You will be a part of our in-house R&D team that develops and improves our primary network access control (NAC) product for our customers. You will have the chance to collaborate with teams from across the company, including Product and Customer Success.
5+ years of experience in C# development
Excellent .NET skills focusing on C# and ADO .NET – Must
Knowledge in web development concepts (REST API, JSON, AJAX) – Must
Knowledge in OOP and MultiThreading
Knowledge of relational databases and MS SQL – Advantage
Knowledge in Networking – Advantage
BA/B.Sc. in Computer Science
We are looking for a developer with an outside-the-box approach to work who is detail-oriented and enjoys solving a good mystery. If that sounds like you, we encourage you to send your CV to firstname.lastname@example.org.
We are looking for an experienced DevOps engineer that will be responsible for a combination of system administration and platform engineering with direct responsibility for the builds and ongoing support of multiple environments.
Your focus will be on DevOps functions including continuous delivery, monitoring, and improvement of the platform. You’ll work closely with stakeholders like product and support and act as the focal point for our global development teams.
Develop CI/CD infrastructure and methodology.
Maintain and configure development tools in Azure Devops
Manage builds and upgrade process
Monitoring and analyzing cloud resource usages
Optimize resource usage to increase product performance and reduce infrastructure cost
Design and implementation automation solution for proactive product errors handling
Build visual analytics reports for internal in-product data and cloud infrastructure usage for management and customer success teams
An expert in operating Azure cloud or AWS
Minimum of 6 years’ experience in developing and automating workflows in Azure DevOps
Experience working with C# – advantage
Strong interpersonal and communication skills
Excellent trouble-shooter, utilizing a systematic problem-solving approach
Partnership Will Drive Increased Adoption of Portnox’s Cutting-Edge NAC Solution Purpose-Built for Large Distributed Organizations in the Region
LONDON — Portnox, which supplies network access control (NAC), visibility and device risk management to organizations of all sizes, today announced that it has partnered with Distology for the sole distribution and resell of its cloud-delivered NAC-as-a-Service solution in the United Kingdom and Ireland.
We chose to partner with Distology because of their successful history of IT security solution distribution in the UK and Irish markets, said Portnox CEO, Ofer Amitai. Were confident this collaboration will yield tremendous growth for both parties, as Portnox has a unique value proposition and Distology has the market enablement expertise to effectively evangelize our network security offering.
We have a long-established relationship with Portnox and it speaks volumes that the team have decided to choose Distology as their sole UK&I distributor. The technology Portnox brings to the market is incredibly exciting and complements our existing vendor stack effortlessly, said Stephen Rowlands, Head of Sales for Distology. Were especially looking forward to representing and promoting Portnox Clear to our growing partner base, as this brand-new cloud-based technology has potential to completely disrupt the market and we foresee masses of growth potential in this innovative product.
Portnox introduced its cloud-delivered NAC-as-a-Service solution to the UK & Irish markets less than two years go. As the first to bring NAC to the cloud, Portnox has quickly gained a foothold in the region, particularly among large distributed enterprises in the retail, construction and utilities industries.
The adoption of our NAC-as-a-Service product in the UK has been very strong to date, said VP of Products, Tomer Shemer. This is a testament to the fact that the UK is one of the markets leading the trend of cloud security adoption. We expect to see continued growth in the coming years in this area of Europe.
Portnox is set to exhibit at this week’s RSA 2020 Conference (booth #4234) in San Francisco, February 24-28. Additionally, Portnox (booth #G108) and Distology (booth #C40) will both be exhibiting at InfoSec Europe 2020, Europes largest event for information and cyber security, in London, June 2-4.
Distology is a Market Enabler and offers true value for the distribution of disruptive IT Security solutions. The vendors we work with represent innovative and exciting technology that continues to excite and inspire their reseller network. Our ethos is based on trust, relationships, energy and drive and offers end to end support in the full sales cycle providing vendor quality technical and commercial resource.
Portnox is looking for an experienced frontend developer to join our team and lead our new product UI development.
Portnox provides next-generation network access control and management solutions that enable organizations to reduce risk and enforce security policy compliance with NAC On Premise and Cloud solutions.
We are a family and we work together to develop innovative and high end solutions while at the same time keep our work-life balance and our family atmosphere.
Your responsibilities will be:
To lead the development & design of our product new UI
Development and design of testing infrastructure
You have the following experience & knowledge:
At least 5 years’ experience in Frontend development
Experienced in RESTful services and API’s
Experienced with relational databases SQL Server – advantage
At least 3+ years working with: ASP.NET, MVC
You know CSS preprocessor (Less, SCSS, etc…)
Experienced with Backend network communications (WCF)
You have the following experience & knowledge
Looking for a place to that you will leave a mark, where you will impact directly on the product, the team and the customers
Independent, with a strong sense of ownership
Creative person that thrive from solving problems and deliver high-end solutions
A team player that likes to be a part of a family type team
Portnox seeks a hungry and energetic Sales Development Representative to provide pre-sales support for our growing sales teams in the U.S. and U.K. This role will report into the Director of Marketing, and will be responsible for generating new leads via cold calling, email, LinkedIn and more. Additionally, the SDR will be tasked with servicing inbound leads and related inquiries with a focus on engaging and initially qualifying all prospective customers.
Generate warm leads for Portnox account executives via cold calling, email and other channels
Respond, engage and qualify inbound leads and inquiries
Schedule demos and meetings for account executives
Work closely with Sales to develop account intelligence, use case opportunities and more
Hold intelligent and engaging conversations over the phone and via email
Act as the subject matter expert on Portnox product offerings
Demonstrated ability to collaborate with a distributed sales team
Capability of understanding customer pain points and requirements
Strong communication skills – written, verbal, presentation
Ability to manage numerous requests and time demands concurrently
Promotes a strong sense of urgency for reaching goals and key deliverables
Team player than can quickly understand the team dynamic
A desire to “win” both individually and as a team
BA/BS degree in business, marketing or another relevant field
When implementing any insurance policy, you need to start with estimating the level of risk, the probability of that risk, and the potential damage should that risk become a reality.
One of the network risks that is often presented to demonstrate the ineffectiveness of 802.1x solutions is the ease of bypassing modern network access control (NAC) by using MAC spoofing. Usually, this involves spoofing the network printer or other vulnerable device.
Now, let’s put aside the fact that network printers today can support certificate or credential-based authentication, and that certain products have remedies against such attempts even when the authentication is based on MAC.
Let’s consider: is MAC spoofing a legitimate threat or an exaggerated, manageable flaw?
But before I try to analyze this risk, I want to point out the biggest advantage a NAC solution can give an organization to cope with modern cyber security threats: the ability to apply dynamic segmentation based on device type or identity.
Without going into too much detail, NAC is one of the only systems that can help you prevent lateral movement, indirectly allowing you to identify breaches and directly helping you to prevent the compromise of your crown jewels.
The threat landscape
Here are some of the most common adversaries when it comes to MAC spoofing:
The employee – a disgruntled current or former employee
The guest – a contractor, customer, patient, etc. who physically visits your organization for a period of time
The hacker – a malicious person trying to attack your network and steal information, causing harm to your organization
And here are the most common attack surfaces:
Wired, ethernet switches
One caveat: most wifi environments contain managed devices. So, for devices that do not have an 802.1x supplicant, and thus does not support certificate-based authentication (or credentials based), it is easy to setup an isolated segment and significantly lower the risk of attack.
As such, we’ll put our focus on examining wired environments, and how they’re vulnerable to the above adversaries.
Let’s be clear – MAC spoofing requires some technical knowledge to execute, which the non-technical lay person typically does not possess. Those doing it know what they’re doing, and they know it’s wrong.
With that said, it’s important to point out that a lot of damage is caused by the unintended – i.e. people clicking on a link in an email, deleting the wrong record or file, or even dropping a laptop into a pool.
Employees should be trustworthy. If they’re not, cyber security is likely not your problem. But, when someone is fired, laid off, or even just mistreated at work, there always exists the potential for them to hold a grudge. It’s human nature.
Disgruntled employees can pose a big risk. If an employee still works for an organization and he/she is determined to do damage, that’s a problem that’s nearly impossible to prevent. The network connection alone is not going to stop he/she from stealing data or worse. This individual likely already has access through other corporate devices and the credentials to access whatever data he/she wants.
At the end of the day, however, this individual’s risk of MAC spoofing can be categorized as “very low” with “low” probability and “low” potential for damage. The reason being is that the potential damage done is not necessarily related to network connection. The first line of defense against a disgruntled current of former employees is physical barriers – i.e. locked doors and other physical security.
A guest visiting your office might want to connect to your network. Most likely, this guest will not go to great lengths to hack your network if they are initially blocked. By supplying a guest network, such as a guest wifi, you will effectively eliminate that risk all together. Thus, like the employee, this individual’s risk of MAC spoofing can be categorized as “very low” for both probability and damage.
A hacker will need physical access to your network in order to do his/her job. Today, spearhead attacks can enable hackers to access your networks from afar. Doing so, however, typically requires some sort of motive.
This motivation is often dependent upon the type of business you operate. If you’re in military and defense, for example, you likely have a higher than average risk of being the target of such an attack. The same going for banking and financial services, healthcare and any other industry with highly sensitive and confidential data.
For most organizations, the threat of physical access hacking is typically low, while the potential for damage could be high. Should a retailer fear physical burglary just because a new device has connected to its network? I think not.
For most organizations, the risk of MAC spoofing is almost non-existent. This is usually fairly easy for an auditor to demonstrate, and would appear as part of a comprehensive security report. So in reality, the perception of the threat is that it’s a much larger problem than it actually is.
You can also prevent MAC spoofing by implementing stronger authentication methods that are fairly common today. One of the major roles of NAC is to provide secure authentication and authorization to the network. Thus, even if authentication is somehow breached, authorization serves as a second layer of defense that can limit access by putting potential individuals of risk in a specific “narrow” segment.
The segmentation of specific types of MAC-based devices is a best practice in NAC. Even if spoofing occurs, such a device won’t be able to access a particularly sensitive VLAN, such as those in Finance or HR, if proper segmentation has been established through your network security policies.