Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
NFC SIM cards for mobile payments in Taiwan
A Taiwan operator has chosen Gemalto to provide SIM cards and software to enable secure payments using Near Field Communications (NFC) technology
Telent completes acquisition of Telindus UK
Technology services company makes acquisition of Telindus to strengthen multi-vendor capabilities for ICT and IP networking systems
Financial institutions to be targeted in 2015
Kaspersky Lab is predicting that cyber criminals will up the ante during the next year and target financial service providers themselves rather than their customers
UK consumers demand harsher penalties for data breaches
Survey conducted by LogRhythm reveals the extent of frustration endured by UK consumers at data breaches suffered by organisations and the need for harsher penalties
UK businesses at risk through lack of cyber security awareness
The BSI has released the results of a survey into the ability for UK businesses to protect their cyber assets as well as their future reputations
Enhanced perimeter protection during increased terror threat
Townscape is providing building managers and architects with information about how to mitigate against vehicular threats as the UK terror alert increases to severe
Advanced DDoS mitigation included in threat protection system
The latest release of the Thunder threat protection system from A10 Networks includes advanced DDoS mitigation capabilities and programmable policy engine
Guarding company attains record Approved Contractor Scheme score
Axis Security has reached a score of 171 points in the Security Industry Authority's Approved Contractor Scheme, the highest the company has ever recorded
ProtectV allows service providers to supply on-demand encryption for cloud storage
With ProtectV technology, users of cloud storage products will be able to make use of encryption-as-a-service from their provider to increase the security of their data
New firewall and UTM designed for growth in encrypted traffic
WatchGuard's latest firewall and unified threat management appliances have been designed to cope with the increased levels of encrypted traffic expected across corporate networks
Anatomy of the malicious Regin platform
Kaspersky Lab provides some insight into Regin, established malware which attacks GSM networks with espionage campaigns
Extended video encoding platform interoperability with ONVIF compliance
Universal video encoding platform for incorporating analogue surveillance equipment to be used on IP networks now compliant with ONVIF open video standard
Sandbox analysis report acclaims advanced threat prevention product
Miercom tests Next Generation Threat protection and cloud based threat emulation service from Check Point with positive results
Impact of allowing personal browsing on company computers
GFI Software research reveals the extent of the problem of allowing company employees to have unrestricted internet access on corporate devices
Advice for securing vulnerable webcams
Kaspersky Lab provides advice on preventing webcam snooping after website discovered which streams unprotected footage
Lone worker equipment on show at November conference
Skyguard will be demonstrating its MySOS personal safety device and smartphone apps at the annual Lone Worker Safety Conference in London's Olympia this month
Compromised privileged accounts key to advanced targeted attacks
Study by CyberArk identifies privileged accounts as being central to the latest wave of advanced targeted attacks
Water authority improves IT network protection
ControlFabric architecture from ForeScout provides Sutton and East Surrey Water with integrated network and endpoint protection
Application optimisation and security for SaaS providers
Web Performance Solutions product from Akamai is available for Software-as-a-Service providers to improve web application optimisation and security
Top IT security predictions for 2015
Websense has predicted the cybersecurity arena for 2015 with healthcare, the internet of things and credit card users top of the list of attack targets
Defence event raises interest in wireless video networking
Vemotion is seeing an increase in interest in wireless video transmission systems in the Middle East following the company's appearance at the Milipol trade fair in Qatar
Housing Association protects staff with lone worker service
Identicom lone worker devices and the SoloProtect service is being used by Sovereign Housing Association in the UK for the protection of field staff
Network door controller integration with command and control platform
The Synergy 3 security management system from Synectics interoperates with the A1001 Network Door Controller from Axis Communications
The EU cyber taskforce should only be the beginning
Rob Lay, Solutions Architect for Enterprise and Cyber Security, UK & Ireland for Fujitsu explains why the Europol cyber task force is not enough for companies to rely on for protection against cyber criminals
Intrusion detection brings enhanced safety for transport networks
Optex is attending the Transport Security Expo event in London to demonstrate how intrusion detection technology can provide enhances safety on the railway network
Corporate data security trust restoration
Paul Hampton, Payment & Crypto management expert at SafeNet explains the four steps required to restore trust in corporate data security
Free tool for removing unsolicited browser add-ons
Unwanted adverts, toolbars and browser add-ons can now be simply eliminated with a new tool available from BitDefender
Licence plate recognition application for WiseNetIII cameras
Samsung Techwin now supports Arteco's Automatic Licence Plate Recognition application for use on its WiseNetIII range of surveillance equipment
Only half of UK critical business data secured
Research from NTT Com Security reveals extent of insecure data and lack of insurance within the structure of UK companies
Interoperability alliance strengthens access and threat management
ForeScout and Palo Alto Networks have integrated their products to offer greater threat management and network resource access control based on the ControlFabric platform
Research reveals extent of DDoS attacks on online service companies
More than a third of public-facing online companies have become victims of DDoS attacks during the last year
Office worker survey shows high levels of complacency over data loss
Imation has performed a study into company employee views on data risk and the vulnerability of confidential data in the hands of remote workers
Critical communications system provider rebrands
Vocal has rebranded as Everbridge after earlier acquisition by supplier of critical communication and notification systems
Rapid video review for major investigations
BriefCam releases Syndex GV rapid video review technology for use by Government agencies involved in major investigations
Integrated access control system improves security in UK hospital
The Norfolk and Norwich University Hospital has upgraded its legacy security system with integrated access control technology from TDSi
Video management system release with improved management convenience
The fifth release of the SeeTec Cayuga video management system in december will see improvements in installation convenience, management and integration
Major organizations collaborate on latest cyber security challenge
The 2015 cyber security challenge kicks off with realistic cyber terrorist attack simulation to test the skills of participants
Travelling executives warned of Darkhotel threat
Highly targeted cyber espionage techniques are being used against commercial travellers with highly valuable information warns Kaspersky Lab
Collaboration group to investigate connected vehicle security
Intercede is part of a new collaborative group of industry partners examining the security implications of the emerging technology of connected vehicles
Smartphone apps for remote monitoring
Android and iPhone apps available from Apple store and Google Play for use with Vivotek surveillance networks for remote monitoring
Avoiding the pitfalls of authentication based IT security
David Hald, co-founder and chief relation officer, SMS PASSCODE provides a step-by-step guide to understanding the common pitfalls of authentication-based security
High performance IP video surveillance partnership
Pelco and Avaya have entered into a relationship to collaborate on technology development for scalable IP video surveillance networks
UK distribution agreement for access control products
Under a new agreement, Mayflex will distribute the Aliro range of access control products from Siemens in the UK
Biometric software meets US fingerprint matching requirements
Fingerprint biometric technology from Neurotechnology gains second place in MINEX rankings for fingerprint matching algorithms thereby meeting US public sector requirements
Interactive incident timeline speeds up investigations
The UserInsight behaviour analytics software from Rapid7 now features interactive incident timeline for faster investigation capability
Wordpress fixes plug-in vulnerability
A vulnerability in the LiveSupporti WordPress plug-in has been fixed after Check Point raises the issue with the CMS supplier
Video analytics for searching for suspects
NICE Systems is attending expoprotection with its video analytics system for assisting in the search for suspect and missing persons in video footage
High performance hybrid and IP video recorders
The Z-Series network video recorders from Exacq Technologies have been updated for higher performance and reliability
Hardware line adds flexibility to software-based security management platform
Nedap is introducing the AEOS Blue hardware line, its sixth generation of AEOS controller. This new generation of controller builds on the software-based AEOS Security Management Platform. The AEOS Blue is a self-contained, energy-efficient, powerful hardware line consisting of door controller, door
Technology collaboration results in enhanced infrastructure protection
ForeScout Technologies and McAfee have partnered to combine CounterACT with McAfee products to gain additional protection through the exchange of threat intelligence.
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo