Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Intelligent protection combats grey route mobile messaging
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks
Multi-factor authentication for wearable technology
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress
New CEO appointed at ForeScout Technologies
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer
Cloud based real time communications demonstration at MWC
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications
The most dangerous IT threats of the year and how to neutralise them
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015
Aggressive adware still being seen in Android apps
Google play is still hosting apps that are riddled with aggressive adware, warns Bitdefender
Research published on Security-as-a-Service for communication service providers
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients
Nedap to organise welcome party at ASIS conference in Frankfurt
The ASIS European Security Conference and Exhibition in Frankfurt this March will be launched with a Nedap organised and sponsored welcome party
Surveillance camera SD card playback support
Video footage stored on SD cards on Samsung Techwin security cameras can now be played back directly on Android and iOS devices
Comprehensive security for mobile operator signalling infrastructure
SS7 Protection from AdaptiveMobile provides protection to the core networks of mobile operators against SS7 protocol based attacks
Wireless transmission system for all-weather radar
3G/4G transmission system connects all-wather radar perimeter protection system from Ogier for commercial and military applications
Host service provider strategies to defend against DDoS attacks
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
NCT CBRNe Europe 2015 - top three burning issues
Timely evaluation of Ebola Response, the Ukraine Crisis and Europe’s Response to Emerging Terrorism at European Defence Forum.
Cloud archiving features on VMS stand at ISC West
Genetec is attending the ISC West show this year with the latest version of the Security Center video management system featuring cloud archiving service
Dutch minister to open critical infrastructure protection conference
The Minister for Security and Justice of Holland will be addressing delegates of the Critical Infrastructure Protection and Resilience conference in Europe next week
Hardware encrypted flash drives now available as USB 3.0 devices
IronKey increases data read and write speeds to its latest addition to its secure flash memory storage with the adoption of USB 3.0 connectivity
Biometric protection for data centre cabinets
Cabinet locks with in-built biometric authentication technology are being supplied for the high security data centre industry
Arabic cyber espionage aims at high profile targets in Middle East
The Desert Falcons group has been discovered by Kaspersky Lab to be on a cyber espionage campaign that specifically targets high profile people and companies from the Middle East region
Five steps to secure iterative software delivery
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process
Adaptive threat protection from multiple sources
Tripwire's Adaptive Threat Protection product has been expanded to incorporate more sources of threat information
Open Video Management System certification for surveillance storage system
Milestone Systems has now tested and reported performance component certification of BCDVideo’s Nova Server and Storage Series for video surveillance systems
Fire and Security specialist invests in new office campus
Chubb's Blackburn premises will undergo a complete transformation beginning this year to create improved facilities for its affiliate companies
Security essentials course to be held in Oslo
A six-day intensive course on IT Security essentials will take place as part of the SANS Oslo event that takes place in March
Large contactless payment card deployment in South American universities
A Brazilian bank is at the forefront of a deployment of contactless EMV cards to students in universities in Brazil
Continuous monitoring and mitigation protects European digital classified ads platform
European home and vehicle classified ads platform provider selects CounterACT from ForeScout Technologies for improved network endpoint visibility and management
Controlled secure file sharing for university data
Varonis has supplied Liverpool University with DataAnywhere to enable controlled and secure remote data storage for file sharing without using insecure public cloud services
Android app for remote video monitoring
Video Management System supplier, Mirasys has released the Spotter Mobile 7 app for remote video monitoring from Android devices
Securing digital identities amongst the Internet of Everything
Neil Chapman, Senior Vice President & Managing Director EMEA at ForgeRock delves into identity management and security in connected home and lifestyle electronics
Unlicensed security company falls foul of immigration offences
A London security company director has been jailed for operating with illegal immigrants and forging documentation
Missing patch detection and vulnerability assessment scanning
The latest version of LanGuard from GFI Software provides companies with improved network device vulnerability assessment including the detection of missing patches
Security Solutions to attend locksmith event in UK
The UNION brand from Security Solutions will be at the forefront of the company's innovative product range being shown at this year's Locksmith Expo taking place in Nottingham
Anthem attack demonstrates need for more than static defence
Jonathan Whitley of WatchGuard explains the improvements needed to corporate IT defence mechanisms to become more effective against Anthem-style attacks
Firewall for VMware virtualised environments
Network security experts at Fortinet have joined the VMware NSZ partner programme and produced the FortiGate-VMX Firewall for virtual environments
Malicious adware continues to plague Android apps
Webroot comments on the recent withdrawal of a number of Android apps from Google Play amid problems of adware infections on mobile devices
Zoo gains business benefit from network surveillance
Video management technology is enabling Copenhagen Zoo to explore new business possibilities through online broadcasts of major events
CCTV and wireless networking partnership
Vemotion is combining its wireless surveillance network expertise with rugged camera features from 360 Vision Technology
Study charts enterprise cloud usage risks
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
Analyst portal provides improved decision making
Investigation and resolution of cyber threats gains a new dimension with the Analyst Portal from Tier-3 Huntsman for improved decision making
Network Access Control market report recognises ForeScout as having largest deployments
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
Productivity app download milestone for forensic software
Users of EnCase digital forensics software have performed over 50 thousand downloads of the EnScript productivity apps from Guidance Software's online store
Beyond access control with next-generation NAC
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications
Threat of increased untrusted certificate use
Kaspersky Lab explains the dangers of untrusted certificates and their increased use in the launching of malicious software
Stepping up to the changing demands in airport security
Securitas specialist, Mark Allen, explains how the company is stepping up to the increasing needs of aviation security needs
Modern access control technology protects Polish museum
The Silesian Museum in Poland is making use of modern access control technology with biometric authentication to protect its assets
Facial biometrics use expanded in Hawaii criminal justice system
Morphotrak facial recognition system in use by Honolulu police has now been extended to offer facial searches from photos and videos across the state of Hawaii
High security locks meet loss prevention standard
Surface mounted multipoint high security locking systems from Pickersgill-Kaye have been awarded with approvals to the LPS 1175 loss prevention standard
Surveillance assists Russian postal efficiency
Postal centre handling mail delivered through Moscow airports installs video surveillance equipment from Samsung Techwin to improve safety, security and efficiency of operations
Research into social media use in education
Bloxx study shows high levels of cyber-bullying, inappropriate behaviour and productivity problems associated with the use of social media in educational environments
Continuous recording capability for endpoint threat detection
The latest release of Carbon Black provides continuous endpoint recording and live incident response through remote connection throughout the enterprise
Control room specialist attends Integrated Systems Europe event
VuWall Technology is attending Integrated Systems Europe in Amsterdam in February with its range of products for use in control rooms
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo