Why TSplus Advanced Security?

Secure your Remote Work infrastructure

Secure your IT infrastructure as you transition to remote working. As hackers are more present than ever, ensure maximum security with our all-in-one cybersecurity toolbox.

Fine-tune security to your needs

Define how remote employees can work remotely in a few clicks, what they can access, at what time and from what country and device.

Maximize security. Minimize cost.

Obtain the best value-for-money cybersecurity software out there. TSplus Advanced Security comes with permanent licenses that last for life.

Hacker IP Protection

Block Malicious IP Addresses

Keep your machine protected against known online attacks, online service abuse, malware, botnets and other cybercrime activities. Hacker IP Protection leverages the information provided by the community of Advanced Security users to automatically blacklist more than 368 million identified threats daily.

Live Map of Incoming Connections

The interactive live map displays incoming connections in real time. With pinpoints highlighting detected threats and allowed connections, giving you real-time visibility into your server’s global activity.

Placeholder Image
Placeholder Image

Geographic Protection

Country Restriction

Block unwanted countries and allow access from specific countries. Easily whitelist or block IP addresses from allowed countries.

Internet and IP Access Restriction

Restrict access from the Internet. If your remote access environment is meant to be private, define your internet access restriction to “only private and whitelisted IP addresses”.

Watched Processes

Add or remove processes that are watched by the Geographic Protection feature. Easily add ports to the Geographic Protection Feature watch list.

Bruteforce Protection

Public Server Protection

Bruteforce Protection enables you to protect your public server from hackers, network scanners and brute-force robots that try to guess your Administrator login and password. Monitor Windows failed login attempts and automatically block the offending IP addresses after a pre-determined number of failures.

Easily configure the maximum logon attempts by IP address. In addition, Bruteforce Protection displays the current status of the Advanced Security service, Windows Firewall, Windows Logon Audit and HTML5 web portal logs.

Placeholder Image
Placeholder Image

Restrict Working Hours

Day and Time Restrictions

Only authorize users or groups to connect during certain days and timeslots. It is possible to select a specific time zone depending on your user's office location.

User and Groups Permission

Manage timeslot permissions for specific users or groups. If a user belongs to several groups, the most permissive permissions apply.

Automated Disconnection

User sessions can be automatically disconnected at the end of the permitted timeslot.

Notifications

Schedule a warning message to notify the user before they are automatically logged off.

Ransomware Protection

Instant Ransomware Detection and Reaction

TSplus Advanced Security reacts as soon as it detects ransomware on your server. It possesses both static and behavioral analysis: The static analysis enables the software to react immediately when an extension name changes. The behavioral analysis looks at how a program will interact with files and detect new strains of ransomware.

Predictive Behavioral Detection

Ransomware Protection uses pure behavioral detection techniques and does not rely on malware signatures, enabling it to catch ransomware unknown to antivirus and antimalware software. To ensure a greater level of protection, Ransomware Protection also creates bait files in key folders where ransomware attacks often originate.

Seamless Learning Period

Without disrupting server activity, the learning period enables TSplus Advanced Security to learn standard behaviors of users and applications to identify all legitimate business applications.

Ransomware Protection Action

TSplus Advanced Security automatically stops the attack and quarantines the affected programs and files. Administrators can review the list of quarantined items and decide to whitelist specific entries.

Ransomware Protection Report

Administrators learn to anticipate threats by identifying the source of attacks and analyzing running processes listed in reports.

Email Alerts

Be alerted in real-time. Configure your SMTP settings for TSplus Advanced Security to send you email alerts to highlight important security events.

Snapshots

Using the snapshot feature, Administrators can quickly identify and recover affected files after an attack. Administrators can also edit the retention period of snapshots.

Ignored file extensions

Easily define the file extensions that need to be excluded from the Ransomware Protection analyses.

Firewall

Easy Management

Manage both blocked and whitelisted IP addresses with a single list.

Search Bar

Conveniently search the unified IP address list to find and easily manage your access list. For example, if we searched for blocked addresses, by entering the word "blocked" on the search bar, all the blocked IPs will be displayed.

IP Address Description

Provide meaningful descriptions to any IP addresses to quickly identify them in the future.

Multi-address Editing

Add multiple blocked IP addresses to your whitelist in a single action..

Placeholder Image
Placeholder Image

Trusted Devices

Device Control

Administrators can decide whether a user can connect from any device or only specific device names. TSplus Advanced Security automatically creates a list of devices that attempt to connect, facilitating the administrator’s task of accepting or denying access from specific devices.

Device Protection

By pairing devices to user accounts, Device Protection prevents compromised credentials from being used to access your network, because the attacker would need an authorized device to connect.

Secure Sessions

Standard Security Levels

You can configure the security level for each user or group by selecting one of three standardized security levels crafted to the IT industry’s best practices standards:

  • Windows Mode: access to default Windows session
  • Secured Desktop Mode: access to documents, printers, Windows key and session disconnection
  • Kiosk Mode: prevent a connected user from running prohibited actions.

Customize Security Level

Administrators can easily customize the security level of each of the three standard modes to their own needs. Simply select or unselect folders, disks and applications.

Right Click and Context Menu Restrictions

Restrict the ability to right click and access the Context Menu to prevent users from performing unwanted actions.

Placeholder Image
Placeholder Image

Permissions

Side-by-side Permission Dashboard

Easily inspect and edit permissions of users, groups, files, folders and printers in a dashboard listing those elements side-by-side. Choose from four permissions: Deny, Read, Modify or Ownership.

Inspect Permissions

Easily inspect permissions applied to each folder, subfolder or file by simply clicking on them in a tree view. Quickly assess what permissions are assigned to which user or groups. Audit specific files to monitor permissions in the event viewer.