TITLE

Charting a Final Course to Master Planning

AUTHOR(S)
Collins, Kurt W.
PUB. DATE
January 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on how businesses and industries in the U.S. can chart a final course master security planning. First is to understand the essence of security and its physical, technical and operational components. Next is to determine security techniques and technologies which best meet the needs. A master plan will have sub plans to address the three prime components of security and will need to be reviewed on a recurring basis.
ACCESSION #
28632778

 

Related Articles

  • Focus on planning. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jan1998, Vol. 35 Issue 1, p10 

    Focuses on the planning strategies of companies in the United States prior to their implementation of security systems. Plan of security executives to purchase more equipment according to the `SECURITY' magazine's forecast for 1998; Elements that lead security buyers to embrace emerging...

  • The Forgotten and Oft-Neglected Door Closer. Johnson, Joel // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p46 

    The author discusses the significance of using door closer. He explains the myriad of uses and functions of the door closer in electronic card access applications and in providing physical security, user convenience and compliance. Moreover, the author emphasizes the benefits of the door closer...

  • Best Practices to Manage Access for Temporary and Contract Workers. Dubin, Cindy H. // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p42 

    The article focuses on the best practices employed by companies to manage access for temporary and contract workers. It highlights the pre-emptive measures undertaken by Ace Hardware Corp. in performing same level screening for full- and part-time employees. It also suggests the importance of...

  • Securicom to Provide Managed Firewall Services to Alcatel-Lucent's Reseller Network.  // EmergingMarketsNOW;7/4/2008, p7 

    The article reports on the contract on firewall services, signed by information technology security consulting and management company Securicom, for the reseller network of Alcatel-Lucent in the East African region. Securicom will be involved in monitoring the security system of Alcatel-Lucent....

  • Gimme Some Disruptive Innovation! Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p20 

    The author challenges the information technology (IT) sector to bring its products and services to the physical security industry in the U.S. He contends that the short-term outlook does not bode well for the IT sector to deliver physical security changes. He wants the sector to create...

  • Rights Management Services. Foster, Karen // Windows IT Pro;Oct2004, Vol. 10 Issue 12, p17 

    Focuses on the survey conducted by Karen Forster to the readers regarding the application of Windows Rights Management Services (RMS) in securing the sensitive information of companies. Overview of the functionality of RMS; Discussion about the implementation and use of RMS; Main reasons why...

  • Approaching a Market Size for PSIM. Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p40 

    In this article the author focuses on the market size approach for physical security information management (PSIM) in the business security industry. He gives a clearer understanding on how PSIM works in the business and how security executives benefit from PSIM. He also presents a convergence...

  • Losing Customer Trust. Allen, Martin // Credit Control;2006, Vol. 27 Issue 2, p57 

    The article focuses on the effect of security breaches on companies in the banking and finance sector. Security breaches can have a devastating effect on companies, like Boeing Co. who lost a laptop containing personal financial data on 161,000 current and former employees. The author examines...

  • Challenging Corporate Thinking On Implementing IAM Solutions.  // Software World;Jan2010, Vol. 41 Issue 1, p12 

    The article reports on the implementation of identity and access management (IAM) solution for security business threats. It states that one of the most effective ways for companies to protect them against threats is effectively managing physical and logical access to high-value resources. It...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics