Network design for multi-site RADIUS systems Some organizations and network operators such as ISPs can use a central RADIUS service for all of their RADIUS needs. This configuration is possible when there are a small number of users, or system l... Network Security Best Practices
Separating Authentication from your RADIUS Accounting server Many ISP networks and enterprise environments handle both Authentication and Accounting functions through the same RADIUS servers anddatabases. While this configuration works well for small and low-lo... Network Security Best Practices Network Security Protocols
Looking Forward to IETF 122 We have been involved in the Internet Engineering Task Force (IETF) for a few decades now. During that time, we have written many of the RADIUS standards. We are still involved in the standards proces... Network Security Protocols
Inaugural RADIUS Conference Set for March 12–13, 2025 FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Inaugural RADIUS Conference Set for March 12–13, 2025 The first-ever global RADIUS conferen... Network Security Protocols
A win for network and information security: InkBridge Networks awarded for fast, safe, reliable network access FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com A win for network and information security: InkBridge Networks awarded for fast, safe, relia... Network Security Protocols
Authorized users only: Why use RADIUS and 802.1x to control network access? RADIUS can be an alternative to implementing 802.1x for network access control in complex enterprise environments. Controlling which users and what devices are on your network has become significantly... Network Security Best Practices
Press release: Network Authentication Leader InkBridge Networks Names Its Director of Security FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Network Authentication Leader, InkBridge Networks, Names Its Director of Security As cybert... Network Security Protocols
Three Reasons to Protect Your Network Against BlastRADIUS There are mixed feelings in the security community about the urgency to protect networks from the BlastRADIUS vulnerability. Why fix a 30-year-old design flaw that can only be exploited by someone alr... Security Threats and Vulnerabilities
Expert Advice Beats Internet Wisdom: What Not To Do About BlastRADIUS There’s a lot of misinformation circulating about the BlastRADIUS vulnerability. For us, as RADIUS experts, it’s a depressing reminder of how little people understand about this foundational protocol ... Network Security Best Practices Network Security Protocols Security Threats and Vulnerabilities
PAP vs CHAP. Is PAP less secure? One of the most common questions about RADIUS security asks “Is PAP secure?” The usual answer is “no”, which is (in our opinion) seriously misleading. A better answer is “Here’s a comparison of PAP an... Network Security Best Practices Network Security Protocols
BlastRADIUS Neutralized: Experts at InkBridge Networks Provide Fix for Critical Network Vulnerability FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]:The RADIUS experts at InkBridge Networks have developed a blueprint to resolve... Security Threats and Vulnerabilities
NetworkRADIUS Rebrands as InkBridge Networks, Expands to Support Broader Network Challenges for Enterprises FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]: NetworkRADIUS is rebranding as InkBridge Networks, and expanding its focus as...