Home   About Us   Services   Solutions   Support            
 
Power Protection
Data
Networking
Security
 
Overview
Importance of Security
Threats to Data
Who are the Enemies?
What can the Enemies do?
Services
Assessment
Audit
Penetration Test
Security Policies
Security Tools
 
Overview
Bulletproof Virus Protection!
Firewall
Intrusion Detection
VPN
Access Control
Encryption
Network Scanning
Wireless
E-business
 

Access Control
Before a user gains access to the network with his password, the network must evaluate if the password is valid. Access control servers validate the user’s identity and determine which areas or information the user can access based on stored user profiles. In the physical security analogy, access control servers are equivalent to the gatekeeper who oversees the use of the access card.

 
 
© Copyright 2002 Eitech. All rights reserved.