Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
ONVIF compliant covert ATM camera
A covert IP camera with wide dynamic range and ONVIF profile S compliant has been released for use in the banking industry
Security conference sees new product launches
HP has released a number of new data security and compliance related products at its HP Protect conference for security professionals
Payment service XSS vulnerability discovered
Bitdefender details its latest discover, this time of a stored XSS vulnerability which could affect payment service users
Hands free video door entry system
Miro hands-free video door entry system uses existing 2-wire installations while providing the latest functions and high security
Camera range upgraded for improved light handling
The wide dynamic range - dynamic capture feature on Axis fixed network cameras enables clearer images to be obtained in difficult lighting
Protecting against non-malware breaches
Dell SecureWorks provides advice on avoiding security breaches that make use of the company credentialling system without the use of malware
Channel Reseller News recognition for ForeScout CEO
Mike DeCesare named in top 100 executive list in Channel Reseller News rankings for 2015
UK Security company opens new operating centre
Securitas has opened its new operating centre and training facility in the UK at Milton Keynes
IT security analytics products released at conference
HP has released new products at the HP Protect event focused on shifting the emphasis of IT security towards an analytics approach
Trusted application management for the IoT
Intercede and Solacia enter strategic partnership for the deployment of trusted application management services to secure the internet of things
Video encryption improvements on show at ASIS
At the US ASIS event, Genetec will be demonstrating its latest video management system release with improved encryption and reduced bandwidth.
August 2015 threat report available
McAfee Labs has made the latest threat report available reviewing the way hardware and software threats have evolved over the last five years.
Agentless protection for Windows 10 BYOD devices
CounterACT provides security professionals with the tools needed to cope with the deluge of Windows 10 BYOD device network connections
Mobile and voice control on Digital Video Manager
Latest release of the Honeywell Video Manager provides greater efficiency with mobile and voice control features
Young people lack trust in digital security
Survey of millennials on both sides of the Atlantic reveals a lack of faith in the ability of security practices in protecting digital identity
ICS security course to be held in Amsterdam
Courses will be available at an Industrial Control System summit being held in September in Amsterdam
The silent approach of advanced persistent threats
High Tech Bridge explains how easily advanced persistent threats infiltrate the IT network of an organisation exposing vulnerabilities
IP video improves security at East Anglia hositals
Mental health units in Norfolk and Suffolk have seen an upgrade from Analogue to IP video surveillance systems for improved security
Violent criminals convicted with help of Smartwater evidence
Smartwater forensic trace evidence on shoes belonging to a suspect helped lead to the capture of three violent criminals in the UK
Mobile key services integrated with access control system
Salto Systems and Zaplox have integrated their products to provide the hospitality industry with combined access control and cloud based mobile key services
Video door entry panels for apartment complex
The former foreign missionary college in London has been converted to flats and has been secured using digital video door entry panels with power over ethernet
Protection from malicious mobile apps
Corporate defence software from Proofpoint provides organisations with protection against vulnerabilities on mobile smartphone devices
Stopping the insider threat
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme
The IoT Botnets are Coming: Are You Prepared?
Rishi Agarwal of NSFOCUS provides some insight into the security vulnerabilities associated with the Internet of Things and what is being done to prevent them from being exploited
Secure radio storage and tracking
UK highways contractor takes secure storage facility for issuing and controlling its airwave radios
Smartphone app for surveillance technicians
The GURU Smartphone app from March Networks provides security surveillance technicians with improved troubleshooting and diagnostics capabilities
Common video interfaces for vertical applications
Ocularis integrations certified for vertical markets including banking, access control and licence plate recognition
NIST accolade for tattoo recognition technology
The National Institute of Standards and Technology has praised the capabilities of tattoo recognition technology from Morphotrak
Effective archiving to avoid data swamps
Eileen Sweeney, SVP and General Manager of Data Management at Iron Mountain examines how organisations can avoid drowning in a swamp of data with the use of effective archiving strategies
Securing the IoT with the Help of Multi-Factor Authentication
David Hald of SMS PASSCODE explains how multi factor authentication can be used as a robust security measure for the Internet of Things
How wireless surveillance could help in Calais crisis
Vemotion explains how the use of a wireless network infrastructure for security surveillance systems could provide critical protection for drivers embroiled in criminal migrant activities in Calais
Entry level video analysis appliance
Dallmeier releases the DVS 800 IPS video analysis appliance for analysing up to four video channels
VMS certification for rugged NVR
A highly rugged NVR for use with multiple cameras in transport applications has received Milestone certification for use with the XProtect video management system.
The importance of critical infrastructure protection
Rob Lay, Enterprise and Cyber Security Solutions Architect in UK and Ireland at Fujitsu explains why better security is needed for critical infrastructure
Continued access to corporate data for ex-employees
Survey by Centrify shows how common it is for former employees to continue to have access to corporate data after they have left the company.
High quality surveillance equipment to meet SME budget needs
Tyco releases IP surveillance camera and NVR range targeted at the small and medium sized business sector
Financial audit company offers web security services
Partnership with High Tech Bridge brings web application security services to clients of PriceWaterhouseCoopers of Switzerland.
Threat intelligence unit formed for mobile security
Mobile security company AdaptiveMobile is sharing its expertise in best security practices as part of its newly formed Threat Intelligence Unit.
Survey reveals internet romance dangers
BullGuard has been polling internet daters to uncover the true risks of providing too much personal and financial information to strangers.
Next generation firewall with web filtering for schools
Barracuda Networks is targeting the education sector with its latest Firewall product with web filtering to improve school cyber security
High cost of data breaches for UK businesses
The way UK businesses approach security product implementation needs rethinking, according to Sophos network security expert
Malware attacks target public sector
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector
Identity protection in the internet of things
Eve Maler of ForgeRock discusses the opportunities afforded by the Internet of Things and the possible identity perils that could be faced
Physical security breaches continue to outweigh cyber attacks
Vanderbilt survey shows extent of physical security breaches suffered by organisations with nearly three times as many taking place then cyber attacks
Things to consider when adopting an IoT strategy
Mark Lee of Intamac explains the considerations that need to be taken into account when executing a strategy involving the internet of things
Video analytics integrated with monitoring software
Agent Vi video analytics is now available as an integrated feature on the Immix central monitoring software
Award success for Network Access Control platform
CounterACT from ForeScout Technologies has been judged to be the best NAC solution in the SC Magazine awards this year
VMS supports body worn cameras
Genetec expands support for body worn camera equipment in the latest release of the Security Center video management system
Security association members to speak at UK event
Experts from BSIA member organisations will be making scheduled appearances as part of the conference programme taking place at IFSEC this week in London
Vulnerability management and real time assessment partnership
ForeScout is extending its range or interoperability with a new partnership with vulnerability assessment specialist, Qualys
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo