Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
CCTV supplier enters biometric distribution agreement
The Anviz range of multi-biometric access control products will be distributed in the UK by CCTV specialist Y3K
European digital identity recommendations published
Recommendations have been provided for supporting the EC for prioritising tasks in the establishment of a single European Identity Community
Hospital secures critical areas with IP access control
ACT has provided a hospital in Tunbridge Wells with an IP access control system for securing mission critical areas in the facility
Endpoint security market research report
Domination of the endpoint security market by five top companies is covered in a new market research report
Report profiles top global CCTV manufacturers
A comprehensive report is available covering an assessment of the top 120 manufacturers of CCTV surveillance equipment
Small businesses underestimate cyber attack risk
Kaspersky Lab Research indicates smaller businesses in the UK are underestimating the amount of risk they face from the activities of cyber criminals
High profile data breaches detailed in quarterly threat report
The latest McAfee threat report has been released with details of the dark web malware industry and its relation to recent high profile attacks
UTM brings advanced threat protection to smaller businesses
A new Unified Threat Management platform from Sophos is aimed at providing high performance, advanced threat protection to the small and mid-market
High speed DDoS protection appliances
New range of DDoS protectioni products designed to provide high performance attack mitigation for large companies and service providers
Increased defence spending improves Saudi Arabian security market
The market for security systems in Saudi Arabia is expected to increase as a result of increased defence spending in the region, according to a new report
Market forecast for cyber security products in South Korea
South Korean market for cyber security products expected to grow by over 21% per year for the next four years
SIEM market forecast for 5 years
The market for Security Information and Event Management software (SIEM) out to 2019 is examined in a new report
Latest trend analysis in mobile forensics
Cellebrite provides its view on the way social evidence, big data and malware are shaping the future of mobile forensics
Evolution of Snake cyber espionage toolkit
BAE Intelligent Systems dissects the Snake cyber espionage toolkit and explains how this could change the face of the cyber-security industry
Facebook ad targeting being used as conduit for spam
Bitdefender explains the latest way spammers are delivering their messages through the advertising targeting tools within Facebook
Nearly half of online bankers believe banks will refund fraud losses
Research from Kaspersky Lab shows the extent to which people rely on bank security and a perceived willingness of the banks to compensate fraud losses
Market evolution for facial recognition systems
The entire facial recognition industry is examined in a new report providing forecasts out to 2018
PSIM system integrated with Barco video walls
Surveillint PSIM system from Proximex now operates in conjunction with control room products from Barco for improved situational awareness and visualisation
IP security open standard encompasses access control
Profile C of the ONVIF standard has gone into its final release with the inclusion of physical access control specifications
Chinese university library takes IP surveillance system
An IP surveillance system has been installed at a large university library facility in China for the protection of staff, students and library assets
Wireless router vulnerability exposure
Massive exposures have been uncovered by Tripwire in the kinds of wireless routers used by small offices and homes
Vulnerabilities in a brave new world of the internet of things
Richard Moulds, VP Strategy at Thales e-Security examines the internet of things, how it affects peoples' daily lives and the vulnerabilities that it introduces
Aspiration system live demonstration
The FAAST aspiration system has been set up as a demonstration in a manufacturing facility as part of System Sensor CPD programme
Hidden resources reveal increase in cybercriminals
Kaspersky research of darknet resources shows that the number of cyber criminals is on the increase
Asset protection conference to see latest loss prevention technology
Retail loss management and physical security systems from Universal Surveillance Systems will be on show at the FMI asset protection conference
Automatic connectivity restoration for network service providers
Distributed enterprises and service providers can benefit from self-healing management networks with built-in 3G or LTE cellular backup
IT protection designed for small businesses
Small Office Security from Bitdefender has been developed to provide convenient protection for IT systems for smaller businesses
Spam levels reduce by 7% in January
Global spam report shows reduction in January with content characterized by fake WhatsApp notifications and adverts for Valentine's day gifts
New appointments strengthen Cloud NVR team
AD Network Video has made two new appointments in product management and business development for the company's Cloud NVR and Video Management System products
Robust administrative security required to prevent Wi-Fi viruses
Bitdefender comments on the creation of the wi-fi virus and how passwords are no longer enough to provide the necessary network security levels
Free app protects Windows phones from malware
Kaspersky Lab is providing additional safeguards from mobile malware to consumers using Windows smartphones
Security export strategy to keep UK at the forefront of technology
The UK Government's recently released security export strategy provides encouraging support to the country's cyber security industry
Massive growth expected in Indian biometric market
Market research report examines the expected growth in Biometrics in India during the next four years
Additional courses available at Pen Test Berlin event
SANS Institute is providing an additional two courses for penetration testing at the Pen Test Berlin event for ethical hackers
Bite sized online security training
Tavcom is now providing online distance training modules for providing targeted education whenever and wherever needed
Mobile malware diagnostics partnership
Cellebrite has entered a technology partnership with Webroot to integrate diagnostics with mobile app reputation and URL classification service
UK industry attitudes to growth in cyber threats
Research from BAE Systems Applied Intelligence shows increased spending expected in UK industry to counter expected cyber threats
Cloud security through discovery, protection and monitoring
CipherCloud expands its data protection system for helping companies adopt cloud services with secure protection of sensitive data
Partnership bolsters protection from DDoS attacks
Lancope and Radware are combining their expertise to provide advanced detection and mitigation against Distributed Denial of Service attacks
Risk management and compliance for cloud servers
Server Suite 2014 from Centrify provides protection from data centre risks relating to external attacks or the insider threat
New architecture enables immediate protection from latest threats
Check Point has further reduced the time for converting threat intelligence into immediate protection with the development of its software defined protection architecture
Android apps a significant risk for small businesses
McAfee study shows that small businesses using Android devices are at risk if they don't have effective mobile device management strategies
Network video surveillance for Moscow business centre
The new Paveletskaya Plaza business centre in Moscow is being protected with an extensive network video surveillance system from Samsung Techwin
Market report on biometric technology in mobile phones
Smartphones equipped with biometric access control technology come under the spotlight in a new market research report
Network forensic extension for Sourcefire Defense Center
The Endace Fusion Connector from Emulex provides 100GbE packet capture and intrusion detection for Defense Center from Sourcefire
Digital ID and data protection for consumers
WISeKey is extending corporate digital protection and digital identification solutions for use by individuals
Industry collaboration for improved security defences
The HP security portfolio provides organizations with the means for proactive sharing of threat intelligence to collaborate on improved security
Public cloud service security risks
Axway survey results indicate the attitudes of security professionals to the dangers of using public cloud services for file sharing in the workplace
Android banking trojans increased during 2013
Mobile threat landscape report from Kaspersky Lab shows extent of growth of banking trojans on the popular Android mobile platform
Unified security policy orchestration for complex environments
The latest version of Tufin's Orchestration Suite extends further into the network for improved policy management in increasingly complex network environments
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com