Call a Specialist Today! 844-294-0775

Private Pre-Shared Key: Simplified Authentication
Technology Behind the Solution

Organizations that are planning wireless LAN’s to support corporate devices, BYOD, guest access, may be struggling to find the balance between flexibility and security. Though using IEEE 802.1X is the most secure approach to Wi-Fi authentication, this method is typically only implemented for devices managed by IT. For BYOD, contractors, or guests, the IT staff may not have the access, time, or knowledge to provision certain devices. Alternatively, Pre-Shared Key’s offer organizations simplicity, however, with every device sharing the same key across an SSID, the ability to control and monitor individual devices is lost. Additionally, if the key is compromised, it must be changed on every single device that uses it which is not scalable.

Authentication with Private Pre-Shared Key Diagram

Benefits

Wireless LAN Requirement & Features PSK - WPA/WPA2 Personal Private PSK - WPA/WPA2 Personal IEEE802.1X - WPA/WPA2 Enterprise
No complex configuration required for clients
Unique Keys Per User on Single SSID
Can revoke an individual user's key or credentials when they leave the company or their wireless device is compromised, lost or stolen
Supports different VLAN, QoS, Firewall or Tunnel policy for different users on same SSID
Does not require certificates to be installed on clients
Uses 802.11i standard mechanisms for securing the SSID Depends on Client
Keys are dynamically created for users upon login to the network and are rotated frequently
Can be used to perform machine authentication
If one user is compromised, no other users keys can be compromised

Personalized Access

Personalized Access

Aerohive's Security Suite

Private PSK - Simple and Secure

A simple yet powerful authentication method:

Application Visibility and Control

Provides IT with visibility and granular control over mobile applications:

BYOD and Guest Management

Cloud-based ID Manager application enables simple and secure on-boarding of transient and personal devices:

Protection Inside and Out

With a range of protection services built into every access point, you can safely unleash mobility throughout your organization:

End-to-End Security

With a rich set of partner integrations and API’s, administrators can seamlessly extend mobile device security beyond the edge of the network: