Portnox Blog
Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.
Authentication & Policy, Blog, Network Security, Security Trends
Passwordless Authentication: A Paradigm Shift in Security
Passwordless authentication appears to be the new belle of the ball amongst tech experts. Of course, the reasons all bother on the general challenges experienced by security companies and businesses. The security and tech world continue to advance in scope and sphere – through developing efforts to improve existing structure. These changes are prompted by …
Read more» Blog, Network Security, Security Trends, Zero-Trust
Implementing & Maintaining a Zero Trust Security Model for Your Enterprise
Protecting a company’s assets is becoming quite expensive. Many enterprises often carefully assess potential new solutions before deciding to venture into the technology. However, as costly as some of these solutions come, protecting all digital assets remains paramount. The zero trust security model has in fact been around for years. It is a strategy that…
Read more» Blog, Network Access Control, Network Security, Security Trends, Zero-Trust
6 Tips for Enhancing Security Across Your Remote Workforce
Before the pandemic, 17% of employees in the US worked from home five days or more per week – a share that catapulted to 44% during the pandemic, and more than 60% after the pandemic. The COVID-19 pandemic climaxed the remote working trend, as workers were forced to work from home – a trend that…
Read more» Blog, Security Trends, Zero-Trust
Cutting Through the Hype of Securing the Zero Trust Edge
What is Zero Trust? Zero trust is a strategic approach requiring all network users to be authenticated, authorized, and regularly validated. The framework covers the internal and external users of an organization’s network. As a cybersecurity concept, it requires full awareness of security policy based on established contexts rather than assumptions. A well-defined zero trust…
Read more» Blog, Network Security, Networking, Security Trends
Common SD-WAN Challenges & How to Avoid Them
A Software-Defined Wide Area Network (SD-WAN) enables organizations to rely on a combination of transport services. The increasing use of SD-WAN for connecting enterprise networks improves productivity, reduces cost, and increases application performance. It is a feature-packed technology that centralizes security, management, networking, and more. Consequently, organizations with cloud solutions view SD-WAN as an infrastructure…
Read more» Blog, Cyber Threats, Network Security
If Only They Had a NAC…Understanding the Cisco Hack
Cisco recently confirmed they were the victim of a data breach in which hackers were able to steal 2.8 GB of data. Although these breaches are nothing new (SolarWinds, Credit Suisse, Twitter, the list goes on…) the Cisco breach is especially concerning because many organizations rely on Cisco products to keep their networks safe. The…
Read more» Blog, Cyber Threats, Network Security
You Were the Victim of a Data Breach. Now What?
A data breach is something every individual and organization needs to avoid. Unfortunately, it has become all too common in today’s online world. One major way that personal information becomes compromised is through identity theft. It’s better not to imagine the extent of damage that goes along with that. In this highly-connected world, cybersecurity…
Read more» Blog, Network Access Control, Network Security, Networking
Portnox & Cisco Meraki: Better Together When Securing & Controlling Access for Cloud Managed IT
The Rise of Cloud Managed IT Digital transformation is engulfing enterprise IT, with many legacy solutions migrating to the cloud. Paired with the Bring-Your-Own-Device (BYOD), Internet of Things (IoT), cloud adoption and mobile workforce trends, CISOs, network admins and IT teams are faced with new and complex challenges in securing their risk-based perimeter. As that…
Read more» Blog, Network Access Control, Security Trends, Zero-Trust
How To Use SASE To Establish & Enable Zero-Trust Network Access
As working environments evolve, we must rethink our network security approach. The traditional “castle-and-moat” network security model, where everyone inside the network is trusted by default, but no one outside can access the data inside, is no longer fit for purpose. Faced with cloud computing, virtualization, and remote working, having a clear perimeter protecting a…
Read more» Blog, BYOD, Network Security, Portnox Technology
Worry-Free BYOD: How Portnox’s AgentP Balances Freedom & Security
It may sound cliché, but if there’s one point this decade has hammered home so far, it’s that the only constant is change. From the coronavirus pandemic to the Great Resignation, many of us are navigating new jobs and staffing changes, which means new BYOD (Bring Your Own Device) policies as work shifts from in…
Read more» Authentication & Policy, Blog, Network Security
Filling the Access Security Gap With Certificate-Based Authentication
It should come as no surprise that passwords have fallen out of favor as a reliable method of authentication. This is because passwords are often weak (easily guessable), can be forgotten, and password stores become a weak point for security (if an intruder accesses the password store, they hit the motherload). Luckily, there is a…
Read more» Blog, Network Security, Security Trends
Why Organizations Should Adopt SaaS Technology for Cybersecurity
The Software-as-a-service licensing model has become a disruption in the digital space, garnering widespread adoption across industries. What’s more, cloud computing has become a common concept in 21st-century technology while spurring the development of new capabilities to facilitate the next phase of innovation and development. The beauty of this technology is the seamless integrations it…
Read more»