An Overview of Total Access Control (TAC) from PortSys

This is the final of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. This chapter examines how PortSys Total Access Control (TAC) works, along with guidance for enterprise teams on how the reverse proxy and remote access features of TAC can be used to drive Zero Trust and other desirable security attributes for their enterprise.

Read More

Using Reverse Proxies to Secure Endpoints in a Zero Trust Environment

This is the fourth of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. This chapter explores how reverse proxy solutions are useful to secure endpoints in emerging Zero Trust environments.

Read More

Best Practices for Application Security in a Zero Trust Environment

This is the third of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises. This chapter discusses the best practices and procedures for securing user access to important business applications hosted locally on premises or across multi-cloud infrastructures.

Read More

Achieving Zero Trust Is a Journey, not a Destination

This is the first of a series of five blog posts by analysts from TAG Cyber, a trusted cybersecurity research analyst firm, providing unbiased industry insights and recommendations to security solution providers and Fortune 100 enterprises.

Read More

Just One Crack

Just one crack. That’s all a hacker needs to find to cripple your organization. 

That may sound a bit dramatic, but all you need to do is look at the headlines to see that it’s happening. It doesn’t matter how much money you’re spending or what name-brand security company you’re using; if you are like most other organizations out there, you’re potential

Read More