Advertisment

Enterprises are moving toward open architecture

author-image
DQI Bureau
New Update

Advertisment

How have enterprise wide security systems changed over the time?

With enterprises spread geographically across various facilities, the old
practice of a standalone solution turned out to be prohibitively expensive, as
it had to be duplicated in several facilities. So, now large organizations are
looking for a seamlessly integrated enterprise wide security solution for
different types of hardware devices on a single application platform and
database. While in the past organizations bought security technology in a box,
the strategy now is to put in place an architecture that delivers consistent
security and mitigation of risk across the organization.

There is a clear departure from adoption of closed information
silos to open system and unifying platforms, which give scope for seamless
integration of disparate systems.

Advertisment

What are the benefits of HIDs IP-enabled Edge products?

The Edge products are designed to provide a complete and full-featured
access control hardware/software infrastructure and contactless smart card
read/write capability at the edge of the network right at the physical door.
They also incorporate multi-platform technology called OPIN, an open
architecture allowing it to be fully integrated into any host access control
system utilizing an IP network software interface.

How can enterprises mitigate the risks arising from stolen
identities?

Providing single ID card to employees can mitigate the risk of stolen
identities. This not only opens all the relevant doors, but also gives access to
that part of the IT infrastructure, which relates to the job. The card should be
capable of being integrated with payroll, HR management, and loaded with
privileges (canteen coupon, access to libraries) that employees are entitled to.
The card should be validated for all necessary accesses when employees visit or
are transferred to another location.

Advertisment

What are the benefits of integration of IT and security systems?

Most organizations deploy security systems in bits and pieces in standalone
modes. They are not able to interact with each other because each one them will
be using vendor specific proprietary hardware, software, and communication
protocols, due to which the system will fulfill only individual security
systems, but will fail to respond adequately when the organizations face
exigencies and critical event.

Advertisment

Chethna Gadiyar


chethnag@cybermedia.co.in

Advertisment