TITLE

Electronic Access Control Systems: The Foundation of Your PSIM

AUTHOR(S)
Jensen, Joel
PUB. DATE
June 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2009, Vol. 46 Issue 6, p54
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the use of electronic access control systems for physical security information management (PSIM). It highlights the consideration of the access control system in looking for the readiness in PSIM. It also indicates the things to be considered for the PSIM that include the continuity of operations plan in the organization, hazards plan, and the practice of incident command.
ACCESSION #
41522243

 

Related Articles

  • Controlling Privileged Accounts. DIODATI, MARK // Information Security;Jul2009, Vol. 11 Issue 7, p13 

    The article discusses the technology and strategies available for organizations to manage their privileged accounts. The privileged account management products help mitigate risks associated with elevated access via two mechanisms where the first mechanism forces the program to check out the...

  • Getting From Point A to Point B: What it Means to Take a Federated Approach. Irvin, Reed E. // Information Management Journal;Jun2009, Vol. 43 Issue 3, p46 

    The article discusses the benefits of taking a federated approach in managing records, e-mail archiving and e-discovery. It states that federation is the ability to access information and communicate between disparate content silos. In addition, the federation solution can help organization find...

  • A SECURE ARCHITECTURE IN HEALTH INFORMATION SYSTEMS. Toev, R.; Scutaru, M.; Iacobescu, T.; Romanca, M. // Bulletin of the Transilvania University of Brasov, Series I: Eng;2009, Vol. 2 Issue 51, p347 

    Hospital institutions' needs of high-availability data resources are ever growing, and accordingly there must be included reliable measures to control the access security to data bases. In this paper, we propose architecture, based on the SONA model that could tend to a hospital's data security...

  • CONSIDERATIONS REGARDING THE PROTECTION OF CLASSIFIED INFORMATION IN ELECTRONIC FORMAT. ┼×tef─ânescu, Teodor // Lex ET Scientia International Journal;2010, Vol. 17 Issue 2, p270 

    A common understanding of activity regarding the protection of classified information based on standards and policies is critical. In this respect the classified information protection in electronic format (INFOSEC) plays a vital role. In general terms, information security means protecting...

  • Privacy is dead. Briody, Dan // eWeek;9/18/2006, Vol. 23 Issue 37, p10 

    The article comments on the issue regarding the loss of privacy as a result of ongoing technological advancement in the U.S. The author claims that this loss of privacy is not caused by thieves but by companies themselves. The contribution of computer criminals in this phenomenon is their...

  • BioEnable Technologies launches eNBioAccess-T5.  // BioSpectrum;Sep2013, Vol. 11 Issue 9, p80 

    The article offers brief information on the eNBioAccess-T5 fingerprint attendance and access control system from BioEnable.

  • New OCLC Policy on Records Use. Hadro, Josh // Library Journal;12/1/2008, Vol. 133 Issue 20, p27 

    The article describes a revised policy from the Online Computer Library Center (OCLC) regarding the use of its WorldCat records. The policy, which was released on November 4, 2008, is reported to have raised some concern over its limitations for commercial and noncommercial use of bibliographic...

  • TRAIN USERS TO WORK SECURELY. King, Paul // IT Training;Jul2006, p15 

    The article offers various steps to counter external security threats in the information technology industry. It is important for every business to have a risk management strategy, not least because of the various new compliance legislations coming into force. An employer could adopt a closed...

  • e-Information Deluge Strains Records Management. Mont, Joe // Compliance Week;Jul2012, Vol. 9 Issue 102, p55 

    The article presents the results of the Iron Mountain Compliance Benchmark Report conducted by the global provider of information management services Iron Mountain Inc. on compliance risk assessment. The report reveals that the deluge of electronic information involves greater challenges for...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics