What is portnox?
Show Less- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Network Access Control Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
portnox Pricing
Check out our offers for each of our packages to get best out of the software
Visit us on our website to know more
Get a custom quote
portnox Features
Primary Features
Access Controls/Permissions
Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.
Dashboard
A dashboard is a type of graphical user interface which often provides at-a-glance views of key performance indicators relevant to a particular objective or business process.
Multiple Authentication Methods
Multiple Authentication Methods is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.
Policy Management
Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.
Compliance Management
Compliance management is the ongoing process of monitoring and assessing systems to ensure they comply with industry and security standards, as well as corporate and regulatory policies and requirements.
Password Management
Password management is a system that allows users to store and access passwords securely.
Credential Management
Credential Management is an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).
Role-Based Permissions
Using a role-based access control system means that admins can sort employees or contractors into preexisting groups, or roles, which grant access to a defined set of resources.
Data Visualization
Data visualization is the practice of translating information into a visual context, such as a map or graph, to make data easier for the human brain to understand and pull insights from.
Secondary Features
- Audit Management
- Audit Trail
- Real Time Monitoring
- Crm
- Patch Management
- Application Access Control
- Api
Compare with Similar Products
Aruba secure
Device42
Sophos Firewall
Cisco Identity service engine
Foxpass
Barracuda
Extreme Network
Forescout
Fortinet NAC
OPSWAT