Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
IP infrastructure and access control partnership
Vigitron is working with Access Control specialists at PCSC on providing IP infrastructure transmission and Power-over-Ethernet for use in security systems
Innovation brings full scene clarity on dome camera range
Sharpdome technology from Axis Communications provides the company's latest dome camera range with full scene fidelity regardless of dome position
Increase in cyber attacks affects all sizes of companies
Darren Anstee, Director of Solutions Architects at Arbor Networks puts perspective on the cyber security landscape and shows it isn't just large companies that are at risk
Insecure personal data on wearable technology
Kaspersky Lab discovers security flaws exposing personal data to risk when using wearable technology for fitness assessment
Call for cloud-based digital signature recognition in EU standards
Cryptomathic is calling on the EU to incorporate a recognition of cloud-based e-signature management within the electronic identification and trust services mandate
Forensic traceability to protect London households
The Metropolitan police will provide London home-owners with packs of traceable liquids to use as markers for valuable items
Insider threat protection to increase during 2015
Research from IS Decisions shows that existing levels of just of 40 percent for insider threat protection will increase within the UK during this year
IP surveillance protects Tehran metro construction project
Vivotek has supplied IP video surveillance equipment and video management software to provide protection for a construction project on the Tehran underground transport system
Financial services compliance expansion
Additional functions available on Proofpoint Enterprise Archive for improving compliance of financial services companies to regulatory requirements
Centre for Secure Information Technologies investment award
The EPSRC has awarded an investment of 5 million pounds for cyber security research at the Centre for Secure Information Technologies
Improved parking security for Finnish truckers
An overnight rest area on a major route through Finland is protecting its community of truck drivers with the use of Sony surveillance equipment
Surveillance and access control protect cycling brand HQ
The UK head office of Specialized cycling has made use of security systems from Mobotix for the protection of its premises
Three key IT security focus areas identified
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks
Security company makes tendering process carbon neutral
Part of its corporate social responisbility objectives, the new tendering process at Corps Security will have minimal impact on the environment
Laptop lockers improve security at Lincoln College
Three lockers provide security and asset management capabilities for 80 laptops at educational institute in the UK
Virtualised cloud communication security
The virtualised real-time communications system from Sonus Networks brings enhanced security and intelligence
Biometrics facilitate remote identification in Pinellas County
Local police in Pinellas County now have mobile access to fingerprint records enabling biometric finger identification whilst in the field
Unified Security Management for card payment system provider
Crosskey has chosen Unified Security Management from AlienVault for increased security visibility in its card payment processing operations
Secure data on the move for TfL using hardware encrypted flash memory
Hardware encrypted secure USB storage devices by iStorage are being used by Transport for London to help prevent loss of mobile data
New malware bypasses CAPTCHA
Android malware targets Russian social network users with method to overcome CAPTCHA codes in attempts to extort money
Embedded video analytics cooperation agreement
The Savvi analytics engine from Agent Vi will be available pre-installed on Hikvision cameras as part of a new strategic agreement between the two companies
Mini backscatter system introduced to UK market
The handheld Z Backscatter image scanner for portable drug, explosive and organic threat detection makes its debut on the UK market
RFID based access control protects London student accommodation
The use of RFID escutcheons in student accommodation development in central London provides secure access with reduced building wiring
Key actions needed to ensure digital safety
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe
Natural language processing for preventing spear phishing
OpenDNS develops new model of making real-time detections of targetted phishing campaigns using natural language processing
New wave of Cryptowall ransomware attacks
Bitdefender uncovers new distribution mechanism for the Cryptowall ransomware through spam campaign
Console provides real time social media threat information
Proofpoint is now supplying its Nexgate Social Threat Centre, a console for providing administrators with up to date information on social media threats
On-demand web penetration testing available to security suppliers
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme
More models added to network camera range
Featuring advanced lens technology, the new Canon surveillance camera range features new dome, box and 360 degree cameras
Camera location mapping included in latest VMS version
The Mirasys VMS has been re-released at version 7.3 with improved mapping features with GPS coordinates of cameras on the premises under surveillance
Centralised e-mail encryption
Simplified enterprise e-mail encryption includes flexible and configurable policy settings
Cloud surveillance system integrates with VMS
Technology alliance between mobiDEOS and OnSSI results in integration between video management system and cloud-based surveillance platform
End to end control for real time communications networks
Sonus IQ has been released to provide real time communications network operators with a security and intelligence platform
Biometric iris authentication for smartphones
Fujitsu bites the alternative authentication bullet and proves that non-fingerprint biometric technology is possible for the protection of smartphones
4G connected surveillance for home monitoring
Property without wf-fi connectivity can now be monitored using the latest Nubo camera with 4G connectivity from Panasonic
Intelligent protection combats grey route mobile messaging
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks
Multi-factor authentication for wearable technology
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress
New CEO appointed at ForeScout Technologies
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer
Cloud based real time communications demonstration at MWC
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications
The most dangerous IT threats of the year and how to neutralise them
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
Aggressive adware still being seen in Android apps
Google play is still hosting apps that are riddled with aggressive adware, warns Bitdefender
Research published on Security-as-a-Service for communication service providers
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients
Nedap to organise welcome party at ASIS conference in Frankfurt
The ASIS European Security Conference and Exhibition in Frankfurt this March will be launched with a Nedap organised and sponsored welcome party
Surveillance camera SD card playback support
Video footage stored on SD cards on Samsung Techwin security cameras can now be played back directly on Android and iOS devices
Comprehensive security for mobile operator signalling infrastructure
SS7 Protection from AdaptiveMobile provides protection to the core networks of mobile operators against SS7 protocol based attacks
Wireless transmission system for all-weather radar
3G/4G transmission system connects all-wather radar perimeter protection system from Ogier for commercial and military applications
Host service provider strategies to defend against DDoS attacks
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
NCT CBRNe Europe 2015 - top three burning issues
Timely evaluation of Ebola Response, the Ukraine Crisis and Europe’s Response to Emerging Terrorism at European Defence Forum.
Cloud archiving features on VMS stand at ISC West
Genetec is attending the ISC West show this year with the latest version of the Security Center video management system featuring cloud archiving service
Dutch minister to open critical infrastructure protection conference
The Minister for Security and Justice of Holland will be addressing delegates of the Critical Infrastructure Protection and Resilience conference in Europe next week
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo