Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Sandbox technology stops advanced threats
Sandstorm NG sandboxing has been added to Sophos Email Appliance to provide advanced detection and mitigation of cyber threats
Security company celebrates women in the industry
A Women in Security event has been held for International Women's Day by Securitas at its Milton Keynes ops centre
Online activity reporting tool for schools
Safeguarding reports based on alerts available for plugging into web filtering products and providing information to schools of risky behaviour
Report examines encryption trends
Privacy compliance and increased risk driving more corporate plans to deploy encryption technology on-premises and within the cloud
Website security without passwords
Authentication service from iovation provides website administrators with a secure and user friendly alternative to password authentication
Real time Active Directory protection
Privileged Threat Analytics from CyberArk provides real time detection and automatic containment of threats affecting Active Directory
Single point of control for security management
The R80 security platform from Check Point provides corporate IT security managers with single point security management
VMS product accommodates increased video performance
The Cayuga R7 video management system from Seetec has undergone significant changes to provide higher bit rates and new features to meet increasing CCTV system performance and scalability requirements
PSIM for railway security on show in Dubai
CNL Software is attending the Middle East Rail event in Dubai to showcase its Physical Security Information Management system
Locksmith association partnership
The MLA has joined forces with its Irish equivalent to share resources and promote the locksmithing industry
Keeping teenagers on the cyber straight and narrow
Tripwire provides advice on how parents can guide their teenagers on how to avoid dabbling in cybercrime and educate them about cybersecurity
MWC presentation looks at whether Mobile and IoT security is good enough
BeCrypt is attending Mobile World Congress next week with a presentation from its CEO on the adequacy of security for mobile systems and the IoT
US prisons counter contraband with through body scanners
Dutch detection equipment company has taken order for three body scanners for use in prisons in the USA to scan prisoners and visitors for drugs and contraband
Security company gains high employee ranking
The list of the UK top 400 companies to work for includes security services supplier Securitas
Lone worker app reaches award finals
A smartphone app for providing protection for lone workers has reached the finals of the Surrey Digital Awards
Survey measures cyber attack detection confidence
Tripwire looks at the responses to a survey that looked at endpoint cyber attack detection using seven key security controls
Zero day endpoint protection
SandBlast Agent from Check Point brings advanced zero day protection directly to endpoint devices regardless of their mobility
High definition video for monitoring wildlife
A video management system from Milestone is at the heart of a surveillance monitoring tool in use in Australia for monitoring the behaviour of ospreys
Wireless network locks with iLock app
Mobile connectivity and bluetooth feature on the new ArchiTech Designer wireless network locking systems available from Alarm Locks
Ensuring security in new homes
The MLA provides advice to home buyers on making security assessments and preventing domestic crime
Face biometrics help protect Macau casinos
The gambling industry is securing its premises in Macau from banned people with the use of biometric face recognition technology
Survey shows disturbing online habits of teenagers
On Safer Internet Day, Kaspersky Lab urges parents to be more active in monitoring teenager activities to prevent them lurking in the darker corners of the web
Survey sheds light on working practices in IT
AlienVault has conducted a survey into the working lives of IT professionals and the way in which they're treated in the workplace
Cloud based endpoint privileged account security
Viewfinity provides cloud based integrated privileged access management with application control without user experience compromise
IP reputation service integration with NG firewall
BrightCloud Threat Intelligence reputation service from Webroot has now been integrated with the next generation firewalls offered by Palo Alto Networks
Card Quality Management certification for HID Global
MasterCard certification affects HID Global dual interface inlays used in the payment smart card and banking industry
Security event to feature home automation
The IFSEC International event taking place in London during June will feature a new Smart Home zone dedicated to home automation security
Advice on addressing EU Data Protection Regulation challenges
Iron Mountain provides details of the new EU Data Protection Regulation and what businesses need to do in order to address the associated challenges
Report summarises Windows vulnerabilities in 2015
A comprehensive analysis is available on 2015 vulnerabilities and new security features for Microsoft Windows during 2015
Security for mobile messaging apps
AdaptiveMobile has produced an API for carriers for improving security for mobile message app users such as WhatsApp and FB Messenger
Unified appliance for 4G and LTE protection
Telecom security appliance from Clavister brings high levels of protection from security threats on 4G and LTE mobile networks
Agentless security for VMware environments
Virtualization security provides agentless protection in VMware vShield applications
VMS provider joins surveillance specialist at SICUR event
Canon will be joined by Wavestore at the SICUR 2016 event taking place in Madrid during february to showcase their integration
Further trends in PSIM use for security
Erez Goldstein of Qognify looks at the ways in which PSIM and situation management software will be used in the security industry in 2016
Android malware steals information
Kaspersky Lab discovers new Android malware that targets smartphone users for financial fraud
Multi-biometric cloud identification for US Police
Police in Albuquerque are upgrading from fingerprint biometrics to a multi-biometric system operated in the cloud for identification tasks
Networking and storage systems on show in Dubai
Veracity is at Intersec this week in Dubai with its range of products for video surveillance networking and storage
Oil and Gas industry cyber-attacks increase
Study from Tripwire concludes that the majority of IT security professionals in the oil and gas industry are seeing an increase in cyber attacks
Credential compromise a key IT security concern
Research amongst security professionals reveals that nine out of ten consider compromised credentials to be a top concern
USB memory devices left at dry cleaners often never returned
A survey from ESET amongst dry cleaners uncovered the proportion of USB memory sticks and mobile phones that are left in pockets and never get claimed
TV streaming stick leaves home networks vulnerable
Check Point uncovers vulnerability that allows hackers to infiltrate home network through a TV streaming stick
New iteration of Linux encoder ransomware discovered
Bitdefender is offering a free tool to unlock files affected by the latest iteration of the Linux Encoder ransomware
Standardised locking design across university
Assa Abloy is helping Loughborough University secure its large campus facilities using standardised locking technology
Access control library for Building Information Modeling
Nedap is working with experts in the UK on Building Information Modeling trials that include access control libraries.
Chubb gets green light on new premises in Blackburn
Blackburn Council gives Chubb the go ahead to break ground on a new development the company has planned for new office premises
Free API for website SSL implementation testing
Webmasters can now take advantage of a free API to provide security testing services for SSL/TLS implementations
Detection equipment helps prevent serious crime globally
US detection system manufacturer provides insight into some of the most notable seizures made across the world with the help of its equipment
The increasing problem of Shadow IT
SecurEnvoy explains Shadow IT and how the use of two-factor authentication within apps could provide organisations with the security they need
Video management with integrated access control
With exacqVision 7.4 Exacq Technologies brings intruder security and access control into the realms of video management
Advanced surveillance system secures new HID Global HQ
Access control specialist chooses video management technology fromn Genetec to secure its new global headquarters in Austin
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo