Category

news

nac award rsa 2021

Portnox Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2021

By | news | No Comments

Portnox Wins Award for “Cutting Edge NAC” in 9th Annual Global InfoSec Awards at RSAC 2021

NEW YORK–Portnox is proud to announce it has won the award for “Cutting Edge Network Access Control (NAC)” from Cyber Defense Magazine, the world’s leading information security e-magazine. “We’re thrilled to receive one of the most prestigious and coveted cybersecurity awards in the world from Cyber Defense Magazine. We knew the competition would be tough – after all, the judges are leading infosec experts from around the globe. We couldn’t be more pleased,” said Ofer Amitai, CEO at Portnox.

Portnox’s cloud-delivered NAC-as-a-Service – Portnox CLEAR – has taken the network access control (NAC) market by storm in recent years, seeing a surge of new customers seeking to move off of their legacy on-premise NAC solutions. In 2020, Portnox saw its revenue grow 30% year-over-year.

“As the only true SaaS NAC product on the market, Portnox CLEAR is making NAC implementation and deployment easier for enterprises – particularly those with highly distributed networks,” said Tomer Shemer-Buchbut, Vice President of Products at Portnox. “By eliminating on-going maintenance like upgrades and patches common of on-premise NAC, we’re offering companies far better total cost of ownership.”

“Portnox embodies three major features we judges look for to become winners: understanding tomorrow’s threats, today, providing a cost-effective solution and innovating in unexpected ways that can help stop the next breach,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

With 80 billion connected devices expected to be in use by 2025, the NAC market is growing rapidly – projected to reach nearly $12 billion globally. Device proliferation paired with an ever-expanding number of cyber threats and hybrid workforce operations has made network access control a critical component of any enterprise cybersecurity stack. “NAC is front and center for CISOs and their IT security teams. Expect the demand for network access control – particularly cloud NAC – to continue to grow as companies continue to embrace emerging networking models like SD-WAN, ZTNA and SASE,” said Amitai.

About Portnox

Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit www.portnox.com, and follow us on Twitter and LinkedIn.

About CDM InfoSec Awards

This is Cyber Defense Magazine’s ninth year of honoring global InfoSec innovators. Our submission requirements are for any startup, early stage, later stage or public companies in the INFORMATION SECURITY (INFOSEC) space who believe they have a unique and compelling value proposition for their product or service. Learn more at www.cyberdefenseawards.com

About the Judging

The judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company submitted materials on the website of each submission including but not limited to data sheets, white papers, product literature and other market variables. CDM has a flexible philosophy to find more innovative players with new and unique technologies, than the one with the most customers or money in the bank. CDM is always asking “What’s Next?” so we are looking for Next Generation InfoSec Solutions.

About Cyber Defense Magazine

With over 5 Million monthly readers and growing, and thousands of pages of searchable online infosec content, Cyber Defense Magazine is the premier source of IT Security information for B2B and B2G with our sister magazine Cyber Security Magazine for B2C. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conferences. CDM is a proud member of the Cyber Defense Media Group. Learn more about us at https://www.cyberdefensemagazine.com and visit https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives. Join a webinar at https://www.cyberdefensewebinars.com and realize that infosec knowledge is power.

Contacts

Michael Marvin
Director of Marketing, Portnox
E: [email protected]
P: (802) 249-7059

4 tips to safely onboard IoT devices onto your Wi-Fi network by Ofer Amitai – as posted on TechTarget’s IoT Agenda

By | news | No Comments

Catch up on what our CEO, Ofer Amitai, has to say about keeping your IoT and WiFi secured. In this article Ofer discusses the fact that enterprise IoT and Wi-Fi security are not always carefully planned and monitored and that as with BYOD, organizations are oftentimes dealing with IoT without even knowing it. As IoT endpoints are being added to many organizational Wi-Fi networks, the end-goal should be to incorporate enterprise-grade Wi-Fi security to avoid network breaches. Furthermore, Ofer elaborates on the importance of using WPA2-Enterprise authentication to turn the business Wi-Fi into a safer IoT network.

Read all about it here.

Portnox CLEAR – Keeping Your IoT and WiFi Secured

CLEAR is a SaaS, cloud-delivered, WiFi access control solution that allows you to secure your WiFi based on WPA2/3-Enterprise, using personal identities or digital certificates. CLEAR supports a wide range of authentication providers, from on-premises AD through cloud providers such as GSuite and Azure AD. CLEAR comes with a cloud-RADIUS, therefore there is no overhead, as there is no equipment to install or maintain. It requires no training or skilled personal to deploy and operate. In less than 10 minutes, large and small companies are deploying CLEAR’s enterprise-grade Wi-Fi security.

See a Demo of CLEAR – Please fill out this form:


Top 5 Proactive Solutions to IoT Security Challenges

By | IoT Security, news | No Comments

In his latest article, published IoT Agenda, Portnox CEO, Ofer Amitai, discusses the best practices to overcome the security vulnerabilities in IoT devices.

“There are so many vulnerabilities in IoT, and hacking IoT devices is so easy that we must proactively seek security mechanisms now rather than wait for more disasters or emergency situations to force reactive responses. The solutions mentioned here will go a long way in preventing some of the disastrous breaches we have witnessed in recent years.”

 

Now available via IoT Agenda.

Read the full article here.

2019-ASTORS

Portnox Competes in 2019 ‘ASTORS’ Homeland Security Awards Program

By | news | No Comments

Digital transformation, mobile workers, unmanaged devices including IoT, and cloud-based applications are causing complex network security and access control challenges that place corporate assets and data at risk. Portnox CLEAR, a new competitor to the Annual ‘ASTORS’ Homeland Security Awards Program, is the first cloud-delivered Network Access Control (NAC) solution delivered as a cloud service that controls access using continuous risk-scoring of each endpoint; including mobile, BYOD and IoT, connecting from anywhere in the world.

Read More Here

How NAC and CIS Controls Go Hand-in-Hand

By | Compliance, Network Security, news, Portnox Technology | No Comments

To help organizations select and implement a set of cyber defense best practices that will protect against today’s most pervasive and dangerous threats, the Center for Internet Security (CIS) devised a list of 20 controls. A principal benefit of the CIS Controls is their ability to prioritize and focus on a smaller number of actions with high pay-off results.

Published in itspmagazine.com

Read the full article here.

dr-logo

The Security Perimeter Is Dead. Long Live the New Endpoint Perimeter.

By | BYOD Security, Cloud Security, Network Security, news | No Comments

The network no longer provides an air gap against external threats, but network access for devices can take up the slack. The fall of the enterprise perimeter is like the falling of a wall. It has created a new security landscape in which each endpoint, no matter from where it connects, has become its own perimeter — a weakness that can give adversaries access to the entire network.

Here you can read about the best practices to implement in the enterprise to handle threats both inside and outside the physical enterprise perimeter, allowing organizations to provide remote branches and “traveling” endpoints the same security as their corporate headquarters.

Published in Darkreading.com

Read the full article here.

In Search of Network Security & Simplicity

By | Network Security, news, Portnox Technology | No Comments

In this new article Ofer Amitai, CEO & co-founder of Portnox, outlines the seven most important capabilities that agencies should focus on when choosing a NAC solution.

After all, we live today in the world of devices.  In almost every enterprise, devices outnumber employees. Everything is connected these days — IP phones, the conference room smart TV, the AC systems, the lighting infrastructure and coffee machines. IP addresses rule.

The people in charge of network security must now plan for a new set of threats. For each organization that plan looks a bit different, but it should always surround the “crown jewels” with the appropriate security techniques. For government agencies, these jewels would include personally identifiable information on citizens and employees, national security-related information, financial data and mission-critical systems.  IT managers must make sure that IoT, bring-your-own and managed devices are not posing a risk to the agency’s assets.

Published in GCN.com.

Read the full article here.

IoT Security at Black Hat 2018: The Insecurity of Things

By | news | No Comments

Portnox CEO, Ofer Amitai, attended Black Hat 2018 and came back with some great insights. “It was astonishing to find out that companies manufacturing medical devices such as implants, insulin therapy devices and pacemakers, completely ignore current IoT security research, while designing their devices and machines. Legal measures are being taken care of, so this practice will no longer go unnoticed. Manufacturers will have to take responsibility for securing these devices or face the consequences.
Hopefully, we are at the beginning of a new security revolution for IoT devices, leading eventually to a healthier and device-secured world”.

Published in IoT Agenda.

Read the full article here.