This integrates two typically distinct security activities enabling a single comprehensive access policy that allows or denies network access based on a user’s physical location, role, and/or employee status. Our product enables an organization to establish and manage a consolidated repository for all authentication credentials, and to have a centralized means of setting access privileges to logical resources based on physical access events. This identity-based convergence makes it possible for organizations to achieve:

Tighter Enterprise Security:

_ Integrate and coordinate who is accessing what, from where, and when

_ Close security holes/gaps between disparate, independent security systems

Increased Value of Building Access Badge:

Utilize existing building access keycard and door readers for network authentication and access

Deploy either one or multiple forms of authentication seamlessly across both building and IT access points

Regulatory Compliance and Risk Mitigation:

Demonstrate adherence to SOX, HIPAA, HSPD-12, BASEL II, etc.

Generate more accurate employee muster when responding to fire and safety emergency procedures.

It not only consolidates user credentials from disparate networks, remote access, applications, and physical access accounts, but also enables a single point of control. This allows administrators to instantly lock-out user access across both physical and logical assets—such as when an employee is terminated—removing latency in user deprovisioning.
  Back to Top