 |
Adaptive threat protection from multiple sources
|
|
Tripwire's Adaptive Threat Protection product has been expanded to incorporate more sources of threat information |
|
 |
Open Video Management System certification for surveillance storage system
|
|
Milestone Systems has now tested and reported performance component certification of BCDVideo’s Nova Server and Storage Series for video surveillance systems |
|
 |
Fire and Security specialist invests in new office campus
|
|
Chubb's Blackburn premises will undergo a complete transformation beginning this year to create improved facilities for its affiliate companies |
|
 |
Security essentials course to be held in Oslo
|
|
A six-day intensive course on IT Security essentials will take place as part of the SANS Oslo event that takes place in March |
|
 |
Large contactless payment card deployment in South American universities
|
|
A Brazilian bank is at the forefront of a deployment of contactless EMV cards to students in universities in Brazil |
|
 |
Continuous monitoring and mitigation protects European digital classified ads platform
|
|
European home and vehicle classified ads platform provider selects CounterACT from ForeScout Technologies for improved network endpoint visibility and management |
|
 |
Controlled secure file sharing for university data
|
|
Varonis has supplied Liverpool University with DataAnywhere to enable controlled and secure remote data storage for file sharing without using insecure public cloud services |
|
 |
Android app for remote video monitoring
|
|
Video Management System supplier, Mirasys has released the Spotter Mobile 7 app for remote video monitoring from Android devices |
|
 |
Securing digital identities amongst the Internet of Everything
|
|
Neil Chapman, Senior Vice President & Managing Director EMEA at ForgeRock delves into identity management and security in connected home and lifestyle electronics |
|
 |
Unlicensed security company falls foul of immigration offences
|
|
A London security company director has been jailed for operating with illegal immigrants and forging documentation |
|
 |
Missing patch detection and vulnerability assessment scanning
|
|
The latest version of LanGuard from GFI Software provides companies with improved network device vulnerability assessment including the detection of missing patches |
|
 |
Security Solutions to attend locksmith event in UK
|
|
The UNION brand from Security Solutions will be at the forefront of the company's innovative product range being shown at this year's Locksmith Expo taking place in Nottingham |
|
 |
Anthem attack demonstrates need for more than static defence
|
|
Jonathan Whitley of WatchGuard explains the improvements needed to corporate IT defence mechanisms to become more effective against Anthem-style attacks |
|
 |
Firewall for VMware virtualised environments
|
|
Network security experts at Fortinet have joined the VMware NSZ partner programme and produced the FortiGate-VMX Firewall for virtual environments |
|
 |
Malicious adware continues to plague Android apps
|
|
Webroot comments on the recent withdrawal of a number of Android apps from Google Play amid problems of adware infections on mobile devices |
|
 |
Zoo gains business benefit from network surveillance
|
|
Video management technology is enabling Copenhagen Zoo to explore new business possibilities through online broadcasts of major events |
|
 |
CCTV and wireless networking partnership
|
|
Vemotion is combining its wireless surveillance network expertise with rugged camera features from 360 Vision Technology |
|
 |
Study charts enterprise cloud usage risks
|
|
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises |
|
 |
Analyst portal provides improved decision making
|
|
Investigation and resolution of cyber threats gains a new dimension with the Analyst Portal from Tier-3 Huntsman for improved decision making |
|
 |
Network Access Control market report recognises ForeScout as having largest deployments
|
|
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected |
|
 |
Productivity app download milestone for forensic software
|
|
Users of EnCase digital forensics software have performed over 50 thousand downloads of the EnScript productivity apps from Guidance Software's online store |
|
 |
Beyond access control with next-generation NAC
|
|
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications |
|
 |
Threat of increased untrusted certificate use
|
|
Kaspersky Lab explains the dangers of untrusted certificates and their increased use in the launching of malicious software |
|
 |
Stepping up to the changing demands in airport security
|
|
Securitas specialist, Mark Allen, explains how the company is stepping up to the increasing needs of aviation security needs |
|
 |
Modern access control technology protects Polish museum
|
|
The Silesian Museum in Poland is making use of modern access control technology with biometric authentication to protect its assets |
|
 |
Facial biometrics use expanded in Hawaii criminal justice system
|
|
Morphotrak facial recognition system in use by Honolulu police has now been extended to offer facial searches from photos and videos across the state of Hawaii |
|
 |
High security locks meet loss prevention standard
|
|
Surface mounted multipoint high security locking systems from Pickersgill-Kaye have been awarded with approvals to the LPS 1175 loss prevention standard |
|
 |
Surveillance assists Russian postal efficiency
|
|
Postal centre handling mail delivered through Moscow airports installs video surveillance equipment from Samsung Techwin to improve safety, security and efficiency of operations |
|
 |
Research into social media use in education
|
|
Bloxx study shows high levels of cyber-bullying, inappropriate behaviour and productivity problems associated with the use of social media in educational environments |
|
 |
Continuous recording capability for endpoint threat detection
|
|
The latest release of Carbon Black provides continuous endpoint recording and live incident response through remote connection throughout the enterprise |
|
 |
Control room specialist attends Integrated Systems Europe event
|
|
VuWall Technology is attending Integrated Systems Europe in Amsterdam in February with its range of products for use in control rooms |
|
 |
Changing face of secure identity in 2015
|
|
HID Global examines recent trends to predict how secure identification will develop within the coming year |
|
 |
Enhanced cyber threat detection and response
|
|
New Case Management and advanced search features provide IT security personnel with improved detection and response capabilities for cyber threats |
|
 |
Garden centre protects stock with surveillance system
|
|
Surveillance cameras from Panasonic are being used as an effective measure against retail losses at a growing nursery based in the UK |
|
 |
Data centre migration challenges
|
|
Security and compliance feature in the key three considerations for successful migration of data centres |
|
 |
Can biometrics replace passwords
|
|
Infobip explains the role of biometrics as a secure authentication method if used with a second identification factor |
|
 |
Lone worker system for protecting vulnerable retail staff
|
|
Retail employees working for tool supplier, Hilti, are being supplied with the Identicom 8 series of lone worker protection devices from Connexion2 |
|
 |
Key management system installed at Twickenham Stadium
|
|
Rugby venue, Twickenham, is improving security ahead of the Rugby World Cup with the installation of key management from Traka |
|
 |
Secure payment platform for non-profit market
|
|
Security-as-a-Service platform from Alert Logic will protect large volumes of online transactions being performed by Valldata for the non-profit segment in the UK |
|
 |
Mobile connectivity option available on Toughbooks
|
|
Panasonic rugged portable computers will be supplied with an option for better mobile connectivity through a partnership with NetMotion Wireless |
|
 |
Device sharing risk for mobile users
|
|
Survey results show mobile device owners are taking considerable risks in openly sharing their internet enables smartphones and tablets |
|
 |
Collaborative platform for access management
|
|
Salto and Maxxess are collaborating on the integration of security management software with Salto's Virtual Network for access management |
|
 |
Leaked picture fraud takes hold on Facebook
|
|
Bitdefender is warning users of social network sites not to be duped into falling for the latest viral or trending snapchat leaks |
|
 |
SMS spam abuse spreads to new channels
|
|
AdaptiveMobile explains how the abuse of the SMS messaging service is now spreading to adopt new channels |
|
 |
Social media security compliance for business networking site
|
|
Business social media networking site, LinkedIn has chosen Proofpoint to become a certified compliance partner for the protection of branded accounts |
|
 |
Door entry and surveillance system for supported-living accomodation
|
|
Housing association residents in the Borough of Hackney gain additional security and peace of mind with a new video and door entry system from Delta |
|
 |
Sports facility uses surveillance to record potential incidents
|
|
An indoor trampoline facility at Trafford Park in Manchester has deployed Samsung Techwin surveillance equipment for storing video material for up to three years |
|
 |
Information security training courses for the Nordic region
|
|
SANS Institute is providing training courses for IT security professionals during March in the Scandinavian area |
|
 |
Data privacy in the internet of things
|
|
Telit Wireless explains how it is protecting consumers from threats in embedded computing on the back of large numbers of IoT announcements at CES 2015 |
|
 |
Ring of surveillance protects Minnesota cities
|
|
Eight cities in the Minneapolis and St Paul metropolis in the USA are being protected by a ring of surveillance controlled by XProtect VMS |
|