InkBridge Networks - A new name for Network RADIUS

Enterprise

We understand corporate networks

Locked down corporate Wi-Fi

Can a disgruntled former employee access your corporate Wi-Fi from the parking lot and steal confidential information?


Most enterprises have controls in place to limit access to their physical network. However, Wi-Fi access is often left wide open. Our RADIUS solution ensures that Wi-Fi access is limited to authorized users only, keeping your network safe. 

Trusted by Fortune 50 companies

Some of the most security conscious companies in the world trust InkBridge to protect their networks. Goldman Sachs, Bank of America, Google, and others, use our technology. You should too.


Easy client configuration

RADIUS can be complex to implement in enterprise environments because each client machine must be configured and kept up to date. Our proprietary tools remove configuration headaches by dramatically simplifying client onboarding.




Flexible network policies

Enterprises often need to manage complex network policies. For instance, MAC address authentication can be used to place VOIP phones or other devices into separate VLANs. Or VPN access might be restricted to certain groups of people. Implementing these complex rules is easy with our flexible policy engine and interpreter.

 


Trusted By


Learn More

Can you use Active Directory with FreeRADIUS?

The short answer is Yes, Active Directory is compatible with FreeRADIUS. However, there are some constraints and implications for the rest of the system.

Scaling your RADIUS ecosystem

Not all RADIUS systems are the same, and the system architecture can vary wildly. For example, a network design which works well for 10,000 users will likely not work well for 10,000,000 users. It can be difficult to just “scale up” a RADIUS system. In most situations, the entire system architecture has to change.

How one-time passwords work

One-time passwords (OTP) and multi-factor authentication (MFA) are important mechanisms used to improve security. While one-time passwords are useful, the authentication method that is used to transmit the user’s credentials may not be compatible with the use of OTP.

We won’t fill your inbox with self-serving marketing fluff

Our newsletter serves up best practices, how-to guides, and answers to common questions we encounter in the networking community.