Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Certification success for web application firewall
ICSA Labs have provided web application firewall certification to application delivery controller products from A10 Networks
Profile G of open video standard released
Open network video standard organisation, ONVIF, has released Profile G to cater for storage, search and retrieval capabilities
DRM technology protects Japanese video distributor
Live video distribution system for mobile devices in Japan to use DRM Fusion Server for the protection of content delivery
Web based analytics for DDoS visibility
SecureWatch Analytics from Corero provides dashboard based security intelligence based on Splunk big data analytics platform
Reducing Risk With Effective Encryption Management
Jason Thompson, Director of Global Marketing at SSH Communications Security discusses the role of encryption management in risk reduction
Connected home risk survey results
Fortinet reveals the greatest risks that homeowners face with the extension of the "internet of things" into the home environment
Louisiana critical infrastructure protection with Integrated video management
Milestone XProtect Enterprise is playing a central role in the protection of the Port Fourchon oil terminal in Louisiana
Transmitter enables analogue to HD over coax transition
Intersil has released the TW6872 video transmitter for transmitting over extended cable distances and deploying HD video over existing analogue coax cabling
Info Security training available in Estonia
SANS Institute will be operating in the Estonian capital of Tallinn this autumn with courses for information security professionals
Tokenless two-factor authentication for VPN access
The virtual private network of The Lowry cultural centre at Salford Quays is being secured using tokenless two-factor authentication technology from SecurEnvoy
Handheld imaging system for detecting organic threats
The MINI Z handheld Z backscatter imaging scatter has been introduced as a portable means of detecting hidden organic threats in a wide variety of applications
Parking fine malware plagues UK
Bitdefender is warning UK computer users of malware designed to steal confidential information through bogus parking fine reminder notices
Video bookmarking feature on VMS software
The latest version of the exacqvision Video management system features case management capabilities along with the ability to bookmark important video footage
Automatic camera discovery added to VideoEdge NVR
The VideoEdge Network Video Recorder from American Dynamics now features ease of set-up through the automatic discovery of cameras on the network
Cloud based video analytics service available
Panasonic's Cameramanager cloud subscription service now includes intellgent alarming with the use of CLVR video analytics
Poor threat intelligence leads to growth in successful attacks
Check Point reveals the growth in successful malware attacks resulting from increasing software sophistication and lack of threat intelligence
18 percent of smaller businesses face Windows XP risks
Research shows that large numbers of small and medium sized businesses are continuing to face malware attack risks by using the unsupported Windows XP operating system
Advanced security protects Milan's latest metro line
Tyco company, ADT is providing Line 5 of the Milan metro system with security and safety systems including CCTV surveillance and alarms
Nedap takes collaborative approach at IFSEC event
Security management company Nedap is attending the IFSEC event to provide a social hub for finding new ideas and solve the latest security challenges
Seamless video bookmarking capability in VMS
The exacqVision video management system from Tyco now has seamless bookmarking capabilities for improved case management
Survey shows extend of unsuitable content on child mobiles
One out of every seven parents surveyed by BullGuard had found unsuitable content on the mobile devices belonging to their children
Advanced SIEM for improved detection rates
NTT Com Security is improving the detection of unknown threats with its advanced security information and event management capabilities
Lone worker award recognises innovation at Guardian24
Smartphone based lone worker protection system supplier Guardian24 has won the Lone Worker Solution 2014 award
Mobile protection from botnets and ransomware
David Emms of Kaspersky Lab comments on the disruption of GameOver Zeus and CryptoLocker and the need for mobile users not to lower their guard
Hologram awards programme for 2014 now taking nominations
The International Hologram Manufacturers Association has opened nominations for original and innovative uses for holograms
Continuous monitoring and mitigation webinar
ForeScout Technologies sponsors SANS Webinar on the benefits of continuous monitoring and mitigation
Marine access control system for major ports
Dublin and Cherbourg ports have had access control systems from ACT added at buildings operated by Irish Ferries
ID card manufacturing demonstration at IFSEC
Databac will be showing the complex production process for multi-functional card credentials at the IFSEC event in London
Internet of Things generating greater threat exposure fears
IT adminstrators have been surveyed by GFI Software about the level of threats through mobile devices created by the Internet of Things
UK Financial organisation security confidence surveyed
Tripwire has released the conclusions of its survey into the confidence placed by UK financial organisations in the security controls they have in place
Strong authentication for cloud service providers
The Protiva Cloud confirm authentication system from Gemalto is compatible with HP CloudSystem for CSPs
How to avoid becoming a GOZeus and Cryptolocker victim
Kasperky Lab's David Emm provides some insignt into staying protected against the highly publicised GameOver Zeus and Cryptolocker threats
Anti-virus company joins fight against cyber crime
Bitdefender is offering its services to CERT and the police to enable them to use its experience in the escalating fight against cyber crime
USA takes action against botnet administrator
Dell SecureWorks has provided details of the actions taken against Cyrptolocker ransomware and the Gameover Zeus botnet
Wide portfolio of security products feature on Tyco's IFSEC stand
Tyco Security Products is presenting its wide range of surveillance, access control and other integrated security products at the IFSEC event in London this month
Mini electronic locking on show at IFSEC
Salto Systems will be attending the IFSEC event this year with its latest XS4 mini wireless electronic locking system
UK needs greater cyber-threat awareness
IT security expert panel at InfoSecurity Europe event declares greater need for awareness of cloud computing and cyber security in UK businesses
Vulnerability assessment tools covered in Pen testing course
Python for penetration testers will be covered as part of the Pen Test Berlin event for the assessment of vulnerabilities
Interactive surveillance system design tools
Suppliers of CCTV surveillance systems now have access to design tools from DVTEL for the quick and easy preparation of quotations
IT security discounts available for UK education sector
Educational institutions in the UK can benefit from the Education Discount Policy being offered on IT security products by Cyberoam
Surveillance supplier envisages busy IFSEC event
Axis Communications will be displaying the latest surveillance technology on offer as well as running a seminar programme at the IFSEC event in London
Social Media used in cyber-espionage campaign
CyberArk comments on the use of social media by hackers to conduct cyber espionage campaign to spy on US officials
IP cameras donated for oceanic research
IQinVision has donated IP video surveillance technology for use in an Ocean technology development tank for undertaking valuable fisheries research
Operating in zero trust environments
Dr Wieland Alge, Vice President and General Manager EMEA Barracuda Networks discusses zero trust environment infrastructures and the role of the CIO
Big data retrieval leading to increased burden on IT resources
A study by Iron Mountain has shown that IT professionals are under increasing pressure to devote more time to the retrieval of data
VMS now supports wearable surveillance cameras
Mobile video surveillance cameras for use by police and security personnel now supported by the Security Center VMS
Companies failing to reset password credentials of leavers
Study from Lieberman Software discovers over 13% of professionals in the IT security industry can still access the systems of former employers
High definition panoramic infra-red search and track
The SPYNEL-X infra-red search and track system with full panoramic imaging for intrusion detection and tracking has been launched by HGH Infrared Systems
Game producer consults IT security experts on plot authenticity
Kaspersky Lab has been helping entertainment supplier Ubisoft to authenticate adventure-game plot involving the exploits of a hacker
PSIM market development report for APAC
New report examines the development of the Physical Security Information Management market in the Asia Pacific region for the next 4 years
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo