Day: August 30, 2016

360 Vision HD cameras powered by Sony STARVIS™

At the forefront of surveillance imaging development and performance, leading UK CCTV design and manufacturing company, 360 Vision Technology, is proud to announce that it is now employing the latest high-performance Sony STARVIS™ 1080P HD camera module across its entire range of HD surveillance cameras.

Dallmeier provide the Hotel Dirsch with video equipment

The Hotel Dirsch in the Altmühl valley in Bavaria has relied on Dallmeier video equipment to ensure the safety of guests and staff for many years. Hotel Dirsch is a family-owned, 4-star Wellness & Spa Resort where holidaymakers can enjoy leisure and comfort.

Yorkshire Building Society selects Unisys Stealth to secure customer data

Yorkshire Building Society selects Unisys Stealth to secure customer data

Unisys Corporation announced that its UK subsidiary has been selected by Yorkshire Building Society Group (YBSG), the UK’s second largest building society, to provide its Unisys Stealth® data protection product to secure customer information and facilitate compliance with the new Payment Card Industry Data Security Standards (PCI DSS).

IDS provide scalable security solution for Amathus Drinks

Amathus, established in 1978, is a London based specialist drinks importer, distributor and retailer offering an array of drinks to the UK market. Amathus are a thriving business and in addition to their online shop, they have four retail stores located in the vibrant and trendy areas around London.

Why do we keep getting hacked? And how can we stop cyber breaches?

Why do we keep getting hacked? And how can we stop cyber breaches?

The hacks just keep on coming; it seems like every week there’s a new, huge hack taking place. The question on everyone’s minds must be why haven’t we got control of this yet? With all the advances in technology, why can’t we beat the hackers? Unfortunately, it’s exactly those technological advances such as mobile applications and the Internet of Things (IoT) that are often the very causes of these breaches.

Scroll to Top