Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Cloud based threat intelligence to combat APTs
BrightCloud and BreachLogic from Webroot provide protection from advanced threats on endpoint devices within the enterprise
IP cameras provide protection in Arctic facility
A space station above the Arctic Circle in Sweden is being protected with IP video surveillance cameras supplied by Axis Communications
Cloud based vulnerability management
Free vulnerability management system provides cloud based service for smaller businesses of up to 100 IP addresses
Cloud solution for enterprise mobile security
Partnership between Zscaler and Samsung Electronics brings integrated enterprise mobile security for Androids using cloud technology
Continuous endpoint compliance both on and off the corporate network
ForeScout RemoteControl enables organisations to extend endpoint control to corporate and BYOD equipment not connected to the enterprise network
Network monitoring data capture card
Low cost PCI card provides IT administrators with packet capture capabilities for full network monitoring applications
Mobile device threat complexity sees annual growth
Threat report from Webroot features the growth in mobile threats exposing company IT systems to malicious attacks
VMS and access control system integration
The exacqVision video management system has been integrated with EntraPass 6.01 security management software for access control
Cell base station security for 4G and LTE Networks
The LTE Small Cell Security system from Clavister provides small cell base station security for mobile operators
Market forecast of physical security systems
Report examines the market to 2019 for physical security systems globally, expected to reach over 125 billion USD
The effect of web intelligence on the physical security industry
NICE Systems' Jamie Wilson provides his view on the rise of Open Source Intelligence as a forecasting tool in predicting security incidents
Internal security breaches a serious issue in UK industry
Report details extent of the insider threat to UK businesses with only a quarter of IT professionals considering it to be a security priority
Market forecast for transportation safety and security
Report on the safety and security of transportation systems covers airways, sea routes, roads and railways during the period to 2018
Surveillance power system using solar energy
A solar panel power system has been developed for supplying energy to surveillance or perimeter protection systems in remote locations
Securing the future with multi-factor authentication
Claus Rosendal of SMS PASSCODE examines multi-factor authentication as a means of providing stronger security across the IT spectrum
Poor anti-theft software implementation threat
Kaspersky Lab provides details of the hidden threat overshadowing poor implementations of anti-theft software that can be exploited by attackers
VMS partner conference held in Florida
Video Management System supplier Milestone has been engaging its partner base with the latest MIPS conference held for the Americas in Florida
Security for Chelsea National Army Museum
Corps Security is providing the security services for protecting visitor and staff and securing the collection at the National Army Museum in Chelsea
Threat response partnership formed
Bit9 and Carbon Black have joined forces to deliver rapid threat response capabilities for the IT industry
Unified multi-factor authentication platform
The S3 Authentication Suite provides centralised multi-factor authentication for operation with a wide range of devices
Complex cyber-espionage toolkit The Mask explained
Kaspersky Lab provides details of "The Mask", an advanced cyber-espionage operation comprising different attack vectors for targeting high profile victims
Less than half of parents use internet supervision controls
Research by ESET demonstrates gap in internet child protection as parents neglect to use supervision controls
Email Defense Suite protects cloud service users
Intermedia is protecting its customers with enhanced cloud security provided by McAfee Email Defense Suite
Specialist traffic camera on show at InterTraffic
Dallmeier is attending InterTraffic in Amsterdam in March with its Panomera Traffic camera with multifocal optics for greater coverage with no moving parts
Global security organisation chooses training partner
Security professionals in the UK are to receive a boost in their continual training and education.
Study shows increase in enterprise encryption levels
Key management remains a challenge for organisations deploying enterprise-wide encryption, according to study from Ponemon and Thales e-Security
Multi-platform data encryption for widespread adoption
Sophos is providing easier capabilities for enterprises to adopt widespread encryption with the launch of SafeGuard Encryption 6.1
Fault-tolerant video surveillance servers
The S-Series Enterprise server provides video surveillance users with ability to add extended and archived storage
Unsecured intimate content at risk on Valentine's day
McAfee is warning against being too intimate in electronic communications in the run-up to valentine's day with almost a third of people not having any basic security in place on their smartphones
VMS discounts for educational facilities
Schools and universities in America can obtain large discounts on the Ocularis video management system for security surveillance
Cloud security and compliance acquisitions
Imperva is acquiring Incapsula and Skyfence to extend the company's data centre security strategy across the cloud
Card fraud trends examined in research report
Javelin research report delves into consumer password habits and the relationship to payment card data fraud instances
Munich training course for penetration testers and investigators
SANS Munich event provides security professionals with training for malware reverse engineering and the techniques used by hackers
Large fashion retailer gains PCI DSS compliance
The Jack Wills fashion retailer is securing over a million transactiosn per year compliant with PCI DSS regulations using New Net Technologies
Webinar explores data breach prevention for retailers
Lancope is providing retailers with insight into protection from data breaches using network visibility improvements at two forthcoming webinars
Network access control rated as highest cyberthreat defence
A report has been published on cyberthreat defences that rates network access control as having the highest potential for counteracting threats
Research study into Global Mass Transport Security Market Assessment
Study indicates that insurance and safety strongly influence the adoption of security systems in mass transport environments
Geographic market forecast for IP video surveillance
Global markets have been examined and forecast to 2018 for video surveillance networks using IP technology
Big data analytics for improved understanding of sensitive assets
Research report shows the benefits of using metadata for the analysis of sensitive information in unstructured data
Mindset change needed to overcome PoS vulnerability
Thales e-Security comments on the RSA discovery of Eastern European malware which steals payment card data from retail point-of-sale equipment
Security analytics modules extended to cloud applications
Three new modules from ExtraHop bring additional data analytics capabilities for security, WAN optimisation and cloud applications
Comprehensive report on market for mobile device and network security
Mobile device and network security report provides details of expected market growth and segmentation covering the period to 2020
Study shows cyberbullying risk for young teenagers
14-15 year old's online behaviour is putting them at increased risk of cyber-bullying, according to a study carried out for Safer Internet Day
Wiki site vulnerability discovered
Remote code execution discovery on Wiki platform patched on basis of recommendation by Check Point to prevent malware code injection
Malware study programme at California University
Students at the University of California have undertaken a programme of study led by Trusteer on computer malware
Parcel inspection system results in large narcotics haul in Asia
A large quantity of a controlled substance has been detected at an Asian airport cargo inspection area using a Gemini x-ray screening system
Multipurpose access cards improve security at art academy
An art academy in San Francisco has upgraded its access control system using an iCLASS SE platform from HID Global enabling single card issuing for multiple purposes
EAS tag market for retailers forecast in new report
The global market for electronic article surveillance (EAS) tags for the retail industry is revealed in a new report
Architecture for data centre security service delivery
The aCloud services architecture from A10 Networks provides data centre operators with new delivery model for application networking and security services
Insufficient staff training in IT security revealed
PhishMe survey demonstrates lack of awareness of phishing and general IT security threats amongst UK office staff
First | Prev  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com