Morse Watchmans has received factory certification from Lenel Systems International and joined the Lenel Open Access Alliance Program (OAAP). Morse Watchmans’ KeyWatcher Touch key management system interfaces with the OnGuard access control system to enable seamless functionality between the systems. The certification ensures that OnGuard will manage functions such as provisioning and administration of the KeyWatcher key control system.
ESET has announcedthat ESET commits to support the Microsoft Windows XP operating system for 32-bit and 64-bit versions till April 8, 2017. ESET will also be providing regular virus signature updates, and customer care support to Windows XP users.
In the NSS Labs Breach Detection Appliance Report, Trend Micro Deep Discovery 3.5 has achieved the highest performance rating in overall breach detection among a field of six providers. Trend Micro was also found to have the second-lowest cost of ownership. Most importantly, based on these findings, Deep Discovery has been cited as “Recommended” by NSS Labs for companies seeking a breach detection appliance.
According to the study ‘Financial cyber threats in 2013’ conducted by Kaspersky Lab, cybercriminals are increasingly trying to gain access to the online accounts of users. Last year, the number of cyber attacks involving financial malware increased to 28.4 million – 27.6% more than 2012.
Axis Communications has introduced the new AXIS P14 Series encompassing seven day-and-night network cameras. With the AXIS P14 Series, customers can choose from camera models with a wide range of resolutions from HDTV 1080p to 4K, including integrated features for efficient and reliable video surveillance such as built-in IR, remote zoom and focus, a built-in slot for micro SD/SDHC/SDXC memory cards and I/O connectors for interfacing with external devices.
After lurking in the shadows for the first ten months of 2013, cybercriminals have unleashed the most damaging series of cyber-attacks in history. Symantec’s Internet Security Threat Report (ISTR), Volume 19, shows a significant shift in cybercriminal behaviour, revealing the bad guys are plotting for months before pulling off huge heists – instead of executing quick hits with smaller rewards.