Organizations whose operations span cities, countries and even continents face formidable challenges in their efforts to secure people, property and assets.
- By Debjit Das
- Mar 01, 2012
Come and listen to the story of an Austrian named Glock, He and wife, Helga, made curtain rods in their shop, Then one day he invented a new handgun, And the Austrian army said, “We gotz to have us one.” Glock, that is. Lightweight. Model 17. Well, the first thing you know ol’ Glock’s a billionaire, Kinfolk said, “Gast’, export it away from there!” Said, “USA is the place it oughta be.” So he marketed it abroad to frontline security. The police, that is—needing new fire power.
- By Ronnie Rittenberry
- Mar 01, 2012
Advances in communication technology, trade barriers and production cost reductions have furthered global capital markets and provided new economic opportunities.
- By Ralph C. Jensen
- Mar 01, 2012
Veracode Inc. recently announced the availability of a whitepaper, ‘Outsourcing the problem of software security’, produced by primary research and analysis company, Quocirca.
Many people—even within the security industry—may be surprised to learn how traditional alarm dispatches work. It can be a lengthy process.
- By Megan Weadock
- Mar 01, 2012
Thales, provider of information systems and communications security, recently announced the publication of the 2011 Global Encryption Trends Study.
In order to allow an all-IP-based services platform, service providers are upgrading existing networks and migration strategies.
- By Terence Martin Breslin
- Mar 01, 2012
The Cloud Security Alliance (CSA) recently announced two significant new initiatives for 2012, addressing growing areas of need in cloud security -- mobile computing and innovation.
HID Global recently announced its highly-integrated fraud detection service from its Identity Assurance business, ActivIdentity.
Mission-critical facilities such as data and telecommunications centers must maintain operations without interruption.
- By Kris Cahill
- Mar 01, 2012