Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Identity and access management market research report
The global market for identity and access management systems out to 2018 is examined in detail in new report
Security implications of payment privacy protection
New research report examines payment fraud and the latest trends in Europe for the protection of payment privacy
E-mail content security market research report
Global market research report examines internet and e-mail content security opportunities
Five priorities for combating digital crime in 2014
BAE Systems Detica provides its thoughts on the top five priorities needed in order to fight digital crime in the coming year
Middle East region to benefit from skills for security courses
The BSIA announces Skills for Security courses in partnership for delivering security training in the Middle East region
Waterway management and monitoring on VMS platform
The Jefferson County Waterway in the USA has standardized on the Milestone XProtect platform for vessel monitoring and surveillance
Critical infrastructure protection in the Middle East
The protection of the Middle East's critical infrastructure out to 2018 is the subject fo a market research report covering both physical and IT security
Market forecast for global e-passport market
Report from Research and Markets examines the trends in market development for e-passports internationally
European E-Identity event schedule for 2014
Schedule of interest group meetings and conferences to take place during 2014 on digital trust, identity management and cyber security published
Data protection expert becomes Ponemon Fellow
Research team head at Lancope becomes a Distinguished Fellow at the Ponemon Institute for his work on the discovery of security vulnerabilities
UK Border Force security screening contract win
The UK's Totalpost Services will supply X-Ray security screening equipment to the Home Office and UK Border Force for the next four years under a new contract
Report available on Automatic Number Plate Recognition System market
Research and Markets has released a report covering the Automatic Number Plate Recognition (ANPR) market globally
Web performance and control optimisation
Web experience solutions technology ups the ante for intelligently maximizing site and application performance
IT threat trend predictions for 2014
ESET looks into the coming year and sets its predictions on how the challenges of IT security protection will be changing
Network security firewall partnership extended
Check Point will provide front line support in the distribution of the X-Series platform for network security firewall markets in agreement with Blue Coat
Cloud and data centre operator survey
Survey from Infonetics Research shows heavy security investments being made by cloud and data centre operators
VMS integration with access control software
The exacqVision video management software has now been integrated with the C*Cure 9000 security and event management system for access control
Warning of dangers associated with free mobile apps
Zscaler is warning smartphone users to be wary of downloading free apps this Christmas and to ensure latest security is in place
Award presentation at the Security Institute
UK security professional body recognises achievements of past chairman with George van Schalkwyk trophy
Internet of things comes under focus in 2014 predictions
WatchGuard provides its take on what to expect in 2014 including the increasing prominence of the internet of things
Year on year increase in spam in November
Kaspersky lab reports on the increase in spam traffic during november and the large number of malicious attachments in the UK
Shopping centre installation of IP cameras with edge server software
IQeye megapixel cameras from IQinVision with edge server software from exacq have been installed in Canadian shopping centre
Storage technology improvements change data recovery landscape
Kroll Ontrack shows how changes made during 2013 in storage technology have altered the methods needed for effective data recovery
Retail optimisation and security demonstrated at EuroShop
Tyco Retail Solutions will be attending EuroShop 2014 with its range of products designed to provide secure retail environments with shop performance improvement capabilities
Phishing attempts plague UK office workers
Phishme study shows that office employees in the UK are seeing an increasing quantity of phishing e-mails on a daily basis
Enterprise IT predictions for 2014
Varonis looks ahead to 2014 and provides its insight into the way IT in the enterprise will develop its protective capabilities
New system on chip improves detail capture
Cameras featuring the new ARTPEC-5 system on chip have greater capabilities for video processing and analytics requiring detail such as ANPR
Data protection and disaster recovery acquisition
Unitrends strengthens its positioin in data protection and disaster recovery with the acquisition of PHD Virtual Technologies
Nedap accreditation for network camera range
Network surveillance camera range from Canon Europe accredited for compatibility with the AEOS security management system
Image tracking implications of Gmail automatic image display
Rapid7 comments on the new automatic image display feature in Gmail and the implications regarding e-mail tracking and malicious request proxying
Survey results show ROI satisfaction on network access control
Network access control customers of ForeScout have been surveyed on satisfaction of product performance and return on investment
New investments being made in DDoS mitigation
Increase in application layer attacks is spawning new investment into protection from Distributed Denial of Service (DDoS) attacks
High growth in cellular M2M devices
Industrial automation system security to become critical due to high growth in the use of cellular M2M devices during the next 5 years
Low light optimization features on new range of cameras
IP megapixel surveillance cameras from Mobotix now feature low-light optimization to deliver high contrast imaging in poor illumination
Lack of time hampers fight against security vulnerabilities
Survey from RedSeal Networks show almost a third of IT departments are too busy or lack the resources to keep their networks secure
New surveillance cameras added to pan/tilt/zoom range
Improvements in optical zoom and light sensitivity for low light usage feature in nine new IP video surveillance cameras released by Axis Communications
Tamper resistant locking cylinders used in College of Psychic Studies
London based college takes new locking systems with tight control on key duplication and high tamper resistance without disrupting the aesthetics of the period architecture
Transom door closers installed at Liverpool University
Architectural considerations and ease of operation resulted in University of Liverpool choosing transom door closures from Alpro
Database as a service plaform for malware
Hacker intelligence initiative report reveals the use of database as a service technology as a new cyber-criminal malware platform
PoE brings cost reduction to IP security systems at Gratte Brothers
UK building services company makes use of Power-over-Ethernet (PoE) switches on its IP integrated security networks
Access control system update brings intelligence to edge devices
The emerald update on CEM Systems' AC2000 range of access control products enables application access from browsers or from the door
Integrated security management collaboration
Stonesoft and Tufin Technologies have entered into a collaboration for integrating contextual awareness with policy orchestration for improved IT security management
PTZ network dome camera fixes directly to wall
Aesthetic design distinguishes high quality PTZ dome camera with easy installation and direct wall mounting without the need for an arm
CCTV and Access Control integration on show in Dubai
TDSi is attending the Intersec Dubai show in January to demonstrate the benefits of integrated CCTV and access control
Review of 2013 corporate security threats
Kaspersky Lab looks back at 2013 and highlights the main cyber-crime security threats affecting corporate bodies
High throughput trailer mounted cargo scanner
The Eagle T60 Cargo inspection system is a trailer mounted scanner for use at checkpoints for screening cargo and vehicles
Slash resistant garments for prison officers
PPSS has developed slash resistant base layers for the protection of prison officers from attacks using sharp objects
US security certification for Centrify Server Suite
Secure authentication and access control server suite from Centrify achieves common criteria certification enabling its use in government agencies
Data leakage ranked highest threat for police forces
Research from Gemalto indicates UK police employees are more concerned about the threat of data loss than that or resource cuts
4 out of 5 Employees using unapproved apps
Research from McAfee has highlighted the dangers of unapproved apps in the workplace with 80% of employees surveyed using SaaS applications without approval
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012