PHYSICAL SECURITY
Access Control System (ACS)
When it comes to determining who is allowed to access, view, and use company data and related resources, Taurean understands the unique requirements of each Client and strives to provide individualized solutions.
The “access control” part of this security layer is managed via authentication and authorization processes designed alongside company access control policies and practices that govern a company’s systems and data. “Access control” refers to the security platform guarding a physical space, such as an office building, where access is limited to authorized personnel. ACS can refer to usernames and passwords, PINs, multifactor authentication, biometric scans, gates, keycards, restricted access doors, etc.
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Intrusion Detection System (IDS):
A system that monitors traffic for suspicious activity and issues alerts when such activity is discovered. Any malicious venture or violation is typically reported to an administrator or collected centrally using a security information and event management (SIEM) system. Taurean has experience with the installation of sensors and cameras in work with multiple Government agencies such as USSOUTHCOM and DISA.