Network Security

Start Your 30-Day trial today!

What is a firewall in cybersecurity? A firewall is a network security system that monitors and controls incoming and outgoing traffic based on a predefined set of rules. Its core...

What is a next-generation firewall (NGFW)? A next-generation firewall (NGFW) is a network security device that goes beyond the capabilities of traditional firewalls to inspect, identify, and control traffic at...

What is network segmentation? Network segmentation is the practice of dividing a computer network into smaller, isolated subnetworks — called segments or zones — each governed by its own access...

What is a network-based IPS? A network-based intrusion prevention system (NIPS) is a security technology deployed in-line across a network to monitor, analyze, and block malicious traffic in real time....

What is risk-based access control? Risk-based access control is a dynamic method of granting or denying access based on the contextual risk level of a user, device, or session. Unlike...

What is a critical authentication VLAN? A critical authentication VLAN is a predefined network segment that devices are placed into when normal network authentication fails. It is typically used as...

Choosing the right Network Access Control (NAC) solution can be challenging. This NAC comparison breaks down the key differences between Portnox Cloud and Cisco ISE across deployment, scalability, cost, and...

What is a cyber kill chain attack? A cyber kill chain attack refers to a framework that breaks down the stages of a cyberattack-from the initial planning to the execution...

What are Indicators of Attack? In cybersecurity, Indicators of Attack (IoAs) are the signs or pieces of evidence that indicate an attacker is actively attempting to compromise a system or...

Control Access. Control Risk.

Protect your critical IT assets with Portnox’s radically simple cloud-native unified access control platform. No hassles. No BS.

Discover the ROI Behind Portnox in the New TEI Study

X