Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Spam levels reduce by 7% in January
Global spam report shows reduction in January with content characterized by fake WhatsApp notifications and adverts for Valentine's day gifts
New appointments strengthen Cloud NVR team
AD Network Video has made two new appointments in product management and business development for the company's Cloud NVR and Video Management System products
Robust administrative security required to prevent Wi-Fi viruses
Bitdefender comments on the creation of the wi-fi virus and how passwords are no longer enough to provide the necessary network security levels
Free app protects Windows phones from malware
Kaspersky Lab is providing additional safeguards from mobile malware to consumers using Windows smartphones
Security export strategy to keep UK at the forefront of technology
The UK Government's recently released security export strategy provides encouraging support to the country's cyber security industry
Massive growth expected in Indian biometric market
Market research report examines the expected growth in Biometrics in India during the next four years
Additional courses available at Pen Test Berlin event
SANS Institute is providing an additional two courses for penetration testing at the Pen Test Berlin event for ethical hackers
Bite sized online security training
Tavcom is now providing online distance training modules for providing targeted education whenever and wherever needed
Mobile malware diagnostics partnership
Cellebrite has entered a technology partnership with Webroot to integrate diagnostics with mobile app reputation and URL classification service
UK industry attitudes to growth in cyber threats
Research from BAE Systems Applied Intelligence shows increased spending expected in UK industry to counter expected cyber threats
Cloud security through discovery, protection and monitoring
CipherCloud expands its data protection system for helping companies adopt cloud services with secure protection of sensitive data
Partnership bolsters protection from DDoS attacks
Lancope and Radware are combining their expertise to provide advanced detection and mitigation against Distributed Denial of Service attacks
Risk management and compliance for cloud servers
Server Suite 2014 from Centrify provides protection from data centre risks relating to external attacks or the insider threat
New architecture enables immediate protection from latest threats
Check Point has further reduced the time for converting threat intelligence into immediate protection with the development of its software defined protection architecture
Android apps a significant risk for small businesses
McAfee study shows that small businesses using Android devices are at risk if they don't have effective mobile device management strategies
Network video surveillance for Moscow business centre
The new Paveletskaya Plaza business centre in Moscow is being protected with an extensive network video surveillance system from Samsung Techwin
Market report on biometric technology in mobile phones
Smartphones equipped with biometric access control technology come under the spotlight in a new market research report
Network forensic extension for Sourcefire Defense Center
The Endace Fusion Connector from Emulex provides 100GbE packet capture and intrusion detection for Defense Center from Sourcefire
Digital ID and data protection for consumers
WISeKey is extending corporate digital protection and digital identification solutions for use by individuals
Industry collaboration for improved security defences
The HP security portfolio provides organizations with the means for proactive sharing of threat intelligence to collaborate on improved security
Public cloud service security risks
Axway survey results indicate the attitudes of security professionals to the dangers of using public cloud services for file sharing in the workplace
Android banking trojans increased during 2013
Mobile threat landscape report from Kaspersky Lab shows extent of growth of banking trojans on the popular Android mobile platform
Unified security policy orchestration for complex environments
The latest version of Tufin's Orchestration Suite extends further into the network for improved policy management in increasingly complex network environments
UK retail chain takes open platform IP surveillance system
The Paul Smith retail chain is tackling loss prevention with a scalable deployment of IP surveillance cameras with scalable open platform video management system
Cloud based threat intelligence to combat APTs
BrightCloud and BreachLogic from Webroot provide protection from advanced threats on endpoint devices within the enterprise
IP cameras provide protection in Arctic facility
A space station above the Arctic Circle in Sweden is being protected with IP video surveillance cameras supplied by Axis Communications
Cloud based vulnerability management
Free vulnerability management system provides cloud based service for smaller businesses of up to 100 IP addresses
Cloud solution for enterprise mobile security
Partnership between Zscaler and Samsung Electronics brings integrated enterprise mobile security for Androids using cloud technology
Continuous endpoint compliance both on and off the corporate network
ForeScout RemoteControl enables organisations to extend endpoint control to corporate and BYOD equipment not connected to the enterprise network
Network monitoring data capture card
Low cost PCI card provides IT administrators with packet capture capabilities for full network monitoring applications
Mobile device threat complexity sees annual growth
Threat report from Webroot features the growth in mobile threats exposing company IT systems to malicious attacks
VMS and access control system integration
The exacqVision video management system has been integrated with EntraPass 6.01 security management software for access control
Cell base station security for 4G and LTE Networks
The LTE Small Cell Security system from Clavister provides small cell base station security for mobile operators
Market forecast of physical security systems
Report examines the market to 2019 for physical security systems globally, expected to reach over 125 billion USD
The effect of web intelligence on the physical security industry
NICE Systems' Jamie Wilson provides his view on the rise of Open Source Intelligence as a forecasting tool in predicting security incidents
Internal security breaches a serious issue in UK industry
Report details extent of the insider threat to UK businesses with only a quarter of IT professionals considering it to be a security priority
Market forecast for transportation safety and security
Report on the safety and security of transportation systems covers airways, sea routes, roads and railways during the period to 2018
Surveillance power system using solar energy
A solar panel power system has been developed for supplying energy to surveillance or perimeter protection systems in remote locations
Securing the future with multi-factor authentication
Claus Rosendal of SMS PASSCODE examines multi-factor authentication as a means of providing stronger security across the IT spectrum
Poor anti-theft software implementation threat
Kaspersky Lab provides details of the hidden threat overshadowing poor implementations of anti-theft software that can be exploited by attackers
VMS partner conference held in Florida
Video Management System supplier Milestone has been engaging its partner base with the latest MIPS conference held for the Americas in Florida
Security for Chelsea National Army Museum
Corps Security is providing the security services for protecting visitor and staff and securing the collection at the National Army Museum in Chelsea
Threat response partnership formed
Bit9 and Carbon Black have joined forces to deliver rapid threat response capabilities for the IT industry
Unified multi-factor authentication platform
The S3 Authentication Suite provides centralised multi-factor authentication for operation with a wide range of devices
Complex cyber-espionage toolkit The Mask explained
Kaspersky Lab provides details of "The Mask", an advanced cyber-espionage operation comprising different attack vectors for targeting high profile victims
Less than half of parents use internet supervision controls
Research by ESET demonstrates gap in internet child protection as parents neglect to use supervision controls
Email Defense Suite protects cloud service users
Intermedia is protecting its customers with enhanced cloud security provided by McAfee Email Defense Suite
Specialist traffic camera on show at InterTraffic
Dallmeier is attending InterTraffic in Amsterdam in March with its Panomera Traffic camera with multifocal optics for greater coverage with no moving parts
Global security organisation chooses training partner
Security professionals in the UK are to receive a boost in their continual training and education.
Study shows increase in enterprise encryption levels
Key management remains a challenge for organisations deploying enterprise-wide encryption, according to study from Ponemon and Thales e-Security
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo