Administration & Performance

Total Access Control (TAC) Is Different. Zero Trust Security Tools Still Must Be High Performance And Simple To Administer.

Total Access Control Puts A Premium On Both.

Administration
& Performance

TAC meets the high-performance standards today's hybrid infrastructure demands and for the first time allows your admins to centrally manage all access in a single place.

TAC consolidates, in a single solution, the dozens of security technologies you typically find across your infrastructure from a dizzying array of security vendors – solutions which each require support and attention from your IT team that distracts them from focusing on your mission to grow the business.

By building all these technologies into one unified framework, you achieve a much more comprehensive, integrated and fortified architecture with Total Access Control. TAC doesn't just transform your security – it transforms the way you do business in the digital world, giving you a seat at the table as a business strategist who helps drive growth through more secure access.

TAC CONSOLIDATES MULTIPLE TECHNOLOGIES THAT ARE TYPICALLY FOUND IN INDIVIDUAL PRODUCTS DEVELOPED AND SUPPORTED BY DIFFERENT VENDORS.

TAC consolidates multiple technologies that are typically found in individual products developed and supported by different vendors.

COMPREHENSIVE REPORTING

Reporting plays a huge role not only in your security, but in your business as well. Good reporting capabilities enable you to continually strengthen your security posture by identifying trends as well as holes in your infrastructure that hackers can take advantage of to launch attacks.

Total Access Control comes with audit and reporting capabilities that keep track of all access coming through its proprietary reverse proxy gateway. TAC enables you to go back to any point in time to see who had access to what, under which circumstances. You can drill down into a single session to follow all the steps the user took, what they had the ability to access, what they did access, and for how long. 

TAC doesn’t stop there. IT allows you to keep track of the granular information for each user session, including:

  • The credentials used to log in
  • The location the access request came from
  • The device being used
  • The status of the device – including OS, patch level, A/V status and more
  • What applications the user was granted access to
  • What applications the user did access
  • Which applications the user is currently accessing

This is just a sample of the rich level of information you can track and report on through TAC. All this information is recorded for every access attempt, whether it’s successful or not – giving you an invaluable level of detail that you can leverage when security concerns are raised.

// COMPREHENSIVE REPORTING //

Reporting is perhaps an under-appreciated aspect of security. Good reporting capabilities enable you to continually strengthen your security posture, by identifying trends as well as individual events that highlight areas needing attention. PortSys Total Access Control comes with audit and reporting capabilities that keep track of everything that happens in the gateway. Go back to any point in time and see who had access to what, and under what circumstance. Look at a single session and follow all the steps the user took, what they had the ability to access, what they did access, and for how long. 

Not only that, but TAC also keeps track of very granular information for each session such as the user credentials, location they access from, device they used, the status of that device (O/S, patch level, A/V status and much more), what applications they had access to, what applications they did access and which ones they are currently accessing.  This is just part of what is tracked and can be reported on and all of this information is kept for every access attempt, whether it’s successful or not, giving you very rich detail to use for investigating and reporting on issues should they arise.

TAC OFFERS COMPREHENSIVE REPORTING AND AUDITING, INCLUDING DETAILED GRANULAR REPORTING
ON ALL ACCESS TO ALL OF YOUR RESOURCES – BOTH LOCAL AND CLOUD

REPORT ON GRANULAR INFORMATION WITH TOTAL ACCESS CONTROL, INCLUDING:

All access to
all resources,
local and cloud

Drill down to
any session,
any activity

Simplify data analysis
with graphical reports

Portal and application
performance in real time

Authenticated,
anonymous and
unauthorized sessions

Portal response
times

Peak usage – by time,
geography and
application

Application use to better
analyze true utilization

Gateway status – including
license usage, certificate
status, current performance

TOTAL ACCESS CONTROL ENABLES YOU TO REPORT ON INFORMATION INCLUDING:

Generate easily understood c-level and board reports

Nervous about reporting to the C-suite or your board? With TAC, you’ll be able to provide easy-to -understand reports with graphics detailing security policy violations, types of attacks that have occurred, anomalies and network traffic. TAC enables you to download .cvs reports, schedule regular reports for emailing and more on a regular basis as well.

Even more important, TAC’s reporting capabilities will enable you to adopt policies that tighten security for gaps you uncover across your defense posture. For instance, when your reports detail unauthenticated access attempts from a country where you never do business, you can use the GEO-IP intelligence capability in TAC to block access from that country entirely. 

Graphics capabilities enable you to simplify reports, making them suitable
for C-level consumption

You’ll be able to easily show statistics on security policy violations, types of attacks that have occurred, anomalies and network traffic. Download the reports to a .csv format, schedule regular reports for emailing and more. Most importantly, when used in conjunction with other TAC features, reports can help you adapt policies to tighten security. If you see you’re getting lots of unauthenticated access attempts from a country where you never do business, for example, you can use the GEO-IP intelligence capability to block access from that country entirely. 

// CENTRALIZED MANAGEMENT //

FOR THE FIRST TIME, YOU CAN MANAGE ALL ACCESS TO YOUR LOCAL
AND CLOUD-BASED APPLICATIONS FROM A SINGLE PANE OF GLASS.

WHAT’S MORE – TAC'S CENTRALIZED MANAGEMENT TOOLS ARE EASY TO USE

FOR IT TEAMS THAT ARE FRUSTRATED HAVING TO DEAL WITH POINT SECURITY SOLUTIONS WHICH
DON’T TALK EFFECTIVELY TO ONE ANOTHER, CENTRALIZED MANAGEMENT IS A WELCOME CHANGE

Manage hundreds
of thousands
of users & devices

Manage bindings of
user accounts and
ActiveSync ID to devices

Create custom filters to view
information in the ways
that make sense to you

Manage Active Directory, LDAP,
and RADIUS authentication
from one central location

Apply configuration changes
without disconnecting users

Create robust security policies
for access to each
individual resource

Use device enforcement to
approve or deny access for
new user/device bindings

Wipe corporate information
from devices without
impacting personal data

FOR IT GROUPS THAT ARE USED TO DEALING WITH POINT SECURITY SOLUTIONS THAT DON’T TALK EFFECTIVELY TO ONE ANOTHER, CENTRALIZED MANAGEMENT IS A WELCOME CHANGE

// HIGH AVAILABILITY //

WHETHER YOU USE MULTIPLE DEVICES IN AN ARRAY OR
RELY ON MULTIPLE DATA CENTERS AROUND THE WORLD,
TAC DEPLOYS TO MEET YOUR BUSINESS AND REDUNDANCY NEEDS

A Zero Trust Access Control solution like TAC must be able to meet the unique needs of your organization for redundancy and continuous operation. If your users can’t get access to the system, they can’t do their jobs.

Whether you have employees working from home daily or due to a weather emergency, or you have contractors who need to access your systems every day, availability is crucial.  But as we know, hardware can fail, networks become unavailable, and weather can wreak havoc with access to your systems.

TAC provides full redundancy capabilities. Whether you’re a small company with 100 users or a multi-national corporation with multiple data centers around the world, TAC will scale quickly to meet your needs.

 

Total Access Control offers high availability and traffic management capabilities to ensure dependable, predictable performance at scale. 

Multiple gateways work together in active/active mode or active/passive mode, whichever works best for your unique needs.

TAC also automatically synchronizes configurations between different array members to ensure that all nodes are up to date and able to process traffic securely and effectively. 

And TAC synchronizes reporting information so you are able to report on everything, from one central location.

A zero trust access solution like Total Access Control must be able to meet the needs of the organization for redundancy and continuous operation.  If your users can’t get access to the system, they can’t do their jobs.  Whether you have employees working from home daily or due to a weather emergency or contractors who access your systems every day, availability is crucial.  But, as we know, hardware can fail, networks become unavailable, and weather can wreak havoc with access to your systems.

TAC provides full redundancy capabilities. Whether you’re a small company with 100 users or a multi-national corporation with multiple data centers around the world, TAC can scale and meet your needs.

Total Access Control components provide high availability and traffic management capabilities to ensure dependable, predictable performance at scale. Multiple gateways work together in active/active mode or active/passive mode, whichever works best for you.

TAC automatically syncs configurations between different array members to ensure that all nodes are up to date and able to process traffic securely and effectively.   TAC also syncs reporting information so that you are able to report on everything from one location.

Geographies icon

If you have multiple data centers or various disaster recovery data center configurations around the world, TAC’s GeoAvail™ provides seamless access to them all – with full high availability even if they are in disparate networks.

Larger organizations icon

TAC deploys across multiple data centers in disparate geographies that work together to provide seamless access to your employees, contractors, partners or customers wherever they happen to be.

GeoAvail icon

Total Access Control and GeoAvail include Active Intelligence, a distributed software solution to monitor your data centers. When a failure is detected, traffic is automatically redirected to another data center with a working TAC Gateway.

TOTAL ACCESS CONTROL AND GEOAVAIL WITH ACTIVE INTELLIGENCE GIVE YOU:

High availability and
scalability for multiple
TAC deployments

Active monitoring
and redundancy for
entire data centers

Effective distribution of client traffic among all gateway data centers or network segments, based on client origin or data center load levels

IN SHORT, TAC AND GEOAVAIL WITH ACTIVE INTELLIGENCE PROVIDES:

// OPTIMAL PERFORMANCE //

PERFORMANCE IS CRITICAL TO YOUR BUSINESS.
YOUR END USERS JUST WANT TO DO THEIR JOBS.
NOT STUCK FOREVER WAITING FOR SYSTEMS TO RESPOND.

HERE'S HOW TAC’S ZERO TRUST ACCESS CONTROL ENSURES OPTIMAL PERFORMANCE

Proprietary HTTP engine tuned for security
and performance – specifically for access to
your applications and resources

Combines dozens or even hundreds
of separate, sequential HTTP/HTTPS
requests into far fewer requests –
all while seamlessly rendering a rich,
complete end user experience

Compresses all network traffic using browser-compliant encoding, so decompression doesn’t require a separate client on the user end

TAC’S ZERO TRUST ACCESS ENSURES OPTIMAL PERFORMANCE IN A NUMBER OF WAYS, NAMELY:

Add Your Heading Text Here

Improves Lagre icon

Improves
Application Performance

Reduces Lage icon

Reduces
Network Load​

Response Lage icon

Accelerates
Response Times

TAC'S MULTI-PRONGED APPROACH DELIVERS THESE BENEFITS FOR BOTH END USERS AND ADMINS:

Pushes application
performance beyond
any design limitations

Enables more users
to use same resources
in less time

Boosts network efficiency
by reducing bandwidth usage
and balancing server workload

Achieves significantly faster response
times and reduces bandwidth
utilization for end users – especially
on lower bandwidth devices such
as mobile phones and tablets

THIS MULTI-PRONGED APPROACH DELIVERS BENEFITS FOR END USERS AND IT ALIKE, INCLUDING:

You may be interested in these materials

Access Methods

Simplified User Experience

Identity & Access Management

Application Security

Introduction

You may be interested in these materials

Zero Trust Access
Benefits
Simplified User
Experience
Application
Security
Identity &
Access Management
Access
Methods