Taurean is uniquely qualified in new system development, implementation, and maintenance of Access Control Systems (ACS), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and surveillance systems. We have worked with industry-leading manufacturers like Honeywell/Vindicator, LENEL, and Pelco to construct and field complete end-to-end system solutions for various existing clients. Such solutions have also included researching and testing new technologies and acquisition and management best practices.

Access Control System (ACS)

When it comes to determining who is allowed to access, view, and use company data and related resources, Taurean understands the unique requirements of each Client and strives to provide individualized solutions. 

The “access control” part of this security layer is managed via authentication and authorization processes designed alongside company access control policies and practices that govern a company’s systems and data. “Access control” refers to the security platform guarding a physical space, such as an office building, where access is limited to authorized personnel. ACS can refer to usernames and passwords, PINs, multifactor authentication, biometric scans, gates, keycards, restricted access doors, etc.

Examples of IS/IT Access Controls are:

Discretionary Access Control (DAC)

Access is given on as-needed permission. For example, an Team Member may need access to a higher level of data for a certain period to complete a one-time project, or IT professionals may grant themselves discretionary access to correct issues, update systems, or perform general system hygiene.

Mandatory Access Control (MAC)

A central administrator (such as the business owner in this case) sets the access levels based on preprogrammed settings. For example, the military regulates access rights based on different security levels.

Role-Based Access Control (RBAC)

System administrators set permission levels that determine who can and cannot access the system and its data. There are almost always tiers of access based on levels of management and the critical areas of data for each Team Member to do their job (e.g., a controller has access to all financial data but not IT user data).

Attribute-Based Access Control (ABAC)

Access is granted based on various criteria that can change from system to system as needs present themselves. In most cases, it’s based on environmental controls, such as time of day. For example, a Team Member who works the night shift may be allowed access at night but not during the daytime.

Intrusion Detection System (IDS):

A system that monitors traffic for suspicious activity and issues alerts when such activity is discovered. Any malicious venture or violation is typically reported to an administrator or collected centrally using a security information and event management (SIEM) system. Taurean has experience with the installation of sensors and cameras in work with multiple Government agencies such as USSOUTHCOM and DISA.

Intrusion Prevention Systems (IPS):

A form of network security that works to detect and prevent identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents and capturing information about them. The IPS reports these events to system administrators and takes preventative action, such as closing access points and configuring firewalls to prevent future attacks. IPS solutions can be used to identify issues with corporate security policies, deterring employees and network guests from violating the rules these policies contain.