|
| Checkpoint Systems |
|
| Whether your equipment is deployed domestically or abroad, IsoSoft has the expertise and track record to engineer security industry specific systems that meet the highest standards. Many firms have participated in such projects, but few have the credentials to claim responsibility for architecting and deploying systems that keep our borders and the professionals who guard them safe. |
|
 | When a Chicago area imaging equipment developer needed to completely overhaul their cargo security checkpoint systems, they turned to the experts at IsoSoft Solutions to bring their industrial controls and software suite into the 21st century. Visit our Case Studies page or click on the image to the left to learn more. |
|
 | IsoSoft has engineered security systems for all scales. From manifest and document scanning, parts inspection and machine vision, to CT devices large enough to scan freight containers the size of a train car, IsoSoft has developed software and device controls that meet the demand. |
|
| Application Security |
|
| With today’s exchange regulations, system security has become an even greater focus of the financial world. IsoSoft Solutions has developed a security framework that ensures that only authorized users can view and manipulate valuable parts of your system, like the data cache. |
|
| IsoSoft provides a wide range of security and entitlement experience that can be easily integrated into new or existing platforms as dictated by the needs of the client. Our security APIs integrate seamlessly into the NT security model and work for both NTLM and Kerberos (Active Directory) security models. In addition, our API utilizes SQL Server to implement fully configurable role based permission and entitlement support. |
|
Our Security platform is comprised of the following modules: -
NT User and Group management for both Work Group and Domain based systems utilizing NTLM or Kerberos. -
Role based rules and permissions which integrate seamlessly with NT Group management and policy. -
Operating System and hardware privilege settings based on Groups and roles. -
Resource and file system permission and access control based on Groups and roles.
|