Just Enough Security

Olzak, Tom
September 2006
Security: Solutions for Enterprise Security Leaders;Sep2006, Vol. 43 Issue 9, p114
Trade Publication
The article focuses on the just enough security (JES) model which introduce controls in effect of protecting information assets and the creation of a security program. The JES model is for planning, implementing and managing information security effort in an organization. While, the basis for any security program would be of management support which should be contained effective policies, enough budgets and consistent enforcement.


Related Articles

  • DoorKing, Inc.  // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p56 

    The article features the corporate profile of DoorKing, Inc. in Inglewood, California. It mentions that the company is considered as the prime producer of innovative security-related products provided for the access control industry in the U.S. It highlights the products that are usually...

  • BIFM TRAINING.  // FM World;1/30/2014, Vol. 11 Issue 2, p40 

    The article discusses the importance of pro-activity among facility managers (FM) for the success of a security program. Topics addressed include many FMs' responsibility for corporate security portfolios, the necessity of performing detailed risk and threat assessments, and knowledge of...

  • Locking the Keys Up. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Aug2005, Vol. 42 Issue 8, p42 

    Features the Keybank, KeyWatcher and BodyTag BT-002 security systems used by security executives at condominiums, retirement complexes, apartment buildings, and residential hotels in the U.S. History of manufacturing mechanical locks; Discussion of their features; Advantages of using them.

  • UTM.  // SC Magazine: For IT Security Professionals (15476693);Dec2011, Vol. 22 Issue 12, p53 

    The article offers information on the use of unified threat management (UTM) tool. It says that a next-generation UTM developer must learn new ideas in protecting the advertise, and must look for a platform which can provide an infrastructure for the accomplishment of security tasks. It states...

  • Bosch Security Systems, Inc.  // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p56 

    The article features the corporate profile of Bosch Security Systems, Inc. in the U.S. It mentions that the said company has launched "THINK IP" as one of the firm's latest security products and cites its capability of making decision based on various events in an automatic mode. In addition,...

  • The SEVEN DEADLY SINS in warehouse security. Kuzeljevich, Julia // Canadian Transportation & Logistics;Apr2006, Vol. 109 Issue 4, p44 

    The article offers information on security problems commonly encountered in warehouses. These include reliance on alarms and video cameras which do not work, waiting for internal theft to happen before implementing auditing programs, no regular updates on the checker of company stocks, and...

  • Hirsch Electronics Delivers High Security.  // Government Security;Dec2004, Vol. 3 Issue 7, p37 

    Identifies the high security features of products from Hirsch Electronics Corp. Mean time between failure for their most popular controllers; Alteration of a company's behaviors and access paths with a single mouse click; Strategies on how to deal with visitors to your building.

  • Functional System Secures Bank, Employees, Customers.  // SDM: Security Distributing & Marketing;Jun2013, Vol. 43 Issue 6, p93 

    The article reports that Atlantic Regional Federal Credit Union (ARFCU) is going to install new video surveillance system. ARFCU had analog- based security systems that were more than a decade old. The system only allowed video to be viewed by logging in and out between the two DVRs. ARFCU's...

  • Great Security.  // Security: Solutions for Enterprise Security Leaders;Apr2005, Vol. 42 Issue 4, p18 

    Looks into the integrated facility management system implemented by the government of the state of Michigan. Installation of security and technology solutions; Optimization of operational efficiencies with integrated systems; Establishment of advanced technologies for the state's overall...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics