Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Multi-authentication or card reader

Posted on 2016-09-12
4
Medium Priority
?
79 Views
Last Modified: 2016-10-02
We're looking for a solution for a new building where we'll be having both physical computers and VDI instances within a room and since there is no physical security in place at the moment, we'd like to see if there is anything available to first provide physical security onto rooms as well as to possibly lock the machines if no one is in the room.  Here are the specs for our opportunity:

650 users
Windows 8/10
computers include VDI instances and desktop
AD integrated
0
Comment
Question by:Jay Devon
  • 2
4 Comments
 
LVL 57

Assisted Solution

by:McKnife
McKnife earned 500 total points (awarded by participants)
ID: 41794963
To auto-lock/-unlock, there are techniques available, look at http://www.makeuseof.com/tag/lock-windows-computer-bluetooth-proximity-lock-utility/ - under the keyword "proximity", you can search for further info.
0
 
LVL 2

Assisted Solution

by:Dillyn Barber
Dillyn Barber earned 500 total points (awarded by participants)
ID: 41795297
It may be personal preference on my end, but in my opinion, Bluetooth can be hacked. When I was in the service we used common access cards with a smart chip reader (unclassified public information) which I absolutely fell in love with the security of having such. I still have a smart card reader for my laptop.

Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of ROM, 256 kilobytes of programmable ROM, and a 16-bit microprocessor. The smart card uses a serial interface and receives its power from external sources like a card reader. The processor uses a limited instruction set for applications such as cryptography.

You can use smart cards for web and hardware authentication (doors, unlocking hard drives, authenticating in terminals, accessing certain domains and web pages).

More info can be found here: https://technet.microsoft.com/en-us/library/dd277362.aspx
0
 
LVL 65

Accepted Solution

by:
btan earned 1000 total points (awarded by participants)
ID: 41795433
probably can look into contactless smartcard for physical access and machine authentication. The C1150 is available as a hybrid card with a contact chip and one or several RFID chips for physical access.
https://www.hidglobal.com/products/cards-and-credentials/crescendo/c1150
Besides it can be used as a smartcard for the WIndow login, it serves also for physical access as a RFID card
Secure solution for RFID deployments

To meet the needs of current physical access control customers, the card can be customized with the “physical access control” technologies you can choose from HID iCLASS®, iCLASS SE®, MIFARE®, MIFARE DESFire® EV1, HID or Indala® proximity, and other combinations through multi-technology Crescendo cards. The cards offer a variety of combinations of contactless technologies embedded in a single card
brochure - https://www.hidglobal.com/sites/default/files/resource_files/crescendo-smart-card-series-br-en.pdf
0
 
LVL 65

Expert Comment

by:btan
ID: 41825218
Suggested card access means and lock machine approach.
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It is a real story and is one of my scariest tech experiences. Most users think that IT experts like us know how to fix all computer problems. However, if there is a time constraint and you MUST not fail the task or you will lose your job, a simple …
How to fix a SonicWall Gateway Anti-Virus firewall blocking automatic updates to apps like Windows, Adobe, Symantec, etc.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question