Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
Work begins on industrial network security certification
Certification body GIAC is working with industrial representatives to develop a cyber security certification program for industrial networking security
Compact network cameras with on-board analytics
A new series of HD network surveillance cameras is available from Canon Europe with low profiles, ONVIF compliance and built-in video analytics capability
Video intelligence for protecting critical infrastructure
Verint Systems explains how combining video intelligence from Physical Security Information Management (PSIM) software with video surveillance data can be crucial in the protection of critical infrastructure
Time to resolve security attacks of significant concern
Survey from forensics specialist Guidance Software shows that a third of IT security professionals believe the time to resolve attacks to be the number one concern
Best practice guidelines for public sector cyber security
A report is being released on operating securely in the digital world, offering best practice guidelines for mitigating IT risks in the UK public sector
Home of code-breaking to be venue for cyber battle
The SANS netwars round of the Cyber Security Challenge will take place this weekend at Bletchley Park where security experts will engage each other for cyber protection glory
IP cameras featuring embedded video management
A new range of IQeye cameras from IQinVision will be released featuring embedded video management software from Milestone Systems for cost effectiveness and easy set-up
XProtect product line goes to new versions
Milestone Systems has released the latest versions of its XProtect range of open platform video management systems for all sizes of networks
Easy installation tool for small numbers of cameras
Camera Companion from Axis provides one-click configuration for small surveillance networks with less than sixteen cameras
VMS version designed for ease of mobility
OnSSI has released the Ocularis LS video management system supporting edge recording for improved integration of mobile camera systems
Web safety needs training as well as technology
Bill Walker of QA comments on the recent MP porn scandal and discusses the need for appropriate training in web safety as well as the technology of web filtering
Lone worker alarm receiving centre gains secured by design award
The Skyguard alarm receiving centre for handling lone and vulnerable worker alarms has been accredited "Secured by Design" by the ACPO
NVR appliances with pre-installed VMS
The Husky series of Network video recorders is a new range of NVR appliances with Milestone's Video Management System pre-installed for ready-for-use recording and video management capabilities
Cyber espionage campaign attacks South Korea
Companies in the Republic of Korea are under attack from cyber criminals according to research and analysis conducted by Kaspersky Lab
Privileged access compliance at Bouygues Telecom
French telecommunications provider is protecting itself and its customer data with the management of privileged access credentials.
Rugged network adapters for remote recording over IP
The Nexxis series of rugged network adapters from Barco meet US military standards for robust remote IP network connectivity for recording or monitoring
Certification available for open platform VMS integration
Connex international is now providing testing services for certification of interoperability with Milestone's open platform video management system
Top priorities in digital forensics to be discussed at Prague Summit
Two-day digital forensics summit taking place in Prague to discuss the latest forensics technology including cloud and mobile device investigations
Low cost fixed dome camera with intelligent video analytics
The WiseNetIII high definition fixed lens IR dome camera from Samsung Techwin with ONVIF compliance and intelligent video analytics is designed for low cost surveillance projects
Hardened Android tablet computer with additional security
Getac and Becrypt are presenting a rugged Android tablet at DSEI 2013 with additional security suitable for government and defence markets
PHP application exploits affect internet general well-being
Report from Imperva investigates the use of PHP SuperGlobal parameters by hackers and how they are affecting the integrity of the internet
SMS with malicious link spreads Android trojan
Kaspersky has been tracking the Obad.a Trojan for Android devices discovering novel and effective distribution method
Integrated high security protection for data centre
Major Birmingham-based data centre takes best-of-breed integrated security with PSIM, biometric access control and perimeter security from Security Systems Technology
Heperbot trojan targets online banking users
Advanced Trojan focuses on online banking users in European and Asian countries supported by credible looking e-mail phishing campaigns
Small organizations just as vulnerable as corporates
Check Point discusses the significance of company size relating to the need for strong IT security and concludes that smaller companies are just as vulnerable
Biometric identity system donation to US Navy
Cross Match has donated equipment and software to a naval school in the USA including fingerprint and iris scanning technology for education in computer engineering
Multiple site surveillance over wide area network
IndigoVision has supplied multi-site surveillance networking over IP for a Latin American company in the transport manufacturing sector
Multi-device internet security brings safer social networking
Kaspersky Internet Security now covers multiple devices including mobiles to mitigate the risk associated with multiple access on social networking sites
Online training for Napco dealer network
Napco is supporting its dealership network with online and field based training in residential technologies and commercial systems
API Server for improved governance
API management and SOA governance integrated in the latest version of Axway API Server for data flow management
Browser based access control system
Sateon has been released by Grosvenor Technology to provide browser based access control with simplicity of use and deployment
A fifth of website visitors suffer password amnesia
Complex web forms and too many password based log-in processes are frustrating consumers according to research from Ping Identity
Core skills training in information security in Dubai
SANS Institute has organised a Gulf region even in late october to provide local information security professionals with the opportunity to obtain high quality training in core skills
Commercial IT security policies underfunded
Members of the IT profession have indicated their belief that neither enough time nor money is available for the development of robust IT security policies in their companies
Low confidence levels shown in Digital Reform Agenda
UK Government security-by-default approach gains little enthusiasm with more consideration needed to be given to cyber-security as part of the digital reforms
Hybrid analogue and IP surveillance network benefits
Samsung Techwin provides insight into the benefits to be gained from using IP surveillance cameras with analogue outputs on hybrid camera networks
Unified Threat Management for Windows Azure
WatchGuard releases Unified Threat Management for use with cloud computing based on the Windows Azure platform
Tenable security apps for advanced threat identification
SecurityCenter 4.7 from Tenable Network Security now includes a catalogue of the company's apps available for advanced threat identification
ICO views on encryption paint incomplete picture
Voltage security comments on ICO encryption analysis which the company believes to be incomplete
EU companies fear reputation damage with security breach revelations
A survey conducted among EU companies reveals attitudes towards IT security breach revelation with 2% willing to make such breaches public, fearing damage to brand or reputation
Mature cloud security contributing to market growth
Zscaler comments on the forecast growth in the platform-as-a-service market with respect to improvements in cloud security and policy enforcement practices
Video synopsis technology improves search efficiency
Investigation of video surveillance material is made easier and more efficient with synopsis technology for correlating events and reviewing large quantities of information
Secure BYOD for universities
Forescout is preparing educational institutions for the new academic year by providing flexible network access control that facilitates a secure BYOD environment
Advice on preventing internal cyber attacks
SecureWorks is providing advice on the prevention of cyber attacks originating from hacktivists and disgruntled employees
Physical access control added to ONVIF profile concept
Open video surveillance networking standard now includes physical access control systems on its latest profile
Cloud backup with longer retention
Barracuda Backup now features extended cloud storage and longer retention periods without the need for dedicated local appliance
Distribution centre gains productivity benefits from surveillance
IP video surveillance system from Samsung Techwin provides both security and productivity improvements in a midlands based distribution and sorting centre for delivery company APC Overnight
DRM protection for Korean chip manufacturer
Inside Secure is protecting the intellectual property of Telechips of Korea with DRM Fusion Agent solution for digital rights management
US launch pays dividends for IndigoVision
After launching in the US last year, IndigoVision has made headway into the market for surveillance systems and the company's Control Center video management system
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com