Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Advisory board to provide guidance on IT security directions
A group of experts has been formed to create an advisory board to LightCyber on security analytics and future technical and market directions
Research delves into enterprise IoT risks
ForeScout Technologies issues report on the risks faced by enterprises when deploying Internet of Things devices
Camera range now features built in analytics
Tyco brings intelligence to the network edge with video analytics now included on the latest range of Illustra IP surveillance cameras
VMS integration with PSIM product
Ocularis now works alongside Vidsys security management system in the latest integration to converge physical security products
Secure cloud based WiFi
Fully automatic wireless threat protection available with Watchguard WiFi Cloud for secure connectivity
Video surveillance portfolio improvements
The equip series of video surveillance cameras from Honeywell has been upgraded for improved application for business and industry
Behavioural profiling distribution network established in UK
LighCyber has established a distribution network of value added resellers within the UK for its behavioural profiling and machine learning system for attack mitigation
Web based access control software on show in Paris
TDSi is attending the Expoprotection event in Paris this month to unveil its latest GARDiS web based access control software to local audiences
Key vendor joins Adaptive Response Initiative
ForeScout Technologies is bringing CounterACT to the Splunk Adaptive Response Initiative to enable more coordinated response to advanced attacks
Majority release code without security testing
Survey from Veracode reveals the extent to which code is issued without the resolution of security issues or adequate testing
Suspect tracking added to video management system
The latest version of exacqVision video management system from Tyco includes a suspect tracking function for following objects of interest
Security for virtual car locking system
A virtual car key system for remote control using smartphones has been secured through partnership deal between Valeo and Gemalto
Automated Biometric Identity for Albuquerque police
Police department in Albuquerque adopts MorphoBIS as a cloud service for automated biometric identification
Secure single sign on for MS Azure AD
Collaboration between Microsoft and Ping Identity provides identity and access management through single sign on for Azure virtual environments
Cyber security warning to CCTV users
The BSIA is warning IP based surveillance system operators to be aware of the cyber security risks and ensure their systems are secure
Endpoint security with four critical elements
Intercept X from Sophos brings together four critical elements of endpoint security to reduce the chances of breaches
Access control contract at Newcastle university
Videx is supplying digital door entry systems for the protection of students at an accommodation development in Newcastle
Increased deployment options for privileged access manager
Centrify Privilege Service is now available in the cloud or on premises as well as through PIM as a service
Identity verification for Norwegian postal company
Posten Norge of Norway is tackling fraud and money laundering with the introduction of ID verification software from Gemalto
Angler exploit kit analysis
Kaspersky Lab takes part in the downfall of cyber criminal group responsible for the distribution of the Angler exploit kit
Vandal resistance built into perimeter protection camera
Thermal imaging camera for perimeter protection and intruder detection now features vandal resistance and video analytics
Integrated surveillance and intruder detection
Video management system from Wavestore integrated with intruder detection panels from Honeywell
Analytics and PSIM products on show at ASIS
Qognify is attending the ASIS event in Florida this year with its portfolio of VMS, PSIM and video analytics products
Incident management for PSIM products
Siveillance Viewpoint from Siemens adds command and control functions into integrated PSIM platforms
New malware campaign spreads backdoor access
ESET details the latest backdoor distribution, Nemucod which spreads ad-clicking backdoor malware
Film studio takes data access security product
Varonis has supplied Miramax with the means to set and enforce data access policies to protect the film studio's most valuable data
Consumer Internet of Things security acquisition
BullGuard is making the move into providing security for consumer Internet of Things products with the acquisition of Dojo Labs
Intruder detection systems at Security Essen
Optex is attending the Security Essen event this year with its intruder detection and people counting products
New face recognition algorithm included in SDK
The Sentiveillance 5.0 SDK from Neurotechnology now includes the latest biometric face recognition algorithms for use with CCTV surveillance cameras
IoT contributes to growth for Arxan
Mobile applications and the Internet of Things have driven increased demand for security and associated growth for Arxan Technologies
Security advice for landlords
The MLA is providing landlords with advice on safety and security ahead of the season when students return to university
Uncooled Long Wave Infrared modular camera
Stemmer Imaging releases the Calibir uncooled LWIR modular camera for multiple applications in the security and defence industries
Central management platform for wireless Protection
Sophos is providing simple protection of wireless networks through its cloud based management platform to avoid the need for on-premises servers
Unified security platform enhancements
Access control and surveillance integration as well as a new disaster recovery mode characterise the latest release of Genetec Security Center at version 5.5
Attack path vulnerability assessment
Black Hat sees the launch of ThreatMatrix Deception and Response Platform from Attivo for assessing attack path vulnerabilities
High growth in smart city security initiative
Kaspersky Lab details the progress made in the first year since the formation of the Securing Smart Cities initiative
Smartphone app keeps security operators informed
The latest VisionicGO application for mobile devices brings images and information from incidents into the hands of security operators
Cyber security for Williams telemetry systems
Thales is supplying the Williams formula one and engineering company with cyber security products for protecting telemetry transmissions
Synchronised encryption of data protection
Sophos releases SafeGuard 8 encryption product that follows data across devices and protects it from accidental leaks and theft
Fingerprint and face time and attendance
NCheck Bio Attendance is a new time and attendance system that makes use of either face or fingerprint biometric data
CCTV distributor protects premises with IR detectors
Perimeter security products from Optex are being used as part of the physical security to protect UK CCTV equipment distributor
Encryption ransomware discovery
PhishMe details the latest discovery of ransomware that using encryption and delivered by RockLoader.
Reducing cyber attack risks in industrial automation
Belden subsidiary, Tripwire, is now offering Configuration Compliance Manager for providing security to industrial automation systems
EBanking mobile security app for Russian bank
One time passwords will be used by Valyut Trans Bank's VTB24 service to provide security for eBanking customers
Remote management for explosive trace detector
Software from Morpho enables Itemiser 4DX explosive trace detectors to be connected remotely throughout airport facilities
Funding secured for behavioural attack detection system
LightCyber has secured a significant round of funding to drive sales growth of the Magna Behavioural Attack Detection platform
Through body scanners for Canadian prison service
Canadian ministry responsible for prisons in the country has placed orders for 29 Soter RS through-body scanning systems from ODSecurity
Industry experts join IT security company
BeyondTrust has taken on five industry leaders in a recruitment spree to fill a wide range of roles within the company
Key management system eases security at university
The Manchester Metropolitan university has taken key and asset management tracking equipment from Traka to improve campus security
Cyber security company sponsors archeological dig
The Archeological Society of Athens is gaining benefit from sponsorship from Kaspersky Lab for excavation and conservation work
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo