PortSys Blog

An Overview of Total Access Control (TAC) from PortSys

An Overview of Total Access Control (TAC) from PortSys

This is the final of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm,…

Using Reverse Proxies to Secure Endpoints in a Zero Trust Environment

Using Reverse Proxies to Secure Endpoints in a Zero Trust Environment

This is the fourth of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm,…

Best Practices for Application Security in a Zero Trust Environment

Best Practices for Application Security in a Zero Trust Environment

This is the third of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm,…

The Role of Identity and Access Management (IAM) in a Zero Trust World

The Role of Identity and Access Management (IAM) in a Zero Trust World

This is the second of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm,…

Achieving Zero Trust Is a Journey, not a Destination

Achieving Zero Trust Is a Journey, not a Destination

This is the first of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm,…

Just One Crack

Just One Crack

Just one crack. That’s all a hacker needs to find to cripple your organization.  That may sound a bit dramatic, but all…

CISA Shields Up Alert on Russia:<br data-lazy-src=

CISA Shields Up Alert on Russia:
What You Need to Know

Following Russia’s invasion of Ukraine, the U.S. Government’s Cybersecurity and Infrastructure Security Agency (CISA) issued a Shields Up Alert warning of the…

Leonardo DaVinci was right – about IT security

Leonardo DaVinci was right – about IT security

Long before your IT infrastructure evolved into the complex, overly complicated, perimeterless world of today, the most famous polymath of them all,…

Security: 5 Key Questions Board Members Should Ask

Security: 5 Key Questions Board Members Should Ask

The increasing frequency, sophistication and cost of cyberattacks continue to handcuff enterprise operations around the world – for businesses in every vertical…

Apache Log4j: Same Wolf, Different Vulnerability

Apache Log4j: Same Wolf, Different Vulnerability

Yesterday, CISA launched a webpage  and community-sourced repository of information and advisories regarding the Apache Log4j vulnerability that was discovered late last…

Don’t make hackers at home for the holidays

Don’t make hackers at home for the holidays

While you’re home for the holidays this year, you may have some unwelcome guests…on your organization’s infrastructure.

Supply Chain Security: Why You Don’t Have Enough Fingers to Plug the Dike

Supply Chain Security: Why You Don’t Have Enough Fingers to Plug the Dike

The latest news that the notorious Nobelium hacker group flooded at least 140 resellers and technology providers worldwide with software supply chain…

Cost Optimization:  <br data-lazy-src=

Cost Optimization:
Security – The Strategic Business Asset for Digital Transformation

Digital transformation reached an inflection point over the past year. To meet the demands of the “New Normal” brought on by the…

Cost Optimization<br data-lazy-src=

Cost Optimization
Patching: Minimize Your Risk, Maximize Your Investment

Most organizations don’t have the time or resources to keep up with the security patches for all the products they have within…

Cost Optimization:<br data-lazy-src=

Cost Optimization:
Making the Most of Mobility in a WFH World

Most enterprise security teams in the past managed mobile access to their hybrid network resources for around 20% to 30% of their…

Cost Optimization with Zero Trust Access:<br data-lazy-src=

Cost Optimization with Zero Trust Access:
So Your Bandwidth Can Play On

In the first blog post of our series looking at cost optimization, we examined what is driving the dynamic shift in IT…

Cost Optimization with Zero Trust Access:<br data-lazy-src=

Cost Optimization with Zero Trust Access:
IT Security Can’t Afford the Budget Blues

Talk about your budget blues: due to the pandemic, Gartner recently cut its Global IT Spending Outlook for 2020. Instead of the…

Zero Trust Access: <br data-lazy-src=

Zero Trust Access:
Security Designed for the Next Normal

2020 was the year of the “New Normal.” But what happens after the New Normal is over? What happens in the “Next…

Make Your Own IT Security News <br data-lazy-src=

Make Your Own IT Security News
with Zero Trust Access

The world changes, the world evolves, and the risks change as well…the risks that we keep our eyes on the most now…

Access Control Plays Key Role <br data-lazy-src=

Access Control Plays Key Role
in NSA’s New Zero Trust Guidelines

With the pervasive need for Zero Trust concepts to be applied throughout the environment, scalability of the capabilities is essential. Access control…

Hafnium Exchange Zero Day Attack: What You Need to Know & Do

Hafnium Exchange Zero Day Attack: What You Need to Know & Do

The breadth and depth of the multiple Zero Day vulnerabilities being used to attack Microsoft Exchange Servers around the world continues to…

Shifting to a More Secure SharePoint Experience

Shifting to a More Secure SharePoint Experience

More than 200,000 organizations and 190 million people use SharePoint to collaborate today, according to Microsoft, with 81% of that collaboration happening…

Secure Legacy Apps? Not Such a Remote Possibility

Secure Legacy Apps? Not Such a Remote Possibility

While digital transformation garners all the headlines, modernizing IT systems for the world of today’s hybrid enterprise is not for the faint…

Solving IoT’s Access Control Conundrum

Solving IoT’s Access Control Conundrum

By 2024, the number of Internet of Things (IoT) connections will grow by 130%, to 83 billion. Much of this growth will…

The Roadmap to IT’s New Normal

The Roadmap to IT’s New Normal

By Michael Oldham Work from home (WFH) Telecommuting Remote access Digital transformation Whatever buzzword you prefer, the Covid-19 pandemic is radically altering…

Don’t Give Away Keys to Your Kingdom with ADFS

Don’t Give Away Keys to Your Kingdom with ADFS

For more than 15 years, organizations have been using Active Directory to manage end user access to network resources. As remote access…

Business Continuity – Are You Putting Your Company at Risk with RDP?

Business Continuity – Are You Putting Your Company at Risk with RDP?

RDP is very popular in the enterprise because it allows users to get access to their own desktops and virtual desktops remotely.…

Business Continuity: <br data-lazy-src=

Business Continuity:
Are you flying blind on VPNs?

Prior to the Coronavirus Pandemic, 44% of companies around the globe didn’t allow remote work. Globally, just 2.8% of the workforce worked…

Coronavirus: How Ready Are You for Remote Access?

Coronavirus: How Ready Are You for Remote Access?

By Michael Oldham Fourteen companies – including tech giants IBM, AT&T and Verizon – pulled out of the RSA Conference in San…

Digital Transformation: Market Opportunity & Threats for MSPs

Digital Transformation: Market Opportunity & Threats for MSPs

By Tim Boivin Digital transformation offers a great opportunity for managed service providers (MSPs). Consider: 70% of companies already either have a…

As IoT drives digital transformation, TAC secures SSH services for CLIs

As IoT drives digital transformation, TAC secures SSH services for CLIs

PortSys announced this week that its Total Access Control (TAC) zero trust solution is the first technology to secure Command Line Interface…

Pogo Paradox: Is Your Infrastructure Your Worst Enemy?

Pogo Paradox: Is Your Infrastructure Your Worst Enemy?

Security for most organizations today starts with a hard perimeter on the outside, while inside the firewall security is soft and mushy.…

Take a Better TAC to Protect RDP

Take a Better TAC to Protect RDP

Total Access Control from PortSys provides a much more comprehensive approach to protect RDP built on the principles of Zero Trust Access.

Making the Business Case for Zero Trust Access

Making the Business Case for Zero Trust Access

Zero trust access enables digital transformation, more securely protects your infrastructure, and helps grow your business.

Can Zero Trust Fix What’s Wrong with IT Security?

Can Zero Trust Fix What’s Wrong with IT Security?

Zero Trust is receiving the lion’s share of attention this year as a strategic way to architect access to your critical business…

It may be time to rethink RDP

It may be time to rethink RDP

RDP, Microsoft’s widely used remote access tool, continues to be a prime target of malicious cyber criminals. Some of the threats garnering…

The Madness of IT Security Sprawl

The Madness of IT Security Sprawl

Nearly half of CSOs say their first action to address cyber risks is to add new technologies. – CSO Magazine’s 2018 Security…

Sharpen Your Focus on Spear Phishing Attacks in 2019

Sharpen Your Focus on Spear Phishing Attacks in 2019

According to the Securities and Exchange Commission (SEC), the average cost of cyber breaches it studied increased an astounding 50 percent in…

The Superpower of “Yes! But…”

The Superpower of “Yes! But…”

What is your security superpower today? It seems quaint now, but there was a time not so long ago – before the…

Identity Is Not Security – Context Is King

Identity Is Not Security – Context Is King

According to the 2017 Verizon Data Breach Investigation Report, 7.3% of users fell for phishing attacks. Even more astounding, 15% of those…

When MDM is not enough: Context is key

When MDM is not enough: Context is key

Don’t get me wrong, MDM (mobile device management) is an important way to get control over some of the important aspects of…

UK leads the way for security of mobile workforce; US needs to step it up

UK leads the way for security of mobile workforce; US needs to step it up

I’ve traveled around many parts of the world and it’s been quite surprising to me that the US seems to be behind…

All access is not created equal

All access is not created equal

One of the most important challenges needing to be addressed as a result of the rapid evolution of mobility has been missed…

AntiVirus for Mobile vs. Managed Secure Access for Mobile and BYOD

AntiVirus for Mobile vs. Managed Secure Access for Mobile and BYOD

When recently discussing this with some colleagues I realized that there are still a number of people who aren’t certain about the…

Think your business is too small to be at risk of a security breach? Think again.

Think your business is too small to be at risk of a security breach? Think again.

Smaller businesses have generally operated with very limited investment in information security. Perhaps lulled into a sense of “security through anonymity,” some…

Network Security – A Patchwork Quilt Bursting at the Seams

Network Security – A Patchwork Quilt Bursting at the Seams

The majority of organizations today have a highly complex segmented security infrastructure that is difficult to manage and prone to gaps. Different…

SecuritySolutionsWatch.com – In The Boardroom With Mr. Michael Oldham Chief Executive Officer

SecuritySolutionsWatch.com – In The Boardroom With Mr. Michael Oldham Chief Executive Officer

SecuritySolutionsWatch.com: Thank you for joining us today, Michael. Before discussing PortSys Products & Solutions in greater detail, please tell us about your background and may…