Portnox

About Portnox
Portnox CLEAR
Portnox CORE
Comparison
Resources Center
Press Release
The Importance of a Network Access Control Solution
The enterprise computing landscape has shifted significantly since network access control (NAC) solutions were first introduced. Originally created to control access for devices connecting over the wired network, NAC is effective at knowing when devices connect, and controlling their access based on pre-defined security policies. Rapid innovation in the wireless network over the past decade, together with mobile device technology and Internet of Things, has made it so that the enterprise hardly depends on wired-only systems to achieve its business bottom line, causing the capabilities of NAC solutions to evolve.
Evidenced in the fact that NAC solutions address the Top Five Center for Internet Security (CIS) Controls, it seems that the rapid pace of technological innovation cannot outpace the relevance of NAC solutions. NAC solutions address:
CIS Control 1: Inventory of Authorized and Unauthorized Devices
How NAC Helps :
NAC solutions can see all the hardware devices on the network, allowing for total inventory and control.
CIS Control 2: Inventory of Authorized and Unauthorized Software
How NAC Helps :
NAC solutions gather information on the software installed on endpoints.
CIS Control 3: Secure Configurations for Hardware and Software
How NAC Helps :
NAC solutions can inspect configurations on any endpoints connected to the network.
CIS Control 4: Continuous Vulnerability Assessment and Remediation
How NAC Helps :
Most NAC solutions allow for continuous compliance validations and remediation measures for connected devices.
CIS Control 5: Controlled Use of Administrative Privileges
How NAC Helps :
Role-based access control makes it possible to control use of administrative privileges based on pre-defined roles.
Network security coverage NAC solutions provide:
Visibility into Network Connections:
See and gain insights into every device connecting to the network, and gain actionable intelligence that can be used to optimize network security policies in consideration of threats.
Controlled Access:
By setting security policies to control access across the network, organizations can keep malicious devices off the network, thereby controlling exposure to cybersecurity threats and digital business risks.
Unified Management:
Simplification of tasks for network and security administrators by providing the ability to both see and control connected devices, set automated controls and remediation procedures.
Internet of Things Security:
Gain control over IoT devices and their level of security when connecting to the network with the help of agentless NAC solutions.
Compliance:
NAC solutions help organizations meet a growing body of compliance standards such as PCI-DDS, SOX, HIPAA, and more. Easily perform auditing checks and compile reports.
Integrations:
NAC solutions can easily integrate with existing architecture and share data with other security vendors such as MDM, IPS, SIEM, and more. Using the alerts from integrated solutions, respond faster and with accuracy to threats or changes in the network status.
Overview
Cloud NAC
Wifi Security
VPN Security
Cloud RADIUS
Portnox CLEAR
100% Cloud-Native NAC
SECURITY ESSENTIALS FOR CORPORATE NETWORKS. NO MATTER HOW COMPLEX.
The only cloud-native, vendor agnostic platform that unifies network authentication, risk mitigation and compliance enforcement.


Portnox CLEAR
100% Cloud-Native NAC
SECURITY ESSENTIALS FOR CORPORATE NETWORKS. NO MATTER HOW COMPLEX.
The only cloud-native, vendor agnostic platform that unifies network authentication, risk mitigation and compliance enforcement.
Cloud-native NAC-as-a-Service.
Built for today’s lean IT teams.

See & understand
Gain real-time visibility of endpoints trying to connect to your network, plus additional context such as their location, device type, and requested access layer for authentication.
This applies to managed company devices, BYOD and IoT / OT alike, no matter if they're authenticating via wired ports, WiFi or VPN.
Control & monitor
Define and enforce unique access control policies based on roles, locations, device types and more across your various network access layers.
Additionally, leverage Portnox CLEAR's powerful risk assessment policy configuration capabilities to continually monitor the risk posture of connected devices - including managed and BYOD - enabling your network administrators to understand the true security posture of the network at any point in time.


Control & monitor
Define and enforce unique access control policies based on roles, locations, device types and more across your various network access layers.
Additionally, leverage Portnox CLEAR's powerful risk assessment policy configuration capabilities to continually monitor the risk posture of connected devices - including managed and BYOD - enabling your network administrators to understand the true security posture of the network at any point in time.

Remain compliant
Quarantine vulnerable, non-compliant devices and return them to a healthy, compliant state automatically by setting unique endpoint remediation policies in accordance with your compliance requirements.
Portnox CLEAR's compliance enforcement capabilities can help your organization adhere to industry-specific regulatory and compliance standards such as HIPAA, GLBA, PCI DSS, GDPR and beyond.
Here's what our customers have to say...
We examined a number of products, and decided to go with Portnox CLEAR because of its ease-of-deployment. We were set up within half an hour, which exceeded expectations.
We conducted a test of Portnox CLEAR – your cloud NAC service – for access control across our WiFi environment. It took literally ten minutes to set up with the help of Portnox’s support engineer.
We set up our account and set a meeting to assess where we were and what we needed to do. Well, my systems admin basically got everything configured in a few days on his own .

Daniel Blackman
Head of IT, McLaren Construction

Andrew Sayegh
IT Infrastructure Admin, Schuman Cheese

Chris Becker
National IT Director, AbsoluteCare
We examined a number of products, and decided to go with Portnox CLEAR because of its ease-of-deployment. We were set up within half an hour, which exceeded expectations.

Daniel Blackman
Head of IT, McLaren Construction
We conducted a test of Portnox CLEAR – your cloud NAC service – for access control across our WiFi environment. It took literally ten minutes to set up with the help of Portnox’s support engineer.

Andrew Sayegh
IT Infrastructure Admin, Schuman Cheese
We set up our account and set a meeting to assess where we were and what we needed to do. Well, my systems admin basically got everything configured in a few days on his own .

Chris Becker
National IT Director, AbsoluteCare
The security essentials you want. All in one place.
RADIUS
- One-click cloud RADIUS
- Anti-flood protection
- RadSec support & RADIUS forwarding
Authentication
- Role-based authentication
- MAC authentication bypass
- Certificate authority services
Security
- 802.1X authentication
- Dynamic VLAN / ACL assignment
- Post-connect authorization
Visibility
- Monitoring-only mode
- Archived device data retention
- Managed, BYOD & IoT profiling
Control
- Role- & location-based access
- Policy group assignment per device type
- Auto-segmentation of users
Mitigation
- Endpoint risk posture assessment
- Risk-based access control
- Firewall, antivirus & app checks
Remediation
- Endpoint quarantining
- Firewall & antivirus updates
- Compliance enforcement
Reporting
- Device visibility & connection timeline
- Guest access history
- Security & compliance adherence
RADIUS
- One-click cloud RADIUS
- Anti-flood protection
- RadSec support & RADIUS forwarding
Control
- Role- & location-based access
- Policy group assignment per device type
- Auto-segmentation of users
Authentication
- Role-based authentication
- MAC authentication bypass
- Certificate authority services
Mitigation
- Endpoint risk posture assessment
- Risk-based access control
- Firewall, antivirus & app checks
Security
- 802.1X authentication
- Dynamic VLAN / ACL assignment
- Post-connect authorization
Remediation
- Endpoint quarantining
- Firewall & antivirus updates
- Compliance enforcement
Visibility
- Monitoring-only mode
- Archived device data retention
- Managed, BYOD & IoT profiling
Reporting
- Device visibility & connection timeline
- Guest access history
- Security & compliance adherence
CLOUD-DELIVERED
NAC-as-a-Service
The rise of BYOD, mobile workforces and IoT has driven an exponential increase in the number and types of devices that can connect to today’s corporate networks. With more endpoints than ever before, all of your access layers – including wired, wireless and VPN – have never been more vulnerable. Find out how NAC-as-a-Service can help.


CLOUD-DELIVERED
NAC-as-a-Service
The rise of BYOD, mobile workforces and IoT has driven an exponential increase in the number and types of devices that can connect to today’s corporate networks. With more endpoints than ever before, all of your access layers – including wired, wireless and VPN – have never been more vulnerable. Find out how NAC-as-a-Service can help.
NEXT GEN
NAC
IS HERE
Network Access Control, Made Simple
With Portnox CLEAR, our cloud-delivered NAC-as-a-Service solution, companies of all sizes, shapes and industries - particularly large distributed or decentralized enterprises - can leverage a cloud service for device authentication, network visibility, access control, as well as endpoint risk monitoring across all access layers.
AC-as-a-Service: Expect More
Powerful
With access control based on 802.1X protocol, network administrators can block rogue devices, quarantine non-compliant endpoints, limit access to specified resources and more – whatever your internal policy calls for.
Secure
Portnox is SOC-certified, GDPR ready, and can help organizations in preparation for regulatory compliance, such as PCI, HIPAA and more. All customer data is encrypted in-motion or at rest, user credentials never leave the organization, and administrators can be set to use MFA.
Transparent
Portnox NAC-as-a-Service determines device type, location and level of access for every user on the network. Additionally, the platform can identify operating systems, installed applications, services, certificates and more – helping your IT team ensure compliance across the entire workforce.
Simple & Secure Network Access Control

See all devices connected to your network - no matter their type or location

Deploy rapidly with no need to worry about pre-set infrastructure or lengthy training.

Leverage our built-in Certificate Authority, or work with your own - whatever your policy requires.
CLOUD-DELIVERED
WiFi Security-as-a-Service
WiFi extends beyond your walls. Employees harmlessly share company WiFi passwords with guests, contractors, business neighbors without ever stopping to think about the network and information security risks this poses to their organization.


CLOUD-DELIVERED
WiFi Security-as-a-Service
WiFi extends beyond your walls. Employees harmlessly share company WiFi passwords with guests, contractors, business neighbors without ever stopping to think about the network and information security risks this poses to their organization.
802.1X
WiFi
SECURITY
At Portnox, We Believe Every Company Deserves Enterprise-Grade WiFi Security.
It's never been easier to secure your WiFi. With Portnox's WiFi Security-as-a-Service, move away from insecure shared passwords and easily enhance your WiFi security with certificate or credential-based authentication in minutes.
WiFi Security, Out-of-the-Box
Flexible
With built-in integrations to AzureAD, Okta, Microsoft Intune, Palo Alto Networks and more, you can easily mesh your WiFi security with your existing tech stack and remain as streamlined as ever.
Affordable
Set-up your RADIUS server in the cloud and leverage certificate or credential-based authentication out-of-the-box. Stop worrying about directory integration, managing cloud IAM or on-going maintenance – and that means lower total cost of ownership.
Scalable
Set-up your RADIUS server in the cloud and leverage certificate or credential-based authentication out-of-the-box. Stop worrying about directory integration, managing cloud IAM or on-going maintenance – and that means lower total cost of ownership.
Simple & Secure

See all devices connected to your network - no matter their type or location

Deploy rapidly with no need to worry about pre-set infrastructure or lengthy training.

Leverage our built-in Certificate Authority, or work with your own - whatever your policy requires.
CLOUD-DELIVERED
VPN Security-as-a-Service
Today, your network is expanding by the minute. Employees are using their devices – personal or work-issued – from home, hotels, airports, restaurants, or any place with an internet connection. This poses a unique VPN security challenge, particularly as the critical resources your remote workforce needs access to consist of both cloud-based platforms AND internally-hosted business systems.


CLOUD-DELIVERED
VPN Security-as-a-Service
Today, your network is expanding by the minute. Employees are using their devices – personal or work-issued – from home, hotels, airports, restaurants, or any place with an internet connection. This poses a unique VPN security challenge, particularly as the critical resources your remote workforce needs access to consist of both cloud-based platforms AND internally-hosted business systems.
CLOUD BASED
VPN
SECURITY
VPN Security Must be Able to Determine the Risk Posture of Connected At-Home Endpoints
Portnox CLEAR has been purpose-built to easily enhance VPN security by delivering full endpoint risk awareness, device remediation and powerful access controls from the cloud.
Elevate Your VPN Security
Access Control to
Cloud Apps
Your remote employees may also need access to cloud-hosted enterprise applications such as Office365, Salesforce, Box, etc. Through integrations like Okta, Portnox CLEAR can extend the same endpoint risk-driven access controls to your cloud applications.
Off-Campus Endpoint Risk Awareness
As a cloud-based solution, Portnox CLEAR is always aware of the current risk of remote devices, regardless of if they’re “on” or “off” the network – giving you full, continuous visibility and risk awareness.
Remote Endpoint
Compliance
Continuous, anywhere awareness of device risk paired with the ability to dynamically control access based on policy is a critical part of the remote network access control model. Portnox CLEAR goes one step further with automated corrective and preventative actions (CAPA).
Simple, Secure VPN Security

Flexible, pay-as-you-go subscription options allow you to scale your business as needed.

Deploy rapidly with no need to worry about pre-set infrastructure or lengthy training.

Portnox is SOC II Type II certified, with data encryption in motion or at rest.
CLOUD-DELIVERED
RADIUS-as-a-Service
Securing your network will always be a priority – no doubt one of many priorities your IT team is faced with – but it doesn’t need to be a drain on time and resources. Companies can now leverage Portnox's cloud RADIUS to efficiently and affordably authenticate to WiFi, VPN, switches and network devices.


CLOUD-DELIVERED
RADIUS-as-a-Service
Securing your network will always be a priority – no doubt one of many priorities your IT team is faced with – but it doesn’t need to be a drain on time and resources. Companies can now leverage Portnox's cloud RADIUS to efficiently and affordably authenticate to WiFi, VPN, switches and network devices.
CLOUD
RADIUS
AUTHENTICATION
Set Up Your Cloud RADIUS Server in One Click
With Portnox’s cloud RADIUS-as-a-Service solution, companies can now efficiently and affordably authenticate to WiFi, VPN, switches and network devices, while simplifying administration and enabling long-term scalability.
Goodbye Maintenance. Hello Cloud RADIUS.
Flexible
With built-in integrations to AzureAD, Okta, Microsoft Intune, Palo Alto Networks and more, you can easily mesh our cloud RADIUS with your existing tech stack and remain as streamlined as ever.
Secure
Portnox is SOC-certified, GDPR ready, and can help organizations in preparation for regulatory compliance, such as PCI, HIPAA and more. All customer data is encrypted in-motion or at rest, user credentials never leave the organization, and administrators can be set to use MFA.
Scalable
Flexible, pay-as-you-go subscription options allow you to scale your business as needed. Start with RADIUS Security-as-a-Service today, and upgrade to our comprehensive NAC-as-a-Service solution as your company and its network security need grow over time.
Simple & Secure

See all devices connected to your network - no matter their type or location

Deploy rapidly with no need to worry about pre-set infrastructure or lengthy training.

Leverage our built-in Certificate Authority, or work with your own - whatever your policy requires.
Portnox CLEAR
100% Cloud-Native NAC
SECURITY ESSENTIALS FOR CORPORATE NETWORKS. NO MATTER HOW COMPLEX.
The only cloud-native, vendor agnostic platform that unifies network authentication, risk mitigation and compliance enforcement.


Portnox CLEAR
100% Cloud-Native NAC
SECURITY ESSENTIALS FOR CORPORATE NETWORKS. NO MATTER HOW COMPLEX.
The only cloud-native, vendor agnostic platform that unifies network authentication, risk mitigation and compliance enforcement.
Cloud-native NAC-as-a-Service.
Built for today’s lean IT teams.
