Access Control

  • Provides a safe working atmosphere
  • Assists in auditing of time and attendance
  • Access to multiple facilities through one interface
  • Saves time and money
  • Speeds up mundane processes

Mandatory Access Control (MAC)

In MAC, users do not have much freedom to determine who has access to their files. For example, security clearance of users and classification of data (as confidential, secret or top secret) are used as security labels to define the level of trust.

Discretionary Access Control (DAC)

In DAC, the data owner determines who can access specific resources. For example, a system administrator may create a hierarchy of files to be accessed based on certain permissions.

Role-Based Access Control (RBAC)

RBAC allows access based on the job title. For example, a human resources specialist should not have permissions to create network accounts; this should be a role reserved for network administrators.

Rule-Based Access Control

An example of this would be only allowing students to use the labs during a certain time of the day.

Saves substantial man-hour resources

Reduce costs

Increases your net efficiency

Expands when your business does