www.portsys.com info@portsys.com Simplify, Strengthen and Unify your security. TAC secures mobility, cloud and corporate-based access to all your valuable resources, in one highly scalable, integrated solution. Total Access Control provides a new, unified access experience that combines many technologies and methodologies that once required multiple products from different vendors. Control access to ALL your resources (local and cloud) Secure access from any device and any location Strengthen your security posture Eliminate security gaps Simplify the user experience Enable users through secure mobility Significantly reduce costs At PortSys, security is our passion. We believe: 1 2 3 4 5 Security is crucial in protecting reputation and financial well-being Security can be simpler, stronger and more comprehensive Properly designed security can actually increase user productivity Security can be transformational for organizations Our customers lead the way to revolutionizing security Any Device, Any Location to Any Resource (local or cloud), Securely.
Total Access Control gathers intelligence about all aspects of the user and client device used, understands Context of Access and determines the appropriate level of access. A Secure Proxy No direct connection to resources PROXY - No direct connection to resources Any Device - corporate and BYOD Optimized application delivery (local and cloud) Single sign-on with multi-factor authentication Simplified User Experience Context aware access control Protection from Untrusted Devices Centralized administration and auditing Scalable, enterprise-proven reliability Access Control & Policy Enforcement Determines who can access which resources based on current context. Every user has a unique story... and it s always changing. Context of Access? A user accessing information is not just a person and their credentials, but also their location, device type and status of the device (among other factors). This provides context around this particular access request. Using this information, TAC creates significantly greater control over providing or blocking access to each specific resource. + + Credentials Device Used Device Condition
Quite simply, a user inside the company using a managed desktop is very different from that same user (same credentials) using an unmanaged device from an internet café. TAC gives you the ability to dynamically change what people get access to by using more information about the user, their location, their device, etc. This makes a more secure environment without making it harder for the end users. By knowing the Context of Access, TAC will alter the level of access and permissions in realtime driven by the user s unique access situation at the precise moment in time at login. Linda Marketing Erin Vendor William Sales Rep Thomas Contractor Michelle IT Administrator Angela Customer Service Kevin Customer Works from her home. Shares her computer with her family. Connects to a single application for remote support. Travels heavily and connects using a wide variety of devices. Outsourced software developer in another country. Manages IT Hardware and Software Infrastructure. Works with customers over phone and email. Accesses his customer account to review and pay his bill. Peoplesoft RDP/Term Svc Telnet Oracle Proprietary Web App RDP/Term Svc Oracle Lync In-House Order Entry Software Web-Based Customer Portal Android Phone ipad Windows 8 Corporate Laptop ipad 3 MacOS Laptop Everything! Even Hotel Kiosks Multiple, uses virtual machines. Android Phone iphone Android Tablet Windows 7 Windows 8 Corporate Laptop Works from her home office. Connects with shared home Windows 7 PC Context & Compliance Inspection User Experience Dozens of attributes are scanned, including: User group/department Membership Type of Internet Connection Detect Corporate-issued machines and threat level of non-corporate devices Mobile Device Detection - Type and Jailbreak/Root Status Operating System - Version & Patch level Anti-Virus and Anti-Spyware detection. - Definitions up-to-date and running. or files installed on the client device Domain or Workgroup IP address Geographic origin of the user Total Access Control Detection and Compliance Engine A wide variety of enforcement measures including: Allow/Disallow access to specific applications. Allow/Disallow access to all applications Allow/Disallow ability to put files on the network. Example: attachments in email or add documents in Sharepoint. Allow/Disallow ability to get files from the network. Display applications available only to specific supported device types. Enforce the requirement of Anti-Virus and/or Anti-Spyware applications Enforce the requirement of specific approved operating systems and patch levels. Dynamically deliver Secure Sterile Desktop when required
Components One Vendor, One Platform, Many Technologies. All working together, Intelligently. TAC consolidates multiple technologies that companies were required to purchase from many different vendors. The result is a more comprehensive, simpler and fortified security architecture. TAC encompasses many technologies in a unified framework, including: Portal Access Your applications in a customizable web portal Dynamic portal shows only accessible resources Consistent experience regardless of device/location Internal Application Access Control Publish your internally hosted applications securely Control Authentication and Access permissions Mask URLs native to the application Cloud Application Access Control Control who gets access to cloud apps Use your own authentication/multifactor Delivered seamlessly alongside your internal apps Multifactor Authentication Includes revolutionary picture-based multifactor Supports any third-party multi-factor products Can be application, user, or portal specific Single Sign-On Simplify all access for end-users SSO for all local and cloud-based apps Improves productivity, lowers support costs GeoIP Intelligence Allow/block access based on location Security behavior based on geography of access Report based on geography of access/attempts Differential Security Policy Engine Highly intelligent, granular security engine Allows for very flexible, dynamic rules More robust security options Untrusted device protection Control sessions from untrusted devices Limit functions on unknown or untrusted devices Block file access, copy, print/print-screen MDM - Mobile Device Management Full validation and control Jailbreak/root detection Selective/partial wipe for BYOD Centralized Management Single pane of glass management of all functions Realtime monitoring of all activity No interruption of service for configuration changes Comprehensive Reporting and Auditing Detailed reporting of all access to all resources Ability to drill down to any session, any activity Graphical reports simplify data analysis VPN Integrated IPSec-style tunnel User experience feels clientless Can be automatically launched based on client needs Device Validation Determine full status of any device Block access at hardware level Vary/block access based on device status/version Application Acceleration Improve application performance Reduce network load Improve response times Highly Scalable Global geo-aware architecture support High availability local or across the globe Up to 64 array members Socket Forwarding Publish thick-client applications Dynamically launched from within the portal Support for RDP, VDI, VMware and many more
Let us show you how Total Access Control works and how it fulfills the promise of a secure, well-managed, easy to use infrastructure. The End Result: Any Application, Any Device, Anywhere, Securely. Easy to use, secure, intelligent access to every application type all from one scalable point of entry. Questions? Call us Request A Demo Free Security Assessment We re here to help. Give us a call and speak with a security specialist who will answer any questions you might have. US +1 781 996 4900 UK +44 208 196 2420 In 30 minutes, our system engineers will show you how PortSys Total Access Control can help you achieve compliance, protect your data, and increase efficiency, while enhancing the end user experience. Not sure whether your environment is protected? In 2 easy steps, we ll help you find risk areas, audit access, and go through your access requirements. OR EMAIL US SUBMIT REQUEST SUBMIT REQUEST