<iframe src="//www.googletagmanager.com/ns.html?id=GTM-P6R2LZ" height="0" width="0" style="display:none;visibility:hidden">

Portnox Blog

Hot Cyber Security Events You Simply Cannot Afford To Miss in 2017

Ofer Amitai

Want to stay ahead of the game? The following list of cybersecurity events will help … and they are fun too..

Read More

5 Reasons to Move your NAC to the Cloud

Juda Thitron

Have you ever thought about migrating your network access control (NAC) to the Cloud? Are you apprehensive about taking this step? Traditional NAC solutions were built to address a premise-based infrastructure. A new next generation NAC approach is required to protect companies in today’s BYOD, cloud-based, IoT world.

Read More

DDoS Attacks are a Loud IoT Wakeup Call for Enterprise Security

Juda Thitron

The recent headline grabbing DDoS attacks on IoT devices that occurred at OVH, Krebs on Security, and DYN, were performed and spread by taking control of IoT devices found today in most homes and offices. These attacks reveal the true danger in our IoT devices - attacking them is child's play. Surprisingly, most users do not bother to change factory default usernames and passwords, making the hackers’ lives much easier.

Read More

Securing VPN remote access with Portnox CLEAR

Juda Thitron

Compromised and stolen credentials remain the main threat to corporate data. Remote access via VPN is the most vulnerable method of access, due to compromised employee credentials. The need for flexible and extremely easy to implement two factor authentication (“2FA”) has become crucial for organizations of all sizes. Another weak link in remote access, beyond user authentication, is generated by connecting to organizational insecure and vulnerable end-points. It is not uncommon that when accessing the network using a VPN through a personal device, any vulnerability existing on that device can quickly become a security hole in the entire network’s protection. To address the heavy challenges of securing remote access, organizations should look for solutions that are cost-effective and provide a cohesive approach for all aspects of access security: compromised credentials, lost or stolen devices and access from insecure endpoints.

Read More

What Portnox CLEAR - Fall 2016 release has in store for cloud-based NAC

Juda Thitron

The complexity and risks of corporate networks are increasing on a daily basis. The growing flood of new devices, new form factors, and rapid changes in network architecture, coupled with a constant shortage of well-trained specialists, requires organizations to choose an IT vendor and partner that is able to keep pace with continuous change. Furthermore, the vendor or partner must constantly deliver new critical capabilities required by organizations to address new security challenges. Portnox CLEAR definitely falls under this category, carefully listening to customer needs, ever innovating, and constantly delivering IT security products.

Read More

Which is best for Your Business: 802.1X VS. A NEXT GENERATION NAC SOLUTION

Idan Kuperman

NAC is making a comeback, and this time it’s IoT (Internet of Things) which is responsible for that. Past waves including the increase of guest and contractor access and BYOD, have resulted in the understanding that the network is no longer composed of securely managed devices.

Read More

Is this NAC solution suitable for your business?

Idan Kuperman

While NAC is most effective when it follows a defined, proprietary security policy that is specific to a particular company, there are some more general considerations that apply to any type of enterprise. These are discussed below.

Read More

The dawn of Massive IoT DDoS Attacks and why it matters

Idan Kuperman

Unless you have been busy climbing the Himalayas for the past couple of months, you’ll have heard a lot about Mirai, a deadly malware causing the largest DDoS attacks to date. Yes Yes, the IoT botnet attack that took down the Internet for users trying to reach an array of sites, including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix.

Read More

Continuous risk assessment of endpoints or a one-time audit?

Juda Thitron

Are you up to speed with your cybersecurity?

Do you really know, in real-time, who is hooked onto your network? Do you have full control of the entire network and all its components, as well as all the devices that need to connect to it? Are all the users keeping their devices secure and free of ransomware?

Read More

The New Normal: Today’s Anytime, Anywhere, Means Companies Need a Different Kind of NAC Solution

Martin Ryan

 Data security – it’s been in the news all summer, mixed up with the upcoming U.S. presidential elections. High profile stories included the infiltration of Hilary Clinton’s campaign, as well as a cyber attack on the computer systems of Donald Trump and Republican Party organizations.

Read More

Get Free Widget