All resources sponsored by:

PortSys

1 - 25 of 41 Matches
Don’t Give Away Keys to Your Kingdom with ADFS
sponsored by PortSys
RESOURCE:For years, organizations have been using Active Directory Federated Services (ADFS) to manage access to cloud applications. However, sole reliance on ADFS for managing these accounts can introduce risks. In this article, discover how Total Access Control (TAC), Portsys’ zero-trust offering, can help protect ADFS accounts from cyberattacks.
Posted: 06 May 2020 | Published: 28 Apr 2020
Get This Now


Business Continuity – Are You Putting Your Company at Risk with RDP?
sponsored by PortSys
RESOURCE:RDP has been a favorite target of hackers for a long time, even before this pandemic. Many organizations may think that their default RDP security methods are good enough. But most RDP deployments don’t even incorporate fundamental security features such as 2FA. Learn how Total Access Control (TAC) can keep users more secure in this WFH world.
Posted: 20 Apr 2020 | Published: 20 Apr 2020
Get This Now


Business Continuity
sponsored by PortSys
RESOURCE:Many organizations prior to COVID-19 had business continuity plans in place. But were counting on VPNs and VDIs, which happen to be among the most frequently targeted attack vectors by hackers. In this blog post from PortSys, get an in-depth overview of today’s security challenges with VPNs.
Posted: 03 Apr 2020 | Published: 03 Apr 2020
Get This Now


PortSys Delivers Clientless Citrix Desktops with Total Access Control
sponsored by PortSys
RESOURCE:In this resource, learn about Total Access Control (TAC), and find out how its features like advanced SSO can help you further strengthen Citrix Workspace and desktop security with a Zero-Trust approach.
Posted: 12 Mar 2020 | Published: 09 Mar 2020
Get This Now


Coronavirus: How Ready Are You for Remote Access?
sponsored by PortSys
RESOURCE:Coronavirus is already demonstrating the power it can have to upset the interconnectedness of our business world. With the number of Coronavirus victims worldwide rapidly growing, many businesses will need to support employees who work from home. In this blog post, learn how your organization can take a secure approach to remote access.
Posted: 11 Mar 2020 | Published: 09 Mar 2020
Get This Now


Digital Transformation: Market Opportunity & Threats for MSPs
sponsored by PortSys
RESOURCE:In 2019, at least 13 managed service providers (MSPs) were compromised by ransomware. MSPs remain attractive targets for hackers, which will likely lead to a rise in breach attempts. So, can MSPs be trusted as secure partners? This blog post breaks down the market opportunity and potential security risk for MSPs.
Posted: 27 Feb 2020 | Published: 19 Feb 2020
Get This Now


Total Access in a Zero Trust Environment
sponsored by PortSys
RESEARCH CONTENT:With the rate at which technology is changing, traditional security models are growing ineffective at providing adequate protection. Organizations require a scalable approach that is effective for securing on-premise and remote users. In this article, take a closer look at the increasingly popular zero-trust model for total access control.
Posted: 29 Jan 2020 | Published: 23 Jan 2020
Get This Now


Zero Trust Access Helps UK County Improve Productivity and Access Control
sponsored by PortSys
CASE STUDY:The initiation of GDPR caused widespread change in the way organizations handled consumer data across the EU. In this case study, follow the Essex County Council, keepers of personal data for their residents, through their post-GDPR journey towards zero-trust access control to enable their employees to collaborate in a secure environment.
Posted: 24 Jan 2020 | Published: 24 Jan 2020
Get This Now


ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY:The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020
Get This Now


What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
RESOURCE:With massive breaches regularly making headlines, it’s clear that traditional security is ineffective at mitigating today’s evolving attacks. The zero-trust approach to access control enables organizations to mitigate risk in the cloud era, taking belief out of the equation and substituting it with assurance. Read on to learn more.
Posted: 03 Jan 2020 | Published: 03 Jan 2020
Get This Now


Zero Trust Access
sponsored by PortSys
WEBCAST:Cyberattacks are becoming increasingly damaging, and the strategies in place are ineffective at mitigating these breaches. Join the CEO of PortSys in this webinar as he discusses why today’s security tactics fall short and how the zero-trust approach can help to better defend data.
Posted: 03 Jan 2020 | Premiered: Jan 3, 2020
Get This Now


Total Access Control Provides Zero Trust Application Access for Financial Services Firm
sponsored by PortSys
CASE STUDY:In this case study, a PortSys customer explains how they needed to make an important decision when Microsoft announced it was ending support for its Unified Access Gateway (UAG). Read on to find out why the team went with Total Access Control (TAC) from PortSys for secure remote access.
Posted: 02 Jan 2020 | Published: 02 Jan 2020
Get This Now


Oklahoma Municipal Power Authority Energizes Team’s Secure Remote Access with TAC
sponsored by PortSys
CASE STUDY:The Oklahoma Municipal Power Authority (OMPA) provides electrical power and energy to Oklahoma’s municipally owned electric systems. But the energy sector’s infrastructure provides an alluring target for cybercriminals. In this case study, learn how OMPA turned to Total Access Control for secure remote access.
Posted: 02 Jan 2020 | Published: 02 Jan 2020
Get This Now


What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER:The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019
Get This Now


Simplify, Strengthen and Unify Your Security with Zero Trust Access
sponsored by PortSys
WHITE PAPER:Given the increasing threats and challenges to IT security, organizations should consider a zero-trust approach for protecting their infrastructure. In this data sheet, uncover the benefits and challenges of incorporating a zero-trust approach and gain insight into the features of Total Access Control’s zero-trust service.Read on to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019
Get This Now


Network Security – A Patchwork Quilt Bursting at the Seams
sponsored by PortSys
RESOURCE:In this article, learn about a more efficient way for an organization to manage their network security from top to bottom.
Posted: 18 Oct 2019 | Published: 18 Oct 2019
Get This Now


Think your Business is Too Small to be at Risk of a Security Breach? Think Again.
sponsored by PortSys
RESOURCE:Find out how SMBs on a budget can encrypt data and more effectively control access to it without having to decimate their IT budget to do so.
Posted: 16 Oct 2019 | Published: 16 Oct 2019
Get This Now


Pogo Paradox: Is Your Infrastructure Your Worst Enemy?
sponsored by PortSys
RESOURCE:In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.
Posted: 14 Oct 2019 | Published: 15 Sep 2019
Get This Now


AntiVirus for Mobile vs. Managed Secure Access for Mobile and BYOD
sponsored by PortSys
RESOURCE:Antivirus is a great technology for helping to protect devices. But how does antivirus protection differ from say, managed secure access when it comes to mobile devices? Download and discover the answers in fewer than four minutes with this revealing blog post.
Posted: 11 Oct 2019 | Published: 11 Oct 2019
Get This Now


All Access Is Not Created Equal
sponsored by PortSys
RESOURCE:“Context of Access” involves understanding not only the user, but the device they are using, the status of that device, the location of access, and more. Discover why – to securely allow for new business innovation – organizations must understand Context of Access and have the technology to support it.
Posted: 11 Oct 2019 | Published: 11 Oct 2019
Get This Now


IT Security is Broken Can Zero Trust Access Fix It?”
sponsored by PortSys
RESOURCE:Which well-known medical collection agency has filed for bankruptcy as a result of a security breach affecting 20 million consumers? Which popular hotel chain faced a $124 million fine for violating GDPR? Find out the top security challenges (and the painful costs) that are affecting so many companies today.
Posted: 11 Oct 2019 | Published: 11 Oct 2019
Get This Now


Sharpen your Focus on Spear Phishing Attacks in 2019
sponsored by PortSys
RESOURCE:How can you ensure you don’t end up being skewered by a spear phishing attack? Stronger identity management with multiple factors of authentication? Biometrics? How about Context of Access? Find out the facts in this revealing overview from security pundit Michael Oldham, CEO of PortSys.
Posted: 11 Oct 2019 | Published: 11 Oct 2019
Get This Now


The Superpower of “Yes! But…”
sponsored by PortSys
RESOURCE:There was a time not so long ago when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO! In this blog post, learn how and why security’s superpower of “NO!” turned into “Yes! But…”
Posted: 09 Oct 2019 | Published: 09 Oct 2019
Get This Now


Identity Is Not Security – Context Is King
sponsored by PortSys
RESOURCE:Identity is still important to security, but identity alone is NOT security. By binding user credentials with security policies based on the multiple factors within context of access, organizations today can significantly strengthen the protection of their enterprise resources, and ultimately, their bottom line. Read this article to learn more.
Posted: 08 Oct 2019 | Published: 08 Oct 2019
Get This Now


UK Leads the Way for Security of Mobile Workforce; US Needs to Step it Up
sponsored by PortSys
RESOURCE:US companies have dominated the media attention and have built considerable business helping to secure mobile devices.  But, the international competition is growing quite substantially. Learn about the state of mobile security in the UK vs. the US in this PortSys blog post from Michael Oldham.
Posted: 04 Oct 2019 | Published: 04 Oct 2019
Get This Now


1 - 25 of 41 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info