Authentication

Start Your 30-Day trial today!

Passwords remain one of the most exploited weaknesses in cybersecurity, and organizations have spent years layering defenses on top of them—most notably Multi-Factor Authentication (MFA). But as credential-based attacks grow...

As organizations move toward cloud-based, hybrid, and remote environments, managing secure network access has become more complex. At the core of this challenge is RADIUS (Remote Authentication Dial-In User Service),...

What is adaptive authentication? Adaptive authentication is a dynamic security approach that evaluates a range of contextual and behavioral signals during an authentication attempt and adjusts the required security measures...

What are Portnox Cloud RADIUS and FreeRADIUS? Portnox Cloud RADIUS is a cloud-native, fully managed RADIUS-as-a-service offering. It’s part of the broader Portnox Cloud platform, purpose-built to support modern authentication...

What is Broken Authentication in Cybersecurity? Broken authentication is a security vulnerability that occurs when an attacker exploits weaknesses in an application’s authentication process to gain unauthorized access to accounts...

Passwords have been part of enterprise security for decades. But they’ve also been the source of endless breaches, support tickets, and user frustration. As credential theft continues to rise, organizations...

What is a server certificate? A server certificate is a digital document that verifies the identity of a server in a network. It plays a critical role in establishing secure,...

Passwords have long been the weakest link in enterprise security. From phishing and credential theft to password reuse and brute-force attacks, most breaches start with a compromised password. That’s why...

Control Access. Control Risk.

Protect your critical IT assets with Portnox’s radically simple cloud-native unified access control platform. No hassles. No BS.

NEW REPORT: CISOs' Perspectives on Cybersecurity in 2026

X