Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
 
News By Date
CCTV surveillance protects Walsall residents
IP and Megapixel cameras : 19 February, 2015
West Midlands social housing provider replaces patrols with CCTV surveillance cameras to provide resident protection
 
Device timer regulates offline use of endpoints
Network Security, Routers and Data Centres : 19 February, 2015
Absolute Computrace enables network administrators to set offline usage policies with a trace and freeze options for endpoints
 
Biometric protection for data centre cabinets
Safes and Secure Storage : 19 February, 2015
Cabinet locks with in-built biometric authentication technology are being supplied for the high security data centre industry
 
Hardware encrypted flash drives now available as USB 3.0 devices
Data Protection : 19 February, 2015
IronKey increases data read and write speeds to its latest addition to its secure flash memory storage with the adoption of USB 3.0 connectivity
 
Secure debit card printing facility installation at Greek bank
ID cards and smart cards : 19 February, 2015
A bank in Greece has taken the Fargo printing system from HID Global for the secure production of EMV debit cards for its customers
 
Eight reasons to deploy multi-factor authentication
Authentication : 19 February, 2015
David Hald of SMS Passcode provide compelling reasons why Multi-Factor Authentication should be implemented for greater security
 
Mobile NFC protects UAE telecoms company
ID cards and smart cards : 19 February, 2015
The Etisalat telecommunications company has taken mobile phone based NFC authentication from Gemalto for providing single-tap access control to its corporate facilities
 
Pre-infection threat detection acquisition
Anti-virus and anti-malware software : 19 February, 2015
Check Point goes to the next step of threat detection with the acquisition of a company which provides CPU-level malware prevention technology
 
School energy savings with wireless access control
Electronic Locking Systems : 18 February, 2015
Upgrading mechanical door locks to battery operated systems using Aperio wireless access control can save thousands a year off school energy costs
 
Integrated surveillance for European railway operator
Camera networks : 18 February, 2015
Digital Barriers gains a win in the transport sector with an Integrated Surveillance Platform installation in challenging locations for a railway operator in Europe
 
PSIM developer opens operations in Abu Dhabi
Security Management Systems and PSIM : 18 February, 2015
Masdar City's Incubator Building in Abu Dhabi has become the home of PSIM supplier, CNL Software's new Centre of Excellence
 
Five steps to secure iterative software delivery
Data Protection : 18 February, 2015
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process
 
Cloud service for using Android trusted environment
Mobile computing security : 18 February, 2015
Android app developers requiring data protection against malware from other software loaded on devices can now make use of the MyTAM cloud service for employing on-device Trusted Execution Environment
 
Arabic cyber espionage aims at high profile targets in Middle East
Anti-virus and anti-malware software : 18 February, 2015
The Desert Falcons group has been discovered by Kaspersky Lab to be on a cyber espionage campaign that specifically targets high profile people and companies from the Middle East region
 
Defending company assets against the latest onslaught of cyber attacks
Data Protection : 18 February, 2015
Kalyan Kumar of HCL Technologies looks at the best defence strategies that organisations can use to protect themselves from increasingly sophisticated and effective cyber threats
 
Hardware security modules provide clinical trial security
Data Protection : 18 February, 2015
Digital signing of documents associated with clinical trials is being protected with the use of nShield hardware security modules from Thales E-Security
 
Company enters collaboration for military cyber protection
Network Security, Routers and Data Centres : 16 February, 2015
Critical communications systems of military forces will gain enhanced protection through a partnership involving cyber security experts at Clavister
 
Video analytics for automatic intruder detection
Intruder alarms : 16 February, 2015
Partnership between Stanley Security and Digital Barriers brings added automation to intruder detection with the use of video analytics on Axis camera equipment
 
Open Video Management System certification for surveillance storage system
Video Management Systems : 16 February, 2015
Milestone Systems has now tested and reported performance component certification of BCDVideo’s Nova Server and Storage Series for video surveillance systems
 
Could wearable technology pose a threat in the workplace?
Network Security, Routers and Data Centres : 16 February, 2015
Alessandro Porro of Ipswitch discusses the predicted increase in wearable technology and what this could mean to the cyber threat landscape in the workplace
 
Key-free digital lock for commercial glass doors
Locks, shotbolts, solenoids and actuators : 16 February, 2015
The Shine product from locking expert ASSA ABLOY enables commercial glass doors to be fitted with keyless digital locking systems
 
Dutch DDoS event demonstrates economic asymmetry of cyber attacks
Data Protection : 16 February, 2015
Thales UK comments on the ability for low-cost IT tools to be used to create economic havoc in commercial and administrative organisations
 
A billion data records compromised during 2014
Anti-virus and anti-malware software : 16 February, 2015
The 2014 Breach Level Index from Gemalto shows an almost fifty percent increase in data breaches to over 1 billion compromised records
 
Adaptive threat protection from multiple sources
Anti-virus and anti-malware software : 16 February, 2015
Tripwire's Adaptive Threat Protection product has been expanded to incorporate more sources of threat information
 
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo