TITLE

Middleware's Value in Converged Networks

AUTHOR(S)
Freschi, Cynthia
PUB. DATE
January 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2008, Vol. 45 Issue 1, p71
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the significance of middleware usage in converged networks. It is said that an example of middleware usage is the one in automatic teller machines where the software manages auditing transactions. It allows various applications in physical security and surveillance such as access control, time and fire alarm. Moreover, it can link video in the database to related alarms or events generated from other systems.
ACCESSION #
28632792

 

Related Articles

  • Managing Security Monitoring in Enterprise Networks. Priescu, Iustin; Nicolăescu, Sebastian // Petroleum - Gas University of Ploiesti Bulletin, Mathematics - I;2008, Vol. 60 Issue 2, p53 

    A significant number of high profile cases of malicious software threats and incidents that have dominated media reporting for years have served to raise awareness and determine most businesses to invest time and resources into defending against this prevalent security issue. Security monitoring...

  • This means war.  // Network World;3/22/2004, Vol. 21 Issue 12, pS9 

    Reports that network managers and security vendors are exploring technologies and launching creative efforts to battle worm attacks that cost billions of dollars in fixes and lost productivity. The Weather Channel in Atlanta, Georgia uses MailMarshal filtering software from NetIQ. Texas Tech...

  • Safety Sensors Rise to New Heights. Hoske, Mark T. // Control Engineering;May2008, Vol. 55 Issue 5, p34 

    The article reports on the continuing maturity of safety sensor technology driven by the enhancement of devices with powerful self-diagnostics capabilities. The components of an integrated safety system include sensors, logic, and actuation with input/output (I/O) connections, networks and...

  • BEHIND THE SCENES.  // Financial Executive;Sep/Oct96, Vol. 12 Issue 5, p55 

    The article offers business news briefs related to computer and information technology. The new facsimile or fax services developed by Xpedite Systems controls international rates by lowering labor costs with a store-and-forward solution. An alliance that includes Network Systems Corp., Guidry...

  • Technology experts need to pause at times and appreciate a user's view of the world. Talley, Brooks; Pace, Mark // InfoWorld;12/27/99-1/3/00, Vol. 21 Issue 52/01, p58 

    Discusses the role of firewall in protecting a network. Importance for technology professionals to appreciate a user's view of the issue; Recommendation on where to learn about intro-level networking.

  • Using Automated Identity and Access Management Controls. Aldhizer III, George R.; Juras, Paul E.; Martin, Dale R. // CPA Journal;Sep2008, Vol. 78 Issue 9, p66 

    The article discusses the use of automated identity and access management (IAM) controls. Topics including the implementation of centralized and automated IAM, data tagging and central storage, and IAM controls and process are discussed. IAM controls are used to limit the access and disclosure...

  • HI/FN INTRODUCES CABLE MODEM SECURITY FOR SOHO.  // Modem Users News;Mar2000, p3 

    Introduces the 7901 cable modem security processor by Hi/fn Inc. in the United States. Extension of Virtual Private Networks in the broadband products found in small office/home office environments; Encryption and compression features of the product; Functionality of the 7901 VxWorks software...

  • Securing Your Network: A Service Guide for Bankers. Marjamaa, Leigh; Harwood, Melanie // Community Banker;May2003, Vol. 12 Issue 5, p37 

    Presents a service guide for bankers on banking networks security measures. Factors which reinforce the need for banks to protect their information; Things to consider in choosing a network technology security service; Significance of constant monitoring of the security service. INSETS: For...

  • Security Uses for Wireless Networks. Engebretson, David // SDM: Security Distributing & Marketing;Jan2005, Vol. 35 Issue 1, p66 

    The article reports on several electronic security systems. Many of today's electronic security systems are designed to operate on a communications or computer network. The common wireless network systems in use today fall under the general description of Wi-Fi, which stands for wireless...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics