March 2006
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p78
Trade Publication
The article discusses the centralization of global corporate physical security of multinational companies. These systems are practically integrated with other business systems and controls that are very loosely connected with each other. Problems are then encountered in localized security processes, ad-hoc event handling, alarms and lack of holistic reporting from multi-vendor proprietary systems. INSETS: TiVo Era for Security;Healthcare Security Embraces Policy-based Systems.


Related Articles

  • Sergeant at alarms. Hackney, Claire // InTech;Sep2008, Vol. 55 Issue 9, p44 

    The article discusses the benefits of operations-owned alarm management (OOAM) in plant safety. According to the article, OOAM defines the need for the valuable alarms and identify unnecessary alarms. As much as possible, it troubleshoots the issue using the resources at their disposal. The...

  • 2G Failure Comes to Van Buren County -- EPS Security to The Rescue. Engebretson, David // SDM: Security Distributing & Marketing;Feb2016, Vol. 46 Issue 2, p98 

    The author discusses the security offered Engineered Protection Systems of Grand Rapids, Michigan after the firm installed the Honeywell Security Lynx Touch 7000 into his house. The author shares his dilemma of non-functioning 2G alarm transmitter in his vacation cabin which prompted him to...

  • FAA Computer Security: Recommendations to Address Continuing Weaknesses: GAO-01-171. Willemssen, Joel C. // GAO Reports;12/6/2000, p1 

    The Federal Aviation Administration's (FAA) agencywide computer security programs have serious, pervasive problems in the following key areas: personnel security, facility physical security, operational systems security, information systems security management, service continuity, and intrusion...

  • Security methods for livestock buildings including assessment aspects. Hart, J.; Štěrbová, Z.; Nídlová, V. // Agronomy Research;2015, Vol. 13 Issue 1, p231 

    The problem of security methods affects a large proportion of intrusion and hold-up alarm systems (I&HAS). In a time of increasing property crime, it is highly important for the security methods of livestock buildings to be able to achieve efficiency, reliability and faultlessness. In case it is...

  • Regulations are pushing users to outsource security management. Goodwin, Bill // Computer Weekly;9/21/2004, p6 

    The article reports that the number of businesses outsourcing management of their corporate security is set to surge, according to analyst firm Gartner Inc. Compliance is not the only issue driving this spending. Businesses are also realising they can reduce costs and achieve better protection...

  • PUSHING BOUNDARIES. Whitebusrt, Lindsay // SDM: Security Distributing & Marketing;Mar2004, Vol. 34 Issue 3, p81 

    Reports on the advancement of AES IntelliNet, a system that transmit alarm signals to a central station using radio waves, developed by AES Corp. that makes it possible to equip commercial building with working fire alarms in as little as an hour or two; Details on how AES IntelliNet operates;...

  • Reserving judgment on IDS death. Dix, John // Network World;7/14/2003, Vol. 20 Issue 28, p32 

    Editorial. Comments on the demise of the intrusion-detection systems. Difference of role from other security components; Popularity of intrusion detection systems.

  • Security shopping. Morey, Scott // Journal of Property Management;Jul/Aug2007, Vol. 72 Issue 4, p14 

    The article presents the author's views on the need for shopping centers to integrate security solutions. He notes that intrusion alarm, fire and life safety, and closed circuit television (CCTV) are needed to address layers of security. He states that security platform makes it easier for a...

  • Intrusion battleground evolves. Yocom, Betsy; Brown, Kevin // Network World;10/8/2001, Vol. 18 Issue 41, p53 

    Focuses on the intrusion detection system in hybrids of network-and server-based products and price fall. Details on the encrypted connection of host-based systems; Analysis of data ID system; Need to filter out false-positive alarms.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics