TITLE

Easy Lobby, Inc

PUB. DATE
October 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p99
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article profiles EasyLobby Inc., a company that was established to provide comprehensive software solution for electronic visitor management in the U.S. EasyLobby's list of products provide complete, secure visitor registration and web-based management and reporting. Considering the thousands of EasyLobby systems installed and operating worldwide, the company is the world's leader provider of secure visitor management solutions to private and public sector companies.
ACCESSION #
27148940

 

Related Articles

  • Integral Technologies, Inc.  // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p98 

    The article profiles Integral Technologies Inc, a worldwide provider of information technology (IT) security solutions which offers digital video management and access control security systems to organizations. It had specialized in the research, development, sales and support of security...

  • Getting IT Right.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p23 

    Discusses the collaboration between security and information technology (IT) executives. Purchasing of software and hardware; Mission to secure an organization's computer and information assets; Security directors' responsibility for information protection and traditional physical security;...

  • Coevolution.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p24 

    Discusses the evolution of the partnership between security system directors and information technology (IT) managers. Acceleration of technology into the security; Integration of security systems; Tools shared by IT and security; Organizations' increased demand for the seamless integration of...

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • Gimme Some Disruptive Innovation! Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p20 

    The author challenges the information technology (IT) sector to bring its products and services to the physical security industry in the U.S. He contends that the short-term outlook does not bode well for the IT sector to deliver physical security changes. He wants the sector to create...

  • It's in the Finger. Ting, David // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article focuses on the combination of biometrics and Enterprise Single Sign-On solutions in protecting physical and information technology-based resources from identity theft in the U.S. Most corporations implement strong multi-factor authentication policies to comply to strict mandates from...

  • Duos Technologies Inc.  // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p99 

    The article profiles Duos Technologies Inc, a Jacksonville, Florida company which is known for its turnkey technology strategies for the protection of critical infrastructure, transportation, industrial, healthcare and government sectors. Its core competencies include its proprietary object...

  • Third-Party IT Vendors Responsible For Most Compromised Data Systems: Report. Boyer, Meghan // CardLine;2/12/2010, Vol. 10 Issue 7, p17 

    The article reports that outsourced third-party information technology vendors handled most of compromised systems for businesses in 2009 according to the payment security firm Trustwave's "2010 Global Security Report". It notes that third-party vendors or their software were accountable for 81%...

  • What Does COBIT 5 Mean for Your Business? Anisingaraju, Sagar // COBIT Focus;Oct2013, Vol. 2013 Issue 4, p1 

    The article discusses the impacts of Control Objectives for Information and Related Technology (COBIT) 5, an information technology framework for governance and management of information technology (IT) businesses (GEIT). It mentions that the tool provides an end-to-end business view and overall...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics