SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos
Security and surveillance technologies for the casino market

Security and surveillance technologies for the casino market

Cloud security - News

Zimperium reveals surge in NFC relay malware
Zimperium reveals surge in NFC relay malware

Zimperium zLabs published new findings showing a rapid, global increase in NFC relay malware that abuses Android’s Host Card Emulation (HCE) to harvest payment data and complete fraudulent “tap-to-pay” transactions. First observed in April 2024 as isolated samples, this campaign family has expanded to more than 760 malicious apps, leveraging 70+ command-and-control servers, dozens of Telegram bots/channels, and localised impersonation of banks and government services across R...

Commvault unveils secure Data Rooms for AI integration
Commvault unveils secure Data Rooms for AI integration

Commvault has introduced Data Rooms, a secure environment that enables enterprises to safely connect their trusted backup data to the AI platforms they rely on, or to their own AI initiatives, such as internal data lakes. By combining governed, self-service access with built-in classification and compliance controls, Data Rooms bridges the gap between data protection and data activation, helping organisations transform backup data into AI-ready assets without adding new risk or complexity. ...

ONEKEY expands cybersecurity platform for vulnerabilities
ONEKEY expands cybersecurity platform for vulnerabilities

Düsseldorf-based cybersecurity company ONEKEY has expanded its platform from a major solution for detecting software vulnerabilities to a fully-fledged environment for vulnerability management. This enables companies to map the entire process of dealing with so-called “Common Vulnerabilities and Exposures” (CVEs) – from detection and assessment to documented decision-making – in a single workflow that can serve as evidence. Background: In 2024, the number of newly...

Zero Networks: Kubernetes microsegmentation insights
Zero Networks: Kubernetes microsegmentation insights

Zero Networks, a major provider of zero trust security solutions, announced enhanced Kubernetes microsegmentation capabilities that give security teams comprehensive visibility and control without relying on DevOps expertise. By leveraging native Kubernetes tools and eBPF technology, the Zero Networks platform delivers a minimal footprint, non-intrusive deployment that enables organisations to scale securely while preventing lateral movement. With 93% of organisations either using, piloting, o...

Milestone Systems: XProtect 2025 R3 innovations
Milestone Systems: XProtect 2025 R3 innovations

Milestone Systems announced the latest updates in XProtect 2025 R3 and the Arcules platform, delivering new capabilities that accelerate investigations, strengthen security operations, and simplify system management. The latest releases for XProtect VMS and Arcules VSaaS address the real-world challenges facing security professionals by making surveillance systems more intelligent, accessible, and easier to manage while maintaining the open-platform flexibility that has made Milestone a trusted...

Milestone's Arcules enhances surveillance reliability
Milestone's Arcules enhances surveillance reliability

Milestone Systems announced the latest updates in XProtect 2025 R3 and the Arcules platform, delivering new capabilities that accelerate investigations, strengthen security operations, and simplify system management. The latest releases for XProtect VMS and Arcules VSaaS address the real-world challenges facing security professionals by making surveillance systems more intelligent, accessible, and easier to manage while maintaining the open-platform flexibility that has made...

Future Of commercial security systems unveiled
Future Of commercial security systems unveiled

In the present technologically driven world, the future of commercial security systems holds boundless potential. As businesses are becoming more digital, the necessity for advanced security measures is apparent now more than ever.  The advancements in technology are significantly influencing the design and capabilities of these security systems. Artificial Intelligence (AI) and Machine Learning are projected to play a central role in commercial security systems. These technologies have t...

Keycafe's MS5: Top automotive key solution
Keycafe's MS5: Top automotive key solution

Keycafe, a pioneer in cloud-connected key management, continues to expand the success of its MS5 SmartBox, an advanced solution already trusted by automotive businesses worldwide. Built for teams managing anywhere from a few to hundreds of vehicles, the MS5 has become a new benchmark for key management, control, and traceability. MS5 SmartBox “Every lost or misplaced key can disrupt workflow and damage customer confidence,” said Jason Crabb, CMO and Co-founder of Keycafe. “...

AuditBoard's AI transforming risk management
AuditBoard's AI transforming risk management

AuditBoard, the AI-powered global platform for connected risk transforming audit, risk, and compliance, announced the launch of Accelerate, a powerful new AI solution that delivers natural-language workflows, continuous auditing and monitoring, document intelligence, and agentic AI. The launch builds on the strong foundation of AuditBoard’s existing AI innovations, further empowering global risk teams with the world’s first AI-driven connected risk platform. AuditBoard’s new...

Cyware & Microsoft: AI-powered threat intelligence
Cyware & Microsoft: AI-powered threat intelligence

Cyware, a pioneer in AI-powered threat intelligence management, automation, and security orchestration, announced a strategic partnership with Microsoft built on deep product integrations to help global enterprises and public sector organisations operationalise threat intelligence with greater speed, ease and confidence. The partnership delivers a uniquely integrated threat intelligence workflow across Cyware and Microsoft Sentinel, giving customers a faster path from threat insights to action....

Camelot Secure: Innovations in cybersecurity
Camelot Secure: Innovations in cybersecurity

Camelot Secure, a revolutionary cybersecurity company, announced that its CEO, Stan Oliver, has been named one of The Daily Record’s 2025 Most Admired CEOs in the category of Private Company with 50 or Fewer Employees. Oliver earned this recognition for his visionary leadership, groundbreaking innovations in proactive cybersecurity, and steadfast commitment to diversity and workforce development — qualities that continue to shape Camelot Secure’s growth and industry impact. I...

Commvault boosts cyber resilience in North Europe
Commvault boosts cyber resilience in North Europe

Commvault, a major provider of cyber resilience and data protection solutions for the hybrid cloud, has announced two new appointments for North Europe, as Martin Gittins moves into the Area Vice President (AVP) role for the region and Mark Molyneux joins the company as Field CTO.  As AVP of North Europe, Gittins will be responsible for growth, leadership, and strategy within this key market for Commvault. He joined the company in February of this year, leading the charge for Strategic Ac...

Illumio Insights Agent: AI-driven threat detection
Illumio Insights Agent: AI-driven threat detection

Illumio Inc., the breach containment company, announced Insights Agent, a new capability within Illumio Insights, the company’s AI-driven cloud detection and response (CDR) solution. Agent is an AI-powered, persona-driven guide designed to reduce alert fatigue, accelerate threat detection, and enable containment by delivering real-time, tailored alerts and instant one-click remediation recommendations. This powerful extension of Insights helps security teams stay focused and move quickly...

ImmuniWeb's new AI penetration testing features
ImmuniWeb's new AI penetration testing features

ImmuniWeb has introduced new AI-powered penetration testing capabilities within its ImmuniWeb® On-Demand solution and launched two new Continuous Threat Exposure Management (CTEM) packages — ASM (Attack Surface Management) and Dark Web monitoring — in response to emerging cybersecurity risks and novel threats. ImmuniWeb® On-Demand, the company’s award-winning web application penetration testing solution, now offers expert-dr...

System Surveyor & Eagle Eye Networks partnership
System Surveyor & Eagle Eye Networks partnership

System Surveyor, the pioneering digital system design platform for security and technology integrators, announced a strategic partnership with Eagle Eye Networks, the pioneer in cloud video surveillance. This collaboration is designed to equip resellers with intuitive tools that streamline system design, automate a bill of materials, and accelerate the sales cycle. Through this partnership, Eagle Eye Networks resellers gain access to System Surveyor’s mobile, collaborative system des...

BioStar Air: Cloud-native access control by Suprema
BioStar Air: Cloud-native access control by Suprema

Suprema, a pioneer of AI-based security solutions, was named the Winner in the Access Control category at the a&s Adria Awards 2025. The ceremony was held during the 10th Adria Security Summit, which brought together over 2,000 industry professionals and 111 exhibitors from around the world on October 8–9 in Skopje, North Macedonia. Dynamic security landscape Recognizing transformative innovation across video surveillance, access control, intrusion detection, fire protection, cybers...

Kong Inc. launches MCP innovations for AI security
Kong Inc. launches MCP innovations for AI security

Kong Inc., a major developer of cloud API and AI technologies, announced at API Summit 2025, new support to help enterprises adopt and scale MCP and agentic AI development. These innovations include new MCP gateway capabilities in AI Gateway, and MCP-enabled Konnect Developer Portal, designed to provide a unified and secure way to build, run, discover, and govern the MCP-based tools and applications powering today’s AI agents. The launch of these new solutions underscores Kong’s co...

AI in application security: Checkmarx's pioneering role
AI in application security: Checkmarx's pioneering role

Checkmarx, the global pioneer in agentic-AI powered application security testing, announced record-breaking growth for its flagship platform, Checkmarx One, underscoring a wave of customer adoption fuelled by innovation and strategic pioneering. The news comes alongside groundbreaking research from Checkmarx Zero that highlights the urgent need for secure software in an AI-driven development landscape. Record-breaking growth & adoption Checkmarx One has rapidly become the platform of choi...

NAKIVO v11.1: Disaster resilience & multilingual support
NAKIVO v11.1: Disaster resilience & multilingual support

NAKIVO, a pioneering provider of backup, ransomware protection, and disaster recovery for virtual, physical, cloud, NAS, and SaaS environments, announces the release of NAKIVO Backup & Replication v11.1. The new version introduces a powerful set of features and enhancements designed to deliver disaster resilience with near-zero downtime and data loss across diverse IT environments—all while simplifying accessibility and MSP-tenant management. Multilingual interface: 5 new languages...

Suprema launches BioStar Air at GSX 2025
Suprema launches BioStar Air at GSX 2025

Suprema, a global pioneer of AI-based security solutions, announced its participation at GSX 2025, held from September 29–October 1, 2025, in New Orleans, Louisiana, U.S. At booth #1770, Suprema spotlighted BioStar Air, the first and only cloud-based access control platform designed to natively support biometric authentication. Suprema demonstrated how BioStar Air is transforming access control through three core capabilities: zero on-premises architecture, native biometric authentic...

Global access control market growth 2025-2030
Global access control market growth 2025-2030

Driven by the rising adoption of IoT-enabled security systems and cloud-based platforms, the global access control market is expected to grow from USD 10.62 billion in 2025 to USD 15.80 billion by 2030, at a CAGR of 8.3%, according to new information from research company, Marketsandmarkets. IoT enhances automation efficiency by enabling secure, real-time data exchange, while cloud integration offers scalability, remote monitoring, and reduced maintenance costs. Together, they support advanced...

Genetec leads in access control software market 2025
Genetec leads in access control software market 2025

According to the newly released 2025 Access Control Report from global research firm Omdia, Genetec Inc., the pioneer in enterprise physical security software, continues to expand its share of the global access control software market, maintaining its #2 position worldwide. In an industry shaped by mergers and acquisitions, the report shows that Genetec achieved the highest organic global market share gain in on-premises access control software. For customers, partnering with a c...

Jamf unveils new platform API & AI tools at JNUC 2025
Jamf unveils new platform API & AI tools at JNUC 2025

Jamf, the standard in managing and securing Apple at work, kicked off its 16th annual Jamf Nation User Conference (JNUC) in Denver, Colorado. Joined by key partners including Apple, Okta, AWS, Microsoft, Google and more, Jamf unveiled the latest updates to its pioneering Apple device management and security platform. Those updates include a rich API ecosystem, intelligent AI tools, and automated software updates powered by Declarative Device Management, making the Jamf platform more powerful...

Intercity boosts security as member of MISA with Microsoft
Intercity boosts security as member of MISA with Microsoft

Intercity has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of software development companies and security services partners that have integrated their solutions with Microsoft Security technology to better defend mutual customers against a world of increasing cyber threats.   The Intercity managed SOC delivers comprehensive 24/7/365 security protection, defending against threats with SIEM (Security Incident Event Management) and XDR (Extended Detec...

Kaseya acquires INKY for AI email security innovation
Kaseya acquires INKY for AI email security innovation

Kaseya, the global provider of AI-powered IT and security management software, announced the acquisition of INKY, a pioneer in modern, generative-AI-based email security for managed service providers (MSPs) and small to midsize businesses (SMBs). "Kaseya is committed to being the indispensable partner that helps MSPs lead in this next chapter of IT and security," said Rania Succar, CEO of Kaseya. AI-driven email security Rania Succar added: "No one else has our scale, data advantage, and end-...

Gigamon: AI & hybrid cloud security insights
Gigamon: AI & hybrid cloud security insights

Gigamon, a pioneer in deep observability, released new research revealing how global CISOs are reshaping 2026 cybersecurity strategies as they seek to effectively secure and manage hybrid cloud infrastructure in the AI era. AI is regarded as the most transformational technology to date, impacting everything from how businesses innovate to how adversaries operate. As a result, more than 200 global CISOs surveyed across Australia, France, Germany, Singapore, the UK, and the US are shift...

Eviden strengthens cybersecurity with Cosmian KMS
Eviden strengthens cybersecurity with Cosmian KMS

Eviden, the Atos Group product brand, pioneering in advanced computing, cybersecurity products, mission-critical systems, and vision AI announces the strengthening of its cybersecurity product offering through the integration of Cosmian’s Key Management System (KMS). In an era marked by rapidly increasing cyber threats, it is imperative that French and European companies retain control over the security of their most sensitive data, irrespective of deployment environment. Merger between...

Security trends 2026: Securitas report insights
Security trends 2026: Securitas report insights

Securitas Technology, the world’s second-largest commercial electronic security company, released its 2026 Global Technology Outlook Report on the state of security technology and the trends shaping the future of security investments over the coming years. Now in its eighth year, the report is highly anticipated for its perspective and research on the trends driving the electronic security industry. It is the result of a unique combination of survey data of Securitas Technology clients an...

Deepgram achieves AWS Generative AI Competency
Deepgram achieves AWS Generative AI Competency

Deepgram, the world’s most realistic and real-time Voice AI platform, has announced it has achieved the Amazon Web Services (AWS) Generative AI Competency. This specialisation recognises Deepgram as an AWS Partner that helps customers and the AWS Partner Network (APN) drive the advancement of services, tools, and infrastructure pivotal for implementing generative AI technologies. AWS Generative AI Competency The AWS Generative AI Competency requires a rigorous technical audit, proof of...

HID innovates security: GSX 2025 highlights
HID innovates security: GSX 2025 highlights

At Global Security Exchange (GSX) 2025, HID reaffirms its authority in identity and access control with a lineup of solutions designed to advance security while streamlining the user experience. This includes cutting-edge mobile access technology, passwordless authentication and a comprehensive portfolio of high-definition, high-security printers and cloud-based issuance platforms, all designed to improve operational efficiency and strengthen security for organisations navigating connected wor...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 178
  • 179
  • »
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
About this page

See an extensive list of news and developments related to Cloud security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec