TITLE

On Tour, But More Business Benefits

AUTHOR(S)
Zalud, Bill
PUB. DATE
June 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2009, Vol. 46 Issue 6, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the benefits offered by guard tour system to several businesses in the U.S. The system has allowed enterprises to gain more information for managing security, life safety, and the facilities. It has also been used in hospitals to protect staff, patients, and visitors. The systems being developed include Secure Trax from Wackenhut Corp., TourTrax from Digital Security Concepts, and PowerCheck system.
ACCESSION #
41522235

 

Related Articles

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...

  • The Forgotten and Oft-Neglected Door Closer. Johnson, Joel // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p46 

    The author discusses the significance of using door closer. He explains the myriad of uses and functions of the door closer in electronic card access applications and in providing physical security, user convenience and compliance. Moreover, the author emphasizes the benefits of the door closer...

  • The World is Flat and Spinning, and I'm Getting Dizzy. McCourt, Mark // SDM: Security Distributing & Marketing;Sep2011, Vol. 41 Issue 9, p15 

    The author reflects on the condition of the security systems industry in the U.S. He cites the journal's Industry Forecast Survey, which reveals that the sector will experience continued growth that will be driven by the increasing vigilance of business organizations to ensure the safety and...

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • Why Access Control and Identification is Healthy for Your Organization. Scaglione, Ben // Security: Solutions for Enterprise Security Leaders;Oct2011, Vol. 48 Issue 10, p60 

    The article discusses the significance of access control and identification for the organizations in the U.S. The author mentions that controlling access into and within a building or campus not only detects possible terrorist attacks, but reduces the opportunity for the commission of a crime or...

  • Approaching a Market Size for PSIM. Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p40 

    In this article the author focuses on the market size approach for physical security information management (PSIM) in the business security industry. He gives a clearer understanding on how PSIM works in the business and how security executives benefit from PSIM. He also presents a convergence...

  • Creating Security's Strategic Plan. Scaglione, Bernard // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p44 

    The author provides tips on how to create a strategic security plan. He cites the importance of considering the important elements in a security plan and defining the responsibilities and functions of the company's security department and personnel. The author advises to create an identification...

  • Securing Business, As Usual. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Sep2014, Vol. 51 Issue 9, p10 

    The article discusses the trends in security programs for businesses. It mentions the investments in security operations centers (SOCs), intelligence services and travel support companies as best practice for leading security programs. The author also presents scenarios that prove that leading...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics