10 Best Inspiring Leaders of the Year 2023
Cio Bulletin
Portnox offers cloud-native zero trust access control and cybersecurity essentials that enable agile, resource-constrained IT teams to proactively address today’s most pressing security challenges: the rapid expansion of enterprise networks, the proliferation of connected device types, the increased sophistication of cyberattacks, and the shift to zero trust. Hundreds of companies have leveraged Portnox’s award-winning security products to enforce powerful network access, endpoint risk monitoring and remediation policies to strengthen their organizational security posture. By eliminating the need for any on-premises footprint common among traditional information security systems, Portnox allows companies - no matter their size, geo-distribution, or networking architecture - to deploy, scale, enforce and maintain these critical zero trust security policies with unprecedented ease.
Cloud-Native Network & Endpoint Security Products
Portnox Cloud: The only cloud-native, vendor agnostic zero trust access control platform that unifies network authentication, risk mitigation and compliance enforcement. Gain real-time visibility of endpoints trying to connect to your network and infrastructure, plus additional context such as their location, device type, and requested access layer for authentication. Extend zero trust security coverage to company devices, BYOD and IoT / OT alike, no matter if they're authenticating via wired ports, WiFi or VPN.
Cloud-native ZTNA delivers best-of-breed network security capabilities to organizations of all shapes and sizes. Their software is networking hardware agnostic, and provides complete visibility of all devices the minute they request access to the network. When hackers get smart, they help you get smarter with always-on security essentials that prevent costly, sophisticated attacks, no matter how complex your network.
Define and enforce unique access control policies based on roles, locations, device types and more across your various network access layers. Additionally, leverage Portnox Cloud's powerful risk assessment policy configuration capabilities to continually monitor the risk posture of connected devices - including managed and BYOD - enabling your network administrators to understand the true zero trust security posture of the network at any point in time. Quarantine vulnerable, non-compliant devices and return them to a healthy, compliant state automatically by setting unique endpoint remediation policies in accordance with your compliance requirements.
Portnox Cloud's compliance enforcement capabilities can help your organization adhere to industry-specific regulatory and compliance standards such as HIPAA, GLBA, PCI DSS, GDPR, and beyond. Credentials are the weakest link no matter how strong your security posture – implement passwordless authentication with digital certificates and never worry about a phishing attempt to steal passwords ever again. Portnox can be your certificate authority or integrate with a third-party. They also support SCEP (Simple Certificate Enrollment Protocol) so deploying certificates to all your devices will be, well, simple.
RADIUS: RADIUS-as-a-Service can help you answer just that and more. Stare through the proverbial peep hole and see who’s requesting access to your network, as well as the access layer they’re using, their location, device type, and more. Portnox's cloud RADIUS service is provided through a cloud-based cluster of fully redundant RADIUS servers and is used for authentication of users accessing the enterprise. Integrate with your existing identity provider, use theirs, or set up passwordless authentication with ease.
Internet outages can affect your colleagues' ability to work, duh. But have no fear! To solve this issue, Portnox offers a local RADIUS instance that works overtime - when there is connectivity with the cloud, it acts as a proxy in a chain, forwarding communications to and from the cloud RADIUS service. If the cloud RADIUS authentication service cannot connect to the cloud, the local RADIUS assumes the role of the cloud RADIUS until connectivity is restored!
Portnox can offer you network authentication and a whole lot more. Take your network security up a notch with their cloud-native NAC-as-a-Service for full access control coverage. With Portnox NAC-as-a-Service, gain real-time visibility of endpoints trying to connect to your network, plus additional context such as their location, device type, and requested access layer for authentication. This applies to manage company devices, BYOD and IoT / OT alike, no matter if they're authenticating via wired ports, WiFi or VPN.
TACACS+: Keep the IT riff raff out and your precious network devices under lock and key with cloud-native TACACS+ from Portnox. A key aspect of any comprehensive zero trust strategy is least-privileged access - just because you’re in IT doesn’t mean you can make changes to every network access point or switch! Define and enforce access control policies for network devices so not just anyone can tinker with your infrastructure.
Put an end to network admin finger-pointing and bring a smile to security auditors' faces with the ability to track user activity across network devices. TACACS+ brings AAA (Accounting, Authentication, and Authorization) to the cloud. Available accounting records include user identities, start and stop times, and executed commands. Portnox TACACS+ can be integrated with a variety of other common security tools, including Active Directory and SIEM. As a true cloud-native SaaS solution, Portnox TACACS+ can deliver AAA services for any device on any network anywhere in the world.
Denny LeCompte | CEO & Board of Directors
As CEO, Denny LeCompte is responsible for overseeing the day-to-day operations and strategic direction at Portnox. Denny brings over 20 years of experience in IT infrastructure and cyber security. Prior to joining Portnox, Denny held executive leadership roles at leading IT management and security firms, including SolarWinds and AlienVault. Denny holds a Ph.D. in cognitive psychology from Rice University.