Keys to access control: visibility, granularity, 'set it and forget it'

In selecting network access control, the ability to see what visitors are doing on the network and to set meaningful policy are critical, said Robert Loveland, network and security engineer for the city of Gastonia, N.C. Those were selling points when he chose eTIPS from Avenda Systems for the city’s network.

“What really caught my attention was how visible everything was,” he said.


NC city mixes remote access with authentication control

The eTIPS policy engine allows granular polices to be set for role-based access to the system. It can be used across a variety of departments and job descriptions, simplifying access control as well as the task of pinpointing problems when they occur.

"Knowing exactly what is going on will save you tons of time,” Loveland said. “With the amount that I can see into things in the authorization process, it can cut my trouble-shooting time in half.”

With three technicians to oversee a network supporting 1,500 users, cutting the number of man-hours needed to solve problems is important. The staff is adequate when things are running smoothly, but it can quickly become overburdened when problems arise.

“With the number of people I’ve got, you almost have to have something that is set it and forget it,” he said.

About the Author

William Jackson is a Maryland-based freelance writer.


  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

  • Marines on patrol (US Marines)

    Using AVs to tell friend from foe

    The Defense Advanced Research Projects Agency is looking for ways autonomous vehicles can make it easier for commanders to detect and track threats among civilians in complex urban environments without escalating tensions.

Stay Connected