Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Surveillance upgrade at Birmingham Airport
Birmingham Airport has upgraded to a hybrid analogue and IP surveillance network based on IndigoVision cameras and encoders
Extended support for Microsoft virtual deployments
Barracuda's Next-Generation firewall provides security support for virtual machines as part of the Microsoft Azure certified programme
5-a-day IT security advice plan for small businesses
Kaspersky Lab has responded to revelations of the poor preparedness of small businesses to IT threats with advice on how to protect their IT assets
Consortium to be formed for big data analysis institute
The Alan Turing Institute is being grown by EPSRC to fulfil its role in the analysis and application of big data
Mobile and wearable biometrics market analysis
New report examines the future market for the next five years for mobile and wearable biometric equipment
UK industry suffering from IT security knowledge gap
Research from Websense and Ponemon Institute reveals significant gap in knowledge of IT security requirements between industry professionals and corporate management
Postal screening system installed at Cardiff Bank
Lloyd's Bank in Cardiff is protecting its staff from potential threats by screening incoming post using an Astrophysics X-Ray screening system
Log management for AWS Marketplace
Users of Amazon Web Services Marketplace gain log management capabilities as part of Alert Logic's SaaS security services
Cyber security report: 96 percent of organisations have experienced a serious incident in past year
Sponsored by ForeScout Technologies, the 2014 Cyber Defence Maturity Report is independent research conducted by IDG Connect during May and June of 2014. Survey respondents included 1600 IT information security decision makers in organisations of more than 500 employees, and spanning five industry s
Danish foundation funds surveillance research project
Milestone Systems is working on higher speed searching and analysis of video surveillance material with funding from the Danish National Advanced Technology Foundation
VMS licensing structure encourages migration to IP surveillance
Users of the Ocularis video management system from OnSSI can take advantage of improved licensing for analogue cameras requiring one licence for each encoder address
Managed anti-malware service for zero day threats
Trustwave's managed anti-malware service for protecting businesses against web-based and zero-day threats has a zero malware guarantee
Cooperative efforts to disrupt Shylock malware
Kaspersky Lab has joined an alliance of industry experts and law enforcement bodies to combat the Shylock malware targeting online banking
PSIM supplier expands into Middle East
Support for the Middle East region has been extended at CNL Software with the addition of further regional technical staff
Low awareness levels of ICO fines for breaching Data Protection Act
A third of security professionals responding to an iStorage survey were unaware of the level of financial penalties companies face for Data Protection Act breaches
Security services contract for Brent Council
ISC to provide integrated security services to Brent Council in the greenest building in Britain
E-mail spam reaches almost 70% during May
May saw a small reduction in e-mail spam with mass educational mailings offering distance learning being predominant
ICS and SCADA security training available at European summit
SANS will be hosting the 2014 European ICS Security Summit alongside two training courses including SANS' new specialist ICS410: ICS/SCADA Security Essentials course in Amsterdam from 23rd to 27th of September.
One time passwords provide remote access for consultant engineers
Two-factor authentication based on SMS delivered one-time passwords is providing network access security for a Dutch engineering consultancy
Certification success for web application firewall
ICSA Labs have provided web application firewall certification to application delivery controller products from A10 Networks
Profile G of open video standard released
Open network video standard organisation, ONVIF, has released Profile G to cater for storage, search and retrieval capabilities
DRM technology protects Japanese video distributor
Live video distribution system for mobile devices in Japan to use DRM Fusion Server for the protection of content delivery
Web based analytics for DDoS visibility
SecureWatch Analytics from Corero provides dashboard based security intelligence based on Splunk big data analytics platform
Reducing Risk With Effective Encryption Management
Jason Thompson, Director of Global Marketing at SSH Communications Security discusses the role of encryption management in risk reduction
Connected home risk survey results
Fortinet reveals the greatest risks that homeowners face with the extension of the "internet of things" into the home environment
Louisiana critical infrastructure protection with Integrated video management
Milestone XProtect Enterprise is playing a central role in the protection of the Port Fourchon oil terminal in Louisiana
Transmitter enables analogue to HD over coax transition
Intersil has released the TW6872 video transmitter for transmitting over extended cable distances and deploying HD video over existing analogue coax cabling
Info Security training available in Estonia
SANS Institute will be operating in the Estonian capital of Tallinn this autumn with courses for information security professionals
Tokenless two-factor authentication for VPN access
The virtual private network of The Lowry cultural centre at Salford Quays is being secured using tokenless two-factor authentication technology from SecurEnvoy
Handheld imaging system for detecting organic threats
The MINI Z handheld Z backscatter imaging scatter has been introduced as a portable means of detecting hidden organic threats in a wide variety of applications
Parking fine malware plagues UK
Bitdefender is warning UK computer users of malware designed to steal confidential information through bogus parking fine reminder notices
Video bookmarking feature on VMS software
The latest version of the exacqvision Video management system features case management capabilities along with the ability to bookmark important video footage
Automatic camera discovery added to VideoEdge NVR
The VideoEdge Network Video Recorder from American Dynamics now features ease of set-up through the automatic discovery of cameras on the network
Cloud based video analytics service available
Panasonic's Cameramanager cloud subscription service now includes intellgent alarming with the use of CLVR video analytics
Poor threat intelligence leads to growth in successful attacks
Check Point reveals the growth in successful malware attacks resulting from increasing software sophistication and lack of threat intelligence
18 percent of smaller businesses face Windows XP risks
Research shows that large numbers of small and medium sized businesses are continuing to face malware attack risks by using the unsupported Windows XP operating system
Advanced security protects Milan's latest metro line
Tyco company, ADT is providing Line 5 of the Milan metro system with security and safety systems including CCTV surveillance and alarms
Nedap takes collaborative approach at IFSEC event
Security management company Nedap is attending the IFSEC event to provide a social hub for finding new ideas and solve the latest security challenges
Seamless video bookmarking capability in VMS
The exacqVision video management system from Tyco now has seamless bookmarking capabilities for improved case management
Survey shows extend of unsuitable content on child mobiles
One out of every seven parents surveyed by BullGuard had found unsuitable content on the mobile devices belonging to their children
Advanced SIEM for improved detection rates
NTT Com Security is improving the detection of unknown threats with its advanced security information and event management capabilities
Lone worker award recognises innovation at Guardian24
Smartphone based lone worker protection system supplier Guardian24 has won the Lone Worker Solution 2014 award
Mobile protection from botnets and ransomware
David Emms of Kaspersky Lab comments on the disruption of GameOver Zeus and CryptoLocker and the need for mobile users not to lower their guard
Hologram awards programme for 2014 now taking nominations
The International Hologram Manufacturers Association has opened nominations for original and innovative uses for holograms
Continuous monitoring and mitigation webinar
ForeScout Technologies sponsors SANS Webinar on the benefits of continuous monitoring and mitigation
Marine access control system for major ports
Dublin and Cherbourg ports have had access control systems from ACT added at buildings operated by Irish Ferries
ID card manufacturing demonstration at IFSEC
Databac will be showing the complex production process for multi-functional card credentials at the IFSEC event in London
Internet of Things generating greater threat exposure fears
IT adminstrators have been surveyed by GFI Software about the level of threats through mobile devices created by the Internet of Things
UK Financial organisation security confidence surveyed
Tripwire has released the conclusions of its survey into the confidence placed by UK financial organisations in the security controls they have in place
Strong authentication for cloud service providers
The Protiva Cloud confirm authentication system from Gemalto is compatible with HP CloudSystem for CSPs
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo