Controlling WiFi Authentication for MSPs

Written by George Lattimore on February 6, 2019

Share This Article

Managed service providers (MSPs) are designated with controlling the IT infrastructure for their clients. It’s how they make their living. The tools they use help determine the kinds of value-add services (VAS) they offer, and ultimately, the level of success their business achieves. While the big tasks like endpoint management, controlling access to IT resources, and enforcing security often get the lion’s share of the attention, controlling WiFi authentication for MSPs is a critical aspect of managing ther IT network for their clients that can’t be overlooked.

Is WiFi a Real Threat to Clients?

WiFi Authentication for MSPs

As you know, networks are no longer wired, and that creates tremendous risk for organizations. Nowadays, anybody can hack into a WiFi network using open source tools and just sitting within reach of WiFi in the parking lot. Whether you have servers, data, applications on-prem or in the cloud, the risk is significant. A hacker could be on your network looking for insecure endpoints, and you wouldn’t even see him/her.

Maybe you’re asking, is this actually a big deal worth worrying about? Well, worrying doesn’t help unless there is action to follow. Considering that 60% of SMBs go out of business within six months of an attack, and almost two-thirds of all cyber attacks are now being directed at small businesses, now’s the time to take action.

Over the Wire and Through the Network


Traditionally, wired networks have some physical security built into the process because a user has to literally be at a port actively running ethernet access. With WiFi networks however, that physical security element is obviously gone. If you’re an MSP, you have probably dealt with these types of security issues to some extent, but let’s take a look at the underlying issue in this situation.

The problem is that controlling access to WiFi networks is usually done through implementing a shared SSID and passphrase, but that isn’t enough anymore. It’s unfortunately still too easy to hack networks through that minimal level of access control. So, seasoned MSPs add another layer of defense with next-gen RADIUS integration. By integrating the WiFi network with a RADIUS server, every user can now be required to have unique credentials to access the WiFi network. The result? A much more significant level of security, and in turn, a stronger WiFi security offering for MSPs to leverage.

Elegant Administration with Cloud RADIUS


But, for MSPs looking to improve their bottom line and build their customer base, more security doesn’t really work if it’s difficult to implement and administrate. Furthermore, if it’s hard for their customers to be efficient with the added security in place, it defeats some of the purpose and devalues the offering. The good news is that there is a cloud RADIUS implementation that makes controlling WiFi authentication for MSPs a breeze.

Without any additional loopholes for end users to navigate, the all-in-one virtual RADIUS solution has an onboard directory service and doesn’t require any changes to endpoints. That means you don’t have to make sure each endpoint is running the correct supplicant. MSPs can simply point their clients’ wireless access points to the cloud hosted RADIUS endpoint and reach immediate gains with a significant increase in security.

Learn More About Controlling WiFi Authentication for MSPs

Cloud RADIUS is included as a security component for MSPs to leverage when using JumpCloud’s Directory-as-a-Service. Furthermore, the Multi-Tenant Portal is designed specifically for streamlining management across multiple client organizations. Access to the MTP is free of charge for any JumpCloud Partner. Apply today and a representative will follow up with details, and feel free to explore the platform for yourself. First 10 users are on the house.

George Lattimore

George is a writer at JumpCloud, a central source for authenticating, authorizing, and managing your IT infrastructure through the cloud. With a degree in Marketing and an MS in Public Communications and Technology, George enjoys writing about how the IT landscape is adapting to a diversified field of technology.

Continue Learning with our Newsletter