Expert Advice Beats Internet Wisdom: What Not To Do About BlastRADIUS There’s a lot of misinformation circulating about the BlastRADIUS vulnerability. For us, as RADIUS experts, it’s a depressing reminder of how little people understand about this foundational protocol ... Network Security Best Practices Network Security Protocols Security Threats and Vulnerabilities
PAP vs CHAP. Is PAP less secure? One of the most common questions about RADIUS security asks “Is PAP secure?” The usual answer is “no”, which is (in our opinion) seriously misleading. A better answer is “Here’s a comparison of PAP an... Network Security Best Practices Network Security Protocols
Client Case Study: Slow network performance When the pandemic hit, thousands of employees suddenly needed remote access overnight. This aerospace company's "simple" Python-based authentication system became their biggest business threat—until o... Network Security Best Practices
Client Case Study: RADIUS proxy consolidation for efficiency When an ISP is running a large number of systems at 99% idle capacity "just in case," you know there's room for optimization. We worked with a multi-service provider that had built four separate RADIU... Network Security Best Practices
Client Case Study: Slow SQL server performance When a major ISPs RADIUS database slowed to a crawl under growing data loads, we restored full performance without replacing a single system. Here's how proper database architecture beat a hardware up... Network Security Best Practices
Building RADIUS high availability systems that eliminate network downtime Enterprise networks require authentication systems that never fail. Here's how to build RADIUS high availability architecture that delivers true network reliability. When network authentication goes d... Network Security Best Practices
User Authentication Performance The current Covid-19 crisis has created an unprecedented situation for businesses. More people are working remotely than ever before, in order to maintain corporate productivity in the face of this cr... Network Security Best Practices
LDAP and Active Directory LDAP databases are most typicallyused by enterprises to store employee credentials, telephone numbers, etc. Some ISPs also use LDAP, but it's not as wide spread as the ISP use of SQL. The common imple... Network Security Best Practices