Portnox Blog
Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.
Cloud, IoT, Network Security, Portnox Technology, Security Trends
Strengthening IoT Security with Cloud-Native DHCP Listening
Enhanced IoT Fingerprinting & Security with Cloud-Native DHCP Listening More Like the Internet of Everything With the explosion of new devices connecting to the internet, IoT (or, the Internet of Things) really might as well be called IoE (or, the Internet of Everything.) The use cases for always-connected devices span across industries – from facilities…
Read more» Blog, Network Security, Portnox Technology
Introducing Switch Commander – Portnox’s Free Tool For Switch Monitoring & Management
Death by a Thousand Paper Cuts – The Daily Slog The word “hero” gets thrown around a lot, but not usually for your average Network Administrator. However, if people knew how much work it truly takes to keep your corporate network humming along (securely, of course), there would probably be a national holiday. Maybe even…
Read more» Network Security, Networking, Portnox Technology
Digital Certificates & ChromeOS – NAC to the Rescue!
The phrase “game-changer” may get thrown around a bit too much, but it’s fair to say that when Google released ChromeOS and the Chromebook in 2011, it revolutionized the portable computer market. It had an especially large impact on the education market; by 2018 60% of all computers used in schools were Chromebooks. Thanks to…
Read more» Blog, BYOD, Network Security, Portnox Technology
Worry-Free BYOD: How Portnox’s AgentP Balances Freedom & Security
It may sound cliché, but if there’s one point this decade has hammered home so far, it’s that the only constant is change. From the coronavirus pandemic to the Great Resignation, many of us are navigating new jobs and staffing changes, which means new BYOD (Bring Your Own Device) policies as work shifts from in…
Read more» Authentication & Policy, Blog, Network Security, Portnox Technology, Security Trends
The Benefits of Moving Your RADIUS Server to the Cloud
Remote Authentication Dial-In User Service (RADIUS Authentication) authenticates and authorizes users trying to access a network by sending client access requests to a RADIUS server. The requests are formatted with data such as the client’s password, username, port, and IP address which are then examined in the database for matches. Leveraging RADIUS in your organization…
Read more» Authentication & Policy, Blog, Portnox Technology
Simple Certificate Enrollment Protocol (SCEP): What It Is & Why Should Network Engineers Care About It
There are several factors to consider when distributing certificates to managed devices, making it a massive undertaking. These include public key infrastructure (PKI), integration, gateway setup, configuration settings, certificate enrollment, device authentication, and more. Thanks to the Simple Certificate Enrollment Protocol (SCEP), administrators can quickly and easily enroll all managed devices for client certificates without…
Read more» Blog, Network Security, Portnox Technology
The Power of Role-Based Access Control in Network Security
Determining the right network access control (NAC) security policy for your organization isn’t an easy task.It’s often a balancing act between keeping your network secure and ensuring employees can access the systems they need to do their jobs.Role-based access control (or RBAC) can be a good way of ensuring your network is protected. If you’ve…
Read more» Blog, Network Security, Portnox Technology
Cloud-Native TACACS+: Modern Network Device Administration
What is TACACS+? TACACS+ is a remote authentication protocol that allows a remote access server to communicate with an authentication server in order to validate a user’s access to a network device such as a wireless access point or wired switch (i.e. network device administration). TACACS+ can be used to authenticate the following kinds of…
Read more» Blog, Network Access Control, Portnox Technology
Leading UK Loan Lender Deploys Portnox Cloud-Native NAC Across 75 Sites
Everyday Loans is the UK’s leading independent loan lender, operating dozens of branches across the country and boasting a personal, hands-on approach to lending, uncommon in today’s digitally anonymous financial services industry. Today, personal lending in the UK has grown to become an industry approaching 24 billion GBP, with recent acceleration due to widespread financial…
Read more» Blog, Network Access Control, Portnox Technology
Cyber Security Essential #2: 802.1x Network Access Control
Why is 802.1x Network Access Control Essential? 802.1x network access control is a technology that enables organizations to enact its own unique policy for how and when endpoints (desktops, laptops, smartphones, etc.) can connect to their corporate networks. NAC solutions are typically designed to allow IT security teams to gain visibility of each device trying…
Read more» Blog, Network Access Control, Portnox Technology
Food Company Replaces Cisco ISE with Portnox Cloud-Native NAC
New Jersey-based Schuman Cheese has a long, storied history of delivering world-class cheese products to the U.S. market. Operating across several facilities in New Jersey, Illinois, Wisconsin and California, the company maintains a workforce of more than 400, with revenues topping $500 million annually. A Deep Dive with Portnox CORE About four years ago, Schuman…
Read more» Blog, Cloud, Network Access Control, Portnox Technology
RADIUS Authentication, Now in the Cloud
Understanding RADIUS Authentication Remote Authentication Dial-In User Service (RADIUS) is a protocol that was historically designed to authenticate remote users to a dial-in access server. Today, RADIUS authentication is used across an array of scenarios and is well known for it AAA capabilities — authentication, authorization, and accounting. By centralizing AAA capabilities, organizations give themselves…
Read more»