top of page
Lifestyle - Avigilon Alta Access - Standard Reader.JPG

Access Control

Expand your infrastructure with confidence using ITG Security's industry-leading access control solutions with Avigilon Alta, Salto, and more. Implement anywhere, manage from anywhere with Avigilon Alta's agile mobile access control, while Salto provides advanced, flexible, and secure access control solutions for all industry applications.

Scanner

Identification

Identification is the starting point, where the users provide information about their identity. Typically, identification is done by assigning a username. The process establishes a unique user that aims to provide accountability whenever they use the system. Today’s systems use authentication factors like fingerprint, retinal, or facial scans, which can be used to validate them in the system.

Authentication

The authorization stage is where pre-set permissions are granted to users who’ve proven their identity’s authenticity. A reference monitor or authorization matrix stores and provides control information, mediating access to users and deciding what level of clearance should be granted.

Lifestyle - Avigilon Alta Access - Video Reader Pro (1).JPG
Laptop Typing

Auditing and Accountability

The final factor of the access control system is accountability or audit. This way, if something goes wrong, you can trace what happened, including what data is accessed or retrieved and the total duration of each task. In this stage, your system can provide logs for auditing of permissions and use.

Security Cameras

Request More Info

Thanks for submitting!

©2025 by intelligent technology group.

bottom of page