Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Laptop lockers improve security at Lincoln College
Three lockers provide security and asset management capabilities for 80 laptops at educational institute in the UK
Virtualised cloud communication security
The virtualised real-time communications system from Sonus Networks brings enhanced security and intelligence
Biometrics facilitate remote identification in Pinellas County
Local police in Pinellas County now have mobile access to fingerprint records enabling biometric finger identification whilst in the field
Unified Security Management for card payment system provider
Crosskey has chosen Unified Security Management from AlienVault for increased security visibility in its card payment processing operations
Secure data on the move for TfL using hardware encrypted flash memory
Hardware encrypted secure USB storage devices by iStorage are being used by Transport for London to help prevent loss of mobile data
New malware bypasses CAPTCHA
Android malware targets Russian social network users with method to overcome CAPTCHA codes in attempts to extort money
Embedded video analytics cooperation agreement
The Savvi analytics engine from Agent Vi will be available pre-installed on Hikvision cameras as part of a new strategic agreement between the two companies
Mini backscatter system introduced to UK market
The handheld Z Backscatter image scanner for portable drug, explosive and organic threat detection makes its debut on the UK market
RFID based access control protects London student accommodation
The use of RFID escutcheons in student accommodation development in central London provides secure access with reduced building wiring
Key actions needed to ensure digital safety
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe
Natural language processing for preventing spear phishing
OpenDNS develops new model of making real-time detections of targetted phishing campaigns using natural language processing
New wave of Cryptowall ransomware attacks
Bitdefender uncovers new distribution mechanism for the Cryptowall ransomware through spam campaign
Console provides real time social media threat information
Proofpoint is now supplying its Nexgate Social Threat Centre, a console for providing administrators with up to date information on social media threats
On-demand web penetration testing available to security suppliers
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme
More models added to network camera range
Featuring advanced lens technology, the new Canon surveillance camera range features new dome, box and 360 degree cameras
Camera location mapping included in latest VMS version
The Mirasys VMS has been re-released at version 7.3 with improved mapping features with GPS coordinates of cameras on the premises under surveillance
Centralised e-mail encryption
Simplified enterprise e-mail encryption includes flexible and configurable policy settings
Cloud surveillance system integrates with VMS
Technology alliance between mobiDEOS and OnSSI results in integration between video management system and cloud-based surveillance platform
End to end control for real time communications networks
Sonus IQ has been released to provide real time communications network operators with a security and intelligence platform
Biometric iris authentication for smartphones
Fujitsu bites the alternative authentication bullet and proves that non-fingerprint biometric technology is possible for the protection of smartphones
4G connected surveillance for home monitoring
Property without wf-fi connectivity can now be monitored using the latest Nubo camera with 4G connectivity from Panasonic
Intelligent protection combats grey route mobile messaging
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks
Multi-factor authentication for wearable technology
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress
New CEO appointed at ForeScout Technologies
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer
Cloud based real time communications demonstration at MWC
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications
The most dangerous IT threats of the year and how to neutralise them
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
Aggressive adware still being seen in Android apps
Google play is still hosting apps that are riddled with aggressive adware, warns Bitdefender
Research published on Security-as-a-Service for communication service providers
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients
Nedap to organise welcome party at ASIS conference in Frankfurt
The ASIS European Security Conference and Exhibition in Frankfurt this March will be launched with a Nedap organised and sponsored welcome party
Surveillance camera SD card playback support
Video footage stored on SD cards on Samsung Techwin security cameras can now be played back directly on Android and iOS devices
Comprehensive security for mobile operator signalling infrastructure
SS7 Protection from AdaptiveMobile provides protection to the core networks of mobile operators against SS7 protocol based attacks
Wireless transmission system for all-weather radar
3G/4G transmission system connects all-wather radar perimeter protection system from Ogier for commercial and military applications
Host service provider strategies to defend against DDoS attacks
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
NCT CBRNe Europe 2015 - top three burning issues
Timely evaluation of Ebola Response, the Ukraine Crisis and Europe’s Response to Emerging Terrorism at European Defence Forum.
Cloud archiving features on VMS stand at ISC West
Genetec is attending the ISC West show this year with the latest version of the Security Center video management system featuring cloud archiving service
Dutch minister to open critical infrastructure protection conference
The Minister for Security and Justice of Holland will be addressing delegates of the Critical Infrastructure Protection and Resilience conference in Europe next week
Hardware encrypted flash drives now available as USB 3.0 devices
IronKey increases data read and write speeds to its latest addition to its secure flash memory storage with the adoption of USB 3.0 connectivity
Biometric protection for data centre cabinets
Cabinet locks with in-built biometric authentication technology are being supplied for the high security data centre industry
Arabic cyber espionage aims at high profile targets in Middle East
The Desert Falcons group has been discovered by Kaspersky Lab to be on a cyber espionage campaign that specifically targets high profile people and companies from the Middle East region
Five steps to secure iterative software delivery
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process
Adaptive threat protection from multiple sources
Tripwire's Adaptive Threat Protection product has been expanded to incorporate more sources of threat information
Open Video Management System certification for surveillance storage system
Milestone Systems has now tested and reported performance component certification of BCDVideo’s Nova Server and Storage Series for video surveillance systems
Fire and Security specialist invests in new office campus
Chubb's Blackburn premises will undergo a complete transformation beginning this year to create improved facilities for its affiliate companies
Security essentials course to be held in Oslo
A six-day intensive course on IT Security essentials will take place as part of the SANS Oslo event that takes place in March
Large contactless payment card deployment in South American universities
A Brazilian bank is at the forefront of a deployment of contactless EMV cards to students in universities in Brazil
Continuous monitoring and mitigation protects European digital classified ads platform
European home and vehicle classified ads platform provider selects CounterACT from ForeScout Technologies for improved network endpoint visibility and management
Controlled secure file sharing for university data
Varonis has supplied Liverpool University with DataAnywhere to enable controlled and secure remote data storage for file sharing without using insecure public cloud services
Android app for remote video monitoring
Video Management System supplier, Mirasys has released the Spotter Mobile 7 app for remote video monitoring from Android devices
Securing digital identities amongst the Internet of Everything
Neil Chapman, Senior Vice President & Managing Director EMEA at ForgeRock delves into identity management and security in connected home and lifestyle electronics
Unlicensed security company falls foul of immigration offences
A London security company director has been jailed for operating with illegal immigrants and forging documentation
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo