As Printers Diverge
- What Really is Suspicious Activity? Jones, Duane // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p48
The article focuses on the concept of suspicious activity in computer systems and describes methods for chief security officers and employees to detect such activities. The article notes the importance of understanding what constitutes suspicious activity and what indicates suspicious activity....
- False Alarms--False Hope? // SDM: Security Distributing & Marketing;Jul2002, Vol. 32 Issue 7, p8
Editorial. Focuses on the security alarm industry's struggle in the U.S. to reduce false security alarms. Need for proper allocation of resources by the security alarm industry; Impact of false security alarms on the security alarm industry.
- Product Solutions Outdoor Protection. // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p8
Features products for outdoor protection chosen by 'Security Magazine' editors. Philips' AutoDome camera; Silent Witness' V294A Angledome wedge style camera; Senstar-Stellar Corp.'s Perimitrax, an outdoor buried cable intrusion detection sensor; Delta Scientific's IP500 portable barriers.
- Extending the Perimeter. // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p11
Reports that security buyers have extended the perimeter monitored by electronic security systems. Increase use of sensors and detectors; Shift from contracted central station to monitoring to proprietary monitoring; Technology advances since September 11th.
- ID Card Printers. // Security: Solutions for Enterprise Security Leaders;Feb2004, Vol. 41 Issue 2, p46
Presents a chart depicting details of the identification card printers comparing suppliers' products in the U.S. as of February 2004.
- Sensor. // Government Security;Mar2006, Vol. 5 Issue 2, p44
The article features the Secure Fence long distance perimeter sensor system by Future Fibre Technologies. The system has Threat-Level Adaptive Zoning capability that protects the perimeters up to 50 miles. The sensor can also make parameter adjustments with concern to alarm detection sensitivity...
- Add-on Security. // SDM: Security Distributing & Marketing;Nov2006, Vol. 36 Issue 11, p87
The article focuses on the importance of knowing security options of customers when assessing their security needs for an identification badging progam in the U.S. Add-on security features are said to help dealers and integrators meet the needs of customers, while bringing in more revenues....
- What's Inside Printers Spurs More Secure Cards. Kaplan, Laurence J. // Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, p20
This article discusses issues related to the security of identity systems. Identification (ID) cards have come a long way. From flimsy paper cards with grainy photos and illegible signatures, the ID card has evolved into a technological marvel that can sport everything from tamper-proof UV...
- When to 'Stay off the Main Highway' and Use a Parallel Network. // SDM: Security Distributing & Marketing;Feb2004, Vol. 34 Issue 2, p36
Provides tips on the number of options available that can be used to connect network cameras. Philosophies underlying the EIA/TIA 568 cabling standard; Use of unused conductors in connecting network devices and cameras; Consideration when approaching and installing network security system.