Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Iranian dairy upgrades to IP surveillance
A 100-year-old dairy in northern Iran protects its capital assets and operations with an IP video surveillance system from Vivotek
Home entertainment system vulnerabilities
Experiment at Kaspersky Lab reveals the extent to which home entertainment systems lack security features exposing their users to unnecessary vulnerabilities
Integrated security management platform for access and surveillance
Combining the EntraPass access control system and exacqVision VMS, the Intevo integrated security platform provides unified access control, alarm and surveillance functions
Notting Hill Community workers protected with personal alarms
Four hundred workers at Notting Hill Housing Group in London have been issued with Guardian24 lone worker protection systems when operating outside the office
Automatic logging on exposes users to high cyber risk
Research from Intercede shows the extent to which users are automatically logging on to e-mail and social network sites or sharing passwords with other people
Survey illustrates risks to social network users
Complacency towards personal security is still widespread amongst social network users according to results of a new survey
On-Camera video content analysis package
Vivotek introduces video content analysis on its cameras comprising object counting, field detection and line crossing analysis
Advice on entering export markets
TDSi Managing Director provides advice to UK security companies on how to expand into making export sales
Online distance learning course for ONVIF
Training specialists at Tavcom have released a new version of the ONVIF distance learning training course which is available online
Cellular remote management assists hospital robot maintenance
Opengear has supplied remote management gateways to a supplier of medical robotic technology for remote maintenance and control using the cellular network
Surveillance supplier introduces PoE range
Power-over-Ethernet (PoE) products now form part of the surveillance range available from IP video supplier VIVOTEK
Manufacturing IP loss running at a fifth
Global business management survey by Kaspersky Lab puts level of manufacturers suffering intellectual property losses through malware and other causes at over 20%
Modern medical centre gains latest technology access control
SMARTair wireless access control is being used at a new medical centre that has been built as part of a historic foundry development in Stourbridge
Analogue DVR use on cloud or IP networks
An appliance from mobiDEOS enables legacy DVR equipment to be used in a hybrid surveillance environment across IP and cloud networks
Major airport extends incident management to field operations
Project developed by NICE Systems and AECOM provides Los Angeles International Airport with improved field collaboration and coordination for incident management
Risk assessment software helps investigate compromised user credentials
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
Study examines the threat of rogue ex-employees
Continued access to critical data by former employees is the theme of a report issued by Intermedia on insider threat protection
BCS to hold seminar on data breach and incident management
Seminar will provide attendees with information on how to manage data breaches and incidents to stay in line with new EU data protection regulations
Electronic handle systems improve access control at residential development
Stylish apartments in Barnstaple have had Smartair electronic handle sets fitted to provide flexible and secure access control to the residential premises
Video surveillance organisation to enforce standard compliance claims
ONVIF will be protecting its brand by investigating claims by video surveillance suppliers that their products are compliant to the open standard
Bremer Bank improves user security and satisfaction with CounterACT
Real time network visibility and access control integrated with SIEM solution provides Bremer Financial Corporation with enhanced security with improved user experience
Security implementation and testing poor for web apps
SANS Institute instructor comments on the growth of web apps and their associated vulnerability made worse by poor preparation and security testing
Online security top of the list for retail buyers
Survey of retail consumers shows that improved online security tops the list of requirements for customer satisfaction
Secure USB devices with BadUSB protection
The IronKey range of secure USB devices from Imation isn't vulnerable to the BadUSB malware designed to attack the device itself
Leadership changes at PSIM supplier
ISM has appointed a new Managing Director as the PSIM supplier enters a new phase of growth both in the UK and abroad
Central management console for security appliances
Cyberoam Central Console provides enterprises with the ability to manage double the number of security appliances
Diverse security products from Siemens on show at Essen
The Security Essen show in September will feature access control, alarm and video surveillance products from Siemens
Consumers fear security of mobile banking apps
Survey from Intercede reveals extent of consumer concern over the security aspects of using mobile apps for online banking
Finnish hospital uses Video Management Software for innovative care programme
Milestone XProtect Professional is being used for an innovative parent-child training and support programme in a hospital in Finland
A change of approach is needed in advanced threat protection
Sourcefire's Sean Newman comments on advanced threat detection and the need for organizations to move away from traditional protection methods
Software for meeting regulatory requirements on money laundering
The NetReveal Anti-Money Laundering software from BAE Systems Applied Intelligence provides organizations with a means of keeping up with increasingly rigorous regulatory requirements
Partnership reduces mean time to threat mitigation
ForeScout and ThreatStream have agreed on a partnership to combine threat information and network security intelligence on one platform based on ControlFabric architecture
Organizational weak links contribute to increasingly dynamic threat landscape
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
Industrial control system security summit to be held in Amsterdam
The agenda has been set for the 2014 European ICS security summit which is taking place for control system engineers and IT security professionals in Amsterdam this September
Identity management combined with trusted device technology
Application deployment on mobile devices eased with the blending of identity management from Intercede with trusted device technology from Trustronic
Digital forensics and incident response courses for Europe
SANS Digital adds extended training courses in digital forensics and incident response for October to take place in Prague
Surveillance supplier goes into PSIM partnership
Mobotix has entered into a technology partnership with Physical Security Information Management supplier, iComply
Technology partners take part in BlackHat interoperability testing
Six technology partners of ForeScout are attending BlackHat USA event this week to demonstrate interoperability based on ControlFabric
Introductory full-function Physical Security Information Management
Companies on restricted budgets are still able to access PSIM functionality with the introduction of Surveillint Essentials from Tyco's Proximex
Fingerprint and palmprint identification on show at identification conference
3M Cogent is attending the International Association of Identification conference in Minneapolis later this month with its automated fingerprint and palmprint identification system
Partnership to fight fraud in Central America
Equifax and iovation will be targeting the Central American region to distribute fraud prevention systems to combat escalating fraud-related crime
Double awards for Video management software
Benchmark innovation awards have been received by Milestone Systems for its XProtect Corporate product and GPS/Laser sensor map tracking
Survey results demonstrated IT spending priorities in the UK
IT security summary report shows surprising levels of complacency in UK businesses towards prioritising IT security when setting budgets
Network security platform integration with vulnerability analysis
ForeScout Technologies and Rapid7 have partnered to integrate their vulnerability analysis and network security products for reducing windows of exposure
Cloud based Unified Threat Intelligence
Cloud based unified threat intelligence service available from Bit 9 and Carbon Black for protection against advanced threats and targeted attacks
Role based access control research wins award
ACM Symposium on Access Control Models and Technologies award for best paper presented to Nedap Security Management for its work on role based access control
Brazil sees peak in malware activity in June
The World Cup resulted in an increase in phishing activity within the banking sector and other malware during June according to Kaspersky report
Thermal cameras with video analytics protect US rail infrastructure
The protection of railway infrastructure including tunnels and bridges has been achieved on one major US railway through the use of SightLogix thermal imaging cameras equipped with video analytics
Education security growth provides opportunities for integrators
TDSi comments on the growing need for high quality integrated security systems at affordable cost to provide protection in the education sector
Wireless locking advantages shown on TDSi stand at IFSEC
The advantages of Aperio wireless locking with IP hub technology for total building security were shown off by access control specialist TDSi at IFSEC
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo