Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Bank protects data from insider threats
Union Bank is using DatAdvantage from Varonis as part of its protective measures to secure sensitive data from insider threats
Segmented access and alarm system in St Albans office building
An office building serving start-up businesses in St Albans has improved security with individual access control and alarm systems from Amthal
Low awareness on how to secure the IoT
BullGuard survey shows few consumers know how to protect against IoT cyber threats despite two-thirds being concerned about security
Residential development fitted with video door entry system
A central London residential project is benefitting from IP video door access control for improved security for its occupants
Video management system with hardware decoding
Camera Station 5 has been released by Axis Communications to provide video management for medium sized installations
Network visibility survey shows enterprise vulnerability
Security blindspots in Global 2000 Enterprises highlight the need for greater visibility across the network to prevent security breaches.
Lack of high level trust in data sharing security
Survey amongst senior IT professionals has found that there is little confidence in the security of data sharing processes
Mac ransomware derived from Linux trojan
Bitdefender discovers the Linux.encoder trojan is the basis for the first piece of ransomware for Mac OS X devices
Sandbox technology stops advanced threats
Sandstorm NG sandboxing has been added to Sophos Email Appliance to provide advanced detection and mitigation of cyber threats
Security company celebrates women in the industry
A Women in Security event has been held for International Women's Day by Securitas at its Milton Keynes ops centre
Online activity reporting tool for schools
Safeguarding reports based on alerts available for plugging into web filtering products and providing information to schools of risky behaviour
Report examines encryption trends
Privacy compliance and increased risk driving more corporate plans to deploy encryption technology on-premises and within the cloud
Website security without passwords
Authentication service from iovation provides website administrators with a secure and user friendly alternative to password authentication
Real time Active Directory protection
Privileged Threat Analytics from CyberArk provides real time detection and automatic containment of threats affecting Active Directory
Single point of control for security management
The R80 security platform from Check Point provides corporate IT security managers with single point security management
VMS product accommodates increased video performance
The Cayuga R7 video management system from Seetec has undergone significant changes to provide higher bit rates and new features to meet increasing CCTV system performance and scalability requirements
PSIM for railway security on show in Dubai
CNL Software is attending the Middle East Rail event in Dubai to showcase its Physical Security Information Management system
Locksmith association partnership
The MLA has joined forces with its Irish equivalent to share resources and promote the locksmithing industry
Keeping teenagers on the cyber straight and narrow
Tripwire provides advice on how parents can guide their teenagers on how to avoid dabbling in cybercrime and educate them about cybersecurity
MWC presentation looks at whether Mobile and IoT security is good enough
BeCrypt is attending Mobile World Congress next week with a presentation from its CEO on the adequacy of security for mobile systems and the IoT
US prisons counter contraband with through body scanners
Dutch detection equipment company has taken order for three body scanners for use in prisons in the USA to scan prisoners and visitors for drugs and contraband
Security company gains high employee ranking
The list of the UK top 400 companies to work for includes security services supplier Securitas
Lone worker app reaches award finals
A smartphone app for providing protection for lone workers has reached the finals of the Surrey Digital Awards
Survey measures cyber attack detection confidence
Tripwire looks at the responses to a survey that looked at endpoint cyber attack detection using seven key security controls
Zero day endpoint protection
SandBlast Agent from Check Point brings advanced zero day protection directly to endpoint devices regardless of their mobility
High definition video for monitoring wildlife
A video management system from Milestone is at the heart of a surveillance monitoring tool in use in Australia for monitoring the behaviour of ospreys
Wireless network locks with iLock app
Mobile connectivity and bluetooth feature on the new ArchiTech Designer wireless network locking systems available from Alarm Locks
Ensuring security in new homes
The MLA provides advice to home buyers on making security assessments and preventing domestic crime
Face biometrics help protect Macau casinos
The gambling industry is securing its premises in Macau from banned people with the use of biometric face recognition technology
Survey shows disturbing online habits of teenagers
On Safer Internet Day, Kaspersky Lab urges parents to be more active in monitoring teenager activities to prevent them lurking in the darker corners of the web
Survey sheds light on working practices in IT
AlienVault has conducted a survey into the working lives of IT professionals and the way in which they're treated in the workplace
Cloud based endpoint privileged account security
Viewfinity provides cloud based integrated privileged access management with application control without user experience compromise
IP reputation service integration with NG firewall
BrightCloud Threat Intelligence reputation service from Webroot has now been integrated with the next generation firewalls offered by Palo Alto Networks
Card Quality Management certification for HID Global
MasterCard certification affects HID Global dual interface inlays used in the payment smart card and banking industry
Security event to feature home automation
The IFSEC International event taking place in London during June will feature a new Smart Home zone dedicated to home automation security
Advice on addressing EU Data Protection Regulation challenges
Iron Mountain provides details of the new EU Data Protection Regulation and what businesses need to do in order to address the associated challenges
Report summarises Windows vulnerabilities in 2015
A comprehensive analysis is available on 2015 vulnerabilities and new security features for Microsoft Windows during 2015
Security for mobile messaging apps
AdaptiveMobile has produced an API for carriers for improving security for mobile message app users such as WhatsApp and FB Messenger
Unified appliance for 4G and LTE protection
Telecom security appliance from Clavister brings high levels of protection from security threats on 4G and LTE mobile networks
Agentless security for VMware environments
Virtualization security provides agentless protection in VMware vShield applications
VMS provider joins surveillance specialist at SICUR event
Canon will be joined by Wavestore at the SICUR 2016 event taking place in Madrid during february to showcase their integration
Further trends in PSIM use for security
Erez Goldstein of Qognify looks at the ways in which PSIM and situation management software will be used in the security industry in 2016
Android malware steals information
Kaspersky Lab discovers new Android malware that targets smartphone users for financial fraud
Multi-biometric cloud identification for US Police
Police in Albuquerque are upgrading from fingerprint biometrics to a multi-biometric system operated in the cloud for identification tasks
Networking and storage systems on show in Dubai
Veracity is at Intersec this week in Dubai with its range of products for video surveillance networking and storage
Oil and Gas industry cyber-attacks increase
Study from Tripwire concludes that the majority of IT security professionals in the oil and gas industry are seeing an increase in cyber attacks
Credential compromise a key IT security concern
Research amongst security professionals reveals that nine out of ten consider compromised credentials to be a top concern
USB memory devices left at dry cleaners often never returned
A survey from ESET amongst dry cleaners uncovered the proportion of USB memory sticks and mobile phones that are left in pockets and never get claimed
TV streaming stick leaves home networks vulnerable
Check Point uncovers vulnerability that allows hackers to infiltrate home network through a TV streaming stick
New iteration of Linux encoder ransomware discovered
Bitdefender is offering a free tool to unlock files affected by the latest iteration of the Linux Encoder ransomware
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo