 |

Certification Path
Automation Path
 Features
 Security Policy
 Security Organization
 Asset Classification
 Personnel Security
 Physical &
Environmental
 Communications &
Operations
 Access Control
 Systems
Development
 Business Continuity
 Compliance
 Services
 Process
 Technology
 Tech Support
Demo
|
 |

Access control is a huge effort to implement, co-ordinate and control. While the appropriate technology can control access to your networks, applications, operating systems and other assets, having the best technology protection is useless if it is not properly controlled, configured and used. You may have the most impenetrable access ways, but how can you be sure that your administrators don't leave them open or your employees don't give away their keys?
With the ISO17 application, you ensure administrators know how to use your technology and limit access accordingly. In turn, users learn how to access information properly and you have tools to record, track and review system use data. Since your access control is only as good as the knowledge of those who implement it, you can ensure there are no gaps in your communication lines.
Automated, online collaboration on user and network access and control, system monitoring and remote use procedures, processes and policies
Template policy and procedure guidelines to ensure that all elements of access control requirements are addressed
Easy access to descriptions of assets, security attributes of network services and control objectives for planning appropriate policies and procedures
Automated document control to ensure use of most current versions of access control procedures by employees
Training tools to aid implementation of your access policies and track employee responsibilities and education
Automated tools for monitoring and tracking system use
Streamlined process for conducting and recording meetings to review documentation and system use and training data
Powerful audit tools for ensuring controlled access to assets
|
 |