Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Protection service for securing IT servers
Physical, virtual and cloud-based servers can now be secured using the server protection services available from Dell Secureworks
Fingerprint biometrics assists in vaccination management in Africa
Multispectral imaging based fingerprint sensors are being used in the African Healthcare industry to track patients who have been vaccinated
Shared development and logistics fuelling cyber arms race
A supply chain analysis report from FireEye reveals the common development and logistics structure used in delivering malware
Survey shows greater need for network management automation
Increasing network complexity with IPv6, cloud computing and virtualization is driving greater needs amongst IT professionals for more automation of network management
Phishing e-mails treble during last quarter
Kaspersky Lab report reveals the increased levels of malicious spam and phishing attempts during last three months despite overall reduction in spam levels
Online retail security best practice
Dave Anderson of Voltage Security explains best practices for online retailers to ensure high levels of security
Proactive security challenge awards high rating to internet security suite
With a protection level score of 97 percent, Comodo's Internet Security Premium software gained the top rating in desktop user security challenge
Architecturally sympathetic concealed transom closers used in leisure development
Brewery Square in Dorchester has opted for hydraulic operation of aluminium doors with concealed overhead transom closers to retain the aesthetics of the period architecture
Major UK bridge crossing gains hierarchical access control
Critical road infrastructure connecting England and Wales protected with access control system enabling access rights based on zone, user and time of day
US police equip tracker dogs with GPS and surveillance
Police in San Diego are fighting crime with the help of two tracker dogs that have been equipped with tracking vests with GPS and surveillance technology donated by USS
Protecting identity when working remotely
SecurEnvoy's Steve Watts explains the variants of two-factor authentication and how companies can prevent their data from being accessed
Extended distributed video management system
XProtect Corporate video management system from Milestone Systems gains wider interconnection capabilities for large distributed security installations
Locking mechanism for hotel safes
Mul-T-Lock and Bloxsafe are featuring hotel room safes as part of the Transport Security Expo with anti-tampering features and high performance cam locks
Video management system for high traffic retail environments
The VideoEdge video management system from American Dynamics has been designed with analytics for theft prevention in high traffic retail enterprises
Europe discusses improved safety
Euralarm has hosted a discussion with European Committee members on ensuring a safer Europe for citizens and businesses
Proportion of global phishing targets UK bank
Financial organisations in the UK are being targetted in phishing attempts from all over the world with 0.5% of global spam seeking to defraud the UK
Surveillance server available with built-in VMS
The Ocularis video management system from OnSSI is being provided as part of the ION Series of video surveillance servers
Retail industry not fully prepared for PCI DSS 3.0
Study shows large sections of the retail industry on both sides of the Atlantic aren't yet ready for the latest version of the security standards for the Payment Card Industry
Study on hospital security brings award for researcher
The Security Institute's Wilf Knight award has been presented to Adam Jones for his study into the effectiveness of a pro-security culture in reducing violence in hospital accident and emergency departments
Door access control for up to 4000 users
Access Solo door access control system comprising door controller and proximity readers can support 4000 users for up to 128 doors with easy set up
NCT Food Supply Chain Security, Brussels, 2013 - post event news
The first edition of the Non-Conventional Threat Food Supply Chain Security – A European Forum (23-24 October 2013) was a well-founded opportunity for members of the Food Supply Chain Community to gather and address the main concerns of our modern day food supply chain.
US president webpage attacked by SEA
Tripwire comments on the recent compromise by the Syrian Electronic Army on President Obama's web site
Restorative justice scheme launches in Woking
Axis Security is working with Surrey retailers on a restorative justice scheme aimed at deterring young offenders from further retail crime
College network deploys Unified Threat Management
WatchGuard has supplied Leeds City College with Unified Threat Management technology to protect its city-wide network
BYOD security for SAP mobile device management
SAP is improving mobile device management platform Afaria with the integration of CounterACT from ForeScout
PHP website compromised
Websense comments on the infection of the site which sets out to redirect users to Magnitude Exploit Kit
Cryptographic middleware for embedded systems
Plug and play software from Inside Secure provides cryptographic middleware for microcontrollers
Web security appliance with Hyper-V and IPV6 support
Latest operating system for WatchGuard XCS appliance provides e-mail and web security with support for Microsoft Hyper-V and IPV6
Cyber battle lab to assist in critical infrastructure protection
Thales is launching a UK integration and innovation centre for modelling, developing and testing cyber defences against attacks on national critical infrastructure
Integrated access control to secure new Glasgow hospital
Large new hospital project in Glasgow to be secured with AC2000 access control and integrated security management system from CEM Systems
Connected security concept addresses major threat challenges
A portfolio of products being offered by Dell is designed to address the major challenges of IT security including BYOD, cloud computing and network security
IFSEC 2014 gains vendor support
Venue stress for IFSEC International UK event gains some relief with pledges of support for 2014 event at Excel London from a number of key security suppliers
The Last Rites of Traditional IT Security
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threats for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date
Study shows office workers are losing the skill of managing paperwork
With few companies having achieved paperless offices, information security is nonetheless lacking when it comes to managing confidential paperwork, according to Iron Mountain
Advanced motion search features on Video Management System
The Control Center Eagle video management system from IndigoVision features a new user interface and motion search technology
New VMS release increases camera support
The latest version of Wavestore's video management system supports up to 128 IP cameras and 64 analogue devices
Back up and restore scalability matches data growth
Backup appliances can be configured in a grid to meet the challenges of rapid data growth with speeds of up to 43 terrabytes an hour
Half of younger employees willing to break company BYOD policies
Fortinet reveals attitudes of Gen-Y employees towards Bring-Your-Own-Device (BYOD) policy restrictions with up to a half of them willing to contravene company rules
Standard accreditation for certification body
The SSAIB has gained accreditation for Occupational Health and Safety Management as well as Environmental Management System standards
Security consultant gains surveillance accreditation
CornerStone consultant the first to gain Axis Certified Professional status after reaching required standard in IP video expertise
UK security company extends reach into South East Asia
TDSi is using UK Trade and Investment to assist in extending the reach of its security technology into Africa and the South East Asian markets
Non-human identity management in process automation
Jonathan Lewis of SSH Communications Security discusses the role of Secure Shell for the authentication of non-human identities in M2M networks
Zero-day vulnerabilities discovered in US SCADA systems
Industrial control software from one supplier has come under scrutiny from security experts with 25 vulnerabilities which could compromise critical infrastructure systems
Virtual career fair for information security
Information Security professionals are being invited to take part in a virtual career fair to match skills against opportunities in the UK
Secure platform for IT security product integration
ForeScout responds to increased complexity in network security with the release of ControlFabric as a platform for integration and dynamic information sharing
Government classification certification for encryption product
Disk Protect data encryption product from Becrypt gains CESG certification for commercial products used in government applications
Channel partnership extends IT operational intelligence into the Benelux region
Benelux based SMT has joined ExtraHop as a channel partner bringing performance and security improvements to IT architectures
Report examines UK Home Office from ICT perspective
The Secure and Adaptable Borders: Organizational Profile of the Home Office provides information relevant to information technology companies working in the public sector
Tamper-proof jailbreak detection for mobile devices
Designed for mobile devices used in enterprise environments, new jailbreak detection software protects companies from fraud and data loss
Industry report reveals extent of latest spam outbreak
The end of the summer has seen a surge in levels of social media spam with the most prolific producers in Europe, according to a new AppRiver report
First | Prev  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012