Access Controls

Healthcare breaches accounted for 43.8 percent of all data breaches in the U.S. in 2013, according to the Identity Theft Resource Center. Don’t let data breaches happen to you.

You need to consider administrative, technical, and physical access controls, each with their own requirements. Let’s start with the administrative part—that means limiting access to your data to include only those who absolutely need it. Fortress Networks will help you properly govern how data is accessed, provide frequent and thorough security awareness training, make sure you hire the right people, and enforce sanctions policies.

A Layered Security Approach

 

Common Strong Authentication Parameters

Somethingyouknow

SOMETHING YOU KNOW

(examples: password, PIN, Q&A)
Somethingyouhave

SOMETHING YOU HAVE

(examples: mobile phone, key fob, key card)
Somethingyouare

SOMETHING YOU ARE

(examples: fingerprint scan, retina scan)

 

 

Emerging Methods of Authentication

WHERE YOU ARE

(examples: IP or satellite geo-location)

WHO YOU KNOW

(examples: social network)

WHAT YOU ARE DOING

(examples: behavioral profiling)

 

Fortress Networks’ technical access controls are threefold: preventive, corrective, and detective. Our security operations team works closely with our solutions architects and customers to create solutions with the right security controls that cover all three factors. Where necessary, additional consulting services—firewalls, DMZs, multi-factor authentication, and more—can be retained to assist in further hardening customer environments. We’ve got everything you need, from checksum validators to the right processes for restricting building entry.

One of the most important areas of security is physical access controls. Fortress Networks ensures that very few individuals will ever have physical access to your data.

If all this sounds complicated, it is. But Fortress Networks is here to help.

Rest assured: Our data centers are strictly controlled to safeguard your data, including the most daunting physical barriers.

Rely on expert security personnel: We patrol the premises 24/7, and uses close captioned video monitoring and segregates the duties of personnel.

Keep what should be restricted, restricted: Property entry, building entry, data center floor access, cabinet-level access, and more.

Count on stringent access controls, so that very few individuals will ever have physical access to your data.

Leave data access control to the experts. Contact us today to learn more about how Fortress Networks can help.