WHAT IS PHYSICAL SECURITY
Taurean is uniquely qualified in new system development, implementation, and maintenance of Access Control Systems (ACS), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and surveillance systems. We have worked with industry-leading manufacturers like Honeywell/Vindicator, LENEL, and Pelco to construct and field complete end-to-end system solutions for various existing clients. Such solutions have also included researching and testing new technologies and acquisition and management best practices.
Access Control System (ACS)
Access control is a layer of information systems (IS), or information technology (IT), that determines who is allowed to access, view, and use company data and related resources. The “access control” part of this security layer is managed via authentication and authorization processes designed alongside company access control policies and practices that govern a company’s systems and data. “Access control” refers to the security platform guarding a physical space, such as an office building, where access is limited to authorized personnel. ACS can refer to usernames and passwords, PINs, multifactor authentication, biometric scans, gates, keycards, restricted access doors, etc.
Examples of IS/IT Access Controls are:
Intrusion Detection System (IDS):
A system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is typically reported to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.
Intrusion Prevention Systems (IPDS):
A form of network security that works to detect and prevent identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents and capturing information about them. The IPS reports these events to system administrators and takes preventative action, such as closing access points and configuring firewalls to prevent future attacks. IPS solutions can be used to identify issues with corporate security policies, deterring employees and network guests from violating the rules these policies contain.