MS-CHAP is dead MS-CHAP has been in use since 1998. It was Microsoft's answer to the challenge of authenticating users over networks, built into every version of Windows and deeply embedded in VPN and Wi-Fi infrastru... Network Security Protocols
Why open-source software wins at proof of concept Here's why open source changes everything about proof-of-concept testing. ByAlan DeKok, CEO, InkBridge Networks I've watched a lot of CTOs react to technical demonstrations over 25 years. Most nod pol... Industry Insights and Trends
Cisco ISE alternatives: 2026 comparison & buyer's guide Compare pricing, features, and migration paths for top network access control alternatives to Cisco ISE. "We have 50,000 users and the licensing alone is an enormous cost." This is the conversation s... Enterprises Network Security Best Practices
InkBridge Networks in 2025 2025 is the year InkBridge Networks launched the world's first RADIUS conference and championed critical standards work, reinforcing our position as the authentication experts the industry turns to wh... Industry Insights and Trends
The RADIUS protocol: How it works and why it's secure Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Protocols
30-year RADIUS design flaw fixed at the IETF Montreal 124 hackathon For the past 30 years, RADIUS has had a fundamental problem: in some cases, servers must discard well-formed, authentic packets from known clients. When something goes wrong in a multi-hop proxy envir...
RADIUS Active Directory This comprehensive guide covers everything you need to know about RADIUS Active Directory integration, from basic concepts to enterprise-scale implementations. Microsoft Active Directory has long been... Enterprises FreeRADIUS Technical Guides
It’s Finally Time to Replace NTLM With Microsoft deprecating MS-CHAP and NTLM, it’s time for enterprise networks to switch to a more secure authentication method: TTLS. Microsoft is finally deprecating its 30-year-old MS-CHAP and NTLM... Enterprises Security Threats and Vulnerabilities
Steel-Belted RADIUS server end-of-life: What you need to know now Learn why Steel-Belted RADIUS server's end-of-life status puts your network at risk and how to plan your migration to a secure, future-proof authentication solution. If you're still running Steel-Belt... Enterprises Security Threats and Vulnerabilities
Importing the root CA The final step to configuring EAP for FreeRADIUS is to add the CA (Certificate Authority) to every client machine tha t performs EAP authentication. Before proceeding with this step, make sure that yo... FreeRADIUS Technical Guides
Don’t "set it and forget it" So you decided that whatever you were using for network security wasn’t getting the job done… either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Enterprises Network Security Best Practices
How does RADIUS Authorization work? During the process where the user requests access to the RADIUS server, RADIUS authorization and authentication happen simultaneously. An “authentication request” occurs when the Network Access Server... Network Security Protocols