Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Review of 2013 corporate security threats
Kaspersky Lab looks back at 2013 and highlights the main cyber-crime security threats affecting corporate bodies
High throughput trailer mounted cargo scanner
The Eagle T60 Cargo inspection system is a trailer mounted scanner for use at checkpoints for screening cargo and vehicles
Slash resistant garments for prison officers
PPSS has developed slash resistant base layers for the protection of prison officers from attacks using sharp objects
US security certification for Centrify Server Suite
Secure authentication and access control server suite from Centrify achieves common criteria certification enabling its use in government agencies
Data leakage ranked highest threat for police forces
Research from Gemalto indicates UK police employees are more concerned about the threat of data loss than that or resource cuts
4 out of 5 Employees using unapproved apps
Research from McAfee has highlighted the dangers of unapproved apps in the workplace with 80% of employees surveyed using SaaS applications without approval
Huge US increase in mobile payment acceptance software
Apriva details the level of uptake in the USA of secure payment acceptance software for mobile endpoints
Data centre infrastructure protection at cloud services provider
SSH Communications is providing a European cloud provider with network visibility and compliance using CryptoAuditor
Demonstration highlights value of integrated surveillance
Milestone Systems teamed up with Axis Communications to provide Scandinavian security companies with a demonstration of high value integration
Research highlights vulnerability of large e-commerce websites
High-Tech Bridge has conducted research into e-commerce providers finding large numbers of vulnerabilities to phishing and identity theft
Online training available for security distributors
Partners of Napco Security Technologies have access to training classes in security systems either online or as video recordings
Wireless surveillance protects yacht harbour
Emsworth Harbour on the southern UK coast has had wireless network surveillance cameras from Mobotix installed to provide security coverage for yachts
Cryptographic technology combats surveillance threat
Cryptovision fights back against international and domestic surveillance with the release of crypto solutions with no hidden backdoors
London Gateway port security
Security consultants at CHQ Security Services have carried out security and risk assessments for a deep-sea container port development taking place in the UK
Two factor authentication for online identity management
SecurEnvoy explains how to reduce the risk of unauthorized data access using a variety of two-factor authentication that doesn't rely on seed records being held by the authentication company
Online shoppers more vulnerable than ever this Christmas
WatchGuard Technologies outlines the five most common online threats to watch out for with the start of the holiday season online shopping spree
Survey reveals extent of theft and small item loss in companies
Locking items away and an effective labelling regime seen as the most effective methods of preventing small item theft or loss
Airport information system market report
Research and Markets has issued a report which examines the future growth potential of the global market for Airport Information Systems
Twelve scams to watch out for this Christmas
McAfee details the 12 main scams doing the rounds this Christmas and offers advice on how to avoid becoming the victim of fraud
Avoiding the dangers of online shopping
With large increases predicted this season in the use of online shopping, Rapid7 is providing consumers with advice on how to avoid becoming the victim of fraud
Self replicating banking trojan set to rise in prominence
Kaspersky Lab is warning of an expected increase in online banking fraud with the prominence of the Neverquest Trojan
Top IT security trends and predictions for 2014
Bloxx takes a look at 2014 and predicts that the dark web will start to rise to the surface as more focus is placed on revealing its secrets
Managed sercurity service for Norway
Norwegian Broadnet is using cloud-based DDoS managed security from Arbor Networks to protect its customers
IT threat predictions for 2014
Fortinet is predicting Android malware on Industrial Control Systems as one of the key threats to watch out for in 2014
CPA certification for mobile call cryptography
The Cryptify Call smartphone application for call encryption has received Commercial Product Assurance certification
Protection against internet fraud and fake websites
Web Inspector from Comodo includes advanced malware detection for the identification of web pages containing malicious code
October spam gears up to forthcoming holiday season
Report from Kaspersky Lab examines the spam trends in October with Syria and holiday themes being at the forefront of spam campaigns
Location based marketing seen as intrusive
Survey of consumers by ISACA reveals attitudes towards location based marketing on mobile phones and unwanted discount coupons
Security to go through evolutionary step in 2014
Tim Keanini of Lancope provides his predictions for the IT security environment that he expects to emerge during 2014
Improvements required in healthcare security management
Survey results demonstrate requirements for improved risk assessment in the healthcare industry to increase IT security protection
Security training course in Brussels
SANS Institute will be returning to Belgium in February with training courses available in Essential Security
Successful java exploit protection record
Automatic exploit prevention methods used by Kaspersky Lab has succeeded in blocking millions of java based attacks to September 2013
UK banks a target for sophisticated Shylock malware
BAE Systems Detica explains the threat posed by the Shylock malware and its effects on the UK banking and finance industry
UK workers can't resist clicking on web links
Sourcefire study in the UK finds that only 10% of the workforce never click on web links that they receive via e-mail
Quick installation twist-up protection bollards
A new twist-up bollard available from Calpipe requires little maintenance and affords easy to install impact protection
Real time threat management for APTs and malware
Reduced incident response times achievable with security threat management platform to counteract advanced persistent threats
Wide dynamic range cameras with minimal installation time
A new range of 960H analogue cameras has been launched featuring 700 TV line resolution and simple focus technology for ease of installation
Gunshot detection integrated with video management system
Nassau County is combatting firearms crime with integrated video surveillance and gunshot detection using Milestone XProtect VMS
Dell SecureWorks joins cyber incident response scheme
The UK Government's cyber incident response scheme will benefit from the expertise of the Counter Threat Unit at Dell SecureWorks
Threat analytics for privileged access
CyberArk has launched a product for privileged threat analytics to prevent advanced, external and insider cyber attacks
Plug and play surveillance system wins major Marcom award
DirectIP from IDIS has picked up the Platinum MarCom award from the Association of Marketing and Communications Professionals
Axis network bullet camera available from UK distributor
Norbain is now carrying the latest Axis network camera featuring full HD imaging, IR illumination and 18x optical zoom
Report examines extent of concern about cyber-bullying
Online bullying is the subject of a McAfee report released today which reveals that only a tenth of parents believe their children are safe from bullying when using the internet
HD surveilance supplier sees large increase in demand
Major surveillance project wins has resulted in record results in the first quarter sales performance for IP video supplier IndigoVision
Data destruction predicted to rise in 2014
Websense has made a set of predictions for the cybersecurity landscape in 2014 with attacks becoming more targetted and data destruction on the increase
Survey investigates security of industrial networks
Improvements in configuration management needed to improve protection against critical infrastructure cybersecurity threats according to survey results
Protection service for securing IT servers
Physical, virtual and cloud-based servers can now be secured using the server protection services available from Dell Secureworks
Fingerprint biometrics assists in vaccination management in Africa
Multispectral imaging based fingerprint sensors are being used in the African Healthcare industry to track patients who have been vaccinated
Shared development and logistics fuelling cyber arms race
A supply chain analysis report from FireEye reveals the common development and logistics structure used in delivering malware
Survey shows greater need for network management automation
Increasing network complexity with IPv6, cloud computing and virtualization is driving greater needs amongst IT professionals for more automation of network management
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012