Reply To: ISONAS Pure IP Access Control Solution Deployed at Engel Electric Company

Home Forums Discussions at SecurityWorld ISONAS Pure IP Access Control Solution Deployed at Engel Electric Company Reply To: ISONAS Pure IP Access Control Solution Deployed at Engel Electric Company


stella
Guest

An IP access control is a wireless electronic security device typically designed to identify authorized users and control access to or access from restricted areas using Internet Protocol (IP) technology. There are various IP access control options available in the marketplace, including software and hardware devices. A typical IP access control system supports 2 or more basic access control devices. Common uses of IP access control systems include:

Many companies use private network IP controllers to provide virtual private network access (VPN) to authorized personnel. These IP controllers allow company employees to work remotely from the office, while the public Internet is blocked, restricting them from gaining access to company information. Some companies use a virtual private network access controls to implement data-loss prevention (DLP). The idea is that an unauthorized person does not have the key necessary to gain access to company data. Similarly, network access is controlled by security systems for organizations using complex IT network infrastructure, such as offices and departments that use multiple internal computer networks (i.e., network attached storage (NAS)), or to prevent access from wireless-networked computers.

The Internet (IP) is used as a mechanism for IP access control to prevent unauthorized access. Most businesses use private, local networks for business intranet access and management, and public networks for Internet Information Exchange (IKE) and e-mail filtering. Some organizations also use cellular IETs to establish secure wireless connections (wifi). As an alternative to these traditional methods of IP access control, such as through a firewall or an IP Secured Switch, organizations may utilize other technologies, such as Web security and virtual dedicated protocols (VAIP), to establish a higher level of security. Businesses may also employ software to enforce higher levels of access control, such as content filtering and security.

#536724