Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

Zero Trust & SOC 2 Compliance: The Significance of Robust Authentication
Organizations can achieve SOC 2 compliance more easily by opting for zero trust solutions, as they prioritize robust, continuous authentication.
Read more»
Filling the Access Security Gap With Certificate-Based Authentication
It should come as no surprise that passwords have fallen out of favor as a reliable method of authentication. This is because passwords are often weak (easily guessable), can be forgotten, and password stores become a weak point for security (if an intruder accesses the password store, they hit the motherload). Luckily, there is a…
Read more»
Why You Should be Leveraging Nmap for Network Endpoint Security
We have all been there. We are at a new place with new devices and the previous person did not keep good records. Now we’re being asked to secure the network without losing current functionality. Allow the good devices and block the bad, or at least put the bad on the guest network. So, what…
Read more»
Dynamic Port Configuration
CORE has a built-in capability to discover and define port properties automatically, thus eliminating unnecessary manual labor. The most common reason for editing default rules is to adjust the uplink identification rule if the default settings do not identify your uplink ports automatically. The administrator has control to set any of the following properties: Uplink…
Read more»
Think You Know Your Network
The Portnox Concept
A quick introduction to Portnox’s unique approach to Network Access Control solutions. The network has evolved and it is crucial to maintain risk management and control over the devices your users are bringing onto it. Do you really know what endpoints are connected to your network? Can you see every endpoint in every location? Can…
Read more»
Portnox Course Module 1
Portnox Basics
This is the first module of the Portnox CORE basic course. Here you will learn all terms and principals required to successfully deploy CORE. A must-see video for anyone handling CORE for the first time.
Read more»
Adding a Switch
Adding a Switch to be Monitored by CORE
Within a typical wired switches environment, the first step in the CORE deployment  is adding a switch to be monitored by Portnox CORE. In this short tutorial we will demonstrate one of the methods to do that – using SNMP v2 to monitor a switch. The same method applies if you are using SNMP v3…
Read more»
ARP Table
Connecting to an IP Helper by using SNMP
Portnox CORE can connect to an IP Helper in different ways, one of which is by using SNMP.  IP Helper is the default gateway for endpoints to locate the relevant IP-MAC pairs on the network. Once an IP address is identified for each endpoint, CORE can use more sophisticated methods to profile, authenticate and authorize…
Read more»
ARP Table by SSH
Adding an SSH Based IP Helper – Locating Endpoint IP’s
Portnox CORE can connect to an IP Helper in different ways, one of which is by using SSH as presented in this video. IP Helper is the default gateway of the endpoints, to locate the relevant IP-MAC pairs on the network. Once an IP address is identified for each endpoint, CORE can use more sophisticated…
Read more»
Port Information
Port Information
In this video we will dive deeper into the advanced properties of port set-up and how to use these properties in securing the network.
Read more»
Windows Authentication
Adding Windows Domain Authentication Method
The most common endpoint OS Portnox CORE encounters is Windows, which is part of a domain. Portnox can authenticate Windows in various ways even if it is in a workgroup. In this video you will learn how to configure a windows domain authentication method and how to configure an authentication policy. In the Portnox CORE…
Read more»
Fingerprint Authentication
New Fingerprint Authentication Method & Policy
One of the unique authentication methods employed by Portnox CORE is the OS (Operating System) Fingerprint, also known as the OSFP authentication method. The value of OSFP is that during deployment you can create the fingerprint for YOUR devices, thereby making sure that if someone were to plug a similar device to the type that…
Read more»