An Overview of Total Access Control (TAC) from PortSys

An Overview of Total Access Control (TAC) from PortSys

This is the final of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. This chapter examines how PortSys Total Access Control (TAC) works, along with guidance for enterprise teams on how the reverse proxy and remote access features of TAC can be used to drive Zero Trust and other desirable security attributes for their enterprise.

Using Reverse Proxies to Secure Endpoints in a Zero Trust Environment

Using Reverse Proxies to Secure Endpoints in a Zero Trust Environment

This is the fourth of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. This chapter explores how reverse proxy solutions are useful to secure endpoints in emerging Zero Trust environments.

Best Practices for Application Security in a Zero Trust Environment

Best Practices for Application Security in a Zero Trust Environment

This is the third of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. This chapter discusses the best practices and procedures for securing user access to important business applications hosted locally on premises or across multi-cloud infrastructures.

Just One Crack

Just One Crack

Just one crack. That’s all a hacker needs to find to cripple your organization. 

That may sound a bit dramatic, but all you need to do is look at the headlines to see that it’s happening. It doesn’t matter how much money you’re spending or what name-brand security company you’re using; if you are like most other organizations out there, you’re potential

Supply Chain Security: Why You Don’t Have Enough Fingers to Plug the Dike

Supply Chain Security: Why You Don’t Have Enough Fingers to Plug the Dike

The latest news that the notorious Nobelium hacker group flooded at least 140 resellers and technology providers worldwide with software supply chain attacks is no surprise. It is just the next generation of these rapidly rising waves of attacks that have been progressing in their sophistication for more than a decade now:

Cost Optimization:  Security – The Strategic Business Asset for Digital Transformation

Cost Optimization:
Security – The Strategic Business Asset for Digital Transformation

Digital transformation reached an inflection point over the past year. To meet the demands of the “New Normal” brought on by the Covid-19 pandemic, enterprise organizations had to turbocharge adoption of new processes and product development far ahead of even the most ambitiously planned timelines for digital transformation.

Cost OptimizationPatching: Minimize Your Risk, Maximize Your Investment

Cost Optimization
Patching: Minimize Your Risk, Maximize Your Investment

Most organizations don’t have the time or resources to keep up with the security patches for all the products they have within their infrastructure. All it takes is one missed patch on a single product for hackers to exploit that vulnerability and gain carte blanch to your entire infrastructure.