Electronic Surveillance

Electronic surveillance is the use of cameras and other technologies to monitor a physical location or to track a person or group of people. Often, electronic surveillance refers to guarding a data center or other sensitive area. The sector has changed drastically as video has gone from analog to digital. The use of IP networks makes it much easier to find a target -- a red car parked outside the data center, for instance - in a day's worth of video. IP also enables data to be disseminated instantaneously.


The New Face of Data Security Professionals: Women

A new report states that women possess the communication skills and diverse academic backgrounds needed to bolster security performance in the enterprise. More >

Phone Fraud on the Rise: Report

Pindrop Security claims that call centers are losing $0.57 per call due to fraud. More >

IPv6 Presents Opportunities and Risks

IPv6 promises improved network performance and better Internet accessibility, but many security experts say the standard also creates new dangers. More >

More Articles >


IAPP’s New Privacy Certification Addresses Emerging Landscape

New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.

More >

Making VDI More Secure

Don't ignore these potentially serious vulnerabilities.

More >

Data at Home and in the Cloud

Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.

More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Ten Hot Tech Skills Gaining Speed

Security Staffing

Given the ever evolving nature of technology, it's not surprising to find that some tech-related skill sets have done better than others. So which technology skills have ridden the wave to the biggest increases over the past year?

 More >

Citrix Focuses EMM Efforts on Workflow

Saks Incident Highlights Real Risks of Insider Threats

HP and Eucalyptus: Bold Stroke or Too Little, Too Late?

Carriers Are Embracing VoWiFi


Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

PCI Compliance: The Definitive Guide

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization mus...

Security17 Approximate Matching: Definition and Terminology

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can b...

Security3TN Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations

Transport Layer Security (TLS) provides mechanisms to protect sensitive data during electronic dissemination across networ...

IT_Man16-190x128 Managing Risk and Security in Outsourcing IT Services

The excerpt from chapter three addresses issues that should be considered before you decide to outsource, including securi...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.