS is to add the CA (Certificate Authority) to every client machine tha t performs EAP authentication. Before proceeding with this step, make sure that yo... Network Security Best Practices
Don’t "set it and forget it" So you decided that whatever you were using for network security wasn’t getting the job done… either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Network Security Best Practices
How does RADIUS Authorization work? During the process where the user requests access to the RADIUS server, RADIUS authorization and authentication happen simultaneously. An “authentication request” occurs when the Network Access Server... Network Security Protocols