802.1X Identity-Based Network Access Architecture

802.1X Projects: Deploying the Identity-Based Architecture in the Field

802.1X Projects: Deploying the Identity-Based Architecture in the Field 802.1X projects look like a network job from the outside; because the points of contact are switch ports, SSIDs, and RADIUS. But in real life, the success of 802.1X is often determined not on the network devices, but in the Active Directory structure, the certificate infrastructure (PKI), and endpoint management. The reason is simple: 802.1X forces the organization to talk about its “identity model” rather than just the port’s VLAN. In other words, you transition from “which port belongs to which VLAN” to a system of “which identity enters the network with what authority.” ...

January 14, 2026 Â· 18 min Â· Barash Helvadzhaoglu
The Zero Trust Mindset: Engineering Security as an Architecture, Not a Product

The Zero Trust Mindset: Engineering Security as an Architecture, Not a Product

The Zero Trust Mindset: Engineering Security as an Architecture, Not a Product Zero Trust is a concept mentioned in almost every security presentation today. However, when we look at its implementation in the field, we often see it applied in the wrong place, with wrong expectations, and using the wrong tools. The main reason for this is that Zero Trust is positioned as a technology or a purchasable product. In reality, Zero Trust is not a licensed, boxed, or vendor-specific solution. It is an architectural perspective and, more importantly, a mindset. ...

January 3, 2026 Â· 7 min Â· Barash Helvadzhaoglu