TITLE

Determining and Implementing Successful Access Control Solutions

AUTHOR(S)
Scaglione, Bernard
PUB. DATE
January 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Jan2009, Vol. 46 Issue 1, p42
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses ways in determining and implementing successful access control solutions. It mentions that chief strategy officers (CSOs) have the responsibility to protect huge amounts of electronic and paper information. It states that security practitioners need to survey to determine if access control principles are integrated in their security program and should use the Crime Prevention through Environmental Design (CPTED).
ACCESSION #
36119710

 

Related Articles

  • Access control with added reserve.  // International Fire & Security Product News;Oct2004, Vol. 29 Issue 5, p4 

    Features the Bewator Entro access control system developed for organisations which require a high level of security but also need a user-friendly system. Advantage of using the reservation facility of the system; Applications of the system; Importance of the access control card.

  • Combining Biometrics with ESSO.  // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article presents the advantages of combining a biometrics with ESSO solution. A biometric-enabled ESSO solution matches each user by correlating against known set of references taking into account. The solution captures images at higher speeds resulting in less image blur distortion. The...

  • The fine art of patience. Ollman, Gunter // SC Magazine: For IT Security Professionals (UK Edition);Oct2004, p24 

    This article focuses on the advantages of an early security system testing. As businesses attempt to improve their development processes by accelerating their release schedules, there can often be a detrimental knock-on effect to the security of the application. Whether the application is...

  • A BELÉPTETŐ RENDSZEREK HELYE ÉS SZEREPE A VAGYONVÉDELEMBEN. Ákos, Bunyitai // Hadmérnök;dec2011, Vol. 6 Issue 4, p17 

    This short article is for investigate the access control system's functions in security. It gives a brief summary of the main definitions. Beyond the theoretical negotiation also includes practical support.

  • Consistency Adds to Access Effectiveness. Dingle, Jeffrey // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p52 

    The article reports on the implications of an access control system. Access control varies from specifically controlling access to assuring that people entering a facility do not have weapons or explosives. The U.S. government has developed an access control system that requires positive...

  • Top View: 'Intelligent' Dawn. DeFina, Frank // Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, p42 

    This article presents information on modern surveillance systems. The security industry is on the cusp of a new era in technology that will have a significant impact the way security systems will be designed, implemented and controlled. People believe that systems integration is one of the key...

  • Requirements For Card-to-Exit. Deteinne, Scott // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p18 

    Reports on the evolution of code provisions to indirectly permit use of card-to-exit systems for access-controlled egress doors. Request by owners and managers of secured facilities for a card-to-exit system for select doors in an effort to monitor persons leaving the secured room; Unlocking of...

  • PC-Based Access Control System. Yin Yin Soe; Hnin Si; Maung Maung Latt // Proceedings of World Academy of Science: Engineering & Technolog;Feb2009 Supplement, Vol. 50, p1195 

    This paper allows authorized user to gain access to the facility. It can be used as starting point for multiple facility access control systems. This research work will describe the design, integration, test, and final delivery of a facility access system. That incorporates the microcontroller,...

  • Gates: We'll make security our forte. Fontana, John // Network World;8/2/2004, Vol. 21 Issue 31, p1 

    Security will come to be seen as a strength of the Microsoft Corp. So says Bill Gates, who raised the bar so significantly in July 2004, when he told financial analysts that ongoing development projects will transform security from a concern for them into something that is significant, unique...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics