Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Free tool for removing unsolicited browser add-ons
Unwanted adverts, toolbars and browser add-ons can now be simply eliminated with a new tool available from BitDefender
Licence plate recognition application for WiseNetIII cameras
Samsung Techwin now supports Arteco's Automatic Licence Plate Recognition application for use on its WiseNetIII range of surveillance equipment
Only half of UK critical business data secured
Research from NTT Com Security reveals extent of insecure data and lack of insurance within the structure of UK companies
Interoperability alliance strengthens access and threat management
ForeScout and Palo Alto Networks have integrated their products to offer greater threat management and network resource access control based on the ControlFabric platform
Research reveals extent of DDoS attacks on online service companies
More than a third of public-facing online companies have become victims of DDoS attacks during the last year
Office worker survey shows high levels of complacency over data loss
Imation has performed a study into company employee views on data risk and the vulnerability of confidential data in the hands of remote workers
Critical communications system provider rebrands
Vocal has rebranded as Everbridge after earlier acquisition by supplier of critical communication and notification systems
Rapid video review for major investigations
BriefCam releases Syndex GV rapid video review technology for use by Government agencies involved in major investigations
Integrated access control system improves security in UK hospital
The Norfolk and Norwich University Hospital has upgraded its legacy security system with integrated access control technology from TDSi
Video management system release with improved management convenience
The fifth release of the SeeTec Cayuga video management system in december will see improvements in installation convenience, management and integration
Major organizations collaborate on latest cyber security challenge
The 2015 cyber security challenge kicks off with realistic cyber terrorist attack simulation to test the skills of participants
Travelling executives warned of Darkhotel threat
Highly targeted cyber espionage techniques are being used against commercial travellers with highly valuable information warns Kaspersky Lab
Collaboration group to investigate connected vehicle security
Intercede is part of a new collaborative group of industry partners examining the security implications of the emerging technology of connected vehicles
Smartphone apps for remote monitoring
Android and iPhone apps available from Apple store and Google Play for use with Vivotek surveillance networks for remote monitoring
Avoiding the pitfalls of authentication based IT security
David Hald, co-founder and chief relation officer, SMS PASSCODE provides a step-by-step guide to understanding the common pitfalls of authentication-based security
High performance IP video surveillance partnership
Pelco and Avaya have entered into a relationship to collaborate on technology development for scalable IP video surveillance networks
UK distribution agreement for access control products
Under a new agreement, Mayflex will distribute the Aliro range of access control products from Siemens in the UK
Biometric software meets US fingerprint matching requirements
Fingerprint biometric technology from Neurotechnology gains second place in MINEX rankings for fingerprint matching algorithms thereby meeting US public sector requirements
Interactive incident timeline speeds up investigations
The UserInsight behaviour analytics software from Rapid7 now features interactive incident timeline for faster investigation capability
Wordpress fixes plug-in vulnerability
A vulnerability in the LiveSupporti WordPress plug-in has been fixed after Check Point raises the issue with the CMS supplier
Video analytics for searching for suspects
NICE Systems is attending expoprotection with its video analytics system for assisting in the search for suspect and missing persons in video footage
High performance hybrid and IP video recorders
The Z-Series network video recorders from Exacq Technologies have been updated for higher performance and reliability
Hardware line adds flexibility to software-based security management platform
Nedap is introducing the AEOS Blue hardware line, its sixth generation of AEOS controller. This new generation of controller builds on the software-based AEOS Security Management Platform. The AEOS Blue is a self-contained, energy-efficient, powerful hardware line consisting of door controller, door
Technology collaboration results in enhanced infrastructure protection
ForeScout Technologies and McAfee have partnered to combine CounterACT with McAfee products to gain additional protection through the exchange of threat intelligence.
Secure mobile identity systems on show at CARTES
HID Global is attending the CARTES 2014 event in Paris with its range of mobile access solutions which support bluetooth smart and NFC
IP security system for Brazil fire service
The Bombeiros do Estado de São Paulo has installed the latest IP video surveillance technology from VIVOTEK for enhanced security
On-demand intelligent DDoS mitigation for service providers
The release of Arbor Cloud gives service providers intelligent protection for Distributed Denial of Service attacks on demand
Twitter Digit service shows no change in security
Single device control with OTP and number verification adds no significant security advantage, according to Kaspersky Lab
DDoS attacks quadruple in 3rd quarter 2014
Quarterly state of the internet report from Akamai shows four-fold increase in the size and volume of Distributed Denial-of-Service attacks globally
Network policy change automation software
Version R14-3 has been released for Tufin's Orchestration Suite for network change automation
Facilities management company provides employees with lone worker protection
The MySOS lone worker protection system from Skyguard is being used to provide staff at VINCI Facilities with two-way communications, GPS location and emergency alarm all from one device
Industrial firewall for infrastructure protection
The Tofino Xenon firewall for securing industrial control systems is now available in the UK from Electroustic
Mobile wallet service offers tokenization for mobile payments
MeaWallet enters pilot programme with financial institutions on tokenization for mobile payments across all carrier technologies
Distributed security system roadshow for homes and small businesses in Ireland
Visonic is taking part in a tour of four cities in Ireland to introduce home and small business owners to the power of the PowerMaster-33 wireless security system
Traceable liquid scheme being used across Scotland
Police have started using SmartWater traceable liquid technology across Scotland as a deterrent to housebreaking
Tyco completes Spain technology events
Security company Tyco has been touring Spain during the last two months enabling event participants to contact sales and technical personnel at the company
IP surveillance products on show at Canada security event
OnSSI has been displaying Ocularis VMS with integrated products at the Security Canada Central Conference and Expo event earlier this week
Gloucestershire motorway services take environmentally friendly door accessories
ASSA ABLOY has met the environmental requirements of the Gloucester Service Station on the M5 with the supply of sustainable door locks and accessories
SSH Key management available with privileged account security management
CyberArk has added SSH key management to its privileged account security management platform
WebUI vulnerabilities expose system admin portals
Security experts at Check Point have discovered WebUI vulnerabilities in System Admin Portals enabling administrator credential theft
Network security UK parner award
Palo Alto Networks has recognized NTT Com Security with UK Partner and EMEA Reseller of the Year awards
Future Android attacks could exploit the Binder
Messaging passing mechanism in Android smartphone devices exposed as a potential vulnerability in next generation attacks
Surveillance SDK for biometric face recognition in crowds
The VeriLook surveillance 3.0 SDK from Neurotechnology is available for enabling real time biometric face identification in live video streams
Advanced video analytics on fixed IP cameras
The Sarix range of IP cameras from Pelco now support uninterrupted security monitoring and advanced video analytics
Maintaining effectiveness in a changing security market
Kevin Townsend explains the way the IT security industry is changing and how companies need to be both efficient and effective in what they do
Secure authentication for public sector network
The Shetland Islands Council has improved security and remained PSN compliant with the implementation of 2FA network access control from SecurEnvoy
Remote data recovery for help desk staff
Data recovery and diagnostic tool from Guidance Software enables IT help desk operators to recover deleted and lost files in the enterprise
Measuring success in threat management programmes
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
Cloud based security protection for Mac users
Intego has released an integrated system for security and activity monitoring for business users of Apple Mac computers
Employers being put at risk by poor password habits
Centrify reveals the conclusions from its research looking into poor password habits and the cost to associated businesses
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo