Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
News By Date
Optical Turnstiles Selected For Retail Group Lobby Security
Doors, Shutters and Turnstiles : 25 June, 2010
US retail group improves security with the use of Fastlane GlassGate 200 turnstiles with optical control and glass barriers operated by proximity readers for convenient badging in and out
 
GigE Vision Connection For Simple Video Connectivity
Camera networks : 25 June, 2010
The Pleora GigE Vision board is now available from MultiPix Imaging enabling real-time video connectivity for most cameras
 
Industrial Shotbolt Range Expanded
Locks, shotbolts, solenoids and actuators : 25 June, 2010
GSCX Shotbolt range from Magnet Schultz extended for wider applications in the locking and access control markets
 
Customer Care Skills Lead To Guarding Contract At Residential Complex
Manned Guarding : 25 June, 2010
Grade II listed residential complex in the Northern English town of Preston to be protected by guarding officers and patrols from Axis Security
 
Free Computer Monitoring Software During Last Week of June
Internet Security and Content Filtering : 25 June, 2010
Pandora is giving away 50,000 free copies of its computer monitoring software in support of Internet Safety Month enabling parents to have the ability to monitor their children's internet activity free of charge
 
IP67 Rated Wireless Ethernet Bridge Installed At Asda Filling Stations
Camera networks : 25 June, 2010
Radio based surveillance network elements introduced at petrol stations providing ease of installation, built-in encryption and IP67 compliance
 
AElement RFID Lock Developed For The Hotel Market
Electronic Locking Systems : 25 June, 2010
A new RFID door lock from Salto Systems features wireless connectivity, dedicated configuration website and stylish design options bringing security and style to the hotel industry
 
H.264 Drives Reduced Storage Requirements on Evo DVR Equipment
Recording Media, DVR, Video Servers and Data Servers : 25 June, 2010
Vista has now facilitated a 25% reduction in storage requirements on the Evo range of DVR equipment with the inclusion of H.264 compression technology
 
Courier Payment Management System Adopted at DX Group
Tracking and EAS : 25 June, 2010
The Advanced Courier Interface from DA Systems has been chosen by European mail and courier company for controlling sub-contract activity and authorising payments
 
FamilyShield Provides Simple Parental Control Over Family Browsing Habits
Internet Security and Content Filtering : 25 June, 2010
Free web filtering service from OpenDNS provides safe browsing environment for families concerned about their children's internet activity with built-in anonymising protection and blocking of dynamic list of unsuitable web sites
 
GRC Tools From SAS Provide Improved Transparency of Corporate Operations
Software Asset Management and Compliance : 25 June, 2010
SAS explains how Governance, Risk and Compliance can be managed in the corporate environment using new tools available from the company which provide business improvements as well as regulatory compliance
 
Video Smoke Detection Demonstration At Video Content Analysis Event
Fire and Smoke Detection and Fire Control : 25 June, 2010
ASL Vision is attending the Video Content Analysis Conference in London next week with a demonstration of its smoke detection equipment which uses video analytics
 
Arecont Vision Picks Up PSA Vendor Award
IP and Megapixel cameras : 25 June, 2010
The PSA Tec 2010 show saw Arecont Vision take the Outstanding New Vendor Award for a range of factors including technical support, product reliability and shipping performance
 
IDTechEx Examines The State Of The RFID Market
Tracking and EAS : 25 June, 2010
Dr Peter Harrop of IDTechEx provides some guidance on the Global RFID Market and examines some of the factors which are influence the boom in demand that the technology is now going through
 
Cloud Database Access Management Tool
Cloud Computing Security : 25 June, 2010
Toad For Cloud Databases is a tool released by Quest Software for access management tasks on non-relational databases hosted in cloud applications
 
Cloud Computing Growth Outstrips Other IT Markets Through Until 2014
Books, magazines, journals, analysis and reports : 25 June, 2010
Study undertaken by IDC Research indicates high growth in Cloud Computing services during the next four years with growth rates exceeding other IT services by as much as five times
 
AutoDome Easy II PTZ Camera With H.264 Compression Technology
Fixed and PTZ dome cameras : 25 June, 2010
Bosch has introduced a PTZ IP camera for use both indoors and outdoors with rugged construction and high compression H.264 technology for improved transmission and storage management
 
Cloud Based Hosting Service To Use SANsymphony Storage System
Backup, Data Recovery and Disaster Recovery : 25 June, 2010
DataCore has struck a deal with cloud hosting provider Waterstons to provide storage virtualisation infrastructure at its three data centres in the UK
 
Transport Surveillance System Leads To Orange County Arrest
Mobile and rapid deployment cameras : 25 June, 2010
Mobile surveillance systems from March Networks enables local police to identify a suspect using public transport
 
SAS Acquires Supplier Of Law Enforcement Software Supplier
Intelligence Software and Knowledge Management : 25 June, 2010
Intelligence software supplier to the law enforcement and security markets, Memex falls into the hands of SAS in acquisition which provides SAS with deeper market penetration in the sector
 
Internet Banking Security Improvements At Northern English Building Society
Finance and Banking Security : 25 June, 2010
The Cumberland Building Society has chosen VALid from ValidSoft for the protection of internet banking clients with behavioural analysis and two-factor authentication technology
 
Trustwave Enters Web Application Security Market
Internet Security and Content Filtering : 25 June, 2010
Imperva comments on the acquisition of Breach Security bringing Web Application Firewall skills to Trustwave
 
CodeArmor Protection For Independent Software Vendors
Software Rights Management : 25 June, 2010
V.i. Labs is making CodeArmor software for providing intelligence and misuse reporting available to the Independent Software Vendor community for protecting their bespoke software products
 
Secure Browsing Services Protect Zions Bank On-line Banking Customers
Finance and Banking Security : 25 June, 2010
Rapport and Flashlight from Trusteer are helping Zions Bank provide retail and business transaction protection from malware and Trojans relating to the banking and finance industry
 
Fujitsu To Supply FalconStor Disaster Recovery Solutions In Japanese Market
Backup, Data Recovery and Disaster Recovery : 25 June, 2010
Supplier of backup and recovery systems enters into distribution agreement with Fujitsu Software Technologies to provide Japanese customers with DR Technology from FalconStor
 
Online Forum Leads To Arrest Of Teenagers Involved In Cyber-Crime
Anti-virus and anti-malware software : 25 June, 2010
Lumension comments on the recent arrest of two teenagers by the Police Central e-crime Unit in the UK as a result of activities on an on-line cyber crime forum
 
One Click Secure VPN Client
Network Security, Routers and Data Centres : 25 June, 2010
Secure Enterprise Client from NCP Engineering improves security for remote workers whilst enabling flexible access to company IT resources using secure VPN
 
Constant Current Power Supply Designed For LED Lighting
Lighting : 25 June, 2010
Sunpower has developed a rugged constant current power supply with brightness control capabilities for use in LED lighting installations
 
Location Based Services to Return To Growth Within Next 4 Years
Books, magazines, journals, analysis and reports : 25 June, 2010
Report from Berg Insight indicates that the market is beginning to rebound for Location Based Services and that growth in the sector is expected before 2014
 
UK Government Department Takes Secure File Transfer Capabilities From Accellion
Network Security, Routers and Data Centres : 25 June, 2010
The Central Office of Information has chosen the Accellion Secure File Transfer Solution for high security information sharing
 
Emerging Technology Recognition For Avenda Systems
Data Protection : 25 June, 2010
Identity Aware access management systems from Avenda have been recognised by Everything Channel in the emerging technology listing
 
Ontrack Data Recovery For Apple Customers
Backup, Data Recovery and Disaster Recovery : 25 June, 2010
Data recovery systems from Kroll Ontrack have been extended to cover the broader range of Apple products now available from the iPhone through to Mac OS X Server
 
Partnership Brings IPSecurityCenter To Oil and Gas Industry
Security Management Systems and PSIM : 25 June, 2010
Advaita Informatics has entered a channel alliance partnership with CNL for deploying the company's security management systems into clients in the oil and gas service sector
 
Mobile Contactless Application Gains Innovation Award
ID cards and smart cards : 24 June, 2010
The Onom@topic+ project from Gemalto which extends the usage potential of UICC cards into a wider range of applications including contactless payment gains Eureka Innovation award
 
Lagos Company To Distribute gateProtect UTM Solutions in Africa
Unified Threat Management : 24 June, 2010
German gateProtect has launched into the African Unified Threat Management market by signing Lagos based Kits Technology for local distribution and support
 
Flexible Distribution Access Control And Security Management System For Chinese International Airport
Networked Access Control : 24 June, 2010
The CEM AC2000 system from CEM Systems is providing control over a fully integrated IP security system at Changsha Huanghua International Airport in China including IP card readers, biometric fingerprint readers and integrated CCTV surveillance monitoring
 
Airports in Brussels and Liege Take IP CCTV Surveillance Systems from IndigoVision
Video Management Systems : 24 June, 2010
Control Center from IndigoVision is bringing integrated security management to two major Belgian airports including the incorporation of legacy analogue equipment from adjacent facilities enabling a migration path to full IP surveillance
 
Covert Information Management Solution for Western Australian Police
Intelligence Software and Knowledge Management : 24 June, 2010
ABM secures second Australian police contract with the provision of abmpegasus Source Management to Western Australia for the management of intelligence information
 
NTU University In Singapore Takes Flexible Card Access System
ID cards and smart cards : 24 June, 2010
LEGIC and Kaba provide the NTU University in Singapore with CardLink system using LEGIC card access management and Kaba locking technology
 
Turn Your Spam Into Prizes With The Cloudmark Show Us Your Spam Contest
Cloud Computing Security : 24 June, 2010
Cloudmark is challenging recipients of spam to get creative and turn their spam messages into video entertainment in the ÃâÅ"Show Us Your Spam" challenge with prizes of Amazon vouchers, Flip Video Recorders and a large screen television
 
NSA Approval For Use Of USB Encryption System from Spyrus
Data Protection : 24 June, 2010
The Hydra Privacy Card meets the requirements of the National Security Agency for use in data protection applications with Windows 7
 
Sanasa Development Bank Goes Live With Fiserv Banking Transaction and Teller Systems
Finance and Banking Security : 24 June, 2010
Fiserv has commissioned a full banking operating system at a major Sri Lankan development bank enabling services and banking processes to be streamlined for more effective customer service
 
US Air Force Takes Radiation Detection Equipment From UDT
Radiation Detection : 24 June, 2010
Equipment for the detection of radiation to be supplied by Universal Detection Technology to the United States Air Force
 
Support For Intel Anti-Theft Technology Built Into Motion Tablet PC Equipment
Communications and rugged IT equipment : 24 June, 2010
The full range of rugged tablet PC units from Motion Computing has now adopted the vPro processors from Intel in addition to having full support for Intel's latest Anti-Theft Technology
 
Automatic Security Testing For Enterprise Users
Data Protection : 24 June, 2010
Core Insight Enterprise has been released in Beta enabling continuous test and measurement of enterprise IT security systems
 
Management and Monitoring of Business Usage Of Social Media
Internet Security and Content Filtering : 24 June, 2010
Cyveillance enters the field of social media with the Secure Social Media Management tool enabling companies to be able to take advantage of social media without falling prey to the disadvantages
 
Detailed Survey Reveals Teenage Internet Activities
Internet Security and Content Filtering : 24 June, 2010
Cyber-bullying, revealing private information and entering into dialogues with unknown internet users continue to cause concern for parents of teenage internet users in America as McAfee survey reveals the extent of alarming behaviour within this vulnerable age group
 
Security Vulnerability Identified at VeriSign
Internet Security and Content Filtering : 24 June, 2010
Vulnerability identified by Comodo could have wide-reaching effects on users of SSL Digital Certificates
 
Authentic Achieves 10,000 Transactions Per Second
Finance and Banking Security : 24 June, 2010
Consumer payment service appliance reaches transaction rate milestone enabling high speed processing in financial institutions
 
International Co-operation Required In Fight Against Cyber Crime
Anti-virus and anti-malware software : 24 June, 2010
Network Box releases paper on the situation regarding political wrangling on the issue of cyber-crime which the company argues is not getting enough international top-level attention
 
First | Prev  | 1 | 2 | 3  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com