{"id":869,"date":"2022-05-03T16:33:04","date_gmt":"2022-05-03T12:33:04","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?page_id=869"},"modified":"2022-05-11T22:20:38","modified_gmt":"2022-05-11T18:20:38","slug":"portnox","status":"publish","type":"page","link":"https:\/\/demo.dedote.com\/cyberdisti\/portnox\/","title":{"rendered":"Portnox"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1652292846693{padding-top: 30px !important;padding-bottom: 0px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;861&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; link=&#8221;https:\/\/www.portnox.com\/&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1652293113692{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4>Network Security doesn\u2019t have to be hard<\/h4>\n<h5><strong>Introducing Portnox Cloud-Native NAC, Powerful Zero-Trust Network<\/strong><\/h5>\n<p>The first line of defense against cyber threats targeting distributed workforces &amp; expanding networks.<\/p>\n<p><strong>Is your network security team overworked &amp; understaffed? We get it.<\/strong><\/p>\n<p>Built for agile, resource-light IT teams, our cloud-native network and endpoint security solutions promote productivity and peace of mind by eliminating:<\/p>\n<ul>\n<li>Set-up &amp; deployment challenges<\/li>\n<li>System maintenance like upgrades &amp; patches<\/li>\n<li>Hidden costs along the way<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]https:\/\/youtu.be\/HmQwg2IeEbI[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1652293131952{padding-top: 0px !important;padding-bottom: 20px !important;}&#8221;][vc_column][vc_column_text]Our unique suite of SaaS security products helps you take the work out of network security so you can sleep soundly at night and tackle other IT priorities by day.<\/p>\n<p><em><strong>Portnox never rests. So you can.<\/strong><\/em><\/p>\n<p>Outsmart hackers with network and endpoint security essentials that are always on alert to prevent costly cyberattacks and keep operations intact.<\/p>\n<p><strong>Sleep well, we\u2019ve got you covered.<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1652293188946{padding-top: 0px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<strong>Authorize<\/strong><\/p>\n<ul>\n<li>Endpoint Discovery<\/li>\n<li>Cloud RADIUS Services<\/li>\n<li>1X Authentication<\/li>\n<li>Post-Connect Authorization<\/li>\n<li>Device Visibility Reporting<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<strong>Control<\/strong><\/p>\n<ul>\n<li>On-Boarding Services<\/li>\n<li>Guest &amp; Contractor Access<\/li>\n<li>Certificate Authority Services<\/li>\n<li>Device Provisioning<\/li>\n<li>BYOD &amp; IoT Profiling<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<strong>Enforce<\/strong><\/p>\n<ul>\n<li>Network Access Control<\/li>\n<li>Network Device Control (TACACS+)<\/li>\n<li>Endpoint Risk Posture Assessment<\/li>\n<li>Proactive Device Remediation<\/li>\n<li>Compliance Checks<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_column_text]<strong>Connect<\/strong><\/p>\n<ul>\n<li>Active Directory Plugins<\/li>\n<li>MFA, MDM &amp; SIEM Integrations<\/li>\n<li>RESTful API<\/li>\n<li>Firewalls &amp; Antivirus<\/li>\n<li>Hardware Agnostic<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1652293203035{padding-top: 20px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_btn title=&#8221;View Website&#8221; i_icon_fontawesome=&#8221;fas fa-globe&#8221; add_icon=&#8221;true&#8221; el_class=&#8221;buttonwebsite&#8221; link=&#8221;url:https%3A%2F%2Fwww.portnox.com%2F%20|title:Network%20Access%20Control%20|target:_blank&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1652292846693{padding-top: 30px !important;padding-bottom: 0px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;861&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; link=&#8221;https:\/\/www.portnox.com\/&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1652293113692{padding-top: 20px !important;padding-bottom: 20px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text] Network Security doesn\u2019t have to be hard Introducing Portnox&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-869","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=869"}],"version-history":[{"count":16,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/869\/revisions"}],"predecessor-version":[{"id":1140,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/pages\/869\/revisions\/1140"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}