Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
IP reputation service integration with NG firewall
BrightCloud Threat Intelligence reputation service from Webroot has now been integrated with the next generation firewalls offered by Palo Alto Networks
Card Quality Management certification for HID Global
MasterCard certification affects HID Global dual interface inlays used in the payment smart card and banking industry
Security event to feature home automation
The IFSEC International event taking place in London during June will feature a new Smart Home zone dedicated to home automation security
Advice on addressing EU Data Protection Regulation challenges
Iron Mountain provides details of the new EU Data Protection Regulation and what businesses need to do in order to address the associated challenges
Report summarises Windows vulnerabilities in 2015
A comprehensive analysis is available on 2015 vulnerabilities and new security features for Microsoft Windows during 2015
Security for mobile messaging apps
AdaptiveMobile has produced an API for carriers for improving security for mobile message app users such as WhatsApp and FB Messenger
Unified appliance for 4G and LTE protection
Telecom security appliance from Clavister brings high levels of protection from security threats on 4G and LTE mobile networks
Agentless security for VMware environments
Virtualization security provides agentless protection in VMware vShield applications
VMS provider joins surveillance specialist at SICUR event
Canon will be joined by Wavestore at the SICUR 2016 event taking place in Madrid during february to showcase their integration
Further trends in PSIM use for security
Erez Goldstein of Qognify looks at the ways in which PSIM and situation management software will be used in the security industry in 2016
Android malware steals information
Kaspersky Lab discovers new Android malware that targets smartphone users for financial fraud
Multi-biometric cloud identification for US Police
Police in Albuquerque are upgrading from fingerprint biometrics to a multi-biometric system operated in the cloud for identification tasks
Networking and storage systems on show in Dubai
Veracity is at Intersec this week in Dubai with its range of products for video surveillance networking and storage
Oil and Gas industry cyber-attacks increase
Study from Tripwire concludes that the majority of IT security professionals in the oil and gas industry are seeing an increase in cyber attacks
Credential compromise a key IT security concern
Research amongst security professionals reveals that nine out of ten consider compromised credentials to be a top concern
USB memory devices left at dry cleaners often never returned
A survey from ESET amongst dry cleaners uncovered the proportion of USB memory sticks and mobile phones that are left in pockets and never get claimed
TV streaming stick leaves home networks vulnerable
Check Point uncovers vulnerability that allows hackers to infiltrate home network through a TV streaming stick
New iteration of Linux encoder ransomware discovered
Bitdefender is offering a free tool to unlock files affected by the latest iteration of the Linux Encoder ransomware
Standardised locking design across university
Assa Abloy is helping Loughborough University secure its large campus facilities using standardised locking technology
Access control library for Building Information Modeling
Nedap is working with experts in the UK on Building Information Modeling trials that include access control libraries.
Chubb gets green light on new premises in Blackburn
Blackburn Council gives Chubb the go ahead to break ground on a new development the company has planned for new office premises
Free API for website SSL implementation testing
Webmasters can now take advantage of a free API to provide security testing services for SSL/TLS implementations
Detection equipment helps prevent serious crime globally
US detection system manufacturer provides insight into some of the most notable seizures made across the world with the help of its equipment
The increasing problem of Shadow IT
SecurEnvoy explains Shadow IT and how the use of two-factor authentication within apps could provide organisations with the security they need
Video management with integrated access control
With exacqVision 7.4 Exacq Technologies brings intruder security and access control into the realms of video management
Advanced surveillance system secures new HID Global HQ
Access control specialist chooses video management technology fromn Genetec to secure its new global headquarters in Austin
International cyber threat reduction collaboration
The EPSRC and researchers in Singapore have started a collaborative project for improving infrastructure resilience to cyber attacks
US casino integrates surveillance and access control
A casino in Iowa has used the Victor unified security system from Tyco to provide integrated security management including access control and surveillance activities
NVR supplier makes software upgrades
Wavestore makes video management system changes to for its range of Network Video Recorders
Strong authentication across Bluetooth
Bluetooth Smart technology used for bringing public key cryptographic based authentication to mobile devices
Half of companies believe DDoS attacks are staged against them
Survey from Kaspersky Lab reveals extent to which companies believe they are the victims of staged attacks launched by identifiable culprits
VMS with investigation management tools
Latest version of the Tyco Victor video management system provides improved investigative capabilities for surveillance operators
VMS supports new range of IP video surveillance cameras
The IQEye range of surveillance cameras from Vicon Industries is now supported by the Ocularis 5 video management system
Key management improves safety of NHS trust drug dispensing
Brighton and Sussex NHS Trust has taken Traka for improving estate management and drug dispensing security using key management
Two-thirds of workers break security rules to work remotely
Survey shows the vast majority of organisations now support home working despite the risks associated with employees taking security shortcuts
Ready access to information causes digital amnesia
Kaspersky Lab researches global attitudes towards information retention and the easy availability to digital memory sources
4G mobile monitoring camera takes industry award
The Nubo monitoring camera with 4G connectivity has won the IFSEC CCTV camera equipment of the year award
CISO panel initiative for expertise sharing
CyberArk initiates a CISO panel for sharing experience and expertise in overcoming the challenges of privileged access control
Innovation award for detection system
The Mini Z portable X-ray detection system based on backscatter imaging technology has received a research and development award
Cybercrime predominance in financial theft
Kaspersky Lab research into cybercrime in the Russian language reveals nearly all of it relates to the theft of money
Integrated IT security aids Turkish Credit Bureau
ForeScout Technologies chosen by KKB Credit Bureau in Turkey for providing the platform to secure the network and integrate security systems.
4K resolution dome camera
Axis Communications has added to its range of dome cameras with an ultra high resolution 4K version
Robust camera range for harsh environment
ExPLORE range of analogue, IP and thermal cameras from Siqura incorporate features suitable for use in harsh environments in the oil and gas industries
Research programme begins on high performance data analytics
Intel has joined the Alan Turing Institute to embark on a research programme examining data analytics and high performance computing
Security specialist becomes founding CyberInvest member
Becrypt commits to UK Government CyberInvest initiative by becoming a founding member
Results released from software licensing research
Gemalto has released results examining attitudes to different software licensing models rigid licence options losing favour
Coalition formed on data centre services
ICTroom is meeting the challenges placed on data centre services by increasing IT complexity through a new partnership with Atos
Research shows extent of network credential thefts
CyberArk research examines network exposure to credential theft attacks which hijack privileged credentials and compromise enterprise security
VMS supports entertainment venue security integration
A security system at a new attraction in Orlando based on Axis surveillance cameras and Open Options access control based on Milestone XProtect Enterprise
Integrated endpoint and network security
Sophos Security Heartbeat combines the functions and advantages of endpoint protection with next generation firewalls and unified threat management
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo