Cyber security - News
NetLink Network Communications Module provides intelligent networking and prevents power issues with predictive analytics Power is the heart of an integrated system solution and now LifeSafety Power Inc., Mundelein, Illinois, provides predictive analytics for enterprise power solutions in the NetLink Network Communications Module and PowerCom Power System Manager. Battery Management With the most comprehensive enhancements to NetLink in V8, LifeSafety Power offers smart moni...
exacqVision now supports HTTPS communication between the NVR and some of the industry’s leading cameras Tyco Security Products, part of Johnson Controls, introduces the latest release of the exacqVision VMS (8.4) which adds critical cybersecurity features demanded by IT departments while enhancing the user experience. exacqVision VMS 8.4 exacqVision now supports HTTPS communication between the NVR and some of the industry’s leading cameras, adding a new layer of...
Integrators will benefit from easy-to-install cloud-based security system with extra cybersecurity measures Hikvision USA Inc., the North American provider of innovative, award-winning video surveillance products and solutions, and Eagle Eye Networks, Inc., the cloud-based video surveillance provider, announces a technology partnership to deliver customers a seamless and cybersecure cloud video surveillance solution. Benefits Of Integration Hikvision and Eagle Eye are expand...
The new FaceStation 2 is a contactless facial recognition device with an adjustable wall bracket BioConnect and Suprema will be at ISC West 2017 demonstrating the newest innovations in biometrics, security and identity in booth no. 22075. New facial recognition, dual-factor cabinet lock, cybersecurity and mobile solutions will be demonstrated in the joint booth. With cybersecurity issues seemingly ever-more prevalent and the development of more user-friendly secur...
The Internet of Things (IoT) raises many new issues for security professionals. Attendees who register for ‘The Pros and Cons of the Internet of Things’ seminar at ISC West 2017 will come away with insights on new developments in networked solutions for the security industry and how they are impacting today’s systems. The assembled panel of thought leaders, representing nearly every category within the industry, will discuss the ins and outs of networking technologies and cybe...
Focus areas include cybersecurity, marketing, leadership, RMR, project management, and technical topics PSA Security Network, an electronic security cooperative, announced it will host an ISC West 2017 education track with sessions and a workshop during ISC West in Las Vegas, Nevada, April 4-5, 2017. Various PSA Committee members, staff, and other industry experts will lead the eight sessions that are included in the PSA Track. Focus areas include cybersecurity, marketing, le...
The Pulse Access Suite delivers a complete secure access solution for mobile, cloud, and data center At the RSA Conference 2017, Pulse Secure—Booth Number N4135, launched the Pulse Access Suite, delivering on the promise of secure access for the next generation. The Pulse Secure Access Suite integrates everything needed to enable secure access, simplifying purchase, deployment, and operations while offering more value compared to siloed, multi-vendor solutions. Pulse Se...
Jonathan Lewit will touch on the array of connected devices and open platforms in the market ONVIF, a standardization initiative for IP-based physical security products, announced that it will be presenting at TechSec Solutions 2017, February 27-28, 2017, at the Delray Beach Marriott, Delray Beach, Florida, as part of a panel discussion on standards, best practices, cybersecurity, and the Internet of Things.Internet Of ThingsJonathan Lewit, Chair of the ONVIF Communication Com...
Wiegand over-the-air protocol is no longer secure due to its original obscure and non-standard nature Farpointe Data, the access control provider of RFID solutions, is notifying its access control manufacturers, distributors, integrators, and dealers that hacking of access control systems has become a threat far bigger than most think. Protecting their end-users from hackers is imperative for channel partners. Cyber Security Breaches "The U.S. federal government suffered a s...
The launch includes more than 70 new security features that enhance all aspects of Palo Alto Network’s Next-Generation Security Platform It’s no secret that attackers and their methods have become more targeted, sophisticated, and automated. What followed is also an evolution in needs and demands of security teams to tackle new threats and risks. To address the ever-changing threat landscape and provide organizations with the best security capabilities possible, se...
Checkmarx CxSAST addresses more than 20 different programming languages, and Scala is its latest addition Checkmarx, a provider of application security testing, announced open beta support of the Scala programming language. The new capability adds the ability to analyze and remediate security risks and vulnerabilities exposed in projects written using Scala code. Identifying Potential Vulnerabilities Checkmarx is the first static analysis solution to support Scala. The added...
New Q4 threat intelligence report addresses the evolving science of cyber forensics to identify cyber-attack sources NTT Security issues its quarterly Threat Intelligence Report, which underscores the need for more advanced tools to protect organizations’ data and networks from the evolving tactics, techniques and procedures (TTPs) used by cyber-attackers. A topic of considerable public attention is the ability to determine the source of cyber-attacks to determine their...
The partnership lends further credibility to Keep SMS and integration with Authentic Mercury hardware Feenics, Ottawa, Canada, has achieved elite Platinum Partner Status for Mercury Security, Long Beach, California, indicative of the company’s commitment to non-proprietary hardware cloud-computing environments. Authentic Mercury Security is one of the most widely used and specified access control hardware brands in the world.Keep Security Management SolutionFeenics is th...
Physical security leaders seek to minimize network impact while maximising video quality and security When it comes to video surveillance systems, security professionals are most focused on maintaining quality at the right cost, simplifying management, and improving reliability. These findings – from a Razberi Technologies survey of more than 100 security systems integrators and enterprise security leaders – highlight the challenges of cost effectively capturing hi...
The certification process is the responsibility of the Defense Information Systems Agency Pulse Secure, a provider of secure access solutions has announced that Pulse Connect Secure 8.2 and Pulse Policy Secure 5.3 on PSA-Series appliances have been certified for inclusion on The U.S. Department of Defense DoD Unified Capabilities (UC) Approved Products List (APL). Highest Levels Of SecurityThe certification process is the responsibility of the Defense Information Systems Age...
ScanSource resellers in North America will now have access to Razberi ServerSwitchIQ video surveillance appliances Razberi Technologies has signed a new partner in ScanSource Networking and Security, a provider of technology products and solutions. With this agreement, ScanSource resellers in North America will now have access to Razberi ServerSwitchIQ video surveillance appliances. Razberi ServerSwitchIQ Video Surveillance Range “ScanSource sells to many hig...
The StorNext 5.4 announcement reflects Quantum’s continuing expansion and enhancement of its scale-out storage portfolio Quantum Corp. announced significant new enhancements to its award-winning StorNext scale-out file system that takes unstructured data management to higher levels of efficiency and flexibility. These enhancements in StorNext release 5.4 include the ability to integrate existing public cloud storage accounts and third-party object storage—starting...
The launch is part of an ongoing commitment to meet the local data protection needs of Oulse Secure's global customer base Pulse Secure, a provider of secure access solutions has announced a new European hosting option for its Pulse Workspace mobility management solution and Pulse One centralized management solution. Both cloud based products fully meet EU Data Protection laws and compliance standards including ISO 27001, SOC 1, PCI DSS Level 1, and are delivered from Amazon W...
Over two-thirds of security professionals expect to complete one or more acquisitions in the coming year A Capital One survey found that more than half (52 percent) of security professionals see video surveillance as the technology trend that will have the biggest impact on their businesses in the coming year—a significant increase from 2015 when only 23 percent of respondents answered similarly. Growth of interconnected devices (the “Internet of Things”) was...
The MegaLab features dedicated servers for VMS, other software solutions, and NVR appliances Arecont Vision, the industry leader in IP-based megapixel camera technology, has announced that its MegaLab facility has launched a 3rd generation expansion to benefit customers worldwide while continuing to move the surveillance industry forward. The MegaLab is a dedicated testing facility and knowledge center located at Arecont Vision’s headquarters, development center, and ma...
Nortek Security & Control announced the expansion of its manufacturing capacity by 25 percent Nortek Security & Control, a provider of security, smart home, and wellness technology, announced new executive staff additions and role changes to better position itself for continued growth, deliver faster product time to market, fuel more innovation, and serve a growing customer base. Additionally, Nortek Security & Control will be expanding its manufacturing capacity b...
Behavior-based authentication, state-sponsored cyber terrorism, and IoT regulations top the list BeyondTrust, a cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, announced its top 10 technology predictions for 2017, along with five technology events to watch for in the next five years. The cyber security threat landscape continuously grows in complexity and scope, leading to new attacks, innovations, regulations and security meas...
The RSA Conference's Innovation Sandbox Contest will kick off on February 13, 2017 RSA Conference 2017, an information security conferences and exposition, announced that the 12th annual Innovation Sandbox Contest is now accepting submissions to name the RSAC Most Innovative Startup 2017. Past winners include successful companies such as Sourcefire, Imperva, Waratek, and most recently Phantom.Innovation And Entrepreneur SeminarsAs a leader in the infos...
Dahua reminds customers that it is crucial to select strong passwords and keep firmware updated In August, a Distributed Denial of Service (DDoS) attack occurred due to a massive botnet created by malware named Mirai. This attack was caused by vulnerabilities in a large number of IoT devices, such as security cameras and DVRs using default credentials. Dahua’s products were initially named as the victims of the hacking and the source of these DDOS attacks in reports by r...
Borders & Infrastructure show will take place between 20-22 June, 2017 as part of IFSEC 2017 Speaking on Wednesday night at an event at London’s historic Guildhall, IFSEC brand director Gerry Dunphy outlined the vision for the new ‘show within a show’ which will meet the need for Britain’s—and the World’s—response to the ever-increasing terror and security threat. Borders & Infrastructure, which will take place between 20-22 J...
The partnership will help secure buildings from cyber threats In an effort to improve cyber-threat information sharing and analysis, Johnson Controls, a global provider in energy efficiency, integrated solutions and building controls, announces a Cooperative Research and Development Agreement (CRADA) with the U.S. Department of Homeland Security (DHS), Office of Cybersecurity and Communications. The agreement will help secure our nation’s critical infrastructure from tho...
ScanPass® Mobile Credential is engineered to remove the prevalent issues associated with card-based cyber threats Cyber threats and hacking are consistently in the news, and recent reports have circulated that indicate that some access control readers can be easily compromised. ScanPass Mobile Credential is purpose built to prevent the three primary methods with which card-based access control is circumvented: skimming, eavesdropping, replay attacks and tampering. Skimmi...
45% believed that cyber and physical security were equally important in the companies they were linked to The latest Security Research Initiative Report published highlights the crucial role that physical security suppliers and corporate security departments play in tackling cyber-crime, albeit that this often goes unrecognized. Physical Security Specialists Vs. Cyber Specialists In a survey of both physical security specialists and cyber specialists (supple...
The critical area of security has been addressed throughout the 17 specifications of Release 2 The full potential of the Internet of Things (IoT) advanced significantly as oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT, published a new landmark set of specifications, Release 2.Based on contributions from more than 200 member companies, Release 2 builds on oneM2M’s initial set of official specifications, which enable basic...
Features include registering, identity proofing, screening, credentialing, authenticating, reporting and notification management SureID has announced the launch of SureID Certified Enterprise, a high-assurance identity that provides configurable identity assurance for organizations of all sizes across government and private enterprise. With the ability to integrate into an organization’s existing systems, SureID offers identity solutions to enhance an organization’...
