Administration & Performance

Administration & Performance

Total Access Control (TAC) is different.

Security tools must be high performance and simple to administer.

Total Access Control puts a premium on both.

TAC consolidates multiple technologies that are typically found in individual products developed and supported by different vendors. By building these technologies into one unified framework, the result is a more comprehensive, integrated, and fortified architecture. It’s not only a more logical approach to security, it’s just better.

Comprehensive Reporting

Centralized Management

High Availability

Performance

Comprehensive Reporting

Anti-virus-7

TAC offers comprehensive reporting and auditing capabilities, including detailed reporting of all access to all resources. Now you can easily get a single report that answers the question, “Who has accessed what and when?”

Reporting is perhaps an under-appreciated aspect of security. Good reporting capabilities enable you to continually strengthen your security posture, by identifying trends as well as individual events that highlight areas needing attention. 

PortSys Total Access Control comes with audit and reporting capabilities that keep track of everything that happens in the gateway. Go back to any point in time and see who had access to what, and under what circumstance. Look at a single session and follow all the steps the user took, what they had the ability to access, what they did access, and for how long. 

Not only that, but TAC also keeps track of very granular information for each session such as the user credentials, location they access from, device they used, the status of that device (O/S, patch level, A/V status and much more), what applications they had access to, what applications they did access and which ones they are currently accessing.  This is just part of what is tracked and can be reported on and all of this information is kept for every access attempt, whether it’s successful or not, giving you very rich detail to use for investigating and reporting on issues should they arise.

Total Access Control enables you to report on information including:

•    Detailed reporting of all access to all resources
•    The ability to drill down to any session, and any activity
•    Graphical reports to simplify data analysis
•    Real-time view of portal and application performance
•    Authenticated and anonymous or unauthorized sessions
•    Portal response times
•    Peak usage – by time, geography, application and more
•    Application usage (finally know how many people are actually using an application)
•    Gateway status (license usage, certificate status, current performance and more)

piechart

Graphics capabilities enable you to simplify reports, making them suitable for C-level consumption. You’ll be able to easily show statistics on security policy violations, types of attacks that have occurred, anomalies and network traffic. Download the reports to a .csv format, schedule regular reports for emailing and more. 

Most importantly, when used in conjunction with other TAC features, reports can help you adapt policies to tighten security. If you see you’re getting lots of unauthenticated access attempts from a country where you never do business, for example, you can use the GEO-IP intelligence capability to block access from that country entirely. 

Centralized Management

centralman

TAC gives IT the ability to manage access to all enterprise and cloud-based applications from a single pane of glass. What’s more – it’s easy to use.

For IT groups that are used to dealing with point security solutions that don’t talk effectively to one another, centralized management is a welcome change.

Manage hundreds of thousands of users and devices

Create custom filters to view information in the way that makes sense to you

Apply configuration changes without disconnecting users

Approve or Deny access to each new user/device combination with device enforcement

Manage bindings of user accounts and ActiveSync ID to devices

Manage Active Directory, LDAP, and RADIUS authentication from one central location

Create robust security policies for access to each individual resource

Wipe corporate information from devices without impacting personal information

High Availability

chart

Whether you want multiple devices in an array or even multiple data-centers around the world, TAC can be deployed to meet your business and redundancy needs.

An access solution like Total Access Control must be able to meet the needs of the organization for redundancy and continuous operation.  If your users can’t get access to the system, they can’t do their jobs.  Whether you have employees working from home daily or due to a weather emergency or contractors who access your systems every day, availability is crucial.  But, as we know, hardware can fail, networks become unavailable, and weather can wreak havoc with access to your systems.

TAC provides full redundancy capabilities. Whether you’re a small company with 100 users or a multi-national corporation with multiple data centers around the world, TAC can scale and meet your needs.

Total Access Control components provide high availability and traffic management capabilities to ensure dependable, predictable performance at scale. Multiple gateways work together in active/active mode or active/passive mode, whichever works best for you.

TAC automatically syncs configurations between different array members to ensure that all nodes are up to date and able to process traffic securely and effectively.   TAC also syncs reporting information so that you are able to report on everything from one location.


Further, TAC can be deployed across multiple data centers in disparate geographies and will work together to provide seamless access to your employees, contractors, partners or customers wherever they happen to be.

For larger organizations with multiple data centers or various types of disaster recovery data center configurations, PortSys also offers GeoAvail™.  GeoAvail works across the entire globe to provide seamless access to all of your datacenters and full high availability even if your datacenters are in disparate networks.

TAC and GeoAvail include Active Intelligence, a distributed software solution that monitors data centers. When a failure is detected, traffic is automatically redirected to another data center with a working Total Access Control Gateway.

Active Intelligence assures users and customers get a positive experience, providing high availability and performance. Its intelligence extends to applications and services connected to the gateway, which helps ensure scalability to meet even peak demands.   This enables businesses to meet the challenge of guaranteeing secure application availability while ensuring that nodes can meet peaks in demand.

In short, TAC and GeoAvail with Active Intelligence provides:
•    High availability and scalability for multiple TAC deployments
•    Active monitoring and redundancy for entire data centers
•    Effective distribution of client traffic among all gateway data centers or network segments, based on client origin or data center load levels

Performance

Anti-virus-73

Performance for any access solution is crucial. Your end users need to be able to do their jobs, not be stuck forever waiting for the system to respond.

Application performance varies widely depending on factors including geographic location, the number of users seeking access and the quality of the network that connects them. Ensuring proper performance at all times requires a multi-pronged approach – which is exactly what Total Access Control delivers.

TAC ensures optimal performance in a number of ways, namely:

  • Proprietary HTTP engine is tuned for security and performance specifically for access to applications resources

  • Combines dozens or hundreds of separate, sequential HTTP/HTTPS requests into far fewer requests while providing the same complete render at the user end

  • Compresses all network traffic using browser-compliant encoding, so decompression doesn’t require a separate client on the user end

This multi-pronged approach delivers benefits for end users and IT alike, including:

  • Pushes application performance beyond their design limitations

  • Enables more users to use the same resources in less time

  • Boosts network efficiency by reducing bandwidth usage and balancing server workload

  • Achieve significantly faster response times and reduce bandwidth utilization for end users, especially on lower bandwidth devices such as mobile phones and tablets.

To further improve performance, the TAC acceleration components analyze web-based traffic and optimizes its path through the network. TAC:

  • Improves application performance

  • Reduces network load

  • Improves response times

This multi-pronged approach delivers benefits for end users and IT alike, including:
Pushes application performance beyond their design limitations

Enables more users to use the same resources in less time

Boosts network efficiency by reducing bandwidth usage and balancing server workload

Achieve significantly faster response times and reduce bandwidth utilization for end users, especially on lower bandwidth devices such as mobile phones and tablets.

To further improve performance, the TAC acceleration components analyze web-based traffic and optimizes its path through the network. TAC:

  • Improves application performance

  • Reduces network load

  • Improves response times

Explore the Functions of

Introducing Total Access Control (TAC)

Consolidated and intelligent security for today’s hybrid enterprise.

These two forces have always been opposed: Security versus access.

You don’t have to fight these battles any longer.

Total Access Control goes much further than simply verifying user authorizations. It is a proxy-based system that serves as a gatekeeper to the applications behind it.

Security is too complicated for end users.  It doesn’t have to be.

If your security relies on username and password alone, whether this is for local applications, email or cloud-based applications, you are a prime target for hackers.

EASY TO USE, SECURE, INTELLIGENT ACCESS TO EVERY APPLICATION TYPE – ALL FROM ONE POINT OF ENTRY.

One Vendor, One Platform, The Technologies you need...

All working together, Intelligently.

Questions? Call Us!

We’re here to help. Give us a call and speak
with a security specialist who will answer
any questions you might have.

US +1 781 996 4900
UK +44 208 196 2420

Request a Demo

In 30 minutes, our system engineers will show you how PortSys Total Access Control can help you achieve compliance, protect your data, and increase efficiency, while enhancing the end user experience.

Free Security Assessment

Not sure whether your environment is protected? In 2 easy steps, we’ll help you find risk areas, audit access, and go through your access requirements.