Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
Alarm Receiving Centres can be in-house or purchased as a service. The function of the ARC is to monitor alarms and take appropriate action. The action taken can differ depending on the client, the nature of the alarm and any additional information received when the alarm is triggered. Modern alarm systems often have false alarm detection capabilities or confirmation technology involving, for example, the triggering of a PTZ camera to perform surveillance operations. These technologies enable informed decisions to be taken regarding the alarm call. ARCs typically handle multiple types of alarms such as intruder alarms, perimeter breaches, fire alarms and lone worker protection.
Adaptive threat protection from multiple sources
Tripwire's Adaptive Threat Protection product has been expanded to incorporate more sources of threat information
Open Video Management System certification for surveillance storage system
Milestone Systems has now tested and reported performance component certification of BCDVideo’s Nova Server and Storage Series for video surveillance systems
Fire and Security specialist invests in new office campus
Chubb's Blackburn premises will undergo a complete transformation beginning this year to create improved facilities for its affiliate companies
Security essentials course to be held in Oslo
A six-day intensive course on IT Security essentials will take place as part of the SANS Oslo event that takes place in March
Large contactless payment card deployment in South American universities
A Brazilian bank is at the forefront of a deployment of contactless EMV cards to students in universities in Brazil
Continuous monitoring and mitigation protects European digital classified ads platform
European home and vehicle classified ads platform provider selects CounterACT from ForeScout Technologies for improved network endpoint visibility and management
Controlled secure file sharing for university data
Varonis has supplied Liverpool University with DataAnywhere to enable controlled and secure remote data storage for file sharing without using insecure public cloud services
Android app for remote video monitoring
Video Management System supplier, Mirasys has released the Spotter Mobile 7 app for remote video monitoring from Android devices
Securing digital identities amongst the Internet of Everything
Neil Chapman, Senior Vice President & Managing Director EMEA at ForgeRock delves into identity management and security in connected home and lifestyle electronics
Unlicensed security company falls foul of immigration offences
A London security company director has been jailed for operating with illegal immigrants and forging documentation
Missing patch detection and vulnerability assessment scanning
The latest version of LanGuard from GFI Software provides companies with improved network device vulnerability assessment including the detection of missing patches
Security Solutions to attend locksmith event in UK
The UNION brand from Security Solutions will be at the forefront of the company's innovative product range being shown at this year's Locksmith Expo taking place in Nottingham
Anthem attack demonstrates need for more than static defence
Jonathan Whitley of WatchGuard explains the improvements needed to corporate IT defence mechanisms to become more effective against Anthem-style attacks
Firewall for VMware virtualised environments
Network security experts at Fortinet have joined the VMware NSZ partner programme and produced the FortiGate-VMX Firewall for virtual environments
Malicious adware continues to plague Android apps
Webroot comments on the recent withdrawal of a number of Android apps from Google Play amid problems of adware infections on mobile devices
Zoo gains business benefit from network surveillance
Video management technology is enabling Copenhagen Zoo to explore new business possibilities through online broadcasts of major events
CCTV and wireless networking partnership
Vemotion is combining its wireless surveillance network expertise with rugged camera features from 360 Vision Technology
Study charts enterprise cloud usage risks
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
Analyst portal provides improved decision making
Investigation and resolution of cyber threats gains a new dimension with the Analyst Portal from Tier-3 Huntsman for improved decision making
Network Access Control market report recognises ForeScout as having largest deployments
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
Productivity app download milestone for forensic software
Users of EnCase digital forensics software have performed over 50 thousand downloads of the EnScript productivity apps from Guidance Software's online store
Beyond access control with next-generation NAC
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications
Threat of increased untrusted certificate use
Kaspersky Lab explains the dangers of untrusted certificates and their increased use in the launching of malicious software
Stepping up to the changing demands in airport security
Securitas specialist, Mark Allen, explains how the company is stepping up to the increasing needs of aviation security needs
Modern access control technology protects Polish museum
The Silesian Museum in Poland is making use of modern access control technology with biometric authentication to protect its assets
Facial biometrics use expanded in Hawaii criminal justice system
Morphotrak facial recognition system in use by Honolulu police has now been extended to offer facial searches from photos and videos across the state of Hawaii
High security locks meet loss prevention standard
Surface mounted multipoint high security locking systems from Pickersgill-Kaye have been awarded with approvals to the LPS 1175 loss prevention standard
Surveillance assists Russian postal efficiency
Postal centre handling mail delivered through Moscow airports installs video surveillance equipment from Samsung Techwin to improve safety, security and efficiency of operations
Research into social media use in education
Bloxx study shows high levels of cyber-bullying, inappropriate behaviour and productivity problems associated with the use of social media in educational environments
Continuous recording capability for endpoint threat detection
The latest release of Carbon Black provides continuous endpoint recording and live incident response through remote connection throughout the enterprise
Control room specialist attends Integrated Systems Europe event
VuWall Technology is attending Integrated Systems Europe in Amsterdam in February with its range of products for use in control rooms
Changing face of secure identity in 2015
HID Global examines recent trends to predict how secure identification will develop within the coming year
Enhanced cyber threat detection and response
New Case Management and advanced search features provide IT security personnel with improved detection and response capabilities for cyber threats
Garden centre protects stock with surveillance system
Surveillance cameras from Panasonic are being used as an effective measure against retail losses at a growing nursery based in the UK
Data centre migration challenges
Security and compliance feature in the key three considerations for successful migration of data centres
Can biometrics replace passwords
Infobip explains the role of biometrics as a secure authentication method if used with a second identification factor
Lone worker system for protecting vulnerable retail staff
Retail employees working for tool supplier, Hilti, are being supplied with the Identicom 8 series of lone worker protection devices from Connexion2
Key management system installed at Twickenham Stadium
Rugby venue, Twickenham, is improving security ahead of the Rugby World Cup with the installation of key management from Traka
Secure payment platform for non-profit market
Security-as-a-Service platform from Alert Logic will protect large volumes of online transactions being performed by Valldata for the non-profit segment in the UK
Mobile connectivity option available on Toughbooks
Panasonic rugged portable computers will be supplied with an option for better mobile connectivity through a partnership with NetMotion Wireless
Device sharing risk for mobile users
Survey results show mobile device owners are taking considerable risks in openly sharing their internet enables smartphones and tablets
Collaborative platform for access management
Salto and Maxxess are collaborating on the integration of security management software with Salto's Virtual Network for access management
Leaked picture fraud takes hold on Facebook
Bitdefender is warning users of social network sites not to be duped into falling for the latest viral or trending snapchat leaks
SMS spam abuse spreads to new channels
AdaptiveMobile explains how the abuse of the SMS messaging service is now spreading to adopt new channels
Social media security compliance for business networking site
Business social media networking site, LinkedIn has chosen Proofpoint to become a certified compliance partner for the protection of branded accounts
Door entry and surveillance system for supported-living accomodation
Housing association residents in the Borough of Hackney gain additional security and peace of mind with a new video and door entry system from Delta
Sports facility uses surveillance to record potential incidents
An indoor trampoline facility at Trafford Park in Manchester has deployed Samsung Techwin surveillance equipment for storing video material for up to three years
Information security training courses for the Nordic region
SANS Institute is providing training courses for IT security professionals during March in the Scandinavian area
Data privacy in the internet of things
Telit Wireless explains how it is protecting consumers from threats in embedded computing on the back of large numbers of IoT announcements at CES 2015
Ring of surveillance protects Minnesota cities
Eight cities in the Minneapolis and St Paul metropolis in the USA are being protected by a ring of surveillance controlled by XProtect VMS
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo