Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

How Does Passwordless Authentication Fit With Zero Trust Security Models?
Will 2023 be the year we finally eliminate passwords? For the last decade, cybersecurity experts have both been pushing for and predicting that a passwordless future is just around the corner. However, while passwords have been declining in recent years in favor of more robust forms of authentication, an entirely passwordless future has yet to…
Read more»
passwordless authentication portnox
Passwordless Authentication: A Paradigm Shift in Security
Passwordless authentication appears to be the new belle of the ball amongst tech experts. Of course, the reasons all bother on the general challenges experienced by security companies and businesses.  The security and tech world continue to advance in scope and sphere – through  developing efforts to improve existing structure.  These changes  are prompted by …
Read more»
Filling the Access Security Gap With Certificate-Based Authentication
It should come as no surprise that passwords have fallen out of favor as a reliable method of authentication. This is because passwords are often weak (easily guessable), can be forgotten, and password stores become a weak point for security (if an intruder accesses the password store, they hit the motherload). Luckily, there is a…
Read more»
radius server portnox
The Benefits of Moving Your RADIUS Server to the Cloud
Remote Authentication Dial-In User Service (RADIUS Authentication) authenticates and authorizes users trying to access a network by sending client access requests to a RADIUS server. The requests are formatted with data such as the client’s password, username, port, and IP address which are then examined in the database for matches.  Leveraging RADIUS in your organization…
Read more»
scep portnox
Simple Certificate Enrollment Protocol (SCEP): What It Is & Why Should Network Engineers Care About It
There are several factors to consider when distributing certificates to managed devices, making it a massive undertaking. These include public key infrastructure (PKI), integration, gateway setup, configuration settings, certificate enrollment, device authentication, and more.   Thanks to the Simple Certificate Enrollment Protocol (SCEP), administrators can quickly and easily enroll all managed devices for client certificates without…
Read more»
nmap
Why You Should be Leveraging Nmap for Network Endpoint Security
We have all been there. We are at a new place with new devices and the previous person did not keep good records. Now we’re being asked to secure the network without losing current functionality. Allow the good devices and block the bad, or at least put the bad on the guest network. So, what…
Read more»
Dynamic Port Configuration
CORE has a built-in capability to discover and define port properties automatically, thus eliminating unnecessary manual labor. The most common reason for editing default rules is to adjust the uplink identification rule if the default settings do not identify your uplink ports automatically. The administrator has control to set any of the following properties: Uplink…
Read more»
Think You Know Your Network
The Portnox Concept
A quick introduction to Portnox’s unique approach to Network Access Control solutions. The network has evolved and it is crucial to maintain risk management and control over the devices your users are bringing onto it. Do you really know what endpoints are connected to your network? Can you see every endpoint in every location? Can…
Read more»
Portnox Course Module 1
Portnox Basics
This is the first module of the Portnox CORE basic course. Here you will learn all terms and principals required to successfully deploy CORE. A must-see video for anyone handling CORE for the first time.
Read more»
Adding a Switch
Adding a Switch to be Monitored by CORE
Within a typical wired switches environment, the first step in the CORE deployment  is adding a switch to be monitored by Portnox CORE. In this short tutorial we will demonstrate one of the methods to do that – using SNMP v2 to monitor a switch. The same method applies if you are using SNMP v3…
Read more»
ARP Table
Connecting to an IP Helper by using SNMP
Portnox CORE can connect to an IP Helper in different ways, one of which is by using SNMP.  IP Helper is the default gateway for endpoints to locate the relevant IP-MAC pairs on the network. Once an IP address is identified for each endpoint, CORE can use more sophisticated methods to profile, authenticate and authorize…
Read more»
ARP Table by SSH
Adding an SSH Based IP Helper – Locating Endpoint IP’s
Portnox CORE can connect to an IP Helper in different ways, one of which is by using SSH as presented in this video. IP Helper is the default gateway of the endpoints, to locate the relevant IP-MAC pairs on the network. Once an IP address is identified for each endpoint, CORE can use more sophisticated…
Read more»