Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MARLBOROUGH, MA -- (Marketwire) -- 09/10/12 -- PortSys, leader in bringing secure access control to the enterprise, today announced Secure Mobile Enterprise as part of their Total Access Control (TAC) bundle, bringing access control and real-time security to mobile devices, and thereby revolutionizing the way mobile business is done. Ideal for small businesses as well as large ones, Secure Mobile Enterprise allows organizations to secure and control access by mobile devices, providing the ideal end-to-end solution for mobile connectivity.
"BYOD poses a significant challenge to IT organizations and adds complexity and costs to effectively controlling access to corporate networks and resources," says Eric Klein, a Senior Analyst at VDC Research. "Solutions such as Total Access Control can help to simplify administering a BYOD environment while improving an organization's security posture."
With PortSys' Secure Mobile Enterprise, you can:
BYOD for Secure Mobile Enterprise is compatible with Apple iOS, Android, and soon with Windows Mobile.
"Many companies today are focused on mobile device management which does not always solve the real problem. MDM can be costly and can be very intrusive, particularly for employee-owned devices," said CEO of PortSys, Michael Oldham. "We focus on access control, making access decisions real-time based on the specific device, user and resource being accessed. This allows companies to quickly and easily embrace BYOD (Bring Your Own Device) or other mobile initiatives without any invasive technologies."
Total Access Control (TAC) is a series of connected products that secure and manage access to business resources from any device regardless of where the resource is located (local or cloud). TAC empowers organizations by allowing administrators to set the appropriate requirements for access to specific resources/applications themselves. To do this, TAC identifies the connecting device, its present location, user credentials including multi-factor authentication, and whether the device status meets the acceptable conditions set for access to that particular resource. This strategy does not rely on managing the device itself, but rather controls which devices get access to specific resources and under what conditions that access will be granted.
"In a recent survey by Unisys, end-users were found to be using their own personal devices to get access to corporate information at a rate twice that of what administrators of IT said they were," said Oldham. "BYOD is happening and organizations are losing control of who and how people are accessing key business information in their environments. Secure Mobile Enterprise enables customers to expand access to many different device types in a secure manner. Mobile devices are bonded to a user's account and must be approved in order to gain access."
Secure Mobile Enterprise is just one component of PortSys Total Access Control, a complete control suite that allows employers to regulate network traffic via a number of channels, not just mobile devices. Total Access Control provides organizations with centralized access control for all network access.
PortSys Total Access Control is revolutionizing the way organizations do business by removing security and access barriers that have held back collaboration and productivity. Total Access Control and Secure Mobile Enterprise are available now. To learn more about implementing Total Access Control contact PortSys directly. Packages begin at $64 per year per individual user for Secure Mobile Enterprise and Total Access Control Gateway.
Add to Digg Bookmark with del.icio.us Add to Newsvine
Contact:
Kristin Canders
PR for PortSys
207-974-7744
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs