Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Advice on protecting company information for travelling workers
Iron Mountain has provided some advice for people who work while using public transport on how to protect sensitive information from commuter snoopers
Encryption specialist joins technology alliance partnership
The DESlock encryption company is the first partner to join ESET's recently formed technology alliance programme
ASIS success for IP surveillance supplier
IndigoVision has been celebrating a good show at the ASIS 2013 event with record numbers of visitors to its stand
Web protection service added to cloud
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
Outdoor bullet camera with full HD and IR illumination
Axis introduces a new bullet camera to its range of network cameras with optical zoom, IR illumination, full HD resolution and weather resistance
ANPR software for retrospective crime detection
CitySync Safety is helping police to convict criminals who use cars in their crimes by analysing licence plate recognition data and matching it to crime scenes
Secure PDF annotation for mobile users
A secure app for iOS mobile devices has been developed by Accellion for the secure annotation of PDF files
Web application security development risks
SANS course on web application security examines the risks of outsourcing development activities as new vulnerabilities can be introduced
Mapping enhancements feature on new PSIM version
VidSys PSIM takes dot release providing mobile app map support and address look-up to improve speed to respond to incidents
Your CMS is the path of least resistance for industrial hackers
Imperva's Director of Cyber Security, Barry Shteiman explains how content management systems and their plug-ins are an easy route to mischief for modern industrial hackers
District-wide school surveillance provides student protection
Widely deployed integrated school security system in district of Michigan based on open-platform XProtect video management system from Milestone
Adobe breach could compromise software code
Attackers have gained access to source code of Adobe products putting millions of users at risk of zero-day attacks
LPR analytics integrated into VMS
The Ocularis video management system is now compatible with the LPR licence plate recognition system from HTS
Taxi management system takes FortiGate network protection
FortiNet is protecting the taxi booking and payment system in use by a large taxi company operating in central London
Browser based access control in Scottish Air Condition facility
Sateon browser-based access control system with no client licence restrictions has been chosen by Mitsubishi Electric for its Livinston location
20 megapixel CMOS camera modules for surveillance
Stemmer Imaging is bringing to market the highest as yet resolution megapixel cameras for border security and persistent surveillance
Senior appointments at Milestone headquarters
Milestone Systems is expanding to accommodate growth with the recruitment of two people into senior positions at the company's headquarters
Integrated security platform protects science museum
San Francisco's Exploratorium interactive museum is using unified video management and access control technologies to provide high security at the facility
Pair fined over false ACS membership claims
Lidl security contractors convicted of making false Approved Contractor Scheme membership in order to gain lucrative security contract
Complex distributed network security
Peakflow SP network intelligence tool gains greater scalability for managing security on complex distributed IT networks
Combined network and endpoint protection on show
Gateprotect is travelling to Dubai to demonstrate its latest protective technology for both endpoints and the network
Companies collaborate on fraud prevention
Iovation and Equifax has got together on the development of a portfolio of products aimed at providing multi-layered fraud protection
Keyless access control keeps Australian college secure
A residential college in Sydney has chosen to move to a keyless electronic locking system to improve security for the 200 residents
Secure mobile payment system on show at Las Vegas event
Apriva is attending Money2020 in Las Vegas this year with its transaction handling application for mobile devices based on iOS and Android platforms
Modern door controllers protect historic London building
The chambers of a group of London barristers in a listed historic building are being protected with the installation of proximity readers and door controllers from Access Control Technology
Integrated access control and VMS hardware appliance
Rack-mountable appliance from Genetec provides built-in video management and access control functions for stand-alone businesses
Security intelligence collaboration for big data
Integration between CounterACT and Splunk Enterprise provides improved insight into threats and automatic control in big data environments
Investigation into Yahoo bug bounty program
Professional security researchers have been delving into the workability of Yahoo's bug bounty program for rewarding users who identify vulnerabilities and security exposures
Collaborative project initiated for improved IT security
The Community Open Data Initiative has been launched as a means of engaging security professionals in collaborating in the fight against cyber crime
Key management system supplier expands globally
Global expansion at asset and key management specialist Traka has included the appointment of 16 reseallers worldwide during 2013
Network video recorder for small installations
Wireless network video recorder supports up to four cameras for cheap surveillance installations for home or very small businesses
Two-thirds of e-mail traffic unsolicited
Spam dominated e-mail traffic during August with no easing of phishing mails during the holiday season
Supply chain attacking APT discovered
Kaspersky Lab provides details of the Icefog advanced persistent threat (APT) aimed at disrupting Western supply chains
Low false-alarm rate video analytics for home security
Sighthound enables home owners to monitor video footage remotely and receive alerts to their mobile devices based on intelligent analytics
IP surveillance for retail loss prevent and productivity improvements
Mirasys is now offering the retail industry productivity benefits through people counting in addition to retail loss prevention in one IP video system
Cloud service security certification launched
BSI and the Cloud Security Alliance release certification program for assessing the security of cloud service providers
VMS supports latest Axis access control system
The recently announced Axis network door controller is now supported within the Ocularis video management system from OnSSI
Fingerprint identification terminals for access control
Mass enrollment grade MorphoAccess Sigma fingerprint identification terminals can be used for applications such as access control or one to one authentication
Card encoding system for instant issue
The iClass SE Encoder from HID Global has been introduce as a toolkit to allow higher security encoding and issuing of access control cards and badges
Network door controller complements surveillance products
Axis has created a network door controller as the company expands from its roots in surveillance systems to encompass access control
OS root kit detector available for Mac OSX
Security tool from ESET available for Apple Mac users which detects malicious software that tries to infect the operating system
Balancing staff acquisition with IT security requirements
Raj Samani of McAfee explains the steps needed to secure information assets in small businesses from insider threats when recruiting new staff
Camera view modelling available in design software
3D camera models for the Axis range of surveillance equipment are available for Autodesk computer aided design users to plan buildings and CCTV installations for effective coverage without blind spots
Dome camera withstands extreme weather
A 2 megapixel vandal proof dome camera from Samsung Techwin is now available with the ability to resist extreme weather conditions
Annual locksmiths event an industry success
The Master Locksmits Association is celebrating a successful event this year with record supplier attendees at the MLA Expo held this year in Telford
Hardware features in latest bank hacking attempt
Kaspersky Lab comments on the use of a combination of hardware and software to gain access to customer records at Barclays bank
Multi-device internet security protection
With the discovery that data is more valuable than devices to IT consumers, Kaspersky Lab is now offering multi-device internet security protection
Is biometric authentication reliable enough for payment security?
Andy Kemshall of SecurEnvoy examines the trend towards the use of biometrics for consumer authentication and explains how it isn't yet mature enough to cope with the high reliability needs of the payment industry
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
Work begins on industrial network security certification
Certification body GIAC is working with industrial representatives to develop a cyber security certification program for industrial networking security
First | Prev  | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com