Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
News By Date
Exploiting IP CCTV through security system integration
Video Management Systems : 22 January, 2010
Barry Keepence of Indigovision explains the advantages that can be yielded from IP Surveillance technology through the integration of other security system technologies such as perimeter protection, access control and ANPR
 
Bogus degrees proliferate in the UK
Vetting and Credential Management : 22 January, 2010
The UK is the most prolific source of fake academic qualifications in Europe, warns Verifile after study shows league table of offending countries headed by the USA
 
Italian bank rolls out contactless payment cards
ID cards and smart cards : 22 January, 2010
Setefi of Italy is using PayPass contactless cards from Gemalto for use by its banking customers, enabling faster simpler payments for small charge amounts
 
Domestic lock control from mobile telephones
Security in the Home : 22 January, 2010
Schlage is demonstrating the LiNK home management system providing homeowners with the ability to control a number of functions, including locking and unlocking remotely using cell phones
 
NIST testing reveals high performance of L-1 Iris biometrics algorithm
Iris Recognition : 22 January, 2010
The Daugman-based Iris recognition algorithm from biometric specialist, L-1 Identity Solutions, has undergone testing with the National Institute of Standards and Technology which features in the Iris Exchange report on biometric iris recognition algorithm performance
 
Single Sign-On Certification available for SaaS providers
Data Protection : 22 January, 2010
Cloud operators offering Single Sign-On access can now gain certification from Ping Identity
 
Core Impact Professional Services provide enterprise security validation testing
Network Security, Routers and Data Centres : 22 January, 2010
A new set of penetration testing services are being offered using Core Impact Pro for verifying the security and identifying the vulnerabilities in enterprise networks, web applications and wireless networks
 
Envoy Data recruitment for US resale of OpenTrust security software
Payment cards and e-commerce security : 22 January, 2010
OpenTrust engages Envoy Data as it's US based supplier to companies wanting next generation PKI products
 
Storage performance improvements at Nexsan using FalconStor technology
Backup, Data Recovery and Disaster Recovery : 22 January, 2010
Nexsan has become a technology partner of FalconStor, using the company's Deduplication software for improving storage efficiences
 
Virtual Video Recorder Distributes Recording Function in Virtual Environment
Recording Media, DVR, Video Servers and Data Servers : 22 January, 2010
IPVisionSoftware takes a different approach to surveillance recording tasks by virtualising the storage eliminating server bottlenecks and the need for conventional DVR technology
 
High Definition high-flying commercial shot on ultra-compact cameras
Analogue and HD Cameras : 22 January, 2010
Toshiba's IK-HR1S camera systems have been used in an innovative advertising campaign shooting a floating chair over 18 miles high
 
Out of band patch addresses IE Explorer vulnerability
Internet Security and Content Filtering : 22 January, 2010
Lumension comments on the patch issued by Microsoft to close out the vulnerability on Explorer and recommends running safer versions using Vista or Windows 7
 
IE6 vulnerability closed by Microsoft
Internet Security and Content Filtering : 22 January, 2010
Microsoft has released an out-of-band patch to fix the vulnerability on Internet Explorer versions 6, 7 and 8 which had been used against Google
 
Password analysis study reveals extent of vulnerability
Data Protection : 22 January, 2010
Computer users are often making themselves susceptible to attack through the use of trivial or easy-to-crack passwords according to a recent study and analysis from Imperva
 
Solution to encryption challenge worth much more than available prize money
Data Protection : 22 January, 2010
Origin Storage comments on the swiss army knife encryption code cracking challenge which remains unclaimed and which the company believes will remain unclaimed as higher bidders seek to resolve the secret of 128-bit AES encryption
 
dns believes Google attack originates in China
Internet Security and Content Filtering : 22 January, 2010
Software analysis on last week's high profile Google attack reveals Chinese origin algorithm at the core of the attack
 
The SIA seeks regulatory views from private investigators
Trade Organisations, User Groups and Pressure Groups : 22 January, 2010
An online questionnaire from the Security Industry Authority has been set up for obtaining information from the Private Investigation industry on activities, regulation and awareness of the SIA
 
Patch and block service from Shavlik for exploit code
Anti-virus and anti-malware software : 22 January, 2010
With the latest Microsoft patch being issued as an emergency release, Jason Miller of Shavlik comments on the patch and also on protection mechanisms against zero day Internet Explorer vulnerabilities
 
DLP as an option to securing the shortest path for data out of the company
Exhibitions and Trade Shows : 22 January, 2010
Security Analyst Davin Fligel discusses methods for securing data from being inadvertently disclosed by well-meaning employees trying to find the best way to achieving a goal
 
Resilient RFID Tag can be used in challenging environments
Tracking and EAS : 22 January, 2010
Daily's harsh environment tags can be bonded directly onto metals and provides reliable tracking performance in difficult conditions
 
Secure payment technology partnership struck
Payment cards and e-commerce security : 22 January, 2010
Voltage Security has partnered with Thales for encryption and key management applications for the payment card industry, offering end to end solutions for the management of secure payment transactions
 
Network compliance audit tool available from Intelliden
Network Security, Routers and Data Centres : 22 January, 2010
iAudit is a free cloud-based compliance tool for assessing network device compliance against various standard industry practices
 
Discovery options and MS Windows 7 support included on Connected backup software
Backup, Data Recovery and Disaster Recovery : 22 January, 2010
PC backup software from Iron Mountain is now compatible with Windows 7 and includes support for litigation discovery
 
Central Alarm Monitoring System launched in Dubai
Alarm signalling, transmission and notification : 21 January, 2010
Future Fibre Technologies has released FFT CAMS at version 3, a security management system for combining diverse intrusion detection systems into one alarm management package
 
ID Key Cards Control Access at Australian College
Electronic Locking Systems : 21 January, 2010
St Bernard's College all-male Secondary School Chooses XS4 smart locks with ID card control to provide security for the staff and students
 
High speed imaging for explosive events
Optics and components : 21 January, 2010
The SIMD8 Camera is an Ultra-High Speed Framing System for recording explosive detonations
 
Recent severe weather highlights need for secure remote working contingencies
Network Security, Routers and Data Centres : 21 January, 2010
Ben Ross of BeCrypt explains the benefits of a simple and effective home working policy using bootable secure USB drives enabling home PC equipment to be used as ÃâÅ"dumb" terminals of the company network
 
Web Interface and Early Case Assessment Feature on EnCase eDiscovery
Computer Forensics and Data Forensics : 21 January, 2010
Released in Version 4, EnCase eDiscovery from Guidance Software now includes and integrated software package for both legal and IT personnel dealing in electronic discovery
 
Pilot System to Verify Identification of Loyalty Scheme Applicants
Vetting and Credential Management : 21 January, 2010
IDCheck FastForm technology from Intellicheck Mobilisa to be piloted by Loyalty Scheme company from ID Verification on applications submitted
 
Database Discovery and Compliance Reporting at Premiere Global Services
Software Asset Management and Compliance : 21 January, 2010
Application Security is ensuring the compliance of databases at Premiere Global Services using the AppDetectivePro database discovery tool
 
Forensic Tool Available for Detection of Salvinorin A and B
Forensic science and laboratory equipment : 21 January, 2010
Chemical test available from NMS Labs for the discovery in body fluids of Salvinorin A and B as more states seek to regulate against the use of the hallucinogenic Salvia Divinorum
 
Firearm Simulation Training Systems Sold to Mexican Police
Training courses, Seminars and Conferences : 21 January, 2010
Police in Mexico are responding to increased threat levels of violent crime with the order of state of the art firearm simulators to train the police
 
Inspection System for Checked Baggage at Mexican Airports
Bomb and explosives detection : 21 January, 2010
Tijuana and Guadalajara Airports in Mexico as well as Regional Airports in the Country will be Equipped with In-Lind Hold Baggage Inspection Systems from Rapiscan in $35 million deal
 
Identity Theft Protection Resolutions for 2010
Data Protection : 21 January, 2010
LifeLock is raising the issue of Identity Theft Amongst US Citizens with a Call for Action to Prevent thieves from stealing their identity
 
Antivirus products available in free and premium versions
Anti-virus and anti-malware software : 21 January, 2010
Avast! anti virus software goes to version 5.0 with more functions and new premium versions available to suit any requirements
 
CTO joins Voice Commerce Group
Finance and Banking Security : 21 January, 2010
Expansion at Voice Commerce Group to be supervised by new Chief Technology Officer responsible for Verification and identification services
 
Encryption for secure payments partnership
Payment cards and e-commerce security : 21 January, 2010
Thales and Voltage Security partner to provide end to end solutions for Payment Card Industry data protection
 
Neopost takes web and e-mail security services from Webroot
Internet Security and Content Filtering : 21 January, 2010
With a large remote workforce, Neopost mail provider has taken Web and E-mail security services from Webroot to protect its operations
 
4500 Flash Drives Left in Clothes Taken to Dry Cleaners
Data Protection : 21 January, 2010
Potential revenues from fines deriving from the new ICO powers escalate as UK stats reveal the extent of carelessness with USB flash drives
 
Video Expert Joins ViDiCore Support Staff
IP and Megapixel cameras : 21 January, 2010
ViDiCore have taken on an additional Support Engineer for advanced video surveillance projects in Europe
 
Government 2.0 needs Security Overhaul
Internet Security and Content Filtering : 21 January, 2010
Steering Committee to Discuss Security Issues Surrounding Public Sector Internet Networking
 
IDology forms identity authentication partnership with ARX
Data Protection : 21 January, 2010
CoSign from ARX now has authentication option with the incorporation of Expect ID IQ providing strong identity authentication
 
Passenger counting software for video applications
Video Analytics and ANPR : 21 January, 2010
Impulse develops software for Hella Aglaia for use in application for computer vision 3D passenger counting system
 
Fixed Network Camera Range For High Performance Outdoor Use
IP and Megapixel cameras : 20 January, 2010
Axis Communications have produced a range of outdoor network cameras with power-over-ethernet and protection against rain, frost and sun for use in severe weather conditions
 
DominoÃÂÃâ€ÂÃâ€Âs Pizza fight aggression towards their staff with lone worker protection from Romad
Lone Worker Protection and Personal Alarms : 20 January, 2010
David Kelly, Domino's Pizza's National Loss Prevention and Security Manager explains how the use of Romad Lone Worker Protection helped sway the police in taking crimes against their delivery staff seriously
 
Norbain begins distribution of Mirasys Video Management Software
Video Management Systems : 20 January, 2010
Mirasys and Norbain have struck a deal for the UK distributor to handle the company's range of hybrid IP video surveillance software products
 
Hybrid IP Surveillance protection for Scottish Oil and Gas port
Recording Media, DVR, Video Servers and Data Servers : 20 January, 2010
Harbour upgrades from analogue DVR technology to IP Network Video recorders for recording, archiving and managing the images from the port's existing inventory of analogue CCTV cameras
 
Tattoo matching technology acquired by MorphoTrak
Face Recognition : 20 January, 2010
Michigan State University has signed a licence agreement with Morphotrak to enable the Biometric face recognition company to have access to Tattoo Recognition and Matching technology to assist in the identification and capture of suspects based on tattoo matching combined with other identification methods
 
EikonTouch Fingerprint readers available from Fulcrum
Fingerprint recognition : 20 January, 2010
Fulcrum Biometrics are now handling biometric fingerprint identification and authentication products from Upek including the USB based EikonTouch reader
 
Handheld Multimodal Biometric Enrolment Kit
Face Recognition : 20 January, 2010
SEEK from Cross Match addresses the requirements from US Government and Police agencies for a portable multimodal enrolment and identification tool which supports biometric fingerprint, iris and facial image capture
 
First | Prev  | 1 | 2 | 3  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com