{"id":48842,"date":"2022-10-12T20:04:00","date_gmt":"2022-10-12T20:04:00","guid":{"rendered":"https:\/\/www.csoonline.com\/article\/3676232\/portnox-adds-iot-fingerprinting-to-network-access-control-service.html#tk.rss_security"},"modified":"2022-10-12T20:04:00","modified_gmt":"2022-10-12T20:04:00","slug":"portnox-adds-iot-fingerprinting-to-network-access-control-service","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/","title":{"rendered":"Portnox adds IoT fingerprinting to network access control service"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/06\/iot_internet-of-things_chains_security_by-mf3d-getty-100799692-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Network security firm Portnox on Wednesday announced it is adding <a href=\"https:\/\/www.networkworld.com\/article\/3207535\/what-is-iot-the-internet-of-things-explained.html\">IoT<\/a> fingerprinting features to the Portnox Cloud NAC-as-a-Service to allow companies to more easily identify and authorize devices on their networks. The IoT fingerprinting features add new device-identification techniques to the <a href=\"https:\/\/www.networkworld.com\/article\/3654479\/what-is-nac-and-why-is-it-important-for-network-security.html\">network access control <\/a>product, including MAC address clustering and <a href=\"https:\/\/www.networkworld.com\/article\/3299438\/dhcp-defined-and-how-it-works.html\">DHCP (Dynamic Host Configuration Protocol)<\/a> gleaning.&nbsp;<\/p>\n<p>Portnox is a &nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3247848\/what-is-zero-trust-a-model-for-more-effective-security.html\">zero trust<\/a> access control company focusing on network security. Its IoT fingerprinting techniques are designed to profile devices that sit on the network but cannot communicate complete identifying information such as version number, model or even device type due to lack of storage or computing power.<\/p>\n<p>IoT fingerprinting gathers information on what devices are on the network, what they are being used for, and who is using them. It is specifically used in the case of devices such as cameras, TV, printers, medical devices, and factory devices. Many IoT devices such as these do not have enterprise-level security\u2014a big problem for network engineers and security teams.<\/p>\n<p>\u201cOur customers and prospects have a lot of anxiety about these devices,&#8221; said Denny LeCompte, CEO of Portnox. &#8220;They want to make sure only the right devices get onto the network. There is also an increasing proliferation of <a href=\"https:\/\/www.csoonline.com\/article\/3346082\/what-is-shadow-iot-how-to-mitigate-the-risk.html\">shadow IT,<\/a> wherein somebody has just plugged a device into the network and the IT team does not know about it. It could be an innocent act but the same can be used or done by attackers as well,\u201d<\/p>\n<p>Portnox\u2019s core product follows a whitelist of MAC addresses for devices that can be allowed to connect to a network. However, this raises concerns about MAC address <a href=\"https:\/\/www.csoonline.com\/article\/2115848\/data-protection-ip-spoofing.html\">spoofing<\/a> and other ways in which attackers can hide behind IoT devices.&nbsp;<\/p>\n<p>\u201cThe next problem faced is that while the IP and MAC addresses are available, it is not known what device it is. The IoT fingerprinting gathers information to tell the organization what each device is,\u201d LeCompte said.&nbsp;&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<h2><strong>IoT fingerprinting offers added security <br \/><\/strong><\/h2>\n<p>With the new IoT fingerprinting techniques, customers of the NAC-as-a-Service can get added levels of security to their network, Portnox said. In MAC address clustering, the network access control process identifies the MAC addresses of IoT devices. Using <a href=\"https:\/\/www.infoworld.com\/article\/3214424\/what-is-machine-learning-intelligence-derived-from-data.html\">machine learning<\/a> techniques and referring to IoT product databases, device types\u2014including specific models\u2014can then be identified.<\/p>\n<p>Some devices have their own fingerprinting\u2014in other words, the ability to store information about themselves, which allows Portnox to passively gather a lot of information about the device. While proximity sensors, for example, may not be able to store information about themselves, Cisco routers have version numbers embedded in Cisco IOS.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>As an added layer of security, organizations can use DHCP gleaning. Although every DHCP request contains the same information, every device does it slightly differently, creating a distinct fingerprint. So, if you capture a DHCP request by a device, you can identify what kind of device it is.&nbsp; &nbsp;<\/p>\n<p>Tapping the combination of data gathered by Portnox\u2019s fingerprinting capabilities and information sent by the devices themselves, organizations can accurately determine whether devices are safe to connect to a network more than 90% of the time, LeCompte said.<\/p>\n<h2>Benefits of <strong>NAC-as-a-Service <\/strong><\/h2>\n<p>When someone tries to access a network\u2014whether via a wired or wireless device\u2014the NAC service will check their identity and what levels of access they are allowed on the network.<\/p>\n<p>It will also check the security posture of the device being used, making sure that it is running an antivirus, vulnerabilities are patched, and the right ports are opened or closed. If the required security posture is not followed, the NAC-as-a-Service does not allow the device to access the network.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>\u201cIt\u2019s all about getting access to the network, the wireless, various kinds of applications, and application access we control. It is a zero trust policy by default which means nobody unknown gets onto the network,\u201d LeCompte said.&nbsp;<\/p>\n<h2><strong>Pricing for the new IoT fingerprinting offering<\/strong><\/h2>\n<p>The IoT fingerprinting feature from Portnox will only be available with the enterprise offering of its NAC-as-a-Service. There will be no additional charge for the new feature. If an organization is already using NAC-as-a-Service, the fingerprint data will automatically start showing up. NAC-as-Service is priced starting $4 per device per month.&nbsp;<\/p>\n<p>Portnox competes with network access control providers such as Cisco, HPE, Fortinet, and Forescout. The company says being a cloud-native solution provider is their biggest differentiator. \u201cThe overhead on our product is a differentiator because there isn\u2019t much overhead at all,\u201d LeCompte claimed.<\/p>\n<div class=\"end-note\"> <!-- blx4 #2004 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2004 blox4_html blxC51120\">\n<aside> <strong>Next read this<\/strong> <\/aside>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.csoonline.com\/article\/3676232\/portnox-adds-iot-fingerprinting-to-network-access-control-service.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The IoT fingerprinting feature will allow companies to fully identify IoT devices that don&#8217;t have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48843,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[236,1061],"class_list":["post-48842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-iot-security","tag-network-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Portnox adds IoT fingerprinting to network access control service 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Portnox adds IoT fingerprinting to network access control service 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-12T20:04:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2019\/06\/iot_internet-of-things_chains_security_by-mf3d-getty-100799692-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Portnox adds IoT fingerprinting to network access control service\",\"datePublished\":\"2022-10-12T20:04:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/\"},\"wordCount\":768,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service.jpg\",\"keywords\":[\"IoT security\",\"Network Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/\",\"name\":\"Portnox adds IoT fingerprinting to network access control service 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service.jpg\",\"datePublished\":\"2022-10-12T20:04:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/portnox-adds-iot-fingerprinting-to-network-access-control-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/iot-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Portnox adds IoT fingerprinting to network access control service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Portnox adds IoT fingerprinting to network access control service 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/","og_locale":"en_US","og_type":"article","og_title":"Portnox adds IoT fingerprinting to network access control service 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-12T20:04:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2019\/06\/iot_internet-of-things_chains_security_by-mf3d-getty-100799692-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Portnox adds IoT fingerprinting to network access control service","datePublished":"2022-10-12T20:04:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/"},"wordCount":768,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/portnox-adds-iot-fingerprinting-to-network-access-control-service.jpg","keywords":["IoT security","Network Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/","url":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/","name":"Portnox adds IoT fingerprinting to network access control service 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/portnox-adds-iot-fingerprinting-to-network-access-control-service.jpg","datePublished":"2022-10-12T20:04:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/portnox-adds-iot-fingerprinting-to-network-access-control-service.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/portnox-adds-iot-fingerprinting-to-network-access-control-service.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/portnox-adds-iot-fingerprinting-to-network-access-control-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"IoT security","item":"https:\/\/www.threatshub.org\/blog\/tag\/iot-security\/"},{"@type":"ListItem","position":3,"name":"Portnox adds IoT fingerprinting to network access control service"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48842"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48842\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48843"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}