Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
August 2015 threat report available
McAfee Labs has made the latest threat report available reviewing the way hardware and software threats have evolved over the last five years.
Agentless protection for Windows 10 BYOD devices
CounterACT provides security professionals with the tools needed to cope with the deluge of Windows 10 BYOD device network connections
Mobile and voice control on Digital Video Manager
Latest release of the Honeywell Video Manager provides greater efficiency with mobile and voice control features
Young people lack trust in digital security
Survey of millennials on both sides of the Atlantic reveals a lack of faith in the ability of security practices in protecting digital identity
ICS security course to be held in Amsterdam
Courses will be available at an Industrial Control System summit being held in September in Amsterdam
The silent approach of advanced persistent threats
High Tech Bridge explains how easily advanced persistent threats infiltrate the IT network of an organisation exposing vulnerabilities
IP video improves security at East Anglia hositals
Mental health units in Norfolk and Suffolk have seen an upgrade from Analogue to IP video surveillance systems for improved security
Violent criminals convicted with help of Smartwater evidence
Smartwater forensic trace evidence on shoes belonging to a suspect helped lead to the capture of three violent criminals in the UK
Mobile key services integrated with access control system
Salto Systems and Zaplox have integrated their products to provide the hospitality industry with combined access control and cloud based mobile key services
Video door entry panels for apartment complex
The former foreign missionary college in London has been converted to flats and has been secured using digital video door entry panels with power over ethernet
Protection from malicious mobile apps
Corporate defence software from Proofpoint provides organisations with protection against vulnerabilities on mobile smartphone devices
Stopping the insider threat
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme
The IoT Botnets are Coming: Are You Prepared?
Rishi Agarwal of NSFOCUS provides some insight into the security vulnerabilities associated with the Internet of Things and what is being done to prevent them from being exploited
Secure radio storage and tracking
UK highways contractor takes secure storage facility for issuing and controlling its airwave radios
Smartphone app for surveillance technicians
The GURU Smartphone app from March Networks provides security surveillance technicians with improved troubleshooting and diagnostics capabilities
Common video interfaces for vertical applications
Ocularis integrations certified for vertical markets including banking, access control and licence plate recognition
NIST accolade for tattoo recognition technology
The National Institute of Standards and Technology has praised the capabilities of tattoo recognition technology from Morphotrak
Effective archiving to avoid data swamps
Eileen Sweeney, SVP and General Manager of Data Management at Iron Mountain examines how organisations can avoid drowning in a swamp of data with the use of effective archiving strategies
Securing the IoT with the Help of Multi-Factor Authentication
David Hald of SMS PASSCODE explains how multi factor authentication can be used as a robust security measure for the Internet of Things
How wireless surveillance could help in Calais crisis
Vemotion explains how the use of a wireless network infrastructure for security surveillance systems could provide critical protection for drivers embroiled in criminal migrant activities in Calais
Entry level video analysis appliance
Dallmeier releases the DVS 800 IPS video analysis appliance for analysing up to four video channels
VMS certification for rugged NVR
A highly rugged NVR for use with multiple cameras in transport applications has received Milestone certification for use with the XProtect video management system.
The importance of critical infrastructure protection
Rob Lay, Enterprise and Cyber Security Solutions Architect in UK and Ireland at Fujitsu explains why better security is needed for critical infrastructure
Continued access to corporate data for ex-employees
Survey by Centrify shows how common it is for former employees to continue to have access to corporate data after they have left the company.
High quality surveillance equipment to meet SME budget needs
Tyco releases IP surveillance camera and NVR range targeted at the small and medium sized business sector
Financial audit company offers web security services
Partnership with High Tech Bridge brings web application security services to clients of PriceWaterhouseCoopers of Switzerland.
Threat intelligence unit formed for mobile security
Mobile security company AdaptiveMobile is sharing its expertise in best security practices as part of its newly formed Threat Intelligence Unit.
Survey reveals internet romance dangers
BullGuard has been polling internet daters to uncover the true risks of providing too much personal and financial information to strangers.
Next generation firewall with web filtering for schools
Barracuda Networks is targeting the education sector with its latest Firewall product with web filtering to improve school cyber security
High cost of data breaches for UK businesses
The way UK businesses approach security product implementation needs rethinking, according to Sophos network security expert
Malware attacks target public sector
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector
Identity protection in the internet of things
Eve Maler of ForgeRock discusses the opportunities afforded by the Internet of Things and the possible identity perils that could be faced
Physical security breaches continue to outweigh cyber attacks
Vanderbilt survey shows extent of physical security breaches suffered by organisations with nearly three times as many taking place then cyber attacks
Things to consider when adopting an IoT strategy
Mark Lee of Intamac explains the considerations that need to be taken into account when executing a strategy involving the internet of things
Video analytics integrated with monitoring software
Agent Vi video analytics is now available as an integrated feature on the Immix central monitoring software
Award success for Network Access Control platform
CounterACT from ForeScout Technologies has been judged to be the best NAC solution in the SC Magazine awards this year
VMS supports body worn cameras
Genetec expands support for body worn camera equipment in the latest release of the Security Center video management system
Security association members to speak at UK event
Experts from BSIA member organisations will be making scheduled appearances as part of the conference programme taking place at IFSEC this week in London
Vulnerability management and real time assessment partnership
ForeScout is extending its range or interoperability with a new partnership with vulnerability assessment specialist, Qualys
IP cameras with VMS on board
SD storage and onboard video management system feature on the new Illustra Edge HD video camera from Tyco
ONVIF compliant high performance dome camera
Pelco has added to its range of dome cameras with the Spectra Enhanced series with low latency PTZ and single cable PoE installation
Key management integration with access control
KeyWatcher key control system is now integrated with Tyco access control and security management system
Private sector could offset council CCTV cuts
As more councils are reducing expenditure on surveillance, the BSIA suggests that the private sector also has some part to play in crime detection
ICO reports fall short of real level of UK data breaches
Data Protection Act breaches could be more than ten times the levels reported to the Information Commissioners Office in the country
Wireless represents highest vulnerability according to survey
Fortinet reveals the results of a survey it conducted in which IT decision makers state their belief that wireless networks represent their highest vulnerability
Funding call of IoT trust and security hub
The Engineering and Physical Sciences Research Council is working with a number of universities on the creation of a hub to address privacy, trust and security in the Internet of Things
4K surveillance system on show at IFSEC
Panasonic will be attending IFSEC this year with its range of 4K resolution cameras, NVR and video screen walls
Tokenization for protection of cloud data
CipherCloud is now offering Next Generation Tokenization as an additional method of protecting data that resides in the cloud
IT security interoperability demos at Infosecurity Europe
ForeScout Technologies is attending Infosecurity Europe with demonstrations of ControlFabric based interoperability in conjunction with major partners
Intelligent packet capture for improved incident response
Lancope is at the InfoSecurity event this week in London with its PacketWatch product for intelligent packet capture
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo