Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Securing networks in the 100Gbps era
Dan Joe Barry of Napatech details the different approach needed to keep up with data growth and the high speed networks of today, requiring the Last Security Tool
PSIM and VMS products feature at IFSEC
Visitors to the IFSEC trade show this year will be able to see the latest video analytics, VMS and PSIM products from Qognify
Cyber attack impact on brand loyalty
FireEye survey reveals the impact of high profile cyber attacks on the loyalty of consumers towards the products of the victims
Real time threat intelligence for IoT gateways
Threat protection provided to IoT gateways to protect against malicious software and denial of service attacks
Almost half of consumers targetted online
Research from Kaspersky Lab shows the extent to which consumers are under threat from cyber attacks seeking online information
Cyber threat regionalisation survey
SophosLabs research shows trend towards geographical targetting of cyber attacks
UN anti counterfeit report a welcome development
The International Hologram Manufacturers Association has welcomed a report from the United Nation on the fight against counterfeiting
The dangers of DIY lock fitting
The Master Locksmiths Association provides its insight into the problems that can occur when home owners decide to do their own locksmithing
Video appliance for large surveillance networks
Dallmeier has released the IPS 10000 video appliance for the recording of up to 100 HD video channels
Video surveillance protects Milan hotel
A large hotel in the centre of Milan is protecting its property and guests with a hybrid security surveillance installation from March Networks
Hybrid network appliance for mixed security systems
Genetec is smoothing the passage for operators of analogue security systems to progress to hybrid and IP environments with a new hybrid network appliance
Lone worker protection for social housing company
RCT Homes has become the latest social housing provider to protect its staff with the use of personal safety alarms from Guardian24
High definition card printing with wasteless lamination
HID Global is keeping card production costs down and eliminating laminate waste with its latest direct-to-card printing system
Video management system wins industry accolade
The VisionHub VMS with some extended capabilities has taken the US Security Industry Association award for best VMS of 2016
Cloud and web app security courses for Sweden
SANS security training courses in private cloud and web application security will be held during May in Stockholm
Comprehensive detection system for Iraq airport
The Najaf international airport in Iraq is improving security with the installation of cargo and parcel screening systems
Four IoT devices vulnerable to attack
BitDefender examines internet connected home devices and their vulnerability to cyber attacks as part of an IoT security study
Cross platform threat analysis and response
EnCase Endpoint Security version 5.12 improves cyber threat detection and response efficiency across a range of operating systems
Bank protects data from insider threats
Union Bank is using DatAdvantage from Varonis as part of its protective measures to secure sensitive data from insider threats
Segmented access and alarm system in St Albans office building
An office building serving start-up businesses in St Albans has improved security with individual access control and alarm systems from Amthal
Low awareness on how to secure the IoT
BullGuard survey shows few consumers know how to protect against IoT cyber threats despite two-thirds being concerned about security
Residential development fitted with video door entry system
A central London residential project is benefitting from IP video door access control for improved security for its occupants
Video management system with hardware decoding
Camera Station 5 has been released by Axis Communications to provide video management for medium sized installations
Network visibility survey shows enterprise vulnerability
Security blindspots in Global 2000 Enterprises highlight the need for greater visibility across the network to prevent security breaches.
Lack of high level trust in data sharing security
Survey amongst senior IT professionals has found that there is little confidence in the security of data sharing processes
Mac ransomware derived from Linux trojan
Bitdefender discovers the Linux.encoder trojan is the basis for the first piece of ransomware for Mac OS X devices
Sandbox technology stops advanced threats
Sandstorm NG sandboxing has been added to Sophos Email Appliance to provide advanced detection and mitigation of cyber threats
Security company celebrates women in the industry
A Women in Security event has been held for International Women's Day by Securitas at its Milton Keynes ops centre
Online activity reporting tool for schools
Safeguarding reports based on alerts available for plugging into web filtering products and providing information to schools of risky behaviour
Report examines encryption trends
Privacy compliance and increased risk driving more corporate plans to deploy encryption technology on-premises and within the cloud
Website security without passwords
Authentication service from iovation provides website administrators with a secure and user friendly alternative to password authentication
Real time Active Directory protection
Privileged Threat Analytics from CyberArk provides real time detection and automatic containment of threats affecting Active Directory
Single point of control for security management
The R80 security platform from Check Point provides corporate IT security managers with single point security management
VMS product accommodates increased video performance
The Cayuga R7 video management system from Seetec has undergone significant changes to provide higher bit rates and new features to meet increasing CCTV system performance and scalability requirements
PSIM for railway security on show in Dubai
CNL Software is attending the Middle East Rail event in Dubai to showcase its Physical Security Information Management system
Locksmith association partnership
The MLA has joined forces with its Irish equivalent to share resources and promote the locksmithing industry
Keeping teenagers on the cyber straight and narrow
Tripwire provides advice on how parents can guide their teenagers on how to avoid dabbling in cybercrime and educate them about cybersecurity
MWC presentation looks at whether Mobile and IoT security is good enough
BeCrypt is attending Mobile World Congress next week with a presentation from its CEO on the adequacy of security for mobile systems and the IoT
US prisons counter contraband with through body scanners
Dutch detection equipment company has taken order for three body scanners for use in prisons in the USA to scan prisoners and visitors for drugs and contraband
Security company gains high employee ranking
The list of the UK top 400 companies to work for includes security services supplier Securitas
Lone worker app reaches award finals
A smartphone app for providing protection for lone workers has reached the finals of the Surrey Digital Awards
Survey measures cyber attack detection confidence
Tripwire looks at the responses to a survey that looked at endpoint cyber attack detection using seven key security controls
Zero day endpoint protection
SandBlast Agent from Check Point brings advanced zero day protection directly to endpoint devices regardless of their mobility
High definition video for monitoring wildlife
A video management system from Milestone is at the heart of a surveillance monitoring tool in use in Australia for monitoring the behaviour of ospreys
Wireless network locks with iLock app
Mobile connectivity and bluetooth feature on the new ArchiTech Designer wireless network locking systems available from Alarm Locks
Ensuring security in new homes
The MLA provides advice to home buyers on making security assessments and preventing domestic crime
Face biometrics help protect Macau casinos
The gambling industry is securing its premises in Macau from banned people with the use of biometric face recognition technology
Survey shows disturbing online habits of teenagers
On Safer Internet Day, Kaspersky Lab urges parents to be more active in monitoring teenager activities to prevent them lurking in the darker corners of the web
Survey sheds light on working practices in IT
AlienVault has conducted a survey into the working lives of IT professionals and the way in which they're treated in the workplace
Cloud based endpoint privileged account security
Viewfinity provides cloud based integrated privileged access management with application control without user experience compromise
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo