IT Management  >   Systems Operations  >   Security  >  

Physical Security

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.Physical security is often overlooked (and its importance underestimated) in favor of more technical  … 
Definition continues below.
Physical SecurityReports
1 - 25 of 34 Matches Previous Page  | Next Page
Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

IBM

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Eliminate the hidden costs of records management
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn about the hidden costs of records management. Access detailed worksheets that will allow you to estimate your own company's savings opportunities in leveraging a solution that manages both electronic and physical records.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

Iron Mountain

Building the Right Mobile Security Toolkit
sponsored by SearchSecurity.com
EGUIDE: Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

SearchSecurity.com

Dedicated Transportation: Extra Care for Your Critical Data
sponsored by Iron Mountain
WEBCAST: Watch this brief demo to learn about Iron Mountain's new Dedicated Transportation service, which ensures the safe delivery of your data to its destination.
Posted: 12 May 2011 | Premiered: May 12, 2011

Iron Mountain

Securing Your Private Keys as Best Practice for Code Signing Certificates
sponsored by Thawte Inc.
WHITE PAPER: This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Seven Things to Look for in a Colocation Provider
sponsored by SAVVIS
WEBCAST: This resource outlines the difference between the data center and colocation services and explains the different types of colocation providers out there. In addition, view the top seven things you should look for in any potential colocation provider.
Posted: 29 Jul 2013 | Premiered: Dec 31, 2012

SAVVIS

Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

Manage Physical Access Control within a Virtual Server Environment
sponsored by RedCloud Security
WHITE PAPER: Explore how to manage physical access control within a virtual server environment. View this data sheet to uncover RedCloud Virtual, a web-based, access control virtual appliance that allows organizations to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

RedCloud Security

Achieving Disaster Recovery with Virtualization
sponsored by Dell Compellent
EBOOK: Implementing disaster recovery is both time consuming and costly. And as an IT pro, you are constantly on the look out for new strategies that can help make the process more cost-efficient. Learn how turning to virutalization can help simplify your disaster recovery initiatives and more.
Posted: 24 May 2011 | Published: 24 May 2011

Dell Compellent

Colocation Versus Managed Hosting
sponsored by Internap
WHITE PAPER: Access this resource guide to determine the differences between colocation and managed hosting when it comes to outsourcing for your organization.
Posted: 29 Apr 2011 | Published: 28 Apr 2011

Internap

Cloud-Based Data Protection
sponsored by Iron Mountain
DATA SHEET: To cope with growing data protection challenges, organizations are turning to cloud-based data protection for relief. Organizations are discovering that the sooner cloud-based data protection appears in their processes, the greater the benefits.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Iron Mountain

Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Skip the Disk
sponsored by Iron Mountain
WHITE PAPER: The demand for data storage is exploding, which is driving up costs, amplifying the risks of data loss or exposure, and complicating plans for disaster recovery. At the same time, mid-sized enterprises are migrating away from tape backup. They are learning to skip the disk. Read on to learn how skipping the disk can help you.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Unified network traffic monitoring for physical and VMware environments
sponsored by NetFort Technologies Ltd
WHITE PAPER: This white paper outlines an approach, based on monitoring network traffic, that delivers a unified view of network activity across virtual and physical components of the network.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

NetFort Technologies Ltd

Unified Physical Infrastructure℠ Solutions for the Data Center A Service Management Approach to IT Physical Infrastructure Management
sponsored by Panduit
WHITE PAPER: This white paper discusses how a DCIM solution based on the Unified Physical InfrastructureSM (UPI) approach brings visibility to the physical infrastructure components that support mission critical services. Armed with this solution, data center stakeholders have a more powerful service management toolset and so much more
Posted: 05 Oct 2010 | Published: 01 Sep 2010

Panduit

Laptop Locks: A Simple and Cost-Effective Approach to Data Loss Prevention
sponsored by Kensington
WHITE PAPER: This paper will educate IT decision makers on the need for physical security, how it can protect sensitive data, and how Kensington laptop locks can help.
Posted: 04 Oct 2010 | Published: 04 Oct 2010

Kensington

Determining Total Cost of Ownership for Data Center and Network Room Infrastructure
sponsored by APC by Schneider Electric
WHITE PAPER: This white paper describes an improved method for measuring TCO for data center and network room physical infrastructure, and provides examples on how to relate these costs to the overall IT infrastructure and evaluate cost control strategies.
Posted: 01 Apr 2010 | Published: 01 Feb 2005

APC by Schneider Electric

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations
sponsored by ArcSight, an HP Company
WHITE PAPER: This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out.
Posted: 02 Mar 2010 | Published: 02 Mar 2010

ArcSight, an HP Company

A Practical Guide to Cloud Computing Security
sponsored by Avanade
WHITE PAPER: Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

Avanade

ASG's Business Service Portfolio™ Virtualization Management
sponsored by ASG Software Solutions
WHITE PAPER: Read this paper to learn how ASG’s BSP Virtualization Management allows you to continually optimize and monitor the performance health of your entire physical and virtual environment, in addition to discovering application dependencies and reducing VM sprawl.
Posted: 08 Feb 2010 | Published: 08 Feb 2010

ASG Software Solutions

Achieving Financial and Functional Advantages in Connected Building Solutions with the Unified Physical Infrastructure℠(UPI)
sponsored by Panduit
WHITE PAPER: Read this paper to learn about being connected building planning requires tightly integrated, well-coordinated cross-functional communication and project management across four functional phases: organizational alignment, technology strategies, network design considerations, and financial analysis.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Panduit

The Unified Physical Infrastructure Approach
sponsored by Panduit
WHITE PAPER: In this paper, you'll learn that UPI-based solutions provide superior business value, helping customers keep pace with technology innovations and build a smarter, unified business foundation.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Panduit

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers
sponsored by Sophos, Inc.
WHITE PAPER: Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption.
Posted: 17 Jul 2009 | Published: 01 Jun 2009

Sophos, Inc.

Physical Security in Mission Critical Facilities
sponsored by APC by Schneider Electric
WHITE PAPER: This paper presents an overview of the principles of personnel identification and describes the basic elements and procedures used in security systems.
Posted: 04 Feb 2009 | Published: 03 Feb 2009

APC by Schneider Electric
1 - 25 of 34 Matches Previous Page    1 2    Next Page
 
PHYSICAL SECURITY DEFINITION (continued): …  and dramatic issues such as hacking, viruses, Trojans, and spyware. However, breaches of physical security can be carried out with little or no technical knowledge on the part of an attacker. Moreover, accidents and natural disasters are a part of everyday life, and in the long term, are inevitable.There are three main components to physical security. First, obstacles can be placed in the way of potential attackers and sites can be hardened against accidents and environmental disasters. Such measures can include multiple locks, fencing, walls, fireproof safes, and water sprinklers. Second, surveillance … 
Physical Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement