Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
New wave of Cryptowall ransomware attacks
Bitdefender uncovers new distribution mechanism for the Cryptowall ransomware through spam campaign
Console provides real time social media threat information
Proofpoint is now supplying its Nexgate Social Threat Centre, a console for providing administrators with up to date information on social media threats
On-demand web penetration testing available to security suppliers
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme
More models added to network camera range
Featuring advanced lens technology, the new Canon surveillance camera range features new dome, box and 360 degree cameras
Camera location mapping included in latest VMS version
The Mirasys VMS has been re-released at version 7.3 with improved mapping features with GPS coordinates of cameras on the premises under surveillance
Centralised e-mail encryption
Simplified enterprise e-mail encryption includes flexible and configurable policy settings
Cloud surveillance system integrates with VMS
Technology alliance between mobiDEOS and OnSSI results in integration between video management system and cloud-based surveillance platform
End to end control for real time communications networks
Sonus IQ has been released to provide real time communications network operators with a security and intelligence platform
Biometric iris authentication for smartphones
Fujitsu bites the alternative authentication bullet and proves that non-fingerprint biometric technology is possible for the protection of smartphones
4G connected surveillance for home monitoring
Property without wf-fi connectivity can now be monitored using the latest Nubo camera with 4G connectivity from Panasonic
Intelligent protection combats grey route mobile messaging
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks
Multi-factor authentication for wearable technology
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress
New CEO appointed at ForeScout Technologies
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer
Cloud based real time communications demonstration at MWC
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications
The most dangerous IT threats of the year and how to neutralise them
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
Aggressive adware still being seen in Android apps
Google play is still hosting apps that are riddled with aggressive adware, warns Bitdefender
Research published on Security-as-a-Service for communication service providers
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients
Nedap to organise welcome party at ASIS conference in Frankfurt
The ASIS European Security Conference and Exhibition in Frankfurt this March will be launched with a Nedap organised and sponsored welcome party
Surveillance camera SD card playback support
Video footage stored on SD cards on Samsung Techwin security cameras can now be played back directly on Android and iOS devices
Comprehensive security for mobile operator signalling infrastructure
SS7 Protection from AdaptiveMobile provides protection to the core networks of mobile operators against SS7 protocol based attacks
Wireless transmission system for all-weather radar
3G/4G transmission system connects all-wather radar perimeter protection system from Ogier for commercial and military applications
Host service provider strategies to defend against DDoS attacks
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
NCT CBRNe Europe 2015 - top three burning issues
Timely evaluation of Ebola Response, the Ukraine Crisis and Europe’s Response to Emerging Terrorism at European Defence Forum.
Cloud archiving features on VMS stand at ISC West
Genetec is attending the ISC West show this year with the latest version of the Security Center video management system featuring cloud archiving service
Dutch minister to open critical infrastructure protection conference
The Minister for Security and Justice of Holland will be addressing delegates of the Critical Infrastructure Protection and Resilience conference in Europe next week
Hardware encrypted flash drives now available as USB 3.0 devices
IronKey increases data read and write speeds to its latest addition to its secure flash memory storage with the adoption of USB 3.0 connectivity
Biometric protection for data centre cabinets
Cabinet locks with in-built biometric authentication technology are being supplied for the high security data centre industry
Arabic cyber espionage aims at high profile targets in Middle East
The Desert Falcons group has been discovered by Kaspersky Lab to be on a cyber espionage campaign that specifically targets high profile people and companies from the Middle East region
Five steps to secure iterative software delivery
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process
Adaptive threat protection from multiple sources
Tripwire's Adaptive Threat Protection product has been expanded to incorporate more sources of threat information
Open Video Management System certification for surveillance storage system
Milestone Systems has now tested and reported performance component certification of BCDVideo’s Nova Server and Storage Series for video surveillance systems
Fire and Security specialist invests in new office campus
Chubb's Blackburn premises will undergo a complete transformation beginning this year to create improved facilities for its affiliate companies
Security essentials course to be held in Oslo
A six-day intensive course on IT Security essentials will take place as part of the SANS Oslo event that takes place in March
Large contactless payment card deployment in South American universities
A Brazilian bank is at the forefront of a deployment of contactless EMV cards to students in universities in Brazil
Continuous monitoring and mitigation protects European digital classified ads platform
European home and vehicle classified ads platform provider selects CounterACT from ForeScout Technologies for improved network endpoint visibility and management
Controlled secure file sharing for university data
Varonis has supplied Liverpool University with DataAnywhere to enable controlled and secure remote data storage for file sharing without using insecure public cloud services
Android app for remote video monitoring
Video Management System supplier, Mirasys has released the Spotter Mobile 7 app for remote video monitoring from Android devices
Securing digital identities amongst the Internet of Everything
Neil Chapman, Senior Vice President & Managing Director EMEA at ForgeRock delves into identity management and security in connected home and lifestyle electronics
Unlicensed security company falls foul of immigration offences
A London security company director has been jailed for operating with illegal immigrants and forging documentation
Missing patch detection and vulnerability assessment scanning
The latest version of LanGuard from GFI Software provides companies with improved network device vulnerability assessment including the detection of missing patches
Security Solutions to attend locksmith event in UK
The UNION brand from Security Solutions will be at the forefront of the company's innovative product range being shown at this year's Locksmith Expo taking place in Nottingham
Anthem attack demonstrates need for more than static defence
Jonathan Whitley of WatchGuard explains the improvements needed to corporate IT defence mechanisms to become more effective against Anthem-style attacks
Firewall for VMware virtualised environments
Network security experts at Fortinet have joined the VMware NSZ partner programme and produced the FortiGate-VMX Firewall for virtual environments
Malicious adware continues to plague Android apps
Webroot comments on the recent withdrawal of a number of Android apps from Google Play amid problems of adware infections on mobile devices
Zoo gains business benefit from network surveillance
Video management technology is enabling Copenhagen Zoo to explore new business possibilities through online broadcasts of major events
CCTV and wireless networking partnership
Vemotion is combining its wireless surveillance network expertise with rugged camera features from 360 Vision Technology
Study charts enterprise cloud usage risks
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
Analyst portal provides improved decision making
Investigation and resolution of cyber threats gains a new dimension with the Analyst Portal from Tier-3 Huntsman for improved decision making
Network Access Control market report recognises ForeScout as having largest deployments
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
Productivity app download milestone for forensic software
Users of EnCase digital forensics software have performed over 50 thousand downloads of the EnScript productivity apps from Guidance Software's online store
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo