Portnox CORE vs. Tempered Networks

As of May 2019, Portnox CORE is ranked 4th in Network Access Control with 1 review vs Tempered Networks which is ranked 8th in Network Access Control. The top reviewer of Portnox CORE writes "Allows us to see all the devices and where they're connecting, but they need more support staff". Portnox CORE is most compared with ForeScout CounterACT, Cisco ISE (Identity Services Engine) and Aruba ClearPass. Tempered Networks is most compared with ProtectWise, Cisco IOS Security and Qualys VM.
Cancel
You must select at least 2 products to compare!
Portnox CORE Logo
2,848 views|1,038 comparisons
Tempered Networks Logo
1,067 views|432 comparisons
Most Helpful Review
Use Tempered Networks? Share your opinion.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Network Access Control solutions are best for your needs.
340,467 professionals have used our research since 2012.
Ranking
4th
Views
2,848
Comparisons
1,038
Reviews
1
Average Words per Review
479
Avg. Rating
7.0
8th
Views
1,067
Comparisons
432
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Top Comparisons
Compared 38% of the time.
Compared 16% of the time.
Compared 51% of the time.
Compared 10% of the time.
Also Known As
Access Layers portnox
Learn
Portnox Security
Tempered Networks
Overview

Portnox CORE provides 100% actionable visibility and control of all devices that are connected to the enterprise network. As a software-based Network Access Management (NAM) platform, Portnox CORE’s patented solution allows for efficient management of the security and compliance challenges that organizations face in a smart and simple way.

Tempered Networks leverages the Host Identity Protocol (HIP), a ratified open standard network security protocol recognized possibly the next big change in IP architecture. HIP enables a paradigm shift in networking that solves the broken trust model in IP networking by separating the role of an IP address as both host identity and location, where hosts are identified using permanent, location-independent cryptographic identities (CID). Now security is built-in from the beginning with verifiable authentication and end-to-end encryption.

Offer
Learn more about Portnox CORE
Learn more about Tempered Networks
Sample Customers
EL AL Israeli Airlines, Channel 10 News, Wales Millennium Centre, The College of Management Academic StudiesR&D Lab
We monitor all Network Access Control reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email