Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
 
News By Date
Extreme Computing CPU Card For DVR Equipment
Optics and components : 09 June, 2010
Axiomtek has produced a full size CPU board with the latest Intel chipsets for use in demanding processing environments such as DVR equipment for the security market
 
Passive RFID Tag For Manufacturing Tracking
Tracking and EAS : 09 June, 2010
Designed with a long read range, the passive RFID tag from Daily RFID is robust enough to handle harsh manufacturing environments to deal with tracking of work in progress
 
Day/Night Colour CCTV Camera With Flicker Compensation
Analogue and HD Cameras : 09 June, 2010
Smartec's STC-3002 CCTV camera employs Sony CCD for high quality colour imaging even at low light levels. The camera also has DIP switch settings including compensation control for image flicker due to interference from fluorescent light sources
 
Infra Red and White Light Explosion Protected LED Illuminators
Lighting : 09 June, 2010
The Warrior II range of LED illuminators available through Norbain provide high performance illumination with low energy consumption in hazardous areas
 
Parents Obtain Clear Picture Of Their ChildrenÃÂÃâ€ÂÃâ€Âs On Line Activities
Internet Security and Content Filtering : 09 June, 2010
Internet monitoring software from Pandora is providing parents with more than simply a filtering tool but a guide to how their children are spending their time on the internet
 
ADT Installs Brivo OnSite SE/XE Access Control At Web Hosting Company
Networked Access Control : 09 June, 2010
Access control system enables segregation of access rights between customers, employees and vendors with diverse access mechanisms including biometric sensors, keypads and proximity readers
 
Mitigation of Data Loss On Stolen Laptops
Data Protection : 09 June, 2010
With laptop theft reaching as much as 10%, the risk of losing more than just the equipment is extremely high unless certain measures are taken to reduce the impact of losing hardware, as explained by Belinda Sproston of Check Point
 
Challenging Patch Update Closes Sharepoint and Internet Explorer Vulnerabilities
Anti-virus and anti-malware software : 09 June, 2010
Jason Miller of Shavlik Technologies comments on this week's patch release from Microsoft which contains two important bulletins which should be prioritised as a matter of priority
 
Multiple Security System Integration Achieved With NetDVMS at Los Angeles Schools
Video Management Systems : 09 June, 2010
NetDVMS Video Management System from OnSSI chosen for Los Angeles religious school complex for its ability to integrate disparate physical security systems
 
Analytics Triggered Mobile Phone Event Dispatcher
Video Analytics and ANPR : 09 June, 2010
The Vi-System Event Dispatcher provides real-time event notification over mobile networks based on events triggered by video analytics
 
Trustmarque Clients Gain Insight Into Cloud Computing, Social Media and Virtualisation
Cloud Computing Security : 09 June, 2010
Technology specialist from Gartner addresses Trustmarque customer event on the need to embrace new technologies in the IT industry including the use of social media tools such as Twitter
 
Intelligent Web Filtering and E-Mail Gateway from Sunbelt
Internet Security and Content Filtering : 09 June, 2010
Sunbelt Software has released to new products in its Vipre range, an E-Mail Gateway and a web filtering appliance
 
Multi-Modal Mobile Biometric Platform
Face Recognition : 09 June, 2010
HRS has linked iris, face and fingerprint recognition technology to fulfil a range of biometric identity requirements in the field including the matching and identity of latent fingerprints in forensic biometric applications
 
Free White Paper Deals With Five Main Threats From Social Networking
Internet Security and Content Filtering : 09 June, 2010
ISACA has been examining social media and related threats, identifying the top five threats to businesses and detailing the handling of these threats in a free white paper available from the organisation's web site
 
Security and Compliance In One Package For Enterprise Servers
Anti-virus and anti-malware software : 09 June, 2010
Total Protection For Server from McAfee combines malware protection with policy enforcement and compliance reporting for servers
 
Application Security Testing Reseller Agreement
Software Asset Management and Compliance : 09 June, 2010
Veracode and Accuvant have reached an agreement on the sale of Veracode's SecurityReview, SecurityInsights and e-Learning products for assisting enterprise application risk management
 
Over the Counter Issuing For Arkansas Driving Licences
Biometric passports, ID and licenses : 09 June, 2010
3M Security Systems is providing equipment and services to support the production of high security biometric driving licences for the American state of Arkansas
 
Survey Shows Extremely Low Levels Of Firewall Auditing
Network Security, Routers and Data Centres : 09 June, 2010
IT Professionals surveyed by Tufin Technologies admit to cheating during IT audits and taking firewall audits as little as once in five years
 
Two-Factor Authentication For iPhones
Mobile computing security : 09 June, 2010
DoubleSec from DSwiss provides easy to use automatic two-factor authentication for iPhones using refreshed token stored on the device
 
Mobile Phone Security Advice For World Cup Fans
Mobile computing security : 09 June, 2010
Symantec is raising awareness levels of threats posed to world cup fans using mobile phones to stay abreast of events, offering advice on physical security and also in preventing becoming a victim to malware, phishing or other targeted exploits aimed at mobile users absorbed in the matches
 
New Jersey Main Roads Added To Traffic Camera Coverage
Traffic Control and Enforcement : 09 June, 2010
Live roadside traffic camera broadcast on national network now encompasses two traffic authorities covering main routes through the state of New Jersey
 
Armoured System Distribution Agreement For Latin America
PPE, Clothing and Uniforms : 09 June, 2010
SystemsGroup Technologies to act as distributor for Twenty-First Century Armor Solutions for the delivery of armoured products into the Latin American market
 
WNBA Sweepstake Promotes Identity Theft Protection
Data Protection : 09 June, 2010
Phoenix Mercury and LifeLock are jointly promoting identity theft protection amongst sports enthusiasts with a summer sweepstake
 
Cyber Operations Centre Deal Struck Between ArcSight and SAIC
Anti-virus and anti-malware software : 09 June, 2010
SAIC and ArcSight to combine skills in risk management consulting and enterprise threat mitigation under one roof through the companies' Cyber Security Operations Centre
 
Compliance Reporting Simplification Using Windows Remote Management
Software Asset Management and Compliance : 09 June, 2010
Remote reporting using Avecto Privilege guard can be achieved for generating compliance reports across the enterprise
 
Gemalto Meets MasterCard Requirements For Consulting Services
ID cards and smart cards : 09 June, 2010
The consultancy arm of Gemalto has received valuable accreditation from payment card company, MasterCard
 
Distribution Award For Bell Micro From Hitachi
Backup, Data Recovery and Disaster Recovery : 09 June, 2010
Hitachi Data Systems recognises Bell Micro for its distribution services in EMEA of the company's business continuity and storage management products
 
Anti Money Laundering Application For Financial Services Company
Anti Fraud software : 09 June, 2010
Penson Financial Services has taken Actimize Suspicious Activity Monitoring software to take precautions against the threat of fraud and money laundering
 
Digital Rights Management Discussion at Connections 2010
Software Rights Management : 09 June, 2010
CTO at Arxan joins panel at Connections 2010 to debate digital rights management, conditional access and payment models
 
Instant Recovery Through Continuous Data Protector
Backup, Data Recovery and Disaster Recovery : 09 June, 2010
FalconStor has released the Continuous Data Protector appliance aimed at smaller businesses for enabling instant recovery
 
Improved Screening Accuracy at Version 5 of dn:Director
Anti Fraud software : 09 June, 2010
Datanomic has upgraded its Risk and Compliance Screening software for greater protection against fraud in global markets
 
Entry Level Wireless Access Points For Low User Count
Network Security, Routers and Data Centres : 08 June, 2010
Aruba Networks capitalizes on its market share with the introduction of the AP-92 and 93 single radio 802.11 wireless access points
 
Control Room Software Integrates Alarm and CCTV Monitoring Systems
Monitoring : 08 June, 2010
Merlin 3 has been released by Initsys to enable existing control rooms to integrate disparate security systems bringing faster response to alarms and integrating to analogue or IP based surveillance systems
 
Advanced IP Surveillance System Brings Operational Benefits To Irish Shopping Complex
Video Management Systems : 08 June, 2010
The XProtect Enterprise open platform IP video management system from Milestone and cameras from Axis Communications have enabled the Douglas Village shopping centre to improve operational effectiveness and customer service through the use of innovative IP enabled technologies such as people counting, parking systems and number plate recognition
 
Dual Sensor Cameras Capture Number Plates in Korean Road Tunnel
Video Analytics and ANPR : 08 June, 2010
Arecont Vision has overcome the ANPR challenge of megapixel cameras with a dual-sensor system which is being used for number plate recognition to recognise vehicles violating traffic signals in a dimly lit tunnel in Korea
 
Higher Power For External Amplifier System
Alarm signalling, transmission and notification : 08 June, 2010
The PowerChiton amplifier from Technomad is a weatherproof unit designed for use in outdoor distributed voice communication systems
 
SharePoint Vulnerability Waits Nearly Two Months For A Patch
Anti-virus and anti-malware software : 08 June, 2010
Imperva comments on the Microsoft patch release cycle and the open vulnerabilities it leaves businesses with
 
UK Ruling Dismisses Passive Involvement Defence For Pirate Film Distribution
Software Rights Management : 08 June, 2010
Enabling communications to download film materials illegally judged in UK court to be an infringement of copyright laws in landmark legal case brought by 20th Century Fox
 
CESG Certification for VigilancePro
Data Protection : 08 June, 2010
Assessment against CESG criteria determines that VigilancePro from Overtis meets the requirements of protecting sensitive data both at rest and during transmission
 
Packaging and Authentication Experts Attending PABS 2010 in October
Exhibitions and Trade Shows : 08 June, 2010
The PABS 2010 conference will cover packaging and labelling design with the purpose of protecting brand identity and achieving product authentication objectives
 
Autorun Feature Tops List As Biggest e-Threat For May
Anti-virus and anti-malware software : 08 June, 2010
BitDefender's e-threat report for May demonstrates the continued exposure caused by Microsoft's autorun feature which creates vulnerabilities with the use of flash drives and other external memory devices
 
Technology Agreements Brings Enhanced Protection Against Online Threats
Anti-virus and anti-malware software : 08 June, 2010
RSA and Check Point have agreed to share real-time threat intelligence to provide improved protection to consumers against viruses, trojans, phishing attacks and other threats
 
Structured Cabling Contract For Aberdeen Schools
Camera networks : 08 June, 2010
Three Scottish schools will gain Uniprise copper structured cabling from Mayflex to meet requirements for voice, data and video communications
 
Internet Monitoring and Surveillance Software Adoption Increases In Europe
Internet Security and Content Filtering : 08 June, 2010
Snapguard has seen key wins in the European market for the Spector 360 PC and internet monitoring software bringing benefits to both public sector and corporate organisations
 
UDT Forms Partnership To Take Part In Federal and Law Enforcement Bids
Sensors, chemical and drug detection : 08 June, 2010
Universal Detection Technology is aiming for sole source contracts from law enforcement agencies across America for its anti-terrorism detection equipment in joint venture set up with Emergency 911 Security
 
Desktop Luggage Screening Equipment Order For US Airports
Bomb and explosives detection : 08 June, 2010
Smiths Detection will supply the Transportation Security Administration with further Ionscan 500DT trace detectors for use at airport checkpoints to check hand carried baggage for explosives using swabbing
 
Secure Computing Environment on A Flash Drive
Data Protection : 07 June, 2010
The RocIT Defender Elite is a virtual computing platform located on a secure flash drive with 256-bit encryption offering secure computing in any location
 
SynergyPro VMS Integrates Full JVC IP Camera Range
Video Management Systems : 07 June, 2010
Synectics has integrated the IP cameras in the JVC range to become interoperable with the company's SynergyPro video management system
 
Critical Infrastructure Security Summit Takes Place Mid June
Training courses, Seminars and Conferences : 07 June, 2010
The protection of utility control systems from cyber threats to be the subject of this year's critical infrastructure summit with latest technology advances being discussed
 
Event Data Recording Standard for Motor Vehicles Launched
Trade Organisations, User Groups and Pressure Groups : 07 June, 2010
Automotive black box data protection addressed in the latest standard from IEEE with IEEE 1616a aimed at the standardisation of event data recorders used in motor vehicles
 
First | Prev  | 1 | 2 | 3  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo