It is interesting that cloud RADIUS competition is a trend in the IT network market these days. Even just a few years ago, RADIUS (Remote Authentication Dial-in User Service) protocols within IT networks were a fairly rare occurrence. Despite it being a major step-up in security and control over network access, RADIUS was often viewed as being difficult to implement and manage. In this blog, we will explore why RADIUS is challenging, as well as the reason for an increase in cloud RADIUS competition today.
Before & After RADIUS
The concept of a RADIUS-protected network makes a great deal of sense, especially with today’s WiFi networks. Historically, network access was granted when you were physically inside the building or, later on, when you had the VPN credentials to login remotely. But, with today’s WiFi systems, a malicious user on the outside of the building can easily try to gain access to the network. This sort of threat is plaguing many enterprises and the juicy data that lies within their networks.
The RADIUS protocol, however, prevents this by forcing unique authentication to the WiFi network. Each user needs to present their credentials as part of the WiFi authentication process, and those credentials are usually checked against the central identity provider. Because of all of the integration required, this was often viewed as a painful process, so most IT organizations have avoided it.
The Advent of Cloud RADIUS Competition
But, now a new wave of solutions is emerging to solve this problem via a cloud RADIUS service. The best solutions in the space not only off-board the need for a FreeRADIUS server and make it easy to integrate with existing laptop/desktop functionality, but also integrate the entire user directory service as well. There are no integrations to worry about: just point your WiFi infrastructure to the SaaS RADIUS service, and you have dramatically stepped up your security.
Another benefit to leveraging a hosted RADIUS platform is that you can unify G Suite™ or Office 365™ credentials with your WiFi login. This means that end users don’t have to leverage multiple identities, which (Read more...)
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Zach DeMeyer. Read the original post at: https://jumpcloud.com/blog/cloud-radius-competition/