Founded in 1999 and headquartered in Fremont, California, American Portwell Technology, Inc. is a wholly owned subsidiary of Portwell, Inc. As an Associate member of the Intel Internet of Things Solutions Alliance, and an ISO 9001, ISO 13485, ISO 14001 and TL 9000 certified company, American Portwell is committed to high quality standards in delivering innovative product solutions and design engineering excellence.
American Portwell offers an extensive industrial and embedded computing platform product portfolio including several standard form factor platforms: full- and half-size PICMG single board computers; Nano-ITX embedded system boards; Mini-ITX embedded system boards; microATX motherboards; industrial ATX motherboards; QSeven modules and carrier boards; COM Express modules and carrier boards; ECX (4 x 5.75”) modules; industrial-grade PICMG backplanes; rackmount computers; network and communication appliances; and human machine interface solutions.
Automotive Cybersecurity
End-to-end computer networks can simplify and automate the tracking and route assignments in real time while improving service levels and customer satisfaction. Back office computers running advanced software connect to office enterprise Ethernet networks and servers in data centers. Firewalls and VPN support ensure security from hacking and protect sensitive data. Externally, the public internet and commercial wireless networks allow easy transferring of encrypted data to and from in-vehicle telematics systems. From planning and scheduling to invoicing, computers automate the entire process and reduce errors.
Data Security
To prevent unauthorized access of their crucial data, some organizations install Content Monitoring and Filtering (CMF) or Web Content Filtering functions on the same gateway appliance with anti-malware functions. This content-aware function typically monitor and detect outbound sensitive data crossing the enterprise perimeter, it will stop the delivery of restricted content, if the receiving-end is not authorized. Or it will encrypt the restricted content to enforce the Data Loss Prevention (DLP) policy.
Firewall Security
The threats that an enterprise network now faces are evolving rapidly, and the network security solutions implemented play major roles in the success or failure of the organization's overall network security strategy. One of the networking security solutions is Network Access Control (NAC). It defines and implements the provisions and policies of network security including how a user, a computer, or an end-node device would be able to connect to the network. Network access control could be integrated with other functions of the network such as routers, switches, firewalls, servers, end user computers, or other security appliances. In the internet environment, a Firewall serves a critical role in the overall security of the network.
Healthcare Cybersecurity
Portwell is a global leader in the manufacturing and service of embedded computing platforms. Our extensive product portfolio includes embedded computers, single board computers (SBC), rackmount computers, specialty computer platforms, human-machine interface (HMI) and network security appliances. We provide a great selection of products dedicated to a variety of medical applications, including: medical modality instruments; clinical diagnostic instruments; surgical imaging management systems; pharmacy automation; point-of-care devices; ultrasound systems; computer-aided diagnosis and therapy; and healthcare self-service kiosks.
IoT Security
Portwell - IoT Solutions, Internet of Things, IoT Gateway.
One of the networking security solutions is Network Access Control (NAC). It defines and implements the provisions and policies of network security including how a user, a computer, or an end-node device would be able to connect to the network. Network access control could be integrated with other functions of the network such as routers, switches, firewalls, servers, end user computers, or other security appliances. In the internet environment, a Firewall serves a critical role in the overall security of the network.
Threat Protection
As business operations depend increasingly on computers for productivity, an enterprise has to take all necessary safeguards to prevent any threats or security breaches of its crucial data or any information.