Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Threat intelligence unit formed for mobile security
Mobile security company AdaptiveMobile is sharing its expertise in best security practices as part of its newly formed Threat Intelligence Unit.
Survey reveals internet romance dangers
BullGuard has been polling internet daters to uncover the true risks of providing too much personal and financial information to strangers.
Next generation firewall with web filtering for schools
Barracuda Networks is targeting the education sector with its latest Firewall product with web filtering to improve school cyber security
High cost of data breaches for UK businesses
The way UK businesses approach security product implementation needs rethinking, according to Sophos network security expert
Malware attacks target public sector
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector
Identity protection in the internet of things
Eve Maler of ForgeRock discusses the opportunities afforded by the Internet of Things and the possible identity perils that could be faced
Physical security breaches continue to outweigh cyber attacks
Vanderbilt survey shows extent of physical security breaches suffered by organisations with nearly three times as many taking place then cyber attacks
Things to consider when adopting an IoT strategy
Mark Lee of Intamac explains the considerations that need to be taken into account when executing a strategy involving the internet of things
Video analytics integrated with monitoring software
Agent Vi video analytics is now available as an integrated feature on the Immix central monitoring software
Award success for Network Access Control platform
CounterACT from ForeScout Technologies has been judged to be the best NAC solution in the SC Magazine awards this year
VMS supports body worn cameras
Genetec expands support for body worn camera equipment in the latest release of the Security Center video management system
Security association members to speak at UK event
Experts from BSIA member organisations will be making scheduled appearances as part of the conference programme taking place at IFSEC this week in London
Vulnerability management and real time assessment partnership
ForeScout is extending its range or interoperability with a new partnership with vulnerability assessment specialist, Qualys
IP cameras with VMS on board
SD storage and onboard video management system feature on the new Illustra Edge HD video camera from Tyco
ONVIF compliant high performance dome camera
Pelco has added to its range of dome cameras with the Spectra Enhanced series with low latency PTZ and single cable PoE installation
Key management integration with access control
KeyWatcher key control system is now integrated with Tyco access control and security management system
Private sector could offset council CCTV cuts
As more councils are reducing expenditure on surveillance, the BSIA suggests that the private sector also has some part to play in crime detection
ICO reports fall short of real level of UK data breaches
Data Protection Act breaches could be more than ten times the levels reported to the Information Commissioners Office in the country
Wireless represents highest vulnerability according to survey
Fortinet reveals the results of a survey it conducted in which IT decision makers state their belief that wireless networks represent their highest vulnerability
Funding call of IoT trust and security hub
The Engineering and Physical Sciences Research Council is working with a number of universities on the creation of a hub to address privacy, trust and security in the Internet of Things
4K surveillance system on show at IFSEC
Panasonic will be attending IFSEC this year with its range of 4K resolution cameras, NVR and video screen walls
Tokenization for protection of cloud data
CipherCloud is now offering Next Generation Tokenization as an additional method of protecting data that resides in the cloud
IT security interoperability demos at Infosecurity Europe
ForeScout Technologies is attending Infosecurity Europe with demonstrations of ControlFabric based interoperability in conjunction with major partners
Intelligent packet capture for improved incident response
Lancope is at the InfoSecurity event this week in London with its PacketWatch product for intelligent packet capture
Report analyses 1Q2015 IT security events
Panda Security examines the IT security landscape during the first quarter of the year with trojans continuing to be the most common threat
Open architecture compliance for security management system
The Synergy 3 security management platform from Synetics conforms to the open surveillance profile S specification from ONVIF
DESFire relay attack protection for access control
Nedap has engineered protection into its proximity readers against fraudulent read distance extensions using relay attacks
Surveillance in banking webinar
March Networks provides insight into the way analytics can be used with surveillance technology to improve banking security in a new webinar
Survey gauges data destruction service buying patterns
The British Security Industry Association is performing research amongst commercial users of buying behaviour for data destruction services
Rationalising the network at large European print supplier
Barracuda Networks has helped Papergraphics to rationalise its network over multiple remote locations to integrate backup, archiving and network security
SSD storage for industrial and commercial use
The latest solid state drives from SanDisk can replace hard drives in many commercial and industrial embedded computing systems such as signage
Electronic locking in the leisure industry
Locken is replacing mechanical locks with its electronic key-based locking systems in busy leisure facilities such as Parc Asterix in France
British security companies to showcase products at annual event
The IFSEC event in London this year will host a number of British Security Industry Association members amongst its exhibitors
Cloud based interactive application security testing
Partnership between Veracode and Contrast Security brings interactive application security testing into the cloud as an automated service
Skill shortage for information management
Survey from Iron Mountain reveals the extent to which business leaders are facing a skills shortage in the UK for critical information management
Considerations for taking out cyber insurance
Charles Sweeney, CEO of Bloxx, examines the case for commercial cyber liability insurance and what steps companies can take to reduce risk and premiums
BYOD risks overlooked by smaller businesses
Research from Kaspersky Lab shows almost a third of small UK businesses fail to see any threat in employees using their own mobile devices
Video management integration with EAS
Exacq integrates Electronic Article Surveillance with its video management system to improve retail security
Guide to cyber security for Industrial Control Systems
IT security professional body releases a guide to interpreting industrial control system threats and protecting networks beyond the traditional ICT network
Security seal denotes manually pen tested sites
Web sites and applications which have been manually penetration tested can now be distinguished from other by the ImmuniWeb Security Seal
Increased detection capabilities with dual energy options
American Science and Engineering is now offering dual energy transmission options for improved detection capabilities with the Z Backscatter Van screening systems
VMS supplier brings practical demonstrations to IFSEC
Wavestore is attending the IFSEC event in the UK in June this year with demonstrations of its latest video management software products
Burnley football club improves security with IP video surveillance
Axis Communications has supplied IP video surveillance technology to improve security and safety at the Turf Moor Stadium of Burnley Football Club
ForeScout joins Society of IT Management as silver partner
Public sector IT management group welcomes ForeScout Technologies to its membership for delivery of IT and digitally enabloed services for the public benefit in the UK
Communication Session Controllers with Skype for Business enabled
Sonus software upgrades for real time IP communications now enable Skype for Business to be used
Remote surveillance for boat owners
Finnish Marina deploys video surveillance system from March Networks enabling its boat owners to check weather conditions and the security of their vessels
Video analytics provide security for banking transactions
Searchlight for Banking from March Networks provides video based intelligence through analytics processing for the banking and finance industry
Special US cyber security legislation support
IT security industry body ISACA has released a special report which examines the latest cybersecurity legislation on information sharing in the USA
Insecure boardroom practices put UK companies at risk
Outdated paper based information distribution and use of most insecure mobile platform categorize two elements of serious data risks faced by UK boardrooms
Security partnerships improve threat response capabilities
Parnership expansions based on ForeScout ControlFabric bolster mitigation capabilities for advanced threats and breaches.
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo