Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
News By Date
Best Buy Rating For Home Security Deadbolts
Security in the Home : 26 February, 2010
The Kwikset Smartkey deadbolt earns recognition from Consumers Digest as the best buy in the residential deadbolt lock category with protection against lock bumping
 
Partners Awarded At Milestone Integration Platform Symposium
Video Management Systems : 26 February, 2010
Milestone's annual partner event in America saw recognition for top partner performances
 
ACTpro 3000 Controllers Fitted at King's College Hospital
Electronic Locking Systems : 26 February, 2010
NHS healthcare facility takes door controllers from Access Control Technology to meet increasing access control demands at the busy hospital
 
Compact MPEG-4 PCI Video Encoder
Optics and components : 26 February, 2010
Video Codec board from Advanced Micro Peripherals can encode four concurrent full frame rate video and audio inputs
 
Full Hand Scanning Biometric Time and Attendance System at Heathrow
Time and attendance : 26 February, 2010
Innovative time and attendance system from Security Systems Technology uses palm print biometric technology to prevent fraudulent timekeeping at London's Heathrow Airport
 
DVR and PTZ Dome Cameras Protect Massachusetts Community College
Fixed and PTZ dome cameras : 26 February, 2010
Equipment from Hikvision including PoE PTZ Dome cameras and DVR provides protection for staff and students at the Massasoit Community College
 
Pickersgill-Kaye Targets Export High Security Lock Market
Locks, shotbolts, solenoids and actuators : 26 February, 2010
Lock manufacturer embarks on global sales drive in high security locking systems and rail network market in light of burgeoning markets in areas such as Russia
 
Adopting a BurglarÃÂÃâ€ÂÃâ€Âs Way of Thinking
Security in the Home : 26 February, 2010
With crime figures up in the UK for 2009, EyeSpy 247 provides some insight into the burglar's point of view and provides some advice on how to avoid falling victim
 
USB Based Data Collection Includes Keyword Search on Target Computers
Computer Forensics and Data Forensics : 26 February, 2010
Non-Technical Personnel can now collect and preserve digital evidence from computers using EnCase Portable USB data collection device from Guidance Software
 
UK National MobileID Service Chooses Cogent Systems for Automatic Fingerprint Identification
Fingerprint recognition : 26 February, 2010
National Policing Improvement Agency contract to make use of mobile identification technology using biometric fingerprint recognition systems from Cogent
 
Mobile Wireless Fingerprint Scanning in Use in Florida
Fingerprint recognition : 26 February, 2010
The Florida Department of Law Enforcement is now using the Mobile Rapid ID system from Cross Match for mobile biometric identity verification activities
 
Trade Association Sets Up For Perimeter Security Suppliers
Trade Organisations, User Groups and Pressure Groups : 26 February, 2010
The PSSA will be attending Counter Terror Expo 2010 to explain the purpose of the new trade association linking suppliers of perimeter systems, barriers, gates and bollards
 
Low Dosage Body Scanners Improve Security At Nigerian Airports
X-Ray Detection : 26 February, 2010
After the failed Christmas bombing attempt by Nigerian national, the country's airports are now using SOTER low dose through-body X-Ray scanners for the detection of hidden items on a person's body
 
An IPSA MemberÃÂÃâ€ÂÃâ€Âs View of the Approved Contractor Scheme
Trade Organisations, User Groups and Pressure Groups : 26 February, 2010
Mike White of Charter Security comments on the Security Industry Authority's Approved Contractor Scheme and whether this is enough to determine competency
 
Protecting Crowded Places Focus At Counter Terror Expo
Exhibitions and Trade Shows : 26 February, 2010
NaCTSO hosts conference at Counter Terror Expo on the protection of public places from acts of terrorism
 
Megapixel Cameras Improve Security At Jewellery Manufacturer and Retailer
IP and Megapixel cameras : 26 February, 2010
Chichester based jewellers upgrades from analogue CCTV to 3 megapixel surveillance technology from Mobotix including power-over-ethernet, remote monitoring and audio feed to improve safety and security
 
Solar Panels Reduce Emissions on Cash Delivery Fleet at G4S
Secure Transport Services : 26 February, 2010
Ancillary Electrical Systems on G4S' fleet of cash delivery vehicles will be powered by roof-mounted solar panels, contributing to reduced carbon emissions from one of the UK's largest vehicle fleets
 
Bundled Encryption For Dell Commercial Systems
Data Protection : 26 February, 2010
Dell's Precision, Latitude and OptiPlex systems will now benefit from Credant Technologies' encryption factory installed
 
Wireless Surveillance Network for Chinese City
Camera networks : 26 February, 2010
A Wavion Wi-Fi Metro base station is being used in the rural peace city project in China for establishing city-wide wireless surveillance networking
 
Maxxess Appoints Steps International as Saudi Arabian Dealership
Networked Access Control : 26 February, 2010
Steps International Business Group will distribute access control systems from Maxxess in the Saudi Arabian market
 
Counter Hacking Appliance Demonstration at RSA
Internet Security and Content Filtering : 26 February, 2010
Mykonos Software will be presenting a demonstration of a web application security appliance which provides real-time counter hacking capability
 
High F1000 Uptake on ArcSight Event Logging Software
Internet Security and Content Filtering : 26 February, 2010
TheInfoPro Study into the information security habits of Fortune 1000 companies reveals high levels of use of ArcSight's information event management and event logging software
 
RSA Presentation by FireEye Focuses on Modern Malware Dangers
Anti-virus and anti-malware software : 26 February, 2010
Chief Scientist at FireEye to make presentation on evasion techniques and malware obfuscation which is creating higher threat levels from modern malicious software
 
Cyber Intelligence Report Indicates Online Attacks Becoming More Targeted
Anti-virus and anti-malware software : 26 February, 2010
Cyber criminals become more sophisticated as phishing becomes more focused on lucrative targets according to Cyveillance's latest Cyber Intelligence Report
 
Agentless Detection with McAfee Vulnerability Manager
Anti-virus and anti-malware software : 26 February, 2010
Threat mitigation using Vulnerability Manager from McAfee makes use of knowledge of the largest and latest threats to provide more proactive protection
 
eSoft Sues RuleSpace for Stealing SiteFilter Content Filtering Database
Internet Security and Content Filtering : 26 February, 2010
Allegations made against RuleSpace for the misappropriation of database technology used as the basis for filtering internet content
 
Integrators, Suppliers and Consultants Form Important Part of IT Security Supply Chain
Books, magazines, journals, analysis and reports : 26 February, 2010
In the run-up to the RSA Conference next week, Launchpad Europe is encouraging IT Security suppliers to make best use of channel partnerships for achieving the most effective deployments
 
DDoS Protection for Online Perfume Supplier
Internet Security and Content Filtering : 26 February, 2010
ValentinePerfume has chosen to protect its online presence using Prolexic's service for mitigating Distributed Denial of Service attacks
 
Endpoint Protection Partnership Established
Data Protection : 26 February, 2010
DeviceLock joins SentryBay in offering data loss prevention solutions for endpoint devices
 
Book examines UK Government Vetting and Barring Scheme
Books, magazines, journals, analysis and reports : 26 February, 2010
Practical Guide covering what to expect from the CRB/ISA Scheme on Vetting and Barring has been published in time for the scheme coming into effect in the UK from July 2010
 
Barcode Products Agreement Brings Bespoke Mobile-data Solutions to Market
Tracking and EAS : 25 February, 2010
NX Framework from DA Systems to be used by Barcode Products to deliver end-to-end bespoke systems as a managed service
 
Surveillance Operations at French Eurotunnel Terminal Transformed by IndigoVision
Video Management Systems : 25 February, 2010
Combining Traffic Management, Immigration and Security functions demonstrates the benefits of integrated IP Video surveillance as IndigoVision makes major transformations at the busy Eurotunnel Passenger Terminal on the French side of the channel tunnel
 
BitDefender Immunisation for Kanguru Encrypted USB Drives
Data Protection : 25 February, 2010
Encrypted flash drives from Kanguru now come with anti-virus protection from BitDefender built into the secure portable storage devices
 
Unmanned Aerial Vehicle Protection Proposal for US Mexican Border
Books, magazines, journals, analysis and reports : 25 February, 2010
MiG takes a look at the use of UAV equipment for border security as Texan Governor calls for the use of Unmanned Aerial Vehicles for the protection of Mexican border
 
Chubb Stays in Superbrand Top 20
Manned Guarding : 25 February, 2010
Top 20 Superbrand Listing for Chubb puts the company at the top of the fire and security branding being 20 places ahead of its nearest rival
 
How do you Justify IT Security Expenditure
Data Protection : 25 February, 2010
Providing justification for purchasing IT security solutions is a challenge which Ben Ross of Becrypt resolves with Key Performance Indicators and Productivity Gains
 
Universal Authentication Management For Microsoft Windows
Data Protection : 25 February, 2010
v-GO UAM from Passlogix allows any method of identification to be used for Microsoft Windows access including ID cards and biometric devices
 
IPSA Questions Viability of SIA Prosecutions
Trade Organisations, User Groups and Pressure Groups : 25 February, 2010
Justin Bentley of the International Professional Security Association provides his views on the recent prosecution of Sabrewatch by the SIA for supplying unlicensed security guards
 
Todos Aims for Flexible, Secure and Stylish Authentication with New Product Range
Finance and Banking Security : 25 February, 2010
Online Authentication Products from Todos include on-card password generator and wireless authentication using the recently released A200 Optic
 
Digital Signature Demonstration for Legal Compliance
Internet Security and Content Filtering : 25 February, 2010
GlobalSign will be attending a CSO Council Round Table to discuss the legal differences between electronic and digital signatures and demonstrate digital signature legal validity for electronic documents
 
RSA Conference Presentation Focuses on Securing Data Transfers
Network Security, Routers and Data Centres : 25 February, 2010
Ipswitch Senior Executive to provide RSA Conference Attendees with insight into the protection of sensitive data in transit
 
GuardIT Application Software Protection for Mac OS X
Data Protection : 25 February, 2010
Arxan has extended GuardIT to provide protection to Mac OS X applications as a safeguard against tampering and piracy
 
HD Surveillance Installation Combines Compliance, Security and Productivity Improvements at Food Exporter
IP and Megapixel cameras : 25 February, 2010
Cargo and Facility Security System brings substantial savings to Airberg as the company takes Avigilon HD Surveillance system for asset protection and the achievement of known shipper status
 
Middle East Critical Infrastructure Protection From ICx Technologies
Intruder alarms : 25 February, 2010
Thermal and CCTV Imaging Technology combined with millimetre wave ground based radar to provide perimeter protection at critical site in Abu Dhabi
 
Handheld Anthrax Detection for Australian Market
Sensors, chemical and drug detection : 25 February, 2010
Increased risk of bioterrorism threat in Australian region to be counteracted by Universal Detection Technology with the 5-agent bioterrorism detection kit for use by the emergency services
 
ProVision Millimetre Wave Detection Technology for TSA Screening
Bomb and explosives detection : 25 February, 2010
Checkpoint Screening Systems from L-3 Communications will be used by the US Transportation Security Administration using millimetre wave technology for the detection of explosives and other threats
 
Multi-Modal Biometric Access Control at FedExField
Biometric passports, ID and licenses : 25 February, 2010
Employees at the Washing Redskins home are using Mobile Assure Access Control from Telos providing secure access using biometric credentials integrated with scheduling and HR Systems
 
Single Pose Advanced Imaging Scanners for Nigeria
X-Ray Detection : 25 February, 2010
Advanced backscatter technology equipped single pose body scanners will provide Nigerian checkpoints with the ability to detect non-metallic threats
 
MXSweep E-mail Security Gains Additional Protection with Commtouch
Anti-virus and anti-malware software : 25 February, 2010
E-mail Security-as-a-Service solution from MXSweep now includes GlobalView Mail Reputation Service from Commtouch as well as outbound spam protection.
 
Fingerprint Sensors for Waterproof Fujitsu Smartphones
Fingerprint recognition : 25 February, 2010
AuthenTec's Smart Sensor Biometric Fingerprint Authentication Device has been used on the NTT Docomo waterproof Smart and Prime phones
 
First | Prev  | 1 | 2 | 3  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com