GEOACL

  Control Over Where And How much Access Allowed

  HOME » SOLUTIONS » SECURE ONLINE STORAGE, CLOUD SERVICES AND WEB HOSTING

SECURE ONLINE STORAGE, CLOUD SERVICES AND WEB HOSTING

Allow users to secure access to their accounts such as:

  • Internet based digital library
  • Network based cloud storage
  • Web hosting

Sample GEOACL Configuration & Working for Storage Provider

John Smith wants to do maintenance tasks such as purge older data, upload new data, create new data; manage folders, change security settings, connection details, from home area (Main street, Old Bridge, N.J.) only, and have read only access from home area as well as office area, (located at times square, New York city) using computing devices like PC or laptop or any other or using wireless devices or any other means of communication.

He wants this access from within say 2 mile radius from office location's center and 5 miles radius from home location's centre as well as the route that he is using to commute to office. He doesn't want to allow his data files to be accessed from any other location. Based on this requirement, whenever John accesses his medium our system will check his credentials and current geographical location against locations configured in system by John himself. When match found access given would be as per location.

Now even if John Smith's credential details to access his files get stolen anyhow, hacker must have to use it from locations configured by John Smith to be able to use it. So hacker would not be able to access his flies from any random location and if tried from within 2 miles radius of John's time square location then he would get limited access.

If John Smith receives alert indicating rejection or suspicious activity or become aware that his credential details are stolen he can immediately change it and or reduce radius and or cut down on locations allowed.