Perimeter security

Results: 202



#Item
41OCTOBER 2004 ISSUE 8 NEWS2USE NIH PERIMETER SECURITY SYSTEM: IMPLEMENTATION PLANS

OCTOBER 2004 ISSUE 8 NEWS2USE NIH PERIMETER SECURITY SYSTEM: IMPLEMENTATION PLANS

Add to Reading List

Source URL: www.ors.od.nih.gov

Language: English - Date: 2011-05-19 12:25:22
    42Adopted unanimously by the Executive Committee on Wednesday, August 10, 2011 RESOLUTION ON A U.S. – CANADIAN SHARED VISION FOR PERIMETER SECURITY AND ECONOMIC COMPETITIVENESS WHEREAS, Canada and the United States benef

    Adopted unanimously by the Executive Committee on Wednesday, August 10, 2011 RESOLUTION ON A U.S. – CANADIAN SHARED VISION FOR PERIMETER SECURITY AND ECONOMIC COMPETITIVENESS WHEREAS, Canada and the United States benef

    Add to Reading List

    Source URL: www.csg-erc.org

    Language: English - Date: 2015-01-26 10:24:57
      43OCTOBER 2005 ISSUE 11 NEWS2USE 1 PERIMETER SECURITY PROGRAM IN PLACE

      OCTOBER 2005 ISSUE 11 NEWS2USE 1 PERIMETER SECURITY PROGRAM IN PLACE

      Add to Reading List

      Source URL: www.ors.od.nih.gov

      Language: English - Date: 2011-05-19 12:25:29
        44Siemens Selects Liteye Thermal cameras for Perimeter Security at European Infrastructure Site Centennial, CO, February 3rd, 2015 – Liteye Systems Inc. (www.Liteye.com), a developer and manufacturer of advanced thermal

        Siemens Selects Liteye Thermal cameras for Perimeter Security at European Infrastructure Site Centennial, CO, February 3rd, 2015 – Liteye Systems Inc. (www.Liteye.com), a developer and manufacturer of advanced thermal

        Add to Reading List

        Source URL: liteye.com

        Language: English - Date: 2015-04-05 08:58:29
          45Moving Beyond Perimeter-Based Security A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T

          Moving Beyond Perimeter-Based Security A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T

          Add to Reading List

          Source URL: www.temperednetworks.com

          Language: English - Date: 2015-02-09 20:16:27
            46Security for Complex Systems Definition of complex systems Diverse kinds of entities tightly coupled. Codes, hardware, user, network. Can’t worry about one aspect… creates blind spots. Poorly defined perimeter. Syste

            Security for Complex Systems Definition of complex systems Diverse kinds of entities tightly coupled. Codes, hardware, user, network. Can’t worry about one aspect… creates blind spots. Poorly defined perimeter. Syste

            Add to Reading List

            Source URL: sos.cs.virginia.edu

            Language: English - Date: 2008-11-21 11:08:58
              47GB-850  Gigabit Firewall UTM Appliance The GB-850 Firewall UTM Appliance is Global Technology Associates’ mid-range product for remote/branch corporate offices desiring total perimeter security.

              GB-850 Gigabit Firewall UTM Appliance The GB-850 Firewall UTM Appliance is Global Technology Associates’ mid-range product for remote/branch corporate offices desiring total perimeter security.

              Add to Reading List

              Source URL: totemguard.com

              Language: English - Date: 2015-01-21 05:21:38
                48Feature Brief: FireEye Integration  Global Protection Against Advanced Malware Together, OpenDNS and FireEye give you the power to block advanced malware behind and beyond the network perimeter,

                Feature Brief: FireEye Integration Global Protection Against Advanced Malware Together, OpenDNS and FireEye give you the power to block advanced malware behind and beyond the network perimeter,

                Add to Reading List

                Source URL: info.opendns.com

                Language: English - Date: 2015-07-19 04:19:31
                4928 MayPersistent Surveillance System (PSS) from Rheinmetall: widearea perimeter protection from above Reliable protection of commercial, strategic and military assets from attack requires persistent surveillance,

                28 MayPersistent Surveillance System (PSS) from Rheinmetall: widearea perimeter protection from above Reliable protection of commercial, strategic and military assets from attack requires persistent surveillance,

                Add to Reading List

                Source URL: www.rheinmetall-defence.com

                Language: English - Date: 2014-05-27 07:34:54
                50Soha Cloud: Instant Application Security for Enterprise Cloud Computing Environments The Soha Cloud creates a highly secure perimeter around your cloud applications protecting them from breaches, loss, and hijacking, whi

                Soha Cloud: Instant Application Security for Enterprise Cloud Computing Environments The Soha Cloud creates a highly secure perimeter around your cloud applications protecting them from breaches, loss, and hijacking, whi

                Add to Reading List

                Source URL: soha.io

                Language: English - Date: 2015-05-22 02:50:04