Access Control

Access control is a level of protection which ensures that a system can only be accessible to authorised personnel. When organisations have confidence their information is secure, they are empowered to use it to accelerate their business. There are several ways of ensuring that your information stays authentic, authorised and accounted for. These include Network Access Control (NAC), Authentication and Remote Access.

Network Access Control

Network Access Control ensures that before a computer can have full access to a network…

Network Access Control ensures that before a computer can have full access to a network that it has followed the prerequisite requirements and complies with a standard protection level. Once the standard is met the computer can have access to all network resources, as well as the web, according to the policies defined by the NAC. Access to applications that are specifically cleared by the system administrator will only be allowed.

Network access control is an ideal solution to help you optimise the productivity and accessibility of your network without compromising your enterprise security. Today, many attacks come from inside your network, bypassing the security provided by traditional firewalls and IPS systems. Modern threats include:

  • Visitors 
  • Wireless and mobile users 
  • Rogue devices 
  • Malware and botnets 
  • Compliance

See below some of the vendors we work with in this area. For a full list of our partners click here.

2 Factor Authentication

Authentication is the process of determining whether someone or something is, in fact, who or…

Authentication is the process of determining whether someone or something is, in fact, who or what it is claims to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic.

The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten. Internet business and many other transactions require a more stringent authentication process. Integrity360 has become one of the leaders in authentication solutions.

See below some of the vendors we work with in this area. For a full list of our partners click here.

Remote Access

Remote access solutions allow users to access the LAN from anywhere in the world via…

Remote access solutions allow users to access the LAN from anywhere in the world via the Internet. This access can be enhanced through a further set of security measures; remote users can get onto their desktops and intranet as though they were in the office. These solutions enable a greater degree of productivity for mobile workers.

Remote access has many advantages including: increased productivity, flexibility, collaboration and employee satisfaction and retention.

Remote access solutions are most likely to be of use to organisations with geographically dispersed remote users who need to access the company network. Sales people out on the road needing to access sales figures or reports on the office server? Staff working from home or requiring access to sensitive documents direct from a client's office? You need a remote access solution.

A VPN is a “Virtual Private Network” or a tunnel through a public network. It allows secure communications across the internet between two endpoints or firewalls.

An SSL VPN (Secure Sockets Layer Virtual Private Network) is a form of VPN that can be used with a standard web browser. In contrast to the traditional IPsec (Internet Protocol Security) VPN, an SSL VPN does not require the installation of specialised client software on end users' computers.

SSL is a protocol for managing the security of message transmission on the Internet. SSL is supported by all modern web browsers and most web server products. It employs the public and private key encryption system from RSA. As TLS (Transport Layer Security), a refinement of SSL, replaces the earlier protocol, an SSL VPN is sometimes referred to as a TLS VPN.

See below some of the vendors we work with in this area. For a full list of our partners click here.