Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Device sharing risk for mobile users
Survey results show mobile device owners are taking considerable risks in openly sharing their internet enables smartphones and tablets
Collaborative platform for access management
Salto and Maxxess are collaborating on the integration of security management software with Salto's Virtual Network for access management
Leaked picture fraud takes hold on Facebook
Bitdefender is warning users of social network sites not to be duped into falling for the latest viral or trending snapchat leaks
SMS spam abuse spreads to new channels
AdaptiveMobile explains how the abuse of the SMS messaging service is now spreading to adopt new channels
Social media security compliance for business networking site
Business social media networking site, LinkedIn has chosen Proofpoint to become a certified compliance partner for the protection of branded accounts
Door entry and surveillance system for supported-living accomodation
Housing association residents in the Borough of Hackney gain additional security and peace of mind with a new video and door entry system from Delta
Sports facility uses surveillance to record potential incidents
An indoor trampoline facility at Trafford Park in Manchester has deployed Samsung Techwin surveillance equipment for storing video material for up to three years
Information security training courses for the Nordic region
SANS Institute is providing training courses for IT security professionals during March in the Scandinavian area
Data privacy in the internet of things
Telit Wireless explains how it is protecting consumers from threats in embedded computing on the back of large numbers of IoT announcements at CES 2015
Ring of surveillance protects Minnesota cities
Eight cities in the Minneapolis and St Paul metropolis in the USA are being protected by a ring of surveillance controlled by XProtect VMS
Human factors in corporate cyber security
Cisco explains how the insider threat isn't necessarily malicious but stems from employees unwittingly putting corporate data at risk
To stay safe from cybercrime small firms need to stop thinking like consumers
Kaspersky Lab examines the cyber security dilemma of smaller companies and shows how they need to start emulating larger firms in their approach to data security
IP video management monitors production and transport of hazardous goods
US chemical company takes Milestone XProtect to manage video surveillance operations to secure production and transport of materials as well as meet federal regulations and improve productivity
Awards recognize success using ForeScout products
ForeScout Technologies has awarded customers for game changing, creative and innovative deployments of its products
Reducing Cyber Risk with Trustworthy Best Practices
Ed Paradise, Vice President of Engineering at Cisco explains industry best practice for cyber risk reduction
Enterprise security will become a business challenge in 2015
Rob Lay, Solutions Architect for Enterprise and Cyber Security in UK & Ireland at Fujitsu explains the growing challenges associated with enterprise security
VMS available for Oracle Solaris
The Phoenix RSM video management software (VMS) from SoleraTec is available for operating on the Oracle Solaris 11 operating system
Learning lessons from 2014 threats for a secure new year
2015, when companies will realise they aren’t 100% secure, and consumers will begin to take care of their own security business
Key fob alarm for lone workers
Guardian24 has launched an exclusive new multi-technology personal safety alarm, the MicroGuard.
Failover management ability on VMS servier
Update to exacqVision video management system includes server failover management and event monitoring enhancements
Standard development for alarm receiving centres
Euralarm is contributing to the development of new standards to cover the expanded communications technologies applicable to monitoring and alarm receiving centres
Large scale zero-day attack predictions for 2015
Extrahop Networks is providing its predictions for enterprise IT security professionals for next year
Security trends to worry about and some to ignore
WatchGuard Technologies provides its forecast for 2015 with five worrying trends and five things which IT professionals should strike from their worry list
IP and High definition positioning system
The Esprit series from Pelco by Schneider Electric provides IP and HD positioning for clear imaging over the internet
2014 major cyber threats in review
Kaspersky Lab looks back at the threat landscape of 2014 and the seriousness of fraud operations and corporate cyber espionage
Access control company expands operations in South Asia
UK security company, TSDi, is expanding operations in South Asia in conjunction with integration partner in Vietnam
Shrinkage reduction at New Zealand fast food operations
Parent company of fast food giants in New Zealand are making use of Milestone video management system for theft and shrinkage reduction as well as improved operations
McAfee predicts exploit developments in 2015
After trust was shaken in 2014, McAfee now sees further internet trust related exploits as well as threats to privacy and the internet of things
Cyber threat summary of 2014
Kaspersky Lab summarises the threats that businesses and individuals faced during the year as blocked attacks exceeded 2013 levels by more than a billion
Physical Security Information Management to be showcased in Middle East
CNL Software is attending the Intersec event in Dubai in 2015 to showcase its Physical Security Information Management platform to local audiences
Default passwords create vulnerabilities for home routers
Avast believes up to 75% of routers used in homes throughout the UK are vulnerable to attack because owners haven't changed the default passwords
GSM intruder detection protects moored vessel
Remote intruder detection technology using GSM provides owners of moored vessel near Scunthorpe with peace of mind
2015 predictions for enterprise IT security
Varonis provides its view of what 2015 will hold for enterprise IT security professionals as the fight against cyber crime gets tougher
Non-financial cyber attacks hold hidden costs
Whilst around 50% of cyber attacks have attempted to steal money this year, other non-financial related attacks have also been linked to unforeseen expenses
Secure and accessible timber door sets supplied to new primary school
ASSA ABLOY is providing timber door sets to meet regulatory requirements including security and accessibility at a new primary school being built in Kettering
Market research report on Industrial Control Security
Report from Infonetics Research focuses on the security implications of the Internet-of-Things and of industrial control systems
Password rules pose challenges to online shoppers
Kaspersky Lab discusses the difficulty faced by those doing their Christmas shopping on line when faced with numberous websites all requiring individual unique passwords
PSIM amongst winning products in industry awards
Nice Systems has received awards across a number of categories in security products including for its intelligent video surveillance and PSIM products
Four decades of fingerprint identification
The Automatic Fingerprint Identification System was pioneered by Morphotrak 40 years ago with the biometrics company celebrating its jubilee
Slash resistant gloves made from Cut-Tex PRO fabric
PPSS has launched a new range of gloves for police and security services which are designed to resist slashing and needle penetration
UK wireless security network demonstration for French forces
The residence of the British Ambassador to France will be the venue of a demonstration of wireless video transmission technology to French security forces
School surveillance monitoring and security system
A school in Utah is securing its classrooms as well as providing parents with insight into their childrens' activities using IP surveillance technology from Milestone Systems and Axis Communications
NFC SIM cards for mobile payments in Taiwan
A Taiwan operator has chosen Gemalto to provide SIM cards and software to enable secure payments using Near Field Communications (NFC) technology
Telent completes acquisition of Telindus UK
Technology services company makes acquisition of Telindus to strengthen multi-vendor capabilities for ICT and IP networking systems
Financial institutions to be targeted in 2015
Kaspersky Lab is predicting that cyber criminals will up the ante during the next year and target financial service providers themselves rather than their customers
UK consumers demand harsher penalties for data breaches
Survey conducted by LogRhythm reveals the extent of frustration endured by UK consumers at data breaches suffered by organisations and the need for harsher penalties
UK businesses at risk through lack of cyber security awareness
The BSI has released the results of a survey into the ability for UK businesses to protect their cyber assets as well as their future reputations
Enhanced perimeter protection during increased terror threat
Townscape is providing building managers and architects with information about how to mitigate against vehicular threats as the UK terror alert increases to severe
Advanced DDoS mitigation included in threat protection system
The latest release of the Thunder threat protection system from A10 Networks includes advanced DDoS mitigation capabilities and programmable policy engine
Guarding company attains record Approved Contractor Scheme score
Axis Security has reached a score of 171 points in the Security Industry Authority's Approved Contractor Scheme, the highest the company has ever recorded
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo