TITLE

Growing and Thriving in the New Industry

AUTHOR(S)
Nuccio, Joe
PUB. DATE
May 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p66
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the advent of IT industry in the security industry, which has produced enormous growth opportunities for security systems integrators. New technologies are creating new opportunities that will help the integrators grow and thrive in this changing and ever-evolving industry. IT has really made a difference in the security industry, with IT integrators creeping into security, which is bringing challenges for security systems integrators. Now security companies have also acquired the skills to connect security systems and components to IT networks.
ACCESSION #
20920228

 

Related Articles

  • Drowning in signature libraries. Radcliff, Deborah // Network World;11/8/2004, Vol. 21 Issue 45, p44 

    This article points out that network security managers, drowning in signature libraries and reactive event information that is of little value in locating attacks in progress, are fed up with signature-based intrusion-detection systems (IDS) that have been the backbone of network security....

  • Blueprint for professional in IT security. Goodwin, Bill // Computer Weekly;2/18/2005, p12 

    This article reports that a group of IT professionals is attempting to establish a body that will give assurance that IT security staff have the right level of knowledge, skills and qualifications. For most employers, hiring IT security staff is a difficult challenge. The security profession has...

  • Put your right leg in and take your right leg out. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Jan2004, p9 

    Looks at the status of Internet security in the U.S. in January 2004. State of patch deployment in 2003; Reactions of lawmakers to spammers; Comments on the spread of computer viruses Code Red and Slammer; Forecast on the security of the information technology industry in 2004.

  • THE FREE WAY TO ASSESSMENTS. Ohlhorst, Frank J. // CRN;6/27/2005, Issue 1153, p22 

    The article author is of the view that the IT security market still offers ample opportunity for solution providers, but it is a market surrounded by mystery. While the savvy technologist can completely grasp the concepts of security, those writing the checks for security solutions often are...

  • Get Up-to-speed on Security Network Fundamentals. Koebbe, Paul // SDM: Security Distributing & Marketing;Oct2008, Vol. 38 Issue 10, p75 

    The article discusses the challenge faced by information technology (IT) installers in learning the concept of networking. It states that many security industry professionals are encountering more Internet protocol (IP)-technology projects who have not had the opportunity to learn the benefits...

  • DIGITAL PERSONA: RIGHT TOUCH WITH BIOMETRICS, SINGLE SIGN-ON SOLUTIONS. Ohlhorst, Frank J. // CRN;2/28/2005, Issue 1135, p55 

    Evaluates the DigitalPersona Pro for Active Directory Server security management system from DigitalPersona. Key features; Technologies incorporated in the biometrics-based solutions; Functions of the security management system.

  • 'We're All Witch Doctors'. Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Jun2008, Vol. 45 Issue 6, p24 

    The author reflects on how security industry personnel could manage risk which threatens clients. The author states that it is the task of the security personnel to keep unrelenting risk away from clients, by continuing to secure networks and the rest of the security apparatus to protect...

  • Convergence: uniting physical security and IT.  // Caribbean Business;7/19/2007, Vol. 35 Issue 28, p40 

    The article discusses the integration of physical security systems and Information Technology (IT) networks in the business enterprises in Puerto Rico to increase security effectiveness. The physical security is summarized into three parts such as obstacles, security alarms and security response...

  • IT leaders rattle security nerves. Himes, Matt // eWeek;5/8/2006, Vol. 23 Issue 19, p30 

    The article emphasizes the security strategies as product enhancement developed by large information technology (IT) vendors in the U.S. The IT vendors are seeking more defense features into their products which could increase the speedy changes in the market. Since the start of 2006, various IT...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics