Cleanup feature for access control data released by Sielox

Sielox Pinnacle system

Share this content

Facebook
Twitter
LinkedIn

Sielox, a provider of layered access control solutions, has released its System Clean Up Utility feature available with the Sielox Pinnacle 11.0 Access Control Platform.

According to the company, the System Clean Up Utility feature enables a swift and thorough cleanup of invalid or outdated access control data, resulting in enhanced system management and security.

Cleaning data

“Now is the perfect time for access control systems to undergo a spring cleaning of their own,” said Karen Evans, President, Sielox. “Pinnacle saves valuable time and resources in this effort, bringing potential access control risks to the forefront and allowing for enhanced system security.”

By utilizing Pinnacle’s System Clean Up Utility feature, the company says that system administrators can efficiently address neglected or overlooked access data such as expired cardholders, duplicate access levels and inactive cardholders.

This kind of inactive and outdated data compounds over time, threatening organizations with incidents caused by limitations in managing the continually changing state access rights within an access control system. Sielox says that Pinnacle’s proactive approach in removing such data promotes higher levels of security across the enterprise by mitigating risks and preventing insider threats.

Features

Within the Pinnacle Access Control Platform, there are eight tests that can be selected from the System Cleanup Utility that identify risky access data, including unused access levels, duplicate access levels, inactive cardholders and more. Running these tests allows administrators to identify associated criteria and provide immediate, remedial action.

Sielox says its Pinnacle Access Control Platform already offers hundreds of user-selectable filters to provide real-time data on virtually every aspect of access activity and system status, effectively transforming traditional proactive access control deployments into pre-emptive solutions for myriad physical security and business intelligence applications.

Newsletter
Receive the latest breaking news straight to your inbox