TITLE

Big Bang Theory: Selecting Technology in Tough Economic Times

AUTHOR(S)
Boucherle, Paul
PUB. DATE
January 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2009, Vol. 46 Issue 1, p30
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses ways on how to choose a security technology during hard economic times. The tips aim to help to avoid confusion and uncertainty in attempting to make effective financial and technological decisions in choosing security solutions for enterprise wide applications. It mentions the importance of knowing baseline metrics and seeking for a real return on security investment.
ACCESSION #
36119703

 

Related Articles

  • A Business Case for Off-site Monitoring. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Aug2008, Vol. 45 Issue 8, p52 

    The article reports on the technological advances on remote security video monitoring in the U.S. It states that chief security officers can keep track of multiple facilities. It adds that among the uses of remote video surveillance systems are virtual guard tours in which a central station...

  • AIGIS MECHTRONICS LLC.  // Security: Solutions for Enterprise Security Leaders;Jan2006, Vol. 43 Issue 1, p80 

    The article presents a corporate profile of Aigis Mechtronics LLC, a leader in quick, innovative design solutions. The company has been manufacturing products for security systems from over 15 years. It offers variety of products like security turnstiles, cameras and the CrystalVueâ„¢ Public...

  • 5 Out-of-the-Box Applications for Video Analytics. Whiteman, John // SDM: Security Distributing & Marketing;Mar2009, Vol. 39 Issue 3, p96 

    The article provides information on the five innovative applications of how video analytics is being used in the mid-range market. The author states that the PTZ cameras, which is equipped with intelligent video appliances is connected to a video projection unit and provide vision-guided...

  • What's New About the "New Surveillance"?: Classifying for Change and Continuity. Marx, Gary T. // Knowledge, Technology & Policy;Spring2004, Vol. 17 Issue 1, p18 

    Discusses the study on the rapid changes in technologies used for surveillance. Three common responses to changes in contemporary survellnace technology; Social causes and consequences of high technology discovery of human spoors; Related literature; Shortcomings of popular definitions of...

  • A Blended Solution for a New Threat. Dunkel, Dan // SDM: Security Distributing & Marketing;Mar2009, Vol. 39 Issue 3, p50 

    The article discusses the importance of integrated solutions in managing the global increase of crimes in physical and cyber attacks. The author states that innovative physical security integrators will hire cyber expertise to manage the computer room to broaden the account opportunity for both...

  • THE BANK (Security) JOB. Pohle, Linda // SDM: Security Distributing & Marketing;Mar2009, Vol. 39 Issue 3, p109 

    The article highlights the importance of security systems in banks. The author states that bank security's most important job is to protect employees and customers. In addition, banks need higher security levels thus it is surrounded with layers of electronic protection such as alarms, video...

  • Gone Are the Days of the Specialist? Jacobson, Clarissa // Security: Solutions for Enterprise Security Leaders;Sep2006, Vol. 43 Issue 9, p110 

    The article focuses on the advancement of security systems for security management solutions. Several companies for several have been into technology innovations such Internet Protocol telephony, network, wireless, structured cabling, electrical, building controls, and audio create demand for...

  • The Conflicts from Legislation. Erickson, Don // Security: Solutions for Enterprise Security Leaders;May2008, Vol. 45 Issue 5, p80 

    The article discusses the impact of state and local policies regarding the use of technologies needed to secure hospitals, schools, mass transit systems, ports and the nation's critical infrastructure in the U.S. The author claims that when state legislation restricts the use of biometrics and...

  • Secure homes. Atlas, Randall // Futurist;Mar/Apr88, Vol. 22 Issue 2, p25 

    Discusses future home security measures and devices. Description basic defensible-space strategies, including natural access control, natural surveillance and territorial reinforcement; Current high-technology security systems, including the Kurzweil Voice System, which uses voice recognition...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics