TITLE

A Gated Welcome, Plus

AUTHOR(S)
Zalud, Bill
PUB. DATE
October 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the uses of traditional gates and myriad technologies in security protection of facilities or business enterprises in the U.S. The most typical security solution is a gate. Perimeter security encompasses a number of different technologies. Some installations use active infrared, photoelectric or other types of beam detectors.
ACCESSION #
22710624

 

Related Articles

  • tech biz.  // NZ Business;Dec2005/Jan2006, Vol. 19 Issue 11, p57 

    The article presents information on technologies for business enterprises. The AcuLaser C/2600N laser printer from Epson can be used as a single toner monochrome printer. The PE7700 home theatre projector from BenQ was named Best Video Projector in the European EISA Best Product Awards. Symantec...

  • The Business of Security Systems Integration. Homet, Dave // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p64 

    The article discusses the impact of the consolidation of integrators on changes in the business of security systems integration. PSA membership and security integrators in general are made up of what is commonly known as small business enterprises. Today's security system integrators must be...

  • WEEK IN REVIEW.  // Long Island Business News (7/1993 to 5/2009);1/16/2004, Vol. 51 Issue 3, p7A 

    Presents news updates on business in Long Island, New York as of January 16, 2004. Campaign launched by the Long Island Software and Technology Network to stimulate funding for early-stage technology companies; Delays to the 2003 financial result publishing of Adecco SA; Delisting notice from...

  • IT execs feeling more heat as security woes multiply. Bednarz, Ann; Dubie, Denise // Network World;8/28/2006, Vol. 23 Issue 33, p1 

    The article focuses on the demand of several companies for greater information technology (IT) accountability due to computer security threats in the U.S. Ohio University has dismissed two senior IT people following news of five security vulnerabilities that exposed the sensitive records of...

  • Convergence Makes Service Bundling Easier for New Players. Enman, Carol // SDM: Security Distributing & Marketing;Apr2014, Vol. 44 Issue 4, p40 

    The article discusses issues related to the advantages of making convergence in the security systems industry. Topics discussed include importance of security to high technology industries, role of technology in the success of new business enterprises and how security and wireless communications...

  • Great Wall not enough. Coffee, Peter // eWeek;2/7/2005, Vol. 22 Issue 6, p55 

    In the controversy over IBM's sale of its PC business to a company in China, researchers find an important message about the changing nature of enterprise information security. Researchers used to get along with simple hierarchies of trust, providing a straightforward increase in privilege--from...

  • Skills in demand.  // SC Magazine: For IT Security Professionals (UK Edition);Feb2006, p19 

    The article presents information on the efforts being done by companies in February 2006 to outsource their security to a specialist firm. Such effort is part of a broader move to outsource information technology as a whole. Thus, managed service providers are starting to recruit to cope with...

  • Noted AND Noteworthy.  // U.S. Banker;Feb2006, Vol. 116 Issue 2, p16 

    The article reports on developments related to business in the U.S. Executives at the tiny Bank of Kenny installed a high-tech camera security system after being robbed in 2003 and it paid off big time when it netted clear images of a man attempting to rob the bank in July 2004. Online bill...

  • Untitled. Ashford, Warwick // Computer Weekly;10/7/2008, p40 

    The article focuses on the role of information technology (IT) security in business during tougher economic times. It indicates that the success of the strategy of the organisations allows them to do business securely. It also cites the adoption of a more Internet-centric model by several...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics