Corporate

How does our secure onboarding service work?

Standard routers are not ready for the managed enterprise environment. The network password (WEP/WPA PSK) is stored on the router or WLAN controller and infrequently or never changed leading to the following potentially costly issues.

  • Single shared passwords make network penetration easier for hackers to gain access
  • Ex-employees and guests still have access to network resouces where password has not been updated
  • No effective device or user tracking and bandwidth monitoring
  • Password is often written down for all to see or find
  • User needs to manually connect their device at each location

Fortunately our solution to this is easy to implement, low cost and more devices than ever are supporting WPA2-Enterprise including most Android, iOS, and Windows devices. Read on to learn more about how the solution works.

Authentication Flows

By using a WPA2-Enterprise service the authentication takes place at a central location and is unique to each user meaning that you can configure a device once and you will automatically connect on every site using the service. Easy! In addition stronger encryption and the ability to remove an individual user from the network makes the whole process more secure and saves money on network administration time.

Standard WEP/WPA/WPA2 PSK (Pre-Shared Key) – Shared Password

Enhanced WPA/WPA2-Enterprise (802.1x) – Per-User/Device Credentials

Credentials are never stored on wireless router and are centralised. User or device access can be removed or updated without interrupting other network users.

Getting Connected (3-Step)

We offer the easiest 3-step process which gets users online quickly and eliminates the risk of writing down shared network passwords for all to see. This can be done through the dashboard by a network administrator or you can broadcast a branded self-enrolment network for users to sign up devices. This is ideal in a BYOD (Bring Your Own Device) environment where you enable staff to connect their personal devices.

3-Step Onboarding

Keeping Track

The service logs every connection, its time, duration and data usage to allow you to monitor network utilisation and to reduce support time and cost by proactively planning network maintenance and upgrades. This is because thanks to the dashboard you know your busy times and user disconnect records also enable you to trouble shoot connection issues more easily because they store the reason for the network disconnect. (I.e. Port-Error could indicate a misconfigured wireless router or access point).

What About My Road Warriors!

No problem. With the credentials created you can also offer a secure VPN service to ensure your remote users are secure. This can be on premisis for access to local resources or a cloud based offering just to make sure you have control over user traffic. So when your users connect from an unsecure cafe hotspot they can tunnel their traffic secureley.