Portnox Blog
Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.
Network Security
Wireless Guest Network in Less Than 10 Seconds
We’re happy to announce the production readiness of our new and innovative capabilities: a cloud-based Guest Network with a highly customizable CLEAR Captive Portal. Portnox CLEAR customers who added guest subscription can now offer their corporate visitors, contractors, students and customers Wi-Fi connectivity following less than 10 seconds (!!!) of configuration, without having to install…
Read more» Network Access Control
Top network management tools: How many of them are you using?
A network administrator can only be as strong as her toolbox. Every day, an admin faces a myriad of network problems, big and small. To efficiently solve a problem, an admin needs a “toolbox” of network management tools, programs and solutions that can time and time again handle troubleshooting, monitoring, passwords glitches, IP allocations and…
Read more» Network Security
Network Admins: How Many of These 5 Morning Rituals Do You Follow?
Mornings can be rough. If you’re a network administrator, the beginning of a day can be particularly difficult. You come into work not only wondering how your company’s systems fared in the eight hours or so since you slept and last checked statuses, but you also dread dealing with the many new issues that will…
Read more» Network Security
Network Visibility: How Can You Protect What You Don’t Know Exists?
This is the third post in the series about Network Access Control (NAC) is and why it is a central element to keeping enterprise environments protected. Network visibility or endpoint visibility, is the essence of cybersecurity. How can you protect something that you don’t know exists? How can you identify the weakest links in your network…
Read more» Network Security
We Love LDWin & Believe You Will Too
Are you frustrated by your network mess? Do you occasionally wonder where those tangled bunches of cables go when they seem to run behind a heavy, often dusty piece of storage equipment that no one dares to touch? I’ve been there many times. I’ve struggled with similar issues and couldn’t figure out where a cable…
Read more» Network Access Control
Choosing The right NAC Solution – How to lasso your devices
It’s no fun herding cats. They are difficult to control, and it’s nearly impossible to tell one cat from another when they’re scattered all over the place. Network administrators undoubtedly can relate. Controlling their company’s network access essentially amounts to “herding” numerous independent devices that are sometimes unpredictable (they’re not all safe) and hard to…
Read more» Network Security
Risk Adaptive Access Control and Why You Should Care About It
Access to digital information is typically password protected. A password is something only you know (with the help of the yellow Post-it on your computer screen!). But is a password enough to protect a digital asset? Password protection, if you stop to think about it, really resembles real life: When you are keeping something safe,…
Read more» Network Access Control
TOP 5 MOST COMMON Network Access Control PITFALLS
According to cio.com, IT executives (not IT professionals) often have misgivings about traditional security platforms such as firewalls and Intrusion Detection and Prevention Systems IDS\IPS. It argues, “That false sense of security can have IT executives not only disconnected with the reality of their security situations, but having a blind spot from what threats are…
Read more» Network Security
Port Security & Network Access – Quarntining Rogue Access Points
Before you read this blog post, be sure to check out the first part of this series: “Network Access Control – A Bird’s Eye View”” for an introductory read on the vast and wide-ranging topic surrounding Network Access Control (NAC). Originally, NAC was about blocking devices and restricting access, and in many ways, this still…
Read more» Network Access Control
Network Access Control: A Bird’s Eye View (Part 1)
In the next few blog posts, I’ll outline what Network Access Control (NAC) is and why it is a central element to keeping enterprise environments protected. This post is suitable not only for beginners to the world of network security management, but is also relevant to those more knowledgeable on the topic. We’ll be giving…
Read more» Network Access Control
How Modern Networking Enviroments Drive The Need For Comprehensive NAC
Most enterprises have, at some stage, attempted to implement Network Access Control (NAC) – and for good reason. Network Teams need to know what’s happening in their environments, clients need to work seamlessly, and IT leaders need to know that the network is secure, safe and reliable. Most solutions overpromise but woefully miss the mark,…
Read more» Network Access Control
7 NAC solution Quotes that’ll close the deal
“Today, NAC is often positioned as a security solution to the BYOD era, but it is also increasingly becoming a very useful tool in network management — acting as a gatekeeper to the network.” – TechTarget, Rob Shapland, First BAse Technologies “NAC was intended to solve real problems and answer real questions: who is connecting…
Read more»