Category

news

4 tips to safely onboard IoT devices onto your Wi-Fi network by Ofer Amitai – as posted on TechTarget’s IoT Agenda

By | news | No Comments

Catch up on what our CEO, Ofer Amitai, has to say about keeping your IoT and WiFi secured. In this article Ofer discusses the fact that enterprise IoT and Wi-Fi security are not always carefully planned and monitored and that as with BYOD, organizations are oftentimes dealing with IoT without even knowing it. As IoT endpoints are being added to many organizational Wi-Fi networks, the end-goal should be to incorporate enterprise-grade Wi-Fi security to avoid network breaches. Furthermore, Ofer elaborates on the importance of using WPA2-Enterprise authentication to turn the business Wi-Fi into a safer IoT network.

Read all about it here.

Portnox CLEAR – Keeping Your IoT and WiFi Secured

CLEAR is a SaaS, cloud-delivered, WiFi access control solution that allows you to secure your WiFi based on WPA2/3-Enterprise, using personal identities or digital certificates. CLEAR supports a wide range of authentication providers, from on-premises AD through cloud providers such as GSuite and Azure AD. CLEAR comes with a cloud-RADIUS, therefore there is no overhead, as there is no equipment to install or maintain. It requires no training or skilled personal to deploy and operate. In less than 10 minutes, large and small companies are deploying CLEAR’s enterprise-grade Wi-Fi security.

See a Demo of CLEAR – Please fill out this form:


IOTagenda post

Top 5 proactive solutions to IoT security challenges

By | news | No Comments

In his latest article, published IoT Agenda, Portnox CEO, Ofer Amitai, discusses the best practices to overcome the security vulnerabilities in IoT devices.

“There are so many vulnerabilities in IoT, and hacking IoT devices is so easy that we must proactively seek security mechanisms now rather than wait for more disasters or emergency situations to force reactive responses. The solutions mentioned here will go a long way in preventing some of the disastrous breaches we have witnessed in recent years.”

 

Now available via IoT Agenda.

Read the full article here.

2019-ASTORS

Portnox Competes in 2019 ‘ASTORS’ Homeland Security Awards Program

By | news | No Comments

Digital transformation, mobile workers, unmanaged devices including IoT, and cloud-based applications are causing complex network security and access control challenges that place corporate assets and data at risk. Portnox CLEAR, a new competitor to the Annual ‘ASTORS’ Homeland Security Awards Program, is the first cloud-delivered Network Access Control (NAC) solution delivered as a cloud service that controls access using continuous risk-scoring of each endpoint; including mobile, BYOD and IoT, connecting from anywhere in the world.

Read More Here

itspmagazine

How NAC and CIS Controls Go Hand-in-Hand

By | news | No Comments

To help organizations select and implement a set of cyber defense best practices that will protect against today’s most pervasive and dangerous threats, the Center for Internet Security (CIS) devised a list of 20 controls. A principal benefit of the CIS Controls is their ability to prioritize and focus on a smaller number of actions with high pay-off results.

Published in itspmagazine.com

Read the full article here.

itproportal-news

Is IoT security being regulated?

By | news | No Comments

The Internet of Things is quickly becoming the next frontier of technological innovation, but IoT devices are inherently vulnerable.
Are we doing enough in terms of regulation in order to keep our data safe?
Government authorities need to take the first steps towards IoT security, and they need to start now.

Published in itproportal.com

Read the full article here.

dr-logo

The Security Perimeter Is Dead. Long Live the New Endpoint Perimeter.

By | news | No Comments

The network no longer provides an air gap against external threats, but network access for devices can take up the slack. The fall of the enterprise perimeter is like the falling of a wall. It has created a new security landscape in which each endpoint, no matter from where it connects, has become its own perimeter — a weakness that can give adversaries access to the entire network.

Here you can read about the best practices to implement in the enterprise to handle threats both inside and outside the physical enterprise perimeter, allowing organizations to provide remote branches and “traveling” endpoints the same security as their corporate headquarters.

Published in Darkreading.com

Read the full article here.

In search of network security and simplicity

By | news | No Comments

In this new article Ofer Amitai, CEO & co-founder of Portnox, outlines the seven most important capabilities that agencies should focus on when choosing a NAC solution.

After all, we live today in the world of devices.  In almost every enterprise, devices outnumber employees. Everything is connected these days — IP phones, the conference room smart TV, the AC systems, the lighting infrastructure and coffee machines. IP addresses rule.

The people in charge of network security must now plan for a new set of threats. For each organization that plan looks a bit different, but it should always surround the “crown jewels” with the appropriate security techniques. For government agencies, these jewels would include personally identifiable information on citizens and employees, national security-related information, financial data and mission-critical systems.  IT managers must make sure that IoT, bring-your-own and managed devices are not posing a risk to the agency’s assets.

Published in GCN.com.

Read the full article here.

IoT Security at Black Hat 2018: The Insecurity of Things

By | news | No Comments

Portnox CEO, Ofer Amitai, attended Black Hat 2018 and came back with some great insights. “It was astonishing to find out that companies manufacturing medical devices such as implants, insulin therapy devices and pacemakers, completely ignore current IoT security research, while designing their devices and machines. Legal measures are being taken care of, so this practice will no longer go unnoticed. Manufacturers will have to take responsibility for securing these devices or face the consequences.
Hopefully, we are at the beginning of a new security revolution for IoT devices, leading eventually to a healthier and device-secured world”.

Published in IoT Agenda.

Read the full article here.

Internet of Threats – Managing Risk and Governing it

By | news | No Comments

June 2018 was an important month in moving the conversation forward on IoT security legislation in the United States.

Portnox’s CEO, Ofer Amitai, shares his insights on this topic, looking at the progress in IoT security regulations, explaining why government agencies and organizations need to get involved and enforce IoT security laws.

The implications for consumers and manufacturers are noteworthy as well. IoT devices are found everywhere and are extremely easy to hack thus placing corporate and personal data at risk.

“There are so many vulnerabilities in IoT, and hacking IoT devices is so easy that we must proactively seek solutions rather than wait for disasters or emergency situations to force reactive responses.”

Published in IoT Agenda.

Read the full article here.