TITLE

Monitoring Multiple Sites

PUB. DATE
August 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p36
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the innovations in enterprise security. The innovations in technology and interactive security solutions can simultaneously monitor as many sites as necessary. It also cites some security innovations in the banking industry to deter crime and to better protect assets and facilities.
ACCESSION #
21973108

 

Related Articles

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • MANAGEMENT OF INFORMATION SECURITY: CHALLENGES AND RESEARCH DIRECTIONS.  // Communications of the Association for Information Systems;2007, Vol. 20, p958 

    Over the past decade management of information systems security has emerged to be a challenging task. Given the increased dependence of businesses on computer-based systems and networks, vulnerabilities of systems abound. Clearly, exclusive reliance on either the technical or the managerial...

  • Remote access growth calls for re-examination of CPE security measures. Keeter, Bryan M. // Telecommunications - Americas Edition;Jun94, Vol. 28 Issue 6, p55 

    Examines the implications of advances in telecommuting to the security of a business enterprise. Toll fraud liabilities; Remote access to voice and data processing systems; Keeping hackers out of systems.

  • FIPS 201 and the PIV Card for the Enterprise.  // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p58 

    The article reports on the document entitled "Federal Information Processing Standard Publication 201 (FIPS 201): Personal Identity Verification (PIV) of Federal Employees and Contractors," which provides an identity management framework for business companies in the U.S.

  • None But The Brave. McCourt, Marc // Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p12 

    An introduction to the journal is presented in which the editor discusses an article on the profiles of top security leaders including Robert Chicarello of Brigham and Women's Hospital, John Martinicky of Navistar and Paul Stone of Best Buy, another on the value of security to organizations, and...

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...

  • Divided, we fall. Antonopoulos, Andreas // Network World;10/29/2007, Vol. 24 Issue 42, p26 

    The author comments on the effort towards computer security by businesses and industries. He assserts that the balance between company privacy and involvement of law enforcement need to address this concern. He cites several reasons why a company would choose to keep things quiet about the...

  • ISSUES OF TECHNOLOGY: A STUDY OF PAKISTANI CONTEXT IN THE BANKING SECTOR. Ahmed, Waqar; Qayym, Shehzada Khurram; Ansari, Zaheer Abbas; Alam, Mujeeb // International Journal of Organizational Innovation;Fall2009, Vol. 2 Issue 2, p71 

    The purpose of this paper was to test the presence of technology adoption issues in Pakistani banking sector. A survey of 151 banking sector employees and customers revealed that trust, lack of resource, services and security concern are the major issues in technology adoption in banking sector....

  • Mobile Banking 2.0: Was There a First Wave? Sraeel, Holy // Bank Technology News;Nov2007, Vol. 20 Issue 11, p8 

    The author reflects on the introduction of mobile banking 2.0 into the banking industry. She agrees that 2.0 does bring both benefits and disadvantages to industry players. As to advantages, she claims that 2.0 will better aid the customers. As to its disadvantages, however, she cites "Mobile...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics