How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
The primary use of Portnox was for Network Access Control (NAC) and management. It was used to control and manage access to the network in my client's network. Unauthorised devices were locked out until approved and granted by the NAC manager. It showed information including the IP address, MAC address, hostname of device, username, switch location, and port number of where a device is connected to. It covers both wired and wireless. Portnox CORE helped in securing my client's threat landscape from attackers and hackers.
We use this solution for network access control in an on-premises deployment. It handles our authentication, allowing users to access a network only according to the policy that the organization provides. The network is not open to everyone. Rather, it's only open to those who actually work for the network.
For our use case we can check on syndication issues while using it for NAC (Network Access Control). It helps us to allow users access to the network according to the policy that the organization provides.