Amazon Web Services News
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of cloud systems reflects widespread confidence in these systems to protect the data they handle. However, there are physical security professionals who remain concerned about cloud-based systems from the perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How can the industry...
GlobalPlatform, the standard for secure digital devices and services, will host a Security Evaluation Standard for IoT Platforms (SESIP) methodology seminar in Barcelona on October 19. The full-day seminar explores how the methodology is positioned in the context of European regulations and offers an optimised approach for evaluating the security of connected products that meet the specific compliance, security, privacy, and scalability challenges of the evolving IoT ecosystem. IoT r...
Touchless technology enables users to complete transactions or perform actions with systems touch-free. It leverages optical and biometric sensing capabilities, enabling computer systems to receive instructions through user behaviour or physical movement. Touchless technology helps improve and manage access to financial services and institutions in a number of ways. Types of Touchless Technologies Touchless Sensing Touch-free sensors can detect the presence or movement of a person or obj...
Cohesity, a provider of next-gen data management, announced it was named a Leader and an Outperformer in two GigaOm Radar reports: the GigaOm Radar for Hybrid Cloud Data Protection: Large Enterprises and the GigaOm Radar for Hybrid Cloud Data Protection: Small and Medium-Sized Enterprises. This is the third time Cohesity was named a Leader in the Large Enterprises report. Cohesity is acclaimed for offering “strongly differentiated cyber resiliency features,” “great data manag...
Currently and unfortunately, there is no such thing as Cloud Police. If there were, two-thirds or more of the companies using ‘cloud’ in their advertising and documentation would be in Cloud Jail for seriously misusing the word in their marketing. The term ‘Cloud’ is over-used and misused—sometimes intentionally and knowingly, but also often in ignorance. It’s just a word—but in the context of cloud computing technology, it does have a specific meaning...
Rekor Systems, Inc, a global AI technology company with a mission to make communities around the world safer, smarter and more efficient by providing actionable, data-driven insights through intelligent infrastructure, announces the availability of its cloud-based Transportation Management Platform within the Amazon Web Services (AWS) Partner Network (APN). The Platform has been certified as ‘Well-Architected’ to function in a cloud-based environment. APN is a global community of pa...
In the ever-evolving business landscape, this national direct marketing firm recognised the importance of technology to not only stay in front of their customers but to continually optimise internally for their business as well. After many years working with the Ntirety team, the direct marketing firm knew they would get the insights and recommendations to keep the firm competitive and cost-effective. Runaway cloud costs The direct marketing firm quickly adapted and learned to harness technol...
SailPoint Technologies Holdings, Inc, a pioneer in identity security for the modern enterprise, announces its new Amazon Web Services (AWS) region in Tokyo. This is the seventh region for the company, with other locations in Frankfurt, London, Montreal, Sydney, and two in the United States of America (USA). The launch highlights the growing global demand for SailPoint’s cloud identity security offerings and the company’s focus on helping customers achieve their data residency requir...
Device Authority, a globally renowned company in identity and access management (IAM) for the Internet of Things (IoT), and Trusted Objects, a global player in cyber security technologies for embedded systems and cloud device management platforms, have announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform. Last year, Trusted Objects joined the KeyScaler Ready programme, which enabled both teams to work closely together to provide a combined solut...
Quickly becoming an industry pioneer, the supply chain and Parts Management Company (AKA PCM) improved the parts supply-chain for a consistent and accurate flow of parts so shops can get customers back on the road. This business sought to provide marketing, support and safety certification training to collision repair shops and automotive parts suppliers. Situation-Supply chain issues becoming problematic As technology in the supply-chain industry advanced and supply chain issues became...
Veriff, a global identity verification (IDV) provider announced that it has joined the Amazon Web Services (AWS) Partner Network (APN). By joining the APN as an AWS Advanced Technology Partner, Veriff becomes part of the global community of Partners leveraging the network to build cloud-based solutions and services for customers across several industries. Veriff analyses more than 10,000 variations of government-issued IDs from over 190 countries in 40 different languages via machine learning a...
Pindrop, a global technology company that offers security, identity, and intelligence for every voice, has announced that VeriCall Technology, a solution offered by its wholly-owned subsidiary, Next Caller, is now the first ANI validation and spoof detection platform, available on Amazon Marketplace for Amazon Connect, a cloud-based contact centre service platform. VeriCall Technology This offering will enhance call verification and spoof detection, while enabling businesses to personalise the...
Fugue, a cloud security SaaS company, announces support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies, saving cloud teams significant time and ensuring consistent policy enforcement across the development life cycle. With this release, organisations can now use Fugue to secure infra...
Security contractors can no longer afford to simply complete a project and move on to the next job without creating recurring service revenues and an ongoing commitment to the customer. iDter, which stands for intelligent and immediate deterrence of crime, recently launched a complete commercial security solution and partnership programme with the ability to generate RMR streams through its unique technology footprint. A fully integrated and automated security solution, iDter is proven to foil...
UK-based cyber security start-up, Robo Shadow, launches their initial product set as they attempt to take on the big guns in cyber security. The platform boasts a range of features including vulnerability scanning, hardware and software reporting for all the devices, reporting on Windows Defender centrally (removing the need for third-party anti-virus) and much more. Terry Lewis, CEO and Prolific Tech Investor, states that "We want to democratise cyber security, by removing the cost and the com...
Dahua Technology, a video-centric, provider of smart IoT solutions, is introducing version 8.0 of their DSS Video Management Software (VMS) to its North American market. The software upgrade incorporates a smaller file size for the installation package, faster startup time, and an easy-to-deploy secure design. It also boasts high scalability and performance to maximise the investment of DSS users. DSS 8.0 is designed for ease of use, efficiency, and flexibility. Multiple deployment methods allo...
ISC West 2021, in collaboration with premier sponsor, Security Industry Association (SIA), took place last week from July 19-21, 2021, at the Sands Expo & Convention Center, in Las Vegas, serving to accelerate market recovery and re-define the roadmap ahead for the security & public safety industry, after a year-plus hiatus of large scale, in-person events. ISC West 2021 Noting the buzz of positive energy, enthusiasm and excitement throughout the three-day event, ISC West customers tes...
Aqua Security, the pure-play cloud-native security solutions company, has announced the availability of its new Aqua Platform, with a unified console to ease the journey from scanning and visibility to workload protection in cloud-native environments. Aqua Platform The new Aqua platform reduces administrative burden and allows security teams to start with scanning and cloud security posture management (CSPM) capabilities, then add in sandboxing capabilities and workload protection as needed. T...
Fugue, the company helping organisations innovate faster and more securely in the Cloud, announced a 1.0 release for Regula, an open source policy engine for infrastructure as code (IaC) security. The release includes comprehensive support for common IaC tools, such as Terraform and AWS CloudFormation, pre-built libraries with hundreds of policies that validate Amazon Web Services (AWS), Microsoft Azure, and Google Cloud resources, and new developer tooling to support custom rules development a...
The Security Industry Association (SIA) has announced the 2021 agenda and speaker lineup for AcceleRISE: The Challenge, an essential experience hosted by SIA’s RISE community for young professionals in the security industry. The 2021 AcceleRISE event – taking place virtually August 23-25 – will challenge tomorrow’s security leaders to test their limits, escape their comfort zones and grow their industry expertise. “AcceleRISE is a unique learning experience for up-...
Vectra AI, a pioneer in threat detection and response, announces the introduction of Vectra Detect for Amazon Web Services, Inc. (AWS). Detect for AWS is a cloud-native SaaS solution that provides continuous, scalable agentless threat detection, prioritisation, investigation, and response to attacks targeting applications running on AWS, as well as users, compute, and storage instances, including the use on AWS of the control plane itself. Detect for AWS works both at runtime and holistically a...
The Student Loans Company (SLC) has spent over 76,800 pounds on cyber security training for its staffers, over the two most recent financial years (FY 19/20, FY 20/21), according to official figures. The data obtained and analysed using the Freedom of Information (FOI) Act by Griffin Law, the niche litigation practice, shows that nearly 20,000 specialist courses were completed in areas, such as phishing, password protection, bribery, corruption, and privacy standards. The data shows that 9,334...
Industry-renowned video surveillance outfit, Cloudview, has unveiled its latest state-of-the-art, cloud-based solution to the CCTV market. Buoyed by two successful funding rounds, Cloudview’s latest cloud video recording system (CVR) is now ready for launch. Cloud video recording system (CVR) This next-generation technology unifies, manages and securely consolidates smart-triggered events from IP CCTV cameras in any location. Data is stored safely and is always accessible. Built from the...
Installers and integrators are set to benefit from Dahua Technology’s new Partner app, which is available to download free of charge. Partner app The app is loaded with information to help installers specify the most appropriate products for their projects. This includes detailed product specifications and comparisons, a range of ‘how to’ videos and documents exploring common technical issues, which are searchable by category, and the latest news about Dahua products and serv...
Ping Identity, the Intelligent Identity solution for the enterprise, partners with ProofID to successfully simplify identity security for Tesco Bank, the banking division of the supermarket retailer, to enable a more secure and customer-centric banking experience. Since its formation in 1997, the more than five million customer identities managed by Tesco Bank had become siloed across its products and services, adding unwanted friction to the customer experience. Inflexible security posture T...
Blue Prism® announced the availability of Blue Prism Service Assist on Amazon Web Services (AWS) – a comprehensive, no-code, intelligent automation contact centre solution that combines intelligent digital workers and native AWS services so enterprises can deliver faster, more efficient, and more engaging customer experiences. Blue Prism Service Assist for AWS combines the capabilities of Amazon Connect and Amazon ElastiCache with Blue Prism’s Servi...
The Connectivity Standards Alliance (CSA), formerly known as the Zigbee Alliance, an organisation of hundreds of companies creating, maintaining, and delivering open, global standards for the Internet of Things (IoT), announces Matter – the interoperable, secure connectivity standard for the future of the smart home. The proliferation of connected objects continues to change the way one lives, works and plays. From homes to offices, factories to hospitals, connected objects enable one to...
Could the data that the access control system generates reveal priceless business insights? In many businesses, the answer is affirmative. The problem is how to analyse that data quickly and accurately to bring valuable, digestible business benefits. As reported by the Houston Chronicle, ‘Data is at the core of nearly every business decision made. A new Reporting & Analytics Tool for CLIQ access control systems enables security and facility managers to extract, visualise and analyse t...
Clavister, a globally renowned company in high-performance cyber security solutions, has announced the launch of the latest generation of Clavister NetShield Virtual, highly regarded as one of the world's fastest virtualised solution for securing 5G networks. With data rates of over 600 Gbps on a single Intel Xeon-based server, Clavister sets a new high-water mark for 5G Security capacity. Virtualised solution for 5G networks With the proliferation of virtualisation, there has been a steady i...
Fugue, the company transforming cloud security to help organisations innovate faster, announces it has added support for Google cloud to its multi-cloud security platform. With Fugue, cloud engineering and security teams can secure their entire cloud development lifecycle (CDLC)—from infrastructure as code to production—across their Amazon Web Services (AWS), Microsoft Azure, and now Google cloud environments using the same Cloud Security Posture Management (CSPM) solution. Multipl...
Browse security news
- By event
- Data Centre & Cloud Innovation Summit 2025
- World Game Protection Conference (WGPC) 2025
- Inter Airport Southeast Asia (IASEA) 2025
- 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls
- Innovation Lab 2025
- ISC West 2025
- The Health & Safety Event 2025
- The Security Event 2025
- 11th National Conference On CFIUS
- 19th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- G2E Asia + Asian IR Expo 2025
- View more
Delta Scientific DCS8000 Bi-Fold Speed Gate
ASSA ABLOY Aperio H100 Wireless Access Control Handle
NordLayer: Comprehensive Network Security for Modern Workforce
A modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadSecurity practices for hotels
Download2025 Trends in video surveillance
DownloadMaximising security and performance
Download