|
|
|
|
|
|
|
|
|
|
|
|
|
Coaxial telemetry control on Quantum Plus DVR Range |
|
|
Recording Media, DVR, Video Servers and Data Servers
: 08 January, 2010 |
Remote device control can now be achieved on the Quantum Plus DVR range from Vista with the inclusion of coaxial FSK telemetry control |
|
|
|
|
 |
|
|
Address at ESX 2010 covers overcoming adversity |
|
|
Exhibitions and Trade Shows
: 08 January, 2010 |
Famous local super bowl hero has been invited to provide the main address on overcoming adversity during lunch on the 16th June at the Electronic Security Expo in Pittsburgh in June
|
|
|
|
|
 |
|
|
|
|
Angolan ID card follow-on order for LaserCard |
|
|
Biometric passports, ID and licenses
: 08 January, 2010 |
Optical media-based cards will be supplied to the Angolan Government from LaserCard to satisfy the country's ongoing ID card program |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
Screening isn’t enough to stop airline terrorism |
|
|
Government Departments
: 08 January, 2010 |
Borderpol believes too much focus is being placed on technology for screening aircraft passengers and not enough is being done on intelligence sharing between nations to prevent terrorists from boarding aeroplanes in less stringent nations |
|
|
|
|
 |
|
|
|
|
The Office Software released to combat cyberslacking |
|
|
Internet Security and Content Filtering
: 08 January, 2010 |
Pandora has created a software tool for businesses to monitor network and web activity to highlight and report employee activities in an effort to kerb the growing problem of IT related poor productivity in the workplace |
|
|
|
|
 |
|
|
Counter Terrorism efforts need greater vigilance |
|
|
Exhibitions and Trade Shows
: 08 January, 2010 |
Recent attempted bombing of airliner in the US demonstrates the existence of systematic failures and too much reliance on human factors in counter terrorism efforts |
|
|
|
|
 |
|
|
|
|
Police computer misuse inevitable without protective monitoring |
|
|
Data Protection
: 08 January, 2010 |
According to 3ami, police and civilian workers are no different from the rest of the community in terms of their IT usage habits and a protective monitoring system is a requirement to prevent abuse and misuse of resources |
|
|
|
|
 |
|
|
Crime analysis expert joins IxReveal as Product Development VP |
|
|
Intelligence Software and Knowledge Management
: 08 January, 2010 |
As Vice President of Product Development and Sales Support at IxReveal, ex-Jacksonville Sheriff's Office intelligence expert has insight into the customer side of criminal intelligence analysis |
|
|
|
|
 |
|
|
Single Sign-On Initiative gains new members |
|
|
Data Protection
: 08 January, 2010 |
Two further SaaS companies have joined Ping Identity's SaaS Partner Program taking advantage of cloud based single sign-on access availability |
|
|
|
|
 |
|
|
Easy interface for PC and Mac backup software |
|
|
Backup, Data Recovery and Disaster Recovery
: 08 January, 2010 |
Dmailer Backup has added enhancements for PC and Mac users as well as a new user-friendly interface making the online backup and restore software easier to use |
|
|
|
|
 |
|
|
New application security attack vectors forecast |
|
|
Internet Security and Content Filtering
: 08 January, 2010 |
Denim Group foresees a change in the way web applications are attacked and provides details of the possible attack vectors that could develop in 2010 |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
|
|
Long range thermal imaging performance from narrow field SR-304 |
|
|
Thermal Imaging and Infrared Cameras
: 07 January, 2010 |
The clear thermal images associated with FLIR's SR series of cameras has been extended into a longer range version with human detection capabilities of over 2km due to narrow field of view on the SR-304 model |
|
|
|
|
 |
|
|
|
|
|
|
Remote monitoring system donated to Solent rescue service |
|
|
Monitoring
: 07 January, 2010 |
Gosport and Fareham Rescue Service for the protection of inshore marine activity on the River Solent receives surveillance and perimeter protection monitoring donation from Xtralis to protect the charity's unmanned premises from criminal activity |
|
|
|
|
 |
|
|
|
|
|
|
Alabama anthrax scare analysis reveals hoax |
|
|
Sensors, chemical and drug detection
: 07 January, 2010 |
Despite further anthrax hoaxes bringing the total to 900 over the last two years, the FBI and Universal Detection Technology warns recipients of white powder through the post to treat each as a real threat and to use detection technology to analyse the threat |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Simple re-keying for bump resistant residential locks |
|
|
Locks, shotbolts, solenoids and actuators
: 07 January, 2010 |
Schlage will be at the International Builders Show demonstrating innovative residential door locks that are resistant to picking and bumping and allows the lock to be re-keyed in a simple two-step process |
|
|
|
|
 |
|
|
Mobile security market examined in latest Frost report |
|
|
Books, magazines, journals, analysis and reports
: 07 January, 2010 |
Securing mobile endpoints is a growth market instigated by significant consumer take-up of Smartphone devices according to a report available from Research and Markets |
|
|
|
|
 |
|
|
|
|
|
|
Army approvals for Control Room Management Suite |
|
|
Control Rooms
: 07 January, 2010 |
Barco's Control Room Management Suite Software has received the Certificate of Networthiness from the US Army, acknowledging the quality standards that are implied by certification |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Home monitoring kits from Intamac and D-Link |
|
|
Security in the Home
: 07 January, 2010 |
Home monitoring expert Intamac and networking giant D-Link have joined forces to provide two new monitoring systems for providing ease of sensor connection and delivery of monitoring information for home security and energy management |
|
|
|
|
 |
|
|
Stealth Data Encryption to Assist US Special Operations Command |
|
|
Data Protection
: 07 January, 2010 |
Unisys and Advanced C4 Solutions to work with US Defence Information Agency to develop network and storage protection solutions using data encryption and bit-splitting to simplify network communications without compromising on levels of data security |
|
|
|
|
 |
|
|
Privileged Access Management company hires new CEO |
|
|
Network Security, Routers and Data Centres
: 07 January, 2010 |
Incoming Chief Executive at e-DMZ security charged with the task of leading the company through expected high growth rates in the privileged user identity and network access control markets |
|
|
|
|
|
|
First | Prev | 1 | 2 | 3 | Next | Last |