TITLE

It's Cool! But Is It Right For You?

AUTHOR(S)
Mast, Brent
PUB. DATE
May 2011
SOURCE
Security: Solutions for Enterprise Security Leaders;May2011, Vol. 48 Issue 5, p52
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on some things to consider by organizations before using new technologies for security purposes such as physical security information management (PSIM), video management system (VMS), and identity management. It says that an organization should first think if the said technologies may really help security officers in fixing problems. It adds that before benefiting from the said technologies, an organization needs systems that provide correct date on the right assets.
ACCESSION #
60798300

 

Related Articles

  • The benefits of multi-application smart card technology. Kunz, Volker // Database & Network Journal;Apr2010, Vol. 40 Issue 2, p20 

    The article discusses the potential benefit of smart card to corporations, hospitals, government agencies and any organisation which seeks improvement to security solutions. It mentions that multi-application smart cards are appropriate valuable tool for protecting physical security and assets...

  • 3 Key Steps to Implement an Overseas Security Project. Ladd, J. Matthew // Security: Solutions for Enterprise Security Leaders;Mar2015, p60 

    The article offers three important steps on how to deal a global security problem. It cites the three ways which include working with an open-platform such as Lenel that can make the process of finding integration and solution support partners easier. The importance of identifying the barrier...

  • STEP 4 - SECURITY STRATEGIC PLAN.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p169 

    The article discusses the fourth step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. The section focuses on how to set out strategic plan appropriate to get management approval and develop a blue...

  • Not Your Average Printer Accessories.  // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p28 

    Highlights the latest technology in identification cards as of September 2005. Cards implanted with a tamper-resistant hologram within the layers of plastic cards; Pre-printed text on ID cards; Opacity marked cards; Pre-printed serial numbers.

  • STEP 2- GAP ANALYSIS.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p29 

    The article discusses the second step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security measures. The goal of this phase is to identify the gaps between the model facility and the current situation. It...

  • STEP 3 - GAP CLOSURE.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p71 

    The article discusses the third step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. This phase prompt to mitigate the various risks identified in the second step through consideration and evaluation...

  • Security.  // A-Z of Facilities & Property Management;2006, p307 

    A discussion on security from a chapter of the book "A-Z of Facilities & Property Management" is presented. Security challenges arise in a wide range of circumstances. These could include admitting and controlling visitors, dealing with deliveries to the premises, and preventing confidential...

  • Securing the Small Lobby. Marquette, Sue // Security: Solutions for Enterprise Security Leaders;Jan2011, Vol. 48 Issue 1, p42 

    The article reports on the initiative of the Plaza South Association in Fort Lauderdale, Florida to place a computerized tracking system to its lobby for security management.

  • Keeping Access Simple. Mesenbrink, John // Security: Solutions for Enterprise Security Leaders;Dec2003, Vol. 40 Issue 11, p27 

    Looks into the use of access control technology for the security of establishments in the U.S. Factors considered by end users in the choice of access control technologies; Advantages in the use of the technology by the firms; Features of the developed control systems.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics