Access control

Share this article:

Depending on who you are, you probably have a very strong opinion about the value of access control as an element of the security enterprise. Nonetheless, there are some very strongly held opinions on how to execute it. Each of this year's innovators has both a contribution and a strategy for access control and each places the emphasis on a different aspect or technique.

That is as it should be. Defense-in-depth demands that we not put all of our eggs in a single basket and it takes a coherent strategy for managing access, especially to a large, widely disbursed enterprise. This year's selections address biometrics, network access control, credential management, identity management and multifactor authentication. All of these aspects are critical to maintaining the integrity of the enterprise.

As we move away from wired to wireless enterprises, we also find it is necessary to pay close attention to security in the aspect of pervasive computing. Technically, pervasive computing includes more than just the enterprise. However, the devices that will become the targets of a pervasive computing strategy may well reside on the enterprise and require clear protection for access and credential control.

It is these new computing paradigms that are going to challenge us going forward and so we attack the challenges of access control as our first innovators group. As we describe these five subcategories and their innovators, consider where they will need to go in the next few years. We asked them that and in most cases received interesting and creative – if consistent – responses.

Also, the whole issue of deployment is open for discussion. There are multiple definitions of what one should include in an access control system. The selections from biometrics, NAC and authentication that we gathered together in this year's net are not only critical to information security, but also should satisfy the demands of as many SC Magazine readers as possible.

Share this article:
close

Next Article in Reviews

Sign up to our newsletters

More in Reviews

Mitigating risk is not as simple as it seems

Mitigating risk is not as simple as it ...

This month, our Technology Editor Peter Stephenson looks at risk and policy management.

Digging deep with forensic tools

Digging deep with forensic tools

Gathered here are some of the most comprehensive digital forensic tools available.

The more things change...

The more things change...

SIEMs today are powerful beasts and they are necessary - if not always sufficient - for the protection of your enterprise.