Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
IP intercoms protect access at UK laboratory
Unilever has chosen Castel's IP intercom stations for improving access security to its laboratory and research centre on Merseyside
Four reasons why tape based data storage isn't dead
Christian Toon, the head of information risk at Iron Mountain explains how tape is still being used as a data storage medium
Latest breach shows retail industry to be prime cyber attack target
HP comments on the recent cyber breach at retailer Home Depot illustrating the high levels of vulnerability surrounding the lucrative retail business
ForeScout expands presence in EMEA region
Increased demand in Europe for network security and continuous monitoring and mitigation leads to expanded presence in the region for ForeScout Technologies
Affordable Cyber Security Accreditation for Public Sector suppliers
The SME segment of the UK's public sector supply chain gains affordable cyber security accreditation from HP enterprise services
High mobile operator uptake of security software
The top nine mobile operators are protecting their subscriber base with mobile security protection from AdaptiveMobile
Move to biometrics a significant step for banking security
Fujitsu comments on its support for Barclays bank and the move it has made to move client access to banking services through finger vein biometrics identification technology
All In One Security plug-in for Wordpress vulnerability
High-Tech Bridge explains threat of new vulnerability affecting the All-in-one security plug-in for Wordpress
Linux malware linked to DDoS attack campaigns
Akamai has released a threat advisory covering high-risk Linux system infections that can be used to launch DDoS attack campaigns
Nine DDoS Assumptions That Must Be Put to Bed
Xuhua Bao, Hai Hong and Zhihua Cao of NSFOCUS dispel nine popular myths that surround Distributed Denial of Service attacks
Data recovery from Apple logical failures
Kroll Ontrack has developed a means of recovering lost data from Apple mobile devices after they have suffered a logical failure
Video analytics integrated in Samsung camera range
WiseNetIII network cameras from Samsung Techwin will now be available with the savVI video analytics software from Agent Vi embedded
10% of finance workers try to circumvent security
IS Decisions reveals the extent of insider threats in the finance industry with large numbers of employees admitting to deliberate insecure practices
British Standard certification for alarm receiving centre
The Community Safety Glasgow alarm receiving centre has been accredited to BS8484 for lone worker protection alarm monitoring
Research investigates future of port security
Market research suggests 10% CAGR for the market for port security management worldwide during the next four years
Biometric supplier acquires French secure authentication company
Secure identification software supplier Dictao has been acquired by biometric supplier Morpho in bid to expand market opportunities for complementary products
Unified surveillance system protects University of West Scotland
The multiple campuses at the large University of West Scotland are being protected with a unified IP surveillance system based on the Milestone XProtect video management system operating Axis cameras
Industrial control system security skills imbalance needs addressing
SCADA and industrial control system security expert comments on the lack of integrated engineering and cyber security expertise needed to overcome threat to critical infrastructure
Door hardware chosen to fit in with architectural style
A school in Essex has taken transom closers and door handles from Alpro for providing the required door operating characteristics while meeting the school's architectural style requirements
Trojan delivery exploits Ukrainian political situation
Hackers are using spam exploiting anti-western feelings in Russia to deliver malicious code for further spreading malware
Iranian dairy upgrades to IP surveillance
A 100-year-old dairy in northern Iran protects its capital assets and operations with an IP video surveillance system from Vivotek
Home entertainment system vulnerabilities
Experiment at Kaspersky Lab reveals the extent to which home entertainment systems lack security features exposing their users to unnecessary vulnerabilities
Integrated security management platform for access and surveillance
Combining the EntraPass access control system and exacqVision VMS, the Intevo integrated security platform provides unified access control, alarm and surveillance functions
Notting Hill Community workers protected with personal alarms
Four hundred workers at Notting Hill Housing Group in London have been issued with Guardian24 lone worker protection systems when operating outside the office
Automatic logging on exposes users to high cyber risk
Research from Intercede shows the extent to which users are automatically logging on to e-mail and social network sites or sharing passwords with other people
Survey illustrates risks to social network users
Complacency towards personal security is still widespread amongst social network users according to results of a new survey
On-Camera video content analysis package
Vivotek introduces video content analysis on its cameras comprising object counting, field detection and line crossing analysis
Advice on entering export markets
TDSi Managing Director provides advice to UK security companies on how to expand into making export sales
Online distance learning course for ONVIF
Training specialists at Tavcom have released a new version of the ONVIF distance learning training course which is available online
Cellular remote management assists hospital robot maintenance
Opengear has supplied remote management gateways to a supplier of medical robotic technology for remote maintenance and control using the cellular network
Surveillance supplier introduces PoE range
Power-over-Ethernet (PoE) products now form part of the surveillance range available from IP video supplier VIVOTEK
Manufacturing IP loss running at a fifth
Global business management survey by Kaspersky Lab puts level of manufacturers suffering intellectual property losses through malware and other causes at over 20%
Modern medical centre gains latest technology access control
SMARTair wireless access control is being used at a new medical centre that has been built as part of a historic foundry development in Stourbridge
Analogue DVR use on cloud or IP networks
An appliance from mobiDEOS enables legacy DVR equipment to be used in a hybrid surveillance environment across IP and cloud networks
Major airport extends incident management to field operations
Project developed by NICE Systems and AECOM provides Los Angeles International Airport with improved field collaboration and coordination for incident management
Risk assessment software helps investigate compromised user credentials
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
Study examines the threat of rogue ex-employees
Continued access to critical data by former employees is the theme of a report issued by Intermedia on insider threat protection
BCS to hold seminar on data breach and incident management
Seminar will provide attendees with information on how to manage data breaches and incidents to stay in line with new EU data protection regulations
Electronic handle systems improve access control at residential development
Stylish apartments in Barnstaple have had Smartair electronic handle sets fitted to provide flexible and secure access control to the residential premises
Video surveillance organisation to enforce standard compliance claims
ONVIF will be protecting its brand by investigating claims by video surveillance suppliers that their products are compliant to the open standard
Bremer Bank improves user security and satisfaction with CounterACT
Real time network visibility and access control integrated with SIEM solution provides Bremer Financial Corporation with enhanced security with improved user experience
Security implementation and testing poor for web apps
SANS Institute instructor comments on the growth of web apps and their associated vulnerability made worse by poor preparation and security testing
Online security top of the list for retail buyers
Survey of retail consumers shows that improved online security tops the list of requirements for customer satisfaction
Secure USB devices with BadUSB protection
The IronKey range of secure USB devices from Imation isn't vulnerable to the BadUSB malware designed to attack the device itself
Leadership changes at PSIM supplier
ISM has appointed a new Managing Director as the PSIM supplier enters a new phase of growth both in the UK and abroad
Central management console for security appliances
Cyberoam Central Console provides enterprises with the ability to manage double the number of security appliances
Diverse security products from Siemens on show at Essen
The Security Essen show in September will feature access control, alarm and video surveillance products from Siemens
Consumers fear security of mobile banking apps
Survey from Intercede reveals extent of consumer concern over the security aspects of using mobile apps for online banking
Finnish hospital uses Video Management Software for innovative care programme
Milestone XProtect Professional is being used for an innovative parent-child training and support programme in a hospital in Finland
A change of approach is needed in advanced threat protection
Sourcefire's Sean Newman comments on advanced threat detection and the need for organizations to move away from traditional protection methods
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo