SlideShare a Scribd company logo
1 of 2
Download to read offline
portnox.com
Portnox’s Network Access Control (NAC) Platform traverses all network layers - physical, virtual or in the
cloud - to illuminate, visualize, analyze and control all connected users and devices. With an agentless
and appliance-less architecture it easily scales across major sites, remote offices, BYOD environments
and the Cloud requiring no changes to network infrastructure. It’s unmatched ability to reach every
fragment of the network regardless of layer or location results in the most accurate and real-time view of
an organization’s network enabling smarter, more productive and secure decisions.
The Unique Advantages of Portnox
Boundless
No Appliances
Portnox does not require any appliances (virtual or physical) and
is very easily implemented without the need for network topology
changes, port mirroring or mapping.
Coverage For All Network Layers
Beyond the traditional Ethernet and wireless, Portnox extends
to provide policy on VPN connections, Virtual infrastructure
(datacenter or Virtual Desktop Infrastructure [VDI]) as well as
BYOD and Cloud environments.
Coverage Across All Network Locations
Portnox works with existing networking equipment allowing it to
extend effortlessly across an organization’s entire geography -
major sites and remote locations alike.
No Agent Software and Coverage for All IP Devices
Portnox provides full functionality without the need for any agent
software to be installed on connecting devices allowing for a
far simpler deployment and tighter security policies with less
exceptions in place for unique/esoteric devices. To achieve
this, Portnox leverages 20+ profiling and authentication profiles
including a proprietary signature mechanism. No open source
tools such as NMAP or MAC address based profiles are used.
WITH PORTNOX YOU CAN:
•	 Get to know who, when, how and
where devices and users are taking
part of your network
•	 Monitor all access and identify
each connecting device, user and
location
•	 Enforce location based access
policy
•	 Enforce corporate security &
ensure regulatory compliance
•	 Regain the control of your virtual
domain
•	 Maintain granular access control at
the level of the access layer
•	 Contain infected and rogue devices
•	 Achieve comprehensive network
hygiene
DATA SHEET
Think again.
THINK YOU KNOW
YOUR NETWORK?
USA tel. +1.855.4portnox | usinfo@portnox.com | 623 Eagle Rock Avenue, Suite 396, West Orange, NJ 07052
UK tel. +44.1273.256.325 | dotell@portnox.com | 5 Albourne Court, Henfield Road, Albourne, West Sussex BN6 9FF
ISRAEL tel. +972.9.957.9889 | fax.+972.9.950.9879 | tellus@portnox.com | Elbe House, 33 Ben Gurion St., Herzlia 46785
Smart
Control All Connected Devices
In contrast to existing NAC solutions which scan
pre-defined IP scopes, thereby ignoring any device
utilizing a different IP address, Portnox monitors all
connected devices by communicating directly with
all switches, wireless controllers, VPN gateways and
virtual hosts. No stone is left unturned.
Intelligent Security Policies
By leveraging this unique ability to scale across all
layers, all locations and all devices Portnox provides
security policies that are far more agile, advanced and
practical than the typical NAC solutions. This greatly
minimizes false disconnections providing a more
sensible balance between productivity and security.
Location!, Location!, Location!
Since Portnox interacts directly with the switching
equipment, it factors the physical location of the device
into the security equation. This results in a far more
logical and secure policy that correlates the identity of
the connecting device and user to each decision. The
benefits of this approach cannot be overstated and
they apply to almost every decision Portnox can make:
•	 The physical location of the port or device can
translate into the security policy thus enabling
far stronger policies in sensitive areas such as
datacenters, executive offices or production/factory
floors without creating false disconnections in less
sensitive areas such as lobbies, conference rooms,
etc.
•	 Exceptions for devices with limited ability to
authenticate/communicate are always ring-fenced to
specific physical locations in the network. Imagine a
rule allowing IP cameras or thermostats to connect.
By factoring their physical location, Portnox ensures
they cannot be removed, duplicated or mimicked
without detection.
Prior Behavior or ‘Credit Score’
For NAC policies to be effective, they must require
connecting devices to meet varying levels of
compliance. On average and even in the best
managed environments every device will fail
compliance every 12-18 months for a myriad of
perfectly valid reasons. Rather than immediately
disconnect a potential innocuous device for a simple
compliance infraction, Portnox can factor its prior
Scale
Super Lightweight Policy Enforcement Points
Portnox Knoxer™ is a propriety and lightweight software
designed to carry out Portnox’s policies and controls in
remote locations. Knoxer can be easily virtualized or set
to run on a standard thin-client PC. It removes the needs
for costly, replicated, remediation infrastructure and
provides enterprises with an easily and cost-effectively
means of scale their NAC deployment.
Versatile Licensing
Portnox’s licensing is in direct correlation to the
infrastructure allowing it to logically scale as the
organization grows. There are no fees for additional
Portnox servers or Knoxers and both can be natively
virtualized on any common virtualization platform such
as VMWare or HyperV. This allows organizations with
complex and fragmented networks the greatest agility
and flexibility in controlling their networks and policies.
Easily Integrated and Extensible
To ensure easy integration with an organizations existing
SIEM/SOC as well as other dashboards, Portnox ships
with a mature set of tools including CLI, Web Service
APIs and troubleshooting utilities.
Role Based Administration
Portnox has a flexible policy for allocating customized
administrative rights to the various roles at a company
responsible for managing Portnox. This means that
a helpdesk employee could be granted the rights to
shut down or enable a single port, whereas a network
or system administrator could be given more policy
orientated rights (such as configuration of corporate
security policies, VLAN assignments, etc.)
“The Portnox system enables us, on one hand to pinpoint
the access to the network at the single access point
(port) and on the other hand it gives us the reach of
a granular oversight which provides a management
interface for each department.”
Mr. Itzik Cohen - Chief of IT and Infrastructure
El Al Israeli Airlines
DATA SHEET / UNIOQUE ADVANTAGES

More Related Content

What's hot

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
Castleforce
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
kratos2424
 
Week14 Presentation
Week14 PresentationWeek14 Presentation
Week14 Presentation
gueste7bef1
 

What's hot (18)

Concentris Systems Overview
Concentris Systems OverviewConcentris Systems Overview
Concentris Systems Overview
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheet
 
6 Steps to Secure Network Devices
6 Steps to Secure Network Devices6 Steps to Secure Network Devices
6 Steps to Secure Network Devices
 
Trapeze Medical customer presentation 10 14-09
Trapeze Medical customer presentation 10 14-09Trapeze Medical customer presentation 10 14-09
Trapeze Medical customer presentation 10 14-09
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
IDS, IPS, IDPS
IDS, IPS, IDPSIDS, IPS, IDPS
IDS, IPS, IDPS
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Isf 2015 continuous diagnostics monitoring may 2015
Isf 2015 continuous diagnostics monitoring  may 2015Isf 2015 continuous diagnostics monitoring  may 2015
Isf 2015 continuous diagnostics monitoring may 2015
 
4 Easy Steps for Increased Industrial Cybersecurity
4 Easy Steps for Increased Industrial Cybersecurity4 Easy Steps for Increased Industrial Cybersecurity
4 Easy Steps for Increased Industrial Cybersecurity
 
Rfs6000 spec sheet
Rfs6000 spec sheetRfs6000 spec sheet
Rfs6000 spec sheet
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
 
Week14 Presentation
Week14 PresentationWeek14 Presentation
Week14 Presentation
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Ap7131 government spec_sheet
Ap7131 government spec_sheetAp7131 government spec_sheet
Ap7131 government spec_sheet
 

Viewers also liked

2007lv Nac Big Pic[1]
2007lv Nac Big Pic[1]2007lv Nac Big Pic[1]
2007lv Nac Big Pic[1]
gerardgoubert
 
話我家鄉
話我家鄉話我家鄉
話我家鄉
awcc
 
家鄉的名勝古蹟與特產
家鄉的名勝古蹟與特產家鄉的名勝古蹟與特產
家鄉的名勝古蹟與特產
awcc
 
Ley de gas ideal, constante universal de gases y gases reales
Ley de gas ideal, constante universal de gases y gases realesLey de gas ideal, constante universal de gases y gases reales
Ley de gas ideal, constante universal de gases y gases reales
UACJ
 
Mohamed_El-Tokhy_Resume_last
Mohamed_El-Tokhy_Resume_lastMohamed_El-Tokhy_Resume_last
Mohamed_El-Tokhy_Resume_last
Mohamed El-Tokhy
 

Viewers also liked (20)

WorkSafe ACT Site Inspection
WorkSafe ACT Site InspectionWorkSafe ACT Site Inspection
WorkSafe ACT Site Inspection
 
Campus party (1)
Campus party (1)Campus party (1)
Campus party (1)
 
2007lv Nac Big Pic[1]
2007lv Nac Big Pic[1]2007lv Nac Big Pic[1]
2007lv Nac Big Pic[1]
 
Aldair1
Aldair1Aldair1
Aldair1
 
話我家鄉
話我家鄉話我家鄉
話我家鄉
 
Campus party jennifer
Campus party jenniferCampus party jennifer
Campus party jennifer
 
coretec
coreteccoretec
coretec
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
家鄉的名勝古蹟與特產
家鄉的名勝古蹟與特產家鄉的名勝古蹟與特產
家鄉的名勝古蹟與特產
 
Loppupuheenvuoro - seminaari 26.10.2016
Loppupuheenvuoro - seminaari 26.10.2016Loppupuheenvuoro - seminaari 26.10.2016
Loppupuheenvuoro - seminaari 26.10.2016
 
Ley de gas ideal, constante universal de gases y gases reales
Ley de gas ideal, constante universal de gases y gases realesLey de gas ideal, constante universal de gases y gases reales
Ley de gas ideal, constante universal de gases y gases reales
 
Carlos Conde : AWS Game Days - TIAD Paris
Carlos Conde : AWS Game Days - TIAD ParisCarlos Conde : AWS Game Days - TIAD Paris
Carlos Conde : AWS Game Days - TIAD Paris
 
TIAD 2016 : ITiocracy
TIAD 2016 : ITiocracyTIAD 2016 : ITiocracy
TIAD 2016 : ITiocracy
 
Tiad : Continuous Learning
Tiad : Continuous LearningTiad : Continuous Learning
Tiad : Continuous Learning
 
Corporate profile quadrant knowledge solutions
Corporate profile quadrant knowledge solutionsCorporate profile quadrant knowledge solutions
Corporate profile quadrant knowledge solutions
 
TIAD : Automation day by Jerôme Labat
TIAD : Automation day by Jerôme LabatTIAD : Automation day by Jerôme Labat
TIAD : Automation day by Jerôme Labat
 
TIAD : DevOps & continuous delivery dans le cloud
TIAD : DevOps & continuous delivery dans le cloudTIAD : DevOps & continuous delivery dans le cloud
TIAD : DevOps & continuous delivery dans le cloud
 
10 Mandamentos - Aula 11 - 10º mandamento
10 Mandamentos - Aula 11 - 10º mandamento10 Mandamentos - Aula 11 - 10º mandamento
10 Mandamentos - Aula 11 - 10º mandamento
 
Case Fiksu Kalasatama
Case Fiksu KalasatamaCase Fiksu Kalasatama
Case Fiksu Kalasatama
 
Mohamed_El-Tokhy_Resume_last
Mohamed_El-Tokhy_Resume_lastMohamed_El-Tokhy_Resume_last
Mohamed_El-Tokhy_Resume_last
 

Similar to DS - Portnox_Unique Advantages

Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 

Similar to DS - Portnox_Unique Advantages (20)

Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
CentralizedSerialWP
CentralizedSerialWPCentralizedSerialWP
CentralizedSerialWP
 
2010fall ch31 naymka
2010fall ch31 naymka2010fall ch31 naymka
2010fall ch31 naymka
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Network security
Network security Network security
Network security
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Quareo Solution Overview
Quareo Solution OverviewQuareo Solution Overview
Quareo Solution Overview
 
Hosted security
Hosted securityHosted security
Hosted security
 
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
Webinar-GBA Episode 7-Managing blockchain infrastructure for enterprise-grade...
 
27859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 201327859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 2013
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Cloud managed networking
Cloud managed networkingCloud managed networking
Cloud managed networking
 
Industrial Communication Systems
Industrial Communication SystemsIndustrial Communication Systems
Industrial Communication Systems
 
Pilgrim Beart, Founder AlertMe
Pilgrim Beart, Founder AlertMePilgrim Beart, Founder AlertMe
Pilgrim Beart, Founder AlertMe
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 

More from Jason Newell

DataShepherd Security
DataShepherd SecurityDataShepherd Security
DataShepherd Security
Jason Newell
 

More from Jason Newell (11)

Why virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellersWhy virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellers
 
Nimbox presentation
Nimbox presentationNimbox presentation
Nimbox presentation
 
Reseller Benefits
Reseller BenefitsReseller Benefits
Reseller Benefits
 
Cloud Cover 365 user introduction
Cloud Cover 365 user introductionCloud Cover 365 user introduction
Cloud Cover 365 user introduction
 
DaaS introduction
DaaS introductionDaaS introduction
DaaS introduction
 
Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability S...
Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability S...Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability S...
Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability S...
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made Easy
 
Reblaze Web Application Firewall
Reblaze Web Application FirewallReblaze Web Application Firewall
Reblaze Web Application Firewall
 
Protect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with ReblazeProtect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with Reblaze
 
DataShepherd Security
DataShepherd SecurityDataShepherd Security
DataShepherd Security
 
Hosted Exchange
Hosted ExchangeHosted Exchange
Hosted Exchange
 

DS - Portnox_Unique Advantages

  • 1. portnox.com Portnox’s Network Access Control (NAC) Platform traverses all network layers - physical, virtual or in the cloud - to illuminate, visualize, analyze and control all connected users and devices. With an agentless and appliance-less architecture it easily scales across major sites, remote offices, BYOD environments and the Cloud requiring no changes to network infrastructure. It’s unmatched ability to reach every fragment of the network regardless of layer or location results in the most accurate and real-time view of an organization’s network enabling smarter, more productive and secure decisions. The Unique Advantages of Portnox Boundless No Appliances Portnox does not require any appliances (virtual or physical) and is very easily implemented without the need for network topology changes, port mirroring or mapping. Coverage For All Network Layers Beyond the traditional Ethernet and wireless, Portnox extends to provide policy on VPN connections, Virtual infrastructure (datacenter or Virtual Desktop Infrastructure [VDI]) as well as BYOD and Cloud environments. Coverage Across All Network Locations Portnox works with existing networking equipment allowing it to extend effortlessly across an organization’s entire geography - major sites and remote locations alike. No Agent Software and Coverage for All IP Devices Portnox provides full functionality without the need for any agent software to be installed on connecting devices allowing for a far simpler deployment and tighter security policies with less exceptions in place for unique/esoteric devices. To achieve this, Portnox leverages 20+ profiling and authentication profiles including a proprietary signature mechanism. No open source tools such as NMAP or MAC address based profiles are used. WITH PORTNOX YOU CAN: • Get to know who, when, how and where devices and users are taking part of your network • Monitor all access and identify each connecting device, user and location • Enforce location based access policy • Enforce corporate security & ensure regulatory compliance • Regain the control of your virtual domain • Maintain granular access control at the level of the access layer • Contain infected and rogue devices • Achieve comprehensive network hygiene DATA SHEET Think again. THINK YOU KNOW YOUR NETWORK?
  • 2. USA tel. +1.855.4portnox | usinfo@portnox.com | 623 Eagle Rock Avenue, Suite 396, West Orange, NJ 07052 UK tel. +44.1273.256.325 | dotell@portnox.com | 5 Albourne Court, Henfield Road, Albourne, West Sussex BN6 9FF ISRAEL tel. +972.9.957.9889 | fax.+972.9.950.9879 | tellus@portnox.com | Elbe House, 33 Ben Gurion St., Herzlia 46785 Smart Control All Connected Devices In contrast to existing NAC solutions which scan pre-defined IP scopes, thereby ignoring any device utilizing a different IP address, Portnox monitors all connected devices by communicating directly with all switches, wireless controllers, VPN gateways and virtual hosts. No stone is left unturned. Intelligent Security Policies By leveraging this unique ability to scale across all layers, all locations and all devices Portnox provides security policies that are far more agile, advanced and practical than the typical NAC solutions. This greatly minimizes false disconnections providing a more sensible balance between productivity and security. Location!, Location!, Location! Since Portnox interacts directly with the switching equipment, it factors the physical location of the device into the security equation. This results in a far more logical and secure policy that correlates the identity of the connecting device and user to each decision. The benefits of this approach cannot be overstated and they apply to almost every decision Portnox can make: • The physical location of the port or device can translate into the security policy thus enabling far stronger policies in sensitive areas such as datacenters, executive offices or production/factory floors without creating false disconnections in less sensitive areas such as lobbies, conference rooms, etc. • Exceptions for devices with limited ability to authenticate/communicate are always ring-fenced to specific physical locations in the network. Imagine a rule allowing IP cameras or thermostats to connect. By factoring their physical location, Portnox ensures they cannot be removed, duplicated or mimicked without detection. Prior Behavior or ‘Credit Score’ For NAC policies to be effective, they must require connecting devices to meet varying levels of compliance. On average and even in the best managed environments every device will fail compliance every 12-18 months for a myriad of perfectly valid reasons. Rather than immediately disconnect a potential innocuous device for a simple compliance infraction, Portnox can factor its prior Scale Super Lightweight Policy Enforcement Points Portnox Knoxer™ is a propriety and lightweight software designed to carry out Portnox’s policies and controls in remote locations. Knoxer can be easily virtualized or set to run on a standard thin-client PC. It removes the needs for costly, replicated, remediation infrastructure and provides enterprises with an easily and cost-effectively means of scale their NAC deployment. Versatile Licensing Portnox’s licensing is in direct correlation to the infrastructure allowing it to logically scale as the organization grows. There are no fees for additional Portnox servers or Knoxers and both can be natively virtualized on any common virtualization platform such as VMWare or HyperV. This allows organizations with complex and fragmented networks the greatest agility and flexibility in controlling their networks and policies. Easily Integrated and Extensible To ensure easy integration with an organizations existing SIEM/SOC as well as other dashboards, Portnox ships with a mature set of tools including CLI, Web Service APIs and troubleshooting utilities. Role Based Administration Portnox has a flexible policy for allocating customized administrative rights to the various roles at a company responsible for managing Portnox. This means that a helpdesk employee could be granted the rights to shut down or enable a single port, whereas a network or system administrator could be given more policy orientated rights (such as configuration of corporate security policies, VLAN assignments, etc.) “The Portnox system enables us, on one hand to pinpoint the access to the network at the single access point (port) and on the other hand it gives us the reach of a granular oversight which provides a management interface for each department.” Mr. Itzik Cohen - Chief of IT and Infrastructure El Al Israeli Airlines DATA SHEET / UNIOQUE ADVANTAGES