TITLE

POLICY-BASED SYSTEMS: Follow the Rules

PUB. DATE
March 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p78
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the centralization of global corporate physical security of multinational companies. These systems are practically integrated with other business systems and controls that are very loosely connected with each other. Problems are then encountered in localized security processes, ad-hoc event handling, alarms and lack of holistic reporting from multi-vendor proprietary systems. INSETS: TiVo Era for Security;Healthcare Security Embraces Policy-based Systems.
ACCESSION #
20081153

 

Related Articles

  • Sergeant at alarms. Hackney, Claire // InTech;Sep2008, Vol. 55 Issue 9, p44 

    The article discusses the benefits of operations-owned alarm management (OOAM) in plant safety. According to the article, OOAM defines the need for the valuable alarms and identify unnecessary alarms. As much as possible, it troubleshoots the issue using the resources at their disposal. The...

  • VideoMinex Purchases Remote Video Patrol.  // SDM: Security Distributing & Marketing;Feb2003, Vol. 33 Issue 2, p27 

    Focuses on the move of VideoMinex Inc. to purchase Remote Video Patrol (RVP) in the U.S. Security concepts of RVP; Enhancement of technology and management practices in RVP; Use of RVP for commercial security protection and remote video surveillance.

  • 2G Failure Comes to Van Buren County -- EPS Security to The Rescue. Engebretson, David // SDM: Security Distributing & Marketing;Feb2016, Vol. 46 Issue 2, p98 

    The author discusses the security offered Engineered Protection Systems of Grand Rapids, Michigan after the firm installed the Honeywell Security Lynx Touch 7000 into his house. The author shares his dilemma of non-functioning 2G alarm transmitter in his vacation cabin which prompted him to...

  • Georgia and Tennessee Police Chiefs Adopt Enhanced Call Verification. McFadden, Maggie // SDM: Security Distributing & Marketing;Oct2005, Vol. 35 Issue 10, p14 

    Reports that leaders of the Georgia and Tennessee Associations of Chiefs of Police have adopted enhanced call verification (ECV), an alarm management protocol, with the help of the Security Industry Alarm Coalition. Information about ECV; Commitment of both associations to reduce alarm...

  • FAA Computer Security: Recommendations to Address Continuing Weaknesses: GAO-01-171. Willemssen, Joel C. // GAO Reports;12/6/2000, p1 

    The Federal Aviation Administration's (FAA) agencywide computer security programs have serious, pervasive problems in the following key areas: personnel security, facility physical security, operational systems security, information systems security management, service continuity, and intrusion...

  • Security methods for livestock buildings including assessment aspects. Hart, J.; Štěrbová, Z.; Nídlová, V. // Agronomy Research;2015, Vol. 13 Issue 1, p231 

    The problem of security methods affects a large proportion of intrusion and hold-up alarm systems (I&HAS). In a time of increasing property crime, it is highly important for the security methods of livestock buildings to be able to achieve efficiency, reliability and faultlessness. In case it is...

  • Overexposure. Wallace, Thomas J. // Conde Nast Traveler;Jun2004, Vol. 39 Issue 6, p18 

    Focuses on the need for security in traveling and the issue of personal liberty. Detection of the invisible intrusions; Consideration of the incremental invasions of privacy by governments to be tolerable; Danger for the abuse and misuse of information.

  • Regulations are pushing users to outsource security management. Goodwin, Bill // Computer Weekly;9/21/2004, p6 

    The article reports that the number of businesses outsourcing management of their corporate security is set to surge, according to analyst firm Gartner Inc. Compliance is not the only issue driving this spending. Businesses are also realising they can reduce costs and achieve better protection...

  • PUSHING BOUNDARIES. Whitebusrt, Lindsay // SDM: Security Distributing & Marketing;Mar2004, Vol. 34 Issue 3, p81 

    Reports on the advancement of AES IntelliNet, a system that transmit alarm signals to a central station using radio waves, developed by AES Corp. that makes it possible to equip commercial building with working fire alarms in as little as an hour or two; Details on how AES IntelliNet operates;...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics