Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Violent criminals convicted with help of Smartwater evidence
Smartwater forensic trace evidence on shoes belonging to a suspect helped lead to the capture of three violent criminals in the UK
Mobile key services integrated with access control system
Salto Systems and Zaplox have integrated their products to provide the hospitality industry with combined access control and cloud based mobile key services
Video door entry panels for apartment complex
The former foreign missionary college in London has been converted to flats and has been secured using digital video door entry panels with power over ethernet
Protection from malicious mobile apps
Corporate defence software from Proofpoint provides organisations with protection against vulnerabilities on mobile smartphone devices
Stopping the insider threat
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme
The IoT Botnets are Coming: Are You Prepared?
Rishi Agarwal of NSFOCUS provides some insight into the security vulnerabilities associated with the Internet of Things and what is being done to prevent them from being exploited
Secure radio storage and tracking
UK highways contractor takes secure storage facility for issuing and controlling its airwave radios
Smartphone app for surveillance technicians
The GURU Smartphone app from March Networks provides security surveillance technicians with improved troubleshooting and diagnostics capabilities
Common video interfaces for vertical applications
Ocularis integrations certified for vertical markets including banking, access control and licence plate recognition
NIST accolade for tattoo recognition technology
The National Institute of Standards and Technology has praised the capabilities of tattoo recognition technology from Morphotrak
Effective archiving to avoid data swamps
Eileen Sweeney, SVP and General Manager of Data Management at Iron Mountain examines how organisations can avoid drowning in a swamp of data with the use of effective archiving strategies
Securing the IoT with the Help of Multi-Factor Authentication
David Hald of SMS PASSCODE explains how multi factor authentication can be used as a robust security measure for the Internet of Things
How wireless surveillance could help in Calais crisis
Vemotion explains how the use of a wireless network infrastructure for security surveillance systems could provide critical protection for drivers embroiled in criminal migrant activities in Calais
Entry level video analysis appliance
Dallmeier releases the DVS 800 IPS video analysis appliance for analysing up to four video channels
VMS certification for rugged NVR
A highly rugged NVR for use with multiple cameras in transport applications has received Milestone certification for use with the XProtect video management system.
The importance of critical infrastructure protection
Rob Lay, Enterprise and Cyber Security Solutions Architect in UK and Ireland at Fujitsu explains why better security is needed for critical infrastructure
Continued access to corporate data for ex-employees
Survey by Centrify shows how common it is for former employees to continue to have access to corporate data after they have left the company.
High quality surveillance equipment to meet SME budget needs
Tyco releases IP surveillance camera and NVR range targeted at the small and medium sized business sector
Financial audit company offers web security services
Partnership with High Tech Bridge brings web application security services to clients of PriceWaterhouseCoopers of Switzerland.
Threat intelligence unit formed for mobile security
Mobile security company AdaptiveMobile is sharing its expertise in best security practices as part of its newly formed Threat Intelligence Unit.
Survey reveals internet romance dangers
BullGuard has been polling internet daters to uncover the true risks of providing too much personal and financial information to strangers.
Next generation firewall with web filtering for schools
Barracuda Networks is targeting the education sector with its latest Firewall product with web filtering to improve school cyber security
High cost of data breaches for UK businesses
The way UK businesses approach security product implementation needs rethinking, according to Sophos network security expert
Malware attacks target public sector
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector
Identity protection in the internet of things
Eve Maler of ForgeRock discusses the opportunities afforded by the Internet of Things and the possible identity perils that could be faced
Physical security breaches continue to outweigh cyber attacks
Vanderbilt survey shows extent of physical security breaches suffered by organisations with nearly three times as many taking place then cyber attacks
Things to consider when adopting an IoT strategy
Mark Lee of Intamac explains the considerations that need to be taken into account when executing a strategy involving the internet of things
Video analytics integrated with monitoring software
Agent Vi video analytics is now available as an integrated feature on the Immix central monitoring software
Award success for Network Access Control platform
CounterACT from ForeScout Technologies has been judged to be the best NAC solution in the SC Magazine awards this year
VMS supports body worn cameras
Genetec expands support for body worn camera equipment in the latest release of the Security Center video management system
Security association members to speak at UK event
Experts from BSIA member organisations will be making scheduled appearances as part of the conference programme taking place at IFSEC this week in London
Vulnerability management and real time assessment partnership
ForeScout is extending its range or interoperability with a new partnership with vulnerability assessment specialist, Qualys
IP cameras with VMS on board
SD storage and onboard video management system feature on the new Illustra Edge HD video camera from Tyco
ONVIF compliant high performance dome camera
Pelco has added to its range of dome cameras with the Spectra Enhanced series with low latency PTZ and single cable PoE installation
Key management integration with access control
KeyWatcher key control system is now integrated with Tyco access control and security management system
Private sector could offset council CCTV cuts
As more councils are reducing expenditure on surveillance, the BSIA suggests that the private sector also has some part to play in crime detection
ICO reports fall short of real level of UK data breaches
Data Protection Act breaches could be more than ten times the levels reported to the Information Commissioners Office in the country
Wireless represents highest vulnerability according to survey
Fortinet reveals the results of a survey it conducted in which IT decision makers state their belief that wireless networks represent their highest vulnerability
Funding call of IoT trust and security hub
The Engineering and Physical Sciences Research Council is working with a number of universities on the creation of a hub to address privacy, trust and security in the Internet of Things
4K surveillance system on show at IFSEC
Panasonic will be attending IFSEC this year with its range of 4K resolution cameras, NVR and video screen walls
Tokenization for protection of cloud data
CipherCloud is now offering Next Generation Tokenization as an additional method of protecting data that resides in the cloud
IT security interoperability demos at Infosecurity Europe
ForeScout Technologies is attending Infosecurity Europe with demonstrations of ControlFabric based interoperability in conjunction with major partners
Intelligent packet capture for improved incident response
Lancope is at the InfoSecurity event this week in London with its PacketWatch product for intelligent packet capture
Report analyses 1Q2015 IT security events
Panda Security examines the IT security landscape during the first quarter of the year with trojans continuing to be the most common threat
Open architecture compliance for security management system
The Synergy 3 security management platform from Synetics conforms to the open surveillance profile S specification from ONVIF
DESFire relay attack protection for access control
Nedap has engineered protection into its proximity readers against fraudulent read distance extensions using relay attacks
Surveillance in banking webinar
March Networks provides insight into the way analytics can be used with surveillance technology to improve banking security in a new webinar
Survey gauges data destruction service buying patterns
The British Security Industry Association is performing research amongst commercial users of buying behaviour for data destruction services
Rationalising the network at large European print supplier
Barracuda Networks has helped Papergraphics to rationalise its network over multiple remote locations to integrate backup, archiving and network security
SSD storage for industrial and commercial use
The latest solid state drives from SanDisk can replace hard drives in many commercial and industrial embedded computing systems such as signage
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo