Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
CAC

The Common Access Card is a smart card issued by the US Department of Defense to all military personnel and civilian employees enabling access to a variety of resources. The CAC is a one-card-for-all solution providing the means of physical entry to premises and buildings as well as accessing computer resources. In order to achieve this, computers used to access DoD resources need to have a compatible card reader. The card also enables e-mail encryption.

Remote management for explosive trace detector
Software from Morpho enables Itemiser 4DX explosive trace detectors to be connected remotely throughout airport facilities
Funding secured for behavioural attack detection system
LightCyber has secured a significant round of funding to drive sales growth of the Magna Behavioural Attack Detection platform
Malware protection for industrial control systems
CyberArk is entering industrial networks to bring greater protection to control systems with remote access and malware detection capabilities
ForeScout selected for IT award finals
CounterACT from ForeScout Technologies has been selected for the finals of the SC Awards 2016 Europe in the Best NAC Solution category
Survey measures cyber attack detection confidence
Tripwire looks at the responses to a survey that looked at endpoint cyber attack detection using seven key security controls
Explosive detection system for Cornish airport
The airport at Newquay in Cornwall has got ahead of the 2018 EDS mandate with the installation of a CTX 5800 explosive detection system from Morpho
BIOS verification and APT for Dell Computers
Dell increases security on computer range with the inclusion of advanced threat protection technology and BIOS verification
Spanish service contract for airport detection equipment
Aena will use Morpho Detection for the supply and servicing of passenger screening equipment at Spanish airports
Cloud based visitor management
The SV3 hosted visitor management system from Building Intelligence integrated with C.CURE 9000 security intelligence platform
Increasing interest in secure portable storage devices
With Windows to Go on board, the IronKey bootable USB device is seeing increasing popularity as an alternative to equipping employees with laptops
UK regional airport takes explosive trace detectors
Birmingham airport will take Itemiser explosive trace detector for passenger and item screening under new contract with Morpho Detection
Channel Reseller News recognition for ForeScout CEO
Mike DeCesare named in top 100 executive list in Channel Reseller News rankings for 2015
Copenhagen airport takes EU compliant trace detectors
Thirty desktop itemiser 4DX explosives trace detectors compliant with EU regulations from Morpho will be supplied to Copenhagen Airport
IT security interoperability demos at Infosecurity Europe
ForeScout Technologies is attending Infosecurity Europe with demonstrations of ControlFabric based interoperability in conjunction with major partners
Secure storage ready for Windows 10
Windows 10 ready IronKey devices can now be configured and integrated in batches for easier deployment for secure enterprise storage
Round-the-clock protection on access control system
The C.Cure access control platforms from Software House gains increased levels of fault tolerance for assured continuous operations
Network Access Control market report recognises ForeScout as having largest deployments
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
Stepping up to the changing demands in airport security
Securitas specialist, Mark Allen, explains how the company is stepping up to the increasing needs of aviation security needs
Enhanced cyber threat detection and response
New Case Management and advanced search features provide IT security personnel with improved detection and response capabilities for cyber threats
Awards recognize success using ForeScout products
ForeScout Technologies has awarded customers for game changing, creative and innovative deployments of its products
Four-in-one camera enables flexible surveillance
The Axis F Series camera features a main unit with up to four sensor and lens units to provide divided images and flexibility in configuring surveillance systems
Sandbox analysis report acclaims advanced threat prevention product
Miercom tests Next Generation Threat protection and cloud based threat emulation service from Check Point with positive results
Travelling executives warned of Darkhotel threat
Highly targeted cyber espionage techniques are being used against commercial travellers with highly valuable information warns Kaspersky Lab
SIEM and privileged threat analytics integration
CyberArk has integrated its Privileged Threat Analytics with the Enterprise Security Manager SIEM product from McAfee
Safe at Any Speed - Best Practices for the Era of 100G
Dan Joe Barry, vice president of marketing at Napatech, explains the best practices in providing protection for the latest generation of high speed networks
Voice biometrics a valid crime fighting tool
Jade Kahn of NICE Systems explains how voice biometrics is a technology that has the validity and technical maturity to be able to be used in solving serious crimes
Risk assessment software helps investigate compromised user credentials
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
Organizational weak links contribute to increasingly dynamic threat landscape
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
Credential management system for personal identity managed service
The Personal Identity Verification managed service offered by Eid Passport is using ActivID credential management from HID Global
Cyber security report: 96 percent of organisations have experienced a serious incident in past year
Sponsored by ForeScout Technologies, the 2014 Cyber Defence Maturity Report is independent research conducted by IDG Connect during May and June of 2014. Survey respondents included 1600 IT information security decision makers in organisations of more than 500 employees, and spanning five industry s
Open to Secure range of smart card readers
Family of smart card readers from Rosslare Security supports broad range of RFID technologies
Brazilian network security partnership
Clavister enters partnership to provide public sector and private industry clients with advanced IT security systems in Brazil
Shrinkage reduction technology in the retail sector
Research report focuses on the retail sector and the electronic security systems deployed there to combat shrinkages
Connection established between Turla and military computer breach
Kaspersky Lab explains the connection between the Turla cyber espionage operation and the Agent.BTZ breach of six years ago
Security software for alarm and access control integration
the Version 2.09 release of CA3000 access control software from Continental Access provides greater integration capabilities with alarms, locking systems and CCTV Surveillance
BYOD security market expectations to 2018
Report examines the security market for Bring-Your-Own-Device (BYOD) technology from 2014 to 2018
Forensic toolkit provides powerful evidence discovery
Native investigative capabilities added to AccessData's Forensic Toolkit for MS volume Shadow Copy and Geolocation technologies
Complete security suite for mobile devices
Secure browsing on mobile devices and user group management functionality included for business users requiring mobile protection
Web performance and control optimisation
Web experience solutions technology ups the ante for intelligently maximizing site and application performance
Storage technology improvements change data recovery landscape
Kroll Ontrack shows how changes made during 2013 in storage technology have altered the methods needed for effective data recovery
New system on chip improves detail capture
Cameras featuring the new ARTPEC-5 system on chip have greater capabilities for video processing and analytics requiring detail such as ANPR
Image tracking implications of Gmail automatic image display
Rapid7 comments on the new automatic image display feature in Gmail and the implications regarding e-mail tracking and malicious request proxying
US security certification for Centrify Server Suite
Secure authentication and access control server suite from Centrify achieves common criteria certification enabling its use in government agencies
Certification for healthcare security and privacy
IT professionals working in the healthcare industry now have access to a new global credential covering healthcare security and privacy
IP reputation service embedded in threat management platform
NetCitadel strengthens its threat management platform with the inclusion of Webroot's IP reputation service for improved enterprise security intelligence
HD surveillance donated to domestic violence sanctuary
An emergency shelter in Florida has received a full HD surveillance system as a charitable donation from Avigilon
District-wide school surveillance provides student protection
Widely deployed integrated school security system in district of Michigan based on open-platform XProtect video management system from Milestone
Secure identification seminar held in Columbia
Datacard and partner engage Columbian security professionals with seminar on best practices for secure identification using ID cards
Mobile security product range based on biometric authentication
A range of products have been created for iOS and Android mobile devices which make use of Tactivo fingerprint readers to provide security
Biometric based medical access for Papua New Guinea
Fulcrum Biometrics has used multispectral fingerprint biometrics to identify patients at a medical clinic in Papua New Guinea
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo