<iframe src="//www.googletagmanager.com/ns.html?id=GTM-P6R2LZ" height="0" width="0" style="display:none;visibility:hidden">

Portnox Blog

Which is best for Your Business: 802.1X VS. A NEXT GENERATION NAC SOLUTION

NAC is making a comeback, and this time it’s IoT (Internet of Things) which is responsible for that. Past waves including the increase of guest and contractor access and BYOD, have resulted in the understanding that the network is no longer composed of securely managed devices.

Read More

Is this NAC solution suitable for your business?

While NAC is most effective when it follows a defined, proprietary security policy that is specific to a particular company, there are some more general considerations that apply to any type of enterprise. These are discussed below.

Read More

The dawn of Massive IoT DDoS Attacks and why it matters

Unless you have been busy climbing the Himalayas for the past couple of months, you’ll have heard a lot about Mirai, a deadly malware causing the largest DDoS attacks to date. Yes Yes, the IoT botnet attack that took down the Internet for users trying to reach an array of sites, including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix.

Read More

Continuous risk assessment of endpoints or a one-time audit?

Are you up to speed with your cybersecurity?

Do you really know, in real-time, who is hooked onto your network? Do you have full control of the entire network and all its components, as well as all the devices that need to connect to it? Are all the users keeping their devices secure and free of ransomware?

Read More

The New Normal: Today’s Anytime, Anywhere, Means Companies Need a Different Kind of NAC Solution

 Data security – it’s been in the news all summer, mixed up with the upcoming U.S. presidential elections. High profile stories included the infiltration of Hilary Clinton’s campaign, as well as a cyber attack on the computer systems of Donald Trump and Republican Party organizations.

Read More

Your VPN is Only as Strong as its Least Secure Endpoint

If you are like most companies, your corporate VPN is a critical part of your infrastructure—and it’s getting a heck of a workout. Thirty-seven percent of all workers in the U.S. now telecommute. Even if your workers are in a more traditional office, many of your employees will be traveling at any given moment. You might even have remote offices in other countries. With so many remote workers taking up bandwidth on your VPN, how do you audit their devices?

Read More

How to Set up a Successful NAC Project

If you can’t beat them, join them. At least when it comes to employees bringing their own device onto the network or IoT (Internet Of Things) devices on the network. In this piece we detail six typical generic steps network administrators can take to ensure a fast and effective installation of their NAC (Network Admission Control or Network Access Control) project. However, the order of these steps will depend on the individual project, so remember to adjust your process accordingly.

Read More

Can Your NAC Solution Protect Operational Healthcare Technology?

Despite increased awareness of the need to secure electronic health records, cybercriminals are still finding a way to access sensitive patient records.

Read More

Wireless Guest Network in less than 10 seconds

We’re happy to announce the production readiness of our new and innovative capabilities: a cloud-based Guest Network with a highly customizable CLEAR Captive Portal.

Read More

Top network management tools: How many of them are you using?

A network administrator can only be as strong as her toolbox. Every day, an admin faces a myriad of network problems, big and small. To efficiently solve a problem, an admin needs a “toolbox” of network management tools, programs and solutions that can time and time again handle troubleshooting, monitoring, passwords glitches, IP allocations and any situation that can slow employee progress.

Read More

Get Free Widget