Access control

Share this article:

Depending on who you are, you probably have a very strong opinion about the value of access control as an element of the security enterprise. Nonetheless, there are some very strongly held opinions on how to execute it. Each of this year's innovators has both a contribution and a strategy for access control and each places the emphasis on a different aspect or technique.

That is as it should be. Defense-in-depth demands that we not put all of our eggs in a single basket and it takes a coherent strategy for managing access, especially to a large, widely disbursed enterprise. This year's selections address biometrics, network access control, credential management, identity management and multifactor authentication. All of these aspects are critical to maintaining the integrity of the enterprise.

As we move away from wired to wireless enterprises, we also find it is necessary to pay close attention to security in the aspect of pervasive computing. Technically, pervasive computing includes more than just the enterprise. However, the devices that will become the targets of a pervasive computing strategy may well reside on the enterprise and require clear protection for access and credential control.

It is these new computing paradigms that are going to challenge us going forward and so we attack the challenges of access control as our first innovators group. As we describe these five subcategories and their innovators, consider where they will need to go in the next few years. We asked them that and in most cases received interesting and creative – if consistent – responses.

Also, the whole issue of deployment is open for discussion. There are multiple definitions of what one should include in an access control system. The selections from biometrics, NAC and authentication that we gathered together in this year's net are not only critical to information security, but also should satisfy the demands of as many SC Magazine readers as possible.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Next Article in Reviews

Sign up to our newsletters

More in Reviews

Protecting email both ways

Protecting email both ways

Protecting your organization from attacks brought into the system by email is an ongoing challenge, says Peter Stephenson, technology editor.

Attestation at its best

Attestation at its best

Private Core vCage protects systems. It's a little complicated under the covers, but in practical use is simplicity itself.

Mobile devices are the new endpoints...and both need protecting

Mobile devices are the new endpoints...and both need ...

The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're all swimming in the same ...