access control

(redirected from Access controls)
Also found in: Medical.

access control

[′ak‚ses kən‚trōl]
(computer science)
A restriction on the operations that a user of a computer system may perform on files and other resources of the system.

access control

The management of admission to system and network resources. It grants authenticated users access to specific resources based on company policies and the permission level assigned to the user or user group. Access control often includes authentication, which proves the identity of the user or client machine attempting to log in. See network access control, authentication, access control list and information security.
References in periodicals archive ?
Traditionally, managing security has required mapping an organization's security policy to a relatively low-level set of access controls.
The integration of ConSentry's network-based enforcement platform with Microsoft's admission control and endpoint posture check enables mutual customers to benefit from a comprehensive suite of access controls.
Securities and Exchange Commission, D2C is delivering a significantly improved solution that strengthens internal security access controls and reduces the risk of fraud as called for in Sarbanes-Oxley, Section 404.
The LANenforcer's new operating software eliminates this cumbersome approach by enabling administrators to establish policy-driven access controls that can be automatically applied at the network layer.
Juniper Networks' UAC solution solves the problem of balancing access and security controls by binding user identity, endpoint integrity and location information with access controls, for dynamic policy management that is enforced in real-time throughout the network.
Juniper Networks' UAC solution helps customers solve the problem of balancing access and security controls by binding user identity, endpoint integrity and location information with access controls for dynamic policy management that is enforced in real-time throughout the network.
State Department's 4,000 smart card access control readers from XTec, which are used daily in thousand of access controls transactions across the enterprise, will support both the new PIV high security card and the prior GSC-IS compliant cards.
By unifying access management across the network and application layer, Oracle Identity Management (OIM) customers have an enhanced practical solution to enrich their application access controls with network layer policies including firewall relative location, connection type (wired or wireless), and device to ID association.
BindView plans to offer comprehensive capabilities for monitoring and evaluating access controls in NetApp storage environments with its award-winning bv-Control portfolio.
6 adds new capabilities to Formulator's operator access control module providing complete FTP single sign-on access, file transfer and audit trails to UNIX servers - in addition to existing access controls and forensic audit trails on the industry's widest range of routers, switches, firewalls and other network devices.
OTCBB:RPDT), a provider of Smart card access controls, today announced projected revenues of $1.
Authorization Server enables businesses to create trusted-access domains that identify individuals who work together, shared business processes and the access controls associated with using business processes.

Full browser ?