Data Security - News
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that it is now offering multiple FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis access control system. Personal Identity Verification In a market that has been traditionally weighed down by limited solutions that are often proprietary, these new options offer non-proprietary, open-a...
The Dallmeier 5000 series single sensor cameras are equipped with a new encoder technology. The new versions of the dome, IR and fisheye cameras support H.265 HEVC (High Efficiency Video Coding) and offer improved object classification with camera-based, AI-enhanced Video Content Analysis (VCA). H.265 compression By its nature, the constantly improving resolution of video images demands high bandwidths and large amounts of memory. With the new generation H.265 encoder in the Dallmeier cameras,...
SureCloud, a provider of cybersecurity services and cloud-based, Integrated Risk Management solutions, appoints Jon Taylor-Goy as EMEA Sales Manager for the cybersecurity division. Jon will be instrumental in helping drive business growth, as well as establishing complimentary new service lines. Jon’s expertise spans business growth, product development, and go-to-market strategies in the areas of IT risk management and governance. Cybersecurity service offering Jon brings more than 18...
Global provider of critical comfort and security solutions primarily in the residential sector, Resideo Technologies, Inc. has announced that Bob Appleby will join its ADI Global Distribution business as vice president and general manager of ADI North America, effective immediately. ADI North America head In his new role, Appleby will oversee all of ADI North America’s business operations across the United States, Canada and Puerto Rico, and will help ADI deliver on financial commitments...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-1802G-SFP and LMX-1802G-SFP Series. Antaira’s LMP-1802G-SFP and LMX-1802G-SFP series are industrial-grade equipment that is Ethernet ready to fulfil various markets’ edge-level networking applications in harsh and o...
Johnson Controls has updated its popular Illustra Pro camera family with a new generation of Illustra Pro Mini-Domes featuring Smart Wide Dynamic Range. Offering a choice of 2, 3, 5 and 8 megapixel models and a variety of lens options, the new Pro Mini-Domes are ideal for a wide range of deployments in both medium and large-sized facilities. Smart WDR technology This new Smart Wide Dynamic Range (WDR) technology built into the new Mini-Domes greatly improves the quality of images captured in v...
Ping Identity, globally renowned provider of identity defined security solutions, has announced the release of PingCloud Private Tenant, a private cloud identity solution for the enterprise. Cloud identity, access management PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment. Enterprises can provide authentication for all users with a highly-configurable global authentication authority that...
Johnson Controls announces Tyco Cloud, a new cloud-based security suite developed to help customers move costly and complex security infrastructure for access control and video surveillance to the cloud. With Tyco Cloud, organisations can reduce costs, improve enterprise security management and scale security operations on demand, providing unlimited possibilities to deliver security services over the internet. Accelerating digital transformation Tyco Cloud empowers this digital transformatio...
42Crunch, creator of the industry’s first API Firewall, has announced the latest release of its API security platform with enhanced tools for developers to easily define security in OpenAPI contracts, enabling an agile DevSecOps experience, and providing full visibility into each individual API’s security landscape. API security API security is complex and becomes a bottleneck when not implemented properly. Adopting a shift-left approach will allow enterprises to ensure security th...
Ajax Systems, globally renowned manufacturer of innovative security solutions, announces a partnership with Oprema, renowned and rapidly growing independent security distributor in the UK. Oprema’s customers now have access to a full range of Ajax wireless products for complete protection of residential and commercial properties from intrusion, fire, and leaks. Remote access management Ajax users can remotely manage their systems, control appliances, and check the CCTV streams via mobil...
Everbridge, Inc., the global provider of critical event management (CEM) and enterprise safety software applications to help keep people safe and businesses running, announced the acquisition of NC4, a global provider of threat intelligence solutions that empower businesses, government organisations, and communities to assess and disseminate risk data and information to manage and mitigate the impact of critical events. The combination of NC4’s real-time threat intelligence and analyst te...
CNL Software, a global provider of Physical Security Information management (PSIM) software, will be demonstrating the latest features of its IPSecurityCenter PSIM software at the GSX. These demonstrations will help those responsible for the security of major cities, government agencies, public & private critical infrastructure, public & private corporations, and transportation facilities & networks to better understand and more efficiently react to security incidents. Recent IPSecu...
Since the Internet has matured, society has become more interconnected, as have the devices used to enhance everyday lives. This has led to the emergence of the so-called "Internet of Things" (IoT), in which autonomous devices as well as people are now interconnected in and across private, public, and industrial spaces. IoT technologies IoT technologies are invading all application domains including services relevant to emergency situations IoT technologies are invading all application domain...
As a long standing Development Partner, Third Millennium is pleased to further strengthen its status with LEGIC in providing new and design-led collaborative innovation within the security access marketplace. With headquarters based in Switzerland, LEGIC is a trusted supplier to corporations around the world in supplying secure credential and access authentication control, and for more than 25 years, it has been a developer in mobile and contactless smartcard technologies using RFID, BLE and NF...
ExtraHop, globally renowned cloud-first detection and response solutions provider for hybrid enterprises, has issued a security advisory exposing several cases of third-party vendors ‘phoning home’ proprietary data without the knowledge of or authorisation from their customers. The advisory serves as a warning to all enterprises to hold their vendors more accountable for how they use customer data. Phoning home proprietary data The newly-issued advisory defines phoning home as a ho...
Most enterprises today deploy a multitude of touchpoints where consumers can interact and access the information they require. For many organisations, APIs (Application Programming Interfaces) are the bread-and-butter for enabling inter-enterprise process automation, IoT devices and mobile applications. Even though they are working behind the scenes, APIs are ubiquitous. They help to deliver sports updates, post online messages, order food – enabling everything online. To stay competitive...
Royal Boon Edam International is proud to announce that the Circlelock security locker is celebrating its 35th anniversary in 2019. Since entering the market in 1984, demand for this custom entry solution has continued to grow steadily in several important segments, including data centres, government and military, and commercial facilities. Principle of multi-factor authentication The Circlelock security booth owes its longevity to the principle of multi-factor authentication, whic...
Recognising the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, and Bosch, companies in access, secure connectivity and mobile/CE device solutions – announced the launch of the FiRa Consortium. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases fo...
Pulse Secure, global provider of software-defined Secure Access solutions to both enterprises and service providers, has announced that it has become a member of the MSPAlliance, the oldest managed services group and the only accrediting and standards based body created specifically for the managed services provider industry. Secure Access services Recognising the push towards utility computing and an expectation for workforce mobility, multi-cloud performance and Zero Trust defenses, organisa...
DDoS attacks are easily capable of overloading many companies’ broadband connections. There are several DDoS-for-hire services offering attacks between 10 and 100 Gbps for a modest fee. Currently, one DDoS provider is offering free DDoS attacks of up to 200 Mbps bandwidth for a duration of five minutes. The maximum attack volumes seen by Link11 between April and June 2019 also increased by 25% year-on-year, to 195Gbps from 156Gbps in Q2 2018. In addition, 19 more high-volume attacks with...
Carbon Black, globally renowned cloud-native endpoint protection solutions provider, has released a white paper that proposes an updated cybersecurity kill chain model to help defenders stay ahead of evolving cyberattacks. Cybersecurity kill chain model The paper titled, ‘Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behaviour’, delves into the various ways cybercriminals have evolved in recent years and offers specific guide...
ExtraHop, global provider of cloud-first network detection and response solutions, has announced the appointment of experienced technology and software industry veteran Bill Ruckelshaus as its Chief Financial Officer (CFO). Ruckelshaus joins the company as it accelerates with more than 10x growth in cybersecurity and rapid expansion of its cloud product portfolio. He will hold a position on the ExtraHop executive leadership team, reporting to ExtraHop CEO Arif Kareem. Cybersecurity expert Ruc...
Expansion of the Aqua-Pivotal collaboration delivers comprehensive security for application development and production environments on PCF. Aqua Security, global platform provider for securing container-based and cloud native applications, has announced the public release of Aqua Security’s runtime protection for Pivotal Cloud Foundry (PCF). Users of Pivotal’s platform can download and install the Aqua Security for PCF service from Pivotal Services Marketplace, and deploy an end-to-...
The International Society of Automation (ISA) has announced the first founding members of its new Global Cybersecurity Alliance (GCA) - Schneider Electric, Rockwell Automation, Honeywell, Johnson Controls, Claroty, and Nozomi Networks. Global Cybersecurity Alliance ISA created the Global Cybersecurity Alliance to advance cybersecurity readiness and awareness in manufacturing and critical infrastructure facilities and processes. The Alliance brings end-user companies, automation and control sys...
Star Alliance, globally renowned airline alliance, and NEC Corporation, international supplier of IT, network and biometric technologies, has signed a partnership agreement to develop a biometric data-based identification platform that will significantly improve the travel experience for frequent flyer program customers of Star Alliance member airlines. Biometric data-based identification The interoperable platform advances the Star Alliance and NEC strategic vision of delivering a seamless cu...
Cobalt Iron Inc., a provider of cloud-based data protection, is simplifying the task of managing multiple storage and data protection technologies with the company's Adaptive Data Protection™ platform. Through automation, continual analytics-based optimisation, and orchestration of technologies and operations, the Cobalt Iron Adaptive Data Protection platform delivers a unified enterprise data protection experience. Cost-effectively leverage Vendors in the competitive storage and data p...
Comelit Group and Salto Systems have announced a state-of-the-art integration to enable a unique door entry and access control solution, operated via simple-to-use mobile app technology. Salto Systems is a Spanish company founded in 2001 with one objective: devising a world-class access control system simple to use and extremely efficient. Now, Salto has become one of the world’s top manufacturers of electronic access control system, the perfect partner for Comelit. Salto KS integrated A...
Pivot3, global provider of intelligent infrastructure solutions, has announced the Virtual Security Operations Center (Virtual SOC), designed to address the need for security teams to access client workstations running video surveillance and other related systems in multiple locations without using expensive, dedicated client workstation hardware. Virtual Security Operations Center With the Pivot3 Virtual SOC, security teams can now get fully functional security workstation capabilities With...
Check Point announces three new security gateway appliance models: 16000 Base, 16000 Plus and the record breaking 26000 Turbo are extensions of Check Point’s new 16000 and 26000 gateway range which were introduced in June, presenting a complete line of high-end appliances with up to 64 networking interfaces, 16x 100 GbE (Gigabit Ethernet) or 40 GbE. Powered by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways incorporate Check Point’s ThreatCloud and award...
Skybox Security releases mid-year update to its 2019 Vulnerability and Threat Trends Report, analysing what’s shaping the threat landscape so far this year. Report Highlights from 2019 H1 Vulnerabilities in cloud containers have increased by 46 percent compared to the same period in 2018 and by 240 percent compared to 2017 Less than one percent of newly published vulnerabilities were exploited in the wild, with nine percent having any functioning exploit developed at all 2019 has add...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download