Data Security - News

Genetec announces offering multiple FICAM-certified options for Security Center Synergis access control system

Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that it is now offering multiple FICAM-(Federal Identity, Credential, and Access Management) certified options for its Security Center Synergis access control system. Personal Identity Verification In a market that has been traditionally weighed down by limited solutions that are often proprietary, these new options offer non-proprietary, open-a...

Dallmeier Camera Series 5000 single sensor cameras support H.265 HEVC and AI-powered Video Content Analysis

The Dallmeier 5000 series single sensor cameras are equipped with a new encoder technology. The new versions of the dome, IR and fisheye cameras support H.265 HEVC (High Efficiency Video Coding) and offer improved object classification with camera-based, AI-enhanced Video Content Analysis (VCA). H.265 compression By its nature, the constantly improving resolution of video images demands high bandwidths and large amounts of memory. With the new generation H.265 encoder in the Dallmeier cameras,...

SureCloud appoints Jon Taylor-Goy as EMEA Sales Manager for the cybersecurity division

SureCloud, a provider of cybersecurity services and cloud-based, Integrated Risk Management solutions, appoints Jon Taylor-Goy as EMEA Sales Manager for the cybersecurity division. Jon will be instrumental in helping drive business growth, as well as establishing complimentary new service lines. Jon’s expertise spans business growth, product development, and go-to-market strategies in the areas of IT risk management and governance. Cybersecurity service offering Jon brings more than 18...

Resideo Technologies announces hiring Bob Appleby as new Vice President and General Manager of ADI North America

Global provider of critical comfort and security solutions primarily in the residential sector, Resideo Technologies, Inc. has announced that Bob Appleby will join its ADI Global Distribution business as vice president and general manager of ADI North America, effective immediately. ADI North America head In his new role, Appleby will oversee all of ADI North America’s business operations across the United States, Canada and Puerto Rico, and will help ADI deliver on financial commitments...

Antaira introduces LMP-1802G-SFP and LMX-1802G-SFP series industrial-grade equipment

Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-1802G-SFP and LMX-1802G-SFP Series. Antaira’s LMP-1802G-SFP and LMX-1802G-SFP series are industrial-grade equipment that is Ethernet ready to fulfil various markets’ edge-level networking applications in harsh and o...

Johnson Controls unveils Illustra Pro Mini-Domes Gen3 Pro cameras with Smart Wide Dynamic Range technology

Johnson Controls has updated its popular Illustra Pro camera family with a new generation of Illustra Pro Mini-Domes featuring Smart Wide Dynamic Range. Offering a choice of 2, 3, 5 and 8 megapixel models and a variety of lens options, the new Pro Mini-Domes are ideal for a wide range of deployments in both medium and large-sized facilities. Smart WDR technology This new Smart Wide Dynamic Range (WDR) technology built into the new Mini-Domes greatly improves the quality of images captured in v...

Ping Identity unveils private cloud identity solution, PingCloud Private Tenant for the enterprise

Ping Identity, globally renowned provider of identity defined security solutions, has announced the release of PingCloud Private Tenant, a private cloud identity solution for the enterprise. Cloud identity, access management PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment. Enterprises can provide authentication for all users with a highly-configurable global authentication authority that...

Johnson Controls announces Tyco cloud to encourage its users to use cloud services

Johnson Controls announces Tyco Cloud, a new cloud-based security suite developed to help customers move costly and complex security infrastructure for access control and video surveillance to the cloud. With Tyco Cloud, organisations can reduce costs, improve enterprise security management and scale security operations on demand, providing unlimited possibilities to deliver security services over the internet. Accelerating digital transformation Tyco Cloud empowers this digital transformatio...

42Crunch announces release of API security platform with enhanced tools for developers

42Crunch, creator of the industry’s first API Firewall, has announced the latest release of its API security platform with enhanced tools for developers to easily define security in OpenAPI contracts, enabling an agile DevSecOps experience, and providing full visibility into each individual API’s security landscape. API security API security is complex and becomes a bottleneck when not implemented properly. Adopting a shift-left approach will allow enterprises to ensure security th...

Ajax Systems announces partnership with UK-based security distributor, Oprema

Ajax Systems, globally renowned manufacturer of innovative security solutions, announces a partnership with Oprema, renowned and rapidly growing independent security distributor in the UK. Oprema’s customers now have access to a full range of Ajax wireless products for complete protection of residential and commercial properties from intrusion, fire, and leaks. Remote access management Ajax users can remotely manage their systems, control appliances, and check the CCTV streams via mobil...

Everbridge acquires NC4 to create threat assessment and incident communications and management platform

Everbridge, Inc., the global provider of critical event management (CEM) and enterprise safety software applications to help keep people safe and businesses running, announced the acquisition of NC4, a global provider of threat intelligence solutions that empower businesses, government organisations, and communities to assess and disseminate risk data and information to manage and mitigate the impact of critical events. The combination of NC4’s real-time threat intelligence and analyst te...

CNL Software to demonstrate latest features of IPSecurityCenter PSIM software at GSX 2019

CNL Software, a global provider of Physical Security Information management (PSIM) software, will be demonstrating the latest features of its IPSecurityCenter PSIM software at the GSX. These demonstrations will help those responsible for the security of major cities, government agencies, public & private critical infrastructure, public & private corporations, and transportation facilities & networks to better understand and more efficiently react to security incidents. Recent IPSecu...

ETSI report highlights IoT devices and technologies for emergency communications

Since the Internet has matured, society has become more interconnected, as have the devices used to enhance everyday lives. This has led to the emergence of the so-called "Internet of Things" (IoT), in which autonomous devices as well as people are now interconnected in and across private, public, and industrial spaces. IoT technologies IoT technologies are invading all application domains including services relevant to emergency situations IoT technologies are invading all application domain...

Third Millennium strengthens its partnership with LEGIC to provide new and innovative security access solutions

As a long standing Development Partner, Third Millennium is pleased to further strengthen its status with LEGIC in providing new and design-led collaborative innovation within the security access marketplace. With headquarters based in Switzerland, LEGIC is a trusted supplier to corporations around the world in supplying secure credential and access authentication control, and for more than 25 years, it has been a developer in mobile and contactless smartcard technologies using RFID, BLE and NF...

ExtraHop issues security advisory for third-party vendors ‘phoning home’ proprietary data of their customers

ExtraHop, globally renowned cloud-first detection and response solutions provider for hybrid enterprises, has issued a security advisory exposing several cases of third-party vendors ‘phoning home’ proprietary data without the knowledge of or authorisation from their customers. The advisory serves as a warning to all enterprises to hold their vendors more accountable for how they use customer data. Phoning home proprietary data The newly-issued advisory defines phoning home as a ho...

Imperva integrates its API Security with Red Hat 3scale API Management

Most enterprises today deploy a multitude of touchpoints where consumers can interact and access the information they require. For many organisations, APIs (Application Programming Interfaces) are the bread-and-butter for enabling inter-enterprise process automation, IoT devices and mobile applications. Even though they are working behind the scenes, APIs are ubiquitous. They help to deliver sports updates, post online messages, order food – enabling everything online. To stay competitive...

Boon Edam's the Circlelock Security Cabin celebrates its 35th Anniversary

Royal Boon Edam International is proud to announce that the Circlelock security locker is celebrating its 35th anniversary in 2019.  Since entering the market in 1984, demand for this custom entry solution has continued to grow steadily in several important segments, including data centres, government and military, and commercial facilities. Principle of multi-factor authentication The Circlelock security booth owes its longevity to the principle of multi-factor authentication, whic...

ASSA ABLOY Group, NXP, Samsung, Bosch launch FiRa Consortium for Ultra-Wideband (UWB) interoperability

Recognising the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, and Bosch, companies in access, secure connectivity and mobile/CE device solutions –  announced the launch of the FiRa Consortium. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases fo...

Zero trust access security provider, Pulse Secure has now become a member of MSPAlliance

Pulse Secure, global provider of software-defined Secure Access solutions to both enterprises and service providers, has announced that it has become a member of the MSPAlliance, the oldest managed services group and the only accrediting and standards based body created specifically for the managed services provider industry. Secure Access services Recognising the push towards utility computing and an expectation for workforce mobility, multi-cloud performance and Zero Trust defenses, organisa...

DDoS attack bandwidths double in Europe in Q2 2019 compared to a year ago; Link11 report

DDoS attacks are easily capable of overloading many companies’ broadband connections. There are several DDoS-for-hire services offering attacks between 10 and 100 Gbps for a modest fee. Currently, one DDoS provider is offering free DDoS attacks of up to 200 Mbps bandwidth for a duration of five minutes. The maximum attack volumes seen by Link11 between April and June 2019 also increased by 25% year-on-year, to 195Gbps from 156Gbps in Q2 2018. In addition, 19 more high-volume attacks with...

Carbon Black releases white paper proposing updated cybersecurity kill chain model to aid defenders avert evolving cyberattacks

Carbon Black, globally renowned cloud-native endpoint protection solutions provider, has released a white paper that proposes an updated cybersecurity kill chain model to help defenders stay ahead of evolving cyberattacks. Cybersecurity kill chain model The paper titled, ‘Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behaviour’, delves into the various ways cybercriminals have evolved in recent years and offers specific guide...

Cloud-based network detection and response firm, ExtraHop hires Bill Ruckelshaus as its new Chief Financial Officer (CFO)

ExtraHop, global provider of cloud-first network detection and response solutions, has announced the appointment of experienced technology and software industry veteran Bill Ruckelshaus as its Chief Financial Officer (CFO). Ruckelshaus joins the company as it accelerates with more than 10x growth in cybersecurity and rapid expansion of its cloud product portfolio. He will hold a position on the ExtraHop executive leadership team, reporting to ExtraHop CEO Arif Kareem. Cybersecurity expert Ruc...

Aqua Security announces public release of runtime protection for Pivotal Cloud Foundry (PCF)

Expansion of the Aqua-Pivotal collaboration delivers comprehensive security for application development and production environments on PCF. Aqua Security, global platform provider for securing container-based and cloud native applications, has announced the public release of Aqua Security’s runtime protection for Pivotal Cloud Foundry (PCF). Users of Pivotal’s platform can download and install the Aqua Security for PCF service from Pivotal Services Marketplace, and deploy an end-to-...

International Society of Automation unveils first founding members of Global Cybersecurity Alliance

The International Society of Automation (ISA) has announced the first founding members of its new Global Cybersecurity Alliance (GCA) - Schneider Electric, Rockwell Automation, Honeywell, Johnson Controls, Claroty, and Nozomi Networks. Global Cybersecurity Alliance ISA created the Global Cybersecurity Alliance to advance cybersecurity readiness and awareness in manufacturing and critical infrastructure facilities and processes. The Alliance brings end-user companies, automation and control sys...

Star Alliance and NEC Corporation sign deal to enhance passenger experience via biometric data recognition technology incorporation

Star Alliance, globally renowned airline alliance, and NEC Corporation, international supplier of IT, network and biometric technologies, has signed a partnership agreement to develop a biometric data-based identification platform that will significantly improve the travel experience for frequent flyer program customers of Star Alliance member airlines. Biometric data-based identification The interoperable platform advances the Star Alliance and NEC strategic vision of delivering a seamless cu...

Cobalt Iron launches Adaptive Data Protection platform to enhance enterprise data protection

Cobalt Iron Inc., a provider of cloud-based data protection, is simplifying the task of managing multiple storage and data protection technologies with the company's Adaptive Data Protection™ platform. Through automation, continual analytics-based optimisation, and orchestration of technologies and operations, the Cobalt Iron Adaptive Data Protection platform delivers a unified enterprise data protection experience. Cost-effectively leverage Vendors in the competitive storage and data p...

Comelit Group and Salto Systems announce integration for seamless access control using One App mobile solution

Comelit Group and Salto Systems have announced a state-of-the-art integration to enable a unique door entry and access control solution, operated via simple-to-use mobile app technology. Salto Systems is a Spanish company founded in 2001 with one objective: devising a world-class access control system simple to use and extremely efficient. Now, Salto has become one of the world’s top manufacturers of electronic access control system, the perfect partner for Comelit. Salto KS integrated A...

Pivot3 announces release of Virtual Security Operations Center (Virtual SOC) for real-time secure access and control for mission-critical video surveillance

Pivot3, global provider of intelligent infrastructure solutions, has announced the Virtual Security Operations Center (Virtual SOC), designed to address the need for security teams to access client workstations running video surveillance and other related systems in multiple locations without using expensive, dedicated client workstation hardware. Virtual Security Operations Center With the Pivot3 Virtual SOC, security teams can now get fully functional security workstation capabilities With...

Check Point announces three new security gateway appliances with up to 64 networking interfaces

Check Point announces three new security gateway appliance models: 16000 Base, 16000 Plus and the record breaking 26000 Turbo are extensions of Check Point’s new 16000 and 26000 gateway range which were introduced in June, presenting a complete line of high-end appliances with up to 64 networking interfaces, 16x 100 GbE (Gigabit Ethernet) or 40 GbE. Powered by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways incorporate Check Point’s ThreatCloud and award...

Skybox Security report states cloud container vulnerabilities have soared in recent times

Skybox Security releases mid-year update to its 2019 Vulnerability and Threat Trends Report, analysing what’s shaping the threat landscape so far this year. Report Highlights from 2019 H1 Vulnerabilities in cloud containers have increased by 46 percent compared to the same period in 2018 and by 240 percent compared to 2017 Less than one percent of newly published vulnerabilities were exploited in the wild, with nine percent having any functioning exploit developed at all 2019 has add...