Skip to content
Portnox_Logo_White
Portnox Logo

  • Blog
  • About
  • Contact Us
  • Login

  • Products
    • PORTNOX CLOUDZero trust access control
    • ZTNACloud-native zero trust access control & security
          • How it worksVendor agnostic, cloud-native security
          • What's NewAI-driven with IoT fingerprinting & profiling
          • PricingClear and easy pricing
          • Why PortnoxManage your security with ease
          • Why NAC is Critical to Stopping APT AttacksWhy NAC is Critical to Stopping APT Attacks
            The rise of Advanced Persistent Threat (APT) attacks has become a significant concern for organizations across the globe. These highly sophisticated and targeted cyber threats can persist undetected within a network for extended periods, posing severe risks to sensitive data, intellectual property, and overall organizational security. To counter the growing threat of APT attacks, organizations must adopt comprehensive cybersecurity measures, and one essential component in this defense arsenal is Network Access Control (NAC). In this article, we will delve into the critical role that NAC plays in thwarting APT attacks and why its implementation is indispensable for modern cybersecurity strategies. Understanding Advanced Persistent Threats (APTs) Before delving into the role of NAC, it’s crucial to understand the nature of APT attacks. Unlike traditional cyber threats, APTs are highly targeted, well-funded, and persistent. These attackers aim to infiltrate a network covertly, remaining undetected for extended periods to extract sensitive information or launch more damaging attacks. APTs often involve multiple stages, including reconnaissance, initial compromise, privilege escalation, lateral movement, and data exfiltration. Common Characteristics of APT Attacks Stealth and Persistence: APT attackers employ sophisticated techniques to avoid detection and maintain a persistent presence within the compromised network. They may use advanced malware, rootkits, and other evasion tactics to bypass traditional security measures. Targeted Approach: APTs are specifically tailored for a particular target, often with the goal of gaining access to sensitive information, intellectual property, or valuable assets. This targeted nature makes them more challenging to detect using generic security solutions. Advanced Techniques: APT attackers leverage advanced techniques, such as zero-day exploits and advanced social engineering, to exploit vulnerabilities in systems and gain unauthorized access. Lateral Movement: Once inside a network, APT attackers move laterally, escalating privileges and compromising additional systems. This allows them to navigate through the network and access valuable resources. The Role of NAC in APT Mitigation Network Access Control (NAC) is a crucial component of cybersecurity that focuses on controlling and managing access to a network based on the identity and security posture of devices seeking to connect. By enforcing policies at the entry points of a network, NAC helps organizations prevent unauthorized access and ensures that only compliant and secure devices are allowed onto the network. Here are key reasons why NAC is critical to stopping APT attacks: Device Visibility and Authentication: NAC provides organizations with comprehensive visibility into the devices connected to their networks. Through device profiling and authentication mechanisms, NAC ensures that only authorized devices with valid credentials can access the network. This is particularly crucial in the context of APT attacks, where unauthorized or compromised devices may attempt to gain entry. Endpoint Security Posture Assessment: APT attackers often exploit vulnerabilities in endpoint devices as an entry point into the network. NAC solutions assess the security posture of devices before granting access, checking for updated antivirus software, security patches, and adherence to security policies. By ensuring that endpoints meet predefined security standards, NAC acts as a frontline defense against APTs attempting to exploit vulnerabilities. Dynamic Policy Enforcement: NAC allows organizations to define and enforce dynamic access policies based on various factors, including user roles, device types, and location. In the context of APT attacks, dynamic policy enforcement becomes crucial in responding to evolving threats. For example, if a device’s security posture changes or if suspicious behavior is detected, NAC can dynamically adjust access permissions or isolate the device from the network. b In the event that a device is identified as compromised or potentially malicious, NAC can isolate it from the network to prevent further lateral movement. This containment capability is vital in stopping APTs from spreading across the network and limiting the potential damage caused by the attack. Continuous Monitoring and Threat Detection: APTs thrive on remaining undetected for extended periods. NAC complements traditional security measures by continuously monitoring devices on the network and detecting anomalous behavior that may indicate a potential APT attack. By integrating with threat intelligence feeds and security information and event management (SIEM) systems, NAC enhances the organization’s ability to identify and respond to APTs in real-time. Compliance and Auditing: Many industries have regulatory requirements that mandate specific security standards and controls. NAC helps organizations demonstrate compliance by ensuring that devices adhere to these standards before gaining network access. Regular audits and reporting provided by NAC solutions contribute to a proactive cybersecurity posture, reducing the risk of APT attacks. Integration with Other Security Solutions: NAC does not operate in isolation; it integrates seamlessly with other cybersecurity solutions, such as firewalls, intrusion detection/prevention systems, and endpoint security solutions. This collaborative approach enhances the overall security posture and increases the likelihood of detecting and mitigating APT attacks. Adaptive Response to Threats: APTs are known for their adaptive nature, evolving to bypass traditional security measures. NAC, with its adaptive response capabilities, ensures that the organization can keep pace with the changing threat landscape. This adaptability is essential for addressing the persistent and evolving nature of APT attacks. Case Studies: Real-World Impact of NAC in APT Mitigation Mandiant’s APT1 Report In 2013, cybersecurity firm Mandiant released a groundbreaking report on APT1, a Chinese cyber espionage group. The report highlighted how APT1 had successfully infiltrated numerous organizations over several years. In several cases, Mandiant identified the use of NAC as a critical factor in detecting and mitigating APT1’s activities. NAC solutions played a pivotal role in limiting the lateral movement of APT1 within compromised networks. Sony Pictures Entertainment Breach The 2014 Sony Pictures Entertainment breach, attributed to North Korean hackers, demonstrated the devastating impact of APT attacks. In the aftermath of the breach, it was revealed that the attackers gained access to the network by exploiting weak credentials and using destructive malware. NAC, if properly implemented, could have prevented unauthorized access by enforcing strong authentication policies and identifying suspicious behavior. Implementation Challenges and Best Practices While the benefits of NAC in APT mitigation are evident, organizations may face challenges during implementation. Here are some common challenges and best practices to address them: Integration Complexity: NAC implementation often involves integration with existing infrastructure, which can be complex. To address this, organizations should carefully plan the deployment, ensuring compatibility with existing security solutions and minimizing disruption to normal operations. User Education and Awareness: Users play a crucial role in the effectiveness of NAC. Organizations should invest in user education and awareness programs to ensure that employees understand the importance of adhering to security policies and the role they play in preventing APT attacks. Scalability: As organizations grow, the number of devices and users on the network increases. Scalability is a critical consideration in NAC implementation. Choosing a scalable solution that can handle the expanding network infrastructure is essential for long-term success. Continuous Monitoring and Updates: APTs are dynamic, and their tactics evolve over time. Continuous monitoring and regular updates to NAC policies are essential to adapt to emerging threats. Organizations should establish a process for reviewing and updating policies based on the latest threat intelligence. Collaboration with Threat Intelligence: NAC is more effective when integrated with threat intelligence feeds. Organizations should establish collaboration with threat intelligence providers to receive timely updates on emerging threats, allowing NAC solutions to proactively respond to new APT tactics and techniques. Conclusion In the face of the escalating threat posed by Advanced Persistent Threats (APTs), organizations must adopt a multi-layered cybersecurity approach that includes advanced technologies and robust policies. Network Access Control (NAC) emerges as a critical component in this defense strategy, offering unparalleled visibility, dynamic policy enforcement, and adaptive response capabilities. By implementing NAC, organizations can significantly enhance their ability to detect, prevent, and mitigate APT attacks, safeguarding sensitive data and preserving the integrity of their networks. As APTs continue to evolve, NAC remains a cornerstone in the ongoing battle to secure the digital landscape against persistent and sophisticated cyber threats. Read more...
    • RADIUSCloud-native RADIUS authentication essentials
          • How it worksUnderstanding cloud RADIUS authentication
          • What's NewDevice-related security bolsters zero-trust
          • PricingClear and easy pricing
          • Why PortnoxManage your security with ease
          • Network Controls: The Backbone of Enterprise SecurityNetwork Controls: The Backbone of Enterprise Security
            Enterprises are becoming increasingly reliant on technology to drive innovation, streamline operations, and enhance overall productivity. This digital reliance, however, comes hand in hand with a surge in cyber threats that can jeopardize the integrity, confidentiality, and availability of sensitive information. In this landscape, establishing a robust enterprise security posture is not just a necessity but a strategic imperative. One of the foundational pillars of a comprehensive security strategy is the implementation of effective network controls. These controls serve as the frontline defenses, acting as a shield against malicious actors seeking unauthorized access to a company’s networks and sensitive data. Understanding Network Controls Network controls encompass a range of technologies and policies designed to manage and monitor the use of a network. These controls are instrumental in safeguarding an organization’s digital assets, preventing unauthorized access, and mitigating the risk of cyber threats. Let’s explore some key components of network controls and their significance in the context of enterprise security. Access Control Mechanisms: The Gatekeepers Access control is the cornerstone of network security. It involves mechanisms and policies that determine who can access what resources within the network. This encompasses user authentication, authorization, and accounting. Implementing robust access controls ensures that only authorized personnel can access sensitive data, applications, and network resources. Authentication methods, such as multi-factor authentication (MFA), add an extra layer of security by requiring users to verify their identity through multiple means, such as passwords, biometrics, or security tokens. Authorization policies further restrict access based on roles and responsibilities, preventing unauthorized individuals from gaining entry to critical systems. Firewalls: Building the Perimeter Defense Firewalls act as the first line of defense against external threats by monitoring and controlling incoming and outgoing network traffic. They establish a barrier between a trusted internal network and untrusted external networks, preventing unauthorized access while allowing legitimate communication. Next-generation firewalls go beyond traditional packet filtering and stateful inspection, incorporating advanced features such as intrusion prevention systems (IPS), application-layer filtering, and deep packet inspection. These capabilities enable organizations to identify and block sophisticated threats, including malware and zero-day exploits, before they can compromise the network. Intrusion Detection and Prevention Systems (IDPS): Vigilant Guardians Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) play a pivotal role in identifying and mitigating security incidents in real-time. IDS monitors network and system activities, flagging any abnormal patterns or potential security breaches. On the other hand, IPS takes proactive measures by automatically blocking or containing malicious activities before they can cause harm. By deploying IDPS solutions, enterprises can detect and respond to a wide range of threats, including malware, denial-of-service attacks, and unauthorized access attempts. These systems provide valuable insights into the evolving threat landscape, allowing organizations to fine-tune their security controls and response strategies. Virtual Private Networks (VPNs): Securing Remote Connections As remote work becomes more prevalent, securing communications over the internet is paramount. Virtual Private Networks (VPNs) create encrypted tunnels that enable secure communication between remote users and the corporate network. This ensures that sensitive data transmitted over the internet remains confidential and protected from eavesdropping. VPNs are essential for maintaining the confidentiality and integrity of data, especially when employees access corporate resources from untrusted networks. By encrypting data in transit, VPNs prevent unauthorized parties from intercepting and tampering with sensitive information, thus safeguarding the organization’s data assets. Network Segmentation: Containing the Impact Network segmentation involves dividing a network into smaller, isolated segments to restrict lateral movement in the event of a security breach. By compartmentalizing the network, organizations can contain the impact of a potential compromise and prevent attackers from moving freely within the infrastructure. Segmentation can be achieved through the use of VLANs (Virtual Local Area Networks) and firewalls to create barriers between different parts of the network. This strategy limits an attacker’s ability to traverse the entire network, making it more challenging for them to escalate privileges or exfiltrate sensitive data. Importance of Network Controls in Enterprise Security Network controls play a key role in enterprise security, particularly in the following areas: Preventing Unauthorized Access: Unauthorized access is a significant threat to the confidentiality of sensitive data. Effective network controls, such as access control mechanisms and firewalls, act as gatekeepers, ensuring that only authorized individuals can access specific resources. By implementing robust authentication and authorization policies, organizations can significantly reduce the risk of unauthorized access and data breaches. Detecting and Mitigating Threats in Real Time: Cyber threats are dynamic and ever-evolving, necessitating real-time detection and response mechanisms. Intrusion Detection and Prevention Systems (IDPS) play a crucial role in identifying and mitigating threats as they occur. By promptly detecting malicious activities and taking proactive measures to block or contain them, organizations can minimize the potential damage caused by cyber incidents. Securing Remote Work Environments: The rise of remote work has expanded the attack surface, making it imperative to secure remote connections. Virtual Private Networks (VPNs) ensure that communications between remote employees and the corporate network are encrypted, reducing the risk of data interception and unauthorized access. As remote work becomes a permanent fixture for many organizations, the role of VPNs in securing remote environments cannot be overstated. Mitigating Insider Threats: Insider threats, whether intentional or unintentional, pose a significant risk to enterprise security. Network controls, particularly access control mechanisms and user monitoring, help organizations mitigate insider threats by restricting access based on roles and responsibilities. Continuous monitoring of user activities allows for the early detection of anomalous behavior, enabling timely intervention to prevent potential security incidents. Enhancing Regulatory Compliance: Many industries are subject to strict regulatory requirements regarding the protection of sensitive data. Network controls play a crucial role in helping organizations achieve and maintain compliance with regulations such as GDPR, HIPAA, and PCI DSS. By implementing access controls, encryption, and other security measures, enterprises demonstrate their commitment to safeguarding sensitive information, reducing the risk of regulatory penalties and legal consequences. Protecting Against Advanced Persistent Threats (APTs): Advanced Persistent Threats (APTs) are sophisticated, long-term cyber-attacks orchestrated by well-funded and highly skilled adversaries. Network controls, including advanced firewalls, IDPS, and network segmentation, are instrumental in thwarting APTs. These controls help organizations detect and respond to APTs at various stages, from the initial infiltration to the lateral movement within the network, thereby minimizing the risk of prolonged and stealthy attacks. Ensuring Business Continuity: Network controls contribute to business continuity by preventing and mitigating the impact of cyber incidents. By implementing measures such as network segmentation and redundancy, organizations can limit the scope of disruptions caused by security breaches. Additionally, the proactive identification and containment of threats through network controls contribute to a more resilient and secure business environment. Challenges and Considerations While network controls are crucial for enhancing enterprise security, their implementation comes with its own set of challenges and considerations. It’s essential for organizations to navigate these issues effectively to maximize the effectiveness of their security measures. Balancing Security and Usability: Striking the right balance between security and usability is a perpetual challenge. Implementing stringent access controls and complex security measures can inadvertently hinder productivity and frustrate end-users. Organizations must carefully design and implement network controls with user experience in mind, ensuring that security measures do not impede legitimate business activities. Adapting to Evolving Threats: The threat landscape is dynamic, with cyber adversaries continually developing new techniques and tactics. Network controls must be agile and adaptive to effectively counter emerging threats. Regular updates, threat intelligence integration, and ongoing security assessments are essential to ensure that network controls remain effective against evolving cyber threats. User Education and Awareness: Even the most robust network controls can be undermined by human error. Phishing attacks and social engineering exploits target end-users, aiming to bypass technical defenses. User education and awareness programs are critical to reducing the risk of successful attacks. Ensuring that employees are well-informed about security best practices, recognizing phishing attempts, and understanding their role in maintaining a secure environment is integral to the overall security posture. Integration with Security Operations: Network controls are most effective when seamlessly integrated into a broader security operations framework. This includes real-time monitoring, incident response capabilities, and collaboration between security teams. The synergy between network controls and security operations ensures a holistic and coordinated approach to managing and mitigating security incidents. Conclusion In the digital age, where data is a valuable currency and cyber threats are omnipresent, establishing a robust enterprise security posture is non-negotiable. Network controls play a pivotal role in fortifying an organization’s defenses, acting as the guardians of digital assets and sensitive information. From access control mechanisms to intrusion detection systems, each component contributes to a layered security approach that is essential for mitigating a diverse range of cyber threats. As organizations embrace digital transformation and the boundaries of the traditional perimeter dissolve, the importance of network controls becomes even more pronounced. By implementing these controls thoughtfully, organizations can not only prevent unauthorized access and data breaches but also proactively detect and respond to evolving cyber threats. The challenges of usability, threat adaptation, user education, and integration must be navigated with strategic foresight to ensure that network controls are effective in the face of an ever-evolving threat landscape. In the relentless pursuit of innovation and efficiency, enterprises must not compromise on security. Instead, they should view network controls as strategic enablers, empowering them to navigate the digital landscape with confidence, resilience, and a steadfast commitment to safeguarding their most valuable assets. Read more...
    • TACACS+Cloud-native network device authentication
          • How it worksNetwork device administration simplified
          • The first cloud-native TACACS+Manage your security with ease
          • PricingClear and easy pricing
          • Filling the Access Security Gap With Certificate-Based AuthenticationFilling the Access Security Gap With Certificate-Based Authentication
            It should come as no surprise that passwords have fallen out of favor as a reliable method of authentication. This is because passwords are often weak (easily guessable), can be forgotten, and password stores become a weak point for security (if an intruder accesses the password store, they hit the motherload). Luckily, there is a better way to reliably authenticate users – certificate-based authentication.   What Is Certificate-Based Authentication? Certificate-based authentication is a cryptographic technique that uses a digital certificate to identify a user, device, or machine before granting access to specific resources.    Certificate-based authentication isn’t new. It’s widely used by many internet security protocols, including SSL/TLS, a near-universal protocol that encrypts communications between a client and server, typically web browsers and websites or applications. However, certificate-based authentication works slightly differently for SSL/TLS than in other use cases. With SSL/TLS, the server confirms its identity to the client machine, but this happens in reverse for client certificate-based authentication.    For example, let’s say a company wants to use certificate-based authentication to grant employees access to its email servers. In this scenario, the company will issue employees with valid certificates to access the email servers, and only employees with these certificates will be granted access.   In recent years, certificate-based authentication has risen in popularity as an alternative to password-based authentication, mainly as a way to address the security gaps with usernames and passwords. For example, username/password authentication uses only what the user knows (the password). In contrast, certificate-based authentication adds another layer of security by also using what the user has (the private cryptographic key).    With that said, it’s important to note that certificate-based authentication is rarely used as a replacement for usernames and passwords but instead used in conjunction with them. By using both, companies essentially achieve two-factor authentication without requiring any extra effort from the end user (getting out their cell phone to receive a one-time password (OTP), for example).   How Does Certificate-Based Authentication Work? Before answering this question, we first have to understand what a digital certificate is. A digital certificate is an electronic password or file that proves the authenticity of a user, server, or device through cryptography and the public key infrastructure (PKI). PKI refers to tools leveraged to create and manage public keys for encryption. It’s built into all web browsers currently in use today, and organizations also use it to secure internal communications and connect devices securely.   The digital certificate file contains identifiable information about the certificate holder and a copy of the public key from the certificate holder. This identifiable information can be a user’s name, company, department, and the device’s IP address and serial number. When it comes to the public key, the key needs to be matched to a corresponding private key to verify it’s real.   So, how does this work in practice? First, the end user digitally signs a piece of data using their private key. This data and the user’s certificate then travel across the network. The destination server will then compare the signed data (protected with a private key) with the public key contained within the certificate. If the keys match, the server authenticates the user, and they’re free to access network resources.   Benefits of Certificate-Based Authentication Digital certificates are widely used by organizations today and for many reasons. Let’s dive into why.   Boosted Security Public key cryptography, also known as asymmetric encryption, is considered very secure. This is because all data encrypted with the public key can only be decrypted with the matching private key. So, when two parties communicate, the sender encrypts (scrambles) the data before sending it, and the receiver decrypts (unscrambles) the data after receiving it. The unscrambling can only happen if the keys match. And while in transit, the data remains scrambled and will appear as gibberish to a hacker.   Ease of Deployment & Use Certificate-based solutions are easy to deploy and manage. They typically come with a cloud-based management platform that allows administrators to issue certificates to new employees with ease. The same is true for renewing or revoking certificates. Moreover, many solutions integrate with Active Directory, which makes the certificate issuing process even more straightforward.   They also don’t require any additional hardware, which isn’t the case for other authentication methods like biometrics or OTP tokens.  Lastly, certificate-based solutions are very user-friendly and require minimal end-user involvement. Users don’t have to expend additional effort to get this boosted level of security. This is crucial because adding friction to any security measures tends to frustrate users and can often lead to worse outcomes. We see this happen with passwords where users typically reuse passwords to ease the burden of remembering multiple highly secure phrases.   Natively Supported by Many Existing Enterprise Applications Countless enterprise applications and networks natively support X.509 digital certificates – the typical format used in public key certificates. This means enterprises can get up and running with certificate-based authentication with just a few configuration tweaks.   Security Flaws of Certificate-Based Authentication No solution is without its drawbacks, and the same is true for certificate-based authentication.   It’s much harder to crack a key than a password, but once cracked, the results are the same. If a key is compromised, cybersecurity goes out the window. Essentially, IT can’t distinguish between a hacker and a legitimate employee if the keys match. And this is precisely why certificate-based authentication should be used in coordination with other authentication and cybersecurity measures wherever possible.   Second, certificate-based authentication is only as strong as the digital certificate. Or in other words, the stronger the cryptographic algorithms used to create the certificates, the less likely an attacker can compromise them. For this reason, organizations must ensure that the certificate authority is reputable and trustworthy.   Final Thoughts on Certificate-Based Authentication Certificate-based authentication can be an excellent addition to any organization’s cybersecurity stack. While it’s not without its drawbacks, the benefits outweigh the challenges. Certificate-based authentication allows only approved users and devices to access your network while keeping unauthorized users and rogue devices locked out.     Read more...
  • Solutions
        • Objectives
        • Network Visibilty
        • Network Authentication
        • Network Access Control
        • Endpoint Risk Monitoring
        • Endpoint Remediation
        • Network Device Administration
        • Guest Management
        • Initiatives
        • Passwordless
        • ZTNA
        • SASE
        • SD-WAN
        • BYOD
        • IoT / OT
        • Capabilities
        • 802.1X
        • RADIUS
        • PEAP
        • EAP-TLS
        • SCEP
        • TACACS+
        • Integrations
        • Active Directory
        • MDM
        • SIEM
        • EDR / XDR
        • RESTful API
  • Resources
        • Resources
        • Case Studies
        • eBooks
        • Infographics
        • Product Briefs
        • Webinars
        • White Papers
        • Cloud Documentation
        • Compliance Center
          Find out how Portnox's zero trust access control supports a wide range of compliance requirements.
        • Regulations
          CISA
          CCPA
          GDPR
          PCI-DSS
          GLBA
          SOX
          FERPA
          HIPAA
          FISMA
          NYDFS
          Explore All »
          Frameworks
          CMMC
          NCUA ACET
          COBIT
          NIST
          Cyber Essentials
          DSPT
          CIS Controls
          Explore All »
        • Cybersecurity Center
          From AAA Services to Zero Trust Network Access, Portnox's cybersecurity center covers every inch of security.
        • What is 802.1X?
          What are the benefits of NAC?
          How does zero trust work?
          Why go passwordless?
          What is IoT profiling?
          Explore All »
  • Partners
    • Reseller Program
    • Managed Services
    • Become a Partner
    • Register a Deal
  • Get Started
resources-cat

Step by Step Lab for IP Camera Hacking and Network Segmentation

May 1, 2018 | Ofer Amitai
Portnox_Web_Graphics_Blog Placeholder Dark
Back to All Blogs
Share on Twitter
Share on Linkedin
Share on Facebook

Related Reading

Global leader in metals mining & manufacturing enhances network visibility & access control with Portnox CORE
keep reading →
Construction & property investment powerhouse gains greater network visibility & control with cloud-delivered Portnox CLEAR
keep reading →
Portnox Joint Solution with Fenror7
keep reading →

Try Portnox Cloud for Free Today

Gain access to all of Portnox's powerful zero trust access control free capabilities for 30 days!

Start Free Trial
Portnox_Logo_White
  • Blog
  • Support
  • Legal
  • Privacy
Menu
  • Products
    • ZTNA
    • RADIUS
    • TACACS+
    • Pricing
  • Solutions
    • Passwordless
    • ZTNA
    • 802.1X
    • IoT Security
    • Guest Access
  • Resources
    • Blog
    • Case Studies
    • Products Briefs
    • White Papers
    • Webinars
    • Cloud Documentation
  • Partners
    • Reseller Program
    • Managed Services
    • Become a Partner
    • Partner Portal
  • About
    • Why Portnox
    • News
    • Careers
    • Contact Us
    • Security Statement

©2023 Portnox. All Rights Reserved.

Gold-Microsoft-Partner
AICPA SOC
ISO 27001
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT