TITLE

It's 2010: Be Careful with your Convergence

AUTHOR(S)
Jensen, Joel
PUB. DATE
March 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p56
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents the author's views regarding his preferences on security solutions. He stresses that companies should be cautious in choosing the kind of security management system to use in order to address the problem of non-compatibility. He also stresses that he is much inclined with security technologies such as information storage devices and card access hardware. Moreover, he mentions that traditional security practices are still applicable despite the changing economy.
ACCESSION #
50800589

 

Related Articles

  • Understanding the two types of security virtualization. Freeze, Jim // Database & Network Journal;Jun2010, Vol. 40 Issue 3, p16 

    A conference paper on security virtualization which helps companies to dynamically manage the capacity of security infrastructure and apply the right combinations of security in the event of attack in traffic is presented. It discusses the types of security virtualization which combines software...

  • Managing Information Risk.  // CU360;3/3/2008, Vol. 34 Issue 5, p4 

    The article focuses on the need to measure the actual insider behavior for security purposes of the business in the U.S. The author stated that this will keep security aligned with the business and to lessen information risk and maximize reward. Trusted insiders worked no harm around security...

  • Lost in the Clouds. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;May2011, Vol. 48 Issue 5, p58 

    The article focuses on the use of cloud computing technology for security services that was featured in the International Security Conference (ISC) West in Las Vegas, Nevada in April 2011. It says that cloud computing is a computation, software and data access and storage service that does not...

  • Development of Maturity Model Evaluation Support Tool for EA(Enterprise Architecture) System. Kab-Seung Kou; Yong-Min Kim // Journal of Security Engineering;Oct2011, Vol. 8 Issue 5, p525 

    Information along with information about the development of increased investment, but in the systematic organization, promotion, the lack of comprehensive information and information systems with the introduction of the center unit features redundant investment and is a waste of resources...

  • INFORMATION SYSTEMS IN HR MANAGEMENT WITHIN INTERIOR AUTHORITIES AND THEIR IMPACT ON BUSINESS SECURITY. Blyok, Nataliya V.; Zhyvko, Mykhailo O.; Zhyvko, Oleksandra M. // Actual Problems of Economics / Aktual'ni Problemi Ekonomìki;2013, Vol. 149 Issue 11, p172 

    The paper examines the concept of "information" and the role of information systems within HR management of interior authorities along with their impact on business security provision. The functions of information systems and the process of working with information at police departments are...

  • Forming a culture of security. VICTOR, ADAM // New Hampshire Business Review;9/4/2015, Vol. 37 Issue 19, p24 

    The article offers tips for small businesses on how to create and maintain security culture which include establishing a policy, documenting internal information security policy, and adopting a security approach.

  • The Cause Is Also the Cure. Malcolm Harkins // People & Strategy;Winter2016, Vol. 39 Issue 1, p7 

    The author discusses the information security issues within the organization caused by the people. He emphasizes the results of the statistics concerning people's actions towards the implementation of information security in the organization. He also mentions several ways on how to manage...

  • Protecting your secrets. Meall, Lesley // Accountancy;Aug2007, Vol. 140 Issue 1368, p76 

    The article discusses the possible risks that companies face in 2007 due to technological advances in data storage products. Employees own devices that can store upwards of 80 gigabytes in a device that can fit in their pocket. Suggestions for security measures are provided that may help a...

  • 8 Security Headaches; Smart Card, Credentialing 'Aspirin'. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2013, Vol. 50 Issue 9, p88 

    The article focuses on management solutions for access and identity as well as logical and physical security in business enterprises. It states that chief security experts and officers emphasize that enterprises should focus on business needs and emerging risks. It mentions that the bring your...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics