Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Non-human identity management in process automation
Jonathan Lewis of SSH Communications Security discusses the role of Secure Shell for the authentication of non-human identities in M2M networks
Zero-day vulnerabilities discovered in US SCADA systems
Industrial control software from one supplier has come under scrutiny from security experts with 25 vulnerabilities which could compromise critical infrastructure systems
Virtual career fair for information security
Information Security professionals are being invited to take part in a virtual career fair to match skills against opportunities in the UK
Secure platform for IT security product integration
ForeScout responds to increased complexity in network security with the release of ControlFabric as a platform for integration and dynamic information sharing
Government classification certification for encryption product
Disk Protect data encryption product from Becrypt gains CESG certification for commercial products used in government applications
Channel partnership extends IT operational intelligence into the Benelux region
Benelux based SMT has joined ExtraHop as a channel partner bringing performance and security improvements to IT architectures
Report examines UK Home Office from ICT perspective
The Secure and Adaptable Borders: Organizational Profile of the Home Office provides information relevant to information technology companies working in the public sector
Tamper-proof jailbreak detection for mobile devices
Designed for mobile devices used in enterprise environments, new jailbreak detection software protects companies from fraud and data loss
Industry report reveals extent of latest spam outbreak
The end of the summer has seen a surge in levels of social media spam with the most prolific producers in Europe, according to a new AppRiver report
Advice on protecting company information for travelling workers
Iron Mountain has provided some advice for people who work while using public transport on how to protect sensitive information from commuter snoopers
Encryption specialist joins technology alliance partnership
The DESlock encryption company is the first partner to join ESET's recently formed technology alliance programme
ASIS success for IP surveillance supplier
IndigoVision has been celebrating a good show at the ASIS 2013 event with record numbers of visitors to its stand
Web protection service added to cloud
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
Outdoor bullet camera with full HD and IR illumination
Axis introduces a new bullet camera to its range of network cameras with optical zoom, IR illumination, full HD resolution and weather resistance
ANPR software for retrospective crime detection
CitySync Safety is helping police to convict criminals who use cars in their crimes by analysing licence plate recognition data and matching it to crime scenes
Secure PDF annotation for mobile users
A secure app for iOS mobile devices has been developed by Accellion for the secure annotation of PDF files
Web application security development risks
SANS course on web application security examines the risks of outsourcing development activities as new vulnerabilities can be introduced
Mapping enhancements feature on new PSIM version
VidSys PSIM takes dot release providing mobile app map support and address look-up to improve speed to respond to incidents
Your CMS is the path of least resistance for industrial hackers
Imperva's Director of Cyber Security, Barry Shteiman explains how content management systems and their plug-ins are an easy route to mischief for modern industrial hackers
District-wide school surveillance provides student protection
Widely deployed integrated school security system in district of Michigan based on open-platform XProtect video management system from Milestone
Adobe breach could compromise software code
Attackers have gained access to source code of Adobe products putting millions of users at risk of zero-day attacks
LPR analytics integrated into VMS
The Ocularis video management system is now compatible with the LPR licence plate recognition system from HTS
Taxi management system takes FortiGate network protection
FortiNet is protecting the taxi booking and payment system in use by a large taxi company operating in central London
Browser based access control in Scottish Air Condition facility
Sateon browser-based access control system with no client licence restrictions has been chosen by Mitsubishi Electric for its Livinston location
20 megapixel CMOS camera modules for surveillance
Stemmer Imaging is bringing to market the highest as yet resolution megapixel cameras for border security and persistent surveillance
Senior appointments at Milestone headquarters
Milestone Systems is expanding to accommodate growth with the recruitment of two people into senior positions at the company's headquarters
Integrated security platform protects science museum
San Francisco's Exploratorium interactive museum is using unified video management and access control technologies to provide high security at the facility
Pair fined over false ACS membership claims
Lidl security contractors convicted of making false Approved Contractor Scheme membership in order to gain lucrative security contract
Complex distributed network security
Peakflow SP network intelligence tool gains greater scalability for managing security on complex distributed IT networks
Combined network and endpoint protection on show
Gateprotect is travelling to Dubai to demonstrate its latest protective technology for both endpoints and the network
Companies collaborate on fraud prevention
Iovation and Equifax has got together on the development of a portfolio of products aimed at providing multi-layered fraud protection
Keyless access control keeps Australian college secure
A residential college in Sydney has chosen to move to a keyless electronic locking system to improve security for the 200 residents
Secure mobile payment system on show at Las Vegas event
Apriva is attending Money2020 in Las Vegas this year with its transaction handling application for mobile devices based on iOS and Android platforms
Modern door controllers protect historic London building
The chambers of a group of London barristers in a listed historic building are being protected with the installation of proximity readers and door controllers from Access Control Technology
Integrated access control and VMS hardware appliance
Rack-mountable appliance from Genetec provides built-in video management and access control functions for stand-alone businesses
Security intelligence collaboration for big data
Integration between CounterACT and Splunk Enterprise provides improved insight into threats and automatic control in big data environments
Investigation into Yahoo bug bounty program
Professional security researchers have been delving into the workability of Yahoo's bug bounty program for rewarding users who identify vulnerabilities and security exposures
Collaborative project initiated for improved IT security
The Community Open Data Initiative has been launched as a means of engaging security professionals in collaborating in the fight against cyber crime
Key management system supplier expands globally
Global expansion at asset and key management specialist Traka has included the appointment of 16 reseallers worldwide during 2013
Network video recorder for small installations
Wireless network video recorder supports up to four cameras for cheap surveillance installations for home or very small businesses
Two-thirds of e-mail traffic unsolicited
Spam dominated e-mail traffic during August with no easing of phishing mails during the holiday season
Supply chain attacking APT discovered
Kaspersky Lab provides details of the Icefog advanced persistent threat (APT) aimed at disrupting Western supply chains
Low false-alarm rate video analytics for home security
Sighthound enables home owners to monitor video footage remotely and receive alerts to their mobile devices based on intelligent analytics
IP surveillance for retail loss prevent and productivity improvements
Mirasys is now offering the retail industry productivity benefits through people counting in addition to retail loss prevention in one IP video system
Cloud service security certification launched
BSI and the Cloud Security Alliance release certification program for assessing the security of cloud service providers
VMS supports latest Axis access control system
The recently announced Axis network door controller is now supported within the Ocularis video management system from OnSSI
Fingerprint identification terminals for access control
Mass enrollment grade MorphoAccess Sigma fingerprint identification terminals can be used for applications such as access control or one to one authentication
Card encoding system for instant issue
The iClass SE Encoder from HID Global has been introduce as a toolkit to allow higher security encoding and issuing of access control cards and badges
Network door controller complements surveillance products
Axis has created a network door controller as the company expands from its roots in surveillance systems to encompass access control
OS root kit detector available for Mac OSX
Security tool from ESET available for Apple Mac users which detects malicious software that tries to infect the operating system
First | Prev  | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012