Perimeter security

Results: 202



#Item
41

OCTOBER 2004 ISSUE 8 NEWS2USE NIH PERIMETER SECURITY SYSTEM: IMPLEMENTATION PLANS

Add to Reading List

Source URL: www.ors.od.nih.gov

Language: English - Date: 2011-05-19 12:25:22
    42

    Adopted unanimously by the Executive Committee on Wednesday, August 10, 2011 RESOLUTION ON A U.S. – CANADIAN SHARED VISION FOR PERIMETER SECURITY AND ECONOMIC COMPETITIVENESS WHEREAS, Canada and the United States benef

    Add to Reading List

    Source URL: www.csg-erc.org

    Language: English - Date: 2015-01-26 10:24:57
      43

      OCTOBER 2005 ISSUE 11 NEWS2USE 1 PERIMETER SECURITY PROGRAM IN PLACE

      Add to Reading List

      Source URL: www.ors.od.nih.gov

      Language: English - Date: 2011-05-19 12:25:29
        44

        Siemens Selects Liteye Thermal cameras for Perimeter Security at European Infrastructure Site Centennial, CO, February 3rd, 2015 – Liteye Systems Inc. (www.Liteye.com), a developer and manufacturer of advanced thermal

        Add to Reading List

        Source URL: liteye.com

        Language: English - Date: 2015-04-05 08:58:29
          45

          Moving Beyond Perimeter-Based Security A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T

          Add to Reading List

          Source URL: www.temperednetworks.com

          Language: English - Date: 2015-02-09 20:16:27
            46

            Security for Complex Systems Definition of complex systems Diverse kinds of entities tightly coupled. Codes, hardware, user, network. Can’t worry about one aspect… creates blind spots. Poorly defined perimeter. Syste

            Add to Reading List

            Source URL: sos.cs.virginia.edu

            Language: English - Date: 2008-11-21 11:08:58
              47

              GB-850 Gigabit Firewall UTM Appliance The GB-850 Firewall UTM Appliance is Global Technology Associates’ mid-range product for remote/branch corporate offices desiring total perimeter security.

              Add to Reading List

              Source URL: totemguard.com

              Language: English - Date: 2015-01-21 05:21:38
                48Security / OpenDNS / Spamming / Malware / Network security / Botnet / Cloud computing / Computer security / Computing / Computer network security / FireEye /  Inc.

                Feature Brief: FireEye Integration Global Protection Against Advanced Malware Together, OpenDNS and FireEye give you the power to block advanced malware behind and beyond the network perimeter,

                Add to Reading List

                Source URL: info.opendns.com

                Language: English - Date: 2015-07-19 04:19:31
                49National security / Surveillance / Rheinmetall / Public safety / Security / Crime prevention / Law enforcement

                28 MayPersistent Surveillance System (PSS) from Rheinmetall: widearea perimeter protection from above Reliable protection of commercial, strategic and military assets from attack requires persistent surveillance,

                Add to Reading List

                Source URL: www.rheinmetall-defence.com

                Language: English - Date: 2014-05-27 07:34:54
                50

                Soha Cloud: Instant Application Security for Enterprise Cloud Computing Environments The Soha Cloud creates a highly secure perimeter around your cloud applications protecting them from breaches, loss, and hijacking, whi

                Add to Reading List

                Source URL: soha.io

                Language: English - Date: 2015-05-22 02:50:04
                  UPDATE