TITLE

FIPS 201 and the PIV Card for the Enterprise

PUB. DATE
June 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p58
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the document entitled "Federal Information Processing Standard Publication 201 (FIPS 201): Personal Identity Verification (PIV) of Federal Employees and Contractors," which provides an identity management framework for business companies in the U.S.
ACCESSION #
53278894

 

Related Articles

  • None But The Brave. McCourt, Marc // Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p12 

    An introduction to the journal is presented in which the editor discusses an article on the profiles of top security leaders including Robert Chicarello of Brigham and Women's Hospital, John Martinicky of Navistar and Paul Stone of Best Buy, another on the value of security to organizations, and...

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...

  • Divided, we fall. Antonopoulos, Andreas // Network World;10/29/2007, Vol. 24 Issue 42, p26 

    The author comments on the effort towards computer security by businesses and industries. He assserts that the balance between company privacy and involvement of law enforcement need to address this concern. He cites several reasons why a company would choose to keep things quiet about the...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • A 2010 New Year's Resolution: Embrace Partnerships. Dunkel, Dan // SDM: Security Distributing & Marketing;Jan2010, Vol. 40 Issue 1, p40 

    The article focuses on the need for physical security professionals to partner with experts who could help them secure their business from network-based digital threats. It states that the industry is conservative and slow in recognizing new trends that it blocks partnership opportunities. It...

  • Making Information Actionable. Dunkel, Dan // SDM: Security Distributing & Marketing;Jul2011, Vol. 41 Issue 7, p66 

    The article reports on the approach to improve security management in business. It explains that additional capabilities to an existing physical security information management (PSIM) system can be provided through the integration of new information sets in order to improve overall security....

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics