It's 2010: Be Careful with your Convergence

Jensen, Joel
March 2010
Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p56
Trade Publication
The article presents the author's views regarding his preferences on security solutions. He stresses that companies should be cautious in choosing the kind of security management system to use in order to address the problem of non-compatibility. He also stresses that he is much inclined with security technologies such as information storage devices and card access hardware. Moreover, he mentions that traditional security practices are still applicable despite the changing economy.


Related Articles

  • Understanding the two types of security virtualization. Freeze, Jim // Database & Network Journal;Jun2010, Vol. 40 Issue 3, p16 

    A conference paper on security virtualization which helps companies to dynamically manage the capacity of security infrastructure and apply the right combinations of security in the event of attack in traffic is presented. It discusses the types of security virtualization which combines software...

  • Managing Information Risk.  // CU360;3/3/2008, Vol. 34 Issue 5, p4 

    The article focuses on the need to measure the actual insider behavior for security purposes of the business in the U.S. The author stated that this will keep security aligned with the business and to lessen information risk and maximize reward. Trusted insiders worked no harm around security...

  • Lost in the Clouds. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;May2011, Vol. 48 Issue 5, p58 

    The article focuses on the use of cloud computing technology for security services that was featured in the International Security Conference (ISC) West in Las Vegas, Nevada in April 2011. It says that cloud computing is a computation, software and data access and storage service that does not...

  • Development of Maturity Model Evaluation Support Tool for EA(Enterprise Architecture) System. Kab-Seung Kou; Yong-Min Kim // Journal of Security Engineering;Oct2011, Vol. 8 Issue 5, p525 

    Information along with information about the development of increased investment, but in the systematic organization, promotion, the lack of comprehensive information and information systems with the introduction of the center unit features redundant investment and is a waste of resources...

  • INFORMATION SYSTEMS IN HR MANAGEMENT WITHIN INTERIOR AUTHORITIES AND THEIR IMPACT ON BUSINESS SECURITY. Blyok, Nataliya V.; Zhyvko, Mykhailo O.; Zhyvko, Oleksandra M. // Actual Problems of Economics / Aktual'ni Problemi Ekonomìki;2013, Vol. 149 Issue 11, p172 

    The paper examines the concept of "information" and the role of information systems within HR management of interior authorities along with their impact on business security provision. The functions of information systems and the process of working with information at police departments are...

  • Forming a culture of security. VICTOR, ADAM // New Hampshire Business Review;9/4/2015, Vol. 37 Issue 19, p24 

    The article offers tips for small businesses on how to create and maintain security culture which include establishing a policy, documenting internal information security policy, and adopting a security approach.

  • Protecting your secrets. Meall, Lesley // Accountancy;Aug2007, Vol. 140 Issue 1368, p76 

    The article discusses the possible risks that companies face in 2007 due to technological advances in data storage products. Employees own devices that can store upwards of 80 gigabytes in a device that can fit in their pocket. Suggestions for security measures are provided that may help a...

  • The Cause Is Also the Cure. Malcolm Harkins // People & Strategy;Winter2016, Vol. 39 Issue 1, p7 

    The author discusses the information security issues within the organization caused by the people. He emphasizes the results of the statistics concerning people's actions towards the implementation of information security in the organization. He also mentions several ways on how to manage...

  • Who Holds the Cards? Veldman, Stephanie // BEEF;Dec2004, Vol. 41 Issue 4, p42 

    The article reports that the access to information is the question the beef industry needs answered as the framework is being laid for the National Animal Identification System (NAIS). Government regulators and industry leaders are trying to determine that answer as discussions continue on...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics