- Why TAC
- Deeper Dives
- Blog
- About Us
- Support
US: +1 781 996 4900
UK:Â +44 208 196 2420
Press  Option 4
US: +1 781 996 4900
UK:Â +44 208 196 2420
Press  Option 4
By Tim Boivin
Digital transformation offers a great opportunity for managed service providers (MSPs). Consider:
But are MSPs safe and secure partners? Perhaps not as much as they should be. And that’s why MSPs are increasingly considering a Zero Trust approach for their IT security needs going forward.
In 2019, at least 13 managed service providers (MSPs) were compromised by ransomware. An attack on an MSP in November impacted more than 100 dental practices, while one of the largest MSPs in Spain was also hit by ransomware earlier that month.
MSPs (including managed security service providers, or MSSPs) are attractive financial targets for hackers. The irresistible lure is that MSPs will exponentially extend the pain ransomware attacks inflict to their customers. These customers, including businesses, government agencies and non-profits/NGOs, increasingly rely on MSPs to manage secure access to resources as they look to rapidly expand their digital transformation efforts.
Complexity & Cost
What led to MSPs becoming such a prime target for hackers?
MSPs’ traditional approach to security has been to rely on a vast variety of costly, complex solutions to manage their customers’ widely divergent access needs. Sure, MSPs try to reduce this complexity and cost by purchasing and installing software that creates a templated experience. But those solutions still must be uniquely configured to connect to each individual customer’s infrastructure, while also requiring a ton of micromanagement every time a new customer or app is added.
There are critical – and easily exploited – flaws in this traditional, convoluted approach. Since MSPs are managing firewalls across virtually all security scenarios for those platforms, they must open and close ports, create port forwarding rules, and manage access control lists for each customer. One slip, one gap in any of the MSP’s security responsibilities, and the hackers are in – not just inside the MSP’s infrastructure, but also from there gaining the ability to move laterally to also target attacks directly against MSP customers as well.
Even worse, most MSPs today don’t have the means to even track user access across all their customers’ resources. That has serious consequences at a time when hackers are so successful at hijacking legitimate user credentials through phishing attacks. Compromised credentials are one of the predominant ways that hackers are getting in today, enabling them to access MSP customer resources. Once the hackers get in, they can go anywhere and cause even more damage, and they are practically impossible to track in a timely fashion.
All of these issues can be addressed by the Zero Trust approach of Total Access Control (TAC) from PortSys.
Zero Trust benefits for MSPs
What are the benefits of a Zero Trust approach? Simply put, MSPs using TAC can offer the best quality security for their customers. TAC allows MSPs to reduce their complexity, strengthen security, and make access easier for end users. Its consolidated, unified Zero Trust technology is more cost-effective than having to manage multiple disparate solutions. And TAC’s ability to segment resources limits customer exposure to ransomware attacks and other malicious activities.
Let’s do a deeper dive into these benefits:
Audit Everything
Because TAC controls access to all the resources, MSPs can now understand who is getting access to what across the entire organization. This is invaluable information for an MSP, which can share these reports with their customers at any time at the simple push of a button.
With TAC, customers can also make MSP security policies much more granular based on different factors. For instance, MSP customers can specify that end users only are granted access when using managed corporate devices. Or they may set up a different set of rules regarding anti-virus or certificates when users are connecting to the TAC gateway.
All of this would be enforced through TAC when an access request is made – while not asking the user to do anything more than simply signing in through the TAC portal.
If a user loses a device, TAC also simplifies the process for blocking access. TAC can immediately block access to all apps and resources for any user or selected device. Devices can also be selectively wiped – and unwiped, if the user ultimately finds the lost device.
Each instance of TAC now allows MSPs for the first time to view all end user access through a single, centralized view. MSPs can see all the users requesting and gaining access and manage them through TAC’s secure interface.
This visibility offers a great growth opportunity for MSPs to securely manage access for customers in both their local environment, such as the data center for headquarters, and for cloud service providers such as Office 365 – all in one place.
Finally, MSPs can also audit everything surrounding access with TAC, and gain control over functions including Single Sign-On (SSO), security policies, application delivery, secure tunneling, authentication, and corporate and personal devices – all in one place, for each of their customers.
Scale Digital Transformation’s Heights with TAC
MSPs who have TAC in place can help their customers scale up quickly to meet the growth generated through digital transformation and gain a competitive edge in the marketplace. MSPs can build large arrays of TAC servers to meet their customer needs, and it’s elastic as well – they can scale virtual machines (VMs) up or down to meet demand and accelerate speed to access for unlimited numbers of users.
As customers look to digital transformation to improve business processes, explore innovations and drive growth, MSPs have a great opportunity to play critical roles as their trusted partners. With TAC, MSPs are well suited to take on those roles and gain market share.
Tim Boivin is the Director of Marketing for PortSys. He can be reached at +1 781-996-4899 or tim.boivin@portsys.com.Â
We’re spreading some Christmas cheer across our entire range. Get up to 50% off selected items - sale ends Friday.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |