CORTEX empowers authorised and authenticated users to define a comprehensive set of logical access rights for different organisational roles, particularly concerning application access. It streamlines the process of role-based access allocation through a user-friendly web interface, where new employees can be registered and assigned appropriate access rights based on their roles. This system ensures access to various applications and systems is granted accurately and efficiently.
Further enhancing its functionality, CORTEX can manage on-demand access requests, such as situations where a key fob is lost. It allows authorised users to request specific access through a web page, where CORTEX then validates the provided data and, if valid, issues commands to grant access temporarily. Additionally, CORTEX informs the employee’s manager and the central security team about these exceptional access requests, maintaining transparency and oversight.
A crucial aspect of CORTEX’s capabilities is its regular auditing of access rights configurations. It identifies all user accounts in the access granting systems and maps them to individuals using data from HR or Active Directory systems. CORTEX then facilitates the review of ongoing access rights by notifying employee managers, who can approve or deny continued access through personalised web pages. This process ensures that access rights remain aligned with current roles and responsibilities.
CORTEX managers’ responses, issuing reminders or escalations if necessary, and updating or removing access rights based on managerial input. It logs every action and decision for future audits and compliance reviews and can escalate data quality issues with HR or Active Directory systems.
Throughout these processes, CORTEX issues progress notifications to internal and external stakeholders at key stages, ensuring effective communication and smooth management of access rights across the organisation.
Ensuring that staff and contractors have access to appropriate physical locations is crucial to maintaining physical security in any organisation. This involves a carefully managed system of access control, where entry to various parts of the facility is granted based on individuals’ specific roles and responsibilities. The organisation can significantly reduce the risk of unauthorised entry and potential security breaches by restricting access to sensitive areas. This selective access approach is essential for protecting sensitive information and assets and ensuring the safety and security of all personnel within the organisation. Implementing and regularly reviewing such access controls is a fundamental aspect of robust physical security management.
You can also use our search facility to find the resources like this, business cases, case studies, news and whitepapers. Whatever content you are after, if you cant find it here, contact us and we may have it locked away somewhere.
/ Search here /
We’d love to hear from you.
Please fill out the form or send us an email.
+44 23 8254 8990
Mon–Fri from 9am to 5pm
(GMT)
+44 23 8254 8990
Mon–Fri from 9am to 5pm
(GMT)
22 Kings Park Road
Southampton
SO15 2AT