Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Data recovery from Apple logical failures
Kroll Ontrack has developed a means of recovering lost data from Apple mobile devices after they have suffered a logical failure
Video analytics integrated in Samsung camera range
WiseNetIII network cameras from Samsung Techwin will now be available with the savVI video analytics software from Agent Vi embedded
10% of finance workers try to circumvent security
IS Decisions reveals the extent of insider threats in the finance industry with large numbers of employees admitting to deliberate insecure practices
British Standard certification for alarm receiving centre
The Community Safety Glasgow alarm receiving centre has been accredited to BS8484 for lone worker protection alarm monitoring
Research investigates future of port security
Market research suggests 10% CAGR for the market for port security management worldwide during the next four years
Biometric supplier acquires French secure authentication company
Secure identification software supplier Dictao has been acquired by biometric supplier Morpho in bid to expand market opportunities for complementary products
Unified surveillance system protects University of West Scotland
The multiple campuses at the large University of West Scotland are being protected with a unified IP surveillance system based on the Milestone XProtect video management system operating Axis cameras
Industrial control system security skills imbalance needs addressing
SCADA and industrial control system security expert comments on the lack of integrated engineering and cyber security expertise needed to overcome threat to critical infrastructure
Door hardware chosen to fit in with architectural style
A school in Essex has taken transom closers and door handles from Alpro for providing the required door operating characteristics while meeting the school's architectural style requirements
Trojan delivery exploits Ukrainian political situation
Hackers are using spam exploiting anti-western feelings in Russia to deliver malicious code for further spreading malware
Iranian dairy upgrades to IP surveillance
A 100-year-old dairy in northern Iran protects its capital assets and operations with an IP video surveillance system from Vivotek
Home entertainment system vulnerabilities
Experiment at Kaspersky Lab reveals the extent to which home entertainment systems lack security features exposing their users to unnecessary vulnerabilities
Integrated security management platform for access and surveillance
Combining the EntraPass access control system and exacqVision VMS, the Intevo integrated security platform provides unified access control, alarm and surveillance functions
Notting Hill Community workers protected with personal alarms
Four hundred workers at Notting Hill Housing Group in London have been issued with Guardian24 lone worker protection systems when operating outside the office
Automatic logging on exposes users to high cyber risk
Research from Intercede shows the extent to which users are automatically logging on to e-mail and social network sites or sharing passwords with other people
Survey illustrates risks to social network users
Complacency towards personal security is still widespread amongst social network users according to results of a new survey
On-Camera video content analysis package
Vivotek introduces video content analysis on its cameras comprising object counting, field detection and line crossing analysis
Advice on entering export markets
TDSi Managing Director provides advice to UK security companies on how to expand into making export sales
Online distance learning course for ONVIF
Training specialists at Tavcom have released a new version of the ONVIF distance learning training course which is available online
Cellular remote management assists hospital robot maintenance
Opengear has supplied remote management gateways to a supplier of medical robotic technology for remote maintenance and control using the cellular network
Surveillance supplier introduces PoE range
Power-over-Ethernet (PoE) products now form part of the surveillance range available from IP video supplier VIVOTEK
Manufacturing IP loss running at a fifth
Global business management survey by Kaspersky Lab puts level of manufacturers suffering intellectual property losses through malware and other causes at over 20%
Modern medical centre gains latest technology access control
SMARTair wireless access control is being used at a new medical centre that has been built as part of a historic foundry development in Stourbridge
Analogue DVR use on cloud or IP networks
An appliance from mobiDEOS enables legacy DVR equipment to be used in a hybrid surveillance environment across IP and cloud networks
Major airport extends incident management to field operations
Project developed by NICE Systems and AECOM provides Los Angeles International Airport with improved field collaboration and coordination for incident management
Risk assessment software helps investigate compromised user credentials
As one of the most common attack methods, compromising user credentials can be simulated, detected and investigated as part of the Metasploit Pro security product from Rapid7
Study examines the threat of rogue ex-employees
Continued access to critical data by former employees is the theme of a report issued by Intermedia on insider threat protection
BCS to hold seminar on data breach and incident management
Seminar will provide attendees with information on how to manage data breaches and incidents to stay in line with new EU data protection regulations
Electronic handle systems improve access control at residential development
Stylish apartments in Barnstaple have had Smartair electronic handle sets fitted to provide flexible and secure access control to the residential premises
Video surveillance organisation to enforce standard compliance claims
ONVIF will be protecting its brand by investigating claims by video surveillance suppliers that their products are compliant to the open standard
Bremer Bank improves user security and satisfaction with CounterACT
Real time network visibility and access control integrated with SIEM solution provides Bremer Financial Corporation with enhanced security with improved user experience
Security implementation and testing poor for web apps
SANS Institute instructor comments on the growth of web apps and their associated vulnerability made worse by poor preparation and security testing
Online security top of the list for retail buyers
Survey of retail consumers shows that improved online security tops the list of requirements for customer satisfaction
Secure USB devices with BadUSB protection
The IronKey range of secure USB devices from Imation isn't vulnerable to the BadUSB malware designed to attack the device itself
Leadership changes at PSIM supplier
ISM has appointed a new Managing Director as the PSIM supplier enters a new phase of growth both in the UK and abroad
Central management console for security appliances
Cyberoam Central Console provides enterprises with the ability to manage double the number of security appliances
Diverse security products from Siemens on show at Essen
The Security Essen show in September will feature access control, alarm and video surveillance products from Siemens
Consumers fear security of mobile banking apps
Survey from Intercede reveals extent of consumer concern over the security aspects of using mobile apps for online banking
Finnish hospital uses Video Management Software for innovative care programme
Milestone XProtect Professional is being used for an innovative parent-child training and support programme in a hospital in Finland
A change of approach is needed in advanced threat protection
Sourcefire's Sean Newman comments on advanced threat detection and the need for organizations to move away from traditional protection methods
Software for meeting regulatory requirements on money laundering
The NetReveal Anti-Money Laundering software from BAE Systems Applied Intelligence provides organizations with a means of keeping up with increasingly rigorous regulatory requirements
Partnership reduces mean time to threat mitigation
ForeScout and ThreatStream have agreed on a partnership to combine threat information and network security intelligence on one platform based on ControlFabric architecture
Organizational weak links contribute to increasingly dynamic threat landscape
Cisco's security report for the first half of 2014 shows trends in the threat landscape with more exploits targeting known weaknesses and legacy applications
Industrial control system security summit to be held in Amsterdam
The agenda has been set for the 2014 European ICS security summit which is taking place for control system engineers and IT security professionals in Amsterdam this September
Identity management combined with trusted device technology
Application deployment on mobile devices eased with the blending of identity management from Intercede with trusted device technology from Trustronic
Digital forensics and incident response courses for Europe
SANS Digital adds extended training courses in digital forensics and incident response for October to take place in Prague
Surveillance supplier goes into PSIM partnership
Mobotix has entered into a technology partnership with Physical Security Information Management supplier, iComply
Technology partners take part in BlackHat interoperability testing
Six technology partners of ForeScout are attending BlackHat USA event this week to demonstrate interoperability based on ControlFabric
Introductory full-function Physical Security Information Management
Companies on restricted budgets are still able to access PSIM functionality with the introduction of Surveillint Essentials from Tyco's Proximex
Fingerprint and palmprint identification on show at identification conference
3M Cogent is attending the International Association of Identification conference in Minneapolis later this month with its automated fingerprint and palmprint identification system
First | Prev  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo