Simplify, Strengthen and Unify your security.

Similar documents
SAS and F5 integration at F5 Networks. Updates for Version 11.6

MaaS360 Secure Productivity Suite

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

BIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

ForeScout Extended Module for MobileIron

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Maximize your move to Microsoft in the cloud

Secure Access for Microsoft Office 365 & SaaS Applications

RHM Presentation. Maas 360 Mobile device management

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

PCI DSS Compliance. White Paper Parallels Remote Application Server

the SWIFT Customer Security

ForeScout Extended Module for VMware AirWatch MDM

Five Tips to Mastering Enterprise Mobility

BYOD Business year of decision!

Microsoft Security Management

ForeScout Extended Module for MaaS360

Mobile Devices prioritize User Experience

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Secure Access - Update

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

Secure Mobile Access to Corporate Applications

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Cisco AnyConnect Secure Mobility & VDI Demo Guide

Mohit Saxena Senior Technical Lead Microsoft Corporation

XenApp, XenDesktop and XenMobile Integration

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

A comprehensive security solution for enhanced mobility and productivity

Understand & Prepare for EU GDPR Requirements

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Secure app and data delivery across devices, networks and locations

Kaspersky Security for Virtualization Frequently Asked Questions

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Vendor: Microsoft. Exam Code: MB Exam Name: Microsoft Dynamics CRM Online Deployment. Version: Demo

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Network Access Control

Service Description VMware Workspace ONE

The Device Has Left the Building

Phil Schwan Technical

The SonicWALL SSL-VPN Series

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9

THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE

VISIT US: goverlan.com

BYOD: BRING YOUR OWN DEVICE.

Windows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Addressing Today s Endpoint Security Challenges

ForeScout Extended Module for Carbon Black

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Consumerization: What It Means to IT Operations

Office 365: Fact Sheet

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Enterprise Guest Access

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Microsoft. MS-101 EXAM Microsoft 365 Mobility and Security. m/ Product: Demo File

Network. Arcstar Universal One

UNCLASSIFIED. Mimecast UK Archiving Service Description

SECURE, CENTRALIZED, SIMPLE

Microsoft licensing for the Consumerization of IT

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Partner Webinar. AnyConnect 4.0. Rene Straube Cisco Germany. December 2014

Secure Access & SWIFT Customer Security Controls Framework

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

VMware Horizon Suite:

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Citrix SSO for Mac OS X. User Guide

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Colligo Briefcase. for Good Technology. Administrator Guide

Consolidate your Secure Remote Access Delivery Infrastructure with one URL

Securing Office 365 with SecureCloud

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

GeoLocation Overview

Kaspersky Endpoint Security. AppConfig Technical Capabilities

IBM MaaS360 with Watson Evaluator s Guide. Version 2.2

Symantec Network Access Control Starter Edition

OptiSol FinTech Platforms

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Symantec Protection Suite Add-On for Hosted Security

HPE Intelligent Management Center

Support Device Access

Next-Gen CASB. Patrick Koh Bitglass

Augmenting security and management of. Office 365 with Citrix XenMobile

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Application management in Nokia: Getting the most from Company Apps

Apple ios Enterprise Mobility Management (cloud based)

Future-ready security for small and mid-size enterprises

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

Bring Your Own Device (BYOD) Best Practices & Technologies

McAfee Security Management Center

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

EM L01 Introduction to Mobile

Transcription:

www.portsys.com info@portsys.com Simplify, Strengthen and Unify your security. TAC secures mobility, cloud and corporate-based access to all your valuable resources, in one highly scalable, integrated solution. Total Access Control provides a new, unified access experience that combines many technologies and methodologies that once required multiple products from different vendors. Control access to ALL your resources (local and cloud) Secure access from any device and any location Strengthen your security posture Eliminate security gaps Simplify the user experience Enable users through secure mobility Significantly reduce costs At PortSys, security is our passion. We believe: 1 2 3 4 5 Security is crucial in protecting reputation and financial well-being Security can be simpler, stronger and more comprehensive Properly designed security can actually increase user productivity Security can be transformational for organizations Our customers lead the way to revolutionizing security Any Device, Any Location to Any Resource (local or cloud), Securely.

Total Access Control gathers intelligence about all aspects of the user and client device used, understands Context of Access and determines the appropriate level of access. A Secure Proxy No direct connection to resources PROXY - No direct connection to resources Any Device - corporate and BYOD Optimized application delivery (local and cloud) Single sign-on with multi-factor authentication Simplified User Experience Context aware access control Protection from Untrusted Devices Centralized administration and auditing Scalable, enterprise-proven reliability Access Control & Policy Enforcement Determines who can access which resources based on current context. Every user has a unique story... and it s always changing. Context of Access? A user accessing information is not just a person and their credentials, but also their location, device type and status of the device (among other factors). This provides context around this particular access request. Using this information, TAC creates significantly greater control over providing or blocking access to each specific resource. + + Credentials Device Used Device Condition

Quite simply, a user inside the company using a managed desktop is very different from that same user (same credentials) using an unmanaged device from an internet café. TAC gives you the ability to dynamically change what people get access to by using more information about the user, their location, their device, etc. This makes a more secure environment without making it harder for the end users. By knowing the Context of Access, TAC will alter the level of access and permissions in realtime driven by the user s unique access situation at the precise moment in time at login. Linda Marketing Erin Vendor William Sales Rep Thomas Contractor Michelle IT Administrator Angela Customer Service Kevin Customer Works from her home. Shares her computer with her family. Connects to a single application for remote support. Travels heavily and connects using a wide variety of devices. Outsourced software developer in another country. Manages IT Hardware and Software Infrastructure. Works with customers over phone and email. Accesses his customer account to review and pay his bill. Peoplesoft RDP/Term Svc Telnet Oracle Proprietary Web App RDP/Term Svc Oracle Lync In-House Order Entry Software Web-Based Customer Portal Android Phone ipad Windows 8 Corporate Laptop ipad 3 MacOS Laptop Everything! Even Hotel Kiosks Multiple, uses virtual machines. Android Phone iphone Android Tablet Windows 7 Windows 8 Corporate Laptop Works from her home office. Connects with shared home Windows 7 PC Context & Compliance Inspection User Experience Dozens of attributes are scanned, including: User group/department Membership Type of Internet Connection Detect Corporate-issued machines and threat level of non-corporate devices Mobile Device Detection - Type and Jailbreak/Root Status Operating System - Version & Patch level Anti-Virus and Anti-Spyware detection. - Definitions up-to-date and running. or files installed on the client device Domain or Workgroup IP address Geographic origin of the user Total Access Control Detection and Compliance Engine A wide variety of enforcement measures including: Allow/Disallow access to specific applications. Allow/Disallow access to all applications Allow/Disallow ability to put files on the network. Example: attachments in email or add documents in Sharepoint. Allow/Disallow ability to get files from the network. Display applications available only to specific supported device types. Enforce the requirement of Anti-Virus and/or Anti-Spyware applications Enforce the requirement of specific approved operating systems and patch levels. Dynamically deliver Secure Sterile Desktop when required

Components One Vendor, One Platform, Many Technologies. All working together, Intelligently. TAC consolidates multiple technologies that companies were required to purchase from many different vendors. The result is a more comprehensive, simpler and fortified security architecture. TAC encompasses many technologies in a unified framework, including: Portal Access Your applications in a customizable web portal Dynamic portal shows only accessible resources Consistent experience regardless of device/location Internal Application Access Control Publish your internally hosted applications securely Control Authentication and Access permissions Mask URLs native to the application Cloud Application Access Control Control who gets access to cloud apps Use your own authentication/multifactor Delivered seamlessly alongside your internal apps Multifactor Authentication Includes revolutionary picture-based multifactor Supports any third-party multi-factor products Can be application, user, or portal specific Single Sign-On Simplify all access for end-users SSO for all local and cloud-based apps Improves productivity, lowers support costs GeoIP Intelligence Allow/block access based on location Security behavior based on geography of access Report based on geography of access/attempts Differential Security Policy Engine Highly intelligent, granular security engine Allows for very flexible, dynamic rules More robust security options Untrusted device protection Control sessions from untrusted devices Limit functions on unknown or untrusted devices Block file access, copy, print/print-screen MDM - Mobile Device Management Full validation and control Jailbreak/root detection Selective/partial wipe for BYOD Centralized Management Single pane of glass management of all functions Realtime monitoring of all activity No interruption of service for configuration changes Comprehensive Reporting and Auditing Detailed reporting of all access to all resources Ability to drill down to any session, any activity Graphical reports simplify data analysis VPN Integrated IPSec-style tunnel User experience feels clientless Can be automatically launched based on client needs Device Validation Determine full status of any device Block access at hardware level Vary/block access based on device status/version Application Acceleration Improve application performance Reduce network load Improve response times Highly Scalable Global geo-aware architecture support High availability local or across the globe Up to 64 array members Socket Forwarding Publish thick-client applications Dynamically launched from within the portal Support for RDP, VDI, VMware and many more

Let us show you how Total Access Control works and how it fulfills the promise of a secure, well-managed, easy to use infrastructure. The End Result: Any Application, Any Device, Anywhere, Securely. Easy to use, secure, intelligent access to every application type all from one scalable point of entry. Questions? Call us Request A Demo Free Security Assessment We re here to help. Give us a call and speak with a security specialist who will answer any questions you might have. US +1 781 996 4900 UK +44 208 196 2420 In 30 minutes, our system engineers will show you how PortSys Total Access Control can help you achieve compliance, protect your data, and increase efficiency, while enhancing the end user experience. Not sure whether your environment is protected? In 2 easy steps, we ll help you find risk areas, audit access, and go through your access requirements. OR EMAIL US SUBMIT REQUEST SUBMIT REQUEST