Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Fire detection system upgrade for Scottish housing association
Dunedin Canmore housing association in Edinburgh is protecting residents with an upgraded fire detection system from Chubb
High definition video appliance for simplified installations
Combining power-over-ethernet switch and powerful video management software, Avigilon have created a simple to install video appliance
Partnership sees integration of video management and analytics
SeeTec and IPS Intelligent Video Analytics have entered into a partnership which sees intelligent video surveillance based on the Cayuga VMS
Optimized hard disk drive for surveillance applications
New hard drive from Seagate features 6TB storage capacity and rescue services optimized for use in highly demanding surveillance applications
When is a vulnerability not a vulnerability?
Mark Kedgley, CTO of New Net Technologies provides information on a continuous approach to vulnerability scoring and management
Research report into transportation security
Transportation safety and security equipment is the subject of a market research report examining demand for the next 4 years
Intelligent Network Infrastructure for Ryder Cup event
Boston Networks has supplied the IP security and intelligent network infrastructure that will be used as part of the 2014 Ryder Cup event at Gleneagles
User-friendly platform for proactive surveillance
The latest release of Avigilon Control Center video management software provides complete video analytics configuration and support
On-camera video management system demonstration
ASIS attendees will be able to see the Milestone Arcus Video Management System performing on board IQinVision camera equipment
Suspect search analytics wins ASIS award
NICE Systems is celebrating award success for its Suspect Search video analytics software at this year's ASIS event
Dome cameras with built-in video analytics
High definition bullet and dome cameras from Avigilon are now available with embedded adaptive video analytics functionality
Professional body enters critical infrastructure protection relationship
National Infrastructure protection centre and the Security Institute have entered a relationship to ensure the availability of qualified security professionals
Fast video search facility for people tracking
Identifying and tracking people on surveillance systems is now made easier on a Nice video analytics systems that cuts down video search times
Privacy concerns uncovered as barrier to mobility
AdaptiveMobile reports on the concerns of employees for their privacy as well as a lack of trust as barriers to mobility
Four year outlook on DDoS prevention market
Key vendors involved in Distributed Denial of Service prevention examined in new market research report predicting market volume over next four years
Improved mapping now available on PSIM software
The latest release of the IPSecurityCenter PSIM software includes multiple deployment capabilities, video export and improved mapping
How to keep contactless payment credentials secure
Bitdefender explains the top security threats associated with the booming contactless payment industry with monthly spending now three times that of last year
Arcus embedded video management for surveillance hardware
Milestone Systems takes the next stpe in scalability with the release of the Arcus embedded video management system
Video management for mobile and remote surveillance
Synectics adds to its Synergy range with the Compact and Tablet versions for delivering command and control capabilities for mobile and remote-site surveillance
Secure private messaging system patented
Maxxess to attend ASIS to demonstrate its Ambit secure communications technology developed for the security industry
Hybrid DDoS Defence for cloud and on-premises environments
Arbor Networks improves its CloudSM and Pravail protection systems for hybrid DDoS either in the cloud or on company premises
Flawless detection rate in unknown attack testing
Benchmark testing using unknown malicious files gives Check Point Threat Prevention highest mark in protection against internet attacks
Auto IP camera discovery feature for exacqVision VMS
Exacq Technologies brings video surveillance a step closer to plug-and-play with the EasyConnect automatic IP camera connector feature
Manned guarding software integration with video management system
GuardTrax has integrated its phone app with Milestone XProtect bringing guard management workflows into mainstream security control software
Museum facility administrator event sponsorship
Chubb is one of the sponsors of this year's conference for museum facility adminstrators taking place in Scotland
The future of mobile forensics in global legal systems
Yuval Ben-Moshe of Cellebrite explains the necessity for accommodating mobile forensics technology as part of the legal process
Cloud based identity and access management for Samsung
The identity and access management feature on Samsung's enterprise mobility management cloud based service enabled by Centrify
Guide available for Security Architects
The British Computer Society has released a guide providing top tips to organisations on IT security architecture
Cyber threat programme assessment and development
Rapid7 is now offering programme development services for cyber security through its Global Strategic Services Practice
Integration improves mitigation and response times
UserInsight from Rapid7 now operates in conjunction with HP ArcSight ESM providing faster and more effective threat mitigation
IP intercoms protect access at UK laboratory
Unilever has chosen Castel's IP intercom stations for improving access security to its laboratory and research centre on Merseyside
Four reasons why tape based data storage isn't dead
Christian Toon, the head of information risk at Iron Mountain explains how tape is still being used as a data storage medium
Latest breach shows retail industry to be prime cyber attack target
HP comments on the recent cyber breach at retailer Home Depot illustrating the high levels of vulnerability surrounding the lucrative retail business
ForeScout expands presence in EMEA region
Increased demand in Europe for network security and continuous monitoring and mitigation leads to expanded presence in the region for ForeScout Technologies
Affordable Cyber Security Accreditation for Public Sector suppliers
The SME segment of the UK's public sector supply chain gains affordable cyber security accreditation from HP enterprise services
High mobile operator uptake of security software
The top nine mobile operators are protecting their subscriber base with mobile security protection from AdaptiveMobile
Move to biometrics a significant step for banking security
Fujitsu comments on its support for Barclays bank and the move it has made to move client access to banking services through finger vein biometrics identification technology
All In One Security plug-in for Wordpress vulnerability
High-Tech Bridge explains threat of new vulnerability affecting the All-in-one security plug-in for Wordpress
Linux malware linked to DDoS attack campaigns
Akamai has released a threat advisory covering high-risk Linux system infections that can be used to launch DDoS attack campaigns
Nine DDoS Assumptions That Must Be Put to Bed
Xuhua Bao, Hai Hong and Zhihua Cao of NSFOCUS dispel nine popular myths that surround Distributed Denial of Service attacks
Data recovery from Apple logical failures
Kroll Ontrack has developed a means of recovering lost data from Apple mobile devices after they have suffered a logical failure
Video analytics integrated in Samsung camera range
WiseNetIII network cameras from Samsung Techwin will now be available with the savVI video analytics software from Agent Vi embedded
10% of finance workers try to circumvent security
IS Decisions reveals the extent of insider threats in the finance industry with large numbers of employees admitting to deliberate insecure practices
British Standard certification for alarm receiving centre
The Community Safety Glasgow alarm receiving centre has been accredited to BS8484 for lone worker protection alarm monitoring
Research investigates future of port security
Market research suggests 10% CAGR for the market for port security management worldwide during the next four years
Biometric supplier acquires French secure authentication company
Secure identification software supplier Dictao has been acquired by biometric supplier Morpho in bid to expand market opportunities for complementary products
Unified surveillance system protects University of West Scotland
The multiple campuses at the large University of West Scotland are being protected with a unified IP surveillance system based on the Milestone XProtect video management system operating Axis cameras
Industrial control system security skills imbalance needs addressing
SCADA and industrial control system security expert comments on the lack of integrated engineering and cyber security expertise needed to overcome threat to critical infrastructure
Door hardware chosen to fit in with architectural style
A school in Essex has taken transom closers and door handles from Alpro for providing the required door operating characteristics while meeting the school's architectural style requirements
Trojan delivery exploits Ukrainian political situation
Hackers are using spam exploiting anti-western feelings in Russia to deliver malicious code for further spreading malware
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo