Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
CAC

The Common Access Card is a smart card issued by the US Department of Defense to all military personnel and civilian employees enabling access to a variety of resources. The CAC is a one-card-for-all solution providing the means of physical entry to premises and buildings as well as accessing computer resources. In order to achieve this, computers used to access DoD resources need to have a compatible card reader. The card also enables e-mail encryption.

Safe at Any Speed - Best Practices for the Era of 100G
Dan Joe Barry, vice president of marketing at Napatech, explains the best practices in providing protection for the latest generation of high speed networks
Voice biometrics a valid crime fighting tool
Jade Kahn of NICE Systems explains how voice biometrics is a technology that has the validity and technical maturity to be able to be used in solving serious crimes
Risk assessment software helps investigate compromised user credentials
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
Organizational weak links contribute to increasingly dynamic threat landscape
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
Credential management system for personal identity managed service
The Personal Identity Verification managed service offered by Eid Passport is using ActivID credential management from HID Global
Cyber security report: 96 percent of organisations have experienced a serious incident in past year
Sponsored by ForeScout Technologies, the 2014 Cyber Defence Maturity Report is independent research conducted by IDG Connect during May and June of 2014. Survey respondents included 1600 IT information security decision makers in organisations of more than 500 employees, and spanning five industry s
Open to Secure range of smart card readers
Family of smart card readers from Rosslare Security supports broad range of RFID technologies
Brazilian network security partnership
Clavister enters partnership to provide public sector and private industry clients with advanced IT security systems in Brazil
Shrinkage reduction technology in the retail sector
Research report focuses on the retail sector and the electronic security systems deployed there to combat shrinkages
Connection established between Turla and military computer breach
Kaspersky Lab explains the connection between the Turla cyber espionage operation and the Agent.BTZ breach of six years ago
Security software for alarm and access control integration
the Version 2.09 release of CA3000 access control software from Continental Access provides greater integration capabilities with alarms, locking systems and CCTV Surveillance
BYOD security market expectations to 2018
Report examines the security market for Bring-Your-Own-Device (BYOD) technology from 2014 to 2018
Forensic toolkit provides powerful evidence discovery
Native investigative capabilities added to AccessData's Forensic Toolkit for MS volume Shadow Copy and Geolocation technologies
Complete security suite for mobile devices
Secure browsing on mobile devices and user group management functionality included for business users requiring mobile protection
Web performance and control optimisation
Web experience solutions technology ups the ante for intelligently maximizing site and application performance
Storage technology improvements change data recovery landscape
Kroll Ontrack shows how changes made during 2013 in storage technology have altered the methods needed for effective data recovery
New system on chip improves detail capture
Cameras featuring the new ARTPEC-5 system on chip have greater capabilities for video processing and analytics requiring detail such as ANPR
Image tracking implications of Gmail automatic image display
Rapid7 comments on the new automatic image display feature in Gmail and the implications regarding e-mail tracking and malicious request proxying
US security certification for Centrify Server Suite
Secure authentication and access control server suite from Centrify achieves common criteria certification enabling its use in government agencies
Certification for healthcare security and privacy
IT professionals working in the healthcare industry now have access to a new global credential covering healthcare security and privacy
IP reputation service embedded in threat management platform
NetCitadel strengthens its threat management platform with the inclusion of Webroot's IP reputation service for improved enterprise security intelligence
HD surveillance donated to domestic violence sanctuary
An emergency shelter in Florida has received a full HD surveillance system as a charitable donation from Avigilon
District-wide school surveillance provides student protection
Widely deployed integrated school security system in district of Michigan based on open-platform XProtect video management system from Milestone
Secure identification seminar held in Columbia
Datacard and partner engage Columbian security professionals with seminar on best practices for secure identification using ID cards
Mobile security product range based on biometric authentication
A range of products have been created for iOS and Android mobile devices which make use of Tactivo fingerprint readers to provide security
Biometric based medical access for Papua New Guinea
Fulcrum Biometrics has used multispectral fingerprint biometrics to identify patients at a medical clinic in Papua New Guinea
Cloud backup with longer retention
Barracuda Backup now features extended cloud storage and longer retention periods without the need for dedicated local appliance
Underground market for personal credentials
Dell SecureWorks details the underground market for health insurance, driving licences and even gaming credentials
Developer kit for palm vein vascular biometrics
Vascular biometrics now easily available with kit including Fujitsu reader, palm vein bioServer and tools for developers
New Falcon NVR for higher performance
Increased bandwidth provides improved performance for larger IP surveillance networks with the Falcon 80tiz NVR from DNF Security
French certification for liquid explosive detection
Rapiscan baggage screening system gains liquid explosive detection certification from French civil aviation authority
EU approval for millimetre wave screening system
The eqo millimetre wave people screening system from Smiths Detection has met the requirements of the EU standard 2
Security expert joins ORC webinar
Director of Security at a large US retail chain will address a webinar later this month to address the growing problem of Organised Retail Crime
Apple mods signals move to Federal BYOD
Varonis comments on the modification of Apple iPad equipment for use by Federal Agencies signalling a softening towards Bring-Your-Own-Device regimes
Alarm company celebrates 25 years with SIA
The US Security Industry Association has congratulated Fire-Lite Alarms on a quarter of a century of membership
Deep packet inspection market projections
Report from Infonetics Research examines the future of the Deep Packet Inspection market which is forecast to grow strongly out to 2016
Information Security Governance Explored in Munich Conference
ISACA is hosting a conference in Munich examining Information security governance and risk management in September
BYOD Shown To Be A Cost Burden On Businesses
Lieberman Software study shows cost drain to businesses of implementing Bring-Your-Own-Device policies
EU Certification Achieved on Advanced Baggage Scanner
Dual view baggage scanner for the detection of liquid explosives has been certified for use in Europe's airports
Combined EuroCACS and ISRM Conference in Munich
ISACA is combining the EuroCACS and ISRM conferences in one event this year to take place in September in the German city of Munich
Video Optimised Ethernet Switches from Samsung
Samsung America is marketing its range of high performance ethernet switches optimised for use on video surveillance networks
London Underground, Secure by Design, MIRA and Adelard discuss security solutions to transport systems
IET explores best practice of the Bring Your Own Device Strategy
Security for Mobile Devices event explores staff protection in a BYOD regime
GSA Cerification Achieved For pivCLASS Access Control Systems
Authentication devices and access control readers from HID Global have achieved a foothold into the US Federal market with GSA Approvals
EU Security Certification For Hold Baggage Screening System
Real Time Tomography baggage scanning system from Rapiscan gains European Union certification
Hybrid and IP Surveillance Recording Systems
Toshiba introduces two new recording solutions to the surveillance market with hybrid and full IP capabilities
Federal Certification for Biometric Authentication System
A multi-biometric access control reader from 3M Cogent has achieved FIPS 201 personal identity verification certification
Data Governance Technology Can Prevent Burnout
Varonis suggests that the use of data governance technology for unstructured data can help in the reduction of IT security staff stress levels
Chilean ID Documents To Be Supplied By Morpho
e-ID biometric travel documents and identification cards from Morpho will be used in Chile
UAE Training courses on ethical hacking
SANS Institute will be in Abu Dhabi this month bringing the companies courses on Ethical Hacking and Penetration Testing to the region
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo