TITLE

Closing the Card Chasm

AUTHOR(S)
Hodgson, Karyn
PUB. DATE
January 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2006, Vol. 43 Issue 1, p34
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the new automated visitor management system from EasyLobby of Needham, Massachusetts. The use of regular security badges for visitors was still adopted at PTC, a software company. International Truck and Engine, Inc. (ITEI), even had written logs for visitors. Due to technological advancements, both companies upgraded the visitor management system. PTC integrated their access control system with the visitor badging system, while ITEI uses the business card scanner. INSET: Two Sides of Badging..
ACCESSION #
19567512

 

Related Articles

  • Backup and Recovery.  // Security: Solutions for Enterprise Security Leaders;Jan2006, Vol. 43 Issue 1, p54 

    The article features the Xpress Restore which provides disk-based backup and recovery solutions for Windows-based applications from FilesX Inc. It also includes surveillance video storage and retrieval. Its platform uses block-level snapshot technology from the video servers to capture...

  • Vista flaws exposed at Black Hat. Messmer, Ellen // Network World;8/7/2006, Vol. 23 Issue 30, p48 

    The article reports on Joanna Rutkowska's demonstration of the Microsoft's Vista beta software. Rutkowska demonstrated how it is possible to circumvent security in the Vista software. She installed a rootkit called Blue Pill in the software. From Singapore security firm Coseinc, she used the...

  • Cisco, IBM Integrate Business Security.  // Electronic News;3/8/2004, Vol. 50 Issue 10, pN.PAG 

    Reports on the intention of IBM and Cisco Systems to integrate various products to allow customers to build self-defending, security environments for systems, applications and networks. Benefits of the integrated security technologies; Computer software that will be delivered by the two...

  • EXTREME ENGINEERING UNVEILS FAST PMC SECURITY MODULE.  // Electro Manufacturing;Mar2004, p4 

    The article reports that Extreme Engineering Solutions, a design services and embedded products company has unveiled the XPedite2000 network security accelerator board, powered by the Cavium Networks NITROX Security Macro Processor. Cavium's software support includes a rich, full-featured set of...

  • Open source rides to the rescue of Windows.  // SC Magazine: For IT Security Professionals (UK Edition);Feb2006, p43 

    The article focuses on a computer flaw that occurred in December 2005. Such flaw was widespread that some claimed it was the worst single vulnerability in the history of Windows. Such incident prompted the information technology to react with preventative workarounds within hours. Signatures...

  • PLM simplifies product developments.  // Machine Design;7/21/2005, Vol. 77 Issue 14, p68 

    Reports that enhancements in Windchill 8.0 computer software from PTC Inc. simplify product development. Key features; Functions of Windchill PartsLink Classification and Reuse, a module of Windchill PDMLink.

  • Universal Focus...on the Customer. Klotz-Young, Heather // SDM: Security Distributing & Marketing;Aug2013, Vol. 43 Issue 8, p14 

    An introduction is presented in which the editor discusses reports within the issue on topics related to security systems including central stations, customer service, and mobile monitoring.

  • Business Security Guide.  // APC (Bauer Media Group);Aug2008, Vol. 28 Issue 8, p74 

    The article focuses on security issues related to small business. Despite the proliferation of security software and hardware, the threats to a small business network keep on increasing, mostly because employees need the web to do their work and will inevitably use it for personal tasks as well....

  • Start-up looks to lock down code. McMillan, Robert // Network World;2/6/2006, Vol. 23 Issue 5, p15 

    The article reports that start-up technology company Mu Security has created a device which makes network applications more secure. The still unnamed product is able to emulate millions of known hacker attacks and utilizes this ability as part of the quality-assurance procedures. The company has...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics