Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
CERT
The Computer Emergency Response Team was originally set up by Carnegie Mellon University in the late 1980's in response to the first widespread infection of computers by malicious software. With Government funding, CERT was set up to counter future problems of this nature. Since then, many commercial companies have been established to counter the threat of malicious code but CERT still operates as a centre of research and expertise and its role has expanded to encompass all aspects of computer and network security.
Free digital lock training for NHS personnel
Codelocks is providing facilities managers working in the National Health Service with free training on digital locks
Detection capability for Heartbleed vulnerability
Tripwire's vulnerability management products are able to detect Heartbleed vulnerabilities
The evolution of technology platforms – what does this mean for businesses?
Wieland Alge, VP and general manager for EMEA, Barracuda Networks examines the evolution of technology to the "3rd platform"
Open command and control platform on show at CTX event
Synectics is attending Counter Terror Expo this month with its Synergy 3 command and control platform
Surveillance for building technology at Light+Building
Mobotix is attending the Light+Building event with its thermographic camera and video management software
Open access readers for strong identity verification
A new line of access readers has been released supporting all major credentials for strong verification
Intelligence feed keeps anti-malware software up to date
Arbor Networks is using reputation based intelligence feeds to enable users of its Pravail products to identify and mitigate threats quickly
Biometric readers integrated with building management system
Cogent's biometric access control readers have been integrated with the Andover Coninuum security and building management system from Schneider Electric
Image level encryption for AWS public cloud
Preconfigured Amazon Machine Images enable companies to store sensitive information and applications in public clouds
Access reader lawsuits settled
HID Global gains settlement in respect of lawsuits for multi-technology access reader patent infringements by three companies
Anti-counterfeiting technology for luxury goods
BaselWorld attendees can see how WISeAuthentic is protecting Hublot watch manufacturer from counterfeiting fraud
Usability improvements on Video Management Software
Axis Camera Station video management software receives new release with extended language support, more functionality and easy set-up wizard
Application delivery controllers integrated with SAP
The Thunder series of application delivery controllers including distributed denial of service protection from A10 Networks has been integrated with SAP ERP applications
Electronic locking provides security for Antrim Hospital
A hospital in Northern Ireland is ensuring emergency area and locker security with the use of the XS4 electronic locking platform from Salto Systems
VMS supplier certifies IT vendors for surveillance optimization
IT infrastructure suppliers are being certified by Milestone Systems for optimization for use in physical security environments
Three megapixel camera with wide dynamic range
A new box camera has been released by AVer with high definition 3-megapixel sensor technology and True Wide Dynamic Range for operating in fluctuating lighting levels
Partnership targets critical infrastructure protection market
McAfee has partnered with Schneider Electric to merge expertise in cyber threats and energy management to bring improved protection to critical infrastructure facilities
Web server malware discovered
Technical paper describes operation Windigo malware comprising a backdoor Trojan used to hijack over 25000 web servers
Ethical hacking course extends to Milan
SANS Institute is bringing a course on the techniques used by hackers and the methods for handling incidents to the Italian city of Milan in June
Secure authentication for remote public service workers
Municipal and city council workers are increasingly working remotely and gaining secure access to IT resources with two-factor authentication
Cloud-based wireless network monitoring
Smaller businesses now have access to wireless monitoring, security and management tools available in a cloud computing model thereby avoiding hardware dependence
Observer level membership available at ONVIF
New membership grade expands possibility for gaining access to developments and activities at the Open Network Video Interface Forum for defining open IP surveillance platforms
UK physical access control market examined
Analysis available on the position of the market for physical access control products in the United Kingdom
Connection established between Turla and military computer breach
Kaspersky Lab explains the connection between the Turla cyber espionage operation and the Agent.BTZ breach of six years ago
CCTV supplier enters biometric distribution agreement
The Anviz range of multi-biometric access control products will be distributed in the UK by CCTV specialist Y3K
Hospital secures critical areas with IP access control
ACT has provided a hospital in Tunbridge Wells with an IP access control system for securing mission critical areas in the facility
Web application assessment available in open beta version
ImmuniWeb SaaS web application security assessment software for scanning and vulnerability assessment is openly available in beta
Small businesses underestimate cyber attack risk
Kaspersky Lab Research indicates smaller businesses in the UK are underestimating the amount of risk they face from the activities of cyber criminals
High profile data breaches detailed in quarterly threat report
The latest McAfee threat report has been released with details of the dark web malware industry and its relation to recent high profile attacks
Market forecast for cyber security products in South Korea
South Korean market for cyber security products expected to grow by over 21% per year for the next four years
Vulnerabilities in a brave new world of the internet of things
Richard Moulds, VP Strategy at Thales e-Security examines the internet of things, how it affects peoples' daily lives and the vulnerabilities that it introduces
Secure access control for Bath Spa university building
The Commons building at Bath Spa University in the UK is being secured by an access control system from Salto Systems
Unified identity management and governance
Dell One Identity provides integrated identity governance and privileged access management for improved performance and lower costs
Metropolitan surveillance in harsh Mongolian climate
A city in Mongolia is protecting its residents with a public safety surveillance system design for harsh climates using Vivotek equipment
Security monitoring partner programme launched
Lancope has set up a new global partner programme to meet increased demand for the StealthWatch security monitoring system
Additional courses available at Pen Test Berlin event
SANS Institute is providing an additional two courses for penetration testing at the Pen Test Berlin event for ethical hackers
Bite sized online security training
Tavcom is now providing online distance training modules for providing targeted education whenever and wherever needed
Training available for critical national infrastructure protection
SANS Institute is running a course on the security of SCADA and industrial control systems in London this May
Network video surveillance for Moscow business centre
The new Paveletskaya Plaza business centre in Moscow is being protected with an extensive network video surveillance system from Samsung Techwin
Network forensic extension for Sourcefire Defense Center
The Endace Fusion Connector from Emulex provides 100GbE packet capture and intrusion detection for Defense Center from Sourcefire
Encryption key management system gains award at RSA
Thales KeyAuthority gains InfoSecurity product accolade as the best encryption product as part of global excellence awards
Mobile authentication for South Korea
SIM-based embedded software mobile identification and authentication system from Valimo Wireless is being used for mobile subscribers in South Korea
High definition IP surveillance cameras for business protection
Two new high definition IP surveillance cameras have been added to the D-Link range of professional systems for business protection
Dome camera for wide area surveillance
Full HD outdoor dome camera from D-Link provides 20x zoom and wide dynamic range for wide area surveillance outdoors
Beta version of cloud based antivirus available
Panda Security is making the beta version of its latest cloud based antivirus system available
HRS executive to lead identity assured management strategy
Human Recognition Systems established growth strategy for identity assured management product for aviation, construction and mineral sectors
Overcoming the barriers between religious values and secure identification
Biometric iris recognition may be the solution to ensuring secure identification where religious values require extensive concealment
Biometric products certified for use with OnGuard access control
Morpho has gained Lenel certification for the use of biometric readers on the company's OnGuard access control system
Securing the future with multi-factor authentication
Claus Rosendal of SMS PASSCODE examines multi-factor authentication as a means of providing stronger security across the IT spectrum
Webinar on preventing organized retail crime
StopORC is organizing a webinar for the end of this week on what retailers should know about the prevention of cybercrime
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com