Electronic Access Control Systems: The Foundation of Your PSIM

Jensen, Joel
June 2009
Security: Solutions for Enterprise Security Leaders;Jun2009, Vol. 46 Issue 6, p54
Trade Publication
The article focuses on the use of electronic access control systems for physical security information management (PSIM). It highlights the consideration of the access control system in looking for the readiness in PSIM. It also indicates the things to be considered for the PSIM that include the continuity of operations plan in the organization, hazards plan, and the practice of incident command.


Related Articles

  • VMWARE AND CITRIX XENSERVER MEET AT THE N-SQUARE CORRAL.  // eWeek;3/24/2008, Vol. 25 Issue 10, p52 

    The author talks on the annual N-Square dinner hosted by Internet Research Group held in Palo Alto, California. He cited the discussions made by Nand Mulchandani, a senior director at VMware Corp. and Simon Crosby, chief technology officer of XenSource at Citrix Systems. He states that the issue...

  • Three IPS products pass security evaluation tests. Messmer, Ellen // Network World;6/26/2006, Vol. 23 Issue 25, p8 

    The article reports on the result issued by ICSA Labs presenting the three intrusion-prevention systems (IPS) products that have passed from its required performance and accuracy goals in the U.S. Out of ten products submitted by marketers for ICSA evaluation, only three were able to meet the...

  • A new take on host-based IPS. Garcia, Andrew // eWeek;2/5/2007, Vol. 24 Issue 5, p33 

    The article focuses on the two techniques for providing host intrusion prevention system (HIPS) that complement to the strategies of business enterprises. These practical methods include vulnerability inspection and application and process vetting. Vulnerability inspection is performed to...

  • Information Security: Vulnerabilities in DOE's Systems for Unclassified Civilian Research: AIMD-00-140.  // GAO Reports;6/9/2000, p1 

    Unclassified information systems for scientific research are not consistently protected at all Department of Energy (DOE) laboratories. Although some laboratories are taking significant steps to strengthen access controls, many systems remain vulnerable. In four recent cases, Internet attacks...

  • Managing Physical Security Information. Webster, Mike // Construction Specifier;Jun2013, Vol. 66 Issue 6, p66 

    Physical security systems have become a comprehensive professional, functional, and technological domain. The most recent and significant development is physical security information management (PSIM)--a software and professional services solution requiring a non-traditional approach to...

  • Mission Essential Vulnerability Assessments - Try Them, You Just Might Like Them.  // Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p52 

    The article features a new concept tool called Mission Essential Vulnerability Assessments (MEVA) in the U.S. The MEVA concept allows a security expert to justify expenses in a clear and concise manner. Moreover, MEVA assessment allows accountants, executives and other non-security management...

  • Information Security: Federal Agencies Show Mixed Progress in Implementing Statutory Requirements: GAO-06-527T. Wilshusen, Gregory C. // GAO Reports;3/17/2006, p1 

    For many years, GAO has reported that ineffective information security is a widespread problem that has potentially devastating consequences. In its reports to Congress since 1997, GAO has identified information security as a governmentwide high-risk issue--most recently in January 2005. ...

  • IMPLEMENTATION OF CRYPTOGRAPHY FOR PRIVACY PRESERVING DATA MINING. Sharma, Anand; Ojha, Vibha // International Journal of Database Management Systems;Aug2010, Vol. 2 Issue 3, p57 

    Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the protection of sensible information has a relevant role. Thus privacy is becoming an increasingly important issue in...

  • Security Information and Event Management. Carr, David F. // Baseline;Aug2005, Issue 47, p83 

    This article presents information on security information and event management (SIEM) systems. SIEM systems help you gather, store, correlate and analyze security log data from many different information systems. This data may prove valuable as part of a network security organization's...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics