TSPlus Advance Security
BENEFITS - Why TSplus Advanced Security?
Secure your Remote Work infrastructure
Secure your IT infrastructure as you transition to remote working. As hackers are more present than ever, ensure maximum security with our all-in-one cybersecurity toolbox.
Fine-tune security to your needs
Maximize security. Minimize cost.
Key Features
Hacker IP Protection
Block Malicious IP Addresses
Secure your IT infrastructure as you transition to remote working. As hackers are more present than ever, ensure maximum security with our all-in-one cybersecurity toolbox.
Homeland Protection
Country Restriction
Block unwanted countries and allow access from specific countries. Easily whitelist or block IP addresses from allowed countries.
Internet and IP Access Restriction
Restrict access from the Internet. If your remote access environment is meant to be private, define your internet access restriction to “only private and whitelisted IP addresses”.
Brute Force Defender
Public Server Protection
Brute Force Defender enables you to protect your public server from hackers, network scanners and brute-force robots that try to guess your Administrator login and password. Monitor Windows failed login attempts and automatically block the offending IP addresses after a pre-determined number of failures. Easily configure the maximum logon attempts by IP address. In addition, Brute Force Defender displays the current status of the Advanced Security service, Windows Firewall, Windows Logon Audit and HTML5 web portal logs.
Working Hours
Day and Time Restrictions
Only authorize users or groups to connect during certain days and timeslots. It is possible to select a specific time zone depending on your user's office location.
User and Groups Permission
Manage timeslot permissions for specific users or groups. If a user belongs to several groups, the most permissive permissions apply.
Automated Disconnection
User sessions can be automatically disconnected at the end of the permitted timeslot.
Notifications
Schedule a warning message to notify the user before they are automatically logged off.
Ransomware Protection
Instant Ransomware Detection and Reaction
Predictive Behavioral Detection
Seamless Learning Period
Without disrupting server activity, the learning period enables TSplus Advanced Security to learn standard behaviors of users and applications to identify all legitimate business applications.
Ransomware Protection Action
TSplus Advanced Security automatically stops the attack and quarantines the affected programs and files. Administrators can review the list of quarantined items and decide to whitelist specific entries.
Ransomware Protection Report
Administrators learn to anticipate threats by identifying the source of attacks and analyzing running processes listed in reports.
Email Alerts
Be alerted in real-time. Configure your SMTP settings for TSplus Advanced Security to send you email alerts to highlight important security events.
Snapshots
Using feature, Administrators can quickly identify and recover affected files after an attack. Administrators can also edit the retention period of snapshots.
Ignored file extensions
Easily define the file extensions that need to be excluded from the Ransomware Protection analyses.
Global IP Management
Easy Management
Manage both blocked and whitelisted IP addresses with a single list.
Search Bar
Conveniently search the unified IP address list to find and easily manage your access list. For example, if we searched for blocked addresses, by entering the word "blocked" on the search bar, all the blocked IPs will be displayed.
IP Address Description
Provide meaningful descriptions to any IP addresses to quickly identify them in the future.
Multi-address Editing
Add multiple blocked IP addresses to your whitelist in a single action..
Endpoint Protection and Device Control
Device Control
Administrators can decide whether a user can connect from any device or only specific device names. TSplus Advanced Security automatically creates a list of devices that attempt to connect, facilitating the administrator’s task of accepting or denying access from specific devices.
Endpoint Protection
By pairing devices to user accounts, Endpoint Protection prevents compromised credentials from being used to access your network, because the attacker would need an authorized device to connect.
Secure Desktop
Standard Security Levels
You can configure the security level for each user or group by selecting one of three standardized security levels crafted to the IT industry’s best practices standards: Windows Mode: access to default Windows session Secured Desktop Mode: access to documents, printers, Windows key and session disconnection Kiosk Mode: prevent a connected user from running prohibited actions.
Customize Security Level
Administrators can easily customize the security level of each of the three standard modes to their own needs. Simply select or unselect folders, disks and applications.
Right Click and Context Menu Restrictions
Restrict the ability to right click and access the Context Menu to prevent users from performing unwanted actions.
Permissions
Side-by-side Permission Dashboard
Easily inspect and edit permissions of users, groups, files, folders and printers in a dashboard listing those elements side-by-side. Choose from four permissions: Deny, Read, Modify or Ownership.
Inspect Permissions
Easily inspect permissions applied to each folder, subfolder or file by simply clicking on them in a tree view. Quickly assess what permissions are assigned to which user or groups. Audit specific files to monitor permissions in the event viewer.