Michael Oldham, CEO, PortSysMichael Oldham, CEO
In today’s “perimeter-less world,” enterprise resources are found and accessed from everywhere. This makes it challenging for businesses to secure critical information within legacy security perimeters built with inefficient, siloed solutions from multiple vendors. They lack adherence to the latest security policies, leaving organizations with a patched security infrastructure with open ports and loosely managed firewall rules. The widely used castle-and-moat approach to security also lacks proper security measures to prevent hackers from malicious activities once they have gained access to the infrastructure by hacking or using forged credentials.

As a global innovator in the information security and Zero Trust space since 2008, PortSys was quick to identify this unmet need in the market. Its comprehensive and integrated secure reverse proxy solution, Total Access Control (TAC), significantly strengthens, simplifies, and unifies information security.

Michael Oldham, CEO of PortSys, states, “Our Zero Trust solution controls access to all resources. Whether it is a data center, cloud, legacy, or server application, or a virtual desktop infrastructure, TAC’s single-point authentication and validation enables users to securely access any resources.”

TAC enables clients to choose from different frameworks, such as password-less and multifactor authentication and builds a strong door upfront. It tracks access seekers’ device location, type, and security status and tallies them against a client-specific policy engine containing pre-defined parameters for accessing the different resources. After a successful match-up with these parameters, authenticated users are provided with access to the resources specifically available to them – and only those resources they have been authenticated for. This segmentation of resources helps clients significantly improve their security posture. TAC also provides an easy-to-use, one-stop login portal with single sign-on for resource selection and utilization.

While implementing TAC, there is no need to recode existing applications or rewrite their networks, making it easy to deploy. The solution is architected to migrate resource-by-resource within TAC’s interface, providing clients a flexible pace of change for rolling out the solution. Once clients implement TAC, they benefit from full SSL encryption and can close most ports, which dramatically shrinks their attack surface.

PortSys’ unique approach to access control has proven fruitful for many customers. In one instance, a large pharmaceutical consulting organization used TAC to seamlessly migrate to Microsoft365 and deploy access control for their critical resources. As a result, the client was able to maintain their customers’ privacy and remain HIPAA-compliant. It saved more than $3 million using PortSys’ resource-by-resource migration approach. Today the organization has more than 2,000 applications secured through TAC. Numerous law enforcement, defense, healthcare, energy, financial services, and construction enterprise organizations whose critical infrastructure requires access control for employees, outside agencies, third-party vendors and customers have also benefited from TAC.

Our Zero Trust solution controls access to all resources. Whether it is a data center, cloud, legacy, or server application, or a virtual desktop infrastructure, TAC’s single-point authentication and validation enables users to securely access any resources

PortSys’ competitive edge lies in TAC’s ability to easily integrate with clients’ existing infrastructure, rather than replacing it or adding more complexity into the mix. TAC provides centralized reporting, helping clients monitor every detail of access-seekers across the entire enterprise and making them more secure.

TAC not only strengthens clients’ security infrastructure but it helps them embrace digital transformation. “We help clients with the challenges associated with integrating new technological resources with legacy resources and eliminate concerns about security threats they may face in the future. With TAC they can be far more nimble and focus instead on growing the business,” states Oldham.