TITLE

Many Vendors; So Little Time…

AUTHOR(S)
Price, Scott
PUB. DATE
May 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents the author's views on the Homeland Security Presidential Directive 12 (HSPD-12), a business management security solution. HSPD-12 is a directive that sets into motion an aggressive timeline for government departments and agencies to develop and implement a mandatory, government-wide standard for secure and reliable forms of identification for federal employees and contractors. According to the author, HSDP-12, will fetch great benefits for the federal agencies, contractor firms and even corporate operations. This card-connected technology is likely to reduce the security costs of the business enterprises by 40 to 60 percent over the traditional approaches. INSET: Challenging Background.
ACCESSION #
20920212

 

Related Articles

  • Industrial Hygiene ABCs. Haas, Jonathan M. // Professional Safety;Mar2005, Vol. 50 Issue 3, p38 

    Reports on the system for rating and ranking chemical and physical health hazards in the workplace in the U.S. Determination of the chemicals used and its physical effect; Calculation on the rate of exposure time on chemicals; Availability of sufficient industrial hygiene monitoring data.

  • TECHnically Safe Gaining 360° Visibility With Technology. Thiveos, Peter // Professional Safety;Apr2009, Vol. 54 Issue 4, p54 

    The article focuses on the need for corporations to understand the business requirements related to industrial safety management. It discusses the condition of businesses that needs protection from psychological, financial or emotional harm that requires substantial commitment within the...

  • Addressing Safety and Security To Enhance Profits. Garrigan, John M. // Risk Management (00355593);Aug90, Vol. 37 Issue 8, p46 

    This article discusses the need for companies to address industrial safety and security to enhance business profits. Risk managers must be embraced as a means for business to identify areas of risk, determine the likelihood of occurrence and reduce company exposure. This is accomplished through...

  • Managing in Tough Times. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p20 

    The article discusses the contribution and significance of security systems to businesses in the U.S. It highlights the importance of security systems to the performance of businesses, considering that system security should be attuned the business. In addition, it cites the perspectives and...

  • Approaching a Market Size for PSIM. Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p40 

    In this article the author focuses on the market size approach for physical security information management (PSIM) in the business security industry. He gives a clearer understanding on how PSIM works in the business and how security executives benefit from PSIM. He also presents a convergence...

  • Selling Secrets. Baker, Glenn // New Zealand Management;Jul2004, Vol. 51 Issue 6, p54 

    Focuses on ways to secure business enterprises. Threats of technological innovation to businesses; Advantages of a spyware software to the security of companies; Importance of the staff to ensure an effective enterprise security. INSET: DOCUMENT DESTRUCTION.

  • Could that be the wireless police knocking? McNamara, Paul // Network World;7/24/2006, Vol. 23 Issue 28, p68 

    The article examines the importance of securing personal wireless access point properly. Several states and governments have required business owners to integrated safe wireless practices. Bryan Welch of Canoa Ranch takes credit for broaching the wireless security mandate with the project...

  • Proactive Prevention. Johnson, David L. // Leadership Excellence Essentials;Jan2014, Vol. 31 Issue 1, p36 

    The article focuses on the importance of proactive risk prevention for organizational leaders. Security tasks are often handled by managers and owners at small operations while the Chief Security Officer or Director of Security handles those in large organizations. The investment in developing...

  • Making corporate security second nature. Dubie, Denise // Network World;8/7/2006, Vol. 23 Issue 30, p19 

    The article reports on making corporate security a second priority in a four-part series on the toughest security issues affecting the enterprise. It explains that the prioritization is more about decreasing risk in everyday practices than encountering threats. It states that part of the reason...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics