SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos
Security and surveillance technologies for the casino market

Security and surveillance technologies for the casino market

Cloud security - News

HID Global adds high-assurance authentication with cloud-based Credential Management Solution
HID Global adds high-assurance authentication with cloud-based Credential Management Solution

HID Global, a globally renowned provider of trusted identity solutions, has announced that it has added the HID Credential Management Service to its growing offering of cloud-based identity solutions. The service simplifies the issuance and management of trusted Public Key Infrastructure (PKI) certificate-based credentials. The PKI credentials can be used by a broader range of organisations for convenient and secure multifactor authentication and converged physical access to facilities, as well...

HID Global to showcase biometric fingerprint reader and mobile access control solution at IFSEC 2019
HID Global to showcase biometric fingerprint reader and mobile access control solution at IFSEC 2019

HID Global, a provider of trusted identity solutions, will showcase its latest physical access control and secure identity solutions at IFSEC London in Hall 7, stand IF 2130, June 18-20. For the first time in the UK, HID Global will present its recently launched biometric fingerprint reader for secure access control, and a new, game-changing augmented reality tool. The company will also highlight new integrations using HID’s cloud-based card issuance for streamlined enterprise deployments...

IDIS launches GDPR-compliant Dynamic Privacy Masking solution at IFSEC 2019
IDIS launches GDPR-compliant Dynamic Privacy Masking solution at IFSEC 2019

IDIS has launched its totally cost-free IDIS Dynamic Privacy Masking (IDPM) solution at IFSEC International (stand IF1110 at London’s ExCel) 2019.  IDIS now offers a simple answer to the previously labour-intensive – or prohibitively expensive – problem of de-identification in video footage which is being submitted in response to requests for access under The General Data Protection Regulation (GDPR) or for evidential purposes. Protecting privacy with masking GDPR came...

Maxxess' InSite solution for improving situational awareness on display at IFSEC 2019
Maxxess' InSite solution for improving situational awareness on display at IFSEC 2019

Transforming the way security teams monitor, manage and control multiple systems, Maxxess is launching its new, open-architecture InSite solution at IFSEC International, (London ExCel 18-20 June, stand IF2120). Maxxess InSite is a cyber-secure, cloud-based service that has been developed to give organisations impressive new levels of situational awareness and allow the most rapid, coordinated response to wide range of incidents, both emergency and non-emergency. InSite can pull data from a wid...

Genetec Inc. declared as #1 Global VMS vendor, as per IHS Markit report
Genetec Inc. declared as #1 Global VMS vendor, as per IHS Markit report

According to a recent report published by business intelligence provider IHS Markit, Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, was named the world’s number one vendor of Video Management Systems (VMS). IHS Markit-reported results from 2015-2018 also point to the company sustaining a 24.1% CAGR (compound annual growth rate) for the past 3 years in this category. Back-end video surveillance equ...

PAC and GDX to showcase access control and door entry solutions at IFSEC International 2019
PAC and GDX to showcase access control and door entry solutions at IFSEC International 2019

PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...

Adarma becomes an independent security services company, following a buyout backed by Livingbridge
Adarma becomes an independent security services company, following a buyout backed by Livingbridge

Adarma, an independent security services company, previously ECS Security, has successfully launched following a private management buyout led by David Calder and Nathan Dornbrook with capital from Livingbridge, one of the UK’s leading mid-market private equity investors, and debt from Bank of Scotland. With over 250 staff and experience spanning over two decades, Adarma provides a broad range of IT security consulting, solution and services with deep expertise in threat management includ...

SimonsVoss Technologies GmbH partners with Morphean to enhance its video surveillance systems
SimonsVoss Technologies GmbH partners with Morphean to enhance its video surveillance systems

SimonsVoss Technologies GmbH, part of the Allegion group - a pioneer in digital locking and physical access control systems - enters a technology partnership in Europe with Morphean. The new technology partnership, that will utilise SimonsVoss’ digital access control system SmartIntego, extends Morphean’s cloud-based capabilities beyond video surveillance and into the access control-as-a-service (ACaaS) market, forecast to reach US$2.8b by 2024. Integrated security system We are s...

Ping Identity unveils updates to its data governance solution, PingDataGovernance for enhanced customer data security
Ping Identity unveils updates to its data governance solution, PingDataGovernance for enhanced customer data security

Ping Identity, global provider of identity defined security solutions, has announced updates to its data governance solution, PingDataGovernance, to better manage data security and privacy requirements for APIs and user profiles. Today’s enterprises manage many different APIs on average, meaning sensitive consumer data like banking information and healthcare records are increasingly vulnerable. This rapid growth of APIs and third-party API traffic necessitates fine-grained data protection...

Feenics Inc. announces hiring new Regional Sales Manager (South Central US) and BDM (West)
Feenics Inc. announces hiring new Regional Sales Manager (South Central US) and BDM (West)

Feenics Inc., an award-winning provider of the Access Control as a Service (ACaaS) Keep by Feenics cloud-hosted platform, continues to address the upward growth of its security management software solution, adding Rachel Young as Regional Sales Manager, South Central U.S. and Daniel Tercey, Business Development Manager, West. Security management solutions As Regional Sales Manager, Young will be responsible for Texas, Oklahoma, Louisiana, Mississippi and Alabama. She spent the majority of her...

Arecont Vision Costar adds Apex Technology Sales to its Authorized Manufacturer’s Representative Program
Arecont Vision Costar adds Apex Technology Sales to its Authorized Manufacturer’s Representative Program

Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Apex Technology Sales, Inc. (Apex) to its Authorized Manufacturer’s Representative Program. A proven and experienced representative agency, Apex will provide expert pre-sales assistance for Arecont Vision Costar’s Total Video Solution offerings across the US North Central Region, including Minnesota, both North and South Dakota, and Western Wisconsin. “Mike Pride and hi...

DICE Corporation unveils Innovation Award-winning Video Verification App at ESX 2019
DICE Corporation unveils Innovation Award-winning Video Verification App at ESX 2019

DICE Corporation announced the launch of an all new Video Verification App at the Electronic Security Expo (ESX) in Indianapolis last week. The Video Verification App is a completely mobile browser-based tool used in conjunction with DICE’s CloudEye cloud video recording solution. If an event triggered by an alarm system occurs, app users have more control of how alarm center interaction is handled by viewing live video surveillance and other essential account information. Video Verificat...

Digital Defense, Inc. partners with Attivo Networks on the industry’s first integrated risk and deception-based security platform
Digital Defense, Inc. partners with Attivo Networks on the industry’s first integrated risk and deception-based security platform

Digital Defense, Inc. has announced the availability of its Frontline.Cloud integration with Attivo Networks, the award-winning leader in deception for cybersecurity threat detection. Digital Defense’s Frontline.Cloud vulnerability management and threat assessment platform identifies high-risk/critical assets with business context that are highly vulnerable to exploits, remain unpatched, are unpatchable or have already been infected in real-time. Integration with Attivo Networks Frontlin...

Point3 Security invited by DoD to join the Persistent Cyber Training Environment (PCTE)
Point3 Security invited by DoD to join the Persistent Cyber Training Environment (PCTE)

The Department of Defense (DoD) recently invited Point3 Security to join the Persistent Cyber Training Environment (PCTE) after learning of Point3’s success in the private sector in cultivating, assessing, and identifying cybersecurity talent. For the United States military, it is imperative to have a strategic and comprehensive cybersecurity talent cultivation plan. Producing qualified personnel to meet the workforce needs of mission commanders is a top priority for the DoD. To meet the...

Matrox Graphics announces a series of updates for its Maevex 6100 series 4K encoders
Matrox Graphics announces a series of updates for its Maevex 6100 series 4K encoders

Matrox Graphics Inc. is pleased to announce a series of major updates to its award-winning Matrox Maevex 6100 Series of multi-channel 4K enterprise encoders. Supporting all of today’s most widely-used streaming protocols, the Maevex 6100 Series enterprise encoder appliances and cards now include built-in HLS support that allows enterprises to deliver multiple, dynamically-optimised streams to a broad range of devices over the internet. Maevex 6100 encoders now also support IPv6 addressing...

Gradiant’s identity verification and forensics solutions on display at Identity Week London 2019
Gradiant’s identity verification and forensics solutions on display at Identity Week London 2019

From June 11th to 13th Gradiant has an important appointment in London. For a few days, the city is becoming the capital of identity recognition technologies to transact in a seamless, yet secure manner. Identity Week is the largest technology fair focused on the concept of identity in Europe and this year brings together more than 3,000 international industry actors in three world-class events: Digital:ID, Planet Biometrics and Security Document Week. Forensic and face recognition solutions I...

Check Point’s 16000 and 26000 series Security Gateways deliver Tera-bps of Gen V Threat Prevention
Check Point’s 16000 and 26000 series Security Gateways deliver Tera-bps of Gen V Threat Prevention

Check Point has announced a new suite of network security products for large enterprises and data centres, which deliver an industry-leading Tera-bps (bits per second) of Gen V Threat Prevention without compromising on network performance, up time, or scalability. Powered by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways incorporate Check Point’s ThreatCloud and award-winning SandBlast Zero-Day Protection. These modular gateways come in base, plus and turbo m...

Ping Identity announces guidelines and capabilities framework for adoption of its Zero Trust security strategy
Ping Identity announces guidelines and capabilities framework for adoption of its Zero Trust security strategy

Ping Identity, global provider of identity-defined security solutions, has announced its capabilities framework and practical guidance for adopting a Zero Trust security strategy. This framework provides reliable direction to companies in any stage of the Zero Trust maturity process to help enable a broad range of use cases and technology integrations. It also includes innovative ways to support secure access to anything, by anyone, from anywhere on any device. Zero Trust security strategy The...

Radiflow unveils partner program for MSSPs to provide OT cybersecurity services
Radiflow unveils partner program for MSSPs to provide OT cybersecurity services

Radiflow, global provider of industrial cybersecurity solutions for industrial automation networks, has announced that the company has launched a partner program for MSSPs to offer OT cybersecurity services. OT MSSP partner program Radiflow’s new OT MSSP partner program provides the framework for MSSPs to offer new cybersecurity services dedicated to ICS/SCADA networks to their industrial enterprise and critical infrastructure customers. Radiflow is aiming this offering at MSSPs that alr...

Redrock Biometrics to launch PalmID-X identification solution at Finovate Spring 2019
Redrock Biometrics to launch PalmID-X identification solution at Finovate Spring 2019

Redrock Biometrics, a provider of palm-based biometrics for authentication and identification, announces the official launch of their breakthrough identification solution – PalmID-X at the exclusive invitation-only Finovate Spring 2019. PalmID-X expands the applicability of biometric identification to large groups of people, creating a basis for seamless services and transactions without physical tokens. “Identification is much more challenging task than authentication. Most biometr...

Seagate delivers Exos X16 HDD and updates the IronWolf and IronWolf Pro NAS drives with 16TB capacity
Seagate delivers Exos X16 HDD and updates the IronWolf and IronWolf Pro NAS drives with 16TB capacity

Seagate Technology plc, a global provider of data storage solutions, announced it has been actively shipping 16TB helium-based enterprise drive as part of the Exos X16 family, delivering high performance and record capacity for hyperscale data centres to efficiently and cost-effectively manage ever-increasing amounts of data. The company also updated the IronWolf and IronWolf Pro Network Attached Storage (NAS) drive lines with new 16TB capacity models. The need for hyperscale, cloud, and NAS st...

Digital Defense announces the availability of Frontline.Cloud app on Cortex by Palo Alto Networks
Digital Defense announces the availability of Frontline.Cloud app on Cortex by Palo Alto Networks

Digital Defense, Inc. announced the availability of its Frontline.Cloud app on Cortex by Palo Alto Networks – the industry’s only open and integrated AI-based continuous security platform. Building on Cortex allows partners to use normalised and stitched together data from customers’ entire enterprises to build cloud-based apps that constantly deliver innovative cybersecurity capabilities to joint customers.   Frontline.Cloud is the industry's only true on-demand vul...

Sepio Systems collaborates with Johnson Controls on efficient mitigation of hardware-based attacks in US companies
Sepio Systems collaborates with Johnson Controls on efficient mitigation of hardware-based attacks in US companies

Sepio Systems, which is disrupting the cyber-security industry by uncovering hidden hardware attacks, is gaining momentum in the U.S. after adding an important new customer and channel partner – the Integrated Security Solutions business unit of Johnson Controls, and strengthening its advisory board. Mitigating hardware-based attacks Sepio offers the world's first end-to-end solution that detects and mitigates hardware-based attacks, including rogue peripherals, invisible network devices...

Fire safety and security experts meet at Euralarm Symposium 2019 to discuss new strategies and product standardisation policies
Fire safety and security experts meet at Euralarm Symposium 2019 to discuss new strategies and product standardisation policies

Many Euralarm members and other interested people gathered on May 13th, 2019 in Madrid for the annual Euralarm Symposium. It was the moment that Euralarm presented its priorities and challenges for the upcoming years. General Director Paul van der Zanden introduced Euralarm’s new strategy document for 2019 to 2024 to the audience by putting it into perspective with the developments within Brussels. Fire safety and security industry There is so much going on in Brussels that is not commun...

Radiflow’s iSID Industrial Cybersecurity App now available on Cortex by Palo Alto Networks
Radiflow’s iSID Industrial Cybersecurity App now available on Cortex by Palo Alto Networks

Radiflow, a provider of industrial cybersecurity solutions for industrial automation networks, announced the availability of its iSID Industrial Cybersecurity App on Cortex by Palo Alto Networks – the industry’s only open and integrated AI-based continuous security platform. Building on Cortex allows partners to use normalised and stitched together data from customers’ entire enterprises to build cloud-based apps that constantly deliver innovative cybersecurity capabilities to...

Johnson Controls C•CURE 9000 now supports IaaS which provides customers with benefits of cloud computing
Johnson Controls C•CURE 9000 now supports IaaS which provides customers with benefits of cloud computing

Johnson Controls announces that its flagship access control and event management system Tyco Software House C•CURE 9000 is supported on Infrastructure as a Service (IaaS), enabling customers to take advantage of the many benefits of cloud computing with the choice of best-suited service providers. With C•CURE 9000 deployable in the cloud, integrators and end users can leverage cloud service providers such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform, to reduce se...

IDIS highlights need for strengthening network security and countering cyber-threats at IFSEC 2019
IDIS highlights need for strengthening network security and countering cyber-threats at IFSEC 2019

Network security and the threat of cyber-loopholes should be a top priority for video surveillance users, IDIS will tell visitors at IFSEC International. Launching a cybersecurity advisory video ahead of the show, the IDIS team will also be on hand to demonstrate and explain how IDIS technology goes a step further to strengthen the resilience of traditional surveillance network processes. Korea’s largest surveillance manufacturer will be highlighting the dangers of cyber-attacks and the c...

Pivot3 experiences continued growth in Q1 2019 because of IoT and hybrid cloud solutions
Pivot3 experiences continued growth in Q1 2019 because of IoT and hybrid cloud solutions

Pivot3, a provider of intelligent infrastructure solutions, experienced continued growth in Q1 2019 with enterprise and Fortune 1000 customers representing nearly 80-percent of bookings. This growth has been driven by organisations seeking simple, easy-to-deploy IoT and hybrid cloud solutions that address industry-specific challenges. Pivot3 is architected for extreme resilience and is able to manage massive volumes of data, making the company uniquely positioned to handle IoT use cases. Pivot3...

SALTO to showcase enhanced access control technology at IFSEC 2019
SALTO to showcase enhanced access control technology at IFSEC 2019

SALTO is excited to be showcasing the latest in access control technology at IFSEC, the UK’s premier security event, taking place at ExCeL London 18-20 June. SALTO is on Stand IF2810. SVN-Flex provides access management with increased security, more convenience and at lower cost. It makes hard-wired update point’s obsolete, thus introducing completely wire-free access control with online functionalities. It provides a range of benefits to operators and end users, especially by remov...

Reposify’s External Surface Security app now Available on Cortex by Palo Alto Networks
Reposify’s External Surface Security app now Available on Cortex by Palo Alto Networks

Reposify announced the availability of its app on Cortex by Palo Alto Networks – the industry's only open and integrated AI-based continuous security platform. Building on Cortex allows Cortex partners to use normalised and stitched-together data from customers' entire enterprises to build cloud-based apps that constantly deliver innovative cybersecurity capabilities to joint customers. Reposify's External Surface Security app allows enterprises to become aware of their blind spots, preve...

View more
  • «
  • 1
  • 2
  • ...
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • ...
  • 178
  • 179
  • »
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
About this page

See an extensive list of news and developments related to Cloud security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec