Physical Security

  • 5 Affordable Biometric Time Clocks

    A biometric time clock records time and attendance of employees. It allows a company to keep track of payroll, it is accurate and reduces errors, and it eliminates buddy punching. It can use handprint or fingerprint scanners to read the information. Break...
    By George Garza January 26, 2011 

  • What is a Biometric Reader?

    A biometric reader is an electronic device that determines a person's identity by detecting and matching individual physical characteristics. There are a variety of biometric readers that make personal identification easy and accurate. Some are inexpensive;...
    By George Garza January 19, 2011 

  • Biometric Devices: They Provide IT Security

    If you need a device that can provide IT security, security experts agree that a biometric device could be your solution for a secure environment. They are biological authenticators, which identify and verify personnel. Biometrics in IT security are effective...
    By Daniel Brecht January 4, 2011 

  • Physical Security Threat Assessments

    Security threats can come from a variety of sources and if the threat is physical, then the question is how real is it and what will be the impact of the threat if the physical threat materializes. Actual assessments depend on how the threats are perceived...
    By George Garza September 12, 2010 

  • Biometric Identification: Ethical Issues

    There are many ethical issues that concern biometric identification. There are, however, ways to overcome them... Read on.
    By Daniel Brecht September 3, 2010 

  • Using Retina Scans for Identification

    When we think of retina scans, many of us think James Bond and super spy techie stuff. Retina scans are used for identification and they have been for quite some time. Here we look at the technology and where they’re being utilized.
    By Jean Scheid August 28, 2010 

  • Conducting a Computer Physical Security Audit

    Conducting a computer physical security audit is something that needs to be not only planned for but also carried out and adhered to. Understanding why it is important is a first step in getting the actual audit done.
    By Finn Orfano June 20, 2010 

  • Data Center Physical Security Checklist

    Data centers continue to drive and dominate business operations. They house all of the relevant and imperative data for not just business operations but for continuity as well. Developing a Data Center Physical Security Checklist helps you understand...
    By Finn Orfano June 19, 2010 

showing 21-28 of 28    < Previous  |  page: 1 2 3  |  Next >