SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos
Security and surveillance technologies for the casino market

Security and surveillance technologies for the casino market

Cloud security - News

Aratek BIONE fingerprint algorithm aces NIST MINEX III test
Aratek BIONE fingerprint algorithm aces NIST MINEX III test

The Aratek BIONE fingerprint algorithm recently achieved top scores in the MINEX (Minutiae Interoperability Exchange) III evaluations administered by the US National Institute of Standards and Technology (NIST). The test measures the accuracy and interoperability of proprietary minutiae templates along with their level of compliance with the U.S. Government’s Personal Identity Verification (PIV) program by extracting and matching the proprietary minutiae templates against the ANSI/INCITS...

Razberi Technologies partners with Cook Security Group as they unveil Piko VMS
Razberi Technologies partners with Cook Security Group as they unveil Piko VMS

Cook Security Group (CSG) successfully unveiled its privately branded video surveillance solution, Piko VMS, during their 2019 Technology & Innovation Summit in Portland Oregon. Health monitoring Cook named Razberi Technologies as their hardware partner to provide the intelligent appliance and health monitoring component to the new VMS brand. “While we still have strong relationships with our traditional video partners, we wanted to provide an open cloud-enabled platform to deliver...

TIBCO and Ping Identity collaborate on advanced API cybersecurity solutions
TIBCO and Ping Identity collaborate on advanced API cybersecurity solutions

TIBCO Software Inc., global provider of integration, API management, and analytics, has announced an official partnership with Ping Identity, a provider of Identity Defined Security. Together, TIBCO Cloud Mashery and the PingIntelligence for APIs solution bring seamless, AI-powered protection against new emerging API threats to customers. TIBCO Cloud Mashery is a complete solution for digital leaders, IT leaders, and chief information security officers to invest in API-led, cloud-native transfo...

Building Intelligence’s SV3 receives SAFETY Act Certification for visitor and vehicle management solution
Building Intelligence’s SV3 receives SAFETY Act Certification for visitor and vehicle management solution

SV3, the cloud-based visitor, vehicle and vendor management system from Building Intelligence, has received SAFETY Act Certification, the highest level of accreditation awarded by the U.S. Department of Homeland Security for anti-terrorism technologies, making it the only visitor and vehicle management solution to achieve this level of federal recognition. “By using technology to secure loading docks and parking garages, as well as providing a smart method for managing vehicle access to s...

Ping Identity updates PingOne for Customers cloud IDaaS with passwordless and multi-factor authentication capabilities
Ping Identity updates PingOne for Customers cloud IDaaS with passwordless and multi-factor authentication capabilities

Ping Identity, the pioneer in Identity Defined Security, announced a significant update to PingOne for Customers, the cloud-delivered Identity-as-a-Service (IDaaS) offering built for developers. The API-first solution can now deliver seamless and secure push notifications from custom mobile applications that can be used for passwordless and advanced multi-factor authentication. The cloud identity solution helps development teams speed time to launch their applications, while also taking securit...

ExtraHop announces Reveal(x) Cloud, SaaS-based NDR solution for enhanced cloud security
ExtraHop announces Reveal(x) Cloud, SaaS-based NDR solution for enhanced cloud security

ExtraHop announces ExtraHop® Reveal(x) Cloud™, a Software-as-a-Service (SaaS)-based network detection and response (NDR) solution for the cloud-first hybrid enterprise. Reveal(x) Cloud provides deep and continuous visibility, enabling Security Operations (SecOps) teams to analyse every transaction, detect threats, and respond to attacks to gain control over their hybrid attack surface and protect their investment in the cloud. While the cloud has proven to be a force multiplier for De...

Johnson Controls unveils exacqVision VMS v19.06 with automatic video transfer and enhanced network security for mobile app users
Johnson Controls unveils exacqVision VMS v19.06 with automatic video transfer and enhanced network security for mobile app users

Johnson Controls introduces exacqVision VMS v19.06, with updates that include automatic transfer of video after a server failover, a new access control integration, support for ONVIF network loss recording, improved motion zone configuration and enhanced network security for mobile app users. exacqVision VMS v19.06 The latest version of exacqVision offers Enterprise Manager customers a more robust failover solution. In a failover scenario, transferring recordings from a spare NVR to the primar...

LCRcom completed SIP Trunk compatible tests with Yeastar PBX System
LCRcom completed SIP Trunk compatible tests with Yeastar PBX System

The global telecommunications operator LCRcom in cooperation with Alvaco, distributor in Spain of Yeastar, announces the end of the certification process that allows guaranteeing the complete compatibility of the LCRcom SIP trunk with Yeastar on-premises and cloud-based PBXs. Easy, safe, and faster device configuration Yeastar has been working on pure IP solutions, making regularly compatibility tests with different SIP providers. To offer a much simpler, faster, and safer configuration proces...

cPacket Networks launches the cCloud cloud-based network VaaS with traffic mirroring feature
cPacket Networks launches the cCloud cloud-based network VaaS with traffic mirroring feature

cPacket Networks, a provider of next-generation network performance/security monitoring and packet brokering solutions, launches the cCloud cloud-based network visibility-as-a-service (VaaS) offering by working with Amazon Web Services (AWS) and leveraging the traffic mirroring feature offered by Amazon Virtual Private Cloud (Amazon VPC). “While many of our customers are migrating workloads to the cloud, until now it happened to be a black-box for them, from a performance and security per...

HID Global adds FIDO2 authentication to its Crescendo smart cards to provide password-less sign-in
HID Global adds FIDO2 authentication to its Crescendo smart cards to provide password-less sign-in

HID Global®, a provider of trusted identity solutions, announces it has added FIDO2 authentication to its Crescendo smart cards, enabling them to support the FIDO Alliance industry initiative focused on standards-based ‘password-less’ sign-in. HID Global partnered with Microsoft on this effort. The company also expanded its Crescendo family with the Crescendo Key Series that brings the same FIDO2 authentication capabilities and other features of its advanced smart cards to works...

Senstar to secure five airports with its video management, facial recognition and intrusion detection systems
Senstar to secure five airports with its video management, facial recognition and intrusion detection systems

Senstar, a provider of video management systems (VMS) and perimeter intrusion detection systems (PIDS), is pleased to announce its products were recently selected to protect five airports in various locations around the world. These sites join the list of hundreds of civilian and military airports currently using Senstar products. “Airport infrastructure and assets represent a vital economic engine for many cities and countries making them prime targets for vandals, thieves and terrorists...

MOBOTIX unveils latest cyber security guide, Cactus Patch
MOBOTIX unveils latest cyber security guide, Cactus Patch

MOBOTIX cameras and solutions rightly have a reputation for being particularly cyber-secure. MOBOTIX customers all over the world trust the reliability of products developed and manufactured in Germany to protect their images and analysis data from unauthorised access and to prevent an insecure interface from offering hackers an opening. The hard work pays off, as evidenced by the fact a MOBOTIX camera has never been hacked. “We are constantly working on identifying possible security gaps...

Tyco helps system integrators to grow their businesses by developing innovative solutions
Tyco helps system integrators to grow their businesses by developing innovative solutions

The 230 delegates who attended the recent Tyco Engage Conference 2019 were among the first to see how Tyco, the security products division of Johnson Controls, is continuing to help system integrators grow their businesses by developing innovative solutions which capitalise on emerging technologies. ‘Beyond Security’ was the central theme of the conference held at the Melia Villaitana Hotel, Costa Blanca, Spain, which began with delegates being welcomed by Alan Riegler, Senior Sales...

Arecont Vision Costar adds GT Reps to its Authorized Manufacturer’s Representative Program
Arecont Vision Costar adds GT Reps to its Authorized Manufacturer’s Representative Program

Arecont Vision Costar, the pioneer in network-based video surveillance solutions, announces the addition of GT Reps, LLC to its Authorized Manufacturer’s Representative Program. GT Reps will deliver pre-sales support across the US Great Lakes Region, which includes the states of Ohio, Michigan, Kentucky, and Indiana. “We’re excited to add GT Reps to our sales organisation to broaden our coverage with skilled professionals,” said Kyle Parker, Vice President, Americas, Are...

Forescout releases inaugural Device Cloud research based on device intelligence data from healthcare deployments
Forescout releases inaugural Device Cloud research based on device intelligence data from healthcare deployments

Forescout Technologies, Inc., the pioneer in device visibility and control, announced insights from 75 real healthcare deployments with more than 10,000 virtual local area networks (VLANs) and 1.5 million devices contained within the Forescout Device Cloud, with a specific focus on 1,500 medical VLANs with more than 430,000 devices. Launched in July 2017, the Forescout Device Cloud is one of the world’s largest crowdsourced device repositories and now contains more than eight million devi...

Trustonic announces partnership with Rubean AG and CCV to develop an mPOS solution
Trustonic announces partnership with Rubean AG and CCV to develop an mPOS solution

Mobile security provider Trustonic announces a partnership with Rubean AG, an established mobile security-focused fintech, and CCV, an European payment solution provider, to develop an mPOS solution that accepts higher value transactions by enabling hardware-protected PIN entry on a range of commercial off-the-shelf (COTS) smartphones. Using a smartphone as a mobile point of sale (mPOS) solution enables traders, small retailers and SMBs to save money on costly payment acceptance hardware, impro...

Trusted Cyber Security Solutions joins Radiflow’s OT MSSP Partner program to expand its operations
Trusted Cyber Security Solutions joins Radiflow’s OT MSSP Partner program to expand its operations

Radiflow, a provider of industrial cybersecurity solutions for industrial automation networks, and Trusted Cyber Security Solutions (TCSS), a provider of cybersecurity services and solution, jointly announce that TCSS has joined Radiflow’s OT MSSP Partner program in order to expand its service offerings and pursue market opportunities to provide managed OT cybersecurity services to its industrial customers across central and southern Europe. TCSS is a growing cybersecurity systems integra...

ComNet introduces 12-port Gigabit managed Layer 2 switch for high-bandwidth applications
ComNet introduces 12-port Gigabit managed Layer 2 switch for high-bandwidth applications

ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment, is introducing a new 12-port Gigabit managed Layer 2 switch that includes two 10GigE uplink ports designed for high-bandwidth usage requirements such as smart cities and connected vehicle applications. Network protection The CNXE2GE2TX8MSPOE managed Layer 2 switch features eight dedicated 10/100/1000BASE-T(X) RJ-45 ports compliant with IEEE802.3af/at PoE, two d...

ProdataKey to host Cloud Access Summit for dealers, integrators and security professionals
ProdataKey to host Cloud Access Summit for dealers, integrators and security professionals

ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, will host the second annual Cloud Access Summit on June 13, 2019 in Salt Lake City, UT. This exclusive event for dealers, integrators and security professionals offers a day packed with educational sessions focusing on the hottest industry trends and topics related to cloud access and its many complementary technologies, presented by executives and thought leaders representing a cross-sect...

Pluralsight One partners with Norwegian Refugee Council to help address the needs of the global refugee crisis
Pluralsight One partners with Norwegian Refugee Council to help address the needs of the global refugee crisis

Pluralsight, the enterprise technology skills platform announced that its social enterprise, Pluralsight One, has formed a multi-year partnership with the Norwegian Refugee Council (NRC) to transform its digital capabilities and bring technology skills development opportunities to displaced people and their host communities around the world. The partnership is designed to create sustainable social impact for displaced and crisis-affected populations around the world, as well as increase the tec...

Secutech Vietnam 2019 to host new Smart Factory Conference that will highlight security, management efficiency and energy savings
Secutech Vietnam 2019 to host new Smart Factory Conference that will highlight security, management efficiency and energy savings

Visitors to the 2019 edition of Secutech Vietnam will have plenty of opportunities to gather market intelligence, thanks to the introduction of the new ‘Smart Factory Conference’ to the show’s fringe programme. As the region’s leading trade fair for the security, fire safety and smart building sectors, the fair provides a programme of educational events that cover technological trends, government regulations and industry outlook. Smart factory systems “Vietnam&rsq...

Check Point’s threat intelligence arm unveils CPR-Zero online vulnerability repository
Check Point’s threat intelligence arm unveils CPR-Zero online vulnerability repository

Check Point Research, the threat intelligence arm of Check Point Systems Inc., has announced the creation of a new online vulnerability repository, CPR-Zero. Going forward, Check Point will publicly list all vulnerabilities its research teams find, even if they are not featured in a publication on the Check Point Research blog. The move makes Check Point the industry’s largest cyber security vendor to openly share such vital information online. CPR-Zero vulnerability repository "Not ever...

Avigilon Blue cloud service platform launched in the United Kingdom
Avigilon Blue cloud service platform launched in the United Kingdom

Avigilon Corporation, a Motorola Solutions company, announced that it is launching its Avigilon Blue™ platform in the United Kingdom. For Avigilon partners, the Avigilon Blue cloud service platform provides an easy-to-install, cloud-based video security solution with features and capabilities that allows them to remotely monitor and manage more sites with fewer resources. Partners can easily monitor the health of customer sites, update configurations and deploy system updates, all remotel...

Iris ID’s iCAM M300 biometric platform integrated with Telaeris’ XPressEntry software
Iris ID’s iCAM M300 biometric platform integrated with Telaeris’ XPressEntry software

Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...

Cepton Technologies’ laser-powered sensors with 3D Lidar detection technology unveiled at IFSEC 2019
Cepton Technologies’ laser-powered sensors with 3D Lidar detection technology unveiled at IFSEC 2019

Kit (PEK), combines the unerring accuracy of lasers to scan the environment in much the same way a radar does, but at a much higher resolution, building an image of the world around it regardless of lighting conditions. Presenting the technology in the UK for the first time at IFSEC International in London’s ExCeL, Cepton’s VP Neil Huntingdon says that because the device combines the sensor with a powerful micro-computer in a single package it can process the information directly at...

Suprema to unveil high-tech facial recognition technology and cloud-based mobile solutions at IFSEC 2019
Suprema to unveil high-tech facial recognition technology and cloud-based mobile solutions at IFSEC 2019

Suprema, global provider of biometrics and access control solutions, has announced that it will showcase new-generation mobile solution and latest facial recognition biometrics at IFSEC 2019 in London on June 18. Suprema mobile credential service Suprema's new mobile credential service provides the end-to-end solution including a cloud-based portal services, a mobile app, BLE readers, open API and in-app SDK for 3rd party support. The new service provides users with easier mobile card administ...

Vaion’s security cameras, video management system and AI-powered solutions to debut at IFSEC 2019
Vaion’s security cameras, video management system and AI-powered solutions to debut at IFSEC 2019

Vaion, a Ubon Partners company, is emerging from stealth mode to disrupt the physical security market by embedding the power of artificial intelligence (AI) into its complete video surveillance solution. Vaion's product line, which includes high-quality security cameras, a video management system and other intelligent solutions, premieres at IFSEC International, an event that takes place between June 18-June 20 in London, U.K. As a global company with offices in New York, London, and Oslo, Vaio...

HID Global announces adding Credential Management Service to its ever-expanding cloud-based identity solutions portfolio
HID Global announces adding Credential Management Service to its ever-expanding cloud-based identity solutions portfolio

HID Global, global provider of trusted identity solutions, has announced that it has added the HID Credential Management Service to its growing offering of cloud-based identity solutions. The service simplifies the issuance and management of trusted Public Key Infrastructure (PKI) certificate-based credentials. The PKI credentials can be used by a broader range of organisations for convenient and secure multifactor authentication and converged physical access to facilities, as well as digital s...

DVV Solutions partners with BitSight to enhance Third-Party Risk Management and monitoring services
DVV Solutions partners with BitSight to enhance Third-Party Risk Management and monitoring services

DVV Solutions, specialists in Third-Party Risk Management (TPRM), embarked on a strategic managed service provider relationship with BitSight, the Standard in Security Ratings. DVV Solutions and BitSight announced a new channel partnership agreement that will enable DVV Solutions to provide BitSight’s Security Ratings Service and add significant value to DVV’s Third-Party Risk Management and continuous monitoring offerings. Identifying and mitigating risk By integrating the BitSig...

Ping Identity to talk about best practices towards digital transformation at Identiverse 2019
Ping Identity to talk about best practices towards digital transformation at Identiverse 2019

Ping Identity, global provider of Identity Defined Security solutions, announced its participation at Identiverse 2019, slated to take place from June 25-28 in Washington, D.C. Company experts will share best practices in working toward digital transformation, address the current state of the industry and provide ways enterprises can elevate their identity security programs. Attendees also will have an opportunity to hear from Ping Identity customers eBay and Royal Dutch Shell, as they talk thro...

View more
  • «
  • 1
  • 2
  • ...
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • ...
  • 178
  • 179
  • »
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
About this page

See an extensive list of news and developments related to Cloud security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec