Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Keeping teenagers on the cyber straight and narrow
Tripwire provides advice on how parents can guide their teenagers on how to avoid dabbling in cybercrime and educate them about cybersecurity
MWC presentation looks at whether Mobile and IoT security is good enough
BeCrypt is attending Mobile World Congress next week with a presentation from its CEO on the adequacy of security for mobile systems and the IoT
US prisons counter contraband with through body scanners
Dutch detection equipment company has taken order for three body scanners for use in prisons in the USA to scan prisoners and visitors for drugs and contraband
Security company gains high employee ranking
The list of the UK top 400 companies to work for includes security services supplier Securitas
Lone worker app reaches award finals
A smartphone app for providing protection for lone workers has reached the finals of the Surrey Digital Awards
Survey measures cyber attack detection confidence
Tripwire looks at the responses to a survey that looked at endpoint cyber attack detection using seven key security controls
Zero day endpoint protection
SandBlast Agent from Check Point brings advanced zero day protection directly to endpoint devices regardless of their mobility
High definition video for monitoring wildlife
A video management system from Milestone is at the heart of a surveillance monitoring tool in use in Australia for monitoring the behaviour of ospreys
Wireless network locks with iLock app
Mobile connectivity and bluetooth feature on the new ArchiTech Designer wireless network locking systems available from Alarm Locks
Ensuring security in new homes
The MLA provides advice to home buyers on making security assessments and preventing domestic crime
Face biometrics help protect Macau casinos
The gambling industry is securing its premises in Macau from banned people with the use of biometric face recognition technology
Survey shows disturbing online habits of teenagers
On Safer Internet Day, Kaspersky Lab urges parents to be more active in monitoring teenager activities to prevent them lurking in the darker corners of the web
Survey sheds light on working practices in IT
AlienVault has conducted a survey into the working lives of IT professionals and the way in which they're treated in the workplace
Cloud based endpoint privileged account security
Viewfinity provides cloud based integrated privileged access management with application control without user experience compromise
IP reputation service integration with NG firewall
BrightCloud Threat Intelligence reputation service from Webroot has now been integrated with the next generation firewalls offered by Palo Alto Networks
Card Quality Management certification for HID Global
MasterCard certification affects HID Global dual interface inlays used in the payment smart card and banking industry
Security event to feature home automation
The IFSEC International event taking place in London during June will feature a new Smart Home zone dedicated to home automation security
Advice on addressing EU Data Protection Regulation challenges
Iron Mountain provides details of the new EU Data Protection Regulation and what businesses need to do in order to address the associated challenges
Report summarises Windows vulnerabilities in 2015
A comprehensive analysis is available on 2015 vulnerabilities and new security features for Microsoft Windows during 2015
Security for mobile messaging apps
AdaptiveMobile has produced an API for carriers for improving security for mobile message app users such as WhatsApp and FB Messenger
Unified appliance for 4G and LTE protection
Telecom security appliance from Clavister brings high levels of protection from security threats on 4G and LTE mobile networks
Agentless security for VMware environments
Virtualization security provides agentless protection in VMware vShield applications
VMS provider joins surveillance specialist at SICUR event
Canon will be joined by Wavestore at the SICUR 2016 event taking place in Madrid during february to showcase their integration
Further trends in PSIM use for security
Erez Goldstein of Qognify looks at the ways in which PSIM and situation management software will be used in the security industry in 2016
Android malware steals information
Kaspersky Lab discovers new Android malware that targets smartphone users for financial fraud
Multi-biometric cloud identification for US Police
Police in Albuquerque are upgrading from fingerprint biometrics to a multi-biometric system operated in the cloud for identification tasks
Networking and storage systems on show in Dubai
Veracity is at Intersec this week in Dubai with its range of products for video surveillance networking and storage
Oil and Gas industry cyber-attacks increase
Study from Tripwire concludes that the majority of IT security professionals in the oil and gas industry are seeing an increase in cyber attacks
Credential compromise a key IT security concern
Research amongst security professionals reveals that nine out of ten consider compromised credentials to be a top concern
USB memory devices left at dry cleaners often never returned
A survey from ESET amongst dry cleaners uncovered the proportion of USB memory sticks and mobile phones that are left in pockets and never get claimed
TV streaming stick leaves home networks vulnerable
Check Point uncovers vulnerability that allows hackers to infiltrate home network through a TV streaming stick
New iteration of Linux encoder ransomware discovered
Bitdefender is offering a free tool to unlock files affected by the latest iteration of the Linux Encoder ransomware
Standardised locking design across university
Assa Abloy is helping Loughborough University secure its large campus facilities using standardised locking technology
Access control library for Building Information Modeling
Nedap is working with experts in the UK on Building Information Modeling trials that include access control libraries.
Chubb gets green light on new premises in Blackburn
Blackburn Council gives Chubb the go ahead to break ground on a new development the company has planned for new office premises
Free API for website SSL implementation testing
Webmasters can now take advantage of a free API to provide security testing services for SSL/TLS implementations
Detection equipment helps prevent serious crime globally
US detection system manufacturer provides insight into some of the most notable seizures made across the world with the help of its equipment
The increasing problem of Shadow IT
SecurEnvoy explains Shadow IT and how the use of two-factor authentication within apps could provide organisations with the security they need
Video management with integrated access control
With exacqVision 7.4 Exacq Technologies brings intruder security and access control into the realms of video management
Advanced surveillance system secures new HID Global HQ
Access control specialist chooses video management technology fromn Genetec to secure its new global headquarters in Austin
International cyber threat reduction collaboration
The EPSRC and researchers in Singapore have started a collaborative project for improving infrastructure resilience to cyber attacks
US casino integrates surveillance and access control
A casino in Iowa has used the Victor unified security system from Tyco to provide integrated security management including access control and surveillance activities
NVR supplier makes software upgrades
Wavestore makes video management system changes to for its range of Network Video Recorders
Strong authentication across Bluetooth
Bluetooth Smart technology used for bringing public key cryptographic based authentication to mobile devices
Half of companies believe DDoS attacks are staged against them
Survey from Kaspersky Lab reveals extent to which companies believe they are the victims of staged attacks launched by identifiable culprits
VMS with investigation management tools
Latest version of the Tyco Victor video management system provides improved investigative capabilities for surveillance operators
VMS supports new range of IP video surveillance cameras
The IQEye range of surveillance cameras from Vicon Industries is now supported by the Ocularis 5 video management system
Key management improves safety of NHS trust drug dispensing
Brighton and Sussex NHS Trust has taken Traka for improving estate management and drug dispensing security using key management
Two-thirds of workers break security rules to work remotely
Survey shows the vast majority of organisations now support home working despite the risks associated with employees taking security shortcuts
Ready access to information causes digital amnesia
Kaspersky Lab researches global attitudes towards information retention and the easy availability to digital memory sources
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo