Authentication and Access Control

Authentication ControlThreats to your data can come from external or internal sources.

  1. There are individuals who don’t have the authorization but are driven by malicious intentions to gain access to certain information. This may refer to individuals who already belong to your organization (but don’t have the necessary access rights) as well as those who don’t.
  2. There are individuals who have both the authorization and, unfortunately, the malicious intentions over certain information.
  3. Finally, there are individuals who have the authorization, no malicious intentions, but have accidentally exposed the information in question to those without the proper authority.

While curbing threats 2 and 3 would require other methods, threat #1 can be countered if the right authentication and access control systems are in place.

Here’s what we can do for you:

  • Work with your key personnel to determine who gets access to what.
  • Help you decide whether a single factor or a two-factor authentication (2FA) is appropriate for your organization and recommend which factors are most suitable. Login methods may include but are not limited to the following:
    • biometric devices
    • Kerberos tickets
    • mobile phones
    • passwords
    • PKI certificates
    • proximity cards
    • smart cards
    • tokens
  • Install the necessary infrastructure needed for the factors chosen. For instance, if you opt to use biometrics, then biometric scanners will be installed. We’ll make sure that the authentication terminals are situated in places where achieving optimal traffic and work flow has been taken into consideration.

Other defenses we’re capable of putting up include:

Please feel free to: contact us.

Tags: No tags
0

2 Responses