Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Study shows cyberbullying risk for young teenagers
14-15 year old's online behaviour is putting them at increased risk of cyber-bullying, according to a study carried out for Safer Internet Day
Wiki site vulnerability discovered
Remote code execution discovery on Wiki platform patched on basis of recommendation by Check Point to prevent malware code injection
Malware study programme at California University
Students at the University of California have undertaken a programme of study led by Trusteer on computer malware
Parcel inspection system results in large narcotics haul in Asia
A large quantity of a controlled substance has been detected at an Asian airport cargo inspection area using a Gemini x-ray screening system
Multipurpose access cards improve security at art academy
An art academy in San Francisco has upgraded its access control system using an iCLASS SE platform from HID Global enabling single card issuing for multiple purposes
EAS tag market for retailers forecast in new report
The global market for electronic article surveillance (EAS) tags for the retail industry is revealed in a new report
Architecture for data centre security service delivery
The aCloud services architecture from A10 Networks provides data centre operators with new delivery model for application networking and security services
Insufficient staff training in IT security revealed
PhishMe survey demonstrates lack of awareness of phishing and general IT security threats amongst UK office staff
Surveillance as a service for analogue CCTV systems
A new Video Surveillance as a Service offering provides digital surveillance networking and video management for analogue CCTV systems
Report examines the growth in ANPR for traffic management and other applications
Automatic Number Plate Recognition (ANPR) for a number of applications including enforcement, traffic management and access control, to be examined in new market report
Smart card market research report
Demand for tamperproof payment systems driving the market to 2016 for contactless smart cards
Gartner accolade consolidates ForeScout position as NAC leader
Pervasive network security system provider recognised for industry leadership in Gartner report for third consecutive year.
Study shows trends in types of spam in last three years
Kaspersky Lab research has shown commercial spam has reduced in the last three years to be replaced by more malicious e-mail contents
Security company employees celebrate active year in charity
Employees at Axis Security have been actively involved in charity fundraising during the last twelve months
Data loss prevention with real time database monitoring
Behavioural analysis of database transactions and real-time monitoring help in avoiding data breaches in the retail and other industries
Perimeter Security market research report
Market expectations revealed to 2018 for perimeter security systems including intruder detection and alarm notification
Market forecast for cloud security software
Report examines the outlook for market development to 2016 for cloud computing security software
Guard tour system helps protect national archives of Egypt
Key control and guard tour system increases effectiveness of security operations at the Egyption National Library and Archives
IP security technology protects ancient cathedral in Milan
Milan Cathedral has installed a 24-hour video surveillance system for the protection of its perimeter and rooftop terraces
Security gateway module for data centres
High performance protection available with the latest blade module from Check Point for high speed networks and data centres
LTE mobile backhaul security
Security solution for mobile network operators provides encryption and firewalling for mobile data traffic
Phishing attack targets broad spectrum of victims
Barracuda Networks IT security experts comments on EE broadband security flaw and the ongoing consequences for the victims of phishing attacks
Forecast and analysis of fraud detection and prevention systems
The market for the next four years in fraud detection and prevention systems is examined in a new research report available from Research and Markets
ACPO Secured by Design award for access control products
The ACPO has awarded Videx the Secured by Design accreditation for its door entry and access control products
Spending forecast profile for IT security market
New report examines spending patterns and trends for the next two years as well as the opportunities presented by the IT security market
Licence agreement reached on RFID patent
Retailers can now deploy RFID based inventory intelligence products based on Round Rock patents due to new licence agreement
Evolution phases of network security management
The three phases of the evolution of network security manageability tools are detailed in a new report from Research and Markets
BYOD security market expectations to 2018
Report examines the security market for Bring-Your-Own-Device (BYOD) technology from 2014 to 2018
South East Asian and Australian biometric market forecast report
A new report examines the growth in the market for biometric technologies including face, fingerprint and iris recognition in the regions of South East Asia, Australia and New Zealand to 2018
Secutech event to be held in Taiwan in March
The Taipei Nangang Exhibition Centre will be the venue in March for the Secutech security technology exhibition in Taiwan
PSIM software on show in Middle East
CNL Software is attending the Intersec show in Dubai this year to demonstrate the company's Physical Security Information Management (PSIM) platform to regional organizations
Intrusion prevention accolade for next generation firewall
The SuperMassive E10800 next generation firewall from SonicWall gains favourable rating in NSS labs intrusion prevention testing
Anonymous proxies continue to be a major concern in education sector
The use of anonymous proxies to bypass web filtering software is a concern for over two-thirds of educational establishments in the UK
5 megapixel dome cameras with IR illumination
Infrared illumination, 5 megapixel high resolution imaging and on-camera storage feature on the Alliance-mx Dome Cameras from IQinVision
Canada to secure borders with X-Ray cargo screening
High energy X-ray scanners from Smiths Detection will be supplied to Canada to assist in the securing of the country's land border
Attack risks of industrial control systems
Thales comments on the SCADA system flaws and the effect on the security of critical national infrastructure
Threat protection form network wide DDoS attacks
The Thunder Threat Protection System from A10 Networks has been designed for higher performance mitigation of network-wide Distributed Denial-of-Service (DDoS) attacks
64-bit recording improves VMS performance
The Ocularis video management system from OnSSI gains performance benefits with 64-bit recording capability
Security of industrial control systems
A forecast has been provided until 2018 of the international market of industrial control system security
Forensic toolkit provides powerful evidence discovery
Native investigative capabilities added to AccessData's Forensic Toolkit for MS volume Shadow Copy and Geolocation technologies
Market report on multi-factor authentication
Research report examines the market for the next two years on multi-factor authentication internationally
Market report examines PSIM market to 2020
The market for situation awareness systems (or PSIM) globally is examined out to 2020 in a new report from Research and Markets
Report on international forensic technology market
Market research report examines technology for the identificaton, analysis and evaluation of physical evidence forensically
New board member joins ForeScout
Experienced IT security industry leader joins ForeScout board of directors from Symantec
PSIM supplier provides demonstration at Intersec
Physical Security Information Management system specialist VidSys is attending the Intersec Expo event this month in Dubai with PSIM demonstration
The dangers of the commute for sensitive data
Iron Mountain's head of Information Risk, Christian Toon, discusses the vulnerability of sensitive company data during the daily commute of company employees
Connected UTM platform expands enterprise protection
New products have been added to the Connected UTM platform for the extension of network security across distributed environments
Market report on airport and marine port security
A range of security technologies used within Marine Ports and airports are examined in a new report from Research and Markets
Market analysis for deep packet inspection products
Report from Research and Markets examines the International Deep Packet Inspection market to 2018
High growth seen in mobile messaging security
Infonetics examines the growth in security for SMS and MMS security on mobile devices as popularity continues to increase
First | Prev  | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com