Access Control

Yesterday I talked about how upgrades were causing problems for my virtual workplace, but there are other things that can cause more serious problems. In the past, IT organizations have combated network failures by not allowing users to access network components. At one point I was not even allowed administrator access on my own PC. Needless to say, I was not impressed.

There are solutions now that allow users access with very granular control and extensive logging. There are low cost solutions for home and small enterprise and larger systems used by networks managed by organizations like AT&T. The most sophisticated of these solutions are delivered on platforms that support clustering and redundancy, scaling from a single host to geographically distributed host clusters and redundant standby databases.

Nakina’s NIGuardian is such a system and has been deployed at Time/Warner Cable, AT&T, and a number of other very large service providers globally. The system allows administrators to log all network access with video logs of remote desktops and craft interfaces and text logs for terminal access. Administrators can define roles for users that control what commands can be issued on a predetermined set of devices.

NIGuardian maintains and rotates device passwords to insure security, while proxying access to users who have a single username and password to access any device on their access list. Organizations that have to make global changes to their access policies due to changes in their workforce or work action, can do so with a couple of clicks.

Because NIGuardian maintains all network device passwords, administrators can enhance their systems to add inventory and configuration management all on a single platform.

All of Nakina’s products are delivered on Oracle’s WebLogic server and user Oracle Databases which means they provide carrier class reliability, clustering, multi-version support, and redundancy for both databases and processes. For more on Nakina visit their web site at:

This entry was posted in Uncategorized and tagged , , , , , , , , . Bookmark the permalink.

One Response to Access Control

  1. Mojtaba says:

    Very neat Fred!

Leave a Reply

Your email address will not be published. Required fields are marked *