SmartPlus financial security

September 2008 Access Control & Identity Management

Many companies routinely control building access using Pro-Watch, Honeywell’s advanced access control system because it manages IT network access using enterprise network authentication infrastructure in parallel. Today, the physical and the logical live in separate technology silos. SmartPlus Imprivata Connector enables seamless communication between the two systems to effect a stronger, and more compliant, overall security posture.

The SmartPlus Imprivata Connector uses OneSign Physical/Logical to enable Pro-Watch to provide a single point of authentication management. It effectively closes security gaps that exist when physical access control and IT network authentication systems live in self-contained silos. Using a single Web-based interface, OneSign Physical/Logical enables the mapping of identities contained within Pro-Watch and corporate IT directories. The SmartPlus Imprivata Connector allows network access and badging privileges based on an employee’s status, role within the organisation, and/or physical location.

Companies can gain greater security control by tying network access to badging into the building – or a zone or room within the building – in order to ensure only valid employees gain access. In addition, if a remote VPN access request comes in from a user ID that is already authenticated within the building and to the local network, OneSign will deny remote access, mitigating rogue, remote VPN access attempts.

The SmartPlus Imprivata Connector helps Pro-Watch work together to deliver the following benefits:

* Tie network access to physical location: Gain greater security control by tying network access.

* Enforce your anti-tailgating policy: Anti-tailgating or piggybacking policies are difficult to enforce without deployment of expensive and burdensome turnstile ingress/egress systems. The combined power of Pro-Watch and OneSign works to enforce anti-tailgating policy by tying a user’s building badge events with network access. If a user does not badge into your building, he does not get access to the network.

* Instant user lock-out: Revoking a user from Pro-Watch instantly locks the user from network access, both local and remote VPN. Instant user lockout effectively closes security gaps that exist between the days or weeks – or in some cases, never – of deprovisioning non-active identities from local and remote IT directories.

* Consolidated monitoring and reporting: Quickly and easily consolidate user access reports for building, zone, network, and remote access. Your ability to monitor and report who is accessing what, when, and from where is a critical component for demonstrating compliance, both for the purpose of government regulations and corporate security forensic investigations.

* System ready; non-disruptive: OneSign interoperates with your existing Pro-Watch and IT network infrastructure. OneSign’s appliance-based packaging enables seamless communication between Pro-Watch and IT security environments for non-disruptive, identity-based convergence. No changes to your Pro-Watch or IT directories are required, no Pro-Watch or IT system modification is required. You can now achieve even greater protection of your enterprise assets while maximising the value of current security infrastructure.

For more information contact Konrad Weinert, sales leader - Africa, Honeywell Systems Group, 27 (0)11 574 2500, www.security.honeywell.com/za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...