IT Managers More Involved in Physical Security

August 2009
Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p16
Trade Publication
The article reports that several information technology managers prefer Internet protocol-based physical security products in the U.S. According to the IMS Research, there are estimated 60% of IT managers are purchasing physical security products, However, IMS also found that more than 40% of system integrators are not satisfied with other security products provided by their vendors.


Related Articles

  • How Safe Is the Cloud? Tillery, Steve // Baseline;Sep/Oct2010, Issue 106, p15 

    The article offers tips on how to improve information technology (IT) security systems of companies. It states that some of consumers perceive that engaging IT in cloud computing would be dangerous, however, it was stated that the IT security threats were not from the cloud but in the security...

  • IT SECURITY. Aitoro, Jill R. // Government Executive;6/15/2008, Vol. 40 Issue 7, p6 

    The article focuses on the standards set by the security framework, Essential Body of Knowledge (EBK), for information security skills, terminology and principles. EBK is an established framework of concepts that manage information technology security. EBK protect federal networks from...

  • Some things never change….  // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2011, p26 

    The article presents an expose of business managers' naive approach to information security which appeared in a 1969 issue of "Management Today." It cites incidents which showed that management were unaware of the risks undergone due to a false sense of security generated by the technical...

  • Companies are at risk from staff ignorance. Goodwill, Bill // Computer Weekly;2/27/2004, p14 

    IT security professionals have identified lack of awareness among employees and managers as the biggest obstacle to good information security in their organisations. A survey of IT security professionals in 200 organisations by "Computer Weekly" and the National Computing Centre showed that poor...

  • Internet Security: You Don's Get What You Pay For. Millman, Gregory J. // Financial Executive;Dec2003, Vol. 19 Issue 9, p51 

    This article presents a discussion over the importance of companies investing in Internet security programs. The author provides the results of a survey organized by the Computer Security Institute in 2003 that shows that a great deal is still unknown about the actual financial costs associated...

  • Searching for the Right Fit. Hawkey, Kirstie; Muidner, Kasia; Beznosov, Konstantin // IEEE Internet Computing;May-Jun2008, Vol. 12 Issue 3, p22 

    IT security professionals' effectiveness in an organization is influenced not only by how usable their security management tools are but also by how well the organization's security management model (SMM) fits. Finding the right SMM is critical but can be challenging — trade-offs are...

  • A security evangelist shares his best prevention practices.  // Network World;10/5/2009, Vol. 26 Issue 30, p8 

    The article offers information related to the best practices for information security from security and compliance evangelist John Linkous in the U.S. He emphasizes the difficulty of managing what one has if he or she knows what he has. He also mentions the importance of reducing the noise level...

  • 11 Important Facts to Know About IT Security. Vizard, Michael // Channel Insider;8/12/2014, p1 

    The article focuses on 11 important things to know when it comes to information technology (IT) security. Topics include the vulnerability of WordPress sites and point-of-sales (POS) systems, the avenues of IT attack, and the security expertise of solution providers. Information regarding the...

  • Building trust in global supply chains. Amon, Philippe // OECD Observer;2014 OECD Yearbook, p34 

    The article presents information related to SICPA Holding SA which helps to develops up-to-date tools for governments. According to SICPA, a holistic approach and proven expertise is required for implementing a successful track and trace system. It is mentioned that a modern tool box which can...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics