It's Video Insecurity Time

September 2007
Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p116
Trade Publication
An interview with Steelbox Networks chief executive officer (CEO) and co-founder Richard Howes in the U.S. is presented. According to Howes, the market for networked video is growing because most businesses use it for facilities surveillance, customer contact, employee training and monitoring employee behavior. He states that security has been overlooked by manufacturers and developers which are trying to create new ways of using digital networked video.


Related Articles

  • Conflicts lead to tense times in security. Snyder, Joel // Network World;11/6/2006, Vol. 23 Issue 43, p31 

    The article comments on the issues concerning the information security industry. According to the author, one of them is the conflict between monitoring and privacy, wherein data protection with encryption and content inspection in the network are beginning to collide in many companies. Although...

  • An NVR That's Sure to Please.  // Security: Solutions for Enterprise Security Leaders;Nov2007, Vol. 44 Issue 11, p100 

    The article evaluates the 1000 network video recorder (NVR) from Steelbox Networks.

  • Taiwan's military made-in-China laptops may have been monitored from Mainland.  // East-Asia-Intel Reports;1/30/2009, p4 

    The article reports that the military's use of China-made laptop computers has violated the security rules in Taiwan. Legislator Gao Jyh-peng said that the computers were bought through a Chinese agent instead of one from Taiwan, which is said to be a scheme for Chinese electronic espionage and...

  • Firewalls guard perimeter.  // Security: Solutions for Enterprise Security Leaders;Jun99, Vol. 36 Issue 6, p81 

    Describes the features of perimeter-based security systems. Prevention of access to a company network through the use of firewall; Filtering of information that goes through the network; Application-level firewalls; Implementation of access control policy.

  • Monitoring' is key to network security.  // Computer Weekly;3/23/2010, p6 

    The article offers suggestions to information technology (IT)departments regarding network security. It suggests IT departments to direct their budget of IT security on network and systems monitoring. It further states that organizations should not concentrate only on protective measures but...

  • EXTENDED HITCOUTING TO ESTIMATE CARDINALTY. Giroire, Frédéric // Proceedings of the IADIS International Conference on WWW/Interne;Jan2006, p444 

    A new algorithm is introduced to estimate the number n of distinct elements in a multiset. This information has many applications in network monitoring and network security, as detecting Denial Of Service attacks. It is an extended version of the Hit Counting [WZT90]. Its combination with a...

  • Monitoring Systems. Cronin, Dennis // Mission Critical;Sep/Oct2009, Vol. 2 Issue 5, p9 

    The article discusses the endeavor utilized by data center operators in the U.S. to address the needs for continuous and reliable data monitoring. It mentions the installation of uninterruptible power supply (UPS) at the electric power monitoring system (EPMS) to continuously operate during...

  • Making digital forensics a critical part of your cyber security defenses. Lee, Robert M.; Luallen, Matthew E. // Consulting-Specifying Engineer;Jan/Feb2014, p32 

    The article discusses the use of digital forensic techniques for industrial control systems (ICSs) as a powerful defensive tool in the concepts for cyber security. It states that digital forensics focuses on the digital domain and fields including computer forensics, network forensics and mobile...

  • Integrated approach includes information security. Wood, Charles Cresson // Security: Solutions for Enterprise Security Leaders;Feb2000, Vol. 37 Issue 2, p43 

    Discusses the importance of a written information security policy in every organization especially with growth of the Internet and electronic commerce. Sample topics that should be included when creating an information security policy document; Purposes served by an information security policy....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics