9 - 10 OCTOBER 2019 / EXCEL LONDON
Register Interest
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

Strengthen & Simplify Access Controls

Tuesday 25 September 2018

Lock down your desktops and your doors

A unified access management infrastructure, based on Microsoft Active Directory, allows user-activity information to be combined to prevent access exceptions in real-time; protecting data and supporting compliance requirements by restricting access to within secure locations.

Additionally, a unified design simplifies overall system architectures and streamlines permissions administration tasks.

See live demonstrations on stand D16 at IPEXPO 2018.

 “The importance of making sure that an organization’s physical assets and infrastructure address privacy requirements cannot be stressed enough.”

Information & Privacy Commissioner of Ontario
– a leader in the development of the ‘privacy by design’ concept

 

Compliance with regulations and standards, such as those governing payment card processing and patient medical records, require user access to sensitive information be restricted to physically secure areas.

User location information can also be crucial to combatting cyber-threats. For example, by restricting certain critical access privileges to users only when they are known to be present on site, or simply blocking Wi-Fi access to users when outside their office buildings.

 

now

Conventional approaches to tackling such access exceptions require the addition of systems that combine data from separate IT (logical) and building (physical) access control applications. Typically an ‘integration’ layer is added on top of existing infrastructure, which enable alerts to be triggered that prompt an operator to take some form of remedial action.  As well as increasing system complexity, this approach fails to fulfil the first of the seven foundational principles of ‘privacy by design’, which calls for preventative rather than reactive measures to be put in place.

Understandably, organisations with physical access control systems already in place may believe adding infrastructure to link these to their logical access management solution, and user directory, will be a more cost effective alternative to upgrading their existing physical access controls. However, aside from the security and management benefits delivered by migrating to a single unified access management solution, there is anyway a pressing need to upgrade the majority of physical access control systems, because the most commonly used (although out-dated) RFID card technologies are highly vulnerable to card cloning attacks that can be perpetrated easily, using low cost hand-held devices available from regular online retailers and auction sites.

Dot Origin’s ‘EdgeConnector’ software radically simplifies and strengthens access management by unifying logical and physical access control; leveraging existing IT access management systems, based on Microsoft Active Directory, and extending these to incorporate door / building access permissions with no need for additional databases, schemas, or sync-servers.

Come and see a live demo on stand D16 at IPEXPO 2018, or find out more: https://www.ipexpoeurope.com/2018-Exhibitors/Dot-Origin

Digital Transformation Europe EXPO 9-10 October 2019

Register Interest

IP EXPO takes place on 9-10 October 2019 at ExCeL London. This unmissable event is your one stop shop for digital transformation and covers every vertical you need to consider for successful implementation. Including network and hardware, cybersecurity, developer community, AI and analytics, IoT and Blockchain.

Top