Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Swarm Cyberattacks Increase in Volume
The sophistication of attacks targeting organisations is accelerating at an unprecedented rate, according to Fortinet
Report examines economic impact of cyber crime
Theft of intellectual property accounts for at least a quarter of cost of cybercrime and threatens national security when it involves military technology, according to new report
Security company takes counter terror expert
Axis Security has appointed former counter terrorism police officer to join its team as a specialist
Easy encryption for cloud data security
ScramFS provides smaller businesses with easy to use encryption that clarifies the process of protecting data as well as providing compliance
Transition laundering detection for banks and e-commerce
Banks, payment processing companies and others can now benefit from a merchant risk management service to prevent transition laundering
Online biometric authentication available
A biometric authentication service will be available from Fujitsu to users in Japan starting from April 2017
ForeScout included in Gartner IoT security list
Network security company has been recognised in Gartner market report for its insight and expertise in IoT security
Cyber intrusion detection meets PCI DSS requirements
Testing reveals that the Magna intrusion detection platform from LightCyber meets PCI DSS compliance requirements
Advisory board to provide guidance on IT security directions
A group of experts has been formed to create an advisory board to LightCyber on security analytics and future technical and market directions
Research delves into enterprise IoT risks
ForeScout Technologies issues report on the risks faced by enterprises when deploying Internet of Things devices
Camera range now features built in analytics
Tyco brings intelligence to the network edge with video analytics now included on the latest range of Illustra IP surveillance cameras
VMS integration with PSIM product
Ocularis now works alongside Vidsys security management system in the latest integration to converge physical security products
Secure cloud based WiFi
Fully automatic wireless threat protection available with Watchguard WiFi Cloud for secure connectivity
Video surveillance portfolio improvements
The equip series of video surveillance cameras from Honeywell has been upgraded for improved application for business and industry
Behavioural profiling distribution network established in UK
LighCyber has established a distribution network of value added resellers within the UK for its behavioural profiling and machine learning system for attack mitigation
Web based access control software on show in Paris
TDSi is attending the Expoprotection event in Paris this month to unveil its latest GARDiS web based access control software to local audiences
Key vendor joins Adaptive Response Initiative
ForeScout Technologies is bringing CounterACT to the Splunk Adaptive Response Initiative to enable more coordinated response to advanced attacks
Majority release code without security testing
Survey from Veracode reveals the extent to which code is issued without the resolution of security issues or adequate testing
Suspect tracking added to video management system
The latest version of exacqVision video management system from Tyco includes a suspect tracking function for following objects of interest
Security for virtual car locking system
A virtual car key system for remote control using smartphones has been secured through partnership deal between Valeo and Gemalto
Automated Biometric Identity for Albuquerque police
Police department in Albuquerque adopts MorphoBIS as a cloud service for automated biometric identification
Secure single sign on for MS Azure AD
Collaboration between Microsoft and Ping Identity provides identity and access management through single sign on for Azure virtual environments
Cyber security warning to CCTV users
The BSIA is warning IP based surveillance system operators to be aware of the cyber security risks and ensure their systems are secure
Endpoint security with four critical elements
Intercept X from Sophos brings together four critical elements of endpoint security to reduce the chances of breaches
Access control contract at Newcastle university
Videx is supplying digital door entry systems for the protection of students at an accommodation development in Newcastle
Increased deployment options for privileged access manager
Centrify Privilege Service is now available in the cloud or on premises as well as through PIM as a service
Identity verification for Norwegian postal company
Posten Norge of Norway is tackling fraud and money laundering with the introduction of ID verification software from Gemalto
Angler exploit kit analysis
Kaspersky Lab takes part in the downfall of cyber criminal group responsible for the distribution of the Angler exploit kit
Vandal resistance built into perimeter protection camera
Thermal imaging camera for perimeter protection and intruder detection now features vandal resistance and video analytics
Integrated surveillance and intruder detection
Video management system from Wavestore integrated with intruder detection panels from Honeywell
Analytics and PSIM products on show at ASIS
Qognify is attending the ASIS event in Florida this year with its portfolio of VMS, PSIM and video analytics products
Incident management for PSIM products
Siveillance Viewpoint from Siemens adds command and control functions into integrated PSIM platforms
New malware campaign spreads backdoor access
ESET details the latest backdoor distribution, Nemucod which spreads ad-clicking backdoor malware
Film studio takes data access security product
Varonis has supplied Miramax with the means to set and enforce data access policies to protect the film studio's most valuable data
Consumer Internet of Things security acquisition
BullGuard is making the move into providing security for consumer Internet of Things products with the acquisition of Dojo Labs
Intruder detection systems at Security Essen
Optex is attending the Security Essen event this year with its intruder detection and people counting products
New face recognition algorithm included in SDK
The Sentiveillance 5.0 SDK from Neurotechnology now includes the latest biometric face recognition algorithms for use with CCTV surveillance cameras
IoT contributes to growth for Arxan
Mobile applications and the Internet of Things have driven increased demand for security and associated growth for Arxan Technologies
Security advice for landlords
The MLA is providing landlords with advice on safety and security ahead of the season when students return to university
Uncooled Long Wave Infrared modular camera
Stemmer Imaging releases the Calibir uncooled LWIR modular camera for multiple applications in the security and defence industries
Central management platform for wireless Protection
Sophos is providing simple protection of wireless networks through its cloud based management platform to avoid the need for on-premises servers
Unified security platform enhancements
Access control and surveillance integration as well as a new disaster recovery mode characterise the latest release of Genetec Security Center at version 5.5
Attack path vulnerability assessment
Black Hat sees the launch of ThreatMatrix Deception and Response Platform from Attivo for assessing attack path vulnerabilities
High growth in smart city security initiative
Kaspersky Lab details the progress made in the first year since the formation of the Securing Smart Cities initiative
Smartphone app keeps security operators informed
The latest VisionicGO application for mobile devices brings images and information from incidents into the hands of security operators
Cyber security for Williams telemetry systems
Thales is supplying the Williams formula one and engineering company with cyber security products for protecting telemetry transmissions
Synchronised encryption of data protection
Sophos releases SafeGuard 8 encryption product that follows data across devices and protects it from accidental leaks and theft
Fingerprint and face time and attendance
NCheck Bio Attendance is a new time and attendance system that makes use of either face or fingerprint biometric data
CCTV distributor protects premises with IR detectors
Perimeter security products from Optex are being used as part of the physical security to protect UK CCTV equipment distributor
Encryption ransomware discovery
PhishMe details the latest discovery of ransomware that using encryption and delivered by RockLoader.
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo