IT INFRASTRUCTURE AND NETWORK ADMIN at Investment One Finance
Real User
2022-05-26T13:48:00Z
May 26, 2022
We use it more on our endpoint solutions, and endpoint devices, to secure our endpoint devices, including the computers, CCTV cameras, et cetera. We use it just to add a level of security to our endpoints.
Vodja projektov sistemskih rešitev at a tech services company with 51-200 employees
Real User
2021-08-26T14:31:01Z
Aug 26, 2021
We just do some basic testing on how the product is working. We are system integrators, and due to that, we are testing products to see if it makes sense to offer them to other customers.
We primarily use the solution for network access control, on the wireless and the wired LAN. This includes managing; network access control, profiling of endpoints and, also managing guests and consultants on the network.
Security Analyst at a financial services firm with 201-500 employees
Real User
2020-04-21T00:59:00Z
Apr 21, 2020
The primary use of Portnox was for Network Access Control (NAC) and management. It was used to control and manage access to the network in my client's network. Unauthorised devices were locked out until approved and granted by the NAC manager. It showed information including the IP address, MAC address, hostname of device, username, switch location, and port number of where a device is connected to. It covers both wired and wireless. Portnox CORE helped in securing my client's threat landscape from attackers and hackers.
Consulting Principal at a transportation company with 501-1,000 employees
Real User
2019-07-31T05:52:00Z
Jul 31, 2019
We use this solution for network access control in an on-premises deployment. It handles our authentication, allowing users to access a network only according to the policy that the organization provides. The network is not open to everyone. Rather, it's only open to those who actually work for the network.
Chief System Engineer at a media company with 501-1,000 employees
Real User
2019-07-29T10:12:00Z
Jul 29, 2019
For our use case we can check on syndication issues while using it for NAC (Network Access Control). It helps us to allow users access to the network according to the policy that the organization provides.
Portnox offers Network Access Control to manage user access based on policy, securing both wired and wireless networks while ensuring compliance. It supports endpoint security and prevents unauthorized access across industries such as banking, IT, and energy distribution.
Designed for both on-premises and cloud deployments through CORE and Clear versions, Portnox delivers a straightforward interface aiding in deployment. It integrates effectively with equipment from multiple vendors and...
We primarily use it for network access control (NAC).
I use it to link and analyze data.
We use the solution for NAC which gives us the ability to control networks.
It is good for network access control.
We use it more on our endpoint solutions, and endpoint devices, to secure our endpoint devices, including the computers, CCTV cameras, et cetera. We use it just to add a level of security to our endpoints.
We just do some basic testing on how the product is working. We are system integrators, and due to that, we are testing products to see if it makes sense to offer them to other customers.
We primarily use the solution for network access control, on the wireless and the wired LAN. This includes managing; network access control, profiling of endpoints and, also managing guests and consultants on the network.
The primary use of Portnox was for Network Access Control (NAC) and management. It was used to control and manage access to the network in my client's network. Unauthorised devices were locked out until approved and granted by the NAC manager. It showed information including the IP address, MAC address, hostname of device, username, switch location, and port number of where a device is connected to. It covers both wired and wireless. Portnox CORE helped in securing my client's threat landscape from attackers and hackers.
We use this solution for network access control in an on-premises deployment. It handles our authentication, allowing users to access a network only according to the policy that the organization provides. The network is not open to everyone. Rather, it's only open to those who actually work for the network.
For our use case we can check on syndication issues while using it for NAC (Network Access Control). It helps us to allow users access to the network according to the policy that the organization provides.