TITLE

Duos Technologies Inc

PUB. DATE
October 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p99
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article profiles Duos Technologies Inc, a Jacksonville, Florida company which is known for its turnkey technology strategies for the protection of critical infrastructure, transportation, industrial, healthcare and government sectors. Its core competencies include its proprietary object detection and behavioral analysis software and its open-structure control platform. In addition, it also goes beyond traditional security measures with state-of-the-art information technologies.
ACCESSION #
27148939

 

Related Articles

  • Coevolution.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p24 

    Discusses the evolution of the partnership between security system directors and information technology (IT) managers. Acceleration of technology into the security; Integration of security systems; Tools shared by IT and security; Organizations' increased demand for the seamless integration of...

  • Getting IT Right.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p23 

    Discusses the collaboration between security and information technology (IT) executives. Purchasing of software and hardware; Mission to secure an organization's computer and information assets; Security directors' responsibility for information protection and traditional physical security;...

  • Quiet the Perfect Cyber Crime Storm with Enterprise Threat and Risk Monitoring. Henry, Reed // Database & Network Journal;Jun2010, Vol. 40 Issue 3, p14 

    A conference paper on the prevention of cyber attacks to business enterprises' data is presented. It discusses the responses of companies to the security risks which include streamlining processes. It states that information technology should be prioritized and an enterprise threat and risk...

  • Gimme Some Disruptive Innovation! Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p20 

    The author challenges the information technology (IT) sector to bring its products and services to the physical security industry in the U.S. He contends that the short-term outlook does not bode well for the IT sector to deliver physical security changes. He wants the sector to create...

  • It's in the Finger. Ting, David // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article focuses on the combination of biometrics and Enterprise Single Sign-On solutions in protecting physical and information technology-based resources from identity theft in the U.S. Most corporations implement strong multi-factor authentication policies to comply to strict mandates from...

  • Third-Party IT Vendors Responsible For Most Compromised Data Systems: Report. Boyer, Meghan // CardLine;2/12/2010, Vol. 10 Issue 7, p17 

    The article reports that outsourced third-party information technology vendors handled most of compromised systems for businesses in 2009 according to the payment security firm Trustwave's "2010 Global Security Report". It notes that third-party vendors or their software were accountable for 81%...

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • What Does COBIT 5 Mean for Your Business? Anisingaraju, Sagar // COBIT Focus;Oct2013, Vol. 2013 Issue 4, p1 

    The article discusses the impacts of Control Objectives for Information and Related Technology (COBIT) 5, an information technology framework for governance and management of information technology (IT) businesses (GEIT). It mentions that the tool provides an end-to-end business view and overall...

  • Establishment of Improved Business Security Systems. Wookjae Cha; Dongho Won // World Academy of Science, Engineering & Technology;Feb2011, Issue 50, p1 

    No abstract available.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics