Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Industry lacks mobile device security policies
Study by Kaspersky Lab shows that almost half of companies have no policy on the secure use of mobile devices on their networks
Global security equipment manufacturing analysis
New report from Research and Markets provides an analysis of the 400 largest security equipment manufacturers globally
More intelligence for IndigoVision HD camera range
The latest range of enhanced high definition surveillance cameras from IndigoVision feature different processor technology for improved imaging and intelligence
Free tool detects Poison Ivy infections
FireEye releases report demonstrating resurgence of Poison Ivy eight years on from its creation and releases free tool for assessing possible infections
Secutech Taiwan moves to earlier date for 2014
The Secutech security exhibition in Taiwan will move from its April slot into March for the 2014 event taking place at the Taipei Nangang Exhibition Centre
Understanding risk in virtualized environments
Frederik Bijlsma of Red Hat explores virtualization and how reducing uncertainty and understanding exposures can bring about improvements in risk management
Exchange vulnerabilities addressed in Patch Tuesday
Tripwire comments on the latest release of patches and updates from Microsoft for its products including critical update for Exchange
Portsmouth MP visits Elmdene facility
Electronic security company hosts visit by local MP to tour facilities and discuss manufacturing with senior staff
Video storage and recording covered in ONVIF profile G
The release candidate for Profile G of the open video networking specification has been published by ONVIF
Smartphone incident reporting added to VMS
The Ocularis video management system has been integrated with Elerts to provide improved incident reporting and cloud based analysis
Securing critical manufacturing systems against published vulnerabilities
Belden announces an update to Eagle Tofino Industrial Security to include Security Profiles. Part of the Eagle Tofino version 1.7 product release, this new feature addresses the post-Stuxnet trend of a dramatic escalation in the number of public disclosures of industrial control system vulnerabiliti
Automation company introduces strategic partnership for industrial cyber security
Rockwell Automation has announced an initiative to help manufacturers reduce security risks to control systems in response to growing cyber-security threats. The initiative will help automation and IT professionals more effectively secure their industrial processes with a combination of control syst
ADT provides IP security upgrade to LCFC stadium
UK security company ADT has delivered a challenging upgrade from analogue CCTV to IP surveillance at Leicester City Football Club's stadium
Registration soon to close on digital forensics event
Digital forensics and incident response summit organised by SANS Institute to take place in Prague in October
Multifocal sensor technology protects Munich stadium
Major European football stadium upgrades video surveillance protection with Panomera sensor technology on devices supplied by Dallmeier
New user interface on Android security app
ESET has re-engineered its mobile security app for the Android platform with an anti-phishing module and a streamlined user interface
Full HD dome camera with IR illumination
Samsung Techwin releases an IR dome camera with full HD resolution and 20x dome for challenging environments
Research report examines Indian cyber security market
The expectation of increased demand for cyber security in India is covered in a new market research report
Medical school learning technology supported by Milestone VMS
Video capture system in use at St Andrews University Medical School supported by XProtect technology from Milestone Systems
High growth forecast for SMS security gateway market
Infonetics Research offers its thoughts on the development of the market for SMS/MMS security Gateways out until 2017
IP Video Surveillance protects fast food chain
Fast food supplier Wendy's has taken IP video surveillance systems from IndigoVision to improve security investigations
Life Safety presentation with CPD accrediation
System Sensor Europe presentation on aspiration smoke detection carries CPD accreditation
New web resource created for Security Institute members
The Security Institute's Knowledge Centre provides trade organisation members with industry related information
Dallmeier tackles gambling security in Macau
Top gambling destination near Hong Kong takes specialist IP surveillance system from Dallmeier
Embedded security specialist joins TrustZone Ready
By enrolling in the ARM TrustZone Ready program, Inside Secure helps tablet and smartphone clients build secure hardware systems
Posting location on social networks invites burglars
ADT is warning users of Facebook about the dangers of posting information on their social network pages that could be valuable to criminals
IDIS releases remote surveillance app for iOS and Android
Users of iOS and Android devices can now access IDIS Mobile providing a remote client for the DirectIP video management system
Threat intelligence, news and analysis available on ATLAS portal
Arbor Networks is now publishing its analysis and intelligence on global IT threats on its ATLAS threat portal
Compound business rules increase fraud identification reliability
ReputationManager 360 from iovation now has additional features for improving the fight against fraud using compound business rules
DDoS trends show high growth in 2013
Arbor Networks examines patterns of growth, attack size and duration of Distributed Denial of Service (DDoS) attacks for 2013
US data breach blamed on lack of data encryption
Data protection experts at Voltage Security comment on the recent data losses resulting in US prosecutions
Market report on biometric face recognition
Global Facial Recognition Market report from Research and Markets examines expected 24.5% CAGR growth expectation in biometric face recognition to 2016
Tyco buys out Exacq Technologies
Network video management company Exacq Technologies has been purchased by global security group Tyco Security Products
Report out on e-mail encryption
Research and Markets report details the global expected growth in E-mail encryption over the next three years
Perimeter detection integrated into surveillance VMS
IndigoVision issues module enabling integration of Southwest Microwave perimeter detection with Control Center video management software
Identity management and access control market report
Latest report from Research and Markets covers the global demand for IT based identity and access management
UK intelligence services intervene in FTSE 350 cyber readiness
HP expert comments on the latest involvement of GCHQ and MI6 in the revelations that UK FTSE 350 companies are adversely affecting the country's stance against cyber crime
UK housing group protects vulnerable workers with Identicom
The Identicom lone worker protection system is being used by Lancashire's Calico Group for the protection of its vulnerable field workers
Ideological hacktivism - the top motivation behind DDoS attacks
According to Arbor’s 8th annual Worldwide Infrastructure Security Report (WISR) the number one motivation behind DDoS attacks is now ideological hacktivism. Darren Anstee, Solutions Architect, Global Team Lead from Arbor Networks guides us through the various types of DDoS attack.
Biometric time and attendance system
NCheck Bio Attendance authenticates users using fingerprint and face biometrics whilst providing time and attendance functions
Encrypted communication for web and cloud security
Unisys launches its Stealth Solution for Amazon Web Services for encrypted cloud communications for enterprise clients
Enterpise protection for Mac users
Bit9 launches its security platform for Mac OS X providing enterprise level advanced threat and zero-day attack protection to corporate Mac users
ONVIF support on Maxpro NVR range
Honeywell improves network video recorder range with ONVIF support and smart video motion detection technology
Open Networking Foundation welcomes Lancope as new member
Lancope joins community dedicated to the development of open standards for software-defined networking
Unified application service gateways for small businesses
The Thunder series of unified application service gateways from A10 Networks has been expanded to provide entry-level architecture for small businesses
Java most targeted endpoint technology
Bit9 releases findings of research into the security risk of Java to enterprise endpoints
Steel producer adopts two-factor authentication
2FA access control enables remote employees at steel producer to gain secure access to networks via smartphone
Security testing and risk management portfolio
Rapid7 has enhanced its product set for IT risk assessment including the management of mobile devices
Trade fair award for Abus Security-Center
Wireless alarm system from ABUS Security-Center picks up the Golden Protector award at Munich security event
BSIA warns of importance of data destruction
ICO fine on NHS trust for data loss elevates the profile once more of the need for using qualified data destruction specialists
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012