TITLE

Knowledge is Power

AUTHOR(S)
Martin, Jennifer
PUB. DATE
May 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p62
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the power of knowledge in the security systems industry. Education has become the deciding factor in every success or failure with evolution of technology and the ever-increasing demand of sophisticated security systems from end-users. One driver for education is the current trend of convergence, which is bringing the IT and physical security worlds into one large entity. IP-based security systems are the wave of the future and system integrators and enterprise security operations need to familiarize themselves with courses such as CompTIA Network+, Cisco CCNA and CWNA.
ACCESSION #
20920224

 

Related Articles

  • Cast the runes to assess future risk. Lacey, David // SC Magazine: For IT Security Professionals (UK Edition);Nov2005, p24 

    Encourages information security executives to assess future risk to their network infrastructure rather than focus on historical incident data alone in developing countermeasures. Discussion on the trend in network security; Explanation on how to better predict emerging threats and exposures;...

  • Look after your network. Ecott, Tim // Computer Weekly;9/2/2003, p25 

    The article discusses issue of computer network security for the high technology industry. The experience in the industry has shown that businesses are becoming complacent and failing to test the resolve of their security measures. The importance of measures such as virtual private networks,...

  • Rights of Passage. Bowers, Tom // Information Security;Apr2005, Vol. 8 Issue 4, p44 

    Evaluates several products for network and information security in the U.S. as of April 2005. Check Point Integrity 5.0 from Check Point Software Technologies; Enterprise 1.5 from ENDFORCE; CyberGatekeeper 3.0 from InfoExpress; Endpoint Security Suite 3.0 from Senforce. INSETS: ABOUT THIS...

  • Converged security pays dividends. Ting, David // Network World;6/18/2007, Vol. 24 Issue 24, p32 

    The article discusses the significance of security convergence to users and security staff. According to the author, the benefits of security covergence include the promotion of subtle changes to employee behavior that increase overall security, strengthens ability for companies to enforce...

  • EXPERT TIPS ON IP-NETWORK SECURITY. Engebretsor, Joan // SDM: Security Distributing & Marketing;Sep2004, Vol. 34 Issue 9, p59 

    This article provides expert tips on Internet Protocol (IP) network security. More and more alarm dealers are beginning to experience the benefits of using the IP as an alternative to traditional alarm communication methods. This communication protocol, which works over a broad range of...

  • Doing your NAC policy homework. Clark, Dan // Network World;1/15/2007, Vol. 24 Issue 2, p21 

    The article reports on network access control (NAC) policy. NAC makes it possible to automate enforcement of security policy on enterprise networks. Its goal is to make sure that the network is not compromised by problem devices or unauthorized access. A policy stating that all computers must...

  • WEBSENSE SECURITY LABS REPORTS ADVANCED INTERNET THREATS.  // Worldwide Videotex Update;Oct2004, Vol. 23 Issue 10, pN.PAG 

    Reports on the launch of Websense Inc.'s Websense Security Labs which provides research and delivers information updates to Websense customers and the security community, helping them in making the network infrastructure secure. Operational details of Websense Security Labs; Mission of Websense...

  • A tough task. Anderberg, Ken // Communications News;May2005, Vol. 42 Issue 5, p3 

    This article discusses network security issues being faced by enterprise information technology (IT) professionals in the U.S. as of May 2005. Enterprise IT professionals are between a rock and a hard place when dealing with network security issues. On the one hand, the task of securing their...

  • Who Should Lead U.S. Cybersecurity Efforts? Newmeyer, Kevin P. // PRISM Security Studies Journal;Mar2012, Vol. 3 Issue 2, p115 

    The article reports on the cyber security threat in the U.S. It is stated that threats to computer systems, government and commercial networks and even private citizens' personal information have risen in recent years. It is mentioned that the U.S. Government has failed to address these threats...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics