All Research Sponsored By:Portnox

The State of Identity Security
INFOGRAPHIC: Organizations struggle with identity security, as 78% of those with compromised accounts faced cyberattacks. 66% have implemented passwordless authentication, but 72% report longer, more complex identity security deployments. Learn more in the infographic.
Posted: 18 Feb 2025 | Published: 19 Feb 2025


The State of Identity Security Opening Doors for the Right Entities and Locking Out the Bad Actors
ESG RESEARCH REPORT: In the past 12 months, 24% of organizations know that their workforce accounts or credentials have been compromised, and another 26% suspect that they've been compromised, according to research by Enterprise Strategy Group. To dig into more findings about the state of identity security, read this analyst report.
Posted: 18 Feb 2025 | Published: 19 Feb 2025


Don’t Risk IT! NAC’s Critical Role in Mitigating Network Risk
WHITE PAPER: As cyber threats evolve, Network Access Control (NAC) is crucial for mitigating network risks. This white paper explores the threat landscape, the proliferation of connected devices, and how NAC can address challenges like visibility, compliance, and zero trust security. Learn more by reading the full white paper.
Posted: 08 Feb 2025 | Published: 08 Feb 2025


CISO Perspectives for 2025
RESEARCH CONTENT: CISOs are concerned about security breaches and their job security, as they balance security with employee experience. Many are implementing Passwordless Authentication to improve access control, but face challenges like employee resistance. Download the full report to explore CISO perspectives on Zero Trust, MFA, regulations, and cyber insurance.
Posted: 08 Feb 2025 | Published: 08 Feb 2025


The Buyers Guide to Network Access Control (NAC)
BUYER'S GUIDE: Evaluate cloud-based vs. on-premises network access control (NAC) solutions to secure your network, enable zero trust, and simplify IT management. Download this buyer's guide to make an informed NAC decision.
Posted: 08 Feb 2025 | Published: 08 Feb 2025


Trends In Zero Trust: Strategies And Practices Remain Fragmented, But Many Are Seeing Success (Infographic)
ESG INFOGRAPHIC: 89% of cybersecurity professionals expect their organizations’ zero-trust support spending to increase over the next 12-18 months. In this infographic, TechTarget’s Enterprise Strategy Group (ESG) compiles key findings from a recent study to paint a picture of the current zero-trust landscape. Download now to learn more.
Posted: 26 Apr 2024 | Published: 27 Apr 2024

TOPICS:  .NET

Trends In Zero Trust Strategies And Practices Remain Fragmented, But Many Are Seeing Success
ESG RESEARCH REPORT: 34% of organizations report having paused or abandoned a zero-trust project in the past, according to research by TechTarget’s Enterprise Strategy Group (ESG). To discover the drivers that informed that decision, and to explore other trends in zero trust, dig into this ESG research report.
Posted: 26 Apr 2024 | Published: 26 Apr 2024

TOPICS:  .NET

Securing Your Digital Eco-System: The Role of Access Control in Network Security
BLOG: In network security, access control plays a critical role. To learn all about that role, and to understand the evolution and future of access control, tap into this blog post.
Posted: 04 Mar 2024 | Published: 04 Mar 2024

TOPICS:  .NET

Why shift to passwordless authentication?
WEBCAST: Why should you consider shifting to passwordless authentication at your organization? This webcast, featuring insights from 3 leaders at Portnox, unpacks common challenges with password-based authentication and explores how you can sidestep obstacles by leveraging passwordless with certificates. Watch now to unlock the guidance.
Posted: 22 Feb 2024 | Premiered: Feb 22, 2024

TOPICS:  .NET

Addressing the Limitations of Multi-Factor Authentication (MFA)
BLOG: Along with exploring 4 limitations of multi-factor authentication (MFA), this blog post maps out how you can level up your security strategy by pairing MFA with digital certificates. Keep reading to review these authentication insights.
Posted: 16 Feb 2024 | Published: 16 Feb 2024

TOPICS:  .NET

Enhancing Cyber Resilience: Ransomware Readiness Assessments and the Critical Role of Network Access Control (NAC)
BLOG: In the face of increasingly sophisticated ransomware attacks, many businesses are working to bolster their defenses. One step your organization can take toward accomplishing that goal is to leverage a ransomware readiness assessment. For a 101 guide to such assessments, explore this blog post.
Posted: 16 Feb 2024 | Published: 16 Feb 2024

TOPICS:  .NET

Unlocking Our Passwordless Future: A Cybersecurity Revolution
BLOG: As they spot vulnerabilities in their password-based security models, many organizations have adopted a new security approach: passwordless. For an introduction to passwordless security, take a look through this article.
Posted: 14 Feb 2024 | Published: 14 Feb 2024

TOPICS:  .NET

The State of IoT Security
WHITE PAPER: As they leverage more IoT devices, organizations are challenged to address the security risks that these devices can pose. So, what are those risks, and how can your business mitigate them? Take a look through this 17-page white paper for insights.
Posted: 13 Feb 2024 | Published: 13 Feb 2024

TOPICS:  .NET

Portnox White Paper The Passwordless Revolution How Ditching Passwords Can Stop the Next Cyber Attack
WHITE PAPER: How can transitioning from password-based authentication to passwordless enhance your organization’s security posture? Find out in this 14-page leader’s guide to the passwordless revolution.
Posted: 10 Feb 2024 | Published: 10 Feb 2024

TOPICS:  .NET

The Building Blocks of Zero Trust Security
EBOOK: To defend against increasing data breaches, many organizations have adopted a zero trust security posture. Are you considering doing the same at your own business? Tap into this 15-page e-book for a comprehensive guide to zero trust’s history, challenges and more.
Posted: 08 Feb 2024 | Published: 09 Feb 2024

TOPICS:  .NET