Skip to content

Portnox Appoints Alison Dixon as Chief Customer Officer to Lead Evolving Customer Experience Strategy

Dixon’s promotion underscores Portnox’s commitment to driving long-term customer success and business growth.

 

AUSTIN, TEXAS — Aug. 5, 2025 — Portnox, a leader in cloud-native access control and cybersecurity solutions, today announced the promotion of Alison Dixon to Chief Customer Officer (CCO). In her new role, Dixon will be responsible for leading the company’s customer success and experience initiatives, including the newly established Technical Account Management (TAM) team. This strategic move highlights Portnox’s continued investment in customer relationships and proactive, post-sales technical engagement.

Dixon, who joined Portnox in 2022 as Global Head of Human Resources and Sales Enablement, was later promoted to Vice President of Operations, and most recently to Vice President of Customer Experience. She will now lead all customer-facing technical teams, ensuring a cohesive and integrated approach to customer experience. This change aligns with the company’s vision to transition the post-sales technical function from a reactive support model to a proactive partnership with customers.

“From the moment a customer joins Portnox, our focus is on their enduring success. The evolution of our onboarding engineers into Technical Account Managers, and now Alison’s pivotal role as Chief Customer Officer, underscores this deep commitment,” said Denny LeCompte, CEO of Portnox. “This strategic move ensures our Customer Experience team is not merely supporting, but actively driving customer value, retention, and expansion. Alison’s leadership will be key to delivering the unparalleled technical success our customers deserve.”

Under Dixon’s leadership, the newly formalized TAM team signifies our profound commitment to the enduring success of our valued customers. These dedicated strategic partners will cultivate deep, long-term relationships, proactively guiding our customers to maximize their Portnox investment and thrive in today’s dynamic security landscape. Their mission is to ensure every one of our customers receives the tailored support and strategic insight needed.

“I am honored to take on this new role and lead a team that is so essential to our customers’ success,” said Alison Dixon. “The new Technical Account Management function is about creating a true partnership with our customers. By proactively engaging with them and understanding their evolving needs, we can help them strengthen their security posture and ensure they see continuous value from their partnership with Portnox.”

Dixon holds a Master of Science in Organizational Development from the University of Pennsylvania and has a deep background in leading customer-facing teams, with a focus on building scalable processes that drive customer loyalty and retention. She is also a Board Member for the Central Texas Angel Network, supporting entrepreneurs and early-stage growth companies by serving as a key source of funding, mentorship, strategic advice, and educational resources.

 

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox Unleashes Fast, Frictionless, Cloud-Native ZTNA

Secure Access, Simplified. No Agents, No Clients, No Passwords—No Problem.

 

AUSTIN, TX, July 8, 2025 — Portnox, a leading provider of cloud-native access control solutions, today announced the launch of its innovative Zero Trust Network Access (ZTNA) solution. In today’s distributed work environment, employees require access to critical applications from various locations and devices, often over untrusted networks. This expanded threat landscape presents significant security challenges for IT teams. To support rapid adoption, Portnox is also introducing a free version of its ZTNA solution—offering access for unlimited users to an unlimited number of web-based applications.

Legacy ZTNA deployments are notorious for sluggish performance, bloated agents, and deployment headaches that rival traditional VPNs. Purpose-built for agility and simplicity, Portnox’s latest innovation eliminates the friction, lag, and complexity that have come to characterize conventional ZTNA and VPN architectures. Portnox ZTNA offers a unified access control approach, delivering secure remote access to any web-based application without the traditional complexities and exposures.

Leveraging modern zero trust principles, Portnox ZTNA extends robust security capabilities to the application layer, ultimately simplifying IT operations.

Key Advantages of Portnox ZTNA:

  • Instant Access with Minimal Latency: Delivers blazing-fast, high-performance connectivity to internal applications—no lag, no waiting—ensuring users remain productive without the sluggish delays common in legacy ZTNA and VPN solutions.
  • No Client or Agent Required: Users access internal web applications via standard browsers and familiar URLs, eliminating the need for legacy clients.
  • Passwordless Authentication: Provides seamless and secure access, removing the burden and risk associated with passwords.
  • Role- and Location-Based Access Controls: Ensures users can only access the resources they need, based on their role and location.
  • Endpoint Risk Posture Checks: Continuously verifies the security compliance of devices before granting access.
  • Automated Remediation: Instantly addresses non-compliant or risky endpoints.
  • Zero Network Impact: Requires no configuration changes to remote worker networks or corporate firewalls. All connections are outbound-only, simplifying secure access and minimizing the attack surface.
  • Access to Web-Based Applications: Provides secure remote access to web-based applications.

“Portnox ZTNA fundamentally changes how organizations approach remote access security,” stated Denny LeCompte, CEO of Portnox. “We’ve engineered a solution that not only significantly strengthens security but also enhances the user experience—because the best security is virtually invisible: fast, seamless, and frictionless. By eliminating the reliance on traditional VPNs and streamlining access controls, we empower businesses to embrace a true zero trust model with remarkable simplicity.”

Portnox ZTNA offers a modern, secure alternative to traditional VPNs for accessing web-based applications. It establishes a secure, outbound-only tunnel, eliminating the need for VPN clients or complex firewall modifications. This approach simplifies secure remote access without compromising security or user experience.

While today’s launch focuses on delivering high-speed, passwordless access to web-based applications, Portnox ZTNA is only just getting started. Future releases will broaden the scope of the solution to encompass secure zero trust access to a wider array of enterprise resources—including legacy applications with no web client. This continued expansion reflects Portnox’s commitment to providing holistic, cloud-native access control for every user, device, and application—no matter where they reside.

Portnox ZTNA is a core component of the Portnox Unified Access Control Platform, which also includes RADIUS authentication, Network Access Control (NAC), and TACACS+, delivered in a single, cost effective, cloud-native solution. Together, these capabilities provide organizations with a centralized, highly scalable ecosystem for managing and enforcing zero trust access across modern hybrid environments.

The free version of Portnox ZTNA—available now—enables organizations to securely connect unlimited users to unlimited web-based applications. While this free offering includes only community support , organizations can upgrade to Enterprise Support and access all to-be-released features. To use the free version, installation of Portnox’s lightweight endpoint posture assessment tool, AgentP, is required.

Who Benefits from Portnox ZTNA?

  • End users enjoy fast, seamless, secure access to applications and data without cumbersome VPNs.
  • IT decision-makers gain enhanced control and visibility over access attempts and enforce identity-based policies.
  • Organizations across industries like finance, healthcare, education, and technology benefit from robust security and streamlined access management.

To learn more about Portnox ZTNA, visit: /portnox-cloud/ztna/ 

 

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox Wins 2025 Fortress Cybersecurity Award for Network Security

The award recognizes Portnox Cloud in the Best Cybersecurity System/Tool sub-category.

AUSTIN, TX – June 10, 2025 — Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced it has won a 2025 Fortress Cybersecurity Awards in the Network Security category, specifically for its Portnox Cloud solution in the Best Cybersecurity System/Tool sub-category. This recognition from the Business Intelligence Group highlights Portnox’s commitment to protecting systems, infrastructure, and data from the ever-evolving threat landscape.

“We are honored to receive this award from the Business Intelligence Group,” said Denny LeCompte, CEO of Portnox. “As cloud-native security becomes the standard, Portnox Cloud leads this evolution, empowering organizations to enforce zero trust principles without legacy NAC operational burdens. With a focus on simplicity, scalability, and automation, Portnox is shaping the future of secure network access, providing comprehensive and adaptive security for modern organizations.”

Portnox Cloud was recognized for its innovative cloud-native, zero trust Network Access Control (NAC) capabilities, which eliminate the need for on-site hardware, maintenance, and management complexities. This is especially critical for resource-constrained IT security teams managing distributed networks.

The Fortress Cybersecurity Awards program honors the industry’s leading companies and professionals who are going beyond compliance to build and maintain secure systems and processes. Winners are selected based on innovation, measurable impact, and commitment to security best practices.

“The volume and complexity of threats facing organizations today is growing by the minute,” said Russ Fordyce, CEO of the Business Intelligence Group. “The winners of this year’s Fortress Cybersecurity Awards are not only keeping up—they’re setting the pace. We’re proud to honor Portnox for building systems and solutions that make us all more secure.”

 

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox and CrowdStrike Integration Fortifies Customer Cybersecurity Posture with Enhanced Risk-Based Access Control

AUSTIN, TX – June 4, 2025 — Portnox, a leading provider of cloud-native, zero trust access control solutions, announced a new integration with CrowdStrike, a leader in endpoint protection and zero trust security. This strategic partnership enhances Portnox’s cloud-native Network Access Control (NAC) solution by incorporating CrowdStrike’s trusted device telemetry and Zero Trust Assessment (ZTA) scores, enabling organizations to enforce access policies based on real-time risk intelligence.

In today’s complex threat landscape, endpoint visibility and risk-based access control are cornerstones of effective cybersecurity. The integration between Portnox and CrowdStrike addresses this critical need by bridging the gap between endpoint intelligence and network enforcement.

“In an era where cybersecurity threats are constantly evolving, dynamic, real-time access control is paramount,” said Denny LeCompte, CEO of Portnox. “Our integration with CrowdStrike delivers on this need by empowering organizations to make informed, automated access decisions based on the most current device posture. This partnership significantly fortifies our customers’ security posture, enabling them to confidently embrace Zero Trust principles and adapt to an ever-changing risk landscape.”

CrowdStrike’s industry-leading Falcon® platform, an AI-powered, cloud-delivered solution, provides comprehensive protection for endpoints, workloads, and identities. Its real-time detection and response capabilities, threat intelligence, and behavior-based protection are instrumental in preventing breaches.

A key component of CrowdStrike’s offering is the Zero Trust Assessment (ZTA) score, an intelligent metric that dynamically evaluates a device’s risk posture based on telemetry inputs such as device health, vulnerabilities, threat detections, user behavior, and CrowdStrike agent status. These scores, ranging from 0 to 100, allow security teams to make informed decisions about access privileges and device remediation.

The Portnox cloud-native NAC platform empowers organizations to implement granular, risk-aware access controls without relying on on-prem hardware or complex configurations. With this new integration, Portnox can now:

  • Validate CrowdStrike Management: Automatically verify whether a device is managed by the CrowdStrike Falcon agent before granting network access.
  • Leverage ZTA Scores: Incorporate ZTA scores into policy decisions, allowing full access only to low-risk devices or enforcing guest VLANs or limited access for high-risk endpoints.
  • Strengthen Zero Trust Architectures: Utilize contextual, real-time risk signals from CrowdStrike to reinforce least-privilege access models across corporate and BYOD environments.
  • Automate Response: Define automated NAC policies that adapt to changes in device posture as reported by CrowdStrike, helping to contain threats before they escalate.

This integration is particularly impactful for hybrid workforces, BYOD programs, and any organization committed to implementing Zero Trust principles. It ensures that only trusted, compliant, and secure devices can connect to corporate networks, providing a continuous, adaptive security solution in the face of increasingly sophisticated attacks.

 

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Dynamic, Context-Aware Security with AI-Driven Zero Trust

Introduction to AI-Driven Zero Trust

The current cybersecurity landscape demands a shift from traditional static access controls to dynamic, context-aware security models. AI-driven Zero Trust frameworks harness the power of artificial intelligence to revolutionize network access management. By continuously analyzing user behavior, device posture, and contextual factors, these systems provide real-time, adaptive security. This approach not only fortifies defenses against increasingly sophisticated threats but also enhances operational efficiency and compliance. 81% of organizations plan to implement Zero Trust strategies within the next 12 months. Embracing AI-driven Zero Trust enables organizations to minimize cybersecurity risks, optimize their budgets, and stay ahead of the evolving threat landscape, making it a vital strategy for modern security operations.

Continuous Authentication and Its Benefits

Continuous authentication leverages AI to provide real-time, ongoing verification of user behavior, device posture, and contextual factors. This approach ensures that access remains secure throughout the duration of a session, mitigating risks associated with traditional one-time verification methods. By continuously monitoring for anomalies, AI-driven systems can swiftly detect and address unauthorized access attempts, enhancing overall security. This seamless, adaptive process not only fortifies network defenses but also improves user experience by reducing friction. Embracing continuous authentication allows organizations to maintain a higher level of security integrity, aligning with the dynamic nature of modern cybersecurity threats.

Adaptive Access Controls

AI-driven adaptive access controls mark a transformative shift in user privilege management. The next move for companies is to take control of their data through an AI-augmented zero-trust network, says Ed Fox, chief technology officer at MetTel. By dynamically adjusting access rights based on real-time risk assessments—such as unusual login behaviors or deviations from established patterns—these systems provide a robust security layer that responds instantly to potential threats. This flexibility not only enhances security but also ensures users receive the precise access necessary to perform their tasks efficiently. Implementing adaptive access controls empowers organizations to preemptively counter emerging threats while optimizing resource allocation. This agile approach aligns perfectly with the demands of contemporary cybersecurity, offering a sophisticated mechanism to balance security and operational efficiency seamlessly.

Enhanced Threat Detection

AI-driven threat detection has revolutionized the cybersecurity landscape by employing advanced machine learning algorithms to analyze extensive datasets continuously. This technology swiftly identifies anomalies and potential threats, enabling rapid response times and significantly reducing the risk window for malicious activities. In 2023, 47% of organizations began leveraging Artificial Intelligence (AI) for cyber risk detection and mitigation. The capability to discern subtle patterns indicative of security threats allows organizations to proactively safeguard their assets. This intelligent, data-driven approach ensures that security measures evolve in tandem with emerging threats, maintaining a strong defensive posture. Leveraging AI for threat detection not only enhances an organization’s ability to mitigate risks but also supports a forward-thinking strategy in managing cybersecurity challenges.

Improving Operational Efficiency

AI-driven automation in access decisions significantly alleviates the operational burden on IT and security teams. By delegating routine monitoring and intervention tasks to intelligent systems, organizations can redirect their focus toward strategic, high-value initiatives. This shift not only enhances security measures but also optimizes resource allocation, promoting a more agile and responsive security posture. Leveraging AI for operational tasks reduces human error, accelerates threat response times, and streamlines workflows, creating a more efficient and resilient cybersecurity framework. In a landscape characterized by escalating threats and complexity, automating access controls through AI is a forward-thinking approach that enhances both security and operational performance.

Relevance to Modern Network Access

AI-driven Zero Trust principles offer a transformative approach to network access, essential for navigating today’s sophisticated threat landscape. By transitioning from traditional perimeter-based models to identity and context-based controls, organizations can achieve a higher level of security and operational efficiency. These advanced frameworks dynamically adapt to real-time conditions, ensuring that access is granted based on continuous risk assessments. This shift not only enhances protection against unauthorized access but also optimizes resource allocation and compliance with regulatory standards. Implementing AI-driven Zero Trust models is crucial for modern businesses, providing a robust, flexible security posture that evolves with emerging threats and technological advancements.

Conclusion: Embracing AI in Network Access Control

Embracing AI in network access control is pivotal for modern cybersecurity. Transitioning to dynamic, context-aware models driven by AI significantly enhances our ability to safeguard critical assets while maintaining operational agility. This forward-thinking approach not only provides robust protection against increasingly sophisticated threats but also streamlines operations and optimizes resource allocation. By leveraging AI to continuously analyze and adapt to real-time conditions, organizations can achieve a higher level of security and efficiency. The integration of AI-driven Zero Trust frameworks marks a transformative leap, empowering organizations to stay ahead of evolving cyber threats and maintain a resilient security posture. This strategic adoption is crucial for navigating the complexities of today’s digital landscape and ensuring long-term success.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×