You're Smart to Use Intelligence

March 2009
Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p76
Trade Publication
The article focuses on the contribution of business intelligence tools in securing business operation in the U.S. It highlights the growing evidence that those enterprises and their security departments that employ business intelligence tools have a better bottom line compared to those underperforming retailers. It also presents survey findings on how these security tools have improved shrink reduction and provided better performing store operations.


Related Articles

  • Inaugurations, BlackBerries and Porta-potties. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p106 

    The article evaluates several business intelligence tools used during the inauguration of U.S. President Barack Obama including the Portapotty portable toilets, Barack's Beast Cadillac limousine and electronic maps.

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • Northwest Electronic Security Has the Latest in Biometric Systems.  // Caribbean Business;10/27/2005, Vol. 33 Issue 42, pS10 

    Focuses on ACTAtek, the world's only biometric and smart card authentication system using encrypted and secure Web-based, real time communication, by Northwestern Electronic Security. Benefits of the biometric system; Functions of the system; Impact of the system on the security management industry.

  • Opportunities Exist for the Federal Housing Finance Agency to Improve Controls. Wilshusen, Gregory C.; Barkakati, Nabajyoti // GAO Reports;4/30/2010, preceding p1 

    The Federal Housing Finance Agency (FHFA) relies extensively on computerized systems to carry out its mission to provide effective supervision, regulation, and housing mission oversight of the Federal National Mortgage Association (Fannie Mae), the Federal Home Loan Mortgage Corporation (Freddie...

  • Campus Graduates to Intelligent Video.  // Security: Solutions for Enterprise Security Leaders;Nov2005, Vol. 42 Issue 11, p16 

    Focuses on the installation of surveillance systems in John Hopkins University. Significance of the behavior recognition software solutions; Selection of Cernium's Perceptrak system for the university; Features and capabilities of the system. INSET: 'See' More Like Humans.

  • Automatic Electronic Identity Provides Information Security. Jirásek, Petr // Signal;Jun2011, Vol. 65 Issue 10, p61 

    The article describes the Automatic Liberal and User-Centric Electronic Identity (ALUCID) security system designed and developed by ANECT using the electronic identities infrastructure principle. The system also employed the five main principles of automatic electronic identity (EI) which...

  • PAYPAL ADDS TWO-FACTOR AUTHENTICATION TO MOBILE PHONES.  // CardLine;11/28/2008, Vol. 8 Issue 48, p3 

    The article reports on the new security authentication for Paypal Inc. account holders in San Jose, California. A text message is sent to customers who have registered before they log on to their accounts. Another additional security system uses a small electronic icon that generates a unique...

  • Protection against cyber snoopers.  // International Fire & Security Product News;Oct2003, Vol. 28 Issue 5, p6 

    Focuses on the electronic security protection offered by Panasonic's BM-DT120 Authenticam Iris Recognition System. Features of the system.

  • Migrating from Keys: It's All in the Journey. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Nov2013, Vol. 50 Issue 11, p122 

    The article discusses the migration from keys and locks into electronic access controls. It mentions that such move involves the focus of enterprise security leaders and their integrators on the security and business benefits of electronic access controls. It notes that the improvement...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics