Portnox Blog
Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.
Blog, Network Discovery, Networking
Zero Trust & SOC 2 Compliance: The Significance of Robust Authentication
Organizations can achieve SOC 2 compliance more easily by opting for zero trust solutions, as they prioritize robust, continuous authentication.
Read more» Blog, Network Discovery, Network Security
Why You Should be Leveraging Nmap for Network Endpoint Security
We have all been there. We are at a new place with new devices and the previous person did not keep good records. Now we’re being asked to secure the network without losing current functionality. Allow the good devices and block the bad, or at least put the bad on the guest network. So, what…
Read more» Getting Started, Network Discovery, Portnox academy
Adding a Switch to be Monitored by CORE
Within a typical wired switches environment, the first step in the CORE deployment is adding a switch to be monitored by Portnox CORE. In this short tutorial we will demonstrate one of the methods to do that – using SNMP v2 to monitor a switch. The same method applies if you are using SNMP v3…
Read more» Getting Started, Network Discovery, Portnox academy
Connecting to an IP Helper by using SNMP
Portnox CORE can connect to an IP Helper in different ways, one of which is by using SNMP. IP Helper is the default gateway for endpoints to locate the relevant IP-MAC pairs on the network. Once an IP address is identified for each endpoint, CORE can use more sophisticated methods to profile, authenticate and authorize…
Read more» Getting Started, Network Discovery, Portnox academy
Adding an SSH Based IP Helper – Locating Endpoint IP’s
Portnox CORE can connect to an IP Helper in different ways, one of which is by using SSH as presented in this video. IP Helper is the default gateway of the endpoints, to locate the relevant IP-MAC pairs on the network. Once an IP address is identified for each endpoint, CORE can use more sophisticated…
Read more» Getting Started, Network Discovery, Portnox academy
Port Information
In this video we will dive deeper into the advanced properties of port set-up and how to use these properties in securing the network.
Read more» Authentication & Policy, Getting Started, Network Discovery, Portnox academy
Setting Up Hives
A hive is a group of network entities and components such as switches and access points. Hives are used for the graphical, hierarchical and geographical representation of an organization. A hive can be used for setting user permissions (i.e. Allowing the branch IT manager to only see his own branch network environment without visibility of…
Read more»