Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Award presentation at the Security Institute
UK security professional body recognises achievements of past chairman with George van Schalkwyk trophy
Internet of things comes under focus in 2014 predictions
WatchGuard provides its take on what to expect in 2014 including the increasing prominence of the internet of things
Year on year increase in spam in November
Kaspersky lab reports on the increase in spam traffic during november and the large number of malicious attachments in the UK
Shopping centre installation of IP cameras with edge server software
IQeye megapixel cameras from IQinVision with edge server software from exacq have been installed in Canadian shopping centre
Storage technology improvements change data recovery landscape
Kroll Ontrack shows how changes made during 2013 in storage technology have altered the methods needed for effective data recovery
Retail optimisation and security demonstrated at EuroShop
Tyco Retail Solutions will be attending EuroShop 2014 with its range of products designed to provide secure retail environments with shop performance improvement capabilities
Phishing attempts plague UK office workers
Phishme study shows that office employees in the UK are seeing an increasing quantity of phishing e-mails on a daily basis
Enterprise IT predictions for 2014
Varonis looks ahead to 2014 and provides its insight into the way IT in the enterprise will develop its protective capabilities
New system on chip improves detail capture
Cameras featuring the new ARTPEC-5 system on chip have greater capabilities for video processing and analytics requiring detail such as ANPR
Data protection and disaster recovery acquisition
Unitrends strengthens its positioin in data protection and disaster recovery with the acquisition of PHD Virtual Technologies
Nedap accreditation for network camera range
Network surveillance camera range from Canon Europe accredited for compatibility with the AEOS security management system
Image tracking implications of Gmail automatic image display
Rapid7 comments on the new automatic image display feature in Gmail and the implications regarding e-mail tracking and malicious request proxying
Survey results show ROI satisfaction on network access control
Network access control customers of ForeScout have been surveyed on satisfaction of product performance and return on investment
New investments being made in DDoS mitigation
Increase in application layer attacks is spawning new investment into protection from Distributed Denial of Service (DDoS) attacks
High growth in cellular M2M devices
Industrial automation system security to become critical due to high growth in the use of cellular M2M devices during the next 5 years
Low light optimization features on new range of cameras
IP megapixel surveillance cameras from Mobotix now feature low-light optimization to deliver high contrast imaging in poor illumination
Lack of time hampers fight against security vulnerabilities
Survey from RedSeal Networks show almost a third of IT departments are too busy or lack the resources to keep their networks secure
New surveillance cameras added to pan/tilt/zoom range
Improvements in optical zoom and light sensitivity for low light usage feature in nine new IP video surveillance cameras released by Axis Communications
Tamper resistant locking cylinders used in College of Psychic Studies
London based college takes new locking systems with tight control on key duplication and high tamper resistance without disrupting the aesthetics of the period architecture
Transom door closers installed at Liverpool University
Architectural considerations and ease of operation resulted in University of Liverpool choosing transom door closures from Alpro
Database as a service plaform for malware
Hacker intelligence initiative report reveals the use of database as a service technology as a new cyber-criminal malware platform
PoE brings cost reduction to IP security systems at Gratte Brothers
UK building services company makes use of Power-over-Ethernet (PoE) switches on its IP integrated security networks
Access control system update brings intelligence to edge devices
The emerald update on CEM Systems' AC2000 range of access control products enables application access from browsers or from the door
Integrated security management collaboration
Stonesoft and Tufin Technologies have entered into a collaboration for integrating contextual awareness with policy orchestration for improved IT security management
PTZ network dome camera fixes directly to wall
Aesthetic design distinguishes high quality PTZ dome camera with easy installation and direct wall mounting without the need for an arm
CCTV and Access Control integration on show in Dubai
TDSi is attending the Intersec Dubai show in January to demonstrate the benefits of integrated CCTV and access control
Review of 2013 corporate security threats
Kaspersky Lab looks back at 2013 and highlights the main cyber-crime security threats affecting corporate bodies
High throughput trailer mounted cargo scanner
The Eagle T60 Cargo inspection system is a trailer mounted scanner for use at checkpoints for screening cargo and vehicles
Slash resistant garments for prison officers
PPSS has developed slash resistant base layers for the protection of prison officers from attacks using sharp objects
US security certification for Centrify Server Suite
Secure authentication and access control server suite from Centrify achieves common criteria certification enabling its use in government agencies
Data leakage ranked highest threat for police forces
Research from Gemalto indicates UK police employees are more concerned about the threat of data loss than that or resource cuts
4 out of 5 Employees using unapproved apps
Research from McAfee has highlighted the dangers of unapproved apps in the workplace with 80% of employees surveyed using SaaS applications without approval
Huge US increase in mobile payment acceptance software
Apriva details the level of uptake in the USA of secure payment acceptance software for mobile endpoints
Data centre infrastructure protection at cloud services provider
SSH Communications is providing a European cloud provider with network visibility and compliance using CryptoAuditor
Demonstration highlights value of integrated surveillance
Milestone Systems teamed up with Axis Communications to provide Scandinavian security companies with a demonstration of high value integration
Research highlights vulnerability of large e-commerce websites
High-Tech Bridge has conducted research into e-commerce providers finding large numbers of vulnerabilities to phishing and identity theft
Online training available for security distributors
Partners of Napco Security Technologies have access to training classes in security systems either online or as video recordings
Wireless surveillance protects yacht harbour
Emsworth Harbour on the southern UK coast has had wireless network surveillance cameras from Mobotix installed to provide security coverage for yachts
Cryptographic technology combats surveillance threat
Cryptovision fights back against international and domestic surveillance with the release of crypto solutions with no hidden backdoors
London Gateway port security
Security consultants at CHQ Security Services have carried out security and risk assessments for a deep-sea container port development taking place in the UK
Two factor authentication for online identity management
SecurEnvoy explains how to reduce the risk of unauthorized data access using a variety of two-factor authentication that doesn't rely on seed records being held by the authentication company
Online shoppers more vulnerable than ever this Christmas
WatchGuard Technologies outlines the five most common online threats to watch out for with the start of the holiday season online shopping spree
Survey reveals extent of theft and small item loss in companies
Locking items away and an effective labelling regime seen as the most effective methods of preventing small item theft or loss
Airport information system market report
Research and Markets has issued a report which examines the future growth potential of the global market for Airport Information Systems
Twelve scams to watch out for this Christmas
McAfee details the 12 main scams doing the rounds this Christmas and offers advice on how to avoid becoming the victim of fraud
Avoiding the dangers of online shopping
With large increases predicted this season in the use of online shopping, Rapid7 is providing consumers with advice on how to avoid becoming the victim of fraud
Self replicating banking trojan set to rise in prominence
Kaspersky Lab is warning of an expected increase in online banking fraud with the prominence of the Neverquest Trojan
Top IT security trends and predictions for 2014
Bloxx takes a look at 2014 and predicts that the dark web will start to rise to the surface as more focus is placed on revealing its secrets
Managed sercurity service for Norway
Norwegian Broadnet is using cloud-based DDoS managed security from Arbor Networks to protect its customers
IT threat predictions for 2014
Fortinet is predicting Android malware on Industrial Control Systems as one of the key threats to watch out for in 2014
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012