
Portnox, a leading provider of cloud-native, zero trust access control solutions, announced a new integration with CrowdStrike, a leader in endpoint protection and zero trust security.
This strategic partnership enhances Portnox’s cloud-native Network Access Control (NAC) solution by incorporating CrowdStrike’s trusted device telemetry and Zero Trust Assessment (ZTA) scores, enabling organizations to enforce access policies based on real-time risk intelligence.
In today’s complex threat landscape, endpoint visibility and risk-based access control are cornerstones of effective cybersecurity. The integration between Portnox and CrowdStrike addresses this critical need by bridging the gap between endpoint intelligence and network enforcement.
CrowdStrike’s industry-leading Falcon® platform, an AI-powered, cloud-delivered solution, provides comprehensive protection for endpoints, workloads, and identities. Its real-time detection and response capabilities, threat intelligence, and behavior-based protection are instrumental in preventing breaches.
A key component of CrowdStrike’s offering is the Zero Trust Assessment (ZTA) score, an intelligent metric that dynamically evaluates a device’s risk posture based on telemetry inputs such as device health, vulnerabilities, threat detections, user behavior, and CrowdStrike agent status. These scores, ranging from 0 to 100, allow security teams to make informed decisions about access privileges and device remediation.
The Portnox cloud-native NAC platform empowers organizations to implement granular, risk-aware access controls without relying on on-prem hardware or complex configurations. With this new integration, Portnox can now:
-
Validate CrowdStrike Management: Automatically verify whether a device is managed by the CrowdStrike Falcon agent before granting network access. -
Leverage ZTA Scores: Incorporate ZTA scores into policy decisions, allowing full access only to low-risk devices or enforcing guest VLANs or limited access for high-risk endpoints. -
Strengthen Zero Trust Architectures: Utilize contextual, real-time risk signals from CrowdStrike to reinforce least-privilege access models across corporate and BYOD environments. -
Automate Response: Define automated NAC policies that adapt to changes in device posture as reported by CrowdStrike, helping to contain threats before they escalate.
This integration is particularly impactful for hybrid workforces, BYOD programs, and any organization committed to implementing Zero Trust principles. It ensures that only trusted, compliant, and secure devices can connect to corporate networks, providing a continuous, adaptive security solution in the face of increasingly sophisticated attacks.
Denny LeCompte, CEO of Portnox
In an era where cybersecurity threats are constantly evolving, dynamic, real-time access control is paramount Our integration with CrowdStrike delivers on this need by empowering organizations to make informed, automated access decisions based on the most current device posture This partnership significantly fortifies our customers’ security posture, enabling them to confidently embrace Zero Trust principles and adapt to an ever-changing risk landscape