How does XyLoc help my organizations users comply with information security protocols?
XyLoc makes security convenient for users, so they are happy to comply. XyLoc is flexible enough to make the system as convenient for users as you want. XyLoc can prompt users to select their username and require a password, or allow them to be automatically logged as they approach a computer. Furthermore, XyLoc can determine when a security protocol is not being followed. For instance, XyLoc can determine when a Key is dormant, and therefore not being worn by the user. It can be configured so that if a user removes his Key for a few minutes, XyLoc locks access to his machine. Features like this ensure that users comply with security protocols with very little effort on their part.
Related Questions
- How can web-based information management systems help our church/organization comply with the security related issues of Canada’s Personal Information Protection and Electronic Documents Act?
- How can proper security policies and procedures help my organization?
- How can PharmEcology help an organization comply with RCRA?