Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Continuous file assessment gives security the edge in finding malware
Terry Greer-King, Director of Cyber Security at Cisco explains Advanced Persistent Threats and the ability of modern security software in assessing vulnerabilities
Large retail chain deploys two factor authentication for network access
Middle East based LuLu Group is controlling access to its networks for over 30,000 employees using tokenless two-factor authentication from SecurEnvoy
Securing commercial networks continues to become more challenging
Fortinet has released the results of its global security survey revealing boardroom tension and the challenging reality of more complex security conditions
Investment management company deploys pervasive network security
Pioneer Investments have taken ForeScout CounterACT to protect its network and provide real time visibility across all its endpoints.
Personal security app for protecting vulnerable people
Stanley security has released its Stanley Guard smartphone app as a personal protection system for people at work or at home
ControlFabric interoperability demonstrations at it-sa event
ForeScout will be at the it-sa event in Nuremberg to demonstrate its latest interoperability capabilities with other security systems based on the ControlFabric platform.
NFC smartphones become trusted access credentials
HID Global has now enabled the use of NFC communications as being a means of providing trusted access to replace keys or smart cards
Proactive social media management on web filter
The latest version of the Bloxx web filter and secure web gateway enables more proactive management of social media as well as access to flash games
Underside vehicle scanner provides protection at Gatwick
Gatwick airport has installed equipment from Chemring to inspect the underside of vehicles as the pass from road to airside
Pink card printer sales help support breast cancer sufferers
Datacard is repeating its support for those suffering from breast cancer with the donation of funds raised from the sales of its pink card printers
Fire detection system upgrade for Scottish housing association
Dunedin Canmore housing association in Edinburgh is protecting residents with an upgraded fire detection system from Chubb
High definition video appliance for simplified installations
Combining power-over-ethernet switch and powerful video management software, Avigilon have created a simple to install video appliance
Partnership sees integration of video management and analytics
SeeTec and IPS Intelligent Video Analytics have entered into a partnership which sees intelligent video surveillance based on the Cayuga VMS
Optimized hard disk drive for surveillance applications
New hard drive from Seagate features 6TB storage capacity and rescue services optimized for use in highly demanding surveillance applications
When is a vulnerability not a vulnerability?
Mark Kedgley, CTO of New Net Technologies provides information on a continuous approach to vulnerability scoring and management
Research report into transportation security
Transportation safety and security equipment is the subject of a market research report examining demand for the next 4 years
Intelligent Network Infrastructure for Ryder Cup event
Boston Networks has supplied the IP security and intelligent network infrastructure that will be used as part of the 2014 Ryder Cup event at Gleneagles
User-friendly platform for proactive surveillance
The latest release of Avigilon Control Center video management software provides complete video analytics configuration and support
On-camera video management system demonstration
ASIS attendees will be able to see the Milestone Arcus Video Management System performing on board IQinVision camera equipment
Suspect search analytics wins ASIS award
NICE Systems is celebrating award success for its Suspect Search video analytics software at this year's ASIS event
Dome cameras with built-in video analytics
High definition bullet and dome cameras from Avigilon are now available with embedded adaptive video analytics functionality
Professional body enters critical infrastructure protection relationship
National Infrastructure protection centre and the Security Institute have entered a relationship to ensure the availability of qualified security professionals
Fast video search facility for people tracking
Identifying and tracking people on surveillance systems is now made easier on a Nice video analytics systems that cuts down video search times
Privacy concerns uncovered as barrier to mobility
AdaptiveMobile reports on the concerns of employees for their privacy as well as a lack of trust as barriers to mobility
Four year outlook on DDoS prevention market
Key vendors involved in Distributed Denial of Service prevention examined in new market research report predicting market volume over next four years
Improved mapping now available on PSIM software
The latest release of the IPSecurityCenter PSIM software includes multiple deployment capabilities, video export and improved mapping
How to keep contactless payment credentials secure
Bitdefender explains the top security threats associated with the booming contactless payment industry with monthly spending now three times that of last year
Arcus embedded video management for surveillance hardware
Milestone Systems takes the next stpe in scalability with the release of the Arcus embedded video management system
Video management for mobile and remote surveillance
Synectics adds to its Synergy range with the Compact and Tablet versions for delivering command and control capabilities for mobile and remote-site surveillance
Secure private messaging system patented
Maxxess to attend ASIS to demonstrate its Ambit secure communications technology developed for the security industry
Hybrid DDoS Defence for cloud and on-premises environments
Arbor Networks improves its CloudSM and Pravail protection systems for hybrid DDoS either in the cloud or on company premises
Flawless detection rate in unknown attack testing
Benchmark testing using unknown malicious files gives Check Point Threat Prevention highest mark in protection against internet attacks
Auto IP camera discovery feature for exacqVision VMS
Exacq Technologies brings video surveillance a step closer to plug-and-play with the EasyConnect automatic IP camera connector feature
Manned guarding software integration with video management system
GuardTrax has integrated its phone app with Milestone XProtect bringing guard management workflows into mainstream security control software
Museum facility administrator event sponsorship
Chubb is one of the sponsors of this year's conference for museum facility adminstrators taking place in Scotland
The future of mobile forensics in global legal systems
Yuval Ben-Moshe of Cellebrite explains the necessity for accommodating mobile forensics technology as part of the legal process
Cloud based identity and access management for Samsung
The identity and access management feature on Samsung's enterprise mobility management cloud based service enabled by Centrify
Guide available for Security Architects
The British Computer Society has released a guide providing top tips to organisations on IT security architecture
Cyber threat programme assessment and development
Rapid7 is now offering programme development services for cyber security through its Global Strategic Services Practice
Integration improves mitigation and response times
UserInsight from Rapid7 now operates in conjunction with HP ArcSight ESM providing faster and more effective threat mitigation
IP intercoms protect access at UK laboratory
Unilever has chosen Castel's IP intercom stations for improving access security to its laboratory and research centre on Merseyside
Four reasons why tape based data storage isn't dead
Christian Toon, the head of information risk at Iron Mountain explains how tape is still being used as a data storage medium
Latest breach shows retail industry to be prime cyber attack target
HP comments on the recent cyber breach at retailer Home Depot illustrating the high levels of vulnerability surrounding the lucrative retail business
ForeScout expands presence in EMEA region
Increased demand in Europe for network security and continuous monitoring and mitigation leads to expanded presence in the region for ForeScout Technologies
Affordable Cyber Security Accreditation for Public Sector suppliers
The SME segment of the UK's public sector supply chain gains affordable cyber security accreditation from HP enterprise services
High mobile operator uptake of security software
The top nine mobile operators are protecting their subscriber base with mobile security protection from AdaptiveMobile
Move to biometrics a significant step for banking security
Fujitsu comments on its support for Barclays bank and the move it has made to move client access to banking services through finger vein biometrics identification technology
All In One Security plug-in for Wordpress vulnerability
High-Tech Bridge explains threat of new vulnerability affecting the All-in-one security plug-in for Wordpress
Linux malware linked to DDoS attack campaigns
Akamai has released a threat advisory covering high-risk Linux system infections that can be used to launch DDoS attack campaigns
Nine DDoS Assumptions That Must Be Put to Bed
Xuhua Bao, Hai Hong and Zhihua Cao of NSFOCUS dispel nine popular myths that surround Distributed Denial of Service attacks
First | Prev  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo