SlideShare a Scribd company logo
portnox.com
Portnox’s Network Access Control (NAC) Platform traverses all network layers - physical, virtual or in the
cloud - to illuminate, visualize, analyze and control all connected users and devices. With an agentless
and appliance-less architecture it easily scales across major sites, remote offices, BYOD environments
and the Cloud requiring no changes to network infrastructure. It’s unmatched ability to reach every
fragment of the network regardless of layer or location results in the most accurate and real-time view of
an organization’s network enabling smarter, more productive and secure decisions.
The Unique Advantages of Portnox
Boundless
No Appliances
Portnox does not require any appliances (virtual or physical) and
is very easily implemented without the need for network topology
changes, port mirroring or mapping.
Coverage For All Network Layers
Beyond the traditional Ethernet and wireless, Portnox extends
to provide policy on VPN connections, Virtual infrastructure
(datacenter or Virtual Desktop Infrastructure [VDI]) as well as
BYOD and Cloud environments.
Coverage Across All Network Locations
Portnox works with existing networking equipment allowing it to
extend effortlessly across an organization’s entire geography -
major sites and remote locations alike.
No Agent Software and Coverage for All IP Devices
Portnox provides full functionality without the need for any agent
software to be installed on connecting devices allowing for a
far simpler deployment and tighter security policies with less
exceptions in place for unique/esoteric devices. To achieve
this, Portnox leverages 20+ profiling and authentication profiles
including a proprietary signature mechanism. No open source
tools such as NMAP or MAC address based profiles are used.
WITH PORTNOX YOU CAN:
•	 Get to know who, when, how and
where devices and users are taking
part of your network
•	 Monitor all access and identify
each connecting device, user and
location
•	 Enforce location based access
policy
•	 Enforce corporate security &
ensure regulatory compliance
•	 Regain the control of your virtual
domain
•	 Maintain granular access control at
the level of the access layer
•	 Contain infected and rogue devices
•	 Achieve comprehensive network
hygiene
DATA SHEET
Think again.
THINK YOU KNOW
YOUR NETWORK?
USA tel. +1.855.4portnox | usinfo@portnox.com | 623 Eagle Rock Avenue, Suite 396, West Orange, NJ 07052
UK tel. +44.1273.256.325 | dotell@portnox.com | 5 Albourne Court, Henfield Road, Albourne, West Sussex BN6 9FF
ISRAEL tel. +972.9.957.9889 | fax.+972.9.950.9879 | tellus@portnox.com | Elbe House, 33 Ben Gurion St., Herzlia 46785
Smart
Control All Connected Devices
In contrast to existing NAC solutions which scan
pre-defined IP scopes, thereby ignoring any device
utilizing a different IP address, Portnox monitors all
connected devices by communicating directly with
all switches, wireless controllers, VPN gateways and
virtual hosts. No stone is left unturned.
Intelligent Security Policies
By leveraging this unique ability to scale across all
layers, all locations and all devices Portnox provides
security policies that are far more agile, advanced and
practical than the typical NAC solutions. This greatly
minimizes false disconnections providing a more
sensible balance between productivity and security.
Location!, Location!, Location!
Since Portnox interacts directly with the switching
equipment, it factors the physical location of the device
into the security equation. This results in a far more
logical and secure policy that correlates the identity of
the connecting device and user to each decision. The
benefits of this approach cannot be overstated and
they apply to almost every decision Portnox can make:
•	 The physical location of the port or device can
translate into the security policy thus enabling
far stronger policies in sensitive areas such as
datacenters, executive offices or production/factory
floors without creating false disconnections in less
sensitive areas such as lobbies, conference rooms,
etc.
•	 Exceptions for devices with limited ability to
authenticate/communicate are always ring-fenced to
specific physical locations in the network. Imagine a
rule allowing IP cameras or thermostats to connect.
By factoring their physical location, Portnox ensures
they cannot be removed, duplicated or mimicked
without detection.
Prior Behavior or ‘Credit Score’
For NAC policies to be effective, they must require
connecting devices to meet varying levels of
compliance. On average and even in the best
managed environments every device will fail
compliance every 12-18 months for a myriad of
perfectly valid reasons. Rather than immediately
disconnect a potential innocuous device for a simple
compliance infraction, Portnox can factor its prior
Scale
Super Lightweight Policy Enforcement Points
Portnox Knoxer™ is a propriety and lightweight software
designed to carry out Portnox’s policies and controls in
remote locations. Knoxer can be easily virtualized or set
to run on a standard thin-client PC. It removes the needs
for costly, replicated, remediation infrastructure and
provides enterprises with an easily and cost-effectively
means of scale their NAC deployment.
Versatile Licensing
Portnox’s licensing is in direct correlation to the
infrastructure allowing it to logically scale as the
organization grows. There are no fees for additional
Portnox servers or Knoxers and both can be natively
virtualized on any common virtualization platform such
as VMWare or HyperV. This allows organizations with
complex and fragmented networks the greatest agility
and flexibility in controlling their networks and policies.
Easily Integrated and Extensible
To ensure easy integration with an organizations existing
SIEM/SOC as well as other dashboards, Portnox ships
with a mature set of tools including CLI, Web Service
APIs and troubleshooting utilities.
Role Based Administration
Portnox has a flexible policy for allocating customized
administrative rights to the various roles at a company
responsible for managing Portnox. This means that
a helpdesk employee could be granted the rights to
shut down or enable a single port, whereas a network
or system administrator could be given more policy
orientated rights (such as configuration of corporate
security policies, VLAN assignments, etc.)
“The Portnox system enables us, on one hand to pinpoint
the access to the network at the single access point
(port) and on the other hand it gives us the reach of
a granular oversight which provides a management
interface for each department.”
Mr. Itzik Cohen - Chief of IT and Infrastructure
El Al Israeli Airlines
DATA SHEET / UNIOQUE ADVANTAGES

More Related Content

PPTX
Cdi federal 2019
PPTX
Service providers presentation
PPTX
SECURE Out-of-Band Management
PPTX
Segmenting your Network for Security - The Good, the Bad and the Ugly
PPTX
Cdi federal 2019
PDF
App gate sdp_use_case_secure_cloud_access
PDF
Wlan wi ng5_brochure
PPTX
Wireless lan security
Cdi federal 2019
Service providers presentation
SECURE Out-of-Band Management
Segmenting your Network for Security - The Good, the Bad and the Ugly
Cdi federal 2019
App gate sdp_use_case_secure_cloud_access
Wlan wi ng5_brochure
Wireless lan security

What's hot (18)

PPT
Concentris Systems Overview
PDF
Motorola Wing 5.6 specification sheet
PPTX
6 Steps to Secure Network Devices
PPT
Trapeze Medical customer presentation 10 14-09
PPTX
Intrusion prevention system(ips)
PPTX
IDS, IPS, IDPS
PPTX
Firewall ppt
PPTX
Build Redundant and Resilient Networks with Micro-Segmentation
PPTX
Isf 2015 continuous diagnostics monitoring may 2015
PPTX
4 Easy Steps for Increased Industrial Cybersecurity
PDF
Rfs6000 spec sheet
PPT
Palo alto networks next generation firewalls
PDF
Tatanet Corporate Presentation
PPTX
Network Security
DOC
Ch7 ccna exploration 3 lan switching and wireless
PDF
Week14 Presentation
PDF
Security Delivery Platform: Best practices
PDF
Ap7131 government spec_sheet
Concentris Systems Overview
Motorola Wing 5.6 specification sheet
6 Steps to Secure Network Devices
Trapeze Medical customer presentation 10 14-09
Intrusion prevention system(ips)
IDS, IPS, IDPS
Firewall ppt
Build Redundant and Resilient Networks with Micro-Segmentation
Isf 2015 continuous diagnostics monitoring may 2015
4 Easy Steps for Increased Industrial Cybersecurity
Rfs6000 spec sheet
Palo alto networks next generation firewalls
Tatanet Corporate Presentation
Network Security
Ch7 ccna exploration 3 lan switching and wireless
Week14 Presentation
Security Delivery Platform: Best practices
Ap7131 government spec_sheet
Ad

Viewers also liked (20)

PDF
WorkSafe ACT Site Inspection
PPTX
Campus party (1)
PDF
2007lv Nac Big Pic[1]
PPTX
Aldair1
PDF
話我家鄉
PPTX
Campus party jennifer
PPTX
PDF
Arved sandstrom - the rotwithin - atlseccon2011
PDF
家鄉的名勝古蹟與特產
PPTX
Loppupuheenvuoro - seminaari 26.10.2016
PPTX
Ley de gas ideal, constante universal de gases y gases reales
PDF
Carlos Conde : AWS Game Days - TIAD Paris
PPTX
TIAD 2016 : ITiocracy
PPTX
Tiad : Continuous Learning
PDF
Corporate profile quadrant knowledge solutions
PDF
TIAD : Automation day by Jerôme Labat
PPTX
TIAD : DevOps & continuous delivery dans le cloud
PPTX
10 Mandamentos - Aula 11 - 10º mandamento
PDF
Case Fiksu Kalasatama
DOC
Mohamed_El-Tokhy_Resume_last
WorkSafe ACT Site Inspection
Campus party (1)
2007lv Nac Big Pic[1]
Aldair1
話我家鄉
Campus party jennifer
Arved sandstrom - the rotwithin - atlseccon2011
家鄉的名勝古蹟與特產
Loppupuheenvuoro - seminaari 26.10.2016
Ley de gas ideal, constante universal de gases y gases reales
Carlos Conde : AWS Game Days - TIAD Paris
TIAD 2016 : ITiocracy
Tiad : Continuous Learning
Corporate profile quadrant knowledge solutions
TIAD : Automation day by Jerôme Labat
TIAD : DevOps & continuous delivery dans le cloud
10 Mandamentos - Aula 11 - 10º mandamento
Case Fiksu Kalasatama
Mohamed_El-Tokhy_Resume_last
Ad

Similar to DS - Portnox_Unique Advantages (20)

PDF
Fore scout nac-datasheet
DOCX
Background Information for World-Wide Trading CompanyWorld-Wide .docx
PDF
CentralizedSerialWP
PPTX
2010fall ch31 naymka
DOCX
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
DOCX
Network security
PDF
Genian NAC Overview
PDF
Network Operations Solutions - Perydot - Integrated Network Management for D...
PDF
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
PDF
Essential-Network-Hardware-for-Business-Success.pdf
PDF
Quareo Solution Overview
PDF
Hosted security
PPTX
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
PPTX
SalesDeckPresdsadderewrwreer23dsadsaddewwqwq
PDF
27859 a new distributed architecture for remote communications 2013
PPTX
Zero trust model for cloud computing.pptx
PDF
Cloud managed networking
PDF
Industrial Communication Systems
PDF
Pilgrim Beart, Founder AlertMe
PDF
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Fore scout nac-datasheet
Background Information for World-Wide Trading CompanyWorld-Wide .docx
CentralizedSerialWP
2010fall ch31 naymka
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Network security
Genian NAC Overview
Network Operations Solutions - Perydot - Integrated Network Management for D...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Essential-Network-Hardware-for-Business-Success.pdf
Quareo Solution Overview
Hosted security
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
SalesDeckPresdsadderewrwreer23dsadsaddewwqwq
27859 a new distributed architecture for remote communications 2013
Zero trust model for cloud computing.pptx
Cloud managed networking
Industrial Communication Systems
Pilgrim Beart, Founder AlertMe
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World

More from Jason Newell (11)

PDF
Why virtualDCS for existing Veeam resellers
PDF
Nimbox presentation
PDF
Reseller Benefits
PDF
Cloud Cover 365 user introduction
PDF
DaaS introduction
PDF
Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability S...
PDF
Certificate Management Made Easy
PDF
Reblaze Web Application Firewall
PDF
Protect Websites against DDoS attacks with Reblaze
PDF
DataShepherd Security
PDF
Hosted Exchange
Why virtualDCS for existing Veeam resellers
Nimbox presentation
Reseller Benefits
Cloud Cover 365 user introduction
DaaS introduction
Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability S...
Certificate Management Made Easy
Reblaze Web Application Firewall
Protect Websites against DDoS attacks with Reblaze
DataShepherd Security
Hosted Exchange

DS - Portnox_Unique Advantages

  • 1. portnox.com Portnox’s Network Access Control (NAC) Platform traverses all network layers - physical, virtual or in the cloud - to illuminate, visualize, analyze and control all connected users and devices. With an agentless and appliance-less architecture it easily scales across major sites, remote offices, BYOD environments and the Cloud requiring no changes to network infrastructure. It’s unmatched ability to reach every fragment of the network regardless of layer or location results in the most accurate and real-time view of an organization’s network enabling smarter, more productive and secure decisions. The Unique Advantages of Portnox Boundless No Appliances Portnox does not require any appliances (virtual or physical) and is very easily implemented without the need for network topology changes, port mirroring or mapping. Coverage For All Network Layers Beyond the traditional Ethernet and wireless, Portnox extends to provide policy on VPN connections, Virtual infrastructure (datacenter or Virtual Desktop Infrastructure [VDI]) as well as BYOD and Cloud environments. Coverage Across All Network Locations Portnox works with existing networking equipment allowing it to extend effortlessly across an organization’s entire geography - major sites and remote locations alike. No Agent Software and Coverage for All IP Devices Portnox provides full functionality without the need for any agent software to be installed on connecting devices allowing for a far simpler deployment and tighter security policies with less exceptions in place for unique/esoteric devices. To achieve this, Portnox leverages 20+ profiling and authentication profiles including a proprietary signature mechanism. No open source tools such as NMAP or MAC address based profiles are used. WITH PORTNOX YOU CAN: • Get to know who, when, how and where devices and users are taking part of your network • Monitor all access and identify each connecting device, user and location • Enforce location based access policy • Enforce corporate security & ensure regulatory compliance • Regain the control of your virtual domain • Maintain granular access control at the level of the access layer • Contain infected and rogue devices • Achieve comprehensive network hygiene DATA SHEET Think again. THINK YOU KNOW YOUR NETWORK?
  • 2. USA tel. +1.855.4portnox | usinfo@portnox.com | 623 Eagle Rock Avenue, Suite 396, West Orange, NJ 07052 UK tel. +44.1273.256.325 | dotell@portnox.com | 5 Albourne Court, Henfield Road, Albourne, West Sussex BN6 9FF ISRAEL tel. +972.9.957.9889 | fax.+972.9.950.9879 | tellus@portnox.com | Elbe House, 33 Ben Gurion St., Herzlia 46785 Smart Control All Connected Devices In contrast to existing NAC solutions which scan pre-defined IP scopes, thereby ignoring any device utilizing a different IP address, Portnox monitors all connected devices by communicating directly with all switches, wireless controllers, VPN gateways and virtual hosts. No stone is left unturned. Intelligent Security Policies By leveraging this unique ability to scale across all layers, all locations and all devices Portnox provides security policies that are far more agile, advanced and practical than the typical NAC solutions. This greatly minimizes false disconnections providing a more sensible balance between productivity and security. Location!, Location!, Location! Since Portnox interacts directly with the switching equipment, it factors the physical location of the device into the security equation. This results in a far more logical and secure policy that correlates the identity of the connecting device and user to each decision. The benefits of this approach cannot be overstated and they apply to almost every decision Portnox can make: • The physical location of the port or device can translate into the security policy thus enabling far stronger policies in sensitive areas such as datacenters, executive offices or production/factory floors without creating false disconnections in less sensitive areas such as lobbies, conference rooms, etc. • Exceptions for devices with limited ability to authenticate/communicate are always ring-fenced to specific physical locations in the network. Imagine a rule allowing IP cameras or thermostats to connect. By factoring their physical location, Portnox ensures they cannot be removed, duplicated or mimicked without detection. Prior Behavior or ‘Credit Score’ For NAC policies to be effective, they must require connecting devices to meet varying levels of compliance. On average and even in the best managed environments every device will fail compliance every 12-18 months for a myriad of perfectly valid reasons. Rather than immediately disconnect a potential innocuous device for a simple compliance infraction, Portnox can factor its prior Scale Super Lightweight Policy Enforcement Points Portnox Knoxer™ is a propriety and lightweight software designed to carry out Portnox’s policies and controls in remote locations. Knoxer can be easily virtualized or set to run on a standard thin-client PC. It removes the needs for costly, replicated, remediation infrastructure and provides enterprises with an easily and cost-effectively means of scale their NAC deployment. Versatile Licensing Portnox’s licensing is in direct correlation to the infrastructure allowing it to logically scale as the organization grows. There are no fees for additional Portnox servers or Knoxers and both can be natively virtualized on any common virtualization platform such as VMWare or HyperV. This allows organizations with complex and fragmented networks the greatest agility and flexibility in controlling their networks and policies. Easily Integrated and Extensible To ensure easy integration with an organizations existing SIEM/SOC as well as other dashboards, Portnox ships with a mature set of tools including CLI, Web Service APIs and troubleshooting utilities. Role Based Administration Portnox has a flexible policy for allocating customized administrative rights to the various roles at a company responsible for managing Portnox. This means that a helpdesk employee could be granted the rights to shut down or enable a single port, whereas a network or system administrator could be given more policy orientated rights (such as configuration of corporate security policies, VLAN assignments, etc.) “The Portnox system enables us, on one hand to pinpoint the access to the network at the single access point (port) and on the other hand it gives us the reach of a granular oversight which provides a management interface for each department.” Mr. Itzik Cohen - Chief of IT and Infrastructure El Al Israeli Airlines DATA SHEET / UNIOQUE ADVANTAGES