Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

Top network management tools: How many of them are you using?
A network administrator can only be as strong as her toolbox. Every day, an admin faces a myriad of network problems, big and small. To efficiently solve a problem, an admin needs a “toolbox” of network management tools, programs and solutions that can time and time again handle troubleshooting, monitoring, passwords glitches, IP allocations and…
Read more»
Network Admins: How Many of These 5 Morning Rituals Do You Follow?
Mornings can be rough. If you’re a network administrator, the beginning of a day can be particularly difficult. You come into work not only wondering how your company’s systems fared in the eight hours or so since you slept and last checked statuses, but you also dread dealing with the many new issues that will…
Read more»
Network Visibility: How Can You Protect What You Don’t Know Exists?
This is the third post in the series about Network Access Control (NAC) is and why it is a central element to keeping enterprise environments protected. Network visibility or endpoint visibility, is the essence of cybersecurity. How can you protect something that you don’t know exists? How can you identify the weakest links in your network…
Read more»
We Love LDWin & Believe You Will Too
Are you frustrated by your network mess? Do you occasionally wonder where those tangled bunches of cables go when they seem to run behind a heavy, often dusty piece of storage equipment that no one dares to touch? I’ve been there many times. I’ve struggled with similar issues and couldn’t figure out where a cable…
Read more»
Choosing The right NAC Solution – How to lasso your devices
It’s no fun herding cats. They are difficult to control, and it’s nearly impossible to tell one cat from another when they’re scattered all over the place. Network administrators undoubtedly can relate. Controlling their company’s network access essentially amounts to “herding” numerous independent devices that are sometimes unpredictable (they’re not all safe) and hard to…
Read more»
Risk Adaptive Access Control and Why You Should Care About It
Access to digital information is typically password protected. A password is something only you know (with the help of the yellow Post-it on your computer screen!). But is a password enough to protect a digital asset? Password protection, if you stop to think about it, really resembles real life: When you are keeping something safe,…
Read more»
TOP 5 MOST COMMON Network Access Control PITFALLS
According to cio.com, IT executives (not IT professionals) often have misgivings about traditional security platforms such as firewalls and Intrusion Detection and Prevention Systems IDS\IPS. It argues, “That false sense of security can have IT executives not only disconnected with the reality of their security situations, but having a blind spot from what threats are…
Read more»
Port Security & Network Access – Quarntining Rogue Access Points
Before you read this blog post, be sure to check out the first part of this series: “Network Access Control – A Bird’s Eye View”” for an introductory read on the vast and wide-ranging topic surrounding Network Access Control (NAC). Originally, NAC was about blocking devices and restricting access, and in many ways, this still…
Read more»
birds eye view of NAC
Network Access Control: A Bird’s Eye View (Part 1)
In the next few blog posts, I’ll outline what Network Access Control (NAC) is and why it is a central element to keeping enterprise environments protected. This post is suitable not only for beginners to the world of network security management, but is also relevant to those more knowledgeable on the topic. We’ll be giving…
Read more»
How Modern Networking Enviroments Drive The Need For Comprehensive NAC
Most enterprises have, at some stage, attempted to implement Network Access Control (NAC) – and for good reason. Network Teams need to know what’s happening in their environments, clients need to work seamlessly, and IT leaders need to know that the network is secure, safe and reliable. Most solutions overpromise but woefully miss the mark,…
Read more»
7 NAC solution Quotes that’ll close the deal
“Today, NAC is often positioned as a security solution to the BYOD era, but it is also increasingly becoming a very useful tool in network management — acting as a gatekeeper to the network.” – TechTarget, Rob Shapland, First BAse Technologies “NAC was intended to solve real problems and answer real questions: who is connecting…
Read more»
Introducing Portnox CLEAR: A SaaS Solution for Network Visibility & Risk Management
Portnox CLEAR™ is a Security-as-a-Service (SaaS) solution that delivers continuous, off and on premises risk monitoring of all of your endpoints.  It assigns a risk score across all device access, assesses their risk levels and takes actions in real time. You’ll even get a customized report featuring device-specific risk profiling each day. CLEAR’s portal can…
Read more»