Skip to content

Finding Microsoft Message Queuing (MSMQ) Servers with runZero

Microsoft has disclosed a pre-auth use-after-free vulnerability in the Microsoft Message Queuing (MSMQ) service running on Windows. MSMQ is a message queuing mechanism that allows different systems and processes to communicate reliably. 

CVE-2024-30080 is rated critical, with a CVSS score of 9.8, and allows attackers to execute arbitrary code with the privileges of the server process. This issue was reported by k0shl with Kunlun Lab.

What is the impact?

Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the server.

Are updates or workarounds available?

Microsoft has released an update addressing this vulnerability. Users are encouraged to apply this patch immediately.

How do I find potentially vulnerable systems with runZero?

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

	os:Windows AND tcp_port:1801

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

What are SLA, SLO, and SLI?

Learn the differences between SLA, SLO and SLI and how to implement these metrics to improve the quality of service offered by your company. Also, learn about the challenges and best practices for implementing them, along with some real-world examples.

Importance of SLA, SLO and SLI in user experience

Talking about SLA, SLO and SLI means talking about user experience. Each of these acronyms (we will explain them later) is on the minds of developers, who are looking to achieve increasingly reliable and high-quality IT services and resources. To achieve this, they must understand and effectively manage objectives at service levels, relying on defined indicators and formal agreements that lead them to achieve user satisfaction.

Objective of metrics and their application in system performance

What is measured can be improved… so metrics help ensure a service meets its performance and reliability goals. They also help align the goals of different teams within an organization toward one goal: the best user experience.

Differences between SLA, SLO and SLI

  • Definition and scope of each metric.
    Imagine a base where SLI (Service Level Indicators) refers to the quantifiable measurement to evaluate the performance of a service. Above this base you may find SLO (Service Level Objectives), which set objectives for service performance, and SLA (Service Level Agreement), which are legally binding contracts between a service provider and a customer.
  • Example and applications in different contexts.
    For example, a cloud service provider may define latency as the amount of time it takes to process a user’s request and return a response as SLI. From there, an SLO of no more than 100 milliseconds is established for a consecutive period of 30 days; if the average latency exceeds this value, they will issue service credits to customers.
    If an SLI is set on the e-commerce website based on the error rate as a percentage of failed transactions, the SLO could set the error rate to not exceed 0.5% during any 24-hour period. The SLA agreed with the cloud service provider would include this SLO, along with penalties or compensation if it is not met.

SLI: Service Level Indicator

Meaning and function

Service Level Indicators (SLIs) measure the performance and reliability of a service, to determine whether an offer meets its quality objectives. The SLI also helps identify areas for improvement. Examples of indicators include latency (response time), error rate, throughput, and availability (uptime). These metrics are usually monitored over specific time periods to assess performance. As it can be seen, SLIs are the foundation for setting performance and reliability benchmarks for a service.

Challenges and strategies for their measurement

Based on the fact that SLI refers to metrics, the main challenge is to achieve a simple approach to the indicators, since they must be easily analyzed and compared in order to speed up decision-making based on the results. Another challenge is choosing useful tracking metrics that correspond to the actual needs of the product or service.

SLO: Service Level Objective

Definition and purpose

Service Level Objectives (SLOs) set performance and reliability objectives that service providers aim to achieve, in line with a service’s SLIs. So these SLO help to evaluate and monitor whether the service meets the desired quality level. For example, a cloud provider may say that their goal is to achieve 99.99% availability over a specific time period.

Challenges and recommendations for implementation

The main challenge is that objectives must be clear, specific and measurable, so it is recommended that the service provider works closely with stakeholders to define SLOs and their scopes.

SLA: Service Level Agreement

Concept and purpose

A service level agreement (SLA) is a legally binding contract between a service provider and a customer, outlining agreed SLOs and penalties for non-compliance. SLAs ensure that providers and stakeholders clearly understand the expectations about the quality of service and the repercussions in case of non-compliance (financial compensation or service credits) with the agreed standards. SLAs include SLOs such as latency times, error rate, and availability. Of course, before service begins, the service provider and the customer will negotiate Service Level Agreements. SLAs help to have a clear understanding of performance expectations, channels and courses of action, and service reliability, safeguarding the interests of both parties.

Challenges and best practices

One of the most important challenges of an SLA is that it does not go along the line of business priorities, so a best practice is to involve the business areas where the greatest impact on the service level is generated in the agreements. Also, monitoring the SLA and updating them can be a complex process that requires reports with data obtained from multiple sources of information. In this regard, it is recommended to acquire the technological tools that help to retrieve data from multiple sources in a more agile and automated way.

Comparison between SLA, SLO and SLI

As we have seen, SLIs are the foundation for SLOs and SLAs, with quantitative metrics to assess service performance and reliability. SLOs use data derived from SLIs to set specific objectives on service performance, ensuring that the service provider and stakeholders have clear objectives to achieve. Hence, SLAs incorporate SLOs into a contract between the service provider and the customer, so that both parties have a clear understanding of performance expectations and consequences in the event of non-compliance.
To be clearer, it helps to look at these tables that compare differences, challenges, and best practices:

Table 1: Differences between SLA, SLO and SLI

Metric

Purpose

Application

Flexibility

SLI

Actual measurement of service performance.

Internal, paid.
(actual number on performance)

High flexibility.

SLO

Internal objectives that indicate service performance.

Internal and external, free and paid.
(objectives of the internal team to comply with the service level agreement)

Moderate flexibility.

SLA

Agreement with customers on service commitments.

Payments, availability.
(the agreement between the provider and the service user)

Low flexibility.

As it can be seen in Table 1, to the extent that the metric is more specific (SLI), there is greater flexibility for its definition, AND, the more specific the metric (SLA), the more parties involved the commitment is.

Table 2: Challenges and best practices

Metric

Challenges

Best Practices

SLI

Definition of product or service associated with business needs.
Accurate and consistent measurement.

Another challenge is choosing useful tracking metrics that correspond to the actual needs of the product or service.
Track system evolution and visualize data.

SLO

Balance between complexity and simplicity.
Define the objectives must be clear, specific and measurable.

Close collaboration with the parties involved in the service to define SLOs and their scopes.
Continuously improve and select valuable metrics.

SLA

Alignment with business objectives.
Collaboration between legal and technical teams.
Retrieving data from multiple sources to measure compliance levels.

Define realistic expectations, with a clear understanding of the impact on the business.
Reach consensus with stakeholders and the technical team to define the agreements in the SLA.
Use technological tools that help to retrieve data from multiple sources in a more agile and automated way.

In Table 2, you may see that the challenges for the metric are different, due to their internal or external nature. For example, SLOs are internal objectives of the service provider, while SLAs establish a commitment between the provider and the customer (service user), as well as penalties in case of non-compliance.

Real-world applications

Examples of how these metrics are applied in different companies and services.

  • SLI:
    • Service availability/uptime.
    • Number of successful transactions/service requests.
    • Data consistency.
  • SLO:
    • Disk life must be 99.9%
    • Service availability must be 99.5%
    • Requests/transactions successfully served must reach 99.999%
  • SLA:
    • Agreement with clauses and declarations of the signing parties (supplier and user), validity of the agreement, description of services and their corresponding metrics, contact details and hours for support and escalation courses, sanctions and causes of termination in case of non-compliance, termination clauses, among others.

Conclusion

Service metrics are essential to ensure the quality of the service offered. Whether you are working with the service provider or you are on the other side of the desk, the service user, you need to have reliable and clear information about a service’s performance in order to generate better user experiences, which in turn translates into better responsiveness to internal customers (including vendors and business partners) and external customers of any organization. Additionally, do not overlook the fact that more and more companies are adopting outsourcing services, so it is helpful to be familiar with these terms, their applicability and best practices.

We also recommend these tools that Pandora FMS puts at your disposal:

Olivia Diaz

Market analyst and writer with +30 years in the IT market for demand generation, ranking and relationships with end customers, as well as corporate communication and industry analysis.

Analista de mercado y escritora con más de 30 años en el mercado TIC en áreas de generación de demanda, posicionamiento y relaciones con usuarios finales, así como comunicación corporativa y análisis de la industria.

Analyste du marché et écrivaine avec plus de 30 ans d’expérience dans le domaine informatique, particulièrement la demande, positionnement et relations avec les utilisateurs finaux, la communication corporative et l’anayse de l’indutrie.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

24.5.2 Enceladus released

Changes compared to 24.5.1

Enhancements

  • Updated Microsoft 365 account listing to append “Disabled” attribute to user mailboxes for later informed inclusion at the UI level

Bug Fixes

  • Fixed an issue where Comet would not retry when cleaning up deleted tombstoned file versions from an S3-compatible target causing the job to fail
  • Fixed an issue where granular restores are unable to open VMDKs from vSAN and snapshot extents for VMWare Protected Items
  • Fixed an error in Microsoft 365 account listing caused when a personal site is missing an associated user
  • Fixed an issue with backups being triggered on client upgrade when new the user profile’s LastStartTime had not yet been set
  • Fixed an issue with Windows Server 2008 fallback upgrades where the upgrade fails due to support for TLS 1.2 being dropped

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

My phone number was found on the dark web — What do I do?

Recognizing the dark web threat

The dark web remains one of the most mysterious parts of the internet. You may have heard of it and have a general idea of what it is, but you might be surprised by its size and the extent of its illegal activities. Dark web markets, for instance, are vast virtual spaces where hackers, cybercriminals, and shady characters trade all sorts of illegally obtained digital items. These include driver’s licenses, passports, ID cards, credit card details, bank statements…. and even phone numbers.

Right now you might be wondering — why would anyone try to sell my phone number on the dark web? The answer is pretty simple: to use it for illegal activities such as scam calls, identity theft, or fraud, so that it ultimately leads to making illegal profits.

The problem is that most people don’t even know their phone numbers and other personal information is for sale on the dark web. So, as Jeff Daniels’ character said in the pilot episode of “Newsroom”: “The first step to solving a problem is recognizing there is one.” Therefore, every online user should check if their data — including phone numbers — is on the dark web, and here’s how you can do it.

How to find out if your phone number is on the dark web

Some people think checking if their personal information, like their phone number, is on the dark web is complicated and requires finding a way to get inside the dark web. In reality, however, it’s quite easy — provided you have the right tools.

Today, many breach monitoring platforms and dark web scan services can check if your data is for sale on the dark web. However, not all of them can check for phone number leaks. Therefore, it’s important to choose a data breach scanner or monitoring system that includes phone number checks along with credential and email breaches.

With the right tool, finding out if your phone number is on the dark web is pretty straightforward. You simply enter your phone number into the application, and the tool scans the dark web for matches. Then, you just need to check whether the result is positive or negative.

What can happen if your phone number ends up on the dark web?

When the results are in, and it turns out that your phone number is indeed on the dark web, you may feel a little unsettled. In that moment you need to remember that you are not the only person this has happened to. Unfortunately, phone number theft is quite common these days, affecting millions of users each year, and often, it is very difficult to prevent.

What can worry you is what cybercriminals will do with that stolen piece of information. Sadly, there is quite a lot they can do with it. If cybercriminals get a hold of your phone number via the dark web, they can use it to:

  • Send scam messages, make scam calls, or even blackmail you.

  • Try to take control of your mobile device.

  • Steal even more information about you.

  • Use the 2FA codes sent to your mobile phone to access your email or online accounts.

Can you remove your phone number from the dark web?

We’re sorry to say that, realistically, you cannot remove your stolen phone number from the dark web. Removing it from a traditional surface website would be difficult enough — with the dark web, it is almost impossible. Additionally, the dark web has no technical support you can contact about these matters, and trying to reach the perpetrators could make things worse as it may put you in the spotlight for cybercriminals.

What to do if your phone number is on the dark web

Since you cannot remove your phone number from the dark web, the question is — what actions can you take to mitigate the risks? Luckily, there are a few things you can do to prevent cybercriminals from taking advantage of your stolen phone number. These include:

Reject all suspicious calls and SMS messages

If your phone number gets compromised, you must be super vigilant about any unsolicited communications you receive. If a call or message seems suspicious, do not respond or provide any information. And if you’re worried that you will reveal your private data by mistake, remember you can always block spam numbers or use call-blocking apps to reduce the risk of falling prey to phishing attempts.

Use multi-factor authentication (but not SMS-based)

If your phone number or other sensitive data appears on the dark web, you need to take steps to secure your online accounts. Start by enabling multi-factor authentication (MFA). Use app-based authenticators or hardware tokens instead of SMS-based methods, which are more vulnerable to interception and SIM-swapping attacks.

Create strong passwords for your online accounts

If your phone number linked to your online accounts gets leaked, you need to act fast and change your account passwords immediately. Just make sure your new passwords are complex, unique, and difficult to crack. Use a combination of letters, numbers, and special characters, and avoid reusing passwords across different sites.

SIDE NOTE: You can always use our password generator to quickly create new strong passwords for your online accounts.

How to prevent your personal information from ending up on the dark web

When discussing ways to prevent data from being leaked on the dark web, we cannot emphasize enough the need to use really strong passwords for all online accounts and services. However, it’s not only about using strong passwords but also keeping them in a safe place, preferably an encrypted virtual space to which no unauthorized third parties can have access.

You can address both of these issues with a tool such as NordPass, which is an advanced yet easy-to-use password manager that allows you to generate strong passwords on the spot and then store them in an encrypted vault. It also enables you to autofill credentials quickly for fast and secure logins, as well as share sensitive data safely with the people you trust over encryption-protected channels.

Additionally, NordPass offers a feature called Data Breach Scanner that allows you to easily check if your email address and credit card details have been compromised in a breach. By providing this tool, NordPass offers a comprehensive platform for addressing the threat of the dark web on multiple fronts. So, if you’re looking to enhance your cybersecurity and, as a bonus, improve your productivity, be sure to give NordPass a try.

Frequently Asked Questions (FAQ)

How can my phone number end up on the dark web?

Your phone number might end up on the dark web through data breaches from websites or companies where you’ve shared your contact details, often due to weak security or cyberattacks. Moreover, if you’ve unintentionally posted your number on social media or other public platforms, it could be gathered by data scrapers and later traded on the dark web. Once there, your phone number could be sold to spammers, scammers, or other malicious parties for various illicit purposes, like phishing or identity theft.

Should I be worried if my information is on the dark web?

While having your information leak via the dark web can be concerning, it doesn’t necessarily mean immediate harm. Thousands of data breaches occur each year, involving millions of users worldwide. However, not all of them become targets of cybercriminals. Of course, this doesn’t mean you won’t be targeted — you can be. Therefore, it’s crucial to take proactive steps to safeguard your identity and finances. This includes monitoring your accounts, changing passwords, and considering identity theft protection services.

Can changing my phone number solve the problem?

Changing your phone number can help reduce unwanted calls and spam messages from cybercriminals. However, it won’t entirely eliminate the risk since other personal information, like your email address, might also be exposed. Therefore, you must monitor your accounts for suspicious activity and take additional security measures, like using a robust password manager and enabling multi-factor authentication.

How likely is it for my information to be misused if it’s on the dark web?

If your personal information ends up on the dark web, its misuse depends on its value and how well it’s protected. Though not all data shared via the dark web is exploited, once it’s there, it can be used to make you a target of a cyber-attack. Therefore, you need to stay vigilant and implement strong security measures to help keep your information safe from the dangers of the dark web.

Is it safe to continue using my accounts and devices after such an incident?

If you experience a data breach security incident, you must take the necessary actions to secure your accounts and devices. Depending on the severity of the breach, you may need to change passwords and implement additional security measures such as multi-factor authentication. This is to say that continuing to use your accounts can be safe once you’ve implemented the right security measures and are confident that any vulnerabilities have been addressed properly.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

NAC’s Role in IoT Management

The rise of IoT devices has brought about a new era of connectivity and convenience. However, with this increased connectivity comes the need for robust management and security measures to protect sensitive data and ensure network integrity. As network administrators and engineers navigate the complexities of IoT management, one key tool stands out as a linchpin in modern network security: Network Access Control (NAC). NAC plays a crucial role in managing network access for IoT devices, profiling and identifying them accurately, and enhancing overall IoT security.

Unraveling the Complexities of IoT Management

The introduction of IoT devices into consumer and enterprise environments has transformed the way we live and work, bringing about unparalleled levels of connectivity and efficiency. Yet, this surge in IoT device deployment comes with its own set of complexities that network administrators and engineers must deftly navigate. Key among these challenges is the critical task of securing and managing these devices within the network.

The crux of effective IoT management lies in the ability to seamlessly onboard new devices, while also maintaining rigorous access control policies and real-time monitoring of device behaviors. The landscape becomes increasingly convoluted with the addition of each new device, escalating the difficulty of maintaining visibility and control over network access. This complexity is compounded by the limitations of legacy network security tools, which are often ill-equipped to handle the nuanced demands of modern IoT ecosystems.

The need for a sophisticated solution is clear—a solution that not only addresses the immediate challenges of device management but also adapts to the evolving nature of IoT environments. As we delve deeper into the nuances of IoT management, the critical role of advanced security measures in ensuring the integrity and resilience of networks becomes unmistakably evident.

NAC: A Linchpin in Modern Network Security

At the heart of contemporary network security strategies, Network Access Control (NAC) emerges as a pivotal tool, empowering administrators with the capability to enforce comprehensive access control policies. This advanced framework is instrumental in the meticulous authentication and authorization of devices, seamlessly integrating with the network’s fabric to uphold stringent security standards. NAC’s robust mechanism facilitates the precise profiling and classification of IoT devices, thereby unlocking the potential for granular oversight of network entry points. This capacity not only streamlines the management of device identities but also fortifies the network’s defenses against unauthorized infiltration.

By embedding NAC within the network’s architecture, the complexities associated with managing a diverse ecosystem of IoT devices are significantly alleviated. This strategic incorporation enables a proactive stance towards network security, equipping administrators with the tools required to preemptively identify and mitigate potential vulnerabilities. Through the diligent application of NAC, the network environment transforms into a bastion of security, where each device’s compliance with established protocols is meticulously verified, ensuring a resilient infrastructure resilient to the evolving landscape of cyber threats.

Enhancing IoT Security through NAC

NAC stands as a cornerstone in bolstering the security of IoT environments. By harnessing the power of NAC for precise profiling and identification of IoT devices, administrators can create a network where access is meticulously controlled and only verified devices can communicate and operate. This strategic implementation plays a pivotal role in monitoring device activity, enabling the detection of unusual behaviors that could indicate security threats. Through such vigilant oversight, NAC offers a dynamic shield against the specters of ransomware, malware, and phishing attacks, which loom large over digital realms. The adaptability of NAC ensures that as devices evolve and new types of threats emerge, the network’s defenses remain robust and reactive. In embracing NAC, administrators are equipped with an advanced toolkit that not only identifies and mitigates known risks but also adapts to uncover and neutralize emerging vulnerabilities, ensuring the network and its connected IoT devices remain a bastion of security in an ever-changing technological landscape.

Overcoming Deployment Hurdles with NAC

Embarking on the NAC implementation journey may initially appear as a formidable endeavor, particularly for networks sprawling across numerous locales, teeming with a diverse array of IoT devices. However, the pathway to successful NAC deployment, while intricate, is navigable with the appropriate strategy and insight. By tapping into the reservoir of expert support and tailored guidance available, network administrators can adeptly circumnavigate the complexities that accompany the deployment process. This approach facilitates the meticulous configuration of NAC policies, ensuring they dovetail seamlessly with the network’s existing infrastructure, thus fostering an environment where access control is not only efficiently managed but also robustly enforced. Embracing this level of support empowers administrators to mitigate potential bottlenecks during the implementation phase, laying a solid foundation for a security framework that effectively safeguards the network against internal vulnerabilities and external threats alike. In this manner, the strategic deployment of NAC transcends being a mere task—it becomes an integral step towards achieving a fortified network, ready to face the dynamic challenges of the digital age.

NAC’s Future in IoT Management: Trends and Predictions

As we peer into the horizon of IoT management, the trajectory of NAC’s evolution is unmistakably geared towards more sophisticated, seamless integration, and enhanced adaptability. Anticipated advancements include the convergence of NAC with cloud-native security platforms, offering a more agile and scalable framework to accommodate the expanding tapestry of IoT devices. Additionally, the dawn of more refined automation capabilities is on the horizon, promising to streamline the management processes of these devices further. Such innovations are expected to not only simplify the administrative burden but also fortify the network’s defenses by providing more nuanced, real-time responses to security threats. Furthermore, the rise of artificial intelligence and machine learning within NAC systems holds the potential to revolutionize how devices are profiled, identified, and managed, offering unprecedented precision in securing the IoT ecosystem. Embracing these future trends, NAC is set to become an even more indispensable tool in the network administrator’s arsenal, ensuring that the integrity and resilience of networks are maintained in the face of the rapidly evolving digital landscape.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×