Client Case Study: RADIUS proxy consolidation for efficiency When an ISP is running a large number of systems at 99% idle capacity "just in case," you know there's room for optimization. We worked with a multi-service provider that had built four separate RADIU... Network Security Best Practices
RADIUS standards compliance: from RFC to WiFi Alliance We believe that standards compliance is critical for customer satisfaction and vendor interoperability. Systems that follow standards have known, documented behaviour, so there are few surprises. Our ... Network Security Protocols
Client Case Study: 802.1X implementation When months of 802.1X implementation attempts failed, we diagnosed firmware bugs and leveraged vendor relationships to deliver a working solution. One of our clients had customer-visible issues in the... Network Security Best Practices
Client Case Study: Slow SQL server performance When a major ISPs RADIUS database slowed to a crawl under growing data loads, we restored full performance without replacing a single system. Here's how proper database architecture beat a hardware up... Network Security Best Practices
Building RADIUS high availability systems that eliminate network downtime Enterprise networks require authentication systems that never fail. Here's how to build RADIUS high availability architecture that delivers true network reliability. When network authentication goes d... Network Security Best Practices
RADIUS Server Proxying We have extensive experience in the WiFi roaming arena, and we are actively involved in vendor forums. Proxying is a key part of most RADIUS infrastructures. We foster relationships with numerous comp... Network Security Best Practices
Optimizing SQL Most telecommunications companies and internet service providers (ISPs) use SQL databases to store the bulk of their user information. While we spend a lot of time on RADIUS, the reality is that any c... Network Security Best Practices