Weinberg, Neal
May 2000
Network World;05/08/2000, Vol. 17 Issue 19, p133
Trade Publication
Highlights the results of a survey conducted by Enterprise Management Associates concerning security features used by businesses in the United States to protect their networks. Most popular security feature; Percentage of respondents who consider their security infrastructure adequate; Types of biometrics favored by respondents.


Related Articles

  • BIOMETRICS EYES THE ENTERPRISE. Gaudin, Sharon // Network World;05/08/2000, Vol. 17 Issue 19, p129 

    Reports on the growing number of businesses that use biometric devices in ensuring data security in the United States. Capabilities of biometrics; Cost of the devices; Companies that manufacture biometric devices. INSET: NO SYSTEMS IS FOOLPROOF..

  • DON'T LET YOUR SECRETS OUT. Garrett, Alexander // Management Today;Apr2001, p92 

    Offers security tips for companies. Protection of business secrets; Computer network security; Classification of confidential files.

  • The Shifting Spyscape. Bartholomew, Doug // Industry Week/IW;11/02/98, Vol. 247 Issue 20, p31 

    Emphasizes the importance of security-management systems in business enterprises. Implications of the proliferation of new technologies; Results of a study conducted by the National Research Council; Information on Internet and network security products that are available as of November 2, 1998.

  • CyberCrisis: Whose Job Is It, Anyway? McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Feb2011, Vol. 48 Issue 2, p10 

    The article offers the author's insights on cybercrimes and cyber security in organizations. The author mentions the Security 500 Report that identified that only 20% of respondents administered cyber security for their organizations, indicating that 80% of organizations do not view cybercrime...

  • Flexible Workspaces. MALINI, N. // Dataquest;11/15/2012, Vol. 30 Issue 21, p72 

    The article focuses on the implementation and enforcement of bring your own device (BYOD) strategy to ensure security of corporate data and networks in India. It notes that in the BYOD strategy, organizations should define which devices and operating systems should be supported while mobile...

  • Vigilance is price of profit.  // Computer Weekly;3/27/2007, p34 

    The article reflects on the importance of security measures to protect data of a business enterprise. It observes that as technology changes, threats come from different directions, affecting security of business processes. As per the article, though business enterprises concentrated on the...

  • Managing the Incident to Mitigate the Threats. Stewart, J. Kelly // Security: Solutions for Enterprise Security Leaders;Apr2014, Vol. 51 Issue 4, p38 

    The article presents security incident-reporting strategies to manage incidents within a particular organization. It mentions that every department within the organization to reveal known and perceived vulnerabilities and threats should conduct a Business Impact Analysis. It states that a...

  • DevSecOps: Taking a DevOps Approach to Security. Brown, James // Database & Network Journal;Apr2015, Vol. 45 Issue 2, p17 

    The article focuses on embracing the DevSecOps, informational site for security and business practitioners to incorporate security, at business organizations. It discusses security tips for DevOps which includes understanding the cloud components being used, and the required security controls...

  • Monitoring Multiple Sites.  // Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p36 

    The article reports on the innovations in enterprise security. The innovations in technology and interactive security solutions can simultaneously monitor as many sites as necessary. It also cites some security innovations in the banking industry to deter crime and to better protect assets and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics