Close this search box.
Logical Security

Logical Security

Everything from Single Sign-On to Enterprise Management

With the advent of physical access control systems, many companies found themselves in need of ways to secure more than just doors and gateways. This gave rise to integrated solutions that also include various forms of logical security. The Identification Systems Group (ISG) offers logical access control system (LACS) solutions that are fully compatible with their physical counterparts. Our multi-factor, logical access solutions help enterprises of all types repel attacks on their networks and infrastructure systems to keep company information, plus customer and employee data, safe.

The ISG offers a variety of solutions that provide integrated physical and logical security, as well as mobile access security options that include digital certificates, public key infrastructure (PKI), and single sign-on (SSO) applications.

Show products for

Sphinx Logon Manager

Entrust Identity as a Service

Entrust Identity Enterprise

Reliable Logical Access Control Solutions

In recent years, numerous governmental compliance regulations have been implemented that require strong logical security, including biometric minutiae, personal identification numbers (PINs), and strict password requirements. Failure to comply with these regulations to protect data can often lead to significant consequences. Therefore, it is in the best interest of companies and institutions in all markets to integrate complete cyber security solutions that guard important information like access control numbers, passwords, and social security numbers.

Any dependable logical security solution includes compounding supplementary factors to authenticate users’ identities. Commonly known as “two-factor authentication” or “2FA”, and more recently as “multi-factor authentication” or “MFA” when three or more requirements are needed, this can be achieved through the use of individual PINs, biometrics, and passwords, in addition to a physical access or identity card. Sometimes, even more than one biometric is needed to validate appropriate access.