Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
CERT
The Computer Emergency Response Team was originally set up by Carnegie Mellon University in the late 1980's in response to the first widespread infection of computers by malicious software. With Government funding, CERT was set up to counter future problems of this nature. Since then, many commercial companies have been established to counter the threat of malicious code but CERT still operates as a centre of research and expertise and its role has expanded to encompass all aspects of computer and network security.
P2PE certification ensures security of cardholder data
Payment card industry certification from Foregenix for point-to-point-encryption (P2PE) applications adds confidence in protective capabilities for cardholder information
VMS distribution agreement covers DACH region of Europe
Ingram Micro has entered into a distribution agreement with Milestone Systems for supplying VMS products into the German-speaking countries of Europe
Residential door entry systems provide high security at London property development
The Fulham Reach residential development in London is using IP based door entry and lift control systems from Urmet
Video analytics based intruder detection distribution agreement
Security distributor, Mayflex will now be handling SafeZone-edge from Digital Barriers, an intrusion detection product based on video analytics
The Netherlands takes secure driving licences
Gemalto is supplying the Netherlands with electronic driving licences featuring improved security features to prevent identity fraud
Twitter Digit service shows no change in security
Single device control with OTP and number verification adds no significant security advantage, according to Kaspersky Lab
IP surveillance products on show at Canada security event
OnSSI has been displaying Ocularis VMS with integrated products at the Security Canada Central Conference and Expo event earlier this week
Dual purpose surveillance protects landmark accommodation
Providing views of local scenery and protecting the premises against security threats, Vivotek cameras are serving a dual purpose at the Belle Tout Lighthouse
WebUI vulnerabilities expose system admin portals
Security experts at Check Point have discovered WebUI vulnerabilities in System Admin Portals enabling administrator credential theft
Surveillance and VMS technology partnership
Partnership between SeeTec and BCDvideo brings together the companies' surveillance recording and video management system capabilities
Adjustable closers suitable for fire doors
The new range of door closers from ASSA ABLOY provide improved accessibility with adjustable speed, latch control and power
Measuring success in threat management programmes
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
Effective protection of vulnerable workers
Andrew Jones of Multitone Electronics discusses the duty of care employers have for their employees' safety and how this can be achieved most effectively
Biometric handles increase physical security in data centres
Emka is helping to secure vulnerable data centres with the latest hardware security measures including biometric access control handles
Low cost high security encrypted hard drive
Imation has produced a high performance external USB 3.0 hard drive with cloud-based management console and Government grade security
UK distributor signed for enterprise security systems
Bitdefender has signed e92plus in the UK to supply the market with security software for cloud and virtual environments
VMS sales channel extension in Italy
Milestone Systems is extending its reach into the Italian market through the opening of new sales channels in the region
Guidance explains best practice use of lone worker devices
Users of lone worker protection systems and related smartphone apps now have access to guidance on their use published by the BSIA
FIPS validation for cloud visibility and data protection
Cryptographic Module Validation Programme from CipherCloud gains Federal Information Processing Standards (FIPS) validation
Supply chain security independent assessment scheme
The British Standards Institute is providing independent assessment schemes to help companies become certified to ISO 28000 Supply Chain Security Management
Enterprise level Software House accreditation for two UK integrators
Two security companies from the UK have achieved the highest level of certification for the Security and Event Management System from Software House
Investment management company deploys pervasive network security
Pioneer Investments have taken ForeScout CounterACT to protect its network and provide real time visibility across all its endpoints.
Advantages of voice and data system separation
Multitone's Marketing Director, Andrew Jones, explains why there are occasions when voice and data systems need to be kept separate
Partnership sees integration of video management and analytics
SeeTec and IPS Intelligent Video Analytics have entered into a partnership which sees intelligent video surveillance based on the Cayuga VMS
When is a vulnerability not a vulnerability?
Mark Kedgley, CTO of New Net Technologies provides information on a continuous approach to vulnerability scoring and management
Shellshock protection for Check Point Software
Users of Check Point Software products gain protection against Shellshock vulnerability after company issues IPS protection
Interoperability focus for VMS at ASIS and Essen
Milestone Systems will be at the Security Essen and ASIS events to demonstrate its interoperability with partner products in surveillance and access control
The importance of strong authentication in the cloud
David Hald of SMS Passcode explains the way that cloud environments benefit from using strong authentication technologies rather than outdated passwords for security
Hybrid DDoS Defence for cloud and on-premises environments
Arbor Networks improves its CloudSM and Pravail protection systems for hybrid DDoS either in the cloud or on company premises
The future of mobile forensics in global legal systems
Yuval Ben-Moshe of Cellebrite explains the necessity for accommodating mobile forensics technology as part of the legal process
A new perspective on antivirus solutions
Panda Security explains how antivirus software is evolving to provide advanced protection in the current IT security environment
Partnership integrates access control with PSIM
The Situator Physical Security Information Management software from Nice Systems will be integrated with the Symmetry access control system under new partnership agreement
Policy mapping ability for UTM and firewalls
WatchGuard is now able to provide the ability for IT security administrators to inspect policy configurations across unified threat management and NG-Firewall appliances
ForeScout expands presence in EMEA region
Increased demand in Europe for network security and continuous monitoring and mitigation leads to expanded presence in the region for ForeScout Technologies
Successful camera modification for extreme environments
Mobotix Partner uses IP CCTV camera as basis for a surveillance system for use in extremely hazardous or inhospitable environments
Affordable Cyber Security Accreditation for Public Sector suppliers
The SME segment of the UK's public sector supply chain gains affordable cyber security accreditation from HP enterprise services
Nine DDoS Assumptions That Must Be Put to Bed
Xuhua Bao, Hai Hong and Zhihua Cao of NSFOCUS dispel nine popular myths that surround Distributed Denial of Service attacks
E-Learning courses for alarms and access control
Tavcom has introduced two new training courses for the electronic security sector in Access control and Intruder and perimeter alarms
British Standard certification for alarm receiving centre
The Community Safety Glasgow alarm receiving centre has been accredited to BS8484 for lone worker protection alarm monitoring
Public cryptography to protect Nigerian digital identity
Cryptovision is supplying the PKI to support the deployment of electronic identity cards for 160 million citizens in Nigeria
Wireless networking connects ANPR enforcement cameras in Cleveland
The Cleveland police have met their ANPR camera networking requirements with innovative wireless connectivity arrangement from Quadrant Security Group
Industrial control system security skills imbalance needs addressing
SCADA and industrial control system security expert comments on the lack of integrated engineering and cyber security expertise needed to overcome threat to critical infrastructure
Centralized security management to feature at ASIS
CNL Software is attending the ASIS event in Atlanta this month with its IPSecurityCenter Physical Security Information Management (PSIM) platform
Survey reveals extent of European cloud data storage acceptance
Nearly half of EU companies still retain certain types of data on servers with continuing caution being shown for moving their data to the cloud
Additional security for Android Wear Watch owners
Smart wearable technology gets the secure treatment with the available of mobile security and antivirus specifically for the wearable market from Bitdefender
Survey illustrates risks to social network users
Complacency towards personal security is still widespread amongst social network users according to results of a new survey
Hazardous area certification for camera range
The light weight corrosion resistant C-range of camera stations from Synectics has gained CSAus certification for use in hazardous areas
Biometric time and attendance recording
Optional face or fingerprint biometrics provides secure time and attendance tracking without the need for tokens or remember passwords
Tokenless 2 factor payment processing
Using tokenless two-factor authentication for payment processing can overcome the problems associated with PCI compliance
High security locks prevent escape of armed robbers
A Warrior security door fitted with Pickersgill-Kaye high security locks has prevented the success of a recent Birmingham jewellery shop heist by trapping the culprits
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo