Skip to content

Portnox Honored as Finalist of the 2025 SC Awards

Company recognized in the Best Authentication Technology category for the second consecutive year.

AUSTIN, TX – April 10, 2025 – Portnox is proud to announce that it has been named a finalist in the prestigious 2025 SC Awards. Portnox has been recognized in the Best Authentication Technology category for the second consecutive year.

“Authentication methods continue to evolve, driven by the need for stronger, frictionless security. Finalists in this category highlight a clear industry trend toward user-friendly yet secure authentication methods, employing advanced technologies to strengthen security while minimizing disruption to user experience,” said SC Media in an article announcing the finalists in this category.

“To be named an SC Award finalist is a significant validation of the hard work and dedication of the entire Portnox team,” said Portnox CEO Denny LeCompte. “We are committed to providing IT security teams with the unified access control and zero trust security solutions they need to navigate today’s complex cyber threat landscape, and this merit-based recognition from such esteemed experts is something to celebrate.”

SC Media highlighted why it chose Portnox as one of five finalists in the Best Authentication category:

Securing application access requires intelligent, real-time decision-making, and Portnox’s Conditional Access for Applications delivers exactly that. The platform provides adaptive, risk-based authentication policies that assess device posture, user behavior, and contextual risk factors before granting access. With strong adoption in highly regulated industries, Portnox is empowering organizations to implement granular access controls without disrupting user experience. The company recently expanded its support for Microsoft Azure AD and identity federation, enabling businesses to enforce Zero Trust access across cloud and on-premises environments. As threat landscapes evolve, Portnox is continuously innovating to enhance adaptive authentication capabilities.

“Being named an SC Awards finalist is a recognition not only of technical innovation, but of a shared commitment to making the digital world safer,” said Tom Spring, Senior Editorial Director, SC Media. “This year we received hundreds of submissions across 33 categories, and the result is a finalist roster that reflects an evolving cybersecurity industry.”

The SC Awards, now in its 28th year, recognizes the solutions, organizations, and individuals that have demonstrated outstanding achievement in advancing the security of information systems. Find the complete list of 2025 finalists on SC Media’s website: www.scworld.com/sc-awards. New this year, all finalists are invited to the SC Awards Reception, where the 2025 winners will be announced on Tuesday, April 29, 2025, at RSAC ’25 in San Francisco.

 

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox Secures $37.5 Million Series B Funding to Revolutionize Zero Trust Security with Unified Access Control

With cybersecurity threats proliferating, Portnox is empowering companies worldwide to go passwordless, with cloud-native security solutions that adapt to complexity at scale.

AUSTIN, TX – April 8, 2025 – Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced it has closed a $37.5 million Series B funding round. This investment, led by Updata Partners, will be used to accelerate product innovation, expand market reach, and further empower resource-constrained security teams with accessible, enterprise-grade zero trust security. Portnox delivers the critical visibility and control enterprises need to secure access for every device and user across their IT eco-system, ensuring airtight access control in an increasingly perimeterless, high-risk world.

“Companies are replacing on-premises Network Access Control (NAC) with cloud-native zero trust solutions, which we estimate to be a multi-billion-dollar market. I’m proud that Portnox is leading the charge with a best-of-breed Unified Access Control (UAC) platform,” said Denny LeCompte, CEO of Portnox.

Jon Seeber, General Partner and co-manager of Updata Partners, has joined the Portnox Board of Directors. Updata focuses its investments on B2B software and technology-driven businesses and has invested in over 75 software businesses and completed over 55 exits. Seeber has been a member of Updata’s investment team since 2006. Before joining Updata, Seeber worked on the Business Development team inside IBM Global Services, managing acquisitions, divestitures, investments, and partnerships for IBM’s largest business unit.

“We see a massive opportunity in the shift to cloud-native security, and Portnox stands out with a uniquely unified approach to access control that’s both powerful and easy to adopt. The company’s leadership team has a deep understanding of the market and a clear track record of execution,” said Seeber.

Portnox delivers a unified access control platform – the Portnox Cloud – that brings together passwordless authentication, authorization, risk mitigation, and compliance enforcement for enterprise networks, applications, and infrastructure. Purpose-built for distributed organizations with complex IT environments, Portnox Cloud is 100% cloud-native and offers unparalleled ease of use coupled with the robust security capabilities needed to protect against increasingly sophisticated attacks.

Portnox’s focus on simplifying security and delivering best-of-breed access control solutions has resonated strongly with the market, as evidenced by its nearly 1,000 global customers, 95% customer retention rate, and 4.6-star rating on Gartner Peer Insights. Over the past year, Portnox has received numerous industry accolades, including recognition from SC Media, Cyber Defense Magazine, Cybersecurity Breakthrough Awards, and SC Awards Europe.

The investment by Updata Partners builds upon Portnox’s $22 million Series A round of funding led by Elsewhere Partners in 2022, bringing the total investment in the company to $59.5 million.

About Updata Partners

Updata Partners is a leading technology-focused growth equity firm in Washington D.C. with over $1.5 billion in committed capital. Led by an investment team averaging more than 25 years of technology experience, Updata invests in high-growth B2B software and software-driven businesses where the combination of capital and operating experience will help accelerate success. To learn more, visit https://www.updata.com.

About Elsewhere Partners

Elsewhere Partners, a tech-focused private equity firm, invests in growth-ready lower middle market software companies around the globe. Elsewhere’s team of experienced investors and software operators tailor growth plans for each unique portfolio company and offer complementary support across go-to-market, product, talent, finance, and strategy functions. Based in Austin, TX, Elsewhere has invested in 18 companies throughout North America, Europe and Israel since its inception in 2016. To learn more, visit https://elsewhere.partners.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Throwback to the Target Hack: How It Happened, and Lessons Learned….We Learned Lessons, Right?

The December 2013 Target hack remains one of the most infamous data breaches in cybersecurity history.  The hackers stole 40 million credit card numbers, got the PII (Personal Identifiable Information) of 70 million people, cost Target upwards of $200 million, and ruined Christmas for probably every single person working in Target’s IT department.  The breach not only tarnished Target’s reputation but also impacted several other sectors, highlighting the ripple effects of large-scale cyberattacks. Financial institutions faced increased costs for reissuing millions of compromised cards, while consumers dealt with heightened anxiety over identity theft and fraud. The breach also served as a wake-up call for retailers and businesses worldwide, prompting many to reevaluate their cybersecurity practices and adopt more robust systems to safeguard sensitive data. Ultimately, it underscored the critical importance of proactive cybersecurity measures in an increasingly interconnected world.

What the Hack Happened

The breach began when attackers targeted a third-party vendor that had legitimate access to Target’s network. The vendor, Fazio Mechanical Services, was a Pennsylvania-based HVAC (heating, ventilation, and air conditioning) company that provided maintenance services to Target.

Attackers sent a phishing email to Fazio employees, and one unfortunate soul fell for it. That’s a point that deserves some emphasis – it only takes one person, one click, in one unguarded moment, to give the bad actors a way in.  

The laptop was protected with the free version of Malwarebytes – an excellent tool that scans for and eliminates malware when initiated by the user.  The version you pay for – that actually gets appropriately licensed for corporate use – has a real-time scanner that probably would have caught the issue, because the malware installed, called Citadel, was pretty well-known.

Network Infiltration

Using the stolen credentials from Fazio Mechanical Services, the attackers got access to a Target-hosted web service dedicated to outside vendors.  They uploaded a file that allowed them to install a web shell to execute commands on the hosting server.  Some call this a vulnerability, but there are lots of legitimate reasons a web application would let you upload files – invoices, for example – and while it should ideally block executables, it’s easy enough to disguise them. 

 They used a Pass-the-Hash attack to get domain admin credentials, and then the network was their playground.  They went looking for database servers, and they found them – to the tune of 70 million records of PII (Personally Identifiable Information.)

But here’s a fun fact – know what those databases did not contain?  Credit card numbers!  Because Target’s data was PCI-DSS compliant, there was no financial info stored on their database servers.  

Deployment of Malware & Exfiltration of Data

Having been foiled in their scheme by Target’s PCI-DSS compliance, the hackers moved on to plan B (or what might have been plan A all along, we don’t really know) – infiltrate the PoS (Point-of-Sale) servers and capture credit card data in real-time.  They did this using malware called Kaptoxa, which would scrape the machine’s memory and store anything that looked like a credit card number in a file. Then, the malware would periodically transfer that file to another server, which would transfer it back to the hackers via FTP.  

If you’ve been following along so far, one thing that may have stuck out to you was how the attackers were able to wander through the network, accessing pretty much whatever they pleased.  This is why standard security procedures – like role-based access control and network segmentation, are so important.  

Note: There’s a very thorough deep-dive about the hack here, including all of the tools, protocols, and technology used if you want to geek out.

Target’s Security Posture Before the Breach

You might think that Target had pretty poor security before the breach, but that was surprisingly (and alarmingly) not true.  They had a security team of over 300 employees and had just invested in the well-known security tool FireEye.  This tool actually did send out alerts about the malware, which the security team forwarded on to the operations team….but no one did anything about them.  Not only that, FireEye has a setting that can automatically remove Malware….and they turned it off. The thought was they wanted a human to make decisions about what to remove vs. automated software.  

Lessons Learned

So what are the lessons we can take away from Target?  Let’s review:

Lesson 1: Security can be expensive – but not nearly as expensive as a breach.

Lesson 2: Assume every device outside your organization is compromised, because eventually one will be.

Lesson 3: Regulatory compliance might be difficult, but it is often worth it.

Lesson 3: Pay attention to the security basics.  Role-based access control, least-privileged access and network segmentation are not new concepts, but they are invaluable to minimize damage.  

Lesson 4: Your security tools are essential; invest in them and tailor them to work for you.  Automation is there to make your life easier.  

We’re going on 12 years since this hack happened, and it still serves as a powerful reminder of the critical importance of cybersecurity in today’s digital age.  The Target breach underscored how even a single weak link in a company’s supply chain can have catastrophic consequences, impacting not only the business but also millions of customers. It also paved the way for stricter industry regulations and greater emphasis on safeguarding sensitive data. As cyber threats continue to evolve, the lessons from this breach remain especially relevant.  

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Spray and Pray: Botnet Takes Aim at Microsoft 365

Researchers at SecurityScoreCard recently discovered a botnet of over 130,000 devices is conducting password spray attacks against Microsoft 365.  Although it hasn’t been confirmed, signs point to the responsible group being from China – the command-and-control servers are hosted in China and set to a timezone for Asia/Shanghai, and some of the hosting infrastructure was traced back to two Chinese providers.  Researches estimate this has been in progress since December of 2024.  

Microsoft has been rolling out required MFA (multi-factor authentication) for some time now, but the attackers specifically targeted non-interactive accounts. These accounts do not require manual login but are used by automated processes, background tasks, and service integrations. Since there is no human interaction, there is no MFA.  

The likely goal of this attack is to gain access to sensitive data, e-mails, and collaboration tools like SharePoint.

Security researchers have called this “the next evolutionary step forward” of password spray attacks; let’s look at the components to see why this attack is particularly dangerous.

Non-interactive sign-ins: Why do we even have these?

At first glance, the idea of having an account that doesn’t require MFA seems really terrible, and on the surface, it is.  But these accounts are used for things that don’t require human interaction – for instance, a service account that automatically logs into SharePoint to retrieve data or a background process making an API call to sync users between Entra ID and another external system. With no human there to enter the OTP or look at the authenticator app, no MFA is possible, but these tasks are critical to business function.  

What exactly is a botnet?

A botnet is a network of compromised devices—computers, servers, and IoT devices—that a hacker controls remotely to perform malicious activities.

IoT devices are particularly attractive targets for hackers looking to build a botnet – they often have weak security controls, they rarely get security updates when vulnerabilities are found, and many times admins are not even aware they exist – one study found that 80% of IT leaders discovered an unknown IoT device on their network.  When they do get compromised and end up as part of a botnet, it’s hard to tell – the only symptom might be an increase in traffic, which could escape regular monitoring. 

The goal of a botnet is large-scale operations; one computer trying to unlock a password with a password spray attack could take years, given a reasonably complex password, but 130,000 devices trying all at once might take just a few hours. 

How does a password spray attack work?

A password spray attack is a type of brute-force attack used to gain unauthorized access to user accounts, systems, or networks. It’s different from a traditional brute-force attack, where an attacker attempts to guess a password by systematically trying all possible combinations. In a password spraying attack, the attacker tries a small number of common passwords or a list of commonly used passwords against a large number of usernames or accounts.

The goal of a password spraying attack is to exploit the fact that many users use weak or easily guessable passwords, such as “password,” “123456,” or “admin.” Instead of trying to guess a specific user’s password, the attacker focuses on gaining access to multiple accounts by trying these common passwords against a broad range of usernames.

What makes this attack particularly egregious is the targeting of the non-interactive accounts.  Most password spray attacks are thwarted by basic security measures like locking out after a certain number of incorrect passwords, but non-interactive accounts don’t usually have this enabled.  Admins would also monitor security logs and set up alerts to be notified if there were suddenly a storm of failed login attempts, but non-interactive logins have their own logs, which are usually ignored.  So as long as the background processes are working (the sharepoint backup, the ID sync as mentioned above), there would be a really good chance no one would ever check to see all these failed logins.  

NAC and Conditional Access to the rescue!

Many of the articles mention that targeting these non-interactive sign-on accounts bypasses conditional access policies, but the truth is that with a good set of policies, you can still protect yourself from attacks like these.

Role-based and location-based access control are key – If you have a machine account that is designed to back up SharePoint or write to a database, those should be the only things it can access, with the least amount of rights to accomplish the job.  This protects you in the event of a breach – the amount of data that can be stolen is extremely limited.  Location-based access will protect you against connections from places you know your employees are not located.  

Next, you can implement endpoint risk assessment policies for all accounts – if the device they are trying to connect from does not have required software, or anti-virus, or is not enrolled in your MDM, it can be an automatic failure.  Or it could go to a quarantine network that has internet access but no access to your internal tools – this allows you to have a BYOD policy for employees but still keep your critical assets safe.  

And finally, the big one – passwordless authentication.  Swapping traditional passwords – and all the headache for users and IT departments they cause – for digital certificates is the best move you can make to keep your company secure. Digital certificates cannot be sprayed, brute forced, guessed, phished, or socially engineered. They can’t be forgotten, mistyped, or shared.  With 80% of all data breaches starting with a compromised password, it’s clear that eliminating passwords significantly reduces your organization’s risk. By adopting passwordless authentication with digital certificates, you remove the weakest link in security—human error—while streamlining user access.

As attacks get more sophisticated, it’s important to have the right tools in place to keep you protected.  

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How Network Access Control (NAC) Can Help Prevent Data Leaks

While firewalls, endpoint detection, and security awareness training are essential, many enterprises overlook one of the most powerful tools for data leak prevention: Network Access Control (NAC).

NAC solutions serve as digital gatekeepers, ensuring that only authorized users and compliant devices can connect to the network. More importantly, NAC helps prevent data leaks by enforcing access policies, monitoring network behavior, and segmenting sensitive data zones. Let’s explore how NAC plays a critical role in safeguarding data and preventing costly leaks.

Understanding Data Leaks: The Growing Threat

A data leak occurs when sensitive information is unintentionally exposed, whether due to human error, insider threats, or cyberattacks. Unlike data breaches, which involve direct hacking, data leaks often stem from poor access controls, unsecured endpoints, or misconfigured cloud environments.

Some of the common causes of data leaks include:

  • Unsecured endpoints (e.g., personal devices, unpatched systems, rogue IoT devices)
  • Insider threats (e.g., disgruntled employees, accidental mishandling of data)
  • Misconfigured access permissions (e.g., users with excessive privileges)
  • Shadow IT and unmanaged devices (e.g., employees using unauthorized apps and personal devices)

With these risks in mind, how can NAC mitigate data leaks and strengthen an organization’s cybersecurity posture?

1. Enforcing Strong Access Controls

One of the primary ways NAC prevents data leaks is by ensuring that only authorized users and compliant devices gain access to critical systems and data.

  • Role-Based Access Control (RBAC): NAC allows administrators to enforce strict access policies based on user roles. For example, HR personnel can access payroll databases, but marketing teams cannot.
  • Device Compliance Enforcement: NAC checks devices for security posture (e.g., up-to-date antivirus, encryption, OS patches) before granting network access.
  • Guest and BYOD Controls: NAC isolates guest users and unmanaged personal devices, preventing them from accessing sensitive corporate data.

By ensuring that only trusted users and devices connect to sensitive systems, NAC significantly reduces the risk of unauthorized data exposure.

2. Monitoring Network Behavior in Real-Time

Even with strong access policies, insider threats and compromised accounts pose a risk. NAC helps prevent data leaks by continuously monitoring network activity and identifying suspicious behavior.

  • Detecting Unusual Data Transfers: If an employee suddenly starts transferring large volumes of files to an external storage drive, NAC can flag and block the activity.
  • Identifying Anomalous Logins: NAC detects login attempts from unusual locations or devices, preventing potential credential misuse.
  • Restricting High-Risk Applications: NAC can block unauthorized apps or cloud services (e.g., unsanctioned file-sharing platforms) that employees might use to move sensitive data.

By actively monitoring and controlling network behavior, NAC helps organizations spot and stop potential data leaks before they escalate.

3. Network Segmentation: Keeping Sensitive Data Isolated

Data leaks often occur when users or devices gain access to systems they shouldn’t. NAC enforces network segmentation to ensure that access to critical data is tightly controlled.

  • Zero Trust Segmentation: Even if a device is authenticated, NAC ensures it only has access to the specific resources needed for its role—nothing more.
  • IoT and Endpoint Isolation: Rogue IoT devices or infected endpoints can’t move laterally within the network, preventing data leaks caused by compromised devices.
  • Guest and Contractor Networks: NAC places guests, contractors, and third-party vendors in isolated VLANs, preventing them from accessing sensitive corporate data.

By limiting who and what can communicate within the network, NAC minimizes the attack surface and reduces the likelihood of data leaks.

4. Responding to Policy Violations with Automated Remediation

Even the best security policies can fail if they aren’t actively enforced. NAC goes beyond passive monitoring by providing automated remediation for security violations.

  • Quarantine and Block: If a device fails security posture checks (e.g., outdated antivirus, suspicious activity), NAC can automatically quarantine or disconnect it from the network.
  • Adaptive Policy Enforcement: NAC integrates with security tools like SIEMs and firewalls, ensuring immediate action when a threat is detected.
  • Change of Authorization (CoA): If a device violates security policies (e.g., an unpatched laptop attempting to access sensitive files), NAC can trigger a forced re-authentication or revoke access.

By proactively enforcing security compliance and responding to threats in real time, NAC ensures that security gaps leading to data leaks are swiftly closed.

5. Supporting Compliance and Regulatory Requirements

For industries governed by strict data protection regulations (e.g., GDPR, HIPAA, PCI-DSS), preventing data leaks isn’t just a security concern—it’s a legal necessity. NAC helps organizations meet compliance requirements by:

  • Ensuring Least-Privilege Access: Enforcing user and device access controls to protect sensitive data.
  • Maintaining Security Logs: Providing an audit trail of who accessed what and when.
  • Enforcing Encryption and Security Policies: Ensuring that all devices accessing the network meet security requirements.

By aligning with regulatory mandates, NAC helps organizations avoid costly fines and legal repercussions associated with data leaks.

Conclusion

Data leaks are a persistent and costly threat to organizations, but NAC provides a proactive defense against unauthorized access, insider threats, and network vulnerabilities. By enforcing strict access controls, monitoring network behavior, segmenting sensitive data, automating security enforcement, and supporting compliance requirements, NAC plays a critical role in preventing data leaks.

In a world where data is currency, organizations can’t afford to take network security lightly. Implementing a cloud-native NAC solution can help businesses lock down their networks, safeguard sensitive data, and mitigate the risk of devastating leaks.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×