physical access


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Wikipedia.

physical access

In computer security, being able to physically touch and interact with the computers and network devices. It lets someone insert a boot disk in the machine and bypass normal operating system controls. Physical access enables people to install unauthorized snooping equipment such as keystroke loggers. Contrast with logical access.
References in periodicals archive ?
The acquisition of Mercury Security will advance HIDs global leadership in the physical access control industry, adding Mercury Securitys high-quality controllers to HIDs product portfolio while extending HIDs installed base of millions of users beyond the readers and smart cards that we are already well known for, said Stefan Widing, President and CEO of HID Global.
20 September 2017 - Texas, US-based identity solutions provider HID Global has agreed to acquire California, US-based OEM supplier of access controllers Mercury Security to advance HID's position in the physical access control market, the company said.
8220;Emergence of video surveillance cameras and electro-mechanical locks for physical access and logical access control is siting for a huge market growth by 2018.
When used with Identive's new line of TouchSecure readers, the NFC smartphone replaces traditional secure physical access credentials.
The facilities manager will need to be able to secure physical access to computers and other network devices as required by investigators.
The majority of physical access control systems are currently managed independently of an enterprise's IT functions.
The Swedish biometric security solutions developer and provider Precise Biometrics AB said on Wednesday (23 June) that it had received an order for a physical access solution from the Swedish gym chain Fitness24Seven.
With smart card-based physical access already in place at many enterprises, the next logical step is to provide the same level of protection for digital assets.
DoD uniformed duty employees, qualified reserve personnel, DoD civilians, and authorized contractors use these standard identification cards to gain physical access to secure areas and logical access to the Department's computer networks.
What issues need to he considered when implementing a smart-card-based physical access control system?
The court held that prison employees' alleged conduct of informing an inmate that he had to submit a visiting request to receive direct physical access to the prison law library, failed to support the inmate's claim of denial of meaningful access to courts.
Vocent's new Voice Secure software family is comprised of four different applications: Voice Secure -- Password Reset, which automates the password reset headache that is common within large corporations; Voice Secure -- Confirmed Caller, which acts as a secure front end for customer contact centers by using voiceprints to verify a caller's identity before being connected with a customer service representative or interactive voice response (IVR) system; Voice Secure -- Check-in, which uses voiceprints to verify the identity of a caller at specific locations and times; and Voice Secure -- Controlled Access , which limits physical access to secure areas by using voiceprints to supplement card readers or other access control systems.

Full browser ?