Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Secure cloud based WiFi
Fully automatic wireless threat protection available with Watchguard WiFi Cloud for secure connectivity
Video surveillance portfolio improvements
The equip series of video surveillance cameras from Honeywell has been upgraded for improved application for business and industry
Behavioural profiling distribution network established in UK
LighCyber has established a distribution network of value added resellers within the UK for its behavioural profiling and machine learning system for attack mitigation
Web based access control software on show in Paris
TDSi is attending the Expoprotection event in Paris this month to unveil its latest GARDiS web based access control software to local audiences
Key vendor joins Adaptive Response Initiative
ForeScout Technologies is bringing CounterACT to the Splunk Adaptive Response Initiative to enable more coordinated response to advanced attacks
Majority release code without security testing
Survey from Veracode reveals the extent to which code is issued without the resolution of security issues or adequate testing
Suspect tracking added to video management system
The latest version of exacqVision video management system from Tyco includes a suspect tracking function for following objects of interest
Security for virtual car locking system
A virtual car key system for remote control using smartphones has been secured through partnership deal between Valeo and Gemalto
Automated Biometric Identity for Albuquerque police
Police department in Albuquerque adopts MorphoBIS as a cloud service for automated biometric identification
Secure single sign on for MS Azure AD
Collaboration between Microsoft and Ping Identity provides identity and access management through single sign on for Azure virtual environments
Cyber security warning to CCTV users
The BSIA is warning IP based surveillance system operators to be aware of the cyber security risks and ensure their systems are secure
Endpoint security with four critical elements
Intercept X from Sophos brings together four critical elements of endpoint security to reduce the chances of breaches
Access control contract at Newcastle university
Videx is supplying digital door entry systems for the protection of students at an accommodation development in Newcastle
Increased deployment options for privileged access manager
Centrify Privilege Service is now available in the cloud or on premises as well as through PIM as a service
Identity verification for Norwegian postal company
Posten Norge of Norway is tackling fraud and money laundering with the introduction of ID verification software from Gemalto
Angler exploit kit analysis
Kaspersky Lab takes part in the downfall of cyber criminal group responsible for the distribution of the Angler exploit kit
Vandal resistance built into perimeter protection camera
Thermal imaging camera for perimeter protection and intruder detection now features vandal resistance and video analytics
Integrated surveillance and intruder detection
Video management system from Wavestore integrated with intruder detection panels from Honeywell
Analytics and PSIM products on show at ASIS
Qognify is attending the ASIS event in Florida this year with its portfolio of VMS, PSIM and video analytics products
Incident management for PSIM products
Siveillance Viewpoint from Siemens adds command and control functions into integrated PSIM platforms
New malware campaign spreads backdoor access
ESET details the latest backdoor distribution, Nemucod which spreads ad-clicking backdoor malware
Film studio takes data access security product
Varonis has supplied Miramax with the means to set and enforce data access policies to protect the film studio's most valuable data
Consumer Internet of Things security acquisition
BullGuard is making the move into providing security for consumer Internet of Things products with the acquisition of Dojo Labs
Intruder detection systems at Security Essen
Optex is attending the Security Essen event this year with its intruder detection and people counting products
New face recognition algorithm included in SDK
The Sentiveillance 5.0 SDK from Neurotechnology now includes the latest biometric face recognition algorithms for use with CCTV surveillance cameras
IoT contributes to growth for Arxan
Mobile applications and the Internet of Things have driven increased demand for security and associated growth for Arxan Technologies
Security advice for landlords
The MLA is providing landlords with advice on safety and security ahead of the season when students return to university
Uncooled Long Wave Infrared modular camera
Stemmer Imaging releases the Calibir uncooled LWIR modular camera for multiple applications in the security and defence industries
Central management platform for wireless Protection
Sophos is providing simple protection of wireless networks through its cloud based management platform to avoid the need for on-premises servers
Unified security platform enhancements
Access control and surveillance integration as well as a new disaster recovery mode characterise the latest release of Genetec Security Center at version 5.5
Attack path vulnerability assessment
Black Hat sees the launch of ThreatMatrix Deception and Response Platform from Attivo for assessing attack path vulnerabilities
High growth in smart city security initiative
Kaspersky Lab details the progress made in the first year since the formation of the Securing Smart Cities initiative
Smartphone app keeps security operators informed
The latest VisionicGO application for mobile devices brings images and information from incidents into the hands of security operators
Cyber security for Williams telemetry systems
Thales is supplying the Williams formula one and engineering company with cyber security products for protecting telemetry transmissions
Synchronised encryption of data protection
Sophos releases SafeGuard 8 encryption product that follows data across devices and protects it from accidental leaks and theft
Fingerprint and face time and attendance
NCheck Bio Attendance is a new time and attendance system that makes use of either face or fingerprint biometric data
CCTV distributor protects premises with IR detectors
Perimeter security products from Optex are being used as part of the physical security to protect UK CCTV equipment distributor
Encryption ransomware discovery
PhishMe details the latest discovery of ransomware that using encryption and delivered by RockLoader.
Reducing cyber attack risks in industrial automation
Belden subsidiary, Tripwire, is now offering Configuration Compliance Manager for providing security to industrial automation systems
EBanking mobile security app for Russian bank
One time passwords will be used by Valyut Trans Bank's VTB24 service to provide security for eBanking customers
Remote management for explosive trace detector
Software from Morpho enables Itemiser 4DX explosive trace detectors to be connected remotely throughout airport facilities
Funding secured for behavioural attack detection system
LightCyber has secured a significant round of funding to drive sales growth of the Magna Behavioural Attack Detection platform
Through body scanners for Canadian prison service
Canadian ministry responsible for prisons in the country has placed orders for 29 Soter RS through-body scanning systems from ODSecurity
Industry experts join IT security company
BeyondTrust has taken on five industry leaders in a recruitment spree to fill a wide range of roles within the company
Key management system eases security at university
The Manchester Metropolitan university has taken key and asset management tracking equipment from Traka to improve campus security
Cyber security company sponsors archeological dig
The Archeological Society of Athens is gaining benefit from sponsorship from Kaspersky Lab for excavation and conservation work
Report names top video analytics provider
The latest video content analysis report from IHS names Agent Vi as the largest provider of video analytics software
IoT security challenge survey
ForeScout Technologies releases findings from a survey into enterprise security and the the Internet of Things or IoT
Illegal market in hacked servers
Kaspersky Lab has uncovered an underground market where the commodity being traded is access to servers which have been hacked
Online identity and the digital revolution
BCS Security chairman discusses the role of online identity within the digital revolution as part of a new report
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo