Taurean is uniquely qualified in new system development, implementation, and maintenance of Access Control Systems (ACS), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and surveillance systems. We have worked with industry-leading manufacturers like Honeywell/Vindicator, LENEL, and Pelco to construct and field complete end-to-end system solutions for various existing clients. Such solutions have also included researching and testing new technologies and acquisition and management best practices.

Access Control System (ACS)

Access control is a layer of information systems (IS), or information technology (IT), that determines who is allowed to access, view, and use company data and related resources. The “access control” part of this security layer is managed via authentication and authorization processes designed alongside company access control policies and practices that govern a company’s systems and data. “Access control” refers to the security platform guarding a physical space, such as an office building, where access is limited to authorized personnel. ACS can refer to usernames and passwords, PINs, multifactor authentication, biometric scans, gates, keycards, restricted access doors, etc.
Examples of IS/IT Access Controls are:

Discretionary access control (DAC)

Access is given on as-needed permission. For example, an Team Member may need access to a higher level of data for a certain period to complete a one-time project, or IT professionals may grant themselves discretionary access to correct issues, update systems, or perform general system hygiene.

Mandatory access control (MAC):

A central administrator (such as the business owner in this case) sets the access levels based on preprogrammed settings. For example, the military regulates access rights based on different security levels.

Role-based access control (RBAC)

System administrators set permission levels that determine who can and cannot access the system and its data. There are almost always tiers of access based on levels of management and the critical areas of data for each Team Member to do their job (e.g., a controller has access to all financial data but not IT user data).

Attribute-based access control (ABAC)

Access is granted based on various criteria that can change from system to system as needs present themselves. In most cases, it’s based on environmental controls, such as time of day. For example, a Team Member who works the night shift may be allowed access at night but not during the daytime.

Intrusion Detection System (IDS):

A system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is typically reported to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.

Intrusion Prevention Systems (IPDS):

A form of network security that works to detect and prevent identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents and capturing information about them. The IPS reports these events to system administrators and takes preventative action, such as closing access points and configuring firewalls to prevent future attacks. IPS solutions can be used to identify issues with corporate security policies, deterring employees and network guests from violating the rules these policies contain.