Security of industrial information systems, such as SCADA, ICS or GPAO, is a growing industrial challenge since the machine interconnectivity and the emergence of targeted attacks. These systems powerful in their profession, remains fragile. Their omnipresence in all industries such as production, food or energy has led states to consider this weakness as a national […]
Login to a computer or an application
Our logical access solutions can identify a user on an Windows or Linux session or at a business application: the need is not the same.
In the first case we respond to a problem of “securing access to IT’ while in the 2nd case ” traceability “is at the heart of the problem.
A “hands-free” version has been developed to meet specific business problems. The user is automatically detected when it is close to the workstation. As soon as it comes out of the area called “work”, the system is immediately locked to guaranteeing the security of the information system.
ISLOG added values
Objectivity. Software company, we integrate hardware from different manufacturers. This allows us to be independent and to advocate not a product but a solution that exactly meets the needs of our client.