- Provides a safe working atmosphere
- Assists in auditing of time and attendance
- Access to multiple facilities through one interface
- Saves time and money
- Speeds up mundane processes
Mandatory Access Control (MAC)
In MAC, users do not have much freedom to determine who has access to their files. For example, security clearance of users and classification of data (as confidential, secret or top secret) are used as security labels to define the level of trust.
Discretionary Access Control (DAC)
In DAC, the data owner determines who can access specific resources. For example, a system administrator may create a hierarchy of files to be accessed based on certain permissions.
Role-Based Access Control (RBAC)
RBAC allows access based on the job title. For example, a human resources specialist should not have permissions to create network accounts; this should be a role reserved for network administrators.
Rule-Based Access Control
An example of this would be only allowing students to use the labs during a certain time of the day.
Saves substantial man-hour resources
Increases your net efficiency
Expands when your business does