Search Results for: Role-based access control

Search Results for: Role-based access control

Access Control, Network Security

What is RADIUS and how does it work? What is RADIUS? RADIUS stands for Remote Authentication Dial-In User Service. It is a protocol that provides centralized Authentication, Authorization, and Accounting (AAA) for users who connect and use a network service. It was originally developed for dial-up networks but is now...

In the world of identity and access management (IAM), the term “identity” has traditionally referred to people — employees, contractors, partners, and customers. But in today’s highly automated, cloud-first environments, non-human identities (NHIs) now vastly outnumber human ones. And that shift brings new challenges, new risks, and new urgency for...

General Security

What is a digital identity? A digital identity is a collection of electronic information that represents a person, device, or organization within digital systems. It’s what allows users or devices to authenticate, gain access, and interact securely across networks, applications, and services. Key Components of a Digital Identity Depending on...

General Security, Zero Trust

What is a non-human entity? A non-human entity (NHE) in cybersecurity and identity management refers to anything that interacts with digital systems but isn’t a person. These entities still need identities and permissions—just like users—but they operate automatically or programmatically. Why non-human entities matter in cybersecurity Just like human users,...

With every high-profile data breach, regulatory fine, and cyber insurance hike, the pressure mounts for enterprises to not only implement robust security measures but also ensure accountability at every level. And at the top of the accountability chain? The Chief Information Security Officer (CISO). The role of a CISO is...

Network Security

What is cloud network security, and how does it work? Cloud network security refers to the practices, policies, technologies, and controls designed to protect cloud-based environments from cyber threats. As organizations increasingly migrate to cloud infrastructures—including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a...

Control Access. Control Risk.

Protect your critical IT assets with Portnox’s radically simple cloud-native unified access control platform. No hassles. No BS.

Discover the ROI Behind Portnox in the New TEI Study

X