Portnox CLEAR


Portnox CLEAR is a Network Access Control solution delivered from the cloud (NAC as-a-Service).

CLEAR is a cloud-delivered service for automated network visibility and access control management (NAC as-a-Service). CLEAR provides visibility and control of all your IoT, managed and unmanaged devices. Whether the devices are roaming and connecting to cloud services or the VPN, or if endpoints are connecting to your wired or wireless infrastructure; CLEAR will provide continuous risk monitoring, policy enforcement together with simple device on-boarding.

With a flexible pay-as-you-go pricing model, agentless capabilities, deployment and management from the cloud, CLEAR is accessible and easy to implement in every enterprise, regardless of budget or size.

With CLEAR you will be able to:

  • See: CLEAR provides visibility of all endpoints connected to your network at any given moment, in real time, no matter which type of device or where it is connecting from in the world. CLEAR identifies the risk associated with any endpoint, whether it is IoT, BYOD, or a managed device. CLEAR provides data on each endpoint including: operating system, type of device, installed applications, services, certificates, open ports, configuration and more. Utilizing that data along with contextual and behavioral insights, CLEAR provides a specified risk score associated with each endpoint. The solution is available with or without an agent (agentless).
  • Control: CLEAR controls access to the network based on radius and 802.1x protocol. It can block rogue devices, quarantine non-compliant endpoints or limit the access to specified resources. CLEAR can also assist with the remediation of endpoints and bring them back into a healthy state.
  • Automate: CLEAR automates all access scenarios for employees, contractors, guests and non-corporate endpoints (such as IoT machines). Moreover, it provides automation for handling rogue and non-compliant devices. By partnering with leading security vendors, CLEAR is integrated with key security technologies to provide automatic enforcement actions that are based on external threat feeds and cyber security events. These integrations also enrich the available data associated with each security incident.


The app requires AAD permissions for single sign-on and for the integration with Azure Active Directory (AAD).


Em um relance