Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

The Common Access Card is a smart card issued by the US Department of Defense to all military personnel and civilian employees enabling access to a variety of resources. The CAC is a one-card-for-all solution providing the means of physical entry to premises and buildings as well as accessing computer resources. In order to achieve this, computers used to access DoD resources need to have a compatible card reader. The card also enables e-mail encryption.

Round-the-clock protection on access control system
The C.Cure access control platforms from Software House gains increased levels of fault tolerance for assured continuous operations
Network Access Control market report recognises ForeScout as having largest deployments
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
Stepping up to the changing demands in airport security
Securitas specialist, Mark Allen, explains how the company is stepping up to the increasing needs of aviation security needs
Enhanced cyber threat detection and response
New Case Management and advanced search features provide IT security personnel with improved detection and response capabilities for cyber threats
Awards recognize success using ForeScout products
ForeScout Technologies has awarded customers for game changing, creative and innovative deployments of its products
Four-in-one camera enables flexible surveillance
The Axis F Series camera features a main unit with up to four sensor and lens units to provide divided images and flexibility in configuring surveillance systems
Sandbox analysis report acclaims advanced threat prevention product
Miercom tests Next Generation Threat protection and cloud based threat emulation service from Check Point with positive results
Travelling executives warned of Darkhotel threat
Highly targeted cyber espionage techniques are being used against commercial travellers with highly valuable information warns Kaspersky Lab
SIEM and privileged threat analytics integration
CyberArk has integrated its Privileged Threat Analytics with the Enterprise Security Manager SIEM product from McAfee
Safe at Any Speed - Best Practices for the Era of 100G
Dan Joe Barry, vice president of marketing at Napatech, explains the best practices in providing protection for the latest generation of high speed networks
Voice biometrics a valid crime fighting tool
Jade Kahn of NICE Systems explains how voice biometrics is a technology that has the validity and technical maturity to be able to be used in solving serious crimes
Risk assessment software helps investigate compromised user credentials
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
Organizational weak links contribute to increasingly dynamic threat landscape
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
Credential management system for personal identity managed service
The Personal Identity Verification managed service offered by Eid Passport is using ActivID credential management from HID Global
Cyber security report: 96 percent of organisations have experienced a serious incident in past year
Sponsored by ForeScout Technologies, the 2014 Cyber Defence Maturity Report is independent research conducted by IDG Connect during May and June of 2014. Survey respondents included 1600 IT information security decision makers in organisations of more than 500 employees, and spanning five industry s
Open to Secure range of smart card readers
Family of smart card readers from Rosslare Security supports broad range of RFID technologies
Brazilian network security partnership
Clavister enters partnership to provide public sector and private industry clients with advanced IT security systems in Brazil
Shrinkage reduction technology in the retail sector
Research report focuses on the retail sector and the electronic security systems deployed there to combat shrinkages
Connection established between Turla and military computer breach
Kaspersky Lab explains the connection between the Turla cyber espionage operation and the Agent.BTZ breach of six years ago
Security software for alarm and access control integration
the Version 2.09 release of CA3000 access control software from Continental Access provides greater integration capabilities with alarms, locking systems and CCTV Surveillance
BYOD security market expectations to 2018
Report examines the security market for Bring-Your-Own-Device (BYOD) technology from 2014 to 2018
Forensic toolkit provides powerful evidence discovery
Native investigative capabilities added to AccessData's Forensic Toolkit for MS volume Shadow Copy and Geolocation technologies
Complete security suite for mobile devices
Secure browsing on mobile devices and user group management functionality included for business users requiring mobile protection
Web performance and control optimisation
Web experience solutions technology ups the ante for intelligently maximizing site and application performance
Storage technology improvements change data recovery landscape
Kroll Ontrack shows how changes made during 2013 in storage technology have altered the methods needed for effective data recovery
New system on chip improves detail capture
Cameras featuring the new ARTPEC-5 system on chip have greater capabilities for video processing and analytics requiring detail such as ANPR
Image tracking implications of Gmail automatic image display
Rapid7 comments on the new automatic image display feature in Gmail and the implications regarding e-mail tracking and malicious request proxying
US security certification for Centrify Server Suite
Secure authentication and access control server suite from Centrify achieves common criteria certification enabling its use in government agencies
Certification for healthcare security and privacy
IT professionals working in the healthcare industry now have access to a new global credential covering healthcare security and privacy
IP reputation service embedded in threat management platform
NetCitadel strengthens its threat management platform with the inclusion of Webroot's IP reputation service for improved enterprise security intelligence
HD surveillance donated to domestic violence sanctuary
An emergency shelter in Florida has received a full HD surveillance system as a charitable donation from Avigilon
District-wide school surveillance provides student protection
Widely deployed integrated school security system in district of Michigan based on open-platform XProtect video management system from Milestone
Secure identification seminar held in Columbia
Datacard and partner engage Columbian security professionals with seminar on best practices for secure identification using ID cards
Mobile security product range based on biometric authentication
A range of products have been created for iOS and Android mobile devices which make use of Tactivo fingerprint readers to provide security
Biometric based medical access for Papua New Guinea
Fulcrum Biometrics has used multispectral fingerprint biometrics to identify patients at a medical clinic in Papua New Guinea
Cloud backup with longer retention
Barracuda Backup now features extended cloud storage and longer retention periods without the need for dedicated local appliance
Underground market for personal credentials
Dell SecureWorks details the underground market for health insurance, driving licences and even gaming credentials
Developer kit for palm vein vascular biometrics
Vascular biometrics now easily available with kit including Fujitsu reader, palm vein bioServer and tools for developers
New Falcon NVR for higher performance
Increased bandwidth provides improved performance for larger IP surveillance networks with the Falcon 80tiz NVR from DNF Security
French certification for liquid explosive detection
Rapiscan baggage screening system gains liquid explosive detection certification from French civil aviation authority
EU approval for millimetre wave screening system
The eqo millimetre wave people screening system from Smiths Detection has met the requirements of the EU standard 2
Security expert joins ORC webinar
Director of Security at a large US retail chain will address a webinar later this month to address the growing problem of Organised Retail Crime
Apple mods signals move to Federal BYOD
Varonis comments on the modification of Apple iPad equipment for use by Federal Agencies signalling a softening towards Bring-Your-Own-Device regimes
Alarm company celebrates 25 years with SIA
The US Security Industry Association has congratulated Fire-Lite Alarms on a quarter of a century of membership
Deep packet inspection market projections
Report from Infonetics Research examines the future of the Deep Packet Inspection market which is forecast to grow strongly out to 2016
Information Security Governance Explored in Munich Conference
ISACA is hosting a conference in Munich examining Information security governance and risk management in September
BYOD Shown To Be A Cost Burden On Businesses
Lieberman Software study shows cost drain to businesses of implementing Bring-Your-Own-Device policies
EU Certification Achieved on Advanced Baggage Scanner
Dual view baggage scanner for the detection of liquid explosives has been certified for use in Europe's airports
Combined EuroCACS and ISRM Conference in Munich
ISACA is combining the EuroCACS and ISRM conferences in one event this year to take place in September in the German city of Munich
Video Optimised Ethernet Switches from Samsung
Samsung America is marketing its range of high performance ethernet switches optimised for use on video surveillance networks
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo