reconasense.com Open in urlscan Pro
2606:4700:3031::ac43:95b9  Public Scan

Submitted URL: https://www2.smartersecurity.com/e/315571/blog-what-is-access-control-/k7wsg/1825272604?h=GrJpXaZuQD0LR3bEFFJQKVfQSqy6LMendYiSRUC...
Effective URL: https://reconasense.com/blog/what-is-access-control/
Submission Tags: falconsandbox
Submission: On July 14 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://reconasense.com/

<form role="search" action="https://reconasense.com/" method="GET"> <input type="text" name="s" value="" aria-label="Search" placeholder="Start Typing..."> <span>Hit enter to search or ESC to close</span></form>

Text Content

Skip to main content
Hit enter to search or ESC to close
Close Search

search
Menu
 * Features
 * Plans
 * Solutions
   * Commercial
   * Government
 * Company
   * About
   * News
   * Awards
   * Careers
   * Contact Us
 * Resources
   * Downloads
   * Media
   * Blog
 * Contact Us

 * search


Blog


WHAT IS ACCESS CONTROL?

By Hannah Livergood July 14, 2022 No Comments


Sick of being let down by access control that can’t keep up with your growing
enterprise? Us too. That’s why we made ReconaSense, to bring facilities out of a
reactive state regarding threat response and mitigation. Physical security
management empowers businesses with the tools to identify and manage potential
risks effectively, making mitigating risks easy once identified.

Security professionals today face more responsibility with fewer resources than
ever. At the same time, expectations continue to rise to secure perimeters,
people, property, and digital spaces. Simply, there are not enough trained
personnel to keep up. And unfortunately, budget decisions are often reactive in
nature, with funding awarded in the wake of troubling security incidents. One of
the critical roles of your physical access control system is to make life as a
security practitioner easier, giving you peace of mind when keeping people,
assets, and facilities safe. To do so, one of the most crucial features a
modern, intelligent PACS should have is the ability to integrate siloed security
data into not just a standard view – but one common language.

Access control is defined by the National Institute of Standards and Technology
(NIST) as “The process of granting or denying specific requests to 1) obtain and
use information and related information processing services and 2) enter
specific physical facilities (e.g., federal buildings, military establishments,
border crossing entrances)”. As far as building security and access control go,
several officially recognized types of access control exist.

Types of Access Control


Discretionary Access Control (DAC) – DAC is a type of access control system that
assigns access rights based on rules specified by users. The principle behind
DAC is that subjects can determine who has access to their objects. The DAC
model takes advantage of using access control lists (ACLs) and capability
tables.

Role-Based Access Control (RBAC) – RBAC, also known as non-discretionary access
control, is used when system administrators need to assign rights based on
organizational roles instead of individual user accounts within an organization.
It presents an opportunity for the organization to address the principle of
‘least privilege.’ This gives an individual only the access needed to do their
job since access connects to their job.

Mandatory Access Control (MAC) – Considered the strictest of all levels of
access control systems. The government commonly uses the design and
implementation of MAC. MAC uses a hierarchical approach to control access to
files/resources. Under a MAC environment, access to resource objects is governed
by the settings defined by a system administrator. This means access to resource
objects is controlled by the operating system based on what the system
administrator configured in the settings. Users can’t change access control of a
resource. MAC uses “security labels” to assign resource objects to a system.
There are two pieces of information connected to these security labels:
classification (high, medium, low) and category (specific department or project
– provides “need to know”).

Which Type is ReconaSense?


As a fully customizable tile-based system that works at a layered permissions
level, the answer is all three. ReconaSense can function as a DAC through a
security team using the platform to track, monitor, and act by measuring risk
and deciding on access granted or denied. ReconaSense can also be structured as
an RBAC through directly assigned rights on role, title, and level versus the
previous individual basis. Or through defined rule sets regulating rights and
access to controlled environments, ReconaSense is designed to function as a MAC
at an enterprise level to secure differing areas based on classification,
activity, permissions, suspicion, and threat scoring- all in real-time. When
setting up your customized access control, you can do any combination of these
types of access control to fit your unique building management needs to mitigate
risk, detect threats, and keep occupants safe.

What Makes ReconaSense Unique

ReconaSense is the first risk-adaptive security framework to receive FICAM
certification (APL #10131) using commercial off-the-shelf (COTS) components. We
protect federal, military, critical infrastructure, and other sensitive
facilities requiring the highest levels of security. ReconaSense meets and
exceeds Government regulations for: HSPD-12, FIPS 201, ICD705, UL1076, UL294,
and FIPS 140-2.

The ReconaSense platform integrates with all federal security systems and other
applications at the database layer by translating data into one common language.
It automatically adjusts permissions to deliver security intelligence through a
single interface providing a more intelligent view of security across your
entire operation.

ReconaSense runs on Mercury hardware and integrates data from third-party
systems, authentication solutions, IoT sensor technology, building automation
systems, and more. ReconaSense enables modern enterprises to manage risk across
numerous dynamic and interacting variables proactively. With ReconaSense, you
will gain a unified view of potential threats across your entire security
environment.

Upcoming Events to Consider

GSX: Visit ReconaSense at booth 4143 in Atlanta, GA, September 12-14, 2022, for
GSX at the Georgia World Congress Center.  Click here for our complimentary
registration!

ISC East: See us at the Javits Center in NYC on November 16-17, 2022, for ISC
East. See the latest innovations in Fastlane turnstiles and discuss a more
intelligent security strategy. For more information, click here.

About ReconaSense

Harnessing the power of real-time data processing and military-grade physical
access control, ReconaSense provides the only risk-adaptive protection for
enterprise security management. These tools provide the industry with the
building blocks and automation services to enable ‘Smart Building’ functionality
with existing resources. We are an American company based in Austin, TX,
supported by Veterans with various installations in numerous government
facilities and retail locations. Want to schedule a private demo or have
questions? Want to schedule a personal demo or have questions? Contact us, and
we will reach out shortly.

Townsend, R. (n.d.). UHWO Cyber Security. University of Hawaii – West Oahu.
Retrieved from
https://westoahu.hawaii.edu/cyber/best-practices/best-practices-weekly-summaries/access-control/


 * PREVIOUS POSTIT MAKES (RECONA)SENSE TO VISIT US AT ISC WEST


 * NEXT POSTHELPING HOSPITALS EFFECTIVELY AND PROACTIVELY MANAGE INFECTIOUS
   DISEASES WITH THE RIGHT TOOLS


Share Tweet Share Pin

RECONASENSE ®

 * Features
 * Plans

SOLUTIONS

 * Commercial
 * Government

COMPANY

 * About
 * News
 * Awards
 * Careers
 * Contact Us

RESOURCES

 * Downloads
 * Media

CONTACT US

512.220.2010
9130 Jollyville Rd
Suite 150
Austin, Tx 78759

FOLLOW US



JOIN OUR NEWSLETTER



© 2022 ReconaSense. | Privacy Policy | Terms of Use



WE USE COOKIES TO ENSURE THAT WE GIVE YOU THE BEST EXPERIENCE ON OUR
WEBSITE.  BY USING OUR WEBSITE, YOU CONSENT TO OUR USE OF COOKIES AND AGREE TO
OUR PRIVACY POLICY.

CLOSE
 * Features
 * Plans
 * Solutions
   * Commercial
   * Government
 * Company
   * About
   * News
   * Awards
   * Careers
   * Contact Us
 * Resources
   * Downloads
   * Media
   * Blog
 * Contact Us



Close Menu