Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:16 PM
Dark Reading
Dark Reading
Products and Releases

PortSys Total Access Control Suite Brings Real-Time Control And Complete Network Security To Mobile Devices

Secure Mobile Enterprise allows organizations to secure and control access by mobile devices

MARLBOROUGH, MA — September 10, 2012 — PortSys, leader in bringing secure access control to the enterprise, today announced Secure Mobile Enterprise™ as part of their Total Access Control™ (TAC) bundle, bringing access control and real-time security to mobile devices, and thereby revolutionizing the way mobile business is done. Ideal for small businesses as well as large ones, Secure Mobile Enterprise allows organizations to secure and control access by mobile devices, providing the ideal end-to-end solution for mobile connectivity.

“BYOD poses a significant challenge to IT organizations and adds complexity and costs to effectively controlling access to corporate networks and resources,” says Eric Klein, a Senior Analyst at VDC Research. “Solutions such as Total Access Control can help to simplify administering a BYOD environment while improving an organization's security posture.”

“In a recent survey by Unisys, end-users were found to be using their own personal devices to get access to corporate information at a rate twice that of what administrators of IT said they were,” said CEO of PortSys, Michael Oldham. “BYOD is happening and organizations are losing control of who and how people are accessing key business information in their environments. Secure Mobile Enterprise enables customers to expand access to many different device types in a secure manner. Mobile devices are bonded to a user’s account and must be approved in order to gain access.”

With PortSys' Secure Mobile Enterprise, you can:

· Bind employees' mobile devices to their user account

· Completely control mobile device access to Citrix resources

· Block devices from accessing corporate resources based on device type, operating system, hardware level, or patch level

· Identify and block devices from accessing your resources before sign-in attempts are made

· Remotely and centrally purge data in the event that a mobile device becomes lost or stolen

· Identify and block Jailbroken or Rooted mobile devices

· Offer compatibility with a large range of mobile devices so that your employees can select the devices they want while maintaining optimum productivity

BYOD for Secure Mobile Enterprise is compatible with Apple iOS, Android, and soon with Windows Mobile.

“Many companies today are focused on mobile device management which does not always solve the real problem. MDM can be costly and can be very intrusive, particularly for employee-owned devices” said Oldham. “We focus on access control, making access decisions real-time based on the specific device, user and resource being accessed. This allows companies to quickly and easily embrace BYOD (Bring Your Own Device) or other mobile initiatives without any invasive technologies.”

Total Access Control (TAC) is a series of connected products that secure and manage access to business resources from any device regardless of where the resource is located (local or cloud). TAC empowers organizations by allowing administrators to set the appropriate requirements for access to specific resources/applications themselves. To do this, TAC identifies the connecting device, its present location, user credentials including multi-factor authentication, and whether the device status meets the acceptable conditions set for access to that particular resource. This strategy does not rely on managing the device itself, but rather controls which devices get access to specific resources and under what conditions that access will be granted.

Secure Mobile Enterprise is just one component of PortSys Total Access Control, a complete control suite that allows employers to regulate network traffic via a number of channels, not just mobile devices. Total Access Control provides organizations with centralized access control for all network access.

PortSys Total Access Control is revolutionizing the way organizations do business by removing security and access barriers that have held back collaboration and productivity. Total Access Control and Secure Mobile Enterprise are available now. To learn more about implementing Total Access Control contact PortSys directly. Packages begin at $64 per year per individual user for Secure Mobile Enterprise and Total Access Control Gateway.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-19
Code42 app through version 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local machine could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an ele...
PUBLISHED: 2019-11-19
Code42 server through 7.0.2 for Windows has an Untrusted Search Path. In certain situations, a non-administrative attacker on the local server could create or modify a dynamic-link library (DLL). The Code42 service could then load it at runtime, and potentially execute arbitrary code at an elevated ...
PUBLISHED: 2019-11-18
A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
PUBLISHED: 2019-11-18
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
PUBLISHED: 2019-11-18
Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.