After the latest IOS release on September 19, 2017. IPhone users have complained that they are unable to connect to their respective networks when they have a company enforced authentication method in place. Continue reading and see how you as an administrator can resolve this issue!
On October 16, 2017, a statement from the International Consortium for Advancement of Cybersecurity on the Internet (ICASI) was released alerting the industry to a series of vulnerabilities for WPA and WPA2. These vulnerabilities affect a large number of wireless infrastructure devices and wireless clients, across many vendors. This security flaw means that, for vulnerable clients and access points, WPA and WPA2-encrypted Wi-Fi traffic is no longer […]
After receiving so many requests to explain the difference between a UTM (Unified Threat Management) and NGFW (Next Generation Firewall), I came across a great video that explains it in detail and decided we should shed some light on it and help customers and partner to better understand the difference.