Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Data encryption company acquisition
ESET has bought out data encryption company DESlock+ to provide encryption based products as part of its range
Healthcare industry falls into cyber crime spotlight
Websense report examines the vulnerability of the healthcare industry to cyber attacks and reveals startling statistics on the volume of security incidents
Camera range to come preloaded with applications
Dan England of Samsung Techwin answers questions about the forthcoming inclusion of preloaded applications on the WiseNetIII range of open platform cameras
Partnership to tackle security threats in the Internet of Things
Webroot has partnered with Lynx Software to provide advanced threat detection and real time protection for the internet of things
Key management features at emergency services show
Morse Watchmans is attending the Emergency Services show in the UK with its range of key management products
Printers with built-in security protection
The latest generation of laser printers from HP have security features built into them with BIOS protection
UK distributor stocks latest fixed network camera
The Q17 series of fixed network cameras from Axis Communications are now being distributed through Norbain
Biometric facility to open in West Virginia
US biometric specialist Morphotrak will open a new facility to support its operations in Morgantown, West Virginia
Video analytics with face recognition on show at GIS
The Global Identity Summit will see the release of the Morpho Video Investigator analytics package with face recognition technology
Tape storage certification for VMS supplier
The Phoenix RSM video management software from SoleraTec has been certified for use with the HP family of data tape storage libraries
EU data regulation preparations
Rob Norris, Director of Enterprise and Cyber Security for UK and Ireland at Fujitsu discusses the development of cyber resilience required by companies to meet the 2017 requirements of the new EU data regulations
VMS and NAS partnership for long term video retention
The Ocularis VMS product will be integrated with the Spectra Verde network attached storage product under new partnership agreement between OnSSI and Spectra
CoinVault arrests made in Holland
Kaspersky Lab plays crucial role in apprehension of two criminals associated with the CoinVault ransomware attacks
More functionality in multi biometric SDK update
The MegaMatcher software development kit for multiple biometric technologies updated to improve functionality including face recognition liveness test
Protection against web application user account attacks
SecureSphere 11.5 brings cloud and on-premises data centre protection through blocking attacks aimed at compromising user accounts
Multi-sensor cameras on show in Europe
Pelco is exhibiting its latest video management system and multi sensor panoramic camera at events in Europe this autumn
Untrustworthy certificate authority survey results
Venafi releases its survey results into vulnerability remediation for untrustworthy CAs amongst security professionals at Black Hat USA
ONVIF compliant covert ATM camera
A covert IP camera with wide dynamic range and ONVIF profile S compliant has been released for use in the banking industry
Security conference sees new product launches
HP has released a number of new data security and compliance related products at its HP Protect conference for security professionals
Payment service XSS vulnerability discovered
Bitdefender details its latest discover, this time of a stored XSS vulnerability which could affect payment service users
Hands free video door entry system
Miro hands-free video door entry system uses existing 2-wire installations while providing the latest functions and high security
Camera range upgraded for improved light handling
The wide dynamic range - dynamic capture feature on Axis fixed network cameras enables clearer images to be obtained in difficult lighting
Protecting against non-malware breaches
Dell SecureWorks provides advice on avoiding security breaches that make use of the company credentialling system without the use of malware
Channel Reseller News recognition for ForeScout CEO
Mike DeCesare named in top 100 executive list in Channel Reseller News rankings for 2015
UK Security company opens new operating centre
Securitas has opened its new operating centre and training facility in the UK at Milton Keynes
IT security analytics products released at conference
HP has released new products at the HP Protect event focused on shifting the emphasis of IT security towards an analytics approach
Trusted application management for the IoT
Intercede and Solacia enter strategic partnership for the deployment of trusted application management services to secure the internet of things
Video encryption improvements on show at ASIS
At the US ASIS event, Genetec will be demonstrating its latest video management system release with improved encryption and reduced bandwidth.
August 2015 threat report available
McAfee Labs has made the latest threat report available reviewing the way hardware and software threats have evolved over the last five years.
Agentless protection for Windows 10 BYOD devices
CounterACT provides security professionals with the tools needed to cope with the deluge of Windows 10 BYOD device network connections
Mobile and voice control on Digital Video Manager
Latest release of the Honeywell Video Manager provides greater efficiency with mobile and voice control features
Young people lack trust in digital security
Survey of millennials on both sides of the Atlantic reveals a lack of faith in the ability of security practices in protecting digital identity
ICS security course to be held in Amsterdam
Courses will be available at an Industrial Control System summit being held in September in Amsterdam
The silent approach of advanced persistent threats
High Tech Bridge explains how easily advanced persistent threats infiltrate the IT network of an organisation exposing vulnerabilities
IP video improves security at East Anglia hositals
Mental health units in Norfolk and Suffolk have seen an upgrade from Analogue to IP video surveillance systems for improved security
Violent criminals convicted with help of Smartwater evidence
Smartwater forensic trace evidence on shoes belonging to a suspect helped lead to the capture of three violent criminals in the UK
Mobile key services integrated with access control system
Salto Systems and Zaplox have integrated their products to provide the hospitality industry with combined access control and cloud based mobile key services
Video door entry panels for apartment complex
The former foreign missionary college in London has been converted to flats and has been secured using digital video door entry panels with power over ethernet
Protection from malicious mobile apps
Corporate defence software from Proofpoint provides organisations with protection against vulnerabilities on mobile smartphone devices
Stopping the insider threat
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme
The IoT Botnets are Coming: Are You Prepared?
Rishi Agarwal of NSFOCUS provides some insight into the security vulnerabilities associated with the Internet of Things and what is being done to prevent them from being exploited
Secure radio storage and tracking
UK highways contractor takes secure storage facility for issuing and controlling its airwave radios
Smartphone app for surveillance technicians
The GURU Smartphone app from March Networks provides security surveillance technicians with improved troubleshooting and diagnostics capabilities
Common video interfaces for vertical applications
Ocularis integrations certified for vertical markets including banking, access control and licence plate recognition
NIST accolade for tattoo recognition technology
The National Institute of Standards and Technology has praised the capabilities of tattoo recognition technology from Morphotrak
Effective archiving to avoid data swamps
Eileen Sweeney, SVP and General Manager of Data Management at Iron Mountain examines how organisations can avoid drowning in a swamp of data with the use of effective archiving strategies
Securing the IoT with the Help of Multi-Factor Authentication
David Hald of SMS PASSCODE explains how multi factor authentication can be used as a robust security measure for the Internet of Things
How wireless surveillance could help in Calais crisis
Vemotion explains how the use of a wireless network infrastructure for security surveillance systems could provide critical protection for drivers embroiled in criminal migrant activities in Calais
Entry level video analysis appliance
Dallmeier releases the DVS 800 IPS video analysis appliance for analysing up to four video channels
VMS certification for rugged NVR
A highly rugged NVR for use with multiple cameras in transport applications has received Milestone certification for use with the XProtect video management system.
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo