Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
ARC
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Europe discusses improved safety
Euralarm has hosted a discussion with European Committee members on ensuring a safer Europe for citizens and businesses
Proportion of global phishing targets UK bank
Financial organisations in the UK are being targetted in phishing attempts from all over the world with 0.5% of global spam seeking to defraud the UK
Surveillance server available with built-in VMS
The Ocularis video management system from OnSSI is being provided as part of the ION Series of video surveillance servers
Retail industry not fully prepared for PCI DSS 3.0
Study shows large sections of the retail industry on both sides of the Atlantic aren't yet ready for the latest version of the security standards for the Payment Card Industry
Study on hospital security brings award for researcher
The Security Institute's Wilf Knight award has been presented to Adam Jones for his study into the effectiveness of a pro-security culture in reducing violence in hospital accident and emergency departments
Door access control for up to 4000 users
Access Solo door access control system comprising door controller and proximity readers can support 4000 users for up to 128 doors with easy set up
NCT Food Supply Chain Security, Brussels, 2013 - post event news
The first edition of the Non-Conventional Threat Food Supply Chain Security – A European Forum (23-24 October 2013) was a well-founded opportunity for members of the Food Supply Chain Community to gather and address the main concerns of our modern day food supply chain.
US president webpage attacked by SEA
Tripwire comments on the recent compromise by the Syrian Electronic Army on President Obama's web site
Restorative justice scheme launches in Woking
Axis Security is working with Surrey retailers on a restorative justice scheme aimed at deterring young offenders from further retail crime
College network deploys Unified Threat Management
WatchGuard has supplied Leeds City College with Unified Threat Management technology to protect its city-wide network
BYOD security for SAP mobile device management
SAP is improving mobile device management platform Afaria with the integration of CounterACT from ForeScout
PHP website compromised
Websense comments on the infection of the PHP.net site which sets out to redirect users to Magnitude Exploit Kit
Cryptographic middleware for embedded systems
Plug and play software from Inside Secure provides cryptographic middleware for microcontrollers
Web security appliance with Hyper-V and IPV6 support
Latest operating system for WatchGuard XCS appliance provides e-mail and web security with support for Microsoft Hyper-V and IPV6
Cyber battle lab to assist in critical infrastructure protection
Thales is launching a UK integration and innovation centre for modelling, developing and testing cyber defences against attacks on national critical infrastructure
Integrated access control to secure new Glasgow hospital
Large new hospital project in Glasgow to be secured with AC2000 access control and integrated security management system from CEM Systems
Connected security concept addresses major threat challenges
A portfolio of products being offered by Dell is designed to address the major challenges of IT security including BYOD, cloud computing and network security
IFSEC 2014 gains vendor support
Venue stress for IFSEC International UK event gains some relief with pledges of support for 2014 event at Excel London from a number of key security suppliers
The Last Rites of Traditional IT Security
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threats for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date
Study shows office workers are losing the skill of managing paperwork
With few companies having achieved paperless offices, information security is nonetheless lacking when it comes to managing confidential paperwork, according to Iron Mountain
Advanced motion search features on Video Management System
The Control Center Eagle video management system from IndigoVision features a new user interface and motion search technology
New VMS release increases camera support
The latest version of Wavestore's video management system supports up to 128 IP cameras and 64 analogue devices
Back up and restore scalability matches data growth
Backup appliances can be configured in a grid to meet the challenges of rapid data growth with speeds of up to 43 terrabytes an hour
Half of younger employees willing to break company BYOD policies
Fortinet reveals attitudes of Gen-Y employees towards Bring-Your-Own-Device (BYOD) policy restrictions with up to a half of them willing to contravene company rules
Standard accreditation for certification body
The SSAIB has gained accreditation for Occupational Health and Safety Management as well as Environmental Management System standards
Security consultant gains surveillance accreditation
CornerStone consultant the first to gain Axis Certified Professional status after reaching required standard in IP video expertise
UK security company extends reach into South East Asia
TDSi is using UK Trade and Investment to assist in extending the reach of its security technology into Africa and the South East Asian markets
Non-human identity management in process automation
Jonathan Lewis of SSH Communications Security discusses the role of Secure Shell for the authentication of non-human identities in M2M networks
Zero-day vulnerabilities discovered in US SCADA systems
Industrial control software from one supplier has come under scrutiny from security experts with 25 vulnerabilities which could compromise critical infrastructure systems
Virtual career fair for information security
Information Security professionals are being invited to take part in a virtual career fair to match skills against opportunities in the UK
Secure platform for IT security product integration
ForeScout responds to increased complexity in network security with the release of ControlFabric as a platform for integration and dynamic information sharing
Government classification certification for encryption product
Disk Protect data encryption product from Becrypt gains CESG certification for commercial products used in government applications
Channel partnership extends IT operational intelligence into the Benelux region
Benelux based SMT has joined ExtraHop as a channel partner bringing performance and security improvements to IT architectures
Report examines UK Home Office from ICT perspective
The Secure and Adaptable Borders: Organizational Profile of the Home Office provides information relevant to information technology companies working in the public sector
Tamper-proof jailbreak detection for mobile devices
Designed for mobile devices used in enterprise environments, new jailbreak detection software protects companies from fraud and data loss
Industry report reveals extent of latest spam outbreak
The end of the summer has seen a surge in levels of social media spam with the most prolific producers in Europe, according to a new AppRiver report
Advice on protecting company information for travelling workers
Iron Mountain has provided some advice for people who work while using public transport on how to protect sensitive information from commuter snoopers
Encryption specialist joins technology alliance partnership
The DESlock encryption company is the first partner to join ESET's recently formed technology alliance programme
ASIS success for IP surveillance supplier
IndigoVision has been celebrating a good show at the ASIS 2013 event with record numbers of visitors to its stand
Web protection service added to cloud
Cloud computing platform for smaller businesses gains enhancement with web protection service featuring content filtering capability
Outdoor bullet camera with full HD and IR illumination
Axis introduces a new bullet camera to its range of network cameras with optical zoom, IR illumination, full HD resolution and weather resistance
ANPR software for retrospective crime detection
CitySync Safety is helping police to convict criminals who use cars in their crimes by analysing licence plate recognition data and matching it to crime scenes
Secure PDF annotation for mobile users
A secure app for iOS mobile devices has been developed by Accellion for the secure annotation of PDF files
Web application security development risks
SANS course on web application security examines the risks of outsourcing development activities as new vulnerabilities can be introduced
Mapping enhancements feature on new PSIM version
VidSys PSIM takes dot release providing mobile app map support and address look-up to improve speed to respond to incidents
Your CMS is the path of least resistance for industrial hackers
Imperva's Director of Cyber Security, Barry Shteiman explains how content management systems and their plug-ins are an easy route to mischief for modern industrial hackers
District-wide school surveillance provides student protection
Widely deployed integrated school security system in district of Michigan based on open-platform XProtect video management system from Milestone
Adobe breach could compromise software code
Attackers have gained access to source code of Adobe products putting millions of users at risk of zero-day attacks
LPR analytics integrated into VMS
The Ocularis video management system is now compatible with the LPR licence plate recognition system from HTS
Taxi management system takes FortiGate network protection
FortiNet is protecting the taxi booking and payment system in use by a large taxi company operating in central London
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com