{"id":29732,"date":"2023-04-19T20:52:06","date_gmt":"2023-04-19T20:52:06","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=29732"},"modified":"2023-06-06T15:51:00","modified_gmt":"2023-06-06T15:51:00","slug":"portnox-nac-review","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/","title":{"rendered":"Portnox Cloud: NAC Product Review"},"content":{"rendered":"\n<p>Portnox Cloud offers network access control (NAC) as a cloud-hosted SaaS solution that enables rapid deployment of basic NAC capabilities. Although the capabilities are more limited than some NAC competitors, the quick deployment and reduced IT labor costs make Portnox Cloud an attractive solution for many.<\/p>\n\n\n\n<p><em>To compare Portnox Cloud against competitors, see our complete list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">top network access control (NAC) solutions<\/a>.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Is Portnox?<\/h2>\n\n\n\n<p>Portnox is a private company that specializes in network access security with nearly 1,000 customers and closed a Series A fundraising with Elsewhere Partners for $22 million in 2022. Founded in 2007, <a href=\"https:\/\/www.portnox.com\/about-us\/\">Por<\/a><a href=\"https:\/\/www.portnox.com\/about-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">t<\/a><a href=\"https:\/\/www.portnox.com\/about-us\/\">nox<\/a> began selling a software-based NAC solution to be used in local networks. Since then Portnox continued to add capabilities, launched the first cloud-native NAC in 2017, and now offers a NAC SaaS solution, Portnox Cloud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Portnox Cloud<\/h2>\n\n\n\n<p>Portnox Cloud offers a cloud-native SaaS NAC solution that can be implemented in three different levels:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.portnox.com\/portnox-cloud\/radius\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>RADIUS-as-a-Service<\/strong><\/a> provides quick, effective, and basic network access control using cloud-native Remote Authentication Dial-In User Service (RADIUS) protocol<\/li>\n\n\n\n<li><a href=\"https:\/\/www.portnox.com\/portnox-cloud\/tacacs\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>TACACS+-as-a-Service<\/strong><\/a> provides cloud-native, centralized Authentication, Authorization, and Accounting (AAA) using the Terminal Access Controller Access-Control System Plus (TACACS+) protocol that helps to manage network equipment<\/li>\n\n\n\n<li><a href=\"https:\/\/www.portnox.com\/portnox-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ZTNA-as-a-Service<\/strong><\/a> (formerly known as Portnox Clear) provides cloud-native Zero Trust Network Access (ZTNA) for all devices and users<\/li>\n<\/ul>\n\n\n\n<p>Portnox Cloud works on all types of connections (wired, WiFi, virtual private network [VPN]). RADIUS and TACACS+ apply to specific types of endpoints, but the ZTNA-as-a-Service product works for all kinds of devices, including Bring-Your-Own-Device (BYOD) endpoints, Internet-of-Things (IoT) devices, operations technology (OT), industrial control systems (ICS), and industrial IoT (IIoT).<\/p>\n\n\n\n<p>While Portnox Cloud is the current focus of Portnox, they also continue to offer on-premises <a href=\"https:\/\/www.portnox.com\/portnox-core\/\" target=\"_blank\" rel=\"noreferrer noopener\">Portnox Core<\/a>. This self-managed NAC solution loses many of the advantages of SaaS (low maintenance, rapid setup, etc.) but allows organizations to maintain full control over the deployment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Agents<\/h2>\n\n\n\n<p>Portnox does not require an agent. Agentless options use root certificates, simple certificate enrollment protocol (SCEP), Microsoft InTune integration, and EAP-TLS 802.1x authentication to gather endpoint information for reporting and enforcement.<\/p>\n\n\n\n<p>Portnox Cloud\u2019s ZTNA-as-a-Service provides an option for <a href=\"https:\/\/clear.portnox.com\/agentinstall\" target=\"_blank\" rel=\"noreferrer noopener\">AgentP<\/a>, an agent that installs on Windows, macOS, iOS, Android, or Linux. The agent<a href=\"https:\/\/www.portnox.com\/blog\/worry-free-byod-portnox-agentp\/\" target=\"_blank\" rel=\"noreferrer noopener\"> does not make any changes to the endpoint<\/a>, so it will be suitable for BYOD, but it provides valuable information into the status of the device such as location data, dangerous applications, jail-broken devices, and OS versions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Applicable Metric<\/h2>\n\n\n\n<p>As a cloud-based SaaS application, Portnox Cloud offers NAC protection for unlimited devices and users.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Qualifications<\/h2>\n\n\n\n<p>Portnox hosts their services within Microsoft\u2019s Azure and shares the inherent storage and physical access certifications achieved by Microsoft. For example, encryption keys, administrator passwords, and other critical information are stored in the Azure Key Vault in FIPS 140-2 Level 2-validated hardware security modules (HSMs). Portnox <a href=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2017\/08\/Portnox_CLEAR_Security_Principles.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">publishes their Security Architecture and Principles<\/a> for customer review and Portnox Cloud (formerly known as Clear) holds <a href=\"https:\/\/www.portnox.com\/press-releases\/portnox-clear-achieves-soc-2-type-ii-certification\/\" target=\"_blank\" rel=\"noreferrer noopener\">System and Organization Controls (SOC) 2 Type II certification<\/a> for the NAC-as-a-Service platform.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Features<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.portnox.com\/portnox-cloud\/radius\/\" target=\"_blank\" rel=\"noreferrer noopener\">Portnox RADIUS+<\/a> Network Authentication\n<ul class=\"wp-block-list\">\n<li><strong>Implements in under 30 minutes <\/strong>with no installations required<\/li>\n\n\n\n<li><strong>Tried-and-true technology<\/strong> using the Remote Authentication Dial-In User Service protocol and built-in RADIUS proxy and RADIUS Forwarding<\/li>\n\n\n\n<li><strong>Does not require passwords<\/strong> when using device MAC address characteristics (AKA: MAC Authentication Bypass) as an authentication factor<\/li>\n\n\n\n<li><strong>Selectable access layers<\/strong><\/li>\n\n\n\n<li><strong>Integrates with directory services<\/strong> (Active Directory, LDAP)<\/li>\n\n\n\n<li><strong>Easy-to-define security groups <\/strong>and role-based authentication<\/li>\n\n\n\n<li><strong>Anti-flood protection<\/strong> against DDoS attacks<\/li>\n\n\n\n<li><strong>Location-based access policies<\/strong><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.portnox.com\/portnox-cloud\/tacacs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Portnox TACACS+<\/a> Network Device Administration\n<ul class=\"wp-block-list\">\n<li><strong>Centralizes authentication<\/strong> for multiple user databases such as Open LADAP, Active Directory (AD), Azure AD, Google Workspace, Okta, and more<\/li>\n\n\n\n<li><strong>Enables granular authorization<\/strong> with varying levels of privilege, services allowed, commands, and more<\/li>\n\n\n\n<li><strong>Consolidates network accounting<\/strong> to track user activity (identities, start\/stop times, executed commands, etc.) across all network devices to streamline audits and reporting<\/li>\n\n\n\n<li><strong>Integrates via RESTful API<\/strong> with <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">security information and event management<\/a> (SIEM) solutions<\/li>\n\n\n\n<li><strong>Customizable risk policy<\/strong> based on the mode of access (wired, VPN), location, requested network device, etc.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.portnox.com\/portnox-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">Portnox ZTNA<\/a>\n<ul class=\"wp-block-list\">\n<li><strong>Vendor agnostic <\/strong>zero trust network access control<\/li>\n\n\n\n<li><strong>Detects and quarantines<\/strong> non-compliant devices based on firewalls, antivirus, applications, USB drives, and more<\/li>\n\n\n\n<li><strong>Enables device remediation<\/strong> for non-compliant devices<\/li>\n\n\n\n<li><strong>Guest self-onboarding<\/strong> and up to 50 daily guest accounts; SMS-based and sponsor-based onboarding also supported&nbsp;<\/li>\n\n\n\n<li><strong>Device assessment<\/strong> using Portnox AgentP and agentless assessment<\/li>\n\n\n\n<li><strong>Automated discovery<\/strong> of all devices<\/li>\n\n\n\n<li><strong>Monitoring<\/strong> of traffic and monitoring-only mode<\/li>\n\n\n\n<li><strong>Multi-region RADIUS redundancy<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Pros<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fully cloud-native<\/strong><\/li>\n\n\n\n<li><strong>No hardware<\/strong> required to maintain, update, and manage, although virtual machines for local RADIUS backup and local TACACS+ record keeping may be necessary for full functionality<\/li>\n\n\n\n<li><strong>Maintenance free<\/strong> and no need for backups or special security<\/li>\n\n\n\n<li><strong>Covers wired, WiFi, and VPN<\/strong> network access<\/li>\n\n\n\n<li><strong>Real time visibility<\/strong> of access attempts into the network<\/li>\n\n\n\n<li><strong>Centralized<\/strong> administration, control, authentication, and reporting<\/li>\n\n\n\n<li><strong>Applies to all devices <\/strong>from managed laptops to BYOD mobile phones or even security cameras (IoT) or heat sensors (OT)<\/li>\n\n\n\n<li><strong>Network hardware agnostic<\/strong> and doesn\u2019t require network redesign<\/li>\n\n\n\n<li><strong>A full range of options<\/strong> from basic NAC to ZTNA<\/li>\n\n\n\n<li><strong>Low entry price<\/strong> when considering the reduced total cost of ownership from reduced labor to maintain, update, and administer the NAC solution<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cons<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Screen lags<\/strong> can occur for congested connections<\/li>\n\n\n\n<li><strong>Inconsistent port statuses<\/strong> have been noted by customers between switches and Portnox<\/li>\n\n\n\n<li><strong>Lacks features<\/strong> compared to other competitors, particularly for the two entry-level options<\/li>\n\n\n\n<li><strong>Maintains a smaller database of IoT<\/strong> devices, but offers an add-on AI-powered <a href=\"https:\/\/www.portnox.com\/portnox-cloud\/iot-fingerprinting\/\" target=\"_blank\" rel=\"noreferrer noopener\">IoT fingerprinting solution<\/a><\/li>\n\n\n\n<li><strong>May be more expensive<\/strong> than self-administered options for larger enterprises<\/li>\n\n\n\n<li><strong>SaaS removes direct control<\/strong> from the organization<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Intelligence<\/h2>\n\n\n\n<p>The Portnox Cloud ZTNA solution integrates with SIEM and other security tools.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Delivery<\/h2>\n\n\n\n<p>Portnox Cloud is available as a SaaS product. However, local RADIUS instances can be established to maintain protection even when internet connections are broken. The Portnox TACACS+ deployment also requires a virtual appliance to be downloaded and installed in monitored <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">local networks<\/a> to ensure proper auditing trails.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pricing<\/h2>\n\n\n\n<p>Portnox offers a <a href=\"https:\/\/www.portnox.com\/free-trial\/\" target=\"_blank\" rel=\"noreferrer noopener\">30-day free trial<\/a> and some of the <a href=\"https:\/\/www.portnox.com\/pricing\/\" target=\"_blank\" rel=\"noreferrer noopener\">most transparent pricing<\/a> in the NAC market:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Portnox RADIUS+ Network Authentication\n<ul class=\"wp-block-list\">\n<li>Up to $2 per device per month<\/li>\n\n\n\n<li>$1,000 per month minimum subscription<\/li>\n\n\n\n<li>Available volume discounts<\/li>\n\n\n\n<li>Optional add-on: Certificate Authority Services&nbsp;<\/li>\n\n\n\n<li>14-day archived device data retention<\/li>\n\n\n\n<li>10 hour, 5 day a week support (excluding holidays)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Portnox TACACS+ Network Device Administration\n<ul class=\"wp-block-list\">\n<li>$200 per admin per month<\/li>\n\n\n\n<li>1 admin and 100 device free account available without expiration<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Portnox ZTNA\n<ul class=\"wp-block-list\">\n<li>Up to $5 per device per month<\/li>\n\n\n\n<li>$1,000 per month minimum subscription<\/li>\n\n\n\n<li>Available volume discounts<\/li>\n\n\n\n<li>60-day archived device data retention<\/li>\n\n\n\n<li>24 x 7 support<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Several add-on packages are also available, such as \u201cwhite-glove\u201d managed onboarding service available for $3,500, extended guest account packages, or extended device data retention for $0.99 per device per year for each additional 30 (RADIUS+) to 45 (ZTNA) days. Discounts are also available for education and non-profit customers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bottom Line: Best Option for Turnkey NAC Deployment<\/h2>\n\n\n\n<p>Organizations that need quick deployment or lack the IT personnel to install and manage a NAC should consider Portnox Cloud\u2019s NAC SaaS offering. The rapid deployment and decreased IT support requirements make this product a strong contender for organizations of all sizes.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d5660e5fa-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d5660e5fa\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d5660e5fa\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d5660e5fa\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d5660e5fa\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d5660e5fa\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d5660e5fa\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Portnox Cloud offers network access control (NAC) as a cloud-hosted SaaS solution that enables rapid deployment of basic NAC capabilities. Although the capabilities are more limited than some NAC competitors, the quick deployment and reduced IT labor costs make Portnox Cloud an attractive solution for many. To compare Portnox Cloud against competitors, see our complete [&hellip;]<\/p>\n","protected":false},"author":271,"featured_media":29735,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[2369,3790,18684,21812,3414,730,5277],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[395,377,381],"class_list":["post-29732","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-cloud-security","tag-cybersecurity","tag-nac","tag-network-access-control","tag-network-security","tag-security","tag-web-security","b2b_audience-evaluation-and-selection","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-gateway-and-network-security","b2b_product-network-access-control-nac"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Portnox Cloud: NAC Review | eSP<\/title>\n<meta name=\"description\" content=\"Portnox offers a low-cost network access control (NAC) solution that offers good basic security with ease of use.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Portnox Cloud: NAC Review | eSP\" \/>\n<meta property=\"og:description\" content=\"Portnox offers a low-cost network access control (NAC) solution that offers good basic security with ease of use.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-19T20:52:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T15:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Portnox Cloud: NAC Product Review\",\"datePublished\":\"2023-04-19T20:52:06+00:00\",\"dateModified\":\"2023-06-06T15:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/\"},\"wordCount\":1158,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"NAC\",\"Network Access Control\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/\",\"name\":\"Portnox Cloud: NAC Review | eSP\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png\",\"datePublished\":\"2023-04-19T20:52:06+00:00\",\"dateModified\":\"2023-06-06T15:51:00+00:00\",\"description\":\"Portnox offers a low-cost network access control (NAC) solution that offers good basic security with ease of use.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png\",\"width\":1400,\"height\":933,\"caption\":\"A man holding a tablet with a monitoring interface.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portnox Cloud: NAC Product Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Portnox Cloud: NAC Review | eSP","description":"Portnox offers a low-cost network access control (NAC) solution that offers good basic security with ease of use.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/","og_locale":"en_US","og_type":"article","og_title":"Portnox Cloud: NAC Review | eSP","og_description":"Portnox offers a low-cost network access control (NAC) solution that offers good basic security with ease of use.","og_url":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-19T20:52:06+00:00","article_modified_time":"2023-06-06T15:51:00+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Portnox Cloud: NAC Product Review","datePublished":"2023-04-19T20:52:06+00:00","dateModified":"2023-06-06T15:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/"},"wordCount":1158,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png","keywords":["cloud security","cybersecurity","NAC","Network Access Control","network security","security","Web security"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/","url":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/","name":"Portnox Cloud: NAC Review | eSP","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png","datePublished":"2023-04-19T20:52:06+00:00","dateModified":"2023-06-06T15:51:00+00:00","description":"Portnox offers a low-cost network access control (NAC) solution that offers good basic security with ease of use.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/portnox-nac-review.png","width":1400,"height":933,"caption":"A man holding a tablet with a monitoring interface."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/portnox-nac-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Portnox Cloud: NAC Product Review"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/29732"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=29732"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/29732\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/29735"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=29732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=29732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=29732"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=29732"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=29732"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=29732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}