TITLE

It's the Business Basics with ID Convergence

AUTHOR(S)
Ritchey, Diane
PUB. DATE
March 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p82
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the employment of identification (ID) convergence in organizations as part of their security management systems. Colby DeRodeff cites some challenges that organizations will face in converging physical and logical security systems and teams which include the technical ones, large number of security devices, and the conflicts in correlating disparate information sources. The strategies and compliance for implementing identification management program are also stated.
ACCESSION #
50800596

 

Related Articles

  • FIPS 201 and the PIV Card for the Enterprise.  // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p58 

    The article reports on the document entitled "Federal Information Processing Standard Publication 201 (FIPS 201): Personal Identity Verification (PIV) of Federal Employees and Contractors," which provides an identity management framework for business companies in the U.S.

  • None But The Brave. McCourt, Marc // Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p12 

    An introduction to the journal is presented in which the editor discusses an article on the profiles of top security leaders including Robert Chicarello of Brigham and Women's Hospital, John Martinicky of Navistar and Paul Stone of Best Buy, another on the value of security to organizations, and...

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...

  • Divided, we fall. Antonopoulos, Andreas // Network World;10/29/2007, Vol. 24 Issue 42, p26 

    The author comments on the effort towards computer security by businesses and industries. He assserts that the balance between company privacy and involvement of law enforcement need to address this concern. He cites several reasons why a company would choose to keep things quiet about the...

  • Just Do It: Should CSOs Wear Nikes? McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Nov2007, Vol. 44 Issue 11, p12 

    The article focuses on the results of the 2007 Security 500 Survey of the journal "Security" in the U.S. The survey focused on the issue of providing information to the federal government for national security purposes and its implication on the data and security policies of corporations....

  • The First Day of School. Engebretson, David // SDM: Security Distributing & Marketing;Nov2010, Vol. 40 Issue 11, p101 

    The article focuses on the downloadable survey sheet available at www.slaytonsolutionsltd.com, which aims to help dealers gather information they need to program and install an internet protocol (IP)-enabled security device onto a client's network. It says that the basic information including...

  • MOTIVATING A SECURITY TEAM. BRIGGS, JOHN // FM World;8/15/2013, Vol. 10 Issue 15, p34 

    The article offers the author's advice on how to maintain the motivation and alertness of a building's security team. He mentions their role as an effective deterrent and robust line of defence for facilities where interventions such as electronic security access is unsuccessful. He also notes a...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics