Top Banner
www.security-today.com Integrated New Product and Technology Solutions for Security Professionals September 2013 Vol. 17, No. 9 Mobile Access Control Emergency mustering tablet Telaeris XPressEntry provides complete access control capabilities from a mobile device. The latest release works on any Windows-based tablet and standard handheld devices. The larger screen allows safety staff to view facility occupancies during emergency evacuations. Se- curity staff may perform detailed inspections of user records. The IP54 tablet also reads existing RFID and barcode badges. XPressEntry easily integrates with any existing physical access control system. Telaeris. Go to sp.hotims.com and enter number 310 for product information. 20x Zoom Network PTZ Full HD dome camera captures complete images Samsung’s Network Camera captures full HD images in complete darkness up to 328ft. This network 360 degree PTZ dome comes with a 20x optical zoom and focused IR illumination. The IR illuminators move with the optical zoom lens to give a uniformly distributed illumination in complete and total darkness in full 1080p HD (1920x1080). This Onvif compliant camera fea- tures a Wide Dynamic Range of 60db, video analytics, bi-directional audio, and edge recording using SD or SDHC cards. Samsung. Go to sp.hotims.com and enter number 311 for product information. Purpose-Built Client Workstations Optimized and certified Seneca Data’s latest product line of purpose-built workstations features Intel 4th generation processor technology. Seneca manu- factures workstations for leading video surveillance client software applications. The latest Intel technology increases system perfor- mance and throughput, allowing customers to view more cam- eras, experience better resolution at higher frame rates within a cost- effective hardware solution. Seneca Data. Go to sp.hotims.com and enter number 312 for product information. MicroDome H.264 all-in-one multi-megapixel cameras Arecont Vision’s new MicroDom is an ultra-low profile multi-megapixel camera designed for applications needing high-resolution and a small footprint. Cameras resolutions include 1.3 MP, 3 MP, 5 MP and 1080p, with Wide Dynamic Range up to 100dB, and full resolution up to 1080p and 3 MP. The cameras have three unique spring arms, making installation easy. Arecont Vision. Go to sp.hotims.com and enter number 313 for product information. 10-Port Web Smart Gigabit PoE Switch Power over Ethernet (PoE) D-Link’s DGS-1210-10P switch with lifetime warranty is ideal for powering IP cameras and other PoE-pow- ered security devices. Eight dedicated 10/100/1000 Base-T gigabit ports support 802.3at PoE+, and two addi- tional “combo” ports operate as either copper or optical (SFP) interfaces. Its fanless design means silent operation. An intuitive management interface allows network administrators to reboot IP cameras and control PoE power anywhere, anytime. Advanced features include VLAN, QoS, Link Aggregation, ACL, and cable diagnostics. D-Link. Go to sp.hotims.com and enter number 314 for product information. Affordable and Simple Introducing an electronic access control solution The EL Series electronic lock from STANLEY Security is designed for a variety of commercial market applications. From retail, as- sisted living and banking to multi-family, industrial and other com- mercial office buildings, this proximity reader is easy to program and install and provides a low cost of ownership. The standalone lock requires no additional software and can be upgraded to the wireless option. STANLEY Security. Go to sp.hotims.com and enter number 315 for product information. Vandal-Resistant PTZ Dome Affordable solution for indoor surveillance The vandal-resistant AXIS M5014-V PTZ dome network cam- era, with IP66 and IK10 ratings, enables monitoring of indoor areas up to 4300 square feet. The hard ceiling-mount camera enables full frame rate HDTV 720p video in H.264 and Motion JPEG. AXIS M5014-V has support for a wide range of capabilities including motion detection, camera tampering, SD-card slot for optional local storage and easy installation features, including Power over Ethernet. Axis Communications. Go to sp.hotims.com and enter number 316 for product information. VISIT DSX ACCESS SYSTEMS ASIS BOOTH 963
108

ASIS BOOTH 963

Feb 02, 2023

Download

Documents

Khang Minh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ASIS BOOTH 963

www.security-today.com

Integrated New Product and Technology Solutions for Security Professionals September 2013 Vol. 17, No. 9

Mobile Access ControlEmergency mustering tabletTelaeris XPressEntry provides complete access control capabilities from a mobile device. The latest release works on any Windows-based tablet and standard handheld devices. The larger screen allows safety staff to view facility occupancies during emergency evacuations. Se-curity staff may perform detailed inspections of user records. The IP54 tablet also reads existing RFID and barcode badges. XPressEntry easily

integrates with any existing physical access control system. Telaeris.Go to sp.hotims.com and enter number 310 for product information.

20x Zoom Network PTZFull HD dome camera captures complete imagesSamsung’s Network Camera captures full HD images in complete darkness up to 328ft. This network 360 degree PTZ dome comes with a 20x optical zoom and focused IR illumination. The IR illuminators move with the optical zoom lens to give a uniformly distributed illumination in complete and total darkness in full 1080p HD (1920x1080). This Onvif compliant camera fea-tures a Wide Dynamic Range of 60db, video analytics, bi-directional audio, and edge recording using SD or SDHC cards. Samsung.Go to sp.hotims.com and enter number 311 for product information.

Purpose-Built Client Workstations Optimized and certifi edSeneca Data’s latest product line of purpose-built workstations features Intel 4th generation processor technology. Seneca manu-factures workstations for leading video surveillance client software applications. The latest Intel technology increases system perfor-mance and throughput, allowing customers to view more cam-

eras, experience better resolution at higher frame rates within a cost-effective hardware solution. Seneca Data.Go to sp.hotims.com and enter number 312 for product information.

MicroDomeH.264 all-in-one multi-megapixel camerasArecont Vision’s new MicroDom is an ultra-low profi le multi-megapixel camera designed for applications needing high-resolution and a small footprint. Cameras resolutions include 1.3 MP, 3 MP, 5 MP and 1080p, with Wide Dynamic Range up to 100dB, and full resolution up to 1080p and 3 MP. The cameras have three unique spring arms, making installation easy. Arecont Vision.Go to sp.hotims.com and enter number 313 for product information.

10-Port Web Smart Gigabit PoE SwitchPower over Ethernet (PoE)D-Link’s DGS-1210-10P switch with lifetime warranty is ideal for powering IP cameras and other PoE-pow-ered security devices. Eight dedicated 10/100/1000 Base-T gigabit ports support 802.3at PoE+, and two addi-tional “combo” ports operate as either copper or optical (SFP) interfaces. Its fanless design means silent operation. An intuitive management interface allows network administrators to reboot IP cameras and control PoE power anywhere, anytime. Advanced features include VLAN, QoS, Link Aggregation, ACL, and cable diagnostics. D-Link.Go to sp.hotims.com and enter number 314 for product information.

Affordable and SimpleIntroducing an electronic access control solutionThe EL Series electronic lock from STANLEY Security is designed for a variety of commercial market applications. From retail, as-sisted living and banking to multi-family, industrial and other com-mercial offi ce buildings, this proximity reader is easy to program and install and provides a low cost of ownership. The standalone lock requires no additional software and can be upgraded to the wireless option. STANLEY Security.

Go to sp.hotims.com and enter number 315 for product information.

Vandal-Resistant PTZ DomeAffordable solution for indoor surveillanceThe vandal-resistant AXIS M5014-V PTZ dome network cam-era, with IP66 and IK10 ratings, enables monitoring of indoor areas up to 4300 square feet. The hard ceiling-mount camera enables full frame rate HDTV 720p video in H.264 and Motion JPEG. AXIS M5014-V has support for a wide range of capabilities including motion detection, camera tampering, SD-card slot for optional local storage and easy installation features, including Power over Ethernet. Axis Communications.Go to sp.hotims.com and enter number 316 for product information.

VISIT DSX ACCESS SYSTEMSASIS BOOTH 963

0913sec_c1_v2.indd 1 8/19/13 9:43 AM

Page 2: ASIS BOOTH 963

Hook your customers up for the ride of their lives.

As the global leader in network video, Axis is setting a fast pace for the industry. Now it’s time to bring the whole analog gang along for the ride.

Axis video encoders are the ideal way for you to approach the huge analog market — offering customers IP surveillance benefits even if they aren’t ready to eject their analog solution yet. Axis encoders protect your customers’ investments by enabling a mix of analog and network cameras.

And with the broadest range of encoders in the industry, Axis helps you fit any need and price point.

When your customers are looking to migrate to IP surveillance, give them (and yourself) a head start. Axis video encoders — the fast lane to growing your video surveillance business.

Get the Axis picture. Stay one step ahead.Visit Axis at ASIS: booth #1034, September 24-26, Chicago, IL. www.axis.com/asis

www.axis.com/encoders

your smartphone

Distributed by:

Count on it.

World’ssupplierof videoencoders!*

Go to http://sp.hotims.com and enter 7 for product information.

Untitled-5 1 7/31/13 11:03 AM

Page 3: ASIS BOOTH 963

Memories. iFly Singapore, the world’s largest indoor skydiving simulator, uses Milestone XProtect® Enterprise surveillance software to monitor

park grounds and give visitors a lasting memory. Flying at speeds of up to 186 miles per hour, the software records each skydiver’s

visitors relive all of the adrenaline-fueled

moments. Proving again that XProtect is more than security.

Milestone XProtect® is the world’s leading IP video surveillance management software and

Which means your possibilities are unlimited and you can keep your security options open. See our new products and the new ways to use XProtect at: www.milestonesys.com

Milestone Systems U.S.Tel: 503 350 1100

See us at ASIS, Booth #2223Go to http://sp.hotims.com and enter 35 for product information.

Untitled-2 1 8/8/13 10:11 AM

Page 4: ASIS BOOTH 963

www.security-today.com CONTENTS SEPTEMBER 2013

4 0 9 1 3 | S E C U R I T Y P R O D U C T S

FEATURES

Correctional Security 14Behind the BarsTexas Department of Criminal Justice investing big in IP videoBy Jessica L. Clark

Systems Integrators 20A Retrofi t SolutionRelationships that benefi t the integratorBy Kim Rahfaldt

Border Security 24Beefi ng Up Border SecurityTips on selling advanced surveillance solutions to protect U.S. frontiersBy John Merlino

Cost Effi ciencies 66At a Global LevelThe benefi ts of centralizing and standardizing security systems fall to the bottom lineBy Renae Leary

Casino Security 78A Key for CasinosMaintaining tight control to minimize lossBy Fernando Pires

Facility Security 86America’s Largest Convention Center Hosts ASIS 2013Tradeshow is a prestigious event for security professionalsBy Judy Jones-Shand

DVRs/NVRs 88On the Cutting EdgeCredit union transitions to all IP video surveillance solution By Ali Mahmoud

Hotel Security 90Luxury and Security MeetChoosing the proper video management system is a thoughtful choiceBy Mary Wilbur

Education Security 92Locking Down a ClassroomIncreasing demands call for immediate sense of securityBy Mike McCoy

Memorial Security 94Supporting Traveling VeteransVietnam traveling wall is consoling and inspirationalBy Skip Haight

PRODUCT SOLUTIONS

New Product of the Year 32

The Govies 70

ASIS Product Preview 80

DEPARTMENTS

Industry Focus 8Ugly Among UsBy Ralph C. Jensen

Industry Vertical 10Finding a Creative SolutionHospital improves communications as part of security planBy Samuel Shanes

Top Picks – September 2013 12

New Products – September 96

Advertisers’ Index 105

Industry Professional 106Out of the BasementBy Ralph C. Jensen

Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.

© Copyright 2013 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission.Mail requests to “Permissions Editor,” c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254

The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the reader’s sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

0913sec_004_TOC_v2.indd 4 8/19/13 9:19 AM

Page 5: ASIS BOOTH 963

1.800.645.9445 • www.cicaccess.com • [email protected] CSI Specs online • See us at ASIS, Napco Booth 1904

Today, managing risk, security & budgets can be a big balancing act

Continental’s Integrated Enterprise Access, Video, Locking & Alarm System is the budget-stretching solution

New Accelaterm™ 8 to 16 Door Controller - superfast door open times under ¼ second, and 921 Kbps processing for full data

downloads of tens-of-thousands of cardholders in minutes

CA3000 fl exibly integrates all, in one cost-effective, interoper-able high-speed platform. Continental offers enterprise security & facility managers today’s leading-edge features in an easy, low-maintenance system, accelerating our own optimized hard-ware and software, seamlessly scalable for 1 to over 32,000 doors.

Not to bring up the elephant in the room, but unlike other manufacturers who keep discontinuing systems or forcing clients to changeover, Continental systems have earned the enviable reputation for being extremely long-lived, providing painless legacy and retrofi t support of multiple technologies, and being fi eld upgradable to grow with you through the years. New! Optional Yearly Upgrade & Retrofi t Rebate Programs, too.

• Multi-stage threat level- & visitor-management & lock-down • Software runs as a service• LDAP Active Directory compliant• More Choice in Video/DVR partners: Milestone™, Pelco™ DS/

DX, Salient™, Hitron™, Integral™

• Trilogy Networx® Access Locks act as single door controllers, built-in HID prox reader, door position, REX & power – no wires.

• Super fast, fi eld-upgradable, 2-, 4-, 8-, 16- Door Controllers• Remote web management, standard• FIPS/CAC/TWIC & biometrics

A Napco Security Group Company

Go to http://sp.hotims.com and enter 39 for product information.

Untitled-2 1 8/8/13 1:19 PM

Page 6: ASIS BOOTH 963

6 0 9 1 3 | S E C U R I T Y P R O D U C T S

Quite the Cast

For September, our articles feature several different security topics from casino, education, even memorial security. We were able to receive different perspectives from industry experts who provided quotes to our correctional security and border

security articles. I hope you enjoy reading the extra dynamic these quotes add to each story.

Our Online Exclusives have made a huge impact to our Website, Security Today. Each story is compel-ling and provides a new look at security products, procedures and more for our online readers.

If you’d like to contribute to our Online Exclu-sives or blog, please contact me at [email protected] or 972-687-6784.

Best Regards,

Lindsay Page

Online Exclusives

Training Next-Generation Cyber Warriors with

Advanced Cyber RangesBy Don ShinOrganizations worldwide face a dangerous shortage of cyber warriors who possess the skills required to defend against cyber terrorism. A pragmatic and sus-tainable new approach is urgently needed to prepare cyber warriors to defend critical infrastructures.

From Curfew to Modern U.S. Fire SafetyBy Jane EmburyWe tend to think of fi re safety as something relatively new, but fi re regulation has been an issue for much longer, dating back to William the Conqueror in the 11th century. Sadly, tragic fi res have shaped fi re and building regulations, in the United States and around the world.  It’s a process that’s been dubbed “codify-ing by catastrophe”. However, as numerous fi res have since demonstrated, providing and enforcing adequate escape routes still remains an issue.

From Legacy to Future Proof with

Hosted Video Storage SolutionsBy Jay KroneToday’s storage technology alternatives are address-ing the data explosion by creating new and improved options for keeping video surveillance overhead low with fl exible, effi cient and scalable methods of stor-ing and accessing corporate data in an on-demand environment. To evolve with increasingly higher levels of availability, security, scalability, perfor-mance and capacity, video surveillance users can future-proof their system with today’s data storage and management capabilities.

http://security-today.com/01131

Recent Headlines

IP Surveillance: Smarter Solutions for Safer Schools

Catalyst AV Distribution Network Selects Custom Partners for Metro NY Territory

Navigating the Technology Landscape

Diamond Casinos and Entertainment on Top of their Game

TSA Confiscates Mortar Round at Dulles International Airport

http://security-today.com/news

Upcoming Webinars

Keep Third-Party Risk in Check with High Security

Identity ManagementAn overview of the challenges companies face in recognizing vendor identity-related risks.

Physical Security Goes MobileJoin us for a free webinar to address how Mobile devices are changing the way we interact in every aspect of our lives, especially in business.

The Effectiveness and ROI of Video Based

Prevention SolutionsJoin VideoIQ as they examine the effectiveness of prevention-based video surveillance and the poten-tial ROI from implementing such solutions.

Disaster Communications: Planning, Executing and

Improvising a Communications Infrastructure When

Everything Has Gone Terribly Wrong!We will examine the multi-faceted nature of disaster communication across phases of a disaster, learn-ing from real-life incidents and planning for likely disruptions and response.

To view these Webinars at any time, please visit http://security-today.com/webinars.

REACTION Blog

Members of our staff and guest bloggers take advan-tage of REACTION to add their own perspectives on a broad range of security topics and issues. If you’d like to be a contributor, please contact Associate Con-tent Editor, Ginger Hill at [email protected].

Online Communities

Follow us on Twitter: www.twitter.com/SecProds

Become a fan on Facebook:http://www.facebook.com/secprodonline

Pin with Us:http://pinterest.com/securitytoday/

Go to sp.hotims.com and enter 23 for product information.

0913sec_006_eTOC_v3.indd 6 8/19/13 9:18 AM

Page 7: ASIS BOOTH 963

Go to http://sp.hotims.com and enter 30 for product information

Untitled-1 1 7/17/13 3:38 PM

Page 8: ASIS BOOTH 963

INDUSTRYFOCUSBy Ralph C. Jensen, Editor-in-Chief

8

www.security-today.com

Volume 17, No. 9

EDITORIAL STAFF

Editor-in-Chief/Associate Publisher Ralph C. Jensen

E-news Editor Brent Dirks

Content Development Team Cindy Horbrook

Jessica Acklen

Lindsay Page

Ginger Hill

ART STAFF

Art Director Dale Chinn

PRODUCTION STAFF

Director, Print Production Jenny Hernandez-Asandas

Production Coordinator Teresa Antonio

EDITORIAL ADVISORY BOARD

William Crews, CPP, CHS I, INVISTA, Houston

Charles Chamberlain, Missouri Lottery, Jefferson City, Mo.

Kimberly Kuhn, Tyco, Lexington, Mass.

Merlin Guilbeau, Electronic Security Association, Irving, Texas

Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston

SALES

Randy Easton 678-401-5543

Brian Rendine 972-687-6761

Nancy Calabrese 702-228-3293

Sam Baird +44 1883 715 697

Jane Dai +86-755-26289889

Peter Kao +886-2-2949-6412

SECURITY, SAFETY, AND HEALTH GROUP

President & Group Publisher Kevin O’Grady

Group Circulation Director Margaret Perry

Online Sales Director Rick Neigher

Group Marketing Manager Susan May

Group Website Manager Scott Newhouse

Group Webinar Administrator Tammy Renne

President & Chief Executive Offi cer Neal Vitale

Senior Vice President & Chief Financial Offi cer Richard Vitale

Executive Vice President Michael J. Valenti

Vice President, Finance & Administration Christopher M. Coates

Vice President, Erik A. LindgrenInformation Technology & Application Development

Vice President, Event Operations David F. Myers

Chairman of the Board Jeffrey S. Klein

REACHING THE STAFF

Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.

E-mail: To e-mail any member of the staff, please use thefollowing form: [email protected]

Dallas Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254

Corporate Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. PT)Telephone (818) 814-5200; Fax (818) 734-15229201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

Ugly Among UsChild traffi cking is a dirty business. I think

we all know it happens but we don’t give it a second thought, unless it happens in your

family. Texas is a hub for international human traf-fi cking because of its many busy interstate highways, international airports, countless bus stations and shipping commerce through the Gulf of Mexico.

The shared border with Mexico is North Ameri-ca’s number one supply site for young children used in sex and labor traffi cking.

Houston, the fourth largest city in the United States, has one of the largest international com-munities in this country. Interstate Highway 10 runs through Houston, which the Department of Justice has designated as the number one route for human traffi cking. The borders in Texas are porous and are the biggest point of illegal entry into the US because traffi ckers are able to get aliens across the border without documentation.

There are many unseemly things in life, but this is ugly among us.

Traffi cking in Texas fl ourishes because of three main factors: proximity, demographics and the large immigrant labor force. This is not just about Texas; in the last quarter of 2007, 30 percent of the calls re-ceived by the National Human Traffi cking Hotline were out of the Lone Star State, and 25 percent of all international victims certifi ed by the Department of Health and Human Services were in Texas.

Traffi ck911 is a team of passionate people driven to stop the sale of American children into sexual slav-ery. This team began its work in the inner city of Fort Worth, Texas, and is committed to helping traffi cking victims reclaim their lives.

Human traffi cking is modern-day slavery. Sadly, there are more slaves today than at any point in his-tory. In fact, there are twice as many slaves now than during the trans-Atlantic slave trade. It is the fastest-growing crime in the world, where perpetrators make $32 billion a year buying and selling people for profi t and their pleasure. The profi ts are huge and the risk of being prosecuted, slim. The United Nations says that 99 percent of victims are never rescued.

Why is Texas such a hotspot? Domestic hu-man traffi cking can hide quite well in the city, especially Houston, Dallas and Austin, where there are numerous runaway and “throwaway” youth. Hous-ton and Dallas have about 6,000 runaways annually. According to National Incidence Studies of Missing, Abducted, Runaway and Throwaway Children, an estimated one of every three children that run away are lured into sex traffi cking within 48 hours of leaving home. Sadder than this, many runaways are as young as 12 or 13 years of age.

These youngsters congregate at bus stations, which have become a major recruiting ground for prostitu-

tion. It is estimated that one in fi ve girls and one in 10 boys in the United States are sexually exploited before they reach adulthood. Texas also has numerous sexu-ally oriented businesses, including strip clubs, mas-sage parlors and modeling studios. Sadly, many of them are located along inter and intra-state highways. And, because there are many professional and promi-nent college sports teams and events in the state, there is a great demand for the commercial sex industry, and traffi ckers want to meet the demand.

The stories are sad and demeaning to a young per-son, who is bought and sold, forced into sexual slav-ery. While it is true that there are children who are at higher risk for becoming a victim, such as runaways and throwaways, all American children are at risk. Gangs and the Mexican Cartels are sending recruiters into Texas schools to fi nd unwilling victims. Children are kidnapped. People they know are selling them and threatening their families if they tell. Sometimes their own families sell them.

The story is told of one little girl, who fi nally told her captor just to kill her—she couldn’t do it anymore. The pimp refused, telling her that he makes too much money off her. If she wouldn’t do what he told her to, he would kidnap her 8-year-old sister and pour bat-tery acid over her face while she watched. The little girl complied, living in a dog cage when she wasn’t being sold to man after man.

A lack of awareness in our country, coupled with the explosion of the Internet makes the job of the pimp and the recruiter easy and the job of law en-forcement extremely diffi cult. The scope of this hor-rifi c crime seems impossible, but each person can make a difference by teaching their own children about the traps and traffi ckers and knowing the red fl ags to watch for in other children.

Very concerned about this heinous activity, the FBI conducted a raid on July 29 in which 105 children were rescued from forced prostitution. Raids were conduct-ed in 76 American cities. More than 150 people were arrested. Forty-seven FBI divisions took part.

Most of the rescues and arrests occurred in San Francisco, where 12 juveniles were saved and 17 ar-rests made; Detroit, 10 youth, 17 arrests; and Milwau-kee, 10 rescues.

“This operation serves as a reminder that these abhorrent crimes can happen anywhere and that the FBI remains committed to stopping this cycle of vic-timization,” said Ron Hosko, assistant director of the FBI’s criminal investigation division.

This rescue is likely only a drop in the bucket, but it certainly is an important start to rescuing children who deserve to enjoy the innocence of childhood.

0913sec_008_IndFocus_v3.indd 8 8/19/13 9:20 AM

Page 9: ASIS BOOTH 963

IP Video Security .

NEW VMS

See us at ASIS, Booth #2495

Go to http://sp.hotims.com and enter 53 for product information.

Untitled-5 1 8/2/13 4:10 PM

Page 10: ASIS BOOTH 963

1 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

Hospitals are centers of healing and wellness that serve as a destination for those who have suffered injury or violence, causing people to possibly take safety and security for granted. However, recent surveys show a steady in-

crease in assaults and violent acts over the past several years. According to the Census of Fatal Occupational Injuries

(CFO), there was a 23 percent increase in reported attacks and assaults from 2010 to 2011. The census also reports that patient and visiting family violence has increased by nearly 34 percent over the same timeframe. Additionally, each year, there are nearly 3,000 assaults on hospital staff alone, with many more going unreported.

The sad truth is that many hospitals and healthcare facili-ties are seeing a fast-growing need for increased security.

Security BudgetDespite this established demand, hospital security departments around the country have seen little to no change in their bud-gets and have been forced to fi nd creative solutions to enhance security.

Many hospitals have identifi ed security communications as a key, under-developed component of their overall security plan. During emergencies, patients, staff and visitors some-times fi nd it diffi cult to get in touch with emergency services in a timely manner. A faster response time can lead to a safer environment, decreasing the chances of a situation getting out of control.

Acting within the limitations of budgetary constraints, many hospitals have installed blue-light, emergency phones throughout their campuses. While security staff is limit-ed to patrolling only one or two areas at a time, emergency phones act as a force multiplier, allowing dispatchers to quickly send patrols and staff to targeted areas in need of immediate assistance.

Availability of Emergency Assistance In order to prevent crime and violence in medical cen-ters, it is critical to combat the misconception that emergency assistance is instantly available anywhere and everywhere.

The widespread use of cell phones and the avail-ability of Internet access has convinced some that they can always get an emergency response when needed. However, the reality is that there are ev-eryday situations that separate a caller from im-mediate contact with others, such as the loss of cell

phone reception, a dead battery and not knowing a specifi c phone number or the exact location. Besides,

an unexpected situation can occur at any moment, and the ability to contact others, especially during an emer-

gency, can be harder than expected.

It is situations like this that concern Adam Adcock of Caro-linas HealthCare System.

Adcock is a systems engineer and project manager for the healthcare system’s physical security department who wanted to address these communication concerns with an easy and reli-able solution. With the help of Stan Black and Alan Weeks of SAF Technologies, Adam and his team installed 16 of Talk-A-Phone’s blue-light, emergency phones across several parking decks at the Carolinas HealthCare System-NorthEast Hospital, a 457-bed, acute-care hospital in Concord, NC.

With more than 4,200 employees and thousands of patients at risk, an improvement to the facility’s communication capa-bilities was needed.

“We wanted to install a solution which we knew would op-erate without error, each and every time,” Adcock said. “We also appreciated the easy maintenance and high availability of replacement parts when required.”

Operating an Emergency PhoneThe blue-light, emergency phones are coupled with LED, blue-light assembly. When activated, the blue light grabs the attention of nearby individuals, notifying them of an urgent situation, while simultaneously acting as a beacon for offi cers

Finding a Creative SolutionHospital improves communications as part of security planBy Samuel Shanes

Samuel Shanes is the chairman of Talk-A-Phone.

0913sec_010_011_IndVert_v4.indd 10 8/20/13 10:22 AM

Page 11: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 1 1

and security staff responding to the call. Placement of emergency phones and their active blue lights deter crime because the lights create a visible bor-der and “safe zones” that patrons and criminals both know will quickly mus-ter a response from security.

The emergency phones provide a di-rect line of communication to the hos-pital’s security department. Because an emergency situation may be hectic, it isn’t always a given that a person will have a phone or the phone number to security. For some, the use of their hands may be needed to help others, or in more dire situations, for self-defense.

One benefi t of the blue light emer-gency phone is that once activated, it automatically dials the hospital’s secu-rity dispatch center.

“Our telecom team programs ring down lines specifi c for each station, in-cluding a location-specifi c caller ID,” Adcock said. “Once a button is pushed, our security communications center re-ceives the call, gathers information and dispatches an appropriate offi cer re-sponse. We encourage our patients and staff to use the stations for anything, from a need for assistance to true emer-gency situations.”

To activate a phone, a user simply presses the bright red “Emergency” button on the front of the unit, and a dispatcher or security person will an-swer the phone and start assisting the person in need.

Integrating with Emergency PhonesAt many other hospitals and similar facilities, upgrading emergency phones means entirely replacing existing devic-es and updating infrastructure, often at great expense. Fortunately for Adcock and his colleagues, the blue-light emer-gency phones are capable of integrating with a variety of other security devices, allowing the units to be upgraded and downgraded over a long period of time.

Recently, each blue-light emergency phone has been integrated with camer-as to provide surveillance before, during and after activation. During activation, the security dispatch controller can as-sess a situation via the camera and relay extremely valuable and detailed infor-mation to responders and patrons.

For example, a dispatcher may identify, through a unit’s camera, that a person is hostile, so the dispatcher could then tell responders to use cau-tion when arriving on scene. Another example could be a dispatcher in-

structing responders to bring extra equipment to a scene, so there is no lag time between arrivals and getting the needed equipment.

Ultimately, the cameras allow for greater fl exibility and an improved response because dispatchers and re-sponders can react to activations more effi ciently, and patrons can get an im-

proved response to their emergency.“Stations are easy-to-use and pro-

gram,” Adcock said. “Operation is fl awless, and we’re happy with its prov-en reliability.”

The emergency phones have been at the hospital for nearly 10 years. In order to maintain and operate these phones, the hospital’s security staff

tests each station at the beginning of every month. While most of the emer-gency phone stations are deployed in parking decks and lots, others are de-ployed inside hospital stairwells to pro-vide an alternative area of refuge.

As the hospital’s facilities continue to grow, so does the presence of emer-gency phones.

Interested in becoming aDM Network Video Cert i f ied Partner?

Cal l 1-877-367-8778 or v is i twww.dm-networkvideo.com

Installation benefi ts:

• Fast to install: built in 16 port Layer 3 POE(Closed IPTV) switch

• Easy to expand: up to 32 cameras

• Auto detection and self confi guration: of DM’s CamVu IP cameras and PTZ domes

• Starts recording with no further configuration

• Same local and remote configuration and user interface

• Secure lock down of IP cameras with unique key applied, to avoid network vulnerability

End user and operator benefi ts:

• Corporate network segregation and security through dual IP addressing scheme

• High defi nition HDMI local display output and local joystick PTZ keyboard

• Internal storage capacity up to 6TB, expandable via USB

• Built in DVD writer and USB ports for evidence retrieval

• Control this and unlimited NetVu Connected systems through NetVu ObserVer video management software

High definition, secure, plug and play IP network video recorder for smaller IP video installations.

Introducing the NVR MEDIA SERVER

The product is exclusively

available through the

DM Network Video

Certifi ed Partner Programm

e

©Copyright AD Group 1st November 2012

Go to sp.hotims.com and enter 25 for product information.

0913sec_010_011_IndVert_v4.indd 11 8/20/13 10:22 AM

Page 12: ASIS BOOTH 963

0913 TOP PICKS Compiled by Security Products’ Staff

1 2 0 9 1 3 | S E C U R I T Y P R O D U C T S

Wide Dynamic Range180 degree panoramic cameras

• Arecont Vision’s 12 megapixel, 180 degree panoramic dome camera with wide dynamic range is 25 percent smaller than the previous SurroundVideo models.

• The camera uses four different 3MP WDR im-age sensors for a total resolution of 8,192 x 1,536 pixels.

• Its WDR technology delivers a dynamic range of up to 100dB at full resolution without lower-ing frame rates, and represents up to 50 dB improvements (300x) in dynamic range when compared to non-WDR cameras.

• The camera comes with an IP66 and IK10 en-closure.Arecont Vision.Go to sp.hotims.com and enter number

304 for product information.

Easy IntegrationSuccessful X-ray platform

• Smiths Detection’s HI-SCAN series platform fea-tures an array of threat detection technologies, including X-ray, trace, chemical and radiological screening and detection solutions.

• The HI-SCAN 6040aTiX is the fi rst system to allow automatic explosives detection at secu-rity checkpoints and provide maximum bag-gage throughput and real-time evaluation.

• This version is ideal for use where contact-free inspection of pouches, bags, letters or pack-age is required.

• This model provides courthouses and other high-profi le facilities with a combination of advanced threat detection technologies and standardized modular design.Smiths Detection.Go to sp.hotims.com and enter number

305 for product information.

Picodome is BackMini, micro and pico

• Dallmeier’s Picodome is back, now with 720p HD resolution.

• The camera convinces not only by its small size and elegant design, but also by its performance.

• The vandal-resistant DDF4220HDV provides real-time HD video (720p/30) using the H.264 codec. In addition to HD video over IP, the hybrid camera provides for a simultaneous analog DS (PAL/NTSC) video output via BNC (CVBS).

• Other features include wide dynamic range, excellent low-light performance, easy align-ment with a PPL ball joint and power supply with 12V DC or PoE.Dallmeier.Go to sp.hotims.com and enter number

306 for product information.

HD Printer/EncoderOffering superior print quality

• HID Global’s FARGO HDP5000 high defi nition printer/encoder offers superior print quality, higher reliability and durability, and greater security.

• HDP5000 includes recent enhancements, featuring a new graphical display, faster throughput speeds, dual card hopper and other expanded capabilities for added convenience, security and versatility.

• Provided HDP technology excels in reliability, affordability and versatility for a wide range of customers that include government, fi nan-cial, corporate and educational institutions worldwide.HID Global.Go to sp.hotims.com and enter number

307 for product information.

Digital DoormanProven plan of door security

and convenience

• FST21’s Digital Doorman is an access control solution with dedicated hardware and seam-less plug and play installation.

• Delivers advanced, secure and convenient ac-cess control.

• Installed in any door with an electronic lock.• The system includes SafeRise software, deliv-

ering In Motion identifi cation, a full intercom with digital directory and a 5 megapixel IP camera.

• Identifi es registered users as they walk to-wards the access point using facial and be-havioral biometrics.

• The solution detects and alerts foul play and fraud attempts.FST21.Go to sp.hotims.com and enter number

300 for product information.

E-SOC Control StationsErgonomic enhancements

improve performance

• E-SOC control stations from Winsted are part workstation, part console and completely adaptable.

• Ergonomic enhancements improve operator performance and result in greater situational awareness when monitoring complex systems.

• The control stations feature Winsted’s Versa-Trak monitor mounting system, which allows users to easily modify sightlines and monitor viewing angles based on individual needs.

• A hinged corner in the base of the control sta-tion eliminates pre-defi ned angles and makes it possible to create a control station that fi ts in virtually any space.Winsted.Go to sp.hotims.com and enter number

301 for product information.

Flexible ArchitectureIP cameras with live

video streaming

• The VRS by HTS is their next generation of ve-hicle recognition solutions.

• VRS includes fl exible architecture with robust logic for confi guration of lanes, a new line of multi-megapixel high performance, true IP cameras with live video streaming and a pro-prietary central management software with a user interface that is web enabled.

• The SeeControl application is an intelligent vehicle management platform, transforming vehicle and license plate data into valuable information for quick action and effective deci-sion making.

• The VRS is ideal for law enforcement, security, logistical or operations purposes.HTS.Go to sp.hotims.com and enter number

302 for product information.

Next-Generation VMSMaking workfl ow more

effi cient, ease of use

• AxxonSoft’s version 3.1 of the Axxon Next VMS makes workfl ows effi cient, improves ease of use, reduces server and client resource use and slims bandwidth footprint.

• Green Stream, a core innovation, automatically chooses a video stream from a camera to the server and then to the client.

• The Camera Tampering and Failure Detection tools, which decode keyframes (H.264, MPEG) or frames down sampled at 2 fps (MJPEG), maximize effi ciency.

• Support for fi sheye cameras and ImmerVision lenses allows dewarping video for innovative and effective surveillance.AxxonSoft.Go to sp.hotims.com and enter number

303 for product information.

0913sec_012_Toppicks_v4.indd 12 8/19/13 9:22 AM

Page 13: ASIS BOOTH 963

Purchase a Speco Technologies NS or NSP NVR from an authorized distributor and receive a

Simply mail rebate form with proof of purchase from an authorized distributor and actual UPC code & serial number (no copies will be accepted) to:

Speco TechnologiesNS Rebate200 New HighwayAmityville, NY 11701

Limit (1) one per customer.

Speco Technologies New NVR - True Plug & Work with Built-in PoE So Smar t - It’s Simple!

specotech.com

AUTOFIND

EZ CAMERA

FPO

*certain rules apply.

SCAN FOR COMPLETE RULES

: ←*For full rebate rules and mail-in form please visit specotech.com/NS-rebate-rules.html

See us at ASIS, Booth #4701 • Go to http://sp.hotims.com and enter 43 for product information

Untitled-1 1 8/15/13 11:05 AM

Page 14: ASIS BOOTH 963

BEHIND THE BARS Texas Department of Criminal Justice investing big in IP video

By Jessica L. Clark

In today’s economy, it can be diffi cult for correctional facilities to obtain the funding needed to upgrade their security technologies. However, a series of high visibility incidents in Texas in 2008 cast a bright light on the benefi ts of video surveillance and the critical need to maintain high-performing sys-tems. Now, the Texas Department of Criminal Justice (TDCJ) has made a

true commitment to invest in state-of-the-art IP-based video surveillance technol-ogy for security enhancements in prisons.

In 2008, a death row prisoner managed to obtain a cell phone, an item strictly forbidden to inmates. He used the phone to make threatening phone calls to Texas State Sen. John Whitmire, chair of the Texas Senate committee on Criminal Jus-tice, as well as to a reporter for the Austin American-Statesman, a daily newspaper in Austin. After working with offi cials to catch the prisoner using the phone, Whit-mire helped facilitate availability of state funding to install security systems to help

prisons deal more effectively with the issue of contraband. There are 111 prisons in Texas, housing about 150,000 offenders. While many

facilities have camera systems, more advanced new video surveillance systems have been installed in four prisons so far—the Allan B. Polunsky Unit in Livingston; the Mark W. Stiles Unit in Beaumont; the Darrington Unit in Rosharon; and the McConnell Unit in Beeville. New systems are in the process of being installed at the Connally Unit in Kenedy, and the Coffi eld Unit in Tennessee Colony, the state’s largest prison encompassing 20,000 acres and housing more than 4,000 of-fenders. Additional new video surveillance systems may be rolled out in the next fi ve to 10 years in other Texas prisons, contingent upon funding. Video systems also are being planned for the 20 state jails.

“Video surveillance is not a new concept in the correctional environment, but technological advances offer opportunities that cannot be ignored to further en-

1 4 0 9 1 3 | S E C U R I T Y P R O D U C T S

CORRECTIONAL SECURITY

0913sec_014_018_Clark_v4.indd 14 8/19/13 9:25 AM

Page 15: ASIS BOOTH 963

Complete your Advantage

Get affordable end-to-end megapixel solutions with the Advantage Line by Bosch. Whether I need 1MP, 2MP or 5MP resolution indoors or out, I can easily put together a complete video system for my customers. The Advantage Line has a wide range of IP cameras and recording solutions, including a new all-in-one appliance for simple video management. Plus, the online tools and apps help me choose and install the products, giving me an edge on the competition. The Advantage is Bosch.

www.boschsecurity.us/advantageline

Go to http://sp.hotims.com and enter 12 for product information.

Untitled-3 1 4/16/13 2:44 PM

See us at ASIS, Booth #213

Page 16: ASIS BOOTH 963

1 6 0 9 1 3 | S E C U R I T Y P R O D U C T S

CORRECTIONAL SECURITY

hance security, increase staff and offender safety and combat contraband,” said Brad Livingston, TDCJ ex-ecutive director. “In my opinion, the comprehensive video surveillance system in use at several TDCJ fa-cilities represents an effective application of the latest technologies and is making a signifi cant contribution to security and safety.”

Sigma Surveillance (STS), Plano, Texas, is de-signing and installing the new systems from end to end and has also installed a full network infrastruc-ture as the prisons are not wired for any networked technology. Fiber-optic cable was installed to ev-ery building on the installations so far, as well as to every perimeter post and the guard towers.

The new IP-based systems use the Ocularis soft-ware system by OnSSI, together with more than 4,600 Panasonic network cameras systemwide, to capture detailed video of everything within the prison walls, making it available to wardens and other prison staff. Wardens are now accustomed to using the system as part of their everyday routine and have captured vid-eo of assaults on staff and offenders, as well as other incidents. The systems allow them to give accolades to prison staff members who are captured on video making smart decisions.

The cameras have been used to investigate contra-band such as drugs, cell phones and money drops in-side the prison. The system provides evidence to cor-roborate the incidents and have been used to prove cases in criminal and administrative proceedings.

Simplifi ed interfaces do not take a lot of space on the monitor screen, and the staff appreciates the search features, especially the motion searches. On playback, prison staff can use the “little blue box,” a feature that enables them to designate a specifi c area on the screen and identify on playback when there is motion within that area. The cameras deployed con-sist mostly of vandal-resistant fi xed domes. The most recent installation at the McConnell Unit uses all-HD cameras, as will future installations. High-quality vid-eo available in virtually any lighting condition delivers clear and continuous coverage of activities within the prison system.

SYSTEMS INSTALLED IN FIRST THREE PRISONSAllan B. Polunsky Unit is a 472-acre maximum-se-curity prison that houses about 2,900 offenders at a range of custody levels including maximum security and Death Row. Originally designed to house 2,250 offenders, the Polunsky unit has been expanded with the addition of dormitories. The prison encompasses a total of 19 buildings, including a medical and edu-cation facility with a standard library and a legal li-brary, a supply warehouse, four general population chow halls, one offi cers’ dining room, a laundry room, an administration building, a maintenance building, a vocational facility, two gyms that also are used as chapels, a tree farm and a dog kennel. Security for the Polunsky Unit includes video coverage of every building and every walkway, as well as the perimeter. Aiphone video intercoms are installed on the premis-es to provide effi cient and easy communications with

the correctional staff.Richard Alford, senior warden at Polunsky, has

used the video system to monitor and critique his staff ’s response to unit emergencies.

“You get a minute-to-minute response to suicide attempts and things of that nature,” Alford said.

Such incidents require an administrative review, and the video provides a valuable tool. Alford also says the system helps to quickly dismiss false offender complaints without merit—the video can easily verify if complaints are unfounded.

Another prison whose video system has been up-graded is Stiles, which also was originally designed to accommodate 2,250 offenders and now has additional dorms to serve a current occupancy around 2,900. Stiles has about 20 buildings, including a separate chapel.

The Darrington Unit is an old high-security prison, built in 1930. It is made up of a single build-ing—in contrast to the multiple buildings and campus setting of the other units. Darrington houses about 2,000 offenders and uses about 490 cameras.

The advanced video system provides an advantage for prison wardens to help reduce incidents of con-traband, gang activity and other challenges unique to a prison environment, while increasing productivity and safety.

“When you have a camera and have an incident, you see what’s happening,” said Brenda Chaney, former senior warden at the Darrington Unit, who recently retired. “Without the video you have to do more ques-tioning and investigative measures to fi nd out what occurred. There are times when you can’t get to the bottom of what occurred (without a camera). If there’s a fi ght, you want to know who was involved? When security comes, they spread out, but with a camera you would see who’s involved. With a camera, you’ve got them.”

The fourth unit, with installation now complete, is the McConnell Unit, which is similar in design to Polunsky, Stiles and the Connally units.

Go to sp.hotims.com and enter 24 for product information.

“Maintaining a secure perimeter around a facility can be a challenge when public access is required. For this to be done effectively, the fl ow of vehicles and personnel enter-ing and leaving the facility needs to be controlled. Appropriate and thorough search procedures should

look for unauthorized entry/exit by personnel, contra-band and weapons into the facility. Video-based search tools can be utilized in screening protocols to better fa-cilitate the physical screening process at check points. These tools can enhance the safety, effi ciency and ef-fectiveness of the search process. They also have the benefi t of improving traffi c throughput at a check point when thorough searches are required.”

—Bob Levine, president of Zistos Corp.

0913sec_014_018_Clark_v4.indd 16 8/19/13 3:04 PM

Page 17: ASIS BOOTH 963

Simply Powerful, Powerfully Simple

CUBE

BLADE Up to 16 2.1MP Cameras (1080P True HD Resolution)

Up to 64 2.1MP Cameras (1080P True HD Resolution)

Up to 128 2.1MP Cameras (1080P True HD Resolution)

What is DW Spectrum?

Toll Free: 866.446.3595 Fax: 813.888.9262 www.digital-watchdog.com [email protected]

Powerful and user-friendly video management solution, highly optimized to provide

unlimited scalability, unmatched bandwidth savings, and simplified system setup and management.

Automatic Device Discovery

Simple Enterprise Scalability

Instant Motion-Based Smart Search

Easy Drag-n-Drop Camera Management

Dual Stream Recording

Cross-Platform: Windows and Linux

Graphical HDD Health Monitoring

Seamless Transition from Live to Recorded

* no* not shown

E-RACK

VISIT OUR WEBSITE

COMPATIBLEFOR A COMPLETE LIST OF

INTEGRATION WITH

LINE OF RECORDERS

CAMERA MODELS

COMP L E T E

Untitled-3 1 1/31/13 2:54 PM

See us at ASIS, Booth #1781 Go to http://sp.hotims.com and enter 19 for product information.

Page 18: ASIS BOOTH 963

CORRECTIONAL SECURITY

1 8 0 9 1 3 | S E C U R I T Y P R O D U C T S

In each installation, the fi ber infra-structure includes a 10-gig backbone and 1-gig horizontal to smaller net-work rooms and user workstations. Each cable pull has 12 fi ber strands, which allows plenty of dark fi ber to add future bandwidth.

“We were cognizant of the need to fa-cilitate the future expansion in all areas of the units to avoid costly expansions in the future in order to continue to take advantage of the latest security trends,” said Jose Garza, CCNP, technical proj-ect manager of STS. “Upgrades will be simple and an absolute given in the fu-ture course of high security vigilance.”

The fi ber runs underground out to the perimeter and along and inside buildings, protected by a 4-inch rigid conduit when necessary. Fiber connects to six main hubs (network rooms), which include server storage; there are 23 intermediate distribution frame (IDF) locations.

HP ProLiant DL320 servers are used to run the software, and ProLi-ant DL380 servers are used for record-ing software and for initial temporary archives. Each NetDVR server runs 50-plus cameras, which takes a lot of processing power. The storage array in-cludes network-attached storage (NAS) [HPX160, two at each unit] and direct-attached storage [HP StorageWorks D2600 DAS Hard Drive Array and HP MSA60]. The servers and worksta-tions are HP, and HP switches are used throughout the network rooms. Each unit has 16 servers used as NVRs and one server. The system can record con-tinuously for 20 days, 24 hours, seven days a week, full streaming at all times with no motion-based recording in or-der to document when things don’t hap-pen as well as when they do. This is a unique prison need to immediately dis-prove a falsely fi led complaint against an offi cer and reduce the agency’s cost of lengthy investigations.

PowerDsine mid-span injectors are used to provide PoE, a less expensive option than PoE switches.

STS made an extra effort to dis-tribute video archiving across multiple servers and NAS attachments for cam-eras in each single pod. Cameras in the same area are archived to different stor-age areas to ensure continued redun-dant coverage. The approach involved extra planning up front and attention to mitigating a possible risk.

In a challenging environment like a

prison unit, TDCJ offi cials realize that no one tool is the solution.

“The video surveillance system is another means at our disposal. We’ll continue to look to technology, com-bined with other security measures, as a way to enhance the safety and secu-rity of institutions across the state of Texas,” Livingston said.

HOW STAFF USE THE SYSTEMSAt each prison, there is a senior warden and two assistant wardens who have full rights to view the system in their offi ces. Two majors—three at Stiles—have full rights as well on HP workstations. The senior warden has a 42-inch screen, and everyone else has 19-inch monitors on their desks. A 42-inch monitor is lo-

cated in an administrative conference room; if an event occurs in the unit, the conference room becomes a command center with more space for team mem-bers than a single offi ce.

Video monitors also are located at various “pickets,” which are enclosed lo-cations protected from intrusion, where operators can control doors and have keys to certain areas. The line control pickets have a 42-inch monitor and have access to everything on the system except the ability to export video. In the death row building at the Polunsky Unit, a control picket has four 20-inch monitors to push video, and in one of the pods, a 20-inch monitor has rights to view in cell

cameras. Inside dormitories, each picket has four 20-inch monitors and has the master stations for video intercom.

Each workstation is located within a lock box for security purposes. Op-erators can only access the keyboard, mouse and monitor. There is also no access to any of the network rooms, and racks are secured with locks.

Alford uses the system not just as a reactionary tool but as a proactive tool, monitoring traffi c fl ow, counting and search procedures. He sees a continuing and increasing role for video in training his staff.

“If I see someone violating a policy, I can download the video and take it to shift turnout and tell them this is not what we need to do,” Alford said.

Shift turnout is a 30-minute meeting before a new shift comes to work when various issues and training are discussed. Training uses also can extend to the 40 hours of in-service training required each year. Important points can be illus-trated using video of actual events.

“I can go back and show them, this is reality, and this is the event in real-time,” Alford said. “You see how if this offi cer was over here, this wouldn’t have happened.”

He compares the approach to a football coach meeting after a game to make adjustments to offense and defense.

“It can be a positive force in learn-

ing. They are more critical of their own performance than I am,” Alford said. “Holding staff accountable can some-times be diffi cult. On a unit this size, you can’t walk the whole unit. If I don’t walk in a building in a day, I can still look at the video to see things I might not have seen.”

USING VIDEO SURVEILLANCE A NO BRAINERThe system’s ease of use is critical; cor-rections offi cers may not necessarily be IT experts. The use of maps greatly simplifi es interface with the video sys-tem. Many areas in a prison look the same, so it is not easy to visualize a camera’s location. Operators can click into each building, and all the cameras will come up, instead of one camera at a time. It’s a useful tool that makes it easy for staff to locate the cameras they are looking for.

The system at Polunsky unit came online in stages over almost a year, and offi cers began using the system as it became live. Tim Simmons was senior warden at Polunsky Unit when the sys-tem was installed, but retired after 30 years and is now the public sector vice president at STS, continuing to work on future installations.

“The vendor provided training on the system, but because we started us-ing it as it came up, we basically didn’t need any training,” Simmons said. “The software is intuitive and extreme-ly user-friendly.”

Despite budget constraints, the Tex-as Legislature has continued to invest in public safety.

“TDCJ’s use of best-of-breed tech-nologies, the support of top industry partners and collaboration with TDCJ personnel have created an impressive and invaluable result,” said Bobby Khullar, president and CEO of STS.

Ultimately, the system provides prison staff unprecedented access to the units. A warden using the system can see their units like never before, which has dramat-ically increased control. Texas prisons have had numerous visitors from other states who have been impressed by the system’s functionality; one prominent prison offi cial from an-other state simply said, “I want one.”

Jessica L. Clark is the executive vice presi-dent of STS 360.

0913sec_014_018_Clark_v4.indd 18 8/19/13 9:25 AM

Page 19: ASIS BOOTH 963

IPELA ENGINE® EX V, E, and C Series cameras

see more than meets the eyeCan your camera make video stable even when the camera’s platform is shaking? Or overcome harsh backlighting? Will your camera reproduce genuine color across a full range of lighting conditions? Will it enable you to identify the make and model of a fast moving car? Presenting IPELA ENGINE EX cameras with Sony’s own Exmor® sensor, Image Stabilizer, streaming up to 60 frames per second and extensive Sony image processing. It’s a whole new generation of outdoor and indoor IP surveillance.

See for yourself at ASIS 2013 Booth #635 or at sony.com/security

Image Stabilizer Low–Light Sensitivity

High Frame Rate

Simulated images© 2013 Sony Electronics Inc. All rights reserved. Reproduction in whole or in part without written permission is prohibited. Features and specifi cations are subject to change without notice. Sony, Exmor, IPELA ENGINE EX and the Sony make.believe logo are trademarks of Sony.

Go to http://sp.hotims.com and enter 75 for product information.

Untitled-1 1 8/19/13 11:35 AM

Page 20: ASIS BOOTH 963

2 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

SYSTEMS INTEGRATORS

A RETROFIT SOLUTION Relationships that benefi t the integrator

By Kim Rahfaldt

An integrator builds his business by developing relationships, ex-ecuting installations and providing above-and-beyond customer service. Integrators spend years on each of these important com-ponents and go to great lengths to protect their reputation by of-fering quality products that are on time and on budget.

To accomplish these goals, integrators must carefully choose which manufac-turer’s solutions to represent and faithfully resell those specifi c solutions. They hang their business success on a few manufacturers, because they believe in the product and trust that the people running the company will support them.

But, what happens when the manufacturer you worked closely with for years decides to move away from a product line you’ve installed and supported for years or decades? What happens to your customers who like that product and don’t want to change?

“Manufacturers that do that [terminate a product line] put us [the integrator] in a bad light,” said Joseph Riotto, president of AVS Technology.

The customer may decide to never do business with the manufacturer again; but the truth is, they also are not happy with the integrator and often decide to stop doing business with them, too.

UNDER THE UMBRELLAWhile security falls under the technology umbrella, end users don’t always ap-proach it as they would if, say, Microsoft or Apple ended a product line. A lifecycle of months is normal in other technology domains, but an end-of-life, physical security product of any age is met with angst and even suspicion.

Customers get angry, and they don’t always make the separation between the manufacturer and the integrator. They don’t understand how a system they’ve had and invested a lot of money into for a number of years can all of a sudden not be supported. In their minds, all they need is another three readers plus controller board or a software upgrade. That should be easy, right? Besides, they’ve made these types of changes before and it was never a problem.

As the integrator, you must tell them their system is no longer going to be sup-ported or the components and/or software they need is no longer being manu-factured. Now you have an angry customer through circumstances beyond your control. The manufacturer’s decision to orphan its product has affected your repu-tation and bottom line. Your customer is asking for assurance that this never hap-pens to them again. Trust is on the line. What do you do?

If the circumstances are right, offer a retrofi t solution.A retrofi t, security solution offers your customers a cost-effective, upgrade path

while allowing you to protect your reputation, retain some of the customer’s in-vestment costs and positively impact your bottom line. Your customer may not be thrilled about having to change out their system, but they won’t have to fi nd the budget to start over. When you work with the proper manufacturer of the retrofi t solution, you offer the customer a minimally-disruptive, replacement program and the opportunity to save money.

Ultimately, if you can bring your customers a solution that is cost effective, the good relationship will continue.

ADVANTAGES TO SELLING RETROFIT SOLUTIONSWhen you present the correct retrofi t solution, it should allow your customer to use as much of their existing infrastructure as possible, thereby reducing the over-all replacement cost. The customer should be able to reuse their current readers, cards, power supplies, cabinets and wiring. When a customer is able to reuse these components, it allows you to install the system quickly because no time is wasted pulling wire and rewiring for a new system. Therefore, you work smarter and in-crease your bottom line by quickly installing the system and moving on to your next job.

Retrofi t solutions can also offer an opportunity for ongoing work over a period of time. Some customers have large systems with multiple locations that they need to retrofi t, so they may want to plan out and phase in their retrofi t, possibly up-grading one building or part of the system at a time to minimize the disruption of

0913sec_020_023_Rahfaldt_v3.indd 20 8/19/13 9:27 AM

Page 21: ASIS BOOTH 963

www.stanleysecurity.com/el • 1.855.365.2407

Introducing an affordable and simple electronic access control solutionThe new EL Series electronic lock from STANLEY is designed for a variety of commercial market applications and businesses. From retail, assisted living, and banking to multi-family, industrial and other commercial offi ce buildings, this new proximity reader is easy to program and install and provides a low cost of ownership. The standalone lock requires no additional software and can be upgraded to the wireless option. The EL Series lock: extra security, control and peace of mind at a price you can afford.

© 2013 Stanley Security Solutions, Inc.

EL SeriesElectronic Lock

Commercial Hardware

See a demonstration at ASIS Booth #505

• Go to http://sp.hotims.com and enter 47 for product information.

Untitled-8 1 8/7/13 12:46 PM

Page 22: ASIS BOOTH 963

SYSTEMS INTEGRATORS

2 2

their business. This means they’ll pur-chase product and installation services from you month after month, until the install is completed.

“Offering a retrofi t solution is gen-erally a tremendous opportunity to acquire new customers or earn more of an existing customer’s business,” said Enterprise Security Systems, Inc.’s President, Kurt Kottkamp. “It’s also a unique opportunity to earn their trust because of the risk involved in chang-ing systems.”

In addition is the opportunity to sell Professional Services assistance to cus-tomers who require support through-out the retrofi t, upgrade path. Profes-sional Services teams collaborate with integrators and end users to aid in the design, implementation, integration and product optimization of the ret-rofi t solution. The team can provide on-site support, Factory Acceptance Testing, On-Site Acceptance Testing, custom scripting, custom reports and custom interfaces.

The customer receives exceptional service and learns to utilize their new system to its fullest potential while you become their trusted advisor on the new system, being there every step of the way to meet rigid timetables and make sure every aspect of the installa-tion is carefully considered.

CHOOSING THE RIGHT RETROFIT SOLUTIONIt is critical to be aware of what is oc-curring in the marketplace and take note of major announcements. Keep-ing tabs on the industry by reading security magazines, browsing websites and setting up Google Alerts on your major and competitive lines can help you make business decisions that will affect your company’s future and im-pact your bottom line.

When a major manufacturer an-nounces the end of life of one its prod-ucts, it is important to analyze how that will affect your business. Specifi cally, what are you going to do when and if your customers are impacted?

The goal is not to make the same mistakes you did when you chose the manufacturer that orphaned its prod-uct. So, when choosing a retrofi t solu-tion, it is imperative to:• fi nd a historically-reliable company

with references;• explore what their history tells you;

• determine if they have taken cus-tomers for granted in the past;

• make sure the company promises backward compatibility;

• ensure the company is committed to the security industry; and

• look for companies that do in-house, product engineering as this means they have control over prod-uct design decisions and can accom-modate their customer’s needs and requirements.

When manufacturers rely on a third party to manufacture their hardware, they leave themselves open to take-overs, sales and lack of product con-trol. You need a manufacturer that will do what they say they are going to do,

Go to sp.hotims.com and enter 79 for product information. See us at ASIS Booth 3901.

0913sec_020_023_Rahfaldt_v3.indd 22 8/19/13 9:27 AM

Page 23: ASIS BOOTH 963

2 3

especially when it comes to the data-base conversion of the old product to the retrofi t system. Any miscommuni-cation or confusion can cost you time and serious money, but perhaps more importantly your credibility.

Most customers respond to integra-tors who are honest and straightfor-ward because they want to establish a good relationship that gives them the peace-of-mind to look to you for an-swers in a fast-changing industry. By

including a retrofi t security system in your arsenal of products, you’ll be pre-pared to support a pin-for-pin, replace-ment, end-of-life system for existing or even new customers.

GROW YOUR BUSINESSProviding a cost-effective, quick-to-install, retrofi t solution from the right manufacturer that requires little down time for the end user will help to grow your business.

However, let’s say it’s not your cus-tomer who has just had the rug pulled out from under them, but your com-petitor’s customer. A door has opened. You now have the opportunity to save the day—or at least make it less pain-ful—by presenting your cost-effective, retrofi t option. Take advantage of situations such as these to grow your business by establishing new customers from other integrators who do not have a solution to offer.

“When the manufacturer who dis-continues a product and doesn’t retrofi t is not affi liated with you and you come up with a solution, then it’s gravy,” said Riotto. “It’s a simple fl ip. The dealer who sold them the original system is now under a cloud, and they have a customer who can’t sleep at night and is afraid their system is going to crash at any time. The end user doesn’t want to talk to the manufacturer or the deal-er who recommended their system. If they allow them to stay, the dealer will still be under a cloud. Everything he says is going to be questioned, even though the dealer had nothing to do with the major decision [to terminate the product].”

When a security system reaches the end of its life, doesn’t meet your cus-tomer’s needs any longer or is too costly to maintain, offering a retrofi t product may be the best alternative.

Choose a manufacturer that:• believes in exceptional customer

service; • values long term partnerships; • always keeps the customer’s best in-

terests in mind; and• manufactures their own hardware

and software.This ensures that you can offer a

fully-functional product that effectively and economically solves customer’s problem(s) by protecting the invest-ment of their existing access control infra-structure.

Kim Rahfaldt is the pub-lic relations manager at AMAG Technology.

Go to sp.hotims.com and enter 79 for product information. See us at ASIS Booth 3901.

Store, manage and control keys, cards and small assets more

securely and efficiently with KeyWatcher Touch. Access is limited

to authorized users, and all transactions are recorded with

detailed reports available. The system will even automatically

email transactional information to any user – at any time. And

KeyWatcher’s convenient touchscreen makes removing and

returning keys easier than ever. With our modular design and full

scalability, it’s easy to see how we keep making key management

better. That’s Morse Watchmans’ outside the box thinking – right

inside the box.

morsewatchmans.com • 800.423.8256

0913sec_020_023_Rahfaldt_v3.indd 23 8/19/13 9:27 AM

Page 24: ASIS BOOTH 963

2 4 0 9 1 3 | S E C U R I T Y P R O D U C T S

BORDER SECURITY

BEEFING UP BORDER SECURITY Tips on selling advanced surveillance solutions to protect U.S. frontiers

By John Merlino

Here’s an interesting geography factoid: more than 7,000 miles of U.S. land share borders with our Canadian and Mexican neigh-bors. It takes hundreds of local, state and federal agencies, tribal partners and neighboring governments, and thousands of border patrol offi cers working in concert on a daily basis to effectively

protect this vast territory from traffi ckers of illegal weapons, drugs, money and people. Legislation is now pending in Washington that ties immigration reform to increasing border security measures in ways that achieve quantifi able results.

This opens a sizable opportunity for technology vendors and systems integra-tors to propose advanced surveillance solutions that can become force-multipliers to augment various border personnel.

To build a persuasive case for contemporary technology, however, you fi rst need to understand the current state of border protection in the United States and the government’s roadmap to the future. A good source for that information can be found in the written testimony of Border Patrol Chief Michael Fisher of the U.S. Customs and Border Protection Offi ce for a House Committee hearing

on Homeland Security. The document is titled “Measuring Border Security: U.S. Border Patrol’s New Strategic Plan and the Path Forward.” (http://www.dhs.gov/news/2012/05/08/written-testimony-us-customs-and-border-protection-house-home-land-security)

It’s apparent from this testimony that government agencies such as the Depart-ment of Homeland Security (DHS) and Customs and Border Protection (CBP) are becoming increasingly more reliant on private industry to recommend and im-plement effective solutions. Once you understand the framework of their require-ments, you’ll be able to provide integrated systems to meet their specialized needs.

KEY OBJECTIVES FOR BORDER SECURITY STRATEGIESThe principal theme of the 2012 Strategic Plan is to use information, integration and rapid response to meet threats. The plan references three key objectives con-cerning border security today:• Information gathered from reconnaissance, community engagement and tech-

nology together provide situational awareness and intelligence to help under-

0913sec_024_030_Merlino_v3.indd 24 8/19/13 9:31 AM

Page 25: ASIS BOOTH 963

(866) 533-6216www.avalanwireless.com

Leaders in Wireless IP Video Connectivity

DO YOU NEED A ROBUST AND SECURE WIRELESS SOLUTION?

TRY AVALAN WIRELESS RELIABILITYNEW 300 MEGABITS/SECOND

AW58300HTAAccess point

(Master)

AW58300HTSSubscriber Unit

(Client)

ThreeCameras

PTZCamera

MonitoringComputer

AW58300HTSSubscriber Unit

(Client)

AW58303HTSSubscriber Unitwith integrated3 Port 802.3at

Switch

FixedCamera

Call today for your FREE

Go to http://sp.hotims.com and enter 11 for product information.

Untitled-6 1 7/8/13 2:04 PM

Page 26: ASIS BOOTH 963

BORDER SECURITY

2 6 0 9 1 3 | S E C U R I T Y P R O D U C T S

stand and assess the threats we face along our borders. Integrating this intelligence will empower Border Patrol leadership and front line agents to get ahead of the threat, be predictive and proactive.

• Leveraging partnerships with mul-

tiple government organizations is essential to the execution of border security operations. Coordinated and cooperative effort between agencies will ensure that we bring all available capabilities and tools to bear in addressing threats.

• Through rapid response, capabilities are deployed effi ciently and effec-tively to assess and mitigate the risks confronted.In light of those objectives and

strategies, there two commonly recog-nized border security environments:

1. Land Points of Entry (LPOE) and Checkpoints, and 2. Remote/Unmanned Borders.

LAND POINTS OF ENTRY AND CHECKPOINTSLegitimate international commerce and travel fl ow into the United States via 329 offi cial LPOEs. For instance, on the northern border, the Peace Bridge entry point in Buffalo, NY, handles nearly 2.8 million border crosses by auto/truck annually. At the newly renovated south-ern border crossing at San Isidro near San Diego, CA, more than 12 million vehicles and 8 million people crossed into the United States in 2011 alone.

Many different federal, state and lo-cal law enforcement agencies typically share jurisdiction and operation of these busy, permanent inspection sites. Over time, it has become increasingly apparent that only through coordi-nated, joint efforts and sharing of data and systems can these agencies gain the necessary real-time situational aware-ness needed to safeguard the country’s points of entry without negatively im-pacting trade and tourism.

Serving both as a checkpoint and operations center, LPOEs rely on a va-riety of systems and sensors to provide

“In light of dras-

tic budget cuts,

agencies involved

in border security

are leaning more

towards the use of

technology solu-

tions to identify and deter drug smug-

glers and undocumented immigrants.

IP video platforms offer an interesting

option to agencies like the US Border

Patrol and the Coast Guard because

the cameras can be set up on fi xed

locations, like on the southwest border

fence, and can be used in more mobile

situations like vessels or unmanned

aerial vehicles. Such platforms could

signifi cantly streamline law enforce-

ment response to border incursions,

particularly if such systems could

demonstrate a high level of reliability in

adverse conditions and economy over

existing border surveillance systems.”

—Sylvia Longmire, owner of Longmire Consulting

877-213-2333www.samsung-security.com

Go to sp.hotims.com and enter 69 for product information. See us at ASIS Booth 853.

0913sec_024_030_Merlino_v3.indd 26 8/19/13 9:32 AM

Page 27: ASIS BOOTH 963

Go to http://sp.hotims.com and enter 59 for product information.

Untitled-10 1 8/6/13 2:35 PM

Page 28: ASIS BOOTH 963

BORDER SECURITY

2 8

critical information, such as radar, sonar, communications and airborne and fi xed video. When properly integrated, these systems afford commanders a complete overview of checkpoint activity, as well as their relevant area of responsibility. In tactical parlance this is referred to as C4ISR: Command, Control, Communica-tions, Computers, Intelligence, Surveillance and Reconnaissance.

LEGACY LPOE SYSTEMS VERSUS TODAY’S REALITY In the past, many of these systems displayed their data independently and in a format that couldn’t be shared with other applications. Today, the government is requiring that these systems move to open standards to ensure interoperability.

What does this shift in standards mean to you?• Any solution you propose must have the ability to be displayed on a common

operating platform (COP). • Multiple inputs and sensors must communicate with multiple, non-proprietary

applications with shared databases.• Your solution must reside on the local network. The government is mandating

that all system data be moved to the cloud or hosted remotely. • Information assurance has become a central concern as new threats and vul-

nerabilities emerge daily, so proposed systems must meet a moving array of government-imposed certifi cations.

• Many government agencies publish their own approved products lists that meet their stringent information assurance requirements, so vendor components must meet each agency’s criteria.

REMOTE/UNMANNED NORTHERN AND SOUTHERN BORDERS Large expanses of land and water add another complexity to border security. In the past, government agencies have deployed physical barriers, such as a fencing and surveillance technologies, such as long-range thermal detection devices.

While these measures have been effective to some extent, the sheer expanses

have prevented them from providing the relevant situational awareness that border protection staff need for actionable use and intelligence gathering.

In 2006, the government initiated a program called SBInet to secure U.S. bor-ders and augment rapid response by integrating interagency personnel, infrastruc-ture and technology. Though a laudable goal, the project never truly coalesced primarily because its one-size-fi ts-all approach using integrated fi xed tower-base systems wasn’t applicable across all border environments. In 2011, DHS formally cancelled the program.

Subsequently the government’s strategy changed from “developmental sys-tems” to “deployed and production-ready systems” on a sector by sector basis. The goal now appears to focus on creating frontier force multipliers by strategi-cally deploying infrastructure along remote borders to house technical equipment and staff and aggregate intelligence from multiple systems.

LEGACY REMOTE BORDER SYSTEMS VS TODAY’S REALITYPrevious solutions deployed in these remote environments were based on propri-etary equipment that was often hard to service and sustain. Like LPOEs, vast expanses of unmanned borders are best served by a multi-sensor, open systems approach.

So how does that impact the types of solutions and components you might propose to deploy?• Government agencies are driving requirements to furnish more commercial

off-the-shelf (COTs) products, requiring vendors to use a deployment-ready approach to development.

• Data must be packaged and compressed in order to move it to other locations. • Software applications and storage systems should be able to manage metadata

and share information across a broad spectrum of agencies. • Your solution will need a mechanism for streaming data to the cloud or an

off-site hosting facility.

Go to sp.hotims.com and enter 3 for product information. See us at ASIS Booth 877.

0913sec_024_030_Merlino_v3.indd 28 8/19/13 9:32 AM

Page 29: ASIS BOOTH 963

Only our high-defi nition surveillance solutions give you the full story. Identify incidents quickly and enhance response times with the superior image detail of an Avigilon end-to-end system. See how Avigilon can help your organization at avigilon.com/casestudies

The top three images were shot with an Avigilon 29 MP HD Pro camera. The fourth image was shot with an analog camera.

Meanwhile, analog identifi ed

CAM1 2013-FEB-02 01:14:35 PM

Avigilon spotted a man in this

who was caught

and identifi ed by his

2013-Feb-02 01:14:35.471 PM

2013-Feb-02 01:15:45.559 PM

2013-Feb-02 01:14:28.655 PM

Untitled-2 1 4/11/13 4:14 PM

See us at ASIS, Booth #5101 | Go to http://sp.hotims.com and enter 9 for product information.

Page 30: ASIS BOOTH 963

3 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

BORDER SECURITY

• Cyber threats and information assurance requirements will continue to drive the need for more robust and secure hardware and software.

• The government values return on investment, so you will need to illustrate the benefi ts of your solution in reducing manpower and streamlining operations.

BUILDING A ROADMAP FOR SUCCESSAs a security integrator or technology provider, the apparent complexity of a bor-der security project or program can be intimidating. After all, if Boeing with all its immense resources failed to bring SBInet to fruition, how can smaller companies hope to succeed?

Many would argue that the failure of SBInet was ultimately due to insuffi cient procurement oversight. Rather than walking away from this opportunity, the key is to establish common criteria with measurable performance metrics, clearly defi ned goals and fi xed milestones.

Success in this demanding space is based on a strategic approach and solid planning. Below are a number of important steps to consider when participating in a border security initiative—whatever your role.

Partnerships. The complexity of these solutions demands strategic partnerships and cooperative development, so look for fi rms with robust partner programs and standards-based development philosophies.

Cloud or hosted video solutions. The burden of maintenance and rising energy costs are driving government customers to consolidate data centers and reduce their overall IT footprint. In border deployments, a proposal may need to include a cloud or hosted environment alternative and/or a migration path.

Open platform standards. For interagency operability, you need to deliver truly open software and hardware such as open APIs, SDKs and COTs components and applications.

Edge-based hardware solutions. The ability to provide data or metadata, storage and analytics at the edge reduces server/processor cost and increases performance and capabilities. Expanded FLASH technology and other edge storage capabilities provide redundancy for shared data.

Cyber focus. Integrators and technology providers must keep current on gov-ernment information assurance requirements, certifi cations, and be listed on gov-ernment agencies’ approved products lists.

A COMPELLING PROPOSAL FOR SPECIFIC VIDEO SURVEILLANCE TECHNOLOGYThe very nature of border environments makes them ideal candidates for more advanced network-based video surveillance technology. Here are some innovative IP camera technologies you might consider including in your proposal:• Wide dynamic range, enhanced lowlight color technologies and advanced

H.264 compression provide signifi cantly better video quality and reduce much-needed bandwidth.

• New HDTV-quality network cameras tactically deployed in tandem with ther-mal technology are capable of detection and identifi cation at a substantially lower cost than their predecessors.

• Digital encoders provide a migration path from analog to IP. They can extend the useful life of legacy cameras and increase their functionality by streaming video data on the network.

SECURING A BORDER PROTECTION CONTRACTSucceeding in this dynamic and politically-charged space requires due diligence. You and your partners need to be able to identify and target multiple govern-mental agencies and understand their security challenges, certifi cation processes and procurement requirements. Propose solutions that align with their mission and incorporate systems that not only provide criti-cal situational awareness, but also facilitate interagency sharing of critical security intelligence. John Merlino is the business development manager for government programs for Axis Communications in North America.

Safety TechnologyInternational, Inc.

www.sti-usa.com/sp51800-888-4784

2013 STI

Heavy-duty UL Listed cabinets

STI-EM07123.5

1/2”, 3/4”Conduit Knockouts

Continuous PianoType Hinge

Backplate (optional)

Powder Coated Metal

Thumb or Key Lock(optional)

Lock Knockout

Metal meetsor exceeds

Type 1 requirements

, Type 1

TOUGH METAL CABINETS

· Optional backplate available

· Seven conduit knockouts ½” and ¾”

· Metal meets or exceeds Type 1 requirements

· Powder coated to resist scratches and rust

· Stands off wall for uneven surfaces and allows air circulation

Go to sp.hotims.com and enter 45 for product information. See us at ASIS Booth 105.

0913sec_024_030_Merlino_v3.indd 30 8/19/13 9:32 AM

Page 31: ASIS BOOTH 963

THE SINGLE-SOURCE SOLUTION FOR ALL YOUR TRANSMISSION PRODUCTS

ComNet makes Wireless Ethernet as easy as Power, Point and Play

Using Wireless Ethernet has never been easier.› Power Up the Units › Point the Antenna – the NetWave® Antenna Alignment

LED array lights when the antennas are aligned› Play – now start transmitting Ethernet.

The NetWave® line consists of easy pre-packaged Commercial Grade or Industrially Hardened Point-to-Point kits that contain everything you need to establish remote connections to Ethernet edge devices.

Also available are Point-to-Multipoint models allowing multiple client/camera/networked edge device locations to connect to a single access point.

Need Help in choosing the correct Fiber Optic, Copper or Wireless connectivity solution?

Contact the ComNet Design Center Now for Free Design Assistance. 1-888-678-9427 | 1-203-796-5300 | [email protected]: www.comnet.net

Email: [email protected]: 1-203-796-5300 Toll Free: 1-888-678-9427

NetWave® Features:› Up to 95Mbps throughput

› Supports megapixel/HD cameras, DVRs, encoders/decoders and web servers.

› Uses WPA2 – AES or TKIP encryption to prevent unauthorized access

› Antenna alignment tool eases installation and setup

› ETSI Standards (EU Only): – DFS Dynamic Frequency Selection – TPC Transmit Power Control

› Hardened Models meet class IP67 dust and water ingress protection standards

› Lifetime Warranty

WIRELESS ETHERNET LINE

INTRODUCING THE

Visit: www.comnet.net Email: [email protected]: 1-203-796-5300 Toll Free: 1-888-678-9427Go to http://sp.hotims.com and

enter 17 for product information.

Untitled-9 1 8/6/13 2:23 PM

Page 32: ASIS BOOTH 963

PRODUCT SOLUTIONS

Compiled by Security Products’ Staff

NEW PRODUCT OF THE YEAR ENTRIES

3 2 0 9 1 3 | S E C U R I T Y P R O D U C T S

Access Control

SRI International IOM PassThru

SRI’s IOM PassThru drive-up dual-biometric system for vehicle entry points extends the use of iris and face identity authentication to the perimeter. Fast and easy to use, the automated system performs in all lighting and weather conditions. Users get an enhanced level of security with the effi ciency of an unmanned system. The PassThru form factor ex-pands the possibilities of iris and face recognition for security applications that previously required RFID cards, passcodes, and/or a security guard to validate the driver. The system can be deployed at any vehicle access point where accurate identity authentication is required or can be leveraged to expedite passage. SRI International.

Go to sp.hotims.com and enter 320 for product information.

PaxtonNet2 Entry Access System

Paxton’s Net2 Entry Integrated Video, Intercom and Access System is a video based door entry system that works standalone or in conjunction with the Net2 Access System for an integrated solution. The entry station uses only one Cat5 cable for video, audio and an access control proximity reader and communicates via IPV6 technology for easy instal-lation. The system includes SIP compatibility for projects that require smart phones, tablets, digital phones and soft clients on a computer. Paxton.

Go to sp.hotims.com and enter 321 for product information.

STANLEY Security 8002 Pacom-Edge Controller

The 8002 is Pacom’s “New Generation” hybrid se-curity controller that provides intrusion, access control and unprecedented third party integration. With dual Ethernet and optional GPRS and PSTN modules, the 8002 is capable of signaling over multiple communications paths to a host or central station, making it ideal for multiple site and re-motely managed applications. STANLEY Security.

Go to sp.hotims.com and enter 322 for product information.

Securitron Magnalock Corp.M380 Series Magnalock

Securitron’s M380 Series Magnalock is an addition to the low-profi le maglock family that pairs 600lb holding force with intelligence and easy installa-tion. The lock’s curved lines and patented installa-tion process provide superior aesthetics and a la-bor-saving installation in 30 minutes or less. The M380’s integrated technology options include a modular CCTV camera and PIR motion detector for a cleaner aesthetic around the door. The product is geared to security professionals and integrators who are seeking to simplify their installation of ac-cess control components in interior applications where fail-safe locking operation and free egress are needed. Securitron Magnalock Corp.

Go to sp.hotims.com and enter 323 for product information.

LineareMerge Essential - E3 Series

The Linear eMerge E3-Series access control sys-tem is an IT-friendly, browser-based, network ap-pliance that features easy expansion capabilities,

a comprehensive, quick set-up wizard and op-tional Power over Ethernet. With a lower total cost to own, remote management and multiple data storage options, the eMerge E3 series is the most reliable, scalable and secure access control sys-tem available. Linear.

Go to sp.hotims.com and enter 324 for product information.

STANLEY Security STANLEY EL Series Electronic Lock

The EL Series electronic lock can be used to cut keying costs, and add or delete users at any time. The wireless option offers users the ability to keep track of an audit trail through Intelli-M software system. Flexible upgrade kits provides the ability to convert a standalone lock to wireless communi-cation. Use the lock for more control and fl exibility at an affordable price. STANLEY Security.

Go to sp.hotims.com and enter 325 for product information.

FST21Digital Doorman

Digital Doorman access solution is an all-in-one, in-motion identifi cation system that incorporates the technological advantages of FST21’s SafeRise solution with dedicated hardware and seamless installation. Users can easily install it in any door with an electronic lock. The system includes: Saf-eRise software, delivering in-motion identifi cation, an FST21 all-in-one server, a full IP intercom with digital directory, and a 5-megapixel IP camera. SafeRise incorporates biometric fusion technology which provides in-motion identifi cation and au-thenticates individuals using a combination of fa-cial, voice and behavioral recognition. FST21.

Go to sp.hotims.com and enter 326 for product information.

Genetec Inc.Synergis Master Controller (SMC)

The Synergis Master Controller is an intelligent IP door controller designed to secure any organiza-tion’s facilities and buildings. The controller allows users to modernize their security operations and migrate to an IP-based access control solution, while leveraging their networking infrastructure and existing equipment and wiring. Genetec Inc.

Go to sp.hotims.com and enter 327 for product information.

HID GlobaliCLASS SE Encoder

HID Global’s iCLASS SE Encoder is an ideal solu-tion for organizations to encode and manage cre-dentials as well as confi gure readers. The encoder provides ultimate versatility in key management with the option of allowing HID Global to manage key directly or an organization can securely defi ne and manage keys locally. The solution enables or-ganizations to easily migrate from one card tech-nology to another by simply extracting the existing access control data and writing it to either a new credential or “wrapping” the data in a Secure Identity Object (SIO) and writing it to the existing credential. HID Global.

Go to sp.hotims.com and enter 328 for product information.

Quantum SecureSAFE for Aviation 4.5

Quantum Secure’s SAFE for Aviation Identity Man-

0913sec_032_061_npoy_v5.indd 32 8/21/13 12:39 PM

Page 33: ASIS BOOTH 963

We’re With You Every Step of the Way.

computarganz.com/design

NY: 1-800-422-6707 CA: 1-877-407-9555 ©2013, CBC. All Rights Reserved. www.computarganz.com

CBC (AMERICA) Corp.

Putting together an effective surveillance system can be a challenge. With so many options available, finding the right components and technology for your specific application can be difficult.

Until now. The Ganz Design Center was developed to take the guesswork out of building a truly effective surveillance system.

From start to finish, Ganz Design Center surveillance experts work directly with you to design a system that isbuilt around your needs– with the right products, the righttechnology and the right level of support.

Once your system is configured and installed, we’ll workwith you to ensure peak performance, from new product

or so�ware releases to changes in your surveillance requirements. The Ganz Design Center surveillance experts are here for you.

We offer products that provide complete video surveillancesolutions for every type of application: from simple camerasystems to complex multi-camera, VMS and NVR systems.Combine our trusted, expert advice with an extensive lineof leading-edge products to implement a system that notonly works– it works for you.

With our team of industry experts, you won’t find a moreknowledgeable partner to design and implement a powerful surveillance system. Call the professionals at the Ganz Design Center at 631-930-3529.

INTRODUCING THE GANZ DESIGN CENTER. YOUR PARTNER FOR A TRULY EFFECTIVE SURVEILLANCE SYSTEM.

Go to http://sp.hotims.com and enter 16 for product information.

Untitled-9 1 8/6/13 2:12 PM

Page 34: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

3 4 0 9 1 3 | S E C U R I T Y P R O D U C T S

agement software suite is based on the concept of having a system that streamlines the total lifecycle of identity management utilizing a single, central, open platform that provisions identity information throughout all systems, departments, users and air-port areas that touch an identity. The system pro-vides automation of processes that reduces opera-tional costs, create real-time effi ciencies, increase compliance and reduce risk. Quantum Secure.

Go to sp.hotims.com and enter 329 for product information.

Securitron Magnalock Corp.PowerJump ICPT

The Securitron PowerJump Inductive Coupling Power Transfer (ICPT) delivers power invisible and without contact between the frame and door to power electrifi ed hardware on the door. The Pow-erJump can be installed at the latch side or hinge side of the door and transfers up to 6 watts of power without pins or wires across the door gap, eliminating points of vulnerability and wear with no need to core drill the door. The unit is fi eld se-lectable for 12VDC or 24VDC output and can hold electrifi ed latches open in continuous duty or can momentarily energize the lockset for latch retrac-tion. Securitron Magnalock Corp.

Go to sp.hotims.com and enter 330 for product information.

Observint Technologies/Infi nias Inc.

infi nias Intelli-M Access Mobile Credential

Infi nias enhances IP-based, access control solu-tions by introducing a mobile credential feature that delivers complete access control functionality via smartphone. User credentials are authenticat-ed and events documented by the Intelli-M Access management software when presented for use. Credentials can be “wiped” to prevent unauthor-ized access, delivering enhanced security and eliminating the expense of purchasing, maintain-ing and replacing proxy cards or key fob invento-ries. Observint Technologies/Infi nias Inc.

Go to sp.hotims.com and enter 331 for product information.

Lenel Systems International Inc.

Lenel Migration to OnGuard Program

Lenel’s fl exible migration programs allow users to immediately migrate to the OnGuard Solution. Some existing systems that are part of the migra-tion program include Picture Perfect, Facility Com-mander, Diamond II, Sapphire Topaz and Summit. Advantages of the solution include strong video integration such as Prism open IP VMS integration and support for more than 350 third-party camer-as, a feature-rich solution, open system and fl exi-ble integration which includes the Open Access Alliance Program with more than 100 partners and 200 products. Lenel Systems International Inc.

Go to sp.hotims.com and enter 332 for product information.

KwiksetSmartCode Deadbolt Lock with

Home Connect

Kwikset’s SmartCode deadbolts with Home Con-nect technology integrates with home security and automation systems, allowing communication with other wireless products in the home, such as security systems and home entertainment sys-tems. Kwikset’s 2nd Generation SmartCode dead-bolt lock features a new design with best-in-class residential lock aesthetics, offering a new exterior style and class-leading, reduced interior size. With a completely redesigned, quiet-drive locking sys-tem, the Kwikset 2nd Generation SmartCode deadbolt blends technology and performance in a smartly-designed package that complements the aesthetics of any home. Kwikset.

Go to sp.hotims.com and enter 333 for product information.

STANLEY Security EyeSwipe-Nano TS

The EyeSwipe Nano TS is an advanced iris biomet-ric solution that offers real-time iris capture at a distance and in motion. Features an integrated card reader to support legacy users, ability to store 50,000 users and offers connections via Wiegand and other protocols for simple integration with ex-isting platforms. STANLEY Security.

Go to sp.hotims.com and enter 334 for product information.

Parabit Systems Inc.ACS-1E ATM Lobby Card Access Control System with SkimGard

ACS-1E ATM Lobby Card Access Control System provides reliable Skimmer Detection via SkimGard Track 2 Magnetic Strip Reader to ATM or Night Drop Lobby’s or Vestibule’s. The embedded Ether-net or optional modem supports remote manage-ment with the ACS Enterprise Software option. UTC’s MASterMind Integrated Software Platform receives ACS-1E panel status messages to streamline the monitoring of panel operations. Parabit Systems Inc.

Go to sp.hotims.com and enter 335 for product information.

STANLEY Security EyeLock HBOX

The EyeLock HBOX is an over-the-door iris-based identity authentication system. The fl exible design

accommodates multiple mounting environments from mobile stands, fi xed frames and wall mounts to new construction and existing retrofi t confi gura-tions. HBOX throughput delivers up to 50 people per minute and is ideal for environments such as airports, manufacturing facilities and construction sites. The device offers connection via Wiegand, F/2/F, Relay and Ethernet for simple integration with existing platforms. STANLEY Security.

Go to sp.hotims.com and enter 336 for product information.

Accessories - Non-Surveillance

Talk-A-Phone Wall-Mounted Call Box with E-Stop

Talk-A-Phone’s Wall-mounted Call Box has been developed for train platforms and features an emergency trip button, which can cut power to the train tracks. In the event of an emergency, the emergency button can be engaged to halt an on-coming train. The call box can automatically dial a pre-programmed number, connecting the user with an operator. Only authorized personnel can disengage the emergency trip button by using a special key. Talk-A-Phone.

Go to sp.hotims.com and enter 337 for product information.

Tyco Integrated SecuritySmarTub

SmarTub, Tyco Integrated Security’s theft-resistant infant formula container, includes a Sensormatic Acousto-Magnetic Electronic Article Surveillance (EAS) tag that resonates when placed in an elec-tromagnetic fi eld, alerting the retail store’s staff of the theft. The new packaging includes “AccuMea-sure,” a scoop leveler for more accurate feedings; “CleanPull” technology, which allows a foil liner to

0913sec_032_061_npoy_v5.indd 34 8/21/13 12:39 PM

Page 35: ASIS BOOTH 963

MK-133-A

ALSO AVAILABLE: IP2500

• Single and dual button options • Stainless steel housing

For decades, millions of people around the world have depended on Code Blue’s emergency communication solutions as a symbol of reliable safety.

With the debuts of the IP1500 and IP2500, we now can help even more people in a limitless range of outdoor and indoor locations.

The IP1500 and IP2500 are cost-effective emergency speakerphones ideal for indoor and outdoor locations like hallways, garages, classrooms, elevators, stairways, door entries and more.

• Full duplex VoIP technology • Self-monitoring and fault reporting • Weather, UV, graffiti resistant • Auxiliary output • Available in surface or flush mount

MK-133-A

VAILABLE: IP2500

e and dual button optionsless steel housing

For decacades, millions of people aroundthe woorld have depended on Code Blue’semerrgeg ncy communication solutions as asymbbol of reliable safety.

Withh the debuts of the IP1500 and IP2500,we nnow can help even more people in a limim tless range of outdoor and indoorlocaations.

The IPI 1500 and IP2500 are cost-effectiveemerrgency speakerphones ideal for indoor and ouo tdoor locations like hallways, garages, classsrs ooms, elevators, stairways, door enntrtries and more.

• Full duplex VoIP technology • Self-monitoring and fault reporting • Weather, UV, graffiti resistant • Auxiliary output • Available in surface or flush mount

ALSO AV

• Single • Stain

INTRODUCING THE IP1500

VisitCode Blue at ASIS 2013:ChicagoSept. 24 - 27Booth #163

For more information on Code Blue products, visit: codeblue.com | 800-205-7186

Go to http://sp.hotims.com and enter 61 for product information.

Untitled-5 1 8/9/13 12:13 PM

Page 36: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

3 6 0 9 1 3 | S E C U R I T Y P R O D U C T S

easily be removed with one pull; “SimpleSlide,” a scoop storage for less mess; a longer scoop han-dle for more hygienic scooping; and anti-theft tag technology to prevent products from being stolen from stores. Tyco Integrated Security.

Go to sp.hotims.com and enter 338 for product information.

LifeSafety PoweriSCAN

iSCAN is a smart power management system for access, security and CCTV that continuously moni-tors, tests and reports the health and status of the host power supply(s), battery set and up to twenty-four individual outputs. Each output is monitored for voltage and current fl uctuations, and email/SNMP alerts can be set for voltage loss, over cur-rent, short current, line brown out, etc. Since iS-CAN allows many service functions to be per-formed through a web-based browser, such as power cycle frozen devices, service response is immediate, and integrator/dealers can achieve a high level of savings by reducing service calls. iS-CAN’s 24/7 power monitoring and reporting capa-bility also adds signifi cant value to service con-tracts or RMR models. LifeSafety Power.

Go to sp.hotims.com and enter 339 for product information.

The Housing Company PS042B-UDP

The PS042B-UDP by The Housing Company is a 42-inch tall dual headed steel gooseneck mount-ing pedestal, which is made from U.S. steel and manufactured in the United States. The unit solves the problems encountered when there is a require-ment for mounting multiple devices for gated entry applications. The Housing Company.

Go to sp.hotims.com and enter 340 for product information.

Accessories -Surveillance

FLIR SystemsDNR200 Series

The DNR200 Series line of NVRs provides full HD 1080p pictures, and is available with four-, eight- or 16-channel inputs. The NVRs are Onvif 2.0 com-pliant and automatically discover Onvif IP cameras with no programming on the part of the operator or integrator. This high-defi nition image gives opera-tors the fl exibility to digitally zoom in on selected areas, making reliable threat identifi cation quick and easy. The internal processing allows for real-time recording and interaction, which eliminates gaps in coverage. FLIR Systems.

Go to sp.hotims.com and enter 341 for product information.

Speco TechnologiesNVRWP4P

Speco’s NVRWP4P/Wall Mount NVR with built-in 4-port PoE switch provides power for up to 4 cam-eras, eliminating the need for separate power sup-ply. The NVR is capable of up to 2.3 MP on channels 1-3 and up to 5 MP on channel 4. For environments that depend on live video, the NVR offers features for fast and responsive event management such as a VGA output for local monitor connection in 1024 x 768 resolution, EMAPS (8) showcasing camera, sensor and relay positions and access for up to four concurrent users. Speco Technologies.

Go to sp.hotims.com and enter 342 for product information.

Speco TechnologiesD16DS

Speco’s D16DS 16 channel 960H DVR with Digital Deterrent can capture high resolution 700 TV line cameras, but can also enhance the recording qual-ity of existing cameras. The DVR offers program-mable recording on motion detection, sensor, schedule, continuous and manual. Covert camera operation provides enhanced security and adminis-

trator control, user access for up 4 concurrent us-ers, real-time recording rate at 240FPS, and 8- and 16-channel audio recording. Speco Technologies.

Go to sp.hotims.com and enter 343 for product information.

Analog to IP Migration

Axis CommunicationsAXIS Q7436 and AXIS Q7920

The AXIS Q7436 Video Encoder Blade and AXIS Q7920 Video Encoder Chassis is high-performance analog-to-network video encoding solution for critical surveillance solutions. The AXIS Q7436 blade supports PTZ over coax control and up to 60 frames per second video, while the AXIS Q7920 is a high-density chassis that holds up to 14 hot-swappable video encoder blades in order to digi-tize up to 84 analog cameras. The chassis also provides power and network redundancy for the video surveillance system and enables a smooth migration to IP, especially for large-scale, mission critical applications. Axis Communications.

Go to sp.hotims.com and enter 344 for product information.

Cameras - Analog

SamsungSpiderCam

Samsung’s SCP-2370RH (Spider Cam) is a high speed professional infrared PTZ camera that fea-tures a 37x optical zoom and build-in IR LEDs. The cameras adjusts the infrared intensity to provide the appropriate amount of IR light at certain zoom ra-tios, allowing it to capture details in complete dark-ness, even up to 328ft. The camera offers true day and night, motion detections and delivers clear and vivid images. The Spider Cam is IP66 rated, making it suitable for use in any condition. Samsung.

Go to sp.hotims.com and enter 345 for product information.

Speco TechnologiesHT7246H

The HT7246H/Vandal Dome Camera by Speco Technologies is the latest in analog technology that allows cameras and DVRs to capture up to 700 TV lines, which is the highest in analog capa-bilities. The camera is equipped with Speco’s In-tensifi er technology that allows the camera to see color in both day and night. Features for the camera include relay outputs for motion detec-tion, full OSD operation, 3 axis lens mount, vandal and weather resistant operation, and a 5 year warranty. Speco Technologies.

Go to sp.hotims.com and enter 346 for product information.

Cameras - HDcctv

PanasonicClearSight

Panasonic’s ClearSight dome coating technology offers permanent, “rain-resistant” coating that allows rain drops to fl atten onto the surface of the camera dome, providing better visibility and sig-nifi cantly reducing image distortion that is caused by standing water droplets in rainy or wet weather conditions. ClearSight is resistant to the accumulation of water stains and dirt which can be washed away by rain or by simply spraying the dome with water, with no wiping required. The coating is suitable for use in outdoor applica-tions such as airports, transportation yards and any outdoor location that is prone to wet weather conditions. Panasonic.

Go to sp.hotims.com and enter 347 for product information.

0913sec_032_061_npoy_v5.indd 36 8/21/13 12:39 PM

Page 37: ASIS BOOTH 963

Download the “Get Smart with PoE” white paper now. www.dlink.com/PoE

Business Wireless Switching IP Surveillance Network Storage Network SecurityBusiness Wireless Switching IP Surveillance Network Storage Network Securityg g y

Make the Switch

With Power-over-Ethernet (PoE) Smart Switches from D-Link, you can:

FIND OUT HOW PoE CAN POWER YOUR BUSINESS.

Provide Power and Data to PoE Devices with a Single LAN Cable

Remotely Turn On/Off PoE-Powered Equipment

Manage Power Features Through a Simple Web Interface

Discover the Future with PoE.Discover the Future with PoE.

DGS-1100-08PYou Could Win!Come See Us At

Booth #4609

Untitled-5 1 8/9/13 12:17 PM

Page 38: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

3 8 0 9 1 3 | S E C U R I T Y P R O D U C T S

Cameras - IP Video Surveillance

Bosch Security Systems Inc.FLEXIDOME Starlight HD VR

The FLEXIDOME Starlight HD VR from Bosch is a lowlight megapixel camera that delivers 720p resolution at up to 60 images per second (IPS) with clear images, even at night. High sensitivity in color and monochrome - down to 0.017 and 0.0057 lux respectively - combines with Content-Based Imaging Technology for detailed images in all lighting conditions, and 60 IPS provides opti-mum performance in scenes with fast-moving objects. The vandal-resistant IP66-rated cast-alu-minum housing, polycarbonate window and hard-ened inner liner makes it ideal for indoor or out-door use. Bosch Security Systems Inc.

Go to sp.hotims.com and enter 348 for product information.

Arecont VisionSurroundVideo 12MP WDR 180°

Panoramic Camera

Arecont Vision’s Surround Video 12 MP WDR 180° panoramic cameras is 25 percent smaller than pre-vious SurroundVideo models and is equipped with Wide Dynamic Range (WDR) technology that deliv-ers a range of up to 100dB at full resolution without lowering frame rates. The WDR performance of this panoramic camera represents up to 50dB improve-ments (300X) in dynamic range when compared to non-WDR cameras. The camera uses four different 3MP WDR image sensors for a total resolution of 8,192 x 1,536 pixels. Arecont Vision.

Go to sp.hotims.com and enter 349 for product information.

Arecont VisionMegaDome 2 WDR All-in-One Camera

Featuring remote focus and remote zoom, Arecont

Vision’s MegaDome 2 indoor/outdoor all-in-one solutions integrate a 1080p or 3 megapixel WDR camera with the fastest frame rates in the industry and an IR corrected vari-focial lense (P-iris) into an IP66 environmental rated/ IK10 impact resistant dome housing. Equipped with WDR technology, the camera delivers a dynamic range of up to 100dB at full resolution and without lowering the frame rates. The WDR performance represents up to 50dB improvement (300X) in dynamic range com-pared to non-WDR cameras. Arecont Vision.

Go to sp.hotims.com and enter 350 for product information.

Axis CommunicationsAXIS P5414-E

The AXIS P5414-E PTZ Dome Network Camera is a uniquely designed, outdoor-ready pan/tilt/zoom dome with “direct drive” technology meant for wall-mounting. With only two moving parts, the direct drive pan/tilt system enables endurance for reduced maintenance and sleek design. The cam-era features an integrated sunshield that can be easily removed and painted in order to blend into the environment. The dome offers 720p resolution, 18x zoom and includes a built-in wall bracket for easy installation. A hidden junction box supports two-way audio, an SD card slot, four I/O ports and PoE. Axis Communications.

Go to sp.hotims.com and enter 351 for product information.

Axis CommunicationsAXIS P12 Network Camera Series

The AXIS P12 Network Camera Series features an innovative design concept that enables easy inte-gration of an all-digital, HDTV-quality covert cam-era into limited spaces. The camera series in-cludes a main unit with separate sensor unit that can be mounted up to 26ft away. Features for the series include up to 720p HDTV video, H.264 and Motion JPEG, motion detection, active tampering alarm, I/O ports and edge storage. The functional, covert design is ideal for stores, banks, ATMs, ho-tels and offi ces. Axis Communications.

Go to sp.hotims.com and enter 352 for product information.

Brickcom CorporationWOB-300Np N-Series Camera

The Brickcom WOB-300Np Outdoor Bullet Wireless IP Network Camera, equipped with the SONY Ex-mor CMOS sensor, streams the high-quality video in Full-HD (1920x1080 @30fps) or various other resolutions. The camera supports triple-codec (H.264 / MPEG-4 / MJPEG), and Brickcom WDR Enhancement, and IR illuminator further enhances its capability in shooting the object surrounded by intense back light or in a low-light environment. The Intelligent Multi-Profi le Sensor Management feature provides up to fi ve customizable image sensor profi les and gives the camera the ability to adapt to various environments. The camera also features 802.11a/b/g/n dual-band wireless and the external changeable antenna for installations where network cabling is diffi cult, and focusing the camera is easy using the SmartFocus remote zoom and focus function. Brickcom Corporation.

Go to sp.hotims.com and enter 353 for product information.

Sony Electronics Inc.SNC-CX600W

The SNC-CX600W is an affordable HD (720p) cam-era with a wide-angle view (120°) that produces high quality pictures for detecting crime and distur-bances as they happen. The camera features a pas-sive infrared (PIR) sensor for detecting movement in the dark, and a white LED light that automatically illuminates the scene when motion is detected. The camera supports two-way audio using a built-in mi-crophone and speaker and features pre-installed edge-based analytics from Sony, including intelli-gent motion detection, face detection and DEPA technology. Sony Electronics Inc.

Go to sp.hotims.com and enter 354 for product information.

D-LinkDCS-6010L

The 360-degree network camera (DCS-6010L) de-livers a 180-degree panoramic view via wall mount or 360-degree surround view via ceiling mount without blind spots. Digital PTZ functionality keeps everything within viewing distance. With the company’s mydlink cloud-enabled remote man-agement and monitoring services, users can mon-itor their business via any computer, iPad, iPhone or Android device with the mydlink portal and free mydlink app. Users can convert video captured with the fi sheye lens to conventional rectilinear projection for viewing and analysis. D-Link.

Go to sp.hotims.com and enter 355 for product information.

SamsungSNB-6004

The SNB-6004 network camera features advanced functions from Samsung with full HD 1080p im-ages. The camera’s functionalities include 100dB Wide Dynamic Ranger which delivers 30fps at 1080p, lowlight performance down to 0.1 lux (F1.2, 50IRE, color), creating clear images under lowlight conditions and P-iris depth of fi eld support which results in images with better contrast, clar-ity and resolution. The camera is also intelligent enough to defog any image in foggy areas such as bridges, ski areas and ports. Samsung.

Go to sp.hotims.com and enter 356 for product information.

Sony Electronics Inc.SNC-VM630

The Sony SNC-VM630 camera delivers a new range of features for an HD surveillance camera, including

0913sec_032_061_npoy_v5.indd 38 8/21/13 12:40 PM

Page 39: ASIS BOOTH 963

Give your access control solution wings.

There’s A BOARD for that.Introducing the Mercury M5 Bridge, for plug & play retrofi ts that make Casi upgrades open, reliable, and fl exible. Our “screwdriverless” upgrade for Casi Picture Perfect™, Facility Commander™, and Secure Perfect™ installations means that with a simple board swap for every board currently installed in any Casi Micro 5 enclosure, customers hardware will be open, and speaking Authentic Mercury in no time. Just pull off the connectors from the Casi board, remove it, then replace it with the corresponding Mercury M5 board, refi t the connectors and power up. You’ll migrate customers to an open future where there will always be a choice to move to the right software platform, at the right time and for the right reasons. In short, for both you and your clientele looking to upgrade Casi, this thing will really fl y. Let one of our partners show you how.

©2013 Mercury Security is a trademark of Mercury Security Products, LLC.

Mercury Platinum Partners: your valued source for the Authentic Mercury M5 Bridge

You want a bridge from your legacy Casi to a wide-open future?

Go to http://sp.hotims.com and enter 36 for product information.

Untitled-55 1 8/14/13 2:32 PM

Page 40: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

4 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

a unique image stabilizer that reduces blurriness in video caused by shaking or vibrations. The camera is based on IPELA ENGINE, Sony’s integrated signal processing system that generates high picture qual-ity, and boasts a maximum resolution of 1920 x 1080 and improved light sensitivity due to an Exmor CMOS sensor. The camera provides other advanced features such as high frame rate and improved image processing with View-DR, XDNR and DEPA Advanced. Sony Electronics Inc.

Go to sp.hotims.com and enter 357 for product information.

IC RealtimeOwl Eye Camera

IC Realtime’s Owl Eye Camera is day/night, 10-megapixel, ultra high resolution sensor with 360 degree, hyper-immersions view lens is a tiny form factor with all aluminum chassis, acting as the camera’s heat sink. The camera is M2M solar-certifi ed due to its incredible low power draw of fewer than 4 watts. The sleek design enables the camera to be installed with a wide variety of mounts and housing options and features a single sensor and single lens that conforms to ONVIF Pro-fi le S, enabling it to be integrated into over 30 ex-isting NVR and VMS platforms out of the box. The de-warping algorithm differentiates the camera from others that utilize multiple sensor heads that require video stitching, and the single sensor de-sign enables cost savings because it only takes up a single video channel and delivers full resolution anywhere in the image. IC Realtime.

Go to sp.hotims.com and enter 358 for product information.

MOBOTIX Corp.S15D with MxActivitySensor

The S15D features MxActivitySensor, an activity-controlled, software-based image analysis func-tion for detecting movement of people and objects in a monitored area, and the compact S15D Flex-

Mount is a universally deployable, easy conceal-able video system with a highly detailed resolution of up to six megapixels. The fully weatherproof IP camera has two miniature 5 MP sensor modules, which feature microphones and are connected to the concealed camera housing with a 2-meter cable. The MxActivitySensor is easy to confi gure and delivers reliable results, even in applications with large amounts of external interference, and drastically reduces the number of false alarms. MOBOTIX Corp.

Go to sp.hotims.com and enter 359 for product information.

Cloud Computing/Storage

VASCO Data Secritymydigipass.com

VASCO’s mydigipass.com is a hosted consumer au-thentication platform that combines high-level se-curity with user convenience. Website owners can integrate strong authentication using DIGIPASS one-time passwords to secure access and content. Consumers can download a free DIGIPASS to se-curely log on to tens of thousands of B2B and B2C web applications through the platform. Mydigipass.com facilitates password management and en-ables end-users to manage online credentials in one secure place. VASCO Data Security.

Go to sp.hotims.com and enter 360 for product information.

2X Software2X Application Server X6

2X Application Server X6 allows the desktops and applications from a central location, providing con-tinuous availability, resource-based load balancing and complete end-to-end network transparency for administrators. This enables vendor indepen-dent virtual desktops and application delivery to users on any device, accessible from anywhere. 2X Software.

Go to sp.hotims.com and enter 361 for product information.

Cloud Surveillance

Smartvue Corp.Smartvue S9i Cloud Server

The Smartvue S9i is value engineered for cost-ef-fective cloud video surveillance for 20 HD camera systems with integrated cloud storage. The S9i helps organizations meet the challenges of servers by supporting plug and play integration with hun-dreds of industry-leading cameras from dozens of vendors. The server offers applications for tablets and smartphones that operate Win8, iOS and An-droid. The S9i quickly and easily integrates with most existing networks, hardware, and infrastruc-ture and supports secure, unlimited storage with redundancy on the cloud network. Smartvue Corp.

Go to sp.hotims.com and enter 362 for product information.

Crisis Management

SieloxSielox Class

The Sielox Class is a solution for K-12 response to emergency situations that automates the manual Red/Green Lockdown procedure that is recom-mended by the Federal Government. The solution allows real-time status using fi ve color conditions (Green-Safe/Secure, Yellow-Unaccounted Individ-ual, Blue-Medical Emergency, Orange-Classroom Disturbance, and Red-Crisis Condition). Sielox Class provides real-time classroom status, up-dates and notifi cation to school administrators, security, and fi rst responders through the use of graphical maps, email and text messaging to as-sist in making split-second decisions. Sielox.

Go to sp.hotims.com and enter 363 for product information.

Fire & Life Safety/Equipment

LevitonOmni LTE Security and

Automation System

Leviton’s Omni LTE Security and Automation Sys-

tem wirelessly and affordably controls homes and businesses with scheduling ability, motion detec-tion, opening doors, etc. It’s controlled by Zibgee Z-Wave, VPB and several other popular protocols. The system enables the use of a smartphone or tablet to control it with zero fees and it incorpo-rates wireless security sensors including vehicle detection and door locks. The system ensures complete protection by monitoring intrusion, fi re Co2, smoke, water and other hazards. Leviton.

Go to sp.hotims.com and enter 364 for product information.

System Sensor i4 Module

The i4 Series Combination Carbon Monoxide/Smoke Detector and Interface Module by System Sensor is the fi rst low-voltage combination detec-tion system for residential applications that in-cludes a detector and a panel interface module that enables connection of multiple detectors to a zone using only two or four wires to each detector. The module is compatible with i3 Series Smoke Detectors with thermal sensors and built-in sound-ers. In the event of a smoke or carbon monoxide event, all the detector sounders on the loop will be activated. System Sensor.

Go to sp.hotims.com and enter 365 for product information.

Honeywell PowerIP/GSM 4G Fire Alarm

Communicator

The IPGSM-4G fi re alarm communicator allows installers to easily select IP, GSM (cellular) or both for fi re alarm reporting to a central station. Com-patible with virtually any brand of fi re alarm control panel, the IPGSM-4G connects to both ports on the panel’s digital alarm communications transmitter (DACT). The communicator’s GSM technology op-erates over 2G, 3G or 4G networks and automati-cally chooses the best available cellular signal in the area. Fire-Lite Alarms/Honeywell Power.

Go to sp.hotims.com and enter 366 for product information.

0913sec_032_061_npoy_v5.indd 40 8/21/13 12:40 PM

Page 41: ASIS BOOTH 963

Go to http://sp.hotims.com and enter 34 for product information.

Untitled-5 1 8/9/13 4:55 PM

Page 42: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

4 2

SDiCyclone

SDi’s Cyclone is a revolutionary way of cleaning detectors, fi re and security video system compo-nents. The Cyclone is powerful, handheld, light-weight, portable and is rechargeable. A single charge for the product is equal to 24 cans of air. The Cyclone can be turned sideways, upside down, or any angle that is needed to power clean hard to reach crevices. And since no chemicals are used, there is no chance of frostbite. The Cyclone is more powerful and better able to reach hard clean areas than traditional air dusters, computer cleaners and can air solutions. SDi.

Go to sp.hotims.com and enter 367 for product information.

Videofi edIndoor MotionViewer

The Indoor MotionView (IMV) by Videofi ed provides video verifi cation at the price of wireless PIR. The IMV is a wireless, battery powered VGA camera and PIR detector that sends color video clips of what caused the alarm to the central station for immediate review and dispatch. The product is in-stalled like a typical wireless PIR and can operate for four years on two AA batteries. A mobile appli-cation is available for the product and provides users with a remote camera look from a smart-phone. Videofi ed.

Go to sp.hotims.com and enter 368 for product information.

XtralisVESDA ECO-EX

When used with the VESDA range of ASD products, the VESDA ECO-EX provides a combined aspirated smoke and gas detection system that provides early warnings to toxic, oxygen and fl ammable gas haz-ards to protect personnel and property while ensure business continuity. The ECO-EX has been approved for use within the Class 1 Division 3 classifi ed haz-ardous locations and must be used with similarly approved VESDA ASD and installed within the ap-proved area. The system offers signifi cant installa-tion and maintenance savings over conventional multi-point gas detection solutions and reduces the number or detectors needed and allows for easy ac-cess for routine maintenance. Xtralis.

Go to sp.hotims.com and enter 369 for product information.

Cooper Notifi cationExceder LED High Fidelity Speaker

Strobes and Speakers

Wheelock’s Exceder LED Speaker Strobes and Speakers feature a wide frequency response range and use LED as the light source. With a re-sponse range of 300 to 8000 Hz, the speakers are able to reproduce frequencies closer to the original sound, providing leading intelligibility with crisp, clear voice messages, ideal for mass notifi cation and emergency communications. The newest products produce high fi delity sound output in a low-profi le design for indoor wall-mount applica-tions, where intelligible communications is re-quired. Cooper Notifi cation.

Go to sp.hotims.com and enter 370 for product information.

Go to sp.hotims.com and enter 67 for product information. See us at ASIS Booth 695.

0913sec_032_061_npoy_v5.indd 42 8/21/13 12:40 PM

Page 43: ASIS BOOTH 963

We’re looking for bold performance.

As the nation’s most trusted security company for more than 150 years, Diebold delivers the next generation of security solutions and world-class alarm monitoring.

Our technical specialists and sales professionals are empowered to turn their boldest ideas into innovative solutions for our customers. Diebold offers rewarding compensation, comprehensive benefits and a work environment where talent rises

to the top. As Diebold grows and solidifies our industry-leading position, we are seeking high-talent individuals looking to enhance their career horizons and industry

recognition by joining the Diebold team. Tell us about your abilities.

For more information, visit Diebold.com/securityproducts or visit us at ASIS, booth 1023.

.

Go to http://sp.hotims.com and enter 20 for product information.

Untitled-13 1 8/7/13 3:37 PM

Page 44: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

4 4

XtralisVESDA VLC-EX

The VESDA VLC-EX detector has been specifi cally designed to provide all the benefi ts of aspirating smoke detection which includes very early warn-ings for protecting hazardous applications with Zone 2 classifi cation. The detector combines the VESDA detection technology with a modifi ed aspi-rator design, incorporating them into an IP54-rated stainless steel enclosure. The main enclosure houses all the key components of the detector, and all non-serviceable items such as the main pro-cessor board and detector chamber are mounted away from the general access area, protecting them during installation and servicing. Xtralis.

Go to sp.hotims.com and enter 371 for product information.

Honeywell Tuxedo Touch with Total Connect

Honeywell’s Tuxedo Touch is a 7-inch full-color, high resolution touchscreen controller that com-bines security and building automation systems into one affordable device. The Tuxedo Touch sup-ports Z-Wave enabled building automation, which allows thermostats, locks, lighting systems and more to be connected and controlled wirelessly. The controller features an embedded web server that enables the security and building automation systems to be controlled remotely using any smart device within a customer’s dedicated Wi-Fi cover-age area. Tuxedo Touch supports live video moni-toring from up to four cameras to its touchscreen display and, when paired with Total Connect, cus-tomers can view camera feeds from anywhere with Internet access. Honeywell.

Go to sp.hotims.com and enter 372 for product information.

Investigative Video Systems

BriefCamBriefCam Syndex

Video Synopsis is a unique, patented technology developed and marketed by BriefCam that enables hours of video to be reviewed in just minutes. This is achieved through an image-processing algo-rithm that creates a summary of the original full length video. The Synopsis serves as an index to the original video. Users can select an object of interest within the Video Synopsis, and access the exact point in time where it appears in the original video. BriefCam’s Version 3.0 features the newly launched Smart Synopsis a set of additional tools to further assist in locating events of interest. Us-ers can defi ne metadata attributes or a combina-tion of attributes, to further shorten review time and to affect the order and arrangement of objects presented in the Video Synopsis. BriefCam.

Go to sp.hotims.com and enter 373 for product information.

IT Software/Hardware

Plixer International Inc.Scrutinizer 10

Plixer’s Scrutinizer 10 brings Network Behavior Analysis to NetFlow by providing threat detection and advanced reporting for network and applica-tion traffi c analysis across physical and virtual network infrastructures. The fi rst to report on sev-eral metrics (e.g. URLs, User Name, Round Trip Time, HTTP Host, Jitter, Packet Loss, Retransmits, etc.), Scrutinizer is leveraged with detailed traffi c meta-data when performing forensic investiga-tions on suspicious traffi c patterns. Scrutinizer enables the IT administrator to pinpoint who is consuming bandwidth, what they are using it for and immediately restore resources for work-relat-ed needs. Plixer International Inc.

Go to sp.hotims.com and enter 374 for product information.

Find Your Balance

CyberLock, Inc. • 541-738-5500 • [email protected]

CyberLock provides the balance between security and convenience. Each electronic cylinder is packed with high security features to track and control access throughout your operation. CyberLock cylinders are the exact dimensions of themechanical lock cylinders they replace and install without power or wiring into existing lock hardware,making installation quick, easy, and affordable.

• No wiring or re-keying costs• Keys cannot be duplicated and can be deactivated• Track and report access granted and access denied events•

Learn more today!

Visit us at ASIS Booth #1294

Visit our website www.cyberlock.com/lock4

CyberLock®

Go to sp.hotims.com and enter 52 for product information. See us at ASIS Booth 1294.

0913sec_032_061_npoy_v5.indd 44 8/21/13 12:40 PM

Page 45: ASIS BOOTH 963

Go to http://sp.hotims.com and enter 73 for product information.

Untitled-1 1 8/15/13 3:59 PM

Page 46: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

4 6

Alert Logic Inc.Threat Manager

Threat Manager is the fi rst fully-managed threat management solution deployable in any elastic cloud infrastructure. It enables customers to deploy network security in any cloud environment, irre-spective of hypervisor and networking architecture, and still identify threats found in all network traffi c, including VM-to-VM traffi c. Intelligent multifactor correlation identifi es security incidents, enabling rapid response and defense. Alert Logic Inc.

Go to sp.hotims.com and enter 375 for product information.

Thales e-Security keyAuthority

Thales keyAuthority is a high assurance appliance that provides centralized key management to low-

er the risk of security breaches and facilitate com-pliance with stringent regulations and policies while also ensuring that critical data remains available to the organization. keyAuthority is a se-curity-hardened appliance that manages encryp-tion keys on behalf of multiple classes of encryp-tion devices, including leading storage devices that include native encryption capabilities. As a ready-to-use, turnkey system, keyAuthority en-forces key management policies to support com-pliance, reduces the risk of security breaches, saves time and lowers costs of ownership while eradicating the need to maintain multiple key management systems. Thales e-Security.

Go to sp.hotims.com and enter 376 for product information.

Alert Logic Inc.Log Manager

By combining correlation with on-the-fl y parsing of logs, Log Manager can alert users of critical se-curity issues, in many cases in advance of a breach. Built on a third-generation big data pro-

cessing grid, the new Log Manager allows users to manage log data from all of their infrastructure - including environments inside enterprise data centers all the way through fully elastic public cloudsin a single console. Alert Logic Inc.

Go to sp.hotims.com and enter 377 for product information.

Dell SoftwareQuest One Identity Manager-Data

Governance Edition

Quest One Identity Manager Data Governance Edi-tion (DGE) allows business managers to control who has access to the data through the power to analyze, approve and fulfi ll access requests. Its purpose is to provide decision makers with dash-boards to view trends, understand historic and current data, access activity and see attestation status on a personalized level, with reports that can be used to prove compliance to auditors-all without the need to involve IT. Dell Software.

Go to sp.hotims.com and enter 378 for product information.

Mass Notifi cation

AtHoc Inc.AtHoc IWS Solution Suite

AtHoc’s IWS Suite is a fully-integrated mass notifi -cation platform that harnesses the power of mobil-ity, cloud and social media to unify both personal and mass notifi cation devices, and meets enter-prise-wide needs through two-way incident infor-mation sharing with multiple dimensions in con-tent, reach and direction. The suite allows for mass interaction, 360 degree visibility, actionable com-munication and personnel accountability with the ability for everyone involved to become a sensor in a crisis, and to provide and receive important, live-saving information. The solution is capable of meeting unique organizational needs and stan-dards as it pairs with an existing IP infrastructure,

Secure Perimeter Means Safety“Our gatehouse is critical to the safety of our operations and our FDA approval.Because our plant is susceptible tocriminal or terrorist infiltration, we must be assured that we have everythingbuttoned-down and can affirm consumerconfidence. Recognizing that this was nosmall matter, B.I.G. delivered the booth a week early. I looked around for the mostvalue for the dollar, and that’s what Ifound with B.I.G. My decision has beenreconfirmed with every interaction I’vehad with the company.”

A major agricultural firm

Go to sp.hotims.com and enter 13 for product information.

0913sec_032_061_npoy_v5.indd 46 8/21/13 12:40 PM

Page 47: ASIS BOOTH 963

ONLY TALKAPHONE PROVIDES THE DEDICATED SUPPORT

YOU NEED FOR VIRTUALLY ANY SITUATION — STANDARD.

“We test the units periodically, and we never have problems. I’ve seen other

competitors’ units fail after one or two storms. These TALKAPHONE towers

have been working without problems for six years strong.”

— Don Gussler, Emeryville Marina Harbor Master

Discover the TALKAPHONE difference.Get the full story at www.talkaphone.com/marina or call 773-539-1100.

OUR SUPPORT STANDS OUT FROM THE CROWD.

TALKAPHONE’S VoIP-500 SERIES PHONE has tested compatible with Cisco UCM 7.1 and UCM 8.6. Go to www.cisco.com/go/compatibledisclaimer for complete disclaimer.

TALKAPHONE PROUDLY PARTNERS WITH:

TALKAPHONE | EMERGENCY COMMUNICATION | MASS NOTIFICATION | AREA OF RESCUE

See us at ASIS, Booth #2129 | Go to http://sp.hotims.com and enter 71 for product information.

Untitled-6 1 8/12/13 11:25 AM

Page 48: ASIS BOOTH 963

4 8 0 9 1 3 | S E C U R I T Y P R O D U C T S

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

ultimately reducing overhead costs. It has the abil-ity to reach all personnel through smartphone ap-plication, telephony and text messaging, desktop alerts, fi re alarm integration, digital displays, radio broadcasts, alerts to VoIP phone displays, instant messaging, alerts via social networks, pagers and other communication capabilities. AtHoc Inc.

Go to sp.hotims.com and enter 379 for product information.

CodeBlue Corp.Blue Alert MNS

Designed specifi cally for colleges, hospitals, cor-porations and municipalities, Blue Alert MNS (Mass Notifi cation System) provides a cost-effec-tive and comprehensive platform for delivering emergency notifi cations over audio, visual and messaging platforms at the touch of a button. The touchscreen compatible interface allows users to pre-confi gure event specifi c alerts based upon their incident response plan that can be delivered via text messaging, email, social media, desktop alerts, public address speakers and digital sig-nage. CodeBlue Corp.

Go to sp.hotims.com and enter 380 for product information.

Silent Knight/Honeywell IntelliKnight 5820XL-EVS

Silent Knight’s IntelliKnight 5820XL-EVS is a stand-alone system that combines addressable fi re alarm and emergency voice systems in one package, eliminating the standard use of a costly and confus-ing “side-car” voice as the only fully-integrated sys-tem of its kind to be made available through secu-rity equipment distributors. The system provides a single solution, built on proven technology with all the benefi ts of a non-proprietary system. By elimi-nating the common method of running speaker wire back to a main control unit, these “intelligent” am-plifi ers allow speaker power to be distributed, sig-nifi cantly reducing speaker wire runs and installa-tion time. Silent Knight/Honeywell.

Go to sp.hotims.com and enter 381 for product information.

Fire-Lite Alarms/Honeywell Emergency Command Center

The Emergency Command Center (ECC) from Fire-Lite Alarms is a mass notifi cation system capable of integrating with virtually any brand of fi re alarm system to provide an economical solution for com-municating critical messages, as well as daily general announcements throughout a facility. The ECC’s scalable design enables facilities to pur-chase only what is needed, with ample capacity for future expansions. While a straightforward user interface makes the ECC easy-to-use, the ability to send out live messages called in from any phone, makes the ECC invaluable during emergencies. Fire-Lite Alarms/Honeywell.

Go to sp.hotims.com and enter 382 for product information.

Mobile Security Applications

Bitzer MobileBEAM

Bitzer solves the mobile security challenges faced by the enterprise by isolating corporate from per-sonal access, data and apps on employees’ mobile devices, while ensuring a rich user experience. Its Bitzer Enterprise Application Mobility (BEAM) solu-tion provides an enterprise security layer for mo-bile apps, which enables network access, policy enforcement and data-protection for 3rd-party or in-house apps. The BEAM Secure Enterprise Work-space also includes a full native PIM client (email, contacts, calendar, tasks), a secure browser, a mo-bile fi le manager and the ability to add any 3rd party app (native, HTML5 or hybrid) which is from an ISV or custom developed. Bitzer Mobile.

Go to sp.hotims.com and enter 383 for product information.

AtHoc Inc.AtHoc Notifi er Mobile Application

The AtHoc Notifi er mobile application provides a critical foundation of the AtHoc IWS Solution Suite

Stick with an American brand you can trust for safety, security and peace of mind. Garrett Metal Detectors is the worldwide leader in hand-held, walk-through and ground search metal detectors.

www.garrett.com Tel: 1.972.494.6151

THE TRUSTED LEADER FOR 50 YEARS

Proudly Made In The USA

®

LLaw Enforcemment Military Sppecial Events Evidence Recovery Loss Prevvention Mass Traansit Government Facilities

Go to sp.hotims.com and enter 27 for product information.

See us at ASIS Booth 4012.

0913sec_032_061_npoy_v5.indd 48 8/21/13 12:40 PM

Page 49: ASIS BOOTH 963

thinkAmerican Dynamics

Sure, there are a lot of companies out there with IP video solutions. Some offer cameras at rock bottom prices. Others have systems that look good and promise the world.

www.americandynamics.net© 2013 Tyco Security Products. All Rights Reserved. F r o m Ty c o S e c u r i t y P r o d u c t s

When you thinkIP video

So, why should you think of American Dynamics for IP solutions?

Now, that’s something to think about. American Dynamics for IP solutions.

Untitled-4 1 3/13/13 12:06 PM

See us at ASIS, Booth #305Go to http://sp.hotims.com and enter 51 for product information.

Page 50: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

5 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

and its applications, harnessing mobile technology for rapid mass interaction, duress reports, fi eld re-porting capabilities and two-way communication via smartphones and tablets. The app allows for the freedom of mobility for all personnel to report geo-tagged emergencies, and share and receive rich, data event details (photos, videos, maps, au-

dio and text) from any location. Emergency Man-agers can activate emergency alerts and share actionable information with multiple teams for a coordinated response and timely crisis control and resolution. The system provides substantial advan-tages to mobile operators, security personnel, fi rst responders and alert recipients. A Common Oper-

ating Picture (COP) allows for one-click emergency alerts, personnel tracking, situational awareness and cooperation with critical emergency personnel that extends the reach and quality of information during an emergency. AtHoc Inc.

Go to sp.hotims.com and enter 384 for product information.

Network Video Technologies (NVT)

TBus Series

TBus, short for “transmission bus” is the backbone communications architecture for NVT’s range of TBus IP transmission devices that support analog to IP device migration. TBus has fi ve key features/benefi ts: the ability to use all forms of cable, legacy coax, UTP, 18/2, shielded cable, etc.; supports any wiring topology: star, daisy chain, ring or point-to-point; transmits IP video/data and camera power PoE at distances far beyond the 328 ft. IEEE stan-dard; multiple IP cameras/devices can be attached to one legacy coax backbone cable; and supports advanced 128-bit encrypted network speeds up to 200Mbps. Network Video Technologies.

Go to sp.hotims.com and enter 385 for product information.

March NetworksGURU

March Networks GURU is a free smartphone appli-cation that helps partners save time and money in the fi eld. The application frees partners from typical, time-consuming tasks by automating product war-ranty and RMA shipment status lookups, and by providing an interactive LED utility for immediate NVR diagnostics. When used in conjunction with QR codes, included on the company’s new 8000 Series Hybrid NVRs, GURU’s one-touch express RMA com-pletely eliminates the hassle of repair processing requests. March Networks.

Go to sp.hotims.com and enter 386 for product information.

Honeywell MAXPRO Mobile Application

Honeywell’s MAXPRO Mobile is an easy-to-use mobile application that connects users to the en-

Please visit www.arecontvision.com for more information. Copyright 2013 Arecont Vision.

Made in the USA

Celebrating 10 Years of Leading the Way in Megapixel Videowww.arecontvision.com

+1.818.937.0700 | 877.CAMERA.8 | [email protected]

IntegratedMicrophone

Dual EncoderH.264/MJPEG

Wide Dynamic Range Availableon Some 1080p and 3MP Models

True Day/Night with IR Cut Filter

Ultra Low ProfileDesign

Pixel Binning Modeon 3 and 5MP Models

All-in-OnePoE and Integrated Lens

Casino Mode™

Maintains at Least 30fps

World’s Smallest All-in-One H.264 Day/Night1.3–5 Megapixel and WDR Dome IP Cameras.

Arecont Vision introduces MicroDome™ megapixel IP cameras.

These small, ultra low profile cameras offer the great features of

Arecont Vision megapixel technology like superior image quality,

excellent compression and fast frame rates. An innovative spring arm

design makes installation a snap: simply slide the camera through

the hole and secure the magnetized cover ring with a single screw.

Every model comes equipped with a mechanical day/night switcher,

and pixel binning on 3- and 5-megapixel models deliver excellent

low-light capabilities. Add optional true Wide Dynamic Range and

difficult lighting conditions are overcome with MicroDome™.

Sometimes smaller is indeed better!

MicroDome TM

THE ALL NEW

AMERA

IntegratedMicrophone

Dual EncoderH.264/MJPEG

ynamic Range Availableome 1080p and 3MP Models

e Day/Night ith IR Cut Filter

Pixel Binning Modeon 3 and 5MP Models

All-in-OnePoE and Integrated Lens

Casino Mode™

Maintains at Least 30fps

d’s Smallest All-in-One H.264 Day/Nightegapixel and WDR Dome IP Cameras.

troduces MicroDome™ megapixel IP cameras.

ow profile cameras offer the great features of

xel technology like superior image quality,

d fast frame rates. An innovative spring arm

snap: simply slide the camera through

etized cover ring with a single screw.

h a mechanical day/night switcher,

pixel models deliver excellent

Wide Wide Dynamic Range and Dynamic Range and

th MicroDome™.

TM

Go to sp.hotims.com and enter 10 for product information. See us at ASIS Booth 1945.

0913sec_032_061_npoy_v5.indd 50 8/21/13 12:40 PM

Page 51: ASIS BOOTH 963

Bridge their on-the-go life and home for new smart servicesEveryone wants to be in control and in two places at once.Never home, there’s work, the kids, the pets, dad’s and then some, all pulling in different directions. That’s why there’s iBridge. The easy remote services you provide your eager accounts, to bridge where they are and where they’d really like to see or be, 24/7, while

providing real home security & more… video, home automation &/or energy management.

It’s easier. It’s more affordable. It’s less equipment. All it takes is the Free iBridge App used on any smart phone or tablet, and one bus-mount iBridge Module (it’s internet- and z-wave ready). It retrofits any Gemini System; and our award-winning WiFi Touchscreen’s purely optional. That makes you more competitive. Choose any central station, you’re in control. Using standard Z-Wave™ Devices, we typically get twice the range, so it’s more reliable & easier to install. Without rolling a truck, you can service, edit and configure iBridge from your own smart device. Then, all backs up to the Cloud; names,

custom scenes, scheds., triggers, etc.

Do any or all iBridge Home Services: Customize your offering. First, put your name right on it (free). Then, choose: Remote Security System Control with triggered notifications; HD Streaming Video (live & stored); Energy Management &/or Z-Wave Automation, i.e., lighting, appliances, thermostats, even locks. These game-changing services

will make your security accounts easier to close, retain and far more lucrative.

iBridge ... Simply more profitable for you. Let us show you how to get started. Take a free class near you or online, register at www.napcosecurity.com/seminars. Ask your distributor or Napco sales rep 1-800-645-9445.

Interactive Services for the Connected Home

See us at ASIS, Booth #1904

Go to http://sp.hotims.com and enter 66 for product information.

Untitled-5 1 8/9/13 12:10 PM

Page 52: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

5 2 0 9 1 3 | S E C U R I T Y P R O D U C T S

tire family of MAXPRO IP-based video surveillance solutions while on the go. The application is de-signed for iOS and Android devices and can be used anywhere Internet access is available. The application allows customers to view live video, access full screen monitoring, playback and search videos by date and time, take a snapshot of

a video frame, and drag and drop cameras for cus-tom viewing. Built on a single platform, integrators and end users are only required to learn one man-agement system to know how to operate the prod-uct portfolio. Honeywell.

Go to sp.hotims.com and enter 387 for product information.

Oncam GrandeyeOnVu360

Oncam Grandeye’s OnVu360 is a mobile applica-tion, available on iTunes, that for the fi rst time ever enables users to fully experience surveillance through 360-degrees, in full HD from the palm of

your hand. The app features zero latency as the user navigates by utilizing the pinch-to-zoom fea-tures of any iOS device and it can stream up to a full 5-megapixels. Streaming over Wi-Fi, 3G and 4G connectivity, users can also take a “snapshot” to save precious data if used over a cellular-data network. Oncam Grandeye.

Go to sp.hotims.com and enter 388 for product information.

Video InsightVIMobile for Android

The VIMobile for Android is a video management software application that allows authorized “on the go” smartphone and tablet users access to live and recorded video from any camera on any serv-er. The application imports all settings from a sin-gle address, providing users access to individual cameras on groups of cameras in pre-designed layouts. Users can view recorded images by spe-cifi c times and view thumbnail images on facility maps. User access is controlled by the Video In-sight Server with robust integration with Active Directory/LDAP users and groups. Video Insight.

Go to sp.hotims.com and enter 389 for product information.

Telguard HomeControl

Combining Telguard’s life safety communications

With over 120,000 systems installed, there’s a reason why March Networks is the leading provider of hardware NVRs in the Americas. Call us, and we’ll be happy to tell you more – and make you feel better.

SEE MORE at marchnetworks.com/Lasting - Relief

FOR LASTING RELIEF, CALL US.

What a pain to discover your current DVR will be going end of life and is no longer for sale. While we can’t help you with that headache, we can help you with future ones. March Networks makes its NVRs backward-compatible so our customers can leverage their prior investments and transition seamlessly to our latest platform. So if your current provider is asking you to upgrade again, doesn’t it make good business sense to switch to March Networks instead?

Go to sp.hotims.com and enter 37 for product information. See us at ASIS Booth 2052.

0913sec_032_061_npoy_v5.indd 52 8/21/13 12:40 PM

Page 53: ASIS BOOTH 963

Speco Technologies New NVR - True Plug & Work with Built-in PoE So Smar t - It’s Simple!

GO BEYOND CAPTURE, RECORD & REVIEW Stop crime before it happens

Contact us at: [email protected] Toll Free: 1-800-645-5516 specotech.com

AUTOFIND

EZ CAMERA

EZ Setup: EZ Network: EZ Search: EZ Record:

EZ Copy:

Front of

N4NSP, N8NSP, N16NSP 4, 8 or 16 Channel NVR with Built-In PoE & Digital Deterrent®

See us at ASIS, Booth #4701 • Go to http://sp.hotims.com and enter 44 for product information

Untitled-1 1 8/15/13 11:08 AM

Page 54: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

5 4 0 9 1 3 | S E C U R I T Y P R O D U C T S

with the iControl Networks OpenHome software platform, the Telguard HomeControl allows deal-ers to offer cellular connectivity, interactive ser-vices and lifestyle management through one Go!Control-inspired user interface. Users can re-motely arm and disarm their security systems, turn on and off lights, access locks, adjust ther-

mostats and view event-triggered clips or stream-ing video on a smart phone or computer. The ap-plication is offered in three service levels: connect, interact and control. Telguard.

Go to sp.hotims.com and enter 390 for product information.

Quantum SecureSAFE for Mobile Solutions

SAFE for Mobile offers intuitive, easy-to-use mo-bile apps that improve productivity and increase end-user satisfaction. The apps include area ac-cess approval where users can review, approve

and/or deny access requests from the device of their choice. Another app allows for seamless visi-tor self-service check-in/ check-out or front-desk administered check-in/check-out using just a smartphone or tablet. An app for managing infrac-tions and associated citations promises to signifi -cantly improve a fi eld offi cer’s productivity. All of these apps leverage the reliable and secure SAFE engine in the background which ensures a con-stant state of process and compliance assurance for the security personnel. Quantum Secure.

Go to sp.hotims.com and enter 391 for product information.

Network-Centric Security

BAE Systems DeticaDetica CyberReveal

Detica CyberReveal is the multi-threat monitoring, analytics, investigation and response product. It enables security analysts to identify and manage cyber threats quickly and effi ciently by providing big data correlation, security analytics, contextual information linking and threat intelligence all in one product. CyberReveal is a big data security analytics and investigation platform, bringing BAE Systems Detica’s heritage in network intelligence, big data analytics and cyber threat research into a single enterprise-scalable product. The solution provides analysts with a single view of network activity across the whole IT estate, detecting at-tackers by their behavior. BAE Systems Detica.

Go to sp.hotims.com and enter 392 for product information.

Dell SonicWALLNetwork Security Appliance (NSA) Series Next Generation Firewalls

The NSA Series uses scalable multi-core hardware architecture and patented single-pass low latency Reassembly-Free Deep Packet Inspection (RFDPI)

Datacard and Secure Issuance Anywhere are registered trademarks, trademarks and/or service marks of DataCard Corporation in the United States and/or other countries. ©2012 DataCard Corporation. All rights reserved.

RELIABILITY DELIVERED

Datacard and Secure Issuance Anywhere are registered trademarks, trademarks and/or service marks of DataCard Corporation in the United States and/or other countries. ©2013 DataCard Corporation. All rights reserved.

Our printers, supplies and software are engineered and tested to work together

so you can dependably deliver IDs on time and on budget. Our commitment to

Secure Issuance Anywhere™ means that you can count on Datacard Group to deliver

superior reliability and proven technology — anytime and anywhere you need it.

Demand the performance you need. Demand Datacard® Secure ID solutions.

Get started by contacting the authorized Datacard partner near you

at 1-800-995-0503 or visit www.datacard.com/sp

DEPEND ON CONSISTENT CARD PRINTING WITH DATACARD SECURE ID SOLUTIONS

Go to sp.hotims.com and enter 62 for product information. See us at ASIS Booth 362.

0913sec_032_061_npoy_v5.indd 54 8/21/13 12:40 PM

Page 55: ASIS BOOTH 963

See us at ASIS, Booth #983

Go to http://sp.hotims.com and enter 6 for product information.

Untitled-22 1 7/23/13 5:52 PM

Page 56: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

5 6 0 9 1 3 | S E C U R I T Y P R O D U C T S

engine. Ranging from six to 24 cores, the devices pack enough security processing power to inspect all network traffi c to detect and block threats be-fore they enter the network yet without introducing bottlenecks. Advanced features such as 10GbE SFP+ interfaces, full stateful high availability failover and high performance SSL decryption pro-

vide medium-sized organizations with functional-ity usually reserved for enterprise grade network security appliances. Dell SonicWALL.

Go to sp.hotims.com and enter 393 for product information.

AvaLAN WirelessAW58303HTS

The AW58303HTS has a dual element fl at panel antenna providing 90-degree polarized 23 dBi gain directional units. The radios are packaged in rug-ged and weatherproof diecast aluminum enclo-

sures and are available with a directional panel antenna. Utilizing state of the art MIMO technology, the product achieves high data rate through a combination of multiple spacial streams and a higher level OFDM modulation. AvaLAN Wireless.

Go to sp.hotims.com and enter 394 for product information.

Precise BiometricsTactivo

The Tactivo Product Suite of Smart Card and Fin-gerprint Reader Solutions is an innovative smart casing product for tablets and smartphones that includes an embedded fi ngerprint and smart card reader. Together with a growing number of apps, Tactivo enables smart cards and fi ngerprint bio-metrics to be used on iPhone or iPad devices for secure browsing and messaging. Tactivo enables companies and government agencies to maintain a high-level of authentication and security when employees use mobile devices, protecting the net-work, enterprise systems and apps that may store sensitive data on the device. Precise Biometrics.

Go to sp.hotims.com and enter 395 for product information.

Sentry360InSight IS-IP14K

The IS-IP14K from Sentry360 is a professional-grade, multi-megapixel network security and sur-

• High-performance and cost-effective solution to transmit IP video, data and power over coax cable up to 1500 ft.

• Supports PoE and PoE+ cameras and access control devices

• Eliminates labor and costs of deploying new cable

• Auto detection and protection of legacy non-PoE cameras/devices

• Receivers available with 1, 4, 16 ports

with eBridgePlus... only from Altronix

eBridgePlus Ethernet over Coax/PoE Adapters

IP and PoEover Coax

[email protected]

More than just power.™

MADE IN THE U.S.A. • LIFETIME WARRANTY

Go to sp.hotims.com and enter 58 for product information. See us at ASIS Booth 1711.

0913sec_032_061_npoy_v5.indd 56 8/21/13 12:40 PM

Page 57: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 5 7

veillance camera offers low cost and low power consumption. The design of the camera is simple but high-performing for mass markets. The prod-uct has an active resolution more than 32x that of traditional CCTV cameras and is capable of captur-ing high forensic detail. The IS-IP14K features a design with no moving parts, a 1/2.3” CMOS sen-sor, Power over Ethernet (PoE) and a true IR cut fi lter (on DN model). Sentry360.

Go to sp.hotims.com and enter 396 for product information.

Outdoor Lighting-Based Security Platforms

TOTUS Solutions TOTUS Surveillance Platform

The TOTUS Surveillance Platform was designed to incorporate optimized LED lighting, complex mega-pixel IP video surveillance, multi-day media storage and secure wireless communication options under one fully integrated, cost-effective solution. The platform allows the expansion of security to unpro-tected areas where coverage was not possible or was too expensive to deploy. The product is ideal for use in parking lots, campuses, walkways, public transit systems and more in order to protect critical infrastructure. TOTUS Solutions.

Go to sp.hotims.com and enter 397 for product information.

Perimeter Security

Automatic SystemsParkPlus

The ParkPlus by Automatic Systems is an intelli-gent parking barrier that offers a simple, reliable and innovative solution that is able to connect on an Ethernet network, enabling real-time monitor-ing, barrier confi guration and maintenance, both locally and remotely via a Web browser. The barrier is unique because it offers interchangeable hous-ing, which allows for endless customization of the gate. Automatic Systems.

Go to sp.hotims.com and enter 398 for product information.

XtralisADPRO FastTrace 2X

The ADPRO FastTrace 2X is a hybrid, multi-service security platform that is capable of rapid and easy deployment of new services on all 16 channels of IP or analog cameras with each channel having the same features and ease of use. With this capability,

central monitoring and installers can quickly apply new security services such as Intrusion Trace re-motely, without ever needing to travel to the cus-tomer site. Xtralis.

Go to sp.hotims.com and enter 399 for product information.

Kaba Access & Data Systems Americas • 1.800.849.8324 • www.kaba-adsamericas.com

Copyright © 2013 Kaba ADS Americas. All rights reserved.

Kaba Access & Data Systems Americas • 1.800.849.8324 • www.kaba-adsamericas.com

Copyright © 2013 Kaba ADS Americas. All rights reserved.

X-10

A diplomatic blend meant to safeguard

all classified materials. Robust and GSA

approved, government personnel will rely on

this high security lock to secure Class 5

and Class 6 containers.

PowerPlex

Made from green power for access control

without the wires or batteries. Rich in

features, security managers will value how

this virtually maintenance-free lock pairs

well on a single access door.

Embedded Access

A smooth fusion of IP management and access

control for doors and cabinets. With this bold

combination, systems integrators will appreciate

how easy this system installs in single- or

multi-site locations with no software or servers.

ee

AT ASIS 2013

Booth #563

Go to sp.hotims.com and enter 65 for product information. See us at ASIS Booth 563.

0913sec_032_061_npoy_v5.indd 57 8/21/13 12:40 PM

Page 58: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

5 8 0 9 1 3 | S E C U R I T Y P R O D U C T S

Belden Inc.Garrettcom Magnum

10RX Confi gurable RouterThe Magnum 10RX is a confi gurable router and security appliance offering traditional T1/E1 WAN routing, MPLS and advanced serial or terminal server functionality. The Magnum 10RX complies

with IEC 61850 and is ideal for large substation installations or similar applications where hard-ness, performance, security, quality of service or diverse protocols are required. The hardware and software versatility of the Magnum 10RX provides fl exibility in interworking legacy serial and WAN protocols with next generation high performance

Gigabit Ethernet and TCP/IP technology. The Mag-num 10RX supports up to 10 Gigabit Ethernet ports and 16 T1/E1 connections and hot-swappable dual power supplies. Each router includes thermal design techniques that result in cooler operation of internal electronic components, leading to longer lifetime and increased availability. Belden Inc.

Go to sp.hotims.com and enter 400 for product information.

XtralisADPRO IntrusionTrace

IntrusionTrace is a downloadable intrusion detec-tion analytic for the FastTrace 2/2X that enables primary detection for operational use in sterile zone applications and virtually eliminates false alarms, allowing operators to monitor more sites with greater accuracy. IntrusionTrace can be re-motely confi gured and running in minutes without the need for a technician. Subscription licenses are available and can be easily and remotely moved to any FastTrace 2/2X platform in a security domain. Xtralis.

Go to sp.hotims.com and enter 401 for product information.

Berkeley Varitronics Systems Inc.

Manta Ray Cell Phone Detector

Manta Ray is a close-range cell phone detector that identifi es specifi c but common components found in all cell phones. This allows Manta Ray to detect phones that are ACTIVE or INACTIVE, ON or OFF and even hidden behind walls and dense ma-terials such as sheetrock, concrete and aluminum. The detector provides a faster and less intrusive way of searching for cell phones and not false trig-gers such as keys, pocket change or belt buckles. Manta Ray addresses a growing security and safety problem in both public and private sectors. Berkeley Varitronics Systems Inc.

Go to sp.hotims.com and enter 402 for product information.

SALTO SYSTEMSElectronic Locking System

insp i redaccess

FOR MORE INFORMATION PLEASE CONTACT USSALTO Systems Inc.3073 McCall Drive - Suite 1 · Atlanta, GA 30340Phone: 770-452-6091

THE KEYLESS SOLUTION TO MECHANICAL KEY CONTROLThe SALTO Virtual Network - System Description

Visit us at booth #363

Go to sp.hotims.com and enter 68 for product information. See us at ASIS Booth 363.

0913sec_032_061_npoy_v5.indd 58 8/21/13 12:40 PM

Page 59: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 5 9

RFID

Transponder and Readers Engineered Systems Inc.

tres 900E

The tres900 reader meets demanding applications for asset and personnel monitoring, vehicle ID and supply chain management. Integrated antenna de-sign provides simple installation and functionality in a single, low profi le design. The reader is environ-mentally sealed allowing for indoor and outdoor in-stallations with a UV resistant housing. The up-gradeable fi rmware allows for protocol expansion and feature upgrades, and the high gain circular polarized antenna for maximized read ranges. DSP is used for multi tag anti-collision capabilities, mak-ing the reader able to accomplish multi-reader syn-chronization for interference reduction. Transponder and Readers Engineered Systems Inc.

Go to sp.hotims.com and enter 403 for product information.

STANLEY Security AeroScout MobileView

Locator for iPad

The MobileView Locator for iPad allows mobile users to search for tagged assets on the go using the iPad. This native iOS application is available on the Apple AppStore, offering MobileView users simple, loca-tion-aware search capabilities. Users can now lever-age, on the iPad the MobileView Locator functions they are already familiar with. STANLEY Security.

Go to sp.hotims.com and enter 404 for product information.

Video Management Systems

WavestoreUSAUSA V5 VMS

Wavestore V5 is a fl exible, scalable VMS that enables users to control every aspect of their video security system while benefi ting from the use of 360-degree cameras. Its hybrid servers also support analogue, IP, Megapixel, HD, ther-mal and HDcctv cameras concurrently, which allows even large-scale enterprises to benefi t

from a customized solution. V5 facilitates the re-cording of original fi sheye images captured by a 360-degree camera and simultaneously displays the de-warped 360-degree images and live or archive images from other network and ana-logue cameras, all in one multi-image display. The original images captured by the 360-degree

camera images are stored unaltered in the event that specifi c video data must be presented in a court of law. WavestoreUSA.

Go to sp.hotims.com and enter 405 for product information.

Major Features.

VIVOTEK INC.2050 Ringwood Ave. San Jose, CA 95131 |Tel: 408-773-8686| Fax: 408-773-8298| E-mail: [email protected]

IP8173H

180° of Surround EvidenceComprehensive Surveillance for Retail and More

FD8371EVIP8371E FE8173

Your IP Surveillance Expert Your IP Surveillance Expert

180° of Surround EvideddencencncencecececenceccceeceeeComprehensive Surveillance for Retail aail and il andand MoreMorrereeMoreMMo

Go to sp.hotims.com and enter 55 for product information. See us at ASIS Booth 463.

0913sec_032_061_npoy_v5.indd 59 8/21/13 12:40 PM

Page 60: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

6 0

Verint Inc.Verint Nextiva PSIM 6.3 SP1

Verint’s Nextiva PSIM 6.3 SP1 provides video-cen-tric, real-time situation intelligence and improved response to help users cope with real-world chal-lenges, crime and natural disasters. The open-platform product features video multi-casting so users can view live and recorded security video from multiple PTZ cameras on a computer work-station and “tear off” video into separate windows when needed. Features for the system include an intuitive 3D multi-layer user interface, the ability to call up camera views to a video wall, receive LPR and face recognition alerts and aggregate multiple alarms. Verint Inc.

Go to sp.hotims.com and enter 406 for product information.

Video InsightVideo Insight v5.5

v5.5 is Video Insight’s easy to use video surveil-lance software that maximized performance and scalability with a new pure 64-bit version of serv-ers and clients, which are optimized for centraliza-tion and hosting. The software offers several fea-tures such as high-performance cameras drivers to support over 1,800 camera models, integrated panic button with facility map status indicators, enhanced mobile applications for iPad, iPhone and Android devices, an easy to use web interface and more. Video Insight.

Go to sp.hotims.com and enter 407 for product information.

Salient Systems Corp.PowerProtect Platform

The PowerProtect Platform extends the limits of op-

erational capabilities for video surveillance systems. The entry level Power Choice hybrid NVR supports up to 32 direct connect analog cameras and 6TB video storage, offering the perfect balance between value and performance. The PowerPro and Pro-R hybrid NVRs are rack-mountable with enhanced memory and processing power built for continuous

duty operations. The enterprise level servers are NVS (network video server) units PowerPlus and PowerUltra which support high density, high camera count confi gurations that require 15TB to 30TB of storage. Salient Systems Corp.

Go to sp.hotims.com and enter 408 for product information.

DVTEL Inc.Latitude 6.3

Latitude NVMS is an open standards, network-based video management software platform that allows streamlined provisioning of client software with automatic updates. The system includes en-

Go to sp.hotims.com and enter 28 for product information. See us at ASIS Booth 724.

0913sec_032_061_npoy_v5.indd 60 8/21/13 12:40 PM

Page 61: ASIS BOOTH 963

6 1

hanced GIS map integration using Google Earth and fault tolerant recording using storage on the edge. Enhanced capabilities are available for DVTEL’s TruWitness, a transportable surveillance solution that enables users to use their smart-phones as an IP video surveillance camera. With the new version of TruWitness, users can add

remote camera feeds to the ControlCenter inter-face to track and communicate in real-time with TruWitness-enabled devices. DVTEL Inc.

Go to sp.hotims.com and enter 409 for product information.

Lenel Systems International Inc.

Prism Video Management System

The Prism Video Management System (VMS) com-bines OnGuard and Lenel NVR for command and control of security and facilities that provides a single point-of-device confi guration, mixed live and recorded video viewing, intuitive interface with customizable layout choices and more. The system is an open Internet Protocol (IP) VMS and is offered in three confi gurations: standard, profes-sional and enterprise, and is available as a stand-alone VMS or as an integrator with OnGuard. Prism enables a low total cost of ownership (TCO) with simple incremental upgrades as a users’ system size grows. Lenel Systems International Inc.

Go to sp.hotims.com and enter 410 for product information.

AxxonSoftAxxon Next 3.1

The Axxon Next 3.1 is an open-platform VMS that offers best-in-class technologies and benefi ts. The Interactive 3D Map allows instant determining of the location of a selected camera without switching between interface windows. With Time Compressor, users can skim events in video footage without fast-forwarding. The MomentQuest2 search feature is quick to fi nd video based on a wide range of user criteria such as object size, color, speed, direction and other parameters. Axxon Next uses micromod-ule architecture, which allows the system to smoothly recover and remain fully operational even if an individual function fails. AxxonSoft.

Go to sp.hotims.com and enter 411 for product information.

Go to sp.hotims.com and enter 28 for product information. See us at ASIS Booth 724.

0913sec_032_061_npoy_v5.indd 61 8/21/13 12:40 PM

Page 62: ASIS BOOTH 963

See us at ASIS, Booth #718 • Go to http://sp.hotims.com and enter 33 for product information.

Untitled-4 2 2/13/13 11:27 AM

Page 63: ASIS BOOTH 963

Untitled-4 3 2/13/13 11:27 AM

Page 64: ASIS BOOTH 963

PRODUCT SOLUTIONSNEW PRODUCT OF THE YEAR ENTRIES

6 4 0 9 1 3 | S E C U R I T Y P R O D U C T S

Milestone SystemsMilestone XProtect Expert

The Milestone XProtect Expert is specially designed for medium and large installations in the mid to high-end market. The central man-agement interface allows large systems with multiple recording servers to be effi ciently managed as one uniform system. With fea-tures for live monitoring, centralized management and high-perfor-mance video recording, XProtect provides scheduled and event-driven rules to make it is easy to automate security actions and control external systems, reducing the number of manual tasks. Confi guration reports enable system integrators to document the system and provide a detailed listing of all confi guration settings. Milestone Systems.

Go to sp.hotims.com and enter 412 for product information.

OnSSIOcularis Media Server

The Ocularis Media Server was built to overcome today’s bandwidth limitations while on the move or remote from a users’ security sys-tem. By utilizing OnSSI’s High Defi nition Interactive Streaming (HDIS) technology, the server can stream up to 16 HD/ megapixel cameras,

each running up to 30 frames per second over 3G and 4G networks. The solution enables users to remotely view live and recorded video on mobile devices or Web browsers without any reduction in image quality or frame-rate. OnSSI.

Go to sp.hotims.com and enter 413 for product information.

Wireless Technologies

I-View NowI-View Now Version 2.0

I-View Now version 2.0 is a complete redesign to include ad-hoc re-

porting features, the ability for a central station or a dealer to in-stantly access their video and signaling data, and improved user in-terface. Additional features include walk test functionality and an interface to activate accounts. The walk test function ensures that a system has been correctly confi gured with each alarm zone and camera view while the new activation screen allows accounts to be added with only 4 simple pieces of information: site name, CSID, zip code and e-mail address. I-View Now.

Go to sp.hotims.com and enter 414 for product information.

InovonicsEN6080 Area Control Gateway

Inovonics’ EN6080 Area Control Gateway (ACG) provides an intru-sion detection network that easily integrates up to 3,000 wireless devices with access control, video, PSIM and area control systems. With the EN6080 ACG and Inovonics EchoStream wireless mesh network, end users can see a more accurate picture of their secu-rity environment by integrating disparate systems. The fl exibility, scalability and simple installation of the EchoStream wireless net-work enables cost effective monitoring of virtually anything an end user may need. Inovonics.

Go to sp.hotims.com and enter 415 for product information.

ComNetNetWave NWK1/NWK2

The NetWave NWK1 and NWK2 is a pre-confi gured point-to-point industrially hardened wireless Ethernet transmission kit. This point-to-point model allows a single Ethernet data stream to be transmit-ted between a client remote location and the access point or head end. A simple, easy-to-read LED array displays unit operational sta-tus along with received signal strength, ensuring optimal installation and operation. The NWK1 and NWK2 support up to 95Mbps through-put due to MIMO technology. The units are passive powered by PoE through a supplied PoE injection module. ComNet.

Go to sp.hotims.com and enter 416 for product information.

9AM-5PM AccessMain Entrance

Control the

“who”...

Control the

“when”...

Control the

“where”...

A Solution for Every Access PointControl the credentials of individual users across 16 pedestrian and vehicular access points, all from one computer

9AM-----------55PM 5PM5PM5PMMMMMM5PM5PM5PM5PM5PMM5PM 55PM5PM 5PMMMMMMM5PMPM5PMM55555555PM5 MMMMM55 MMMM5 MM55 MM AcceAcceAcceAcceAAcceAcAcceAAcceAcceAcceAccecceAccAAcceAcceAcceAcceAcAcceAcceAcceAcceAccAcAAcAAAcceAcceccAcceAAcceccccceccccccecccecceeeeesssssssssssssssssssssssssssssssssssssssssssssssssssssMainnnnn EntEntEntEntEntEnEnttEntEntEntEntntttttttEntttEntEnttEntEnt EnttEnt EntttttEnttrarrararancrrararararraraarraaaararrrr e

A

800-673-3299 [email protected] -676 3-33299 info@doorkinki g com

doorking.com/one

10AM-12PM AccessMain Entrance

9AM-5PM AccessMain Entrance

7AM-8PM AccessMain Gate

7AM-8PM AccessService Gate

24/7 Access All Gates

24/7 Access All Gates

24/7 Access All Gates

Go to sp.hotims.com and enter 18 for product information. See us at ASIS Booth 577.

0913sec_032_061_npoy_v5.indd 64 8/21/13 12:40 PM

Page 65: ASIS BOOTH 963

690TVL I-Sniper PIXIM DPS WideLux Vari-focal Bullet Camera

USA Head Office: IC Realtime, LLC, 3050 N Andrews Ave EXT,Pompano Beach, FL 33064, USAPhone: (954) 772-5327 Toll: (866) 997 9009 Fax: (866) 860-3860 Email: [email protected]

USA West Coast Office: IC Realtime West Coast, 14180 W Van Buren Street, Suite B-105, Goodyear, AZ 85338, USAPhone: (602) 910 3432 Fax: (602) 626 3545 Email: [email protected] For more information visit www.icrealtime.com

FEATURES

• I-Sniper technology produces the most accurate, clear and detailed image

• 690TVL / 960H Effective Pixel• 2.8-12mm Vari-Focal Lens• WDR (Wide Dynamic Range)• 2D/3D Digital Noise Reduction• Intelligent IR Image Compensation• RS-485 Interface (Pelco D)• IP67 Weatherproof• 12VDC Power Input

Available in Black or White:EL-1000B - BlackEL-1000W - White

I-Sniper, the most accurate chip inthe world, is an imaging solution cre-ated exclusively by Pixim for IC Realtime. I-Sniper cameras deliver clear, detailed images in real-world scenes, night and day, even under challenging, mixed lighting conditions.

I-Sniper cameras have been custom tuned with camera settings specifically for IC Realtime’s line of DVRs, resulting in 25-45% longer recording times vs. non-optimized 3rd party cameras.

NOW

Untitled-10 1 8/19/13 1:59 PM

Page 66: ASIS BOOTH 963

AT A GLOBAL LEVEL The benefi ts of centralizing and standardizing security systems fall to the bottom lineBy Renae Leary

COST EFFICIENCIES

6 6 0 9 1 3 | S E C U R I T Y P R O D U C T S

Whether it’s the bank that started with one location or a technology company that started in the founder’s pro-verbial garage, every global company began small. It is through scalability that companies are able to become global by replicating local growth in order to achieve suc-

cess in many locations or across a broader geographic area. Even as businesses scale a successful formula, they have to be mindful of the localized differences from one market to the next. For example, a restaurant chain must adapt to local palates while an automobile manufacturer must create vehicles that fi t differing preferences or regulations.

This same concept applies to securing global companies. While adapting to geographical and demographic differences, security must attain a worldwide stan-dard of safety and risk management consistent with the effective operation of the

enterprise. Security technology can address both needs by adapting to and sup-porting localized requirements, while maintaining this standard.

Most global companies are looking to achieve fast growth in the coming de-cades, and the best opportunities for that growth come in new markets, where security can be an even bigger concern than in developed areas. You have to go where the growth is because effective security to protect the business wherever it goes and the facilities wherever they are built will continue to be paramount for global enterprises. Effective security will make it possible for companies to enter new locations safely, enabling continued growth into developing markets.

Many global companies seek to centralize the management of their key func-tions while ensuring adherence to a corporate-wide standard, and security is no different since centralized management can be the most effi cient and cost-effective approach to security.

0913sec_066_069_Leary_v3.indd 66 8/20/13 10:24 AM

Page 67: ASIS BOOTH 963

Let’s look at ways corporate secu-rity systems can be centralized and standardized on a global scale while meeting localized needs, and how the resulting cost effi ciencies go to the bot-tom line.

TECHNOLOGY MAKES THE WORLD SMALLERCommunications and networking tech-nologies help make the world a smaller place by simplifying the transfer of in-formation around the globe. This helps facilitate the operation of a worldwide marketplace by easily crossing national boundaries and reaching every corner of the world.

In the case of global companies, the easy fl ow of information enables more effi cient operation, and greater stan-dardization and compliance.

With security, integrated technology systems can bring together disparate security processes and systems across cities, countries and continents. Glob-al customers benefi t from centralized monitoring, system management, and streamlined installations and services, leading to increased effi ciency. Just as the effi ciencies of operation contribute to the success of a global enterprise, so do the effi ciencies of worldwide, imple-mented, security technology to promote better protection of that enterprise.

Instead of dealing with variable in-formation from disparate systems all over the world, security end users can now manage their systems centrally from one location, anywhere in the world with network access. Global inte-gration puts information at their fi nger-tips as the benefi ts are refl ected in the improved effi ciency and effectiveness of technology systems.

OPERATIONAL EFFICIENCIES SAVES MONEYThe need to reduce costs is a given, so multinational clients are optimizing operational budgets in every possible area. Security has to do its part, and the cost-effective application of video surveillance, video monitoring, access control and security services refl ect the broader cost-consciousness of the enterprise. Perhaps most importantly, lower costs must not be achieved by compromising equipment quality or system performance. The new standard is to combine cost-effectiveness with superior performance. Global end us-ers today demand nothing less.

Economies of scale provide an im-portant contribution to cost effective-ness. Large, unifi ed systems are less expensive to operate than multiple, non-standardized systems. Security systems can now operate on global platforms that control multiple data-

bases and systems from a single point, giving greater effi ciency, simplicity and ease of use. This approach allows for a reduction in software licensing fees, a signifi cant cost savings for a large en-terprise organization.

In addition, centralized security

systems also need fewer operators. Be-cause smart technology provides tools to make operators more effi cient and productive, companies can reduce the number of people they need to man-age security. This is another way to save costs without compromising protection.

TOTUS Solutions is the leading provider of Outdoor Lighting Based Security Platforms. Unlike traditional surveillance systems, TOTUS Security Platforms™ incorporates optimized LED lighting, complete megapixel IP video surveillance, multi-day media storage, and secure wireless communications with event action processing to provide unparalleled Active Deterrence.™

TOTUS Security Platforms™ also provide up to 70% energy savings versus the legacy streetlights through the use of improved LED technology.

WORLD’S FIRST OUTDOOR LED LIGHTING BASED SECURITY PLATFORM

L I G H T I N G S U R V E I L L A N C E C O M M U N I C A T I O N

1 - 8 7 7 - 2 6 1 - 3 4 3 2 W W W . T O T U S - S O L U T I O N S . C O M

Totus Applications:

Parking Lots Campus Pedestrian Walk Way Critical Infrastructure Public Transit

LIGHTING

SURVEILLANCE

COMMUNICATION

Go to sp.hotims.com and enter 50 for product information.

W W W . S E C U R I T Y - T O D A Y. C O M 6 7

0913sec_066_069_Leary_v3.indd 67 8/20/13 10:24 AM

Page 68: ASIS BOOTH 963

6 8 0 9 1 3 | S E C U R I T Y P R O D U C T S

COST EFFICIENCIES

Global security systems make an-other contribution to profi tability by offering greater protection for people, facilities and assets worldwide. This is perhaps the biggest contribution of security technology to the enterprise’s bottom line. Because systems help to manage risk and respond more quickly to potential security threats, the con-vergence of multiple systems saves time and effort. A well-integrated, global se-curity system pays for itself many times over by neutralizing risk and respond-ing to events to minimize their impact.

Should an event occur, security sys-tems provide important information and evidence about the event to aid in prosecution or provide insight into how to prevent similar events in the future. For example, an event can trigger im-mediate video coverage in real time, and it is simultaneously accessible to management and security professionals throughout the company. This infor-mation is power for global companies in terms of any security system’s return on investment (ROI) as integrated sys-tems provide information to empower more effective management of world-wide security.

Beyond the security department, integration with other enterprise sys-tems is another way security technol-ogy can save costs for the enterprise. For instance, integration of access control with building management can allow lights and air-conditioning to be activated in a specifi c offi ce only when an employee swipes a card during off-hours. Even small effi ciencies can pay off big, when considering the benefi t(s) on a global scale.

TECHNOLOGY BOOSTS OPERATION AND SUCCESSMultiple factors of operation can im-pact the security requirements of any company; but, this is especially true of large companies, which face operation-al factors that impact security needs in a variety of ways around the world. Therefore, another factor impacting security is the need to comply with a range of regulatory environments.

In the United States, for example, chemical-related companies are re-quired to adhere to federal CFATS standards, which include the need to meet 18 published, risk-based, perfor-mance standards. If a company doesn’t comply, they face having to pay penal-ties to the government. CFATS stands

for Chemical Facility Anti-Terrorism Standards, and it’s just a sampling of the alphabet soup of regulations that impact companies in the United States alone. Other examples are HIPAA (for the medical community), NERC/FERC (for utility companies) and Sarbanes-Oxley (SOX, governing accountability of public companies).

In addition, the European Union has its own long list of regulatory re-quirements, and any company with global locations faces a seemingly endless stream of varied and assorted requirements to meet, such as the in-ternational ISO 27000 (related to infor-mation security).

Even regulations that are not specifi c to security can impact how security op-erates, and technology systems must be able to conform to their requirements.

By converging security and other technology systems with overall opera-tions, companies can simplify regula-tory compliance worldwide. Solutions can help manage compliance, a huge cost that is central to global success. The data from security technologies, which is increasingly easy to integrate with other platforms, can add value throughout the enterprise. More infor-mation and transparency into company operations enables more effi cient oper-ation related to compliance. Thus, any problems can be identifi ed earlier and more easily, helping to minimize the ex-pense of dealing with them.

FROM MULTINATIONAL TO TRULY GLOBALA lot has been written about what it takes to be a true “global” company. Management gurus sometimes draw a distinction between a “multinational” and “global” company with the differ-ence between the two being how unifi ed the company is on a global basis.

For example, a multinational com-pany might have locations or facilities in many countries, but each location might function independently. In con-trast, a global company tends to have a more unifi ed corporate culture and a similar set of processes and functions around the world, effectively making it a single, worldwide entity.

This same paradigm plays out in the security department of global com-panies. Legacy technology differences deployed at various locations tend to complicate the challenge, as does the trend toward mergers and acquisi-

November 20-21, 2013Javits Center NorthNew York, NY, USA

Sponsored by:

• Direct access to technical reps from 200+ brands

• FREE business seminars designed to help you increase revenue and reduce costs

• Drinks & networking on the exhibit fl oor

• Local expertise from association leaders in NY, NJ, CT and PA

REGISTER NOW AT ISCEAST.COM

“One day at ISC East saves me hundreds of hours on the phone.”-2012 ISC East Attendee

Endorsed by:

TO THE WORLD OF SECURITY

YOUR CONNECTION

LOCAL

Go to sp.hotims.com and enter 42 for product information.

0913sec_066_069_Leary_v3.indd 68 8/20/13 10:24 AM

Page 69: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 6 9

tions, with each new asset coming with its own specialized security needs and installed base of technologies. Multi-national companies tend to want to op-erate more like global companies, and unifying, standardizing and centraliz-ing the security function is a big part of the process.

As many multinational companies work toward being more global by strengthening the internal corporate culture elements that tend to unify the many locations into one, they of-ten take a step back to analyze how the company has developed piecemeal over the years and to reimagine how the company should be structured to address the global market.

The same can happen with security systems.

By reimagining and re-engineering its security technologies on a global scale, an enterprise—with the help of a global systems integrator who is able to address the broad enterprise needs of the company and work to combine systems around the world and create a unifi ed face of security for the enter-prise—can add immense value to the bottom line and contribute to cost sav-ings in the process.

MEETING HIGHER DEMANDS OF GLOBAL COMPANIESCombining cost savings and better security are critical to optimizing the operation of global companies and protecting their people, facilities and assets. Technology stands ready to enable even the largest companies to maximize their security benefi ts while minimizing costs.

Thoughtful implementation of tech-nology, in the broader context of over-all company operations, provides a path to realize the benefi ts at less cost; how-ever, technology must address localized security concerns while achieving and maintaining a worldwide standard of protection. It must interface and inter-operate with other information systems to maximize its value and extend its usefulness to a variety of operations-related goals. It must also adhere to corporate spending austerity while con-tributing to corporate wealth and pav-ing the way for future expansion.

Delivering networked access con-trol and video management systems for global corporations is a challenging task. Providers must deliver a vast network of geographic coverage, a robust centralized

project management team well versed in different regional regulations and cul-tures, and a worldwide monitoring and service organization to meet customer needs virtually anywhere in the world. Most important is a global support net-work to provide global proposal, instal-

lation and service coordination to fur-ther help reduce project cycle times while ensuring high-quality implementations. When all these capabilities come to-gether, worldwide businesses can partner with a technology and service provider to realize signifi cant cost effi ciencies and

streamlined security operations across the world.

Renae Leary is the se-nior director for Tyco Global Accounts.

Go to sp.hotims.com and enter 54 for product information.

0913sec_066_069_Leary_v3.indd 69 8/20/13 10:24 AM

Page 70: ASIS BOOTH 963

Compiled by Lindsay Page, Associate Content Editor

7 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

PLATINUM AWARD WINNERS

Access Control

GallagherGallagher PIV Solution

The Gallagher PIV Solution is a physical access control solution that fully complies with the per-sonal identity verifi cation (PIV) requirements of the FIPS-201 Standard. The system delivers a seam-less, cost-effective way to bring a site up to stan-dard. With a single management platform, the product is easy to implement, confi gure and main-tain while providing secure authentication and encryption between all system components. Addi-tional components are not required in order to achieve compliance. Gallagher.

Go to sp.hotims.com and enter 465 for product information.

Cloud Computing/Storage

AccellionAccellion Mobile File

Sharing Solutions

Accellion Mobile File Sharing Solutions provide se-

cure viewing, editing, sharing and syncing of an organization’s content on smartphones and tab-lets, delivering IT controls to manage user privi-leges and access rights to protect data. Deploy-ment options include public, private, on premise or hybrid cloud options. With the Accellion Mobile Productivity Suite, users securely create, edit, view and collaborate on Microsoft Word, Excel and Pow-erPoint fi les without exposing data to third-party applications. Through Accellion kitepoint, the solu-tion provides secure, real-time mobile access to fi les stored in SharePoint and other ECM Systems, without the need for a VPN. Accellion.

Go to sp.hotims.com and enter 466 for product information.

Fire/Life Safety

Silent KnightFarenhyt IFP-FFT Fire Fighters

Telephone System

Silent Knight’s Farenhyt IFP-FFT Fire Fighters Tele-phone System is for high-rise buildings, govern-ment facilities and other large-scale properties that require fi re fi ghter telephone systems. Capa-ble of supporting up to 72 telephone connections with as many as 10 phones in use at one time makes this product one of the largest-capacity fi re fi ghter communications systems. Features for the phone system include a single telephone station mount that comes in a lockable cabinet containing one remote handset which is available in recessed or surface mount, simplifi ed installation by using a single loop design and JumpStart auto-program-ming. Silent Knight.

Go to sp.hotims.com and enter 467 for product information.

Homeland Security

CiscoInteroperable Public Safety

Broadband (LTE) Network

Cisco’s Interoperable Public Safety Broadband (LTE) Network is an open standards-based net-work that provides fi rst responders with a secure way to share real-time video, voice and data com-munications via smartphones and tablets. The multi-vendor LTE network was implemented in coordination with the law enforcement agencies supporting the Convention, a National Special Se-curity Event (NSSE), and the system marks the fi rst time federal, state and local fi rst responders have simultaneously used a 700 MHz D-block broad-band network for an NSSE. Cisco.

Go to sp.hotims.com and enter 468 for product information.

IP Video Surveillance Cameras

Arecont VisionSurroundVideo 12MP WDR

180° Panoramic Camera

Arecont Vision’s 12-megapixel WDR 180° panoramic camera is 25 percent smaller than previous Sur-roundVideo models. The true Wide Dynamic Range (WDR) technology delivers a dynamic range of up to 100dB at full resolution and without lowering the frame rates. The WDR performance of Arecont Vision cameras represents up to 50dB improvement (300X) in dynamic range compared to non-WDR cameras. The camera uses four 3-megapixel WDR image sen-sors for a total resolution of 8,192 x 1,536-pixels with IP66 and IK10 enclosure. Arecont Vision.

Go to sp.hotims.com and enter 469 for product information.

CiscoIP Video Surveillance Cameras with

Media Services Interface

Cisco’s IP video surveillance cameras with Media Services Interface (MSI) provide auto-confi gura-tion, auto-registration and centralized visibility on

the network. Cisco routers and switches with the Media Services Proxy (MSP) capability extend these benefi ts to third-party IP video surveillance cameras, reducing deployment time and complex-ity, particularly for large-scale rollouts, resulting in true plug-and-play and dramatically lower deploy-ment costs. With auto-confi guration and auto-registration, the time required to set up a Cisco IP surveillance camera shrinks from an average of 45 minutes to 90 seconds, translating into signifi cant savings in large scale deployments. Cisco.

Go to sp.hotims.com and enter 470 for product information.

IT Software/Hardware

AlertEnterpriseAlert-N-Prevent

Alert-N-Prevent enhances security through behav-ior and predictive analytics with risk scoring capa-bilities. Critical Infrastructure Protection (CIP) is enforced by monitoring physical access and logi-cal access that includes both IT Systems and SCADA Systems, controlling plant operations. A rules-based engine ensures enforcement of secu-rity policies while ensuring compliance with regu-lations. The system automates processes includ-ing background checks, regulatory compliance, incident management and overall access manage-ment. Through these automated reporting and management systems, Alert-n-Prevent can pick up on behavioral patterns and determine whether instances of physical intrusion especially by ‘insid-ers’ is taking place. AlertEnterprise.

Go to sp.hotims.com and enter 471 for product information.

Lieberman SoftwareEnterprise Random

Password Manager

The Enterprise Random Password Manager (ERPM) by Lieberman Software provides the accountability of showing precisely who on the IT staff had access to data, at what time and for what purpose. This in-formation can be provided to security auditors to verify compliance with regulatory mandates such as CAG-12, FISMA, DIACAP, FIPS and others. ERPM helps protect organizations against unauthorized users and malicious programs compromising a privileged password and using it to leapfrog from system to system to gain anonymous access to sensitive data. Lieberman Software.

Go to sp.hotims.com and enter 472 for product information.

On behalf of all of us at Security Products, we would like to congratulate the 32 winners of the 2013 Govies Se-curity Awards. In this competition, companies submit-

ted Government Security products that fi t into a large number of categories ranging from Access Control, Cloud Storage and Sur-veillance, Fire & Life Safety, IT, Mobile Security Apps, Perimeter Security, Video Management Systems and more. We had a record

number of entries this year, and we are proud to feature such a large number and variety of security products as our winners. We hope you’ll enjoy reading about each of these products.

0913sec_070_076_Govies_v4.indd 70 8/20/13 10:25 AM

Page 71: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 7 1

Mobile Security Apps

Good TechnologyGood Vault

Good Technology’s Good Vault is a comprehensive solution for extending identity and access man-agement (IAM) to consumer-based smartphones and tablets, including personal devices. Good Vault provides robust mobile multi-factor authentication to Good’s fl agship collaboration applications and an entire ecosystem of third party application and complies with stringent regulatory requirements. It perfectly balances the needs of IT managers for security and regulatory compliance, with those of executives and other mobile users, for rapid, easy adoption. Unlike other authentication solutions for mobile devices, Good Vault leverages an ISO smart card and supports the use of a Secure Element MicroSD. Good Technology.

Go to sp.hotims.com and enter 473 for product information.

Network Security

Titania Ltd.Nipper Studio v2.2

Nipper Studio is a security auditing tool that allows users to produce detailed security reports on the vulnerabilities in network devices such as fi re-walls, switches and routers. The product works from the inside out by analyzing actual device con-fi gurations, providing a more detailed report than vulnerability scanners. The tool can be used on Linux, Mac and Windows platforms and supports over 100 different network device types, so it can be used to audit the most complex of networks. Nipper Studio also produces a mitigation report that provides the information to help organizations fi x network vulnerabilities with the smallest impact on operations. Titania Ltd.

Go to sp.hotims.com and enter 474 for product information.

Outdoor Lighting-Based Security Platforms

TOTUS SolutionsOutdoor LED Lighting, Wireless

Surveillance PlatformThe outdoor LED lighting-based security plat-forms from TOTUS Solutions incorporate opti-mized LED lighting, megapixel IP surveillance, multi-day media storage and secure wireless communications in a single solution. The plat-forms are designed to provide up to 70 percent

energy savings versus conventional lighting and have a life cycle up to 100,000 hours with less than fi ve percent loss in brightness, making it cost-effective and virtually maintenance-free. In addition to the integrated light and camera, the platforms also feature “embedded intelligence,” and FIPS 140-2 encryption for secure communi-cations in accordance with stringent Department of Defense standards. TOTUS Solutions.

Go to sp.hotims.com and enter 475 for product information.

SMARTVUECLOUD SURVEILLANCE

“Top 10 Cloud Suveillance Challenges”Download the Free Whitepaper

smartvue.com/top10

“Top 10 Cloud Suveillance Challenges”Download the Free Whitepaper

smartvue.com/top10

Go to sp.hotims.com and enter 76 for product information.

0913sec_070_076_Govies_v4.indd 71 8/20/13 10:25 AM

Page 72: ASIS BOOTH 963

7 2

Perimeter Security

AXIS CommunicationsAXIS Q8721-E Dual PTZ

Network Camera

The IP66, outdoor-ready AXIS Q8721-E Network Camera simultaneously provides visual, HDTV 1080i- or 720p-quality with 10x optical zoom and autofocus with a separate network thermal cam-era with 384x288 resolution in the same unit. With AXIS Q87 Series, both thermal and HDTV, combine for an ideal perimeter, critical infrastructure, gov-ernment or city surveillance application to provide detection, recognition and identifi cation in one. The positioning unit of AXIS Q87 can pan 360° endlessly and tilt between +45° to -20° with pre-set accuracy of 0.02°. The camera is connected to the network using one Ethernet cable and features an SD/SDHC memory card slot for each camera to store recordings locally. AXIS Communications.

Go to sp.hotims.com and enter 476 for product information.

Video Management Systems

AxxonSoftAxxon Next

The Axxon Next Video Management Software (VMS) by AxxonSoft is based on open standards to offer a truly open platform. The Interactive 3D Map allows instant determining of the location of a se-lected camera without switching between inter-face windows. With Time Compressor, users can skim events in video footage without fast-forward-ing. The MomentQuest2 search feature is quick to fi nd video based on a wide range of user criteria such as object size, color, speed, direction and other parameters. Axxon Next uses micromodule architecture, which allows the system to smoothly recover and remain fully operational even if an in-dividual function fails. AxxonSoft.

Go to sp.hotims.com and enter 477 for product information.

Wireless Security

Berkeley VaritronicsPocketHound Cell Phone Detector

The PocketHound Cell Phone Detector by Berkeley Varitronics is a palm-sized, passive receiver spe-cifi cally tuned to the RF signature of common cell phones, allowing security personnel to locate nearby cell phones during active voice, text or data RF transmissions from up to 75 feet away. This breadth of band detection provides any security personnel with the ability to locate nearby cell phones in either standby mode or during active voice, text or data RF transmissions, making it the perfect tool for enforcing a NO WIRELESS security policy. Berkeley Varitronics.

Go to sp.hotims.com and enter 478 for product information.

GOLD AWARD WINNERS

Access Control

3M Congent Inc.MiY-Touch

The MiY-Touch indoor biometric touch-screen ac-cess control reader is compact, fast and one of the lightest readers in its class. Designed with an intui-tive interface and visual user feedback, the reader is easy and fun to use. MiY-Touch has several features including built-in time and attendance functions, external USB for add-on devices, Sandbox API framework support and an optional detachable con-tact/contactless smart card reader that meets cur-rent SP800-116 standards. 3M Cogent Inc.

Go to sp.hotims.com and enter 479 for product information.

I WANT YOUTO BUY AMERICAN!

Our Steel Gooseneck Pedestals areMade in America from American SteelOur Steel Gooseneck Pedestals areMade in America from American Steel

Our Lexan Polycarbonate Housings areMade in America from American Plastic ResinOur Lexan Polycarbonate Housings areMade in America from American Plastic Resin

[email protected](770) 529-1040

h h i

Stop Feeding the Foreign Beast To Save a Buck!

Go to sp.hotims.com and enter 29 for product information.

0913sec_070_076_Govies_v4.indd 72 8/20/13 10:25 AM

Page 73: ASIS BOOTH 963

7 3

Monitor DynamicsTrusted FICAM Platform

The Trusted FICAM (Federated Identity Credential and Access Management) Platform is a military-grade high assurance PACS (Physical Access Con-trol) System that delivers end-to-end trust by le-veraging PKI-based identity credentials across the PKI Bridge Infrastructure in a unifi ed approach to physical access control. The platform utilizes PKI credentials that are resistant to fraud, meet federal standards, minimize risk and protect critical assets while simultaneously complying with a broad range of identity mandates. Authorized credential holders can use a single enterprise issued, digi-tally certifi ed smartcard badge to enter the build-ing. Monitor Dynamics.

Go to sp.hotims.com and enter 480 for product information.

Cloud Computing/Storage

Smartvue CorporationSmartvue S9Q Cloud

Surveillance Server

The Smartvue S9Q Cloud Surveillance Server is a surveillance solution that has been designed for multiple location government facilities. The server offers plug-and-play installation on virtually any network and supports more than 300 leading cameras. The product includes fast cloud services for remote monitoring, cloud storage, collaborative video sharing and enterprise surveillance man-agement. Video viewing features for the server in-clude multi- and live-view displays, native resolu-tion, full screen and zoom with live video patrols. Smartvue Corporation.

Go to sp.hotims.com and enter 481 for product information.

Fire/Life Safety

AltronixFireSwitch

The Altronix FireSwitch 108 Managed NAC Power Extender is programmable locally and remotely via Ethernet connection with a highly functional and versatile LCD display that indicates operational sta-tus. Designed for use with 12V or 24VDC fi re alarm control panels (FACP), it also provides auxiliary power for system accessories. Eight Class B or four Class A notifi cation appliance circuits are individu-ally programmable as AUX power outputs with 10 amps maximum power. The extender is made in the US and comes with a lifetime warranty. Altronix.

Go to sp.hotims.com and enter 482 for product information.

HDcctv Cameras

Schneider ElectricSpectra HD 1080 Dome

Positioning System

The Pelco Spectra high-defi nition 1080 high speed dome positioning system by Schneider Electric features a camera with a clearer image and stron-ger resolution without sacrifi cing low-light or pro-grammable performance. Designed for security professionals who demand the best in image qual-ity, Pelco’s Spectra HD 1080, built on the Sarix technology platform, is an all-digital system that delivers 2.0 megapixel resolution, high-profi le H.264 compression and built-in analytics, includ-ing object tracking. The intelligent object tracking tool can defi ne the size of the object of interest and track the subject through the full 360-degree rota-tion of the camera. Schneider Electric.

Go to sp.hotims.com and enter 483 for product information.

Go to sp.hotims.com and enter 2 for product information.

0913sec_070_076_Govies_v4.indd 73 8/20/13 10:25 AM

Page 74: ASIS BOOTH 963

7 4 0 9 1 3 | S E C U R I T Y P R O D U C T S

Homeland Security

Real-Time Technology GroupSecure Worker Access Consortium

(SWAC)Enabled by Real-Time Verifi cation (RTV) technol-ogy, SWAC brings together public agencies and

private enterprises to cooperatively secure critical infrastructure through personal identity verifi ca-tion, criminal background screening and authen-tication of workers’ credentials for secure access to sensitive facilities such as regional air, rail and bus terminals, bridges and tunnels. SWAC securely collects and privately manages members’ person-al information and verifi es workers’ identities and

threat-free backgrounds and ensures maximum personal privacy protection. Using secure Web-based hosting, SWAC enables credentialing infor-mation to be securely transferred in real time to any entity anywhere in the world with only a Web connection. Real-Time Technology Group.

Go to sp.hotims.com and enter 484 for product information.

Investigative Video Systems

Sperry WestVideo Commander 2 Pro

The Video Commander 2 Pro by Sperry West is a covert video surveillance system that sets up in six minutes or less, saving thousands of dollars in la-bor with each use. The system allows the user to select which disguised camera best fi ts each situ-ation. There are seven cameras in this system, and each camera can record up to 80 hours of full mo-tion video/motion sensing. There are no wires to run, just plug it in or connect it to the supplied portable power switch. Sperry West.

Go to sp.hotims.com and enter 485 for product information.

IP Video Surveillance Cameras

Arecont VisionMegaDome 2 WDR All-in-One Camera

Featuring remote focus and remote zoom, Arecont Vision’s MegaDome 2 indoor/outdoor all-in-one camera integrates a 1080p or 3-megapixel WDR camera with the fastest frame rates in the industry and an IR corrected motorized vari-focal lens (P-iris) into an IP66 environmental rated / IK10 impact re-sistant dome housing. The camera’s WDR technol-ogy delivers a dynamic range of up to 100dB at full resolution and without lowering the frame rates. The WDR performance of the camera represents up to 50dB improvement (300X) in dynamic range when compared to non-WDR cameras. Arecont Vision.

Go to sp.hotims.com and enter 486 for product information.

Go to sp.hotims.com and enter 8 for product information. See us at ASIS Booth 1289.

0913sec_070_076_Govies_v4.indd 74 8/20/13 10:25 AM

Page 75: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 7 5

AXIS CommunicationsAXIS P12 Network Camera Series

The AXIS P12 Network Camera Series features an innovative design concept that enables easy inte-gration of an all-digital, HDTV-quality covert cam-era into limited spaces. The design of the series comprises a main unit and a separate sensor unit, which can be mounted up to 26ft away. This fl exi-bility keeps the cameras protected from tamper-ing, while still providing full frame rate HDTV 720p video in H.264 and Motion JPEG. The series sup-ports intelligent video features such as motion detection, tampering alarm and I/O ports for con-necting external devices. AXIS Communications.

Go to sp.hotims.com and enter 487 for product information.

Brickcom CorporationOB-300Np N-Series Superior Night

Vision Bullet Network Camera

Brickcom’s OB-300Np N-Series Superior Night Vi-sion 3 MegaPixel Bullet Network Camera is de-signed for challenging conditions which require superior nighttime performance and HD quality video. The series offers real-time video at 1080p @30fps, giving users smooth, seamless video. The camera features a SONY Exmor CMOS sensor de-signed for low light conditions and provides a su-perior dynamic range for outstanding performance in high-contrast and diffi cult lighting environ-ments. Additional options for the camera include SmartFocus, Intelligent Profi le Management, PoE, SD/SDHC memory card slot for local storage, an IP67 certifi ed outdoor enclosure and built-in in-dustrial fan and heater. Brickcom Corporation.

Go to sp.hotims.com and enter 488 for product information.

IT Software/Hardware

BeyondTrustBeyondTrust PowerBroker

Product PortfolioThe BeyondTrust PowerBroker Product Portfolio pro-vides context-aware security intelligence, providing customers with the visibility and controls necessary to reduce their IT security risks. The portfolio offers consistent vulnerability and privilege management, role-based access control, monitoring, logging, au-

diting and reporting to protect internal assets. The PowerBroker product portfolio includes the addition of PowerBroker Database, PowerBroker Desktops, PowerBroker Identity Services, PowerBroker Sudo Converter and PowerBroker Servers Windows Edi-tion. BeyondTrust.

Go to sp.hotims.com and enter 489 for product information.

Terra FermaTerra Ferma Quick Mast

Terra Ferma’s Quick Mast can be employed for a number of sensor and communications systems and integrated into vehicles and robots to deliver effective, robust and versatile mast systems. The Quick Mast offers several preconfi gured systems and accessories such as tool-less mounts and roll

Go to sp.hotims.com and enter 14 for product information.

0913sec_070_076_Govies_v4.indd 75 8/20/13 10:25 AM

Page 76: ASIS BOOTH 963

7 6 0 9 1 3 | S E C U R I T Y P R O D U C T S

cages. Applications for the product include Defense, Security, Mining, Oil & Gas, and Consumer. Available solutions for the Quick Mast include a lightweight communications tower, surveillance tower, solar ar-ray or wind turbine mast, compact ladder and gap cross system. Terra Ferma.

Go to sp.hotims.com and enter 490 for product information.

Mobile Security Apps

Bitzer MobileBitzer Enterprise Application MobilityThe Bitzer Enterprise Application Mobility (BEAM) solution provides an enterprise, agency-wide se-curity layer for mobile apps, which enables net-

work access, policy enforcement and data-protec-tion for third-party or in-house applications. BEAM overcomes the mobile security risk by isolating corporate access and data from employee’s per-sonal apps on mobile devices, extending the trust gained within an internal network out to a secure workspace on mobile devices while ensuring a rich user experience. The user experience is similar to the login at the offi ce and allows seamless access to all authorized resources without having to setup a VPN or needing to continuously re-authenticate. Bitzer Mobile.

Go to sp.hotims.com and enter 491 for product information.

Network Security

NCP EngineeringNCP Secure Enterprise

Management 3.0

The NCP Secure Enterprise Management (SEM)System 3.0 was designed to make secure remote access via VPNs simple for government agencies with large, complex environments. The system en-ables powerful Two-Factor Authentication with a One-Time Password sent via SMS, which elimi-nates the need for agencies to use other third-party solutions and instead turn on Two-Factor Authentication with only a mobile feature phone or smartphone. Customers that deploy the NCP SEM 3.0 reduce the risk of incorrect confi gurations and incorrect operations, reducing time and effort spent on personnel training and documentation. NCP Engineering.

Go to sp.hotims.com and enter 492 for product information.

Perimeter Security

Schneider ElectricSarix TI Series Thermal Imaging

IP Cameras

The Sarix Thermal Imaging IP camera, built on the

CENTRALIZED MANAGEMENT FOR LOGICAL IDENTITIES

AUTOMATES PROCESSES AND POLICIES FOR ON-/OFF-BOARDING

AUTO

MATES PR

OC

ESSES AND

POLIC

IES FOR

PHYSIC

AL ACC

ESS MAN

AGEM

ENT

AUTOMATES PROCESSES AND POLICIES FOR BADGING

AUTOMATES PROCESSES AND POLICIES FOR MANAGING VISITOR IDENTITIES

INTEGRATES DISPARATE PHYSICAL SECURITY & ACCESS SYSTEMS

SYNCHRONIZES CHANGES WITH LOGICAL SYSTEM

S

AU

TOM

ATES P

HY

SIC

AL S

ECU

RITY

CO

MP

LIAN

CE A

ND

AU

DIT IN

ITIATIVES

PR

OV

IDE

S E

XE

CU

TIVE

-LEV

EL R

EP

OR

TING

AN

D A

NA

LYTIC

S

CE

NTR

ALIZ

ED

MA

NA

GE

ME

NT FO

R P

HY

SIC

AL ID

EN

TITIES

PO

LIC

Y-B

AS

ED

WO

RK

FLO

WS

FULL

Y A

UTO

MAT

ED O

N-/

OFF

-BO

AR

DIN

G P

RO

CES

SES

SEC

UR

ITY

CO

MPL

IAN

CE

AUD

ITS

PH

YS

ICA

L AC

CE

SS

PR

IVILE

GE

S B

AS

ED

ON

LOC

AT

ION

PH

YS

ICA

L AC

CE

SS

PR

IVILE

GE

S B

AS

ED

ON

RO

LE/LO

CAT

ION

PH

YS

ICA

L A

CC

ES

S P

RIV

ILE

GE

S B

AS

ED

ON

BA

CK

GR

OU

ND

-CH

EC

K S

TAT

US TR

AIN

ING

STA

TUS

& E

XP

IRAT

ION

CH

EC

KS

SE

LF

-SE

RV

ICE

AC

CE

SS

RE

QU

ES

T A

ND

AP

PR

OVA

LS

AREA OW

NERSHIP A

UDITS

WA

TC

H L

IST

VE

RIF

ICA

TIO

N

RESTRIC

TED A

REA APPRO

VAL

WO

RKFLO

WS

SAFE DOCUMENT MANAGER

SAFE INFRACTION MANAGER

SAFE WATCH LIST M

ANAGER

SAFE ATTESTATION AUDIT

SAFE SELF SERVICE

SA

FE

SEC

UR

ITY R

EPO

RTER

SAFE WEB BADGING

SAFE IDENTITY ANALY

TICS

SAFE

VIS

ITOR ID

ENTITY M

ANAGER

SAFE ALARM ANALYTICS

SAFE CONTRACTOR REGISTRATION PORTAL

SAFE EVENT CORRELATION ENGINE

SAFE DATA MATCH AND RECONCILIATION

SAFE PHYSICAL IDENTITY AND ACCESS MANAGER

SAFE COMPLIANCE REGULATOR

SAFESOFTWARE SUITE

AUTHENTICATE PHYSICAL IDENTITIES,AUTOMATE PHYSICAL ACCESS,ACHIEVE AUDIT & COMPLIANCE 24/7

Go to sp.hotims.com and enter 40 for product information. See us at ASIS Booth 1681.

0913sec_070_076_Govies_v4.indd 76 8/20/13 10:25 AM

Page 77: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 7 7

Sarix technology platform, is a digital end-to-end IP solution that allows for easy integration into a wide variety of third-party systems, making it ideal for the most demanding and critical security ap-plications such as international borders, airports, seaways, dams, pipelines, power generation sta-tions and military installations. Features of the camera include a wide-range of customizable an-alytics at no additional charge such as object counting and loitering detection, as well as robust environmental protection, complete with sun shroud and heater/defroster. Schneider Electric.

Go to sp.hotims.com and enter 493 for product information.

Video Management Systems

CiscoVideo Surveillance Manager 7.0

Cisco’s Video Surveillance Manager (VSM) 7.0 al-lows network and security teams to collaborate effectively in a highly scalable environment that combines both video and network techniques to maximize safety, security and productivity. VSM 7.0 is certifi ed to run on Cisco’s virtualized Unifi ed Computing System (UCS) B-Series, C-Series and UCS Express. Healthcare, public sector and retail organizations can now move beyond traditional basic safety and security surveillance deploy-ments and use video to transform the way they run their businesses through hyper-scalability up to hundreds of thousands of video surveillance cam-eras and easy confi guration. Cisco.

Go to sp.hotims.com and enter 494 for product information.

Salient Systems PowerProtect Platform for

CompleteViewTM VMS

Salient Systems’ PowerProtect platform extends the limits of operational capabilities for video sur-veillance systems. The entry level PowerChoice hybrid NVR supports up to 32 direct connect ana-log cameras and 6TB video storage, offering the perfect balance between value and performance. The PowerPro and Pro-R are rack-mountable 2U hybrid NVRs with enhanced memory and process-ing power built for the rigors of continuous duty operations. The PowerPro model supports up to 15TB while the PowerPro-R (RAID) supports up to 12TB of storage. Higher end NVS (network video server) units are the PowerPlus and PowerUltra. These high performance units support high densi-ty, high camera count confi gurations and offer 15TB to 30TB of storage. Salient Systems.

Go to sp.hotims.com and enter 495 for product information.

Wireless Security

Ingersoll RandSchlage AD-401Wireless Lock

The Schlage AD-401 Wireless Lock by Ingersoll Rand is the only FIPS201/PIV compliant wireless integrated reader and lock currently available. The

lock simplifi es installation and reduces the cost of electronic access control by combining the electri-fi ed locking device, door position switch, request-to-enter and exit sensors together with a FIPS 201/PIV and PIV-I compliant multi-technology reader into one wireless device. Ingersoll Rand.

Go to sp.hotims.com and enter 496 for product information.

Securing Your Most Precious AssetIQinVision has been a trusted name in campus surveillance for over 15 years. Not only do we offer the longest and most comprehensive warranty programs in the industry, award-winning customer service and competitive pricing, our cameras produce clear, high-quality video proven by law enforcement in criminal suspect identification and use in prosecution. To learn more about how IQinVision can integrate into your current or future IP infrastructure, preview our technology live at the annual ASIS seminar and exhibition in Chicago, IL., or visit us online.

www.iqeye.com ASIS BOOTH #245

Go to sp.hotims.com and enter 32 for product information. See us at ASIS Booth 245.

0913sec_070_076_Govies_v4.indd 77 8/20/13 10:25 AM

Page 78: ASIS BOOTH 963

A KEY FOR CASINOS Maintaining tight control to minimize lossBy Fernando Pires

With so much money fl owing throughout casinos, these estab-lishments are a highly-regulated world within themselves when it comes to security.

One of the most critical areas of casino security is physical key control because these instruments are used for

access to all of the most-sensitive and highly-secured areas, including counting rooms and drop boxes. Therefore, the rules and regulations that relate to key con-trol are extremely important to maintaining tight control, while minimizing loss and fraud.

MANUAL LOGSCasinos that are still using manual logs for key control are at constant risk. Not only are there inherent inaccuracies with this system, including signatures that are missing or illegible, but this sign-out process is time consuming.

Analysis, reporting and investigation are extremely labor intensive due to dig-ging through piles and boxes of log sheets, making it diffi cult to keep an accurate account of key usage while having a negative impact on compliance.

CHOOSING THE RIGHT SOLUTIONWhen choosing a key control and management solution that meets the needs of the casino environment, there are important features to consider.

Multiple layers of security. Before accessing any key in the system, each indi-vidual user should face at least two layers of security. Biometric identifi cation, a PIN or an ID card swipe to identify the user’s credentials are not enough sepa-

rately. The cabinet door should not open until the system verifi es that the user has permission for the specifi c key requested.

Three-man rule. For certain keys or key sets that are highly-sensitive, compli-ance regulations may require signatures from three individuals, one each from three separate departments, typically a drop-team member, a cage cashier and security offi cer. A secure key management system should be programmable to recognize these keys or key sets and only open the cabinet door and release them once the three required logins are complete and the credentials verifi ed. A system designed for user convenience will prompt for the additional logins only once, regardless of how many sets were initially requested.

Returning highly sensitive keys may be even more highly regulated, with mul-tiple levels of security required. For example, “Full Secure” would require that the same users who removed a key must return the key, while “Department Secure” would only require the fi rst user’s credentials to match exactly while the two other users would have to match by department. The key control system should be con-fi gurable to handle these levels and others as well.

Limitation of access. Access to drop boxes outside of scheduled hours is an-other regulated area that requires specifi c functionality from a key control system. In the case of an event like a machine jam, customer dispute, machine relocation or maintenance, the user would typically be required to include a predefi ned note and freehand comment with an explanation of the situation before removing keys. In a casino environment, specifi c keys or key sets should be confi gurable so that the user is prompted for this. Reports detailing unscheduled access, including the reason why the access occurred, should be available, as required by many state

7 8 0 9 1 3 | S E C U R I T Y P R O D U C T S

CASINO SECURITY

0913sec_078_079_Pires_v3.indd 78 8/19/13 9:34 AM

Page 79: ASIS BOOTH 963

and tribal gaming agencies. Addition-ally, emails and/or SMS text messages should automatically be generated any time those sets are accessed for un-scheduled drops.

Access to table game drop box release keys is limited to the specifi c employees who are authorized to remove the table game drop boxes from the tables. These same individuals would be precluded from having access to table game drop box contents keys at the same time they have the table game drop box re-lease keys out. Again, this functionality should be easily and conveniently con-fi gurable in a key control solution.

Reporting. Gaming regulations re-quire a number of different types of audits on a regular basis to assure the casino is in full compliance with regu-lations. For example, when employees sign the table game drop box keys in or out, Nevada Gaming Commission re-quirements call for maintenance of sep-arate reports indicating the date, time, table game number, reason for access, and signature or electronic signature.

An “electronic signature” includes a unique employee PIN or card, or em-ployee biometric identifi cation validated and recorded through a computerized key security system. The key manage-ment system should have custom soft-ware that enables the user to set up all these and many other types of reports. A robust reporting system will greatly assist the business to track and improve processes, ensure employee honesty and minimize security risks.

Convenience. It is useful for certain keys or key sets to be quickly available to their authorized users. With an in-stant key release feature, the user only needs to input their credentials, and the system knows whether they already have their specifi c keys or not. If not, the system unlocks and their keys are im-mediately available to them. Returning keys is just as fast and easy. This saves time, reduces training and sidesteps any language barriers. Personnel like house-keepers and slot fl oor attendants can be organized into “groups”. For them, the hotel and casino would have multiples of the same respective key sets available; the system releases the next available set to each authorized user from a group, which cycles through the sets so that each gets equal usage.

Gaming requirements vary from state to state, and from tribe to tribe. The key control and management system

chosen for deployment in a casino en-vironment should be fl exible to accom-modate for any of the above regulations and. It should also be modular and scalable, so the number of keys and the scope of features can change and grow along with the business.

Finally, it should be easy to use, as training time can be costly and many different employees will need to be able to access the system.

By keeping these elements in mind, a casino can manage their key control system wisely.

Fernando Pires is the vice president of sales and marketing at Morse Watchmans.

1/3” 2.8-8mm F/1.2Mega-Pixel IR Vari-Focal

1/3” 8-50mm F/1.6Mega-Pixel IR Vari-Focal

The Double Vari-Focal solution. Cover all focal lengths from wide to tele with 3-Mega-Pixel resolution using just 2 lenses.The new IR-corrected Mega-Pixel lens series from Tamron features a focal length range of 2.8 to 50mm in just two lenses that cover a 101.1° to 5.6° horizontal angle view using a 1/3" camera. With Tamron’s Double Vari-Focal lens solution, you can monitor extreme wide and tele scenes in Mega-Pixel resolution during both day and night without making compromises in resolution. A new optical design uses glass mold aspherical lens elements and a special optical coating that ensures 3MP high resolution even under IR light. The addition of a P-Iris model to this series allows an even more precise adjustment of the Iris to gain the optimal depth of field and light exposure. Tamron’s Double Vari-Focal solution. The simple choice for better security imaging.

www.tamron-usa.com

Security Simplified.Full coverage in just 2 lenses.

Go to sp.hotims.com and enter 49 for product information.

W W W . S E C U R I T Y - T O D A Y. C O M 7 9

0913sec_078_079_Pires_v3.indd 79 8/19/13 9:34 AM

Page 80: ASIS BOOTH 963

ASIS2013 PRODUCT REVIEWCompiled by Cindy Horbrook, Content Development Editor

8 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

Garrett Metal DetectorsCSI Pro

The CSI Pro metal detector is designed for use in the recovery of ferrous, non-ferrous and stainless steel metallic crime scene evidence such as bul-lets, shell casings, stashed weapons and metallic arson evidence. The all-terrain detector is fully waterproof up to ten feet. The unit includes a tacti-cal transport case, land-use headphones and a Garrett CSI Pro-Pointer to speed recovery of small evidence items. Garrett Metal Detectors.

Booth 4012Go to sp.hotims.com and enter 420 for product information.

Totus Solutions TOTUS Security Platforms

TOTUS Security Platforms are outdoor LED lighting-based security platforms that combine energy-sav-ing LED lighting, 360-degree IP surveillance and communication in one simple, fully integrated sys-tem. The purpose-built platforms are designed to turn outdoor surveillance from a passive system that must be constantly monitored, to an active de-terrence that takes action on its own. The actions can be any combination of light events, sounds, stored video, emails or phone calls. Totus Solutions.

Go to sp.hotims.com and enter 421 for product information.

Ingersoll Rand Security

TechnologiesaptiQmobile

The aptiQmobile Web-based key management system sends access control credentials over the air to Near Field Communications (NFC)-enabled

smartphones, which allows people to use their phones to enter buildings instead of smartcard ID badges. All existing aptiQ smartcard readers are already compatible with the aptiQmobile NFC technology. To operate, users can download the aptiQmobile app and retrieve their secure mobile key that was set up by their access control site administrator. Once the mobile key is downloaded, open the app and tap it to the reader just like using a smartcard. Ingersoll Rand Security Technologies.

Booth 663Go to sp.hotims.com and enter 422 for product information.

Network Video Technologies

(NVT)TBus

TBus Ethernet over Coax/UTP transmission product series supports coax, UTP cable, 18/2, two-wire and STP in any combination of star, peer-to-peer or dai-sy-chain cabling topology. The transmitters include the single-port NV-ET1801 and the four-port NV-ET1804. Receivers include the four-port NV-ER1804, eight-port NV-ER1808i and the 16-port NV-1816i. The eight- and 16-port receivers are 1U rack-mountable and contain browser-based man-agement tools. Network Video Technologies (NVT).

Booth 2217Go to sp.hotims.com and enter 423 for product information.

Safety Technology

International (STI)Metal Protective Cabinets

Available in various sizes, Metal Protective Cabinets protect electrical and electronic equipment from hazardous parts and provide a degree of protection to enclosed equipment against ingress of solid for-eign objects (falling dirt). Enclosures mount on the wall for indoor use and feature a continuous piano type hinge with option of key or thumb lock and 1/2- or 3/4-inch conduit knockouts. The cabinets are suited for junction and power supply boxes. The metal meets or exceeds Type 1 requirements and is UL/cUL Listed. Safety Technology International (STI).

Booth 105Go to sp.hotims.com and enter 424 for product information.

Code Blue Corp.IP1500

The IP1500 full-duplex VoIP speakerphone is suit-able for a wide range of indoor and outdoor areas, including classrooms, elevators, hallways, stair-wells and subway cars. The compact, lightweight design ensures an easy installation at any location, while the full package of unique features-SIP stan-dards, fault monitoring, auxiliary output, outdoor rating-comes in one convenient package, provid-ing a high-tech and cost-effective option for any location. Code Blue Corp.

Booth 163Go to sp.hotims.com and enter 425 for product information.

Talk-A-PhoneWall-Mounted Call Box with E-Stop

The Wall-Mounted Call Box with E-Stop is de-signed specifi cally for mass transit applications. Typically used on train platforms, the unit features an emergency trip button, which can be engaged to cut power to the tracks and halt an oncoming train. The call box automatically dials a pre-pro-grammed number connecting the user with an operator for further assistance. Only authorized personnel can disengage the emergency trip but-ton using a special key. Talk-A-Phone.

Booth 2129Go to sp.hotims.com and enter 426 for product information.

Pivot3vSTAC Watch

The vSTAC Watch is an open system appliance that

runs third-party VMS and provides reliable storage for video capture and playback. Individual appli-ances can be stacked to create, protect and load-balance storage across vSTACs as an IP SAN. The product adds support for 64-bit operating systems such as Windows Server products, introduces VM-ware Fault Tolerant and Pivot3 VM Failover options for high-availability and standardizes hardware management on the Dell iDRAC management suite. High-performance solid-state storage intro-duces a 10x performance boost for the most inten-sive streaming environments. Pivot3.

Booth 1981Go to sp.hotims.com and enter 427 for product information.

AltronixeFlow

eFlow power supply/chargers are available in a va-riety of models that offer intelligent features for security, fi re and access control systems. eFlow provides one main power output and one additional Aux Class 2 rated power-limited output at 12 volts DC or 24 volts DC in a wide range of power ratings. The units feature supervised fi re alarm disconnect, over-voltage protection, low power shutdown to protect standby batteries and a power LED indica-tor for instant status verifi cation. Altronix.

Booth 1711Go to sp.hotims.com and enter 428 for product information.

VIVOTEKSF8172/72V and SD8362E

The 5-megapixel fi sheye fi xed dome network cameras SF8172/72V and a 2-megapixel full HD speed dome network camera SD8362E provides a 180-degree panoramic view or 360-degree sur-round view without blind spots. This allows users to simultaneously monitor an overview from a fi sh-eye model and a zoomed in regional view with details from a speed dome. VIVOTEK.

Booth 463Go to sp.hotims.com and enter 429 for product information.

0913sec_080_085_ASIS_v2.indd 80 8/19/13 9:35 AM

Page 81: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 8 1

Morse WatchmansKeyWatcher Touch

KeyWatcher Touch is an enterprise-level key con-trol and management system with online monitor-ing and easy to use, time-saving features. A friend-ly interface with large buttons and a 7-inch touchscreen display offers step by step instruc-tions. The system can locate which KeyWatcher Touch a specifi c key is in, or determine who has it out and when it will become available. Keys can be returned to any KeyWatcher Touch within a site and every transaction is automatically recorded. Morse Watchmans.

Booth 3901Go to sp.hotims.com and enter 430 for product information.

D-LinkDCS-6314

The DCS-6314 is a full-HD outdoor vandal-resistant dome camera suitable for exterior day/night sur-veillance. Integrated infrared LEDs provide night-time illumination up to 45 feet. The two-megapixel WDR sensor is paired with a varifocal 2.8- to 12-millimeter varifocal lens. The camera also fea-tures multiple independent streaming profi les, mul-ticasting support, two-way audio and a microSD card slot. It is part of D-Link’s end-to-end IP sur-veillance solution, which includes PoE switches, cameras, video storage and wireless. D-Link.

Booth 4609Go to sp.hotims.com and enter 431 for product information.

Secura KeyNOVA.16

The NOVA.16 provides access control for up to 16

doors, using smart readers on an RS-485 network. Each smart reader includes all the inputs and out-puts required to control a single door or gate, thus eliminating multiple cable home runs back to the controller and saving money in installation labor and cost. System expansion also becomes simple and economical. Secura Key.

Go to sp.hotims.com and enter 432 for product information.

NITEKEL1551U

The EL1551U is a transmitter - receiver set that extends 100 Mbps of Ethernet data over a single pair of communication cables up to 500 meters (1,600 feet). The system turns any ordinary twisted pair into a high speed network communication path, making it possible to upgrade existing UTP analog video balun systems to IP camera systems using existing infrastructure. The units require very little installation time and no set up or confi gura-tion. The system is transparent to the network re-quiring no IP or MAC addressing. NITEK.

Booth 2395Go to sp.hotims.com and enter 433 for product information.

VerintNextiva EdgeVR 300

The Nextiva EdgeVR 300 NVR provides scalable and enterprise-level video monitoring and record-ing capabilities for banks and fi nancial institutions that range from bank branches, ATMs and cash vaults to corporate facilities. The enterprise-class device includes Verint’s remote monitoring and management software and provides users with all the benefi ts of an embedded NVR, such as band-width optimization, remote access and surveil-lance analytics. The device enables users to record video from up to 64 IP and analog cameras at up to 1,920 fps. Verint.

Booth 255Go to sp.hotims.com and enter 434 for product information.

WinstedEnVision

EnVision Command Consoles are designed to offer

a balance of form and function for today’s control room technology. The consoles are available in single, double or triple tier confi gurations with multiple monitor mounting positions for optimal sightlines and ergonomically correct viewing an-gles. Winsted.

Booth 1695Go to sp.hotims.com and enter 435 for product information.

HID GlobaliCLASS Seos

The iCLASS Seos credential is a high frequency solution for increased security, fl exibility and por-tability. The credential is a standards-based tech-nology that manages and authenticates identities, and it delivers maximum interoperability by sup-porting current, emerging and future technologies such as NFC-enabled smartphones. It provides data integrity and enhanced privacy protection by leveraging the industry’s latest standardized cryp-tographic algorithms. Users can securely embed the credential on NFC smartphones for physical access control, PC logon, biometrics and a wide range of additional applications. HID Global.

Booth 329Go to sp.hotims.com and enter 436 for product information.

AiphoneJM Series

The JM Series Touchscreen Video Intercom Sys-tem identifi es visitors at building entrances. The intercom features a 7-inch touchscreen for system navigation, door release and viewing visitors on the large display. Hands-free and handset commu-nication is featured on all inside stations while picture memory records images onto an SD/SDHC card. The system supports up to eight inside sta-tions for internal communication and four door stations. Flexible wiring choices using Cat-5e/6 cable help save on installation costs. Aiphone.

Booth 645Go to sp.hotims.com and enter 437 for product information.

Arecont VisionMicroDome

MicroDome is the ultra-low profi le multi-megapix-el camera designed for applications where both high-resolution and a small footprint are required. The cameras are available in resolutions of 1.3-, 3-, 5-megapixel and 1080p, with WDR up to 100 dB at full resolution available at resolutions of 1080p and 3 megapixels. The cameras have three unique spring arms that hold the camera in place making installation easy and need only a single screw to secure the magnetized mounting ring for in-ceiling installations. Arecont Vision.

Booth 1945Go to sp.hotims.com and enter 438 for product information.

SamsungSNP-6200RH

The SNP-6200RH network camera captures full HD images in complete and total darkness of 0 lux, up to 328 feet. The 360-degree PTZ dome features a 20x optical zoom and focused IR illumination. The IR illuminators move synchronously with the optical zoom lens to give users a uniformly distrib-uted illumination in complete and total darkness in full 1080p HD (1,920x1,080). The Onvif-compliant camera also features WDR of 60 db, video analyt-ics, bi-directional audio and edge recording using SD or SDHC cards. Samsung.

Booth 853Go to sp.hotims.com and enter 439 for product information.

Salient SystemsPowerProtect

The PowerProtect line of hybrid NVRs supports di-rectly connected analog cameras as well as IP cameras simultaneously using CompleteView Vid-eo Management Software. Combined with Sa-lient’s Transition Plan, video surveillance consum-ers can migrate from existing analog cameras to IP cameras over time, without purchasing third-party encoder hardware or repurchasing camera soft-ware licenses. The PowerProtect platform offers high performance and reliability, and extends the limits of operational capabilities for video surveil-lance systems. Salient Systems.

Booth 983Go to sp.hotims.com and enter 440 for product information.

0913sec_080_085_ASIS_v2.indd 81 8/19/13 9:35 AM

Page 82: ASIS BOOTH 963

ASIS2013 PRODUCT REVIEW

8 2

B.I.G.Panorama

The Panorama model guard shelter houses armed guards, surveillance cameras, HVAC systems and a myriad of electronics. For extreme weather, it features heavy insulation, dual-pane insulating glass, and commercial roof-mounted HVAC with 3-ton output. Additional features include a fully-equipped restroom and custom lighting to en-hance the architectural detail of the upper glass area at night. B.I.G.

Go to sp.hotims.com and enter 441 for product information.

Quantum SecureSAFE Software Suite

Quantum Secure SAFE Software Suite provides streamlined physical identity management, 24/7 across disparate security systems. SAFE’s new mo-bile apps enable area access approval to review, approve and/or deny access requests; visitor self-service or front-desk administered check-in/check-out using a mobile device; managing infractions and citations to improve fi eld offi cers’ productivity; and reporting lost badges, requesting replacement/tem-porary badges, reporting lost/found items. All lever-age the SAFE policy engine for continual process management and compliance, on iOS, Android and Windows platforms. Quantum Secure.

Booth 1681Go to sp.hotims.com and enter 442 for product information.

TamronDouble Vari-Focal Lens

The IR-corrected Megapixel Double Vari-Focal two-lens system features a focal length range of 2.8 to 50 millimeters. Users can monitor scenes in mega-pixel resolution during both day and night without making compromises in resolution. A new optical design uses glass mold aspherical lens elements and a special optical coating ensures 3-megapixel high resolution even under IR light. Tamron.

Go to sp.hotims.com and enter 443 for product information.

Speco TechnologiesNSP

The NSP NVR with built-in PoE provides the ease of an IP setup with the simplicity of an analog system. Built-in PoE eliminates having to run a separate power

supply to the IP cameras, and the NSP provides seamless IP camera connectivity when using Speco’s OnSIP and VIP cameras. The NVR is compatible with all Onvif Profi le S cameras. Speco Technologies.

Booth 4701Go to sp.hotims.com and enter 444 for product information.

CyberLock Inc.Electronic Locks

The CyberLock electronic access control system offers a cost-effective turnkey solution for any en-tity seeking to increase security and key control. The electronic cylinders are installed without the need for power or hard-wiring, making installation quick and affordable. Both the lock and key record openings and unauthorized attempts to enter, pro-viding a detailed audit report of all access activity. Keys are programmed for each user, detailing what locks it can open and when, and can be quickly deactivated if lost or stolen. CyberLock Inc.

Booth 1294Go to sp.hotims.com and enter 445 for product information.

Night and Day

HyperGraphic is the one!Beneath the moon or under the sun, HyperGraphic Impressions

custom manufactured, reflective security yard signs work to generate sales leads for your company.

Toll Free: 1-800-437-4973Fax: 1-800-536-4467E-mail: [email protected] or

[email protected]@hypergraphicimpressions.com

Go to sp.hotims.com and enter 64 for product information.

Call Zistos today forproduct information!

Made inthe USA

EXPLORERSCOPEA REVOLUTION IN CARGO INSPECTION!

Zistos Ph: +1.631.434.1370 E-mail: [email protected] www.zistos.com

TM

■ See up to 40+ Feet, (13+ Meters), in total darkness through .39 inches (10 mm) hole

■ No external power, lights, displays required(Optional external display available-shown)

■ 4-way articulating tip with highly sensitive, black & white camera

■ Semi-rigid flex-and-stay guide tube can maintain a horizontal position or span a gap when inserted into a void space

Go to sp.hotims.com and enter 74 for product information. See us at ASIS Booth 1980.

0913sec_080_085_ASIS_v2.indd 82 8/19/13 9:35 AM

Page 83: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 8 3

Video InsightEnterprise Video Management

Software

Enterprise Video Management Software is surveil-lance designed for use by businesses in the fi nan-cial, healthcare, retail, government and education sectors. The IP surveillance software integrates with more than 1,800 cameras from 100 manu-facturers. Video Insight.

Booth 2495Go to sp.hotims.com and enter 446 for product information.

Open Options Inc.Fusion Mobile

Fusion Mobile is a security application for iPhones that operates using Open Options DNA Fusion ac-cess control software. The app allows users to monitor and edit key features of their access con-trol system on the go. Newly added capabilities include acknowledging and clearing alarms, quickly executing direct commands and real time camera feed with PTZ controls. Open Options Inc.

Booth 695Go to sp.hotims.com and enter 447 for product information.

AvigilonHD Micro Dome

The HD Micro Dome camera, available in 1- and

2-megapixel resolutions, provides a cost-effective transition to HD video surveillance and all the ad-vantages of the Avigilon Control Center software. Operating on the company’s H3 platform with HDSM, users can intelligently manage bandwidth and storage. With a horizontal 88-degree view, the camera can cover an entire room from a single lo-cation while providing clear image detail. Avigilon.

Booth 5101Go to sp.hotims.com and enter 448 for product information.

Tyco Security Products Illustra 625 PTZ Camera

The Illustra 625 PTZ camera offers full 1080p HD and is designed for applications like casinos, banks and retail stores where locating, tracking and zoom-ing in on subject details is critical. The speed of the camera coupled with ultra-low latency performance lets users accurately track subjects in mission-crit-ical situations. The camera tracks a scene with the precision a user would expect from an analog PTZ camera. Tyco Security Products.

Booth 305Go to sp.hotims.com and enter 449 for product information.

Napco Security

TechnologiesGemini GEMRP1CAe2/K1CA

Custom Alpha Keypads

Gemini GEMRP1CAe2/K1CA Custom Alpha Key-pads, used in both commercial and residential se-curity systems, provide intuitive control of the full line of expandable Gemini Security Systems. Fea-tures include a dynamic custom alphanumeric zone directory, built-in four-zone expansion mod-ule and actual display of wireless sensor transmis-sion signal strength (1-10) for added reliability. Napco Security Technologies.

Booth 1904Go to sp.hotims.com and enter 450 for product information.

Transponder and Reader Engineered Systems, Inc.

Experience and Innovation in RFID

EXPERIENCE AND INNOVATION AVAILABLE NOW!

ALL PRODUCTS SHOWN ARE FCC CERTIFIED – PART15 COMPLIANT (888) 574-8737 - [email protected]

www.tresrfsolutions.com

Long Range Passive (15 to 28 ft.) for Vehicle ID, Access Control, Asset Monitoring. Field Program Tags

Custom Graphics Available. Tags in Inventory for Immediate Delivery.

Super Long Range Active (10 to 2000 ft.) for Gate Controls, Personnel/Asset Tracking, Theft

Prevention. Wiegand Output, TCP/IP, USB or Serial.

Tags Have Replaceable Batteries!

Go to sp.hotims.com and enter 4 for product information.

0913sec_080_085_ASIS_v2.indd 83 8/19/13 9:35 AM

Page 84: ASIS BOOTH 963

ASIS2013 PRODUCT REVIEW

8 4 0 9 1 3 | S E C U R I T Y P R O D U C T S

IC RealtimeImmersive View

Immersive View 360-degree cameras use a single multi-megapixel sensor combined with high-resolution optics to display a 360-degree vantage point with no blind spots and no moving parts. The imaging technology allows the user to see, record and playback the full 360-degree fi eld-of-view,

ensuring that activity is recorded anywhere in the scene at all times. The platform also features pro-prietary de-warping algorithms which re-encap-sulates the images for forensic and evidentiary purpose. Additional benefi ts include the elimina-tion of blind spots that plague legacy surveillance cameras. IC Realtime.

Go to sp.hotims.com and enter 451 for product information.

AlertEnterpriseEnterprise Sentry

Enterprise Sentry software delivers security intel-ligence across the domains of cybersecurity, phys-ical security and operational technology like SCA-DA industrial control systems controlling most critical infrastructure. Intelligent PSIM capabilities consolidate cyber, human and asset intelligence to correlate threats and deliver smart decision sup-port for the security operations center to manage incidents and mitigate the impact. AlertEnterprise.

Booth 1289Go to sp.hotims.com and enter 452 for product information.

DatacardSR Series

SR Series retransfer card printers deliver full-color, over-the-edge print capabilities. A part of a com-plete solution, the printers allow users to issue at-tractive, durable and secure personalized single- or dual-sided access control cards, IDs and member-ship cards. Offering single- or dual-sided printing on a range of card surfaces, the printers also encode a variety of card types, including magnetic stripe and contact/contactless smart cards. Datacard.

Booth 362Go to sp.hotims.com and enter 453 for product information.

DotworkzS-Type COOLDOME

The S-Type COOLDOME is the original IP-66 rated cooling enclosure designed for static cameras. Water tight, air tight, bug proof and vandal resis-tant, the enclosure protects cameras and other

Go to sp.hotims.com and enter 46 for product information.

0913sec_080_085_ASIS_v2.indd 84 8/19/13 9:35 AM

Page 85: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 8 5

system related hardware by keeping them at opti-mal operating temperatures. Thermostatically controlled Active Cooling Technology reduces en-closure temperatures by up to 45 degrees F. The enclosure is suitable for moderate to extreme heat environments. Dotworkz.

Go to sp.hotims.com and enter 454 for product information.

ZistosExplorerSCOPE

The ExplorerSCOPE is a 9-miilimeter diameter videoscope that allows an inspector to make a complete visual assessment of shipping contain-ers, trailers or cargo vessels through a hole as small as 10 millimeters in diameter without opening doors or hatches. With its internal laser light source, electronically-enhanced low-light video and built-in video monocular, the video-scope can generate images more than 40 feet away in pitch darkness. Zistos.

Booth 1980Go to sp.hotims.com and enter 455 for product information.

IQinVisionAlliance-pro with WDR &

Edge Capability

Alliance-pro H.264 camera models feature WDR functionality, enabling them to produce clear, crisp images, even in challenging lighting conditions. The enhancement is available in the 720p, 1080p, and 3.1-megapixel resolution models. Installation is quick and easy thanks to the remote motorized zoom and focus (with A2 and A3 lens options), a hinged pivoting shroud and three-axis gimbal. In addition, the ONVIF and PSIA compliant cameras offer many advanced capabilities “on the edge” including on-camera storage, direct-to-storage recording, video analytics and exacqVision Edge VMS server. IQinVision.

Booth 245Go to sp.hotims.com and enter 456 for product information.

Kaba Access and

Data Systems AmericasAX.S Series

The AX.S Series of Embedded Access Control products deliver a new way to practice access control management. An embedded access control application on the controller eliminates the need for software or servers, providing a Web-based

physical access control system (PACS) that is simple to install and use right out of the box. And, an auxiliary .NET application allows for mul-tiple-site confi guration and third-party integration for cameras, video and visitor/ID management. Kaba Access and Data Systems Americas.

Booth 563Go to sp.hotims.com and enter 457 for product information.

GET THE LATEST TECHNOLOGY FORYOUR VIDEO SURVEILLANCE NEEDS

xVault offers integrators a complete line of highly scalable digital security and surveillance solutions to meet the demands of any sized project. Simplify your deployments with xVault platforms that are optimized, certified, and guaranteed to get the job done.

Seneca Data Distributors. Inc. | 7401 Round Pond Road | N. Syracuse, NY 13212 | p: 877.814.0348 | www.xvaultsecurity.comIntel, the Intel Logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation in the U.S. and/or other countries.

Hybrid NVRs

Mobile NVRs

Small Form Factor NVRs

Viewing Stations

Network Video Recorders (NVR)

Expandable Storage Appliances

xVault servers and viewing stations now feature the 4th generation Intel® Core™ processor family.

VISIT SENECA AT: ASIS BOOTH # 1993 | SEPT 24–27, 2013

OPTIMIZED • CERTIFIED • GUARANTEED

Go to sp.hotims.com and enter 70 for product information. See us at ASIS Booth 1993.

0913sec_080_085_ASIS_v2.indd 85 8/19/13 9:35 AM

Page 86: ASIS BOOTH 963

8 6 0 9 1 3 | S E C U R I T Y P R O D U C T S

FACILITY SECURITY

AMERICA’S LARGEST CONVENTION CENTER HOSTS ASIS 2013Tradeshow is a prestigious event for security professionalsBy Judy Jones-Shand

McCormick Place, located minutes from downtown Chicago on the shore of Lake Michigan, is the venue for the 59th annual ASIS tradeshow. Billed as one of the security indus-try’s most infl uential events, with 700 exhibits and 200 edu-cational sessions available to 20,000 security professionals,

ASIS 2013 promises top-drawer accommodations and plenty of information for this year’s attendees.

Beyond the vast exhibition space, McCormick Place offers 170 meeting rooms, six ballrooms, assembly seating for 18,000 and three theatres—including the Arie Crown, which accommodates more than 4,000. Easy access parking, with more than 5,800 spaces, is also available.

Security remains top priority at McCormick Place, since the original 1935 ex-position hall, once deemed fi reproof, was destroyed in a 1967 fi re. During the re-design and rebuilding in 1971, McCormick Center planners were credited with helping to reshape prevailing building codes, many of which are still in force today.

As the demand for bigger conventions grew, so did McCormick Place. The ex-pansion brought immense growth in stature, as well as size, enabling McCormick Place to hold the distinct honor as the largest convention center in North America.

SECURING THE TRADESHOWContinental Access, a division of Napco Security Technologies, will perform dou-ble duty this year by participating as a tradeshow exhibitor while working security functions at McCormick Place. For more than 15 years, Continental Access has provided the integrated, access control system at McCormick Place. It’s a huge responsibility-McCormick Place covers more than two-and-a-half million square feet, with half of that area on one level.

“What we’re most concerned about is providing reliable, effi cient and secure access control to all our exhibitors and their guests,” said Frank Solano, security systems engineer at SMG, a management company that oversees some of the fi n-est convention venues, arenas and stadiums across the country, and McCormick Place. “With over 2.5 million square feet of exhibition space, it is imperative that

we maintain the highest level of security, without sacrifi cing the fl exibility our exhibitors require for their events.”

OVERALL FACILITY SECURITYSince 1996, Continental Access’ CA3000 enterprise software and access control panels have provided the solution for McCormick Place.

“McCormick Place is an important, long-time customer of Continental’s, and in fact, just upgraded to our newest enterprise software CA3000 version 2.9,” said Scott Schramme, vice president of Continental Access. “It enables them to get more integration options including a choice of multiple video integration partners, a richer feature set going forward and to get faster, super-optimized performance from the large number of Continental Access Controllers they have in the system. Our robust, scalable, enterprise platform provides an easy-to-use, easy-to-train and easy-to-deploy solution for any size facility, and it will grow with them as they continue to expand, both in square feet and in security requirements.”

McCormick Place security engineer Solano agrees with the software’s ease-of-use. “What I most like about the Continental System CardAccess CA3000 is its in-

terface,” Solano said. “The program is very easy to learn, and navigating through the software is simple. Access control operators in our control room can be easily trained to perform the basic essential duties of an access control system within a few days. The more in-depth, technical tasks that are usually performed by system engineers are also easily mastered.”

Upon installation, Schramme said the initial security team at McCormick Place took full advantage of Continental’s comprehensive Sponsored End-user Training Program. This enabled the security team to become more autonomous and capable of implementing system updates and routine maintenance.

FACILITY TRANSITION AND EXPANSIONContinental Access System’s fl exibility and legacy of support helped the facility transition its system topology from RS232/485 serial communications to Ethernet communications, as LAN connections replaced many older-style, 422 communi-

0913sec_086_087_Jones_v2.indd 86 8/19/13 9:37 AM

Page 87: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 8 7

cation daisy-chains on individual panels. Ultimately, communications improved and the potential for fu-ture adjustments eased.

McCormick Place also expanded its access system hardware in 2006 by adding approximately 200 access doors that roughly coincided with the opening of the 470,000 square foot West Building. Continental Ac-cess System secured this addition with its Turbo Su-perterm-8 panels, incremental to some legacy Smar-term access panels. In a nod to budget concerns, the original legacy panels’ fi rmware was upgraded to run software alongside the new panels. This unique benefi t from Continental adds longevity to any installation.

SYSTEM UPGRADES AND INTEGRATIONS Continental designs and builds its own access con-trol panels for easy upgrades and greater lifespan. For example, speed can be optimized when teamed with Continental’s CA3000 because the integrated software boasts 10-times faster processing speeds, so doors open in less than a 1/4-of-a-second. The 921 KBps are especially relevant to high-volume facilities, where large numbers of people require simultaneous access at peak periods and when management needs to process a lot of data.

However, Solano says he fi nds the reporting fea-tures most useful on a daily basis.

“The ability to run various reports has been in-strumental in maintaining the integrity of security operations. With a few clicks of the mouse I can run detailed reports of badge history, card reader usage and access group auditing.”

McCormick recently upgraded the enterprise ac-cess control software in its well-equipped security control room. Version 2.9 features Milestone NVR integration, as well as NEC failover server software, for disaster recovery and redundant systems option.

“I was pleased to discover that CA3000 integrates with my video management system,” Solano said. “Control room operators at McCormick Place run several programs from their workstations, with Card Access 3000 being their main focus. Further integra-tion with other systems eliminates having to run mul-tiple programs and makes CardAccess 3000 a com-plete security system solution.”

The new CA3000 software release offers the fa-cility some new options, including support for Con-tinental’s new Accelaterm 8- to 16-Door Control-lers—which preceded the convention center’s existing Turbo Supergerms. These super-speed controllers control twice the number of doors, completing full downloads of fi rmware and data in less than 5 min-utes for tens of thousands of badges.

Additionally, the CA3000 supports wireless Trilo-gy Networx Access Locks from Alarm Lock. Networx PIN/Prox Access Locks can be wirelessly installed at any door and run from the server. Retrofi tting stan-dard knob-set locks, durable Grade 1 Networx locks are intelligent edge devices, deployed in less than an hour, that bring power, door-position information,

REX on the lever handle and built-in HID readers to any door, while acting as single-door controllers on the Continental system.

Networx Locks are seamlessly networked directly into the CA3000 software and workstation environ-ment for real-time access reporting, audit trails and personnel updates.

SYSTEM SUCCESSSchramme believes product improvement leads to success.

“While other access control companies have been busy building, buying and dropping entire product lines, Continental Access has been continually refi n-ing and improving our core hardware and software for decades. You don’t have to buy new to increase system size or get upgraded features with Continen-tal...that’s how we’ve kept valued customers like Mc-Cormick, as well as top educational and healthcare facilities for years and years.”

Award-winning McCormick Place reportedly hosts nearly 3 million visitors annually, and their ac-cess system and photo badging utility easily keeps pace. More than 28,000 authorized cardholders are assigned to multiple database partitions for different segments of personnel and/or areas of the facility in-cluding reception, security and human resources.

Door control is also offered for meeting rooms

throughout the facility. Access groups receive defi ned, expiration dates based on the rental period booked by the planner. This both simplifi es and streamlines administration, while providing a higher level of se-curity for corporate meetings.

In addition, contractors, trades and other ser-vice providers receive specifi c area access with tem-porary badges offering specifi c expiration times and date. When the job’s done, the system automat-ically terminates access, netting security with labor cost savings.

The Continental Enterprise Security System of-fers an interoperable security solution for security and risk managers. With a robust combination of ac-cess, video, intrusion/fi re alarms and locking, Con-tinental Enterprise Security Systems grow with the client. Based on open architecture with a Microsoft SQL Server database, it’s easy on any budget, prom-ising no annual software licensing fees. Continental plans for painless upgrades by offering a 3-year war-ranty on fi eld-upgradable controllers; new and op-tional, yearly software upgrade op-portunities and an appealing retrofi t rebate program for conversions.

Judith Jones-Shand is the vice presi-dent of marketing at NAPCO Secu-rity Technologies Inc.

proximity act ivated switches

dortronics.com [email protected] 1.800.906.0137

Keith,These switches

are convenient

and economical!

Chris

Our new 5278 Touchless Illuminated Switches open automatic doors with the wave of a hand. There's no need to touch anything. The advanced optical infrared technology picks up motion within a 4 inch range. And for added versatility, you can also use our Touchless Switches with card access systems as a request to exit.

Go to sp.hotims.com and enter 63 for product information. See us at ASIS Booth 895.

0913sec_086_087_Jones_v2.indd 87 8/19/13 9:37 AM

Page 88: ASIS BOOTH 963

8 8 0 9 1 3 | S E C U R I T Y P R O D U C T S

DVRs NVRs

ON THE CUTTING EDGE Credit union transitions to all IP video surveillance solution

By Ali Mahmoud

Staying on top of a rapidly evolving technology, such as video sur-veillance, can be challenging. Despite knowing recent technologies are more powerful, effi cient and effective at addressing risks, the lo-gistics of making a transition can be complex, decision-making can take time and the required investment can be signifi cant. However,

some banks and credit unions take pride in being early adopters and are able to quickly embrace change.

Such is the case with Centris Federal Credit Union, a fi nancial institution based in Omaha, Neb., with 11 branches serving Omaha and other communities across the state.

Centris had been using a hybrid NVR solution since 2006, long before the industry began transitioning from analog to IP and from NVRs to server-based platforms. When a new head offi ce building was acquired three years later, Steve Edgerton, senior vice president of technology, and Blake Grooters, facilities man-ager, decided to test the waters with a server-based, VMS software solution and new IP cameras.

MOVING TO IP VIDEOCentris opted for a browser-based, VMS solution and IP cameras from March Networks, which they preferred over the cameras originally acquired with their head offi ce.

Despite the different brands of surveillance technology deployed across Centris’ footprint, investigators are able to access and review video from any camera in the system through the common VMS user interface. This allows the credit union to tran-sition to new technology over time, leverage prior investments in its NVRs and analog cameras, and not have to worry about the interoperability of different platforms.

The VMS eliminates the need to upgrade software on desktops throughout the credit union’s branch network, streamlines administration of user privileges and camera settings, and minimizes hardware failures as servers replace NVRs.

“At the same time, IP cameras provide Centris with a phenomenal improve-ment in picture quality,” Grooters said.

The VMS is facilitating the deployment of video surveillance at remote kiosks in grocery stores. Instead of installing a NVR or server at the location, Centris simply connects an IP camera to the corporate network, linking the kiosk to the main offi ce.

“Going forward, the plan is to phase out the NVRs over time, put everything on the VMS and go exclusively with the new IP cameras,” Edgerton said.

In fact, subsequent remodeling projects at several branches offered an opportu-nity to transition to an all-IP system.

MOBILE ACCESSA cloud-based, mobile application that works with the VMS will facilitate mobile access to video from tablets and smartphones. In the event of an emergency, au-thorized Centris staff will be able to go into the system, select a camera and view live video, even if they are on the road or in an off-site meeting.

“There are more and more tablets across the enterprise, so we’re looking for-ward to taking advantage of mobile access,” Edgerton said.

0913sec_088_089_Mahmoud_v3.indd 88 8/19/13 9:38 AM

Page 89: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 8 9

VIDEO SURVEILLANCE AS A DETERRENTEvidence from the video surveillance solution has been used on numerous occasions to document a variety of incidents, from robberies to cases of internal fraud, with some clips even airing on local TV news broadcasts. For the most part, however, the system functions as a deterrent.

“The fi rst thing anyone sees when they come in the front door of one of our branches is a welcome [analog] monitor with their picture on it,” Edgerton said. “It lets them know right away that they are under surveillance, so if they’re com-ing in with anything other than innocent intentions, they’ll just turn around and walk right out. There have been several instances of this over the years.”

A single-channel encoder is used to convert digital video from the IP cam-eras for display on the analog monitor.

COMBATTING ATM FRAUDCentris’ strategy for combatting ATM fraud is mounting cameras in areas that are out of the reach of a potential fraud-ster. The cameras record the customer’s approach so that person can’t cover up the camera installed inside the ATM.

Several tools are available to the credit union to make sure their video surveillance system is up and run-ning. For example, the NVR software reports on the health status of the ATM-mounted recorders, while the health checking capability of the VMS reports on any performance issues af-fecting the cameras.

At sites still equipped with NVRs, branch management logs on to each re-corder fi rst thing every morning to make sure their analog cameras are working properly. Centris’ IT department uses a network monitoring system that alerts staff to server and other issues.

“We have three large monitors in our technology services area that display alerts, color codes them and sends out text messages to whoever is on call, so we’re pretty well covered,” Grooters said.

ALARM INTEGRATIONRelying on Diebold Incorporated’s Omaha offi ce for support and exper-tise, Centris recently took advantage of an alarm monitoring service that allows Diebold’s 24/7 monitoring center to ac-cess Centris’ video surveillance system for alarm verifi cation.

“It’s a great service to have because

if something happens in the middle of the night at a branch, we can go in and have a look around,” Diebold’s Lindsay Michalski said. “If it’s a false alarm, we don’t have to wake anybody up or bother the police.”

“I give a lot of credit to Centris for embracing innovation and the techno-logical changes that we have seen in the video surveillance industry. Their sys-tem is state-of-the-art and a model that other fi nancial institutions can certain-

ly emulate,” concluded Michalski.

Ali Mahmoud is a product manager for March Networks.

$360a year$30a month

$7.50 $1.12a week a day

Make a difference todayby sponsoring one child. Visit:

mission500.org/sponsorachildfor details.

helps provide a child like her with access to

life-changing essentials —

clean water,nutritious food,

healthcare,education,and more

a better future.— giving her hope for

Go to sp.hotims.com and enter 81 for product information.

0913sec_088_089_Mahmoud_v3.indd 89 8/19/13 9:38 AM

Page 90: ASIS BOOTH 963

LUXURY AND SECURITY MEET Choosing the proper video management system is a thoughtful choice

By Mary Wilbur

An icon on Chicago’s skyline, The Langham, a luxury hotel, is only minutes from the commercial Loop district and within walking distance to the leisure amenities of Grant Park and the famed Magnifi cent Mile, the city’s premium retail and dining hub. The Langham occupies the fi rst 13 fl oors of a 52-story skyscraper de-

signed by celebrated architect Mies van der Rohe, residing in what was once the IBM building on Wabash Ave. The hotel is committed to keeping its residents safe and secure within its walls, where there are 268 luxurious guest rooms and 48 spacious suites. As one of only fi ve, 5 diamond hotels in the city, the owners from Hong Kong wanted to make sure that it remained a luxury hotel destination, even after substantial refurbishment was completed.

Scott Superfi ne, senior project manager at M&R Electronics, a certifi ed Salient integrator in the Chicagoland area, won the subcontracting portion of the refur-bishment from the prime contractor to upgrade low-voltage systems, voice data and life safety.

The entire installation of video surveillance and low-voltage equipment had

to be fl awless as the building was declared a Chicago Landmark in 2008 and was entered into the National Register of Historic Places. Plus, the owners of The Langham, Chicago wanted to continue the traditions, values and legendary service established by The Langham of London in 1865.

“We placed 180 Axis cameras in the facility, using Salient Systems’ Complete-View VMS software,” Superfi ne said. “We see CompleteView VMS as the perfect marriage of high-quality, video surveillance equipment. We see these cameras as fairly seamless, and the entire install was an incredibility fl awless integration.”

The end user also chose to deploy CompleteView throughout the hotel where management is able to monitor fl oors LL2 through 13 in its own command center, outfi tted with two, 55-inch monitors and two, 22-inch monitors. In addition, the command center is equipped with Salient’s Alarm Client, giving operators the ad-vantage of monitoring and recording through the use of an event-based system.

“We’re excited The Langham Hotel has been able to enhance their security monitoring operations with CompleteView’s powerful, alarm-based, monitoring features,” said Brian Carle, director of product strategy at Salient Systems. “Us-

9 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

HOTEL SECURITY

0913sec_090_091_Wilbur_v2.indd 90 8/19/13 9:39 AM

Page 91: ASIS BOOTH 963

ing CV SpotLight and Alarm Client, security sys-tem operators can focus on the potentially-relevant, event-based video. When designated alarms occur, CompleteView can pop up video on single or multiple

displays and play an audio alert assuring attention is focused on the event.”

Superfi ne said the event-based, notifi cation sys-tem allows for 2x2 tiles (4 images) on the monitor to view the most recent activity from selected cameras. AlarmClient picks up the images and plays them in sequence from the fi rst four cameras that are record-ing, until it has played all the sequences.

“It certainly draws the attention of the operator,” Superfi ne said. “An operator will pull up an event in real time, which is an extension of motion recording and repurposing.”

Repurposing is scheduled and event-based, where motion recording will reuse the real-time view and save it for a record, all while allowing the operator to see what is going on in actual time. It comes in handy to allow an operator to see fi rst-hand anything that causes an alarm, notifying them that something is outside the norm.

The hotel offers its guests numerous niceties includ-ing world-class culinary experiences, a wellness and fi tness experience, and elegant venues for enchanting events. The Langham, Chicago is an ideal location for large functions, innovative business events and inti-mate meetings, all within 15,000 square feet of private event spaces, comprising 12 function rooms. Guests are assured specialized service and state-of-the-art audiovisual equipment, which also must be secured.

Because of this, security at the hotel is taken seriously, and the marriage of VMS and cameras were vital to the overall success of the refurbishment.

“CompleteView provides a rich integration with Axis cameras that allows users to take advantage of many of the camera’s advanced feature sets,” Carle said. “Capabilities such as on-camera motion detec-tion, input events, light control as well as edge-based storage can be utilized with CompleteView, providing fl exibility in a number of deployment scenarios.”

The legacy of the hotel is one of sophistication and elegance, where promises of any event or celebration will be remembered for years to come. All of these op-portunities for guests are equal to the sophistication of the security equipment deployed inside the hotel.

“To stand out, hotels must differentiate themselves with high levels of service, and security is an important piece of that,” said Fredrik Nilsson, general manager, Axis Communications Inc. “The Langham’s decision to install an IP-based surveillance system demonstrates the value in a fully-digital solution. By leveraging both encoder and IP-camera technology, the hotel is able to provide its guests and staff with a priceless amenity: peace-of-mind.”

Mary Wilbur is the director of mar-keting at Salient Systems.

+1 (626) 325-9600www.cogentsystems.com/[email protected]© 3M 2013. All rights reserved.

a 3M Company

MiY-Touch - Security Meets Flexibility3M Cogent introduces our latest indoor biometric access control reader that allows simultaneous use for physical access control and Time and Attendance solutions. MiY-Touch supports contact smart cards, RFID, or iClass card reading capabilities via

As the latest product in the award winning Make it Yours (MiY) product line, the MiY-

demands.

Visit us at ASIS booth #1171 3M Cogent.

Complete SecurityBegins With 3M

Go to sp.hotims.com and enter 60 for product information.W W W . S E C U R I T Y - T O D A Y. C O M 9 1

0913sec_090_091_Wilbur_v2.indd 91 8/19/13 9:39 AM

Page 92: ASIS BOOTH 963

9 2 0 9 1 3 | S E C U R I T Y P R O D U C T S

EDUCATION SECURITY

LOCKING DOWN A CLASSROOM Increasing demands call for immediate sense of securityBy Mike McCoy

According to the Bureau of Justice Sta-tistics, during the 2009-10 school year alone, 85 percent of public schools in the United States reported that one or more incidents had taken place

on campus, amounting to an estimated 1.9 million crimes. This translated to a rate of 40 crimes per 1,000 students enrolled in a public school.

In response to the increasing number of gun-relat-ed incidents and violent crimes occurring in schools nationwide, school districts are looking for more ef-fi cient security and access-control measures. To com-bat these dangers and protect students and faculty, a comprehensive element of security solutions are avail-able, ranging from biometrics identity management

systems and emergency notifi cation devices to moni-toring technologies and full perimeter access control options, all aiming to eliminate the threat of and pre-vent violent intruders from setting foot on campuses.

However, as students, parents and staff make increasing demands for a more immediate sense of security and peace of mind, solutions often appear costly to administrators and security directors as well as diffi cult to implement in a timely and effec-tive manner.

THE INTRUDER FUNCTION Many school district administrators and superinten-dents have started opting for a highly cost-effective product that has been on the market for approximately

20 years to better secure classrooms during the threat of intruder and emergency situations. Used to equip classroom doors, the feature is commonly referred to as an “intruder function,” though many manufacturers have their own respective nomenclature.

The intruder function eliminates a major point of classroom vulnerability by enabling teachers to dis-cretely lock the exterior lever, or thumb piece, from the inside, should they hear or be warned of a dis-turbance directly outside the classroom or in the hall-way. Essentially, teachers and staff are able to lock the exterior of the door without opening it, while the interior lever, or exit device, can remain unlocked, pro-viding safe egress if needed. In doing so, the teacher draws little attention to the students in the room while

0913sec_092_093_McCoy v3.indd 92 8/19/13 9:40 AM

Page 93: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 9 3

simultaneously increasing the level of classroom security.

The intruder function offers sub-stantial security at a low cost with mini-mal installation time, allowing schools to take preventative actions against vi-olent situations quickly and effectively. This single component offers the fol-lowing to provide an effective response to breached security crises in education facilities:• easy to operate, requiring minimal

effort;• adds to classroom security, with

minimal change to the existing door hardware installation;

• available as an orderable option to common exit devices as well as cy-lindrical and mortise lock platforms;

• offered in a wide variety of fi nishes to accommodate the respective ap-plication environments; and

• can be keyed to fi t the specifi c lock or match existing door openings throughout the facility.Because of these characteristics, the

procurement rate has been on the rise in many school districts as this func-tion is being applied to classrooms, li-braries, study halls and common areas of student learning in schools across the country. For instance, after the no-torious shooting at Columbine High School in Littleton, Colo., in April 1999, manufacturers saw a signifi cant rise in districts purchasing this option in Colorado school districts.

Many educational facilities through-out the United States feel that the mini-mal upcharge and installation effort is a small price to pay when considering the immeasurable value of the added security provided. To that point, many communities have now made the in-truder function a requirement for their respective classroom applications.

PITTSBURGH PUBLIC SCHOOLSMost recently, in what is considered one of the most signifi cant moves to improve school security in Western Pennsylvania, the board of Pittsburgh Public Schools voted unanimously in late April of this year to approve the purchase and installation of 4,400 Best locks with the intruder function from Stanley Security in all 59 schools and early learning centers within the district. This decision was part of the school district’s response to the Sandy Hook Elementary School shooting in

Newtown, Conn. that claimed the lives of 26 students and adult staff members on Dec. 14, 2012.

“I applaud any school board that is willing to take additional steps to pro-vide for the safety of their students,” said Donald Smith Jr., emergency plan-ning and response management coor-dinator at the Center for Safe Schools in Camp Hill, Pa. “As much emphasis as we place on students succeeding aca-demically, that success is only possible when students are learning in a safe and secure environment.”

VIRGINIA SCHOOLSA rural, K-12 public school district, located approximately 35 miles north-west of Richmond, Va., chose to install Best locks with the intruder function by Stanley Security in keeping with its continuous efforts to enhance and up-grade security on all of its campuses.

The district currently consists of six schools, including one high school, one middle school and four elementary schools, with students enrolled in pre-K through 12th grade programs. The dis-trict also has an alternative education center for students at both the middle and high school levels, and the high school is equipped with an extensive ca-reer and technical education department with access to a Governor’s School.

The school district, which views the safety of its students and faculty as a top priority, has ramped up security ef-forts over the years in order to secure all entryways, school common areas, hallways and classrooms in the best, most cost-effective ways possible.

“When planning for security en-hancements in any educational setting, it’s important to always take into ac-count currently-installed security, bud-gets, time frames, down-the-road com-patibility and future security goals set by school leadership,” said John John-son, end user consultant for Stanley Security. “First and foremost, though, is landing on a single function, such as locks with the intruder function or a comprehensive solutions package that will immediately augment student and staff safety.”

Stanley Security introduced and in-stalled the locks with the intruder func-tion in this Virginia public school district in 2010. Since then, this school district continues to implement this solution as well as other security features in all new

buildings, upgrades and projects.

NORTHSIDE INDEPENDENT SCHOOL DISTRICT - TEXASThe Northside Independent School District (NISD) in San Antonio, Tex., a premier school system comprised of 71 elementary schools, 18 middle schools and 15 high schools, adopted the Best locks in 2002, installing approximately 15,000 to 20,000 locks in their new fa-cilities. Since then, the district has con-verted their locks to include the intruder function to better protect their popula-tion of approximately 100,000 students along with 12,500 faculty and staff.

“The decision to install locks with the intruder function in the NISD school environments was made by our Facilities Department more than 10 years ago, in response to all the shoot-ings that were being reported around the country at that time,” said Vince Flores, building trades manager of maintenance and operations at NISD. “And, years later, we believe we made the right decision to include them in all our new facilities in order to ensure the safety of our students and faculty. The intruder function has been a great addi-tion and investment to our district with about a 99 percent success rate. Our goal in the future is to convert all NISD campuses to the intruder lock function and intruder exit devices.”

CREATING A SECURE SCHOOLThis nation is challenged daily with me-dia broadcasting the violence that has encroached upon the safety and lives of our children, teachers and supporting faculty. In the face of such realities, as the ones that have occurred at elemen-tary, secondary and higher education facilities across the country, including those incidents that have lent to the un-fortunate infamy of Columbine High School, Virginia Tech and Sandy Hook Elementary School, every additional security measure that can be taken to better guard classroom environments from unauthorized persons and intrud-ers is a must. The intruder function proves its value as a trusted, signifi cant, access-control feature that cost-effec-tively protects with little disruption to existing door hardware.

“Security measures and practices are designed to slow down an intrud-er...[and] every moment that you can delay an intruder to allow time for law

enforcement to arrive can save count-less lives,” said Brett Bontrager, senior vice president and group executive at Stanley, during a hearing earlier this year before the House of Representa-tives Committee on Education and the U.S. Workforce. “Certainly, no single lock or system is the answer. Each school district should ensure that its school buildings and grounds undergo a site evaluation, a risk assessment and [that] a long-term, comprehensive, security roadmap is developed.”

“Upon completion of the site evalua-tion and risk assessment, decisions must then be made on the level of security needed. By levels of security, I am re-ferring to security products that range from essential hardware and mechanical access equipment, such as door hard-ware—which includes intruder locks and master key systems—to wireless situational awareness monitoring and every solution in between. Each dis-trict can work within their own specifi c needs, considering their budget as well as the local rules and regulations.”

For security directors, facility man-agers, school board members and par-ents in any school community know-ing that such a simple, effective and practical solution exists and can be installed easily in the classroom with minimal door preparation and restruc-turing offers incredible comfort.

“I know we can all agree that keep-ing our children safe in their schools is worth all of our time, all of our collec-tive experience and all of our wisdom,” Bontrager said.

Although installing the intruder lock function in schools may not be the only step to ensure safe learning envi-ronments, it’s a considerable and simple action that can pre-empt an emergency and potentially save lives.

This element of classroom security equipment truly sells itself; the feature is a long-standing, trusted solution that directly addresses the fears and concerns every parent has when dropping his or her child off at the school’s front doors. Installing locks with an intruder function in learning facilities is an essential, pro-active measure to help prevent tragedy.

Mike McCoy is a product manager, exits and closers, at Stanley Security.

0913sec_092_093_McCoy v3.indd 93 8/19/13 9:40 AM

Page 94: ASIS BOOTH 963

9 4 0 9 1 3 | S E C U R I T Y P R O D U C T S

MEMORIAL SECURITY

SUPPORTING TRAVELING VETERANS Vietnam traveling wall is consoling and inspirationalBy Skip Haight

Seen by millions since its dedication in 1982, the American Vietnam Veterans Traveling Tribute (AVVT) Wall is a scaled-down replica of the Vietnam Veterans Memorial in Washington,

D.C., but with a specifi c mission: “Create a forum for communities to come together to Honor, Respect and Remember those who have given the ultimate sacrifi ce for their country and to educate all to the Cost of Freedom.”

This year, the Sunset Hills Historical Society of Saint Louis arranged for the AVVT Wall to appear from June 13th through 16th on the grounds of Lind-bergh High School. It was estimated, in advance, that more than 100,000 people would visit this wall during the four-day appearance.

With the potential for that many people gather-ing in one location, keeping everyone safe and secure was paramount. System integration for the event was assigned to ABF Security Systems of Fenton, Mo. Embracing this assignment to provide security to this very visible yet temporary event, Mike Polizzi, presi-dent of ABF Security, turned to respected security industry manufacturer’s representatives R.W. Kunz & Associates, Inc. to recommend a comprehensive solu-tion for this challenge.

R.W. Kunz’s Mark Bowers and Brad Cooper se-

lected equipment from Pelco for the IP camera and recording equipment, and ComNet Communication Networks was chosen to provide the network trans-mission equipment.

Facing the unique challenge of the wall being tem-porarily placed on display, the thought of running ca-bles or using fi ber optic transmission was impractical, so Bowers recommended the all-new, easy-to-install and use ComNet NetWave Wireless Ethernet product line as the perfect solution for this application.

Prior to the installation, a site survey was per-formed, but when the time for the installation came, trailers and tents supporting the event were in the path of the wireless transmission. However, even with these potential obstacles in the line of sight, all the cameras were installed without any trouble. Four rugged IP cameras by Pelco with SureVision, 1.2 Megapixels, day/night, AF, low-light performance and WDR were placed at strategic locations, the fur-thest being 90 yards away from the monitoring loca-tion. Two cameras were observing the backside of the wall, and two more were observing activity from the front. This setup gave complete coverage of the entire event.

To get the video back to the head-end monitoring location, NetWave NW1 point-to-multipoint models were selected, and four NW1 client units were in-

stalled close to the camera locations. The camera out-put was 10 frames per second at a 1280x720 resolu-tion. Using H.264 compression, each camera required 2.5Mbps of bandwidth, with the total from the four cameras using 10Mbps. The IP video was seamlessly transmitted back to a NW1 access point from which the recorded data was collected and fed into a Pelco DSSRV recording system.

This event consistently drew a large crowd, and even though both the wall and the security were con-sidered temporary, there was no doubt as to the long-term effectiveness of the Ethernet product line.

The Saint Louis County Police Department moni-tored the four-day event constantly. No incidents oc-curred and the system operated fl awlessly for the du-ration of the wall’s stay.

When you actually see the American Vietnam Vet-erans Traveling Tribute for the fi rst time, you can’t help but feel incredibly patriotic and proud to think of yourself as an American. The wall is both consol-ing and inspirational, evoking emo-tions for all families whose loved ones have made the ultimate sacrifi ce in defense of our country.

Skip Haight is the vice president of marketing at ComNet.

0913sec_094_Haight_v3.indd 94 8/19/13 9:41 AM

Page 95: ASIS BOOTH 963

A Global Leader in Video and Situation Intelligence Solutions

Verint® helps simplify security operations. Our end-to-end solutions provide full scalability for organizations of all sizes, addressing the world’s

top security and operational challenges with a robust portfolio featuring everything from IP cameras to physical security information management

systems. That’s why more than 10,000 organizations in 150 countries, including 85 percent of the Fortune 100, trust Verint solutions to identify, manage, respond

and investigate, helping ensure they don’t miss a thing.

To learn more, visit Verint Booth #255 at ASIS, visit Verint.com/videosolutions or call 866-NEXTIVA

© 2013 Verint Systems, Inc. All Rights Reserved Worldwide.

Security Simplified.

Experience Verint.

SITUATION INTELLIGENCE / VIDEO MANAGEMENT & ANALYTICS / AUDIO & SPEECH ANALYTICS BUSINESS INTELLIGENCE  / INTELLIGENT NVRS / IP CAMERAS / ENCODERS & DECODERS

NEXTIVA PORTFOLIOIN ACTION

^

Go to http://sp.hotims.com and enter 72 for product information.

Untitled-1 1 8/15/13 11:15 AM

Page 96: ASIS BOOTH 963

0913 NEW PRODUCTSCompiled by Jessica Acklen, Associate Content Editor

9 6

HD BarcodeStores up to 703 kilobytes

Unlike traditional 2D barcodes, the HD Barcode stores up to 703 kilobytes of data allowing detailed comprehensive information, including full color images, and no Internet connection is required. To ensure security, the barcode is generated by using a micro pc “black box” that provides a unique li-cense for a specifi c number of barcodes assigned only to that customer and their printer. Custom Android, iOS Smartphones or code reader applica-tions can scan and decode the barcode, providing conclusive data from images to secure information revealing any diversions or copying of the identifi -cation card. Complete Inspection Systems Inc.

Go to sp.hotims.com and enter 500 for product information.

Electronic Leak DetectionAutomatic water shut off

WaterCop Z-Wave combines the trusted WaterCop system benefi ts of early electronic leak detection and automatic water shut-off with the additional feature of operating in a Z-Wave enabled network. The control valve is locally or remotely controlled using a Z-Wave gateway interface. Integrated with other automated home devices such as alarms and environmental controls, the system offers home-owners an added level of convenience, control, and security to protect their residences. For added fl ood protection, wireless sensors are placed near appli-ances and monitors for plumbing leaks or sudden fl ooding. DynaQuip Controls.

Go to sp.hotims.com and enter 501 for product information.

Outdoor Surveillance System Lowers false alarms

The TriWatcher method from Atsumi Electric Co., Ltd. realizes high precision outdoor vigilance by discriminating/eliminating false alarm factors. Choose from 2 kinds of coverage patterns: wide angle, where the unit is installed in a high place, or pet alley, where the unit does not detect move-ments of objects that are lower than the height installed. By adopting a special visible-light cut fi lter, the unit blocks external lights such as sun-light or car headlights. The system is equipped with spherical Fresnel lens to improve the unit’s non-detect performance of small objects such as small animals. Atsumi Electric Co. Ltd.

Go to sp.hotims.com and enter 502 for product information.

Wireless RadioBroadband connectivity

to moving vehicles

Fluidity offers broadband connectivity in high-speed mobile environments and is Fluidmesh’s response to an increasing demand in reliable mo-bile connectivity. The system can provide broad-band connectivity to moving vehicles while deliv-ering up to 100 Mbps of usable throughput up to 200 mph and fully supports video, voice and data. Fluidity lets consumers operate on their own net-work without recurring costs, monthly fees, spotty coverage or limited bandwidth. Fluidity.

Go to sp.hotims.com and enter 503 for product information.

Go to sp.hotims.com and enter 41 for product information. See us at ASIS Booth 4112.

0913sec_096_103_NP_v4.indd 96 8/20/13 4:24 PM

Page 97: ASIS BOOTH 963

©2013 Schneider Electric. All Rights Reserved. Schneider Electric and Pelco are trademarks owned by Schneider Electric Industries SAS or its affiliated companies.

Capture important video data in any environment.

Access convenient online tools and mobile apps.

Get the live support you need, when you need it.

Stay ahead of the curve with industry-leading training.

Rely on Pelco IP VMS options for any application.

How can our commitment to IP products and services benefit you?

Learn how a busy resort benefitsfrom our IP products and services!Download the Revel resort case study for FREE and enter to WIN an iPad® mini!Visit www.SEreply.com Key Code c864u

By choosing Pelco by Schneider Electric, you’ll have access to an array of services, tools, and programs designed to ensure your success and the confidence that comes from having a broad range of high-quality IP video surveillance products and systems.For more than 20 years, Pelco by Schneider Electric™ has been respected as a leading

provider of video surveillance products and has now emerged as a leader in the IP market.

This evolution has given us the in-depth knowledge to understand what our network-based

surveillance end users and resellers require in their products and the important role that

service and support systems play in helping them succeed. From guaranteed ship dates

and satisfaction assurance to around-the-clock support and flexible service plans, we are

committed to adding value to your video surveillance investment.

Choose with confidence.

Actionable, clear evidence: You can rely on our broad range of IP

cameras for mainstream applications to extreme environments.

Easy expansion and installation: With three flexible platforms to

choose from, Pelco video management systems (VMS) are right for

any application.

Freedom to choose: Pelco products are open and built on industry

standards that allow them to integrate with other key system

components.

Customizable solutions: As a manufacturer, we can adapt our

products to fit your unique applications and special installation needs.

Powerful solutions for the capture, management, and display of video data:

Go to http://sp.hotims.com and enter 83 for product information • See us at ASIS, Booth #1104

Untitled-1 1 8/19/13 11:33 AM

Page 98: ASIS BOOTH 963

0913 NEW PRODUCTS

9 8 0 9 1 3 | S E C U R I T Y P R O D U C T S

Intrusion Detection SolutionDesigned for CMS/RMS

The combination of the ADPRO FastTrace 2X, the fi rst hybrid multi-service security platform capable of rapid and easy deployment of new services on all 16 channels enhanced with IntrusionTrace, a downloadable intrusion detection analytic for the FastTrace 2/2X offers the industry a revolutionary

intrusion detection solution. This solution has been designed for Central & Remote Monitoring Stations (CMS/RMS) and security installers to address false alarms and rapidly deploy new services with fi eld-programmability, as well as a way to deliver those services to end customers without going to the customer site. ADPRO.

Go to sp.hotims.com and enter 504 for product information.

Remote Monitoring SystemManage multiple sites

MyDTT is an enterprise tool that allows owners and operators to easily manage multiple sites from one central location and access a variety of enter-prise-specifi c data. User can remotely monitor a system’s health, view stores live, search through footage, create custom live views, access DTT’s employee tip line, request background checks and review video exception reports and loss prevention material such as SmartAudits, forensic investiga-tions and more. DTT.

Go to sp.hotims.com and enter 505 for product information.

2-Door Access Control PanelUpgrade for SK-ACP panel

Secura Key’s SK-ACPE-LE 2-door access control panel is based on the ARM Cortex M3, 32-bit RISC processor and provides a major technology up-grade to the legacy SK-ACP panel. The product features onboard Ethernet and RS485 communi-cations lines hardened with gas discharge tube surge suppression. The panel has a 3-Amp heavy-duty power supply with power line noise immunity, and it continually monitors backup battery status. Communications speeds and transaction storage capacity have more than doubled. The SK-ACPE-LE is a drop-in replacement for the SK-ACP, with identical fi eld wire connections and compatible functionality. Secura Key.

Go to sp.hotims.com and enter 506 for product information.

CO Detector24/7 central station monitoring

When dangerous amounts of CO are detected, the

Go to sp.hotims.com and enter 22 for product information. See us at ASIS Booth 3113.

0913sec_096_103_NP_v4.indd 98 8/20/13 4:24 PM

Page 99: ASIS BOOTH 963

To learn more call 877.917.9057 or visit . .

Leveraging Power over Ethernet (PoE), the eIDC32 Door Controller only requires a single network cable running to your

when installing access control. Additionally, with multiple inputs and outputs and up to two readers per door, the eIDC32 will power your door accessories. And it simply installs in a

For a list of Distribution Partners, Regional Field Sales coverage, and a complete product portfolio visit . .

New!

The Smallest, Most Powerful, Highly Scalable,

e eOn The Market

Now Available with e e e

e e e we ee e e e e

Remotely lock & unlock doors with your smartphone or tablet

FOB credentials

Deliver enhanced functionality & security capabilities

Reduce credential management

y

Go to http://sp.hotims.com and enter 82 for product information

Untitled-1 1 8/19/13 11:26 AM

Page 100: ASIS BOOTH 963

0913 NEW PRODUCTS

1 0 0 0 9 1 3 | S E C U R I T Y P R O D U C T S

System Sensor CO1224T and CO1224TR (round) CO detectors alert residents by sounding and fl ashing a temp 4 signal alarm. With 24/7 central station monitoring, residents are guaranteed pro-tection whether they are away from home, sleep-ing or already suffering from the effects of CO. The CO1224T and CO1224TR CO detectors include RealTest® technology, so they can be tested using

a CO gas agent, fully meeting the requirements of NFPA 720: 2009. Simply put the detector into Re-alTest mode, spray a small amount of CO into the detector per the installation instructions, and with-in seconds the detector will alarm, indicating suc-cessful gas entry. System Sensor.

Go to sp.hotims.com and enter 507 for product information.

Pneumatic BollardsFlood-resistant

Delta’s pneumatic bollards are more effi cient and cost-effective than electro-mechanical units by 60 percent. The bollards are aesthetic, durable, fl ood-resistant and green, using low voltage and current draw to provide up to 300 cycles per hour.

Any customers needing all-weather, crash-resis-tant bollards are turning to pneumatic designs versus more expensive electro-mechanical de-vices. The products are crash rated and tested, and can be operated individually or in groups up to ten and are used for intermediate level security applications. Delta Scientifi c.

Go to sp.hotims.com and enter 508 for product information.

Rack-Mount Communication Appliance

Supports dual processors up to 16 cores

The CAR-5020 is a highly functional and modular 2U rack-mount communication appliance that of-fers a comprehensive solution for customers in the Network Security, Communications and Infrastruc-ture market. The platform features Intel QuickAs-sist Technology, supports dual processors up to 16 cores with CPU support for Level 3 Cache (up to 40MB) and 16 DIMMs DDR3 240-pin memory slots. The appliance is ideal for network security applications such as fi rewall, VPN, IDS/IPS, anti-spam, anti-virus and UTM, and network manage-ment applications. American Portwell.

Go to sp.hotims.com and enter 509 for product information.

Hemispheric CamerasComplete 360 degree view

A new line of Hemispheric Cameras by Vicon Indus-tries Inc. provide high-resolution, continuous 180 or 360 degree coverage. An integral fi sheye lens and 4 megapixel sensor captures a complete 360 degree view, which is delivered as two 180° panoramic im-ages visually stacked on top of each other within a single video stream. All de-morphing is performed within the cameras prior to transmission, so a dis-tortion-free image is delivered to the VMS ready for live display and recording. The cameras transmit a choice of H.264, MPEG-4 SP and M-JPEG compres-sions with dual streaming. Vicon Industries Inc.

Go to sp.hotims.com and enter 510 for product information.

Go to sp.hotims.com and enter 21 for product information.

0913sec_096_103_NP_v4.indd 100 8/20/13 4:24 PM

Page 101: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 1 0 1

Smoke Alarm AidLow frequency, high decibel

The SafeAwake smoke alarm aid works with a household smoke alarm and provides additional life-saving fi re emergency notifi cation while a per-son sleeps. The alarm’s tactile stimulator feels like a stiff poke in the ribs, and the low frequency, high decibel alarm is easier to hear than the high fre-quency sound of a smoke alarm for seniors whose hearing has diminished with age. HAI.

Go to sp.hotims.com and enter 511 for product information.

DoorKingWireless Adapter

The wireless adapter is a plug-and-play device that connects to any of the company’s 1812 Series telephone intercom systems, the user’s router and a two-line telephone. Line-2 is dedicated to the 1812 and provides full-duplex voice communica-tion wirelessly from the home to the access point. By using an IP addressable camera, video can also be transmitted from the access point to the home. Users also can use a PC to wirelessly program the 1812 Access Plus model. DoorKing.

Go to sp.hotims.com and enter 512 for product information.

KVM ExtenderFiber optic

Matrox Graphics Inc.’s Avio F125, a fi ber-optic KVM extender separates dual HD video, keyboard, mouse, stereo analog audio and USB 2.0 devices from a workstation. Avio F125 features fl exible connectivity options. Its transmitter/receiver pair

extends two single-link DVI (2x1920x1200) or one dual-link DVI (2560x1600 or 4096x2160) video, and multiple high-speed USB 2.0 compliant de-vices from the host computer by up to 400 m (1312 ft) over multimode cable and 4 km (2.5 mi) over single-mode cable. Avio F125 stands out for its ability to transmit all signals with zero compres-sion and zero latency on a single duplex LC-LC fi -

ber-optic cable. Designed for high-performance environments, Avio F125 delivers fl uid graphics and video playback making it ideal for broadcast, post production, Pro A/V, industrial process control, oil and gas, 3D design and visualization, and mili-tary environments. Matrox Graphics Inc.

Go to sp.hotims.com and enter 513 for product information.

Long Distance IlluminatorReaches more than 800 ft.

Azco Technologies Inc.’s IR Illuminators are ca-pable of reaching distances over 800 ft. The Azco IR Illuminators are perfect for Analog CCTV and IP Camera installations. The standard 850nm Wavelengths with the visible red glow IR’s & the

Scan this Microsoft® Tag using your mobile phone to learn more.

Brains, and beautyIntelligent, stylish access control with WiFiIt’s love at first sight with the IN120 WiFi lock from ASSA ABLOY Group brands CORBIN RUSSWIN and SARGENT. Facility managers are fans of how it reduces installation time and lets them add access control at a fraction of the cost. Architects like having a variety of finishes and levers to match any environment seamlessly. IT executives appreciate its compatibility with existing and evolving WiFi systems and standards. Looking to settle down with a security solution? The INtelligent, INnovative and INspiring IN120 could be The One.

Visit us at ASIS Booth #127

IntelligentOpenings.com/IN120

CORBIN RUSSWIN | SARGENTAvailable from ASSA ABLOY Group brands:

Copyright © 2013, ASSA ABLOY, Inc. All rights reserved.

Go to sp.hotims.com and enter 56 for product information.

0913sec_096_103_NP_v4.indd 101 8/20/13 4:24 PM

Page 102: ASIS BOOTH 963

0913 NEW PRODUCTS

1 0 2 0 9 1 3 | S E C U R I T Y P R O D U C T S

Covert 940nm Wavelengths Non-Visible ver-sions are available. The AZIR3000, AZIR2000 & AZIR1000 models offer adjustable illumination intensity, adjustable built-in photocell and an IP67 Rating. The AZIR3000 has an optional bracket to mount 2 or 3 units. Azco Technologies Inc.

Go to sp.hotims.com and enter 514 for product information.

Fingerprint ReaderUse in wet and dry conditions

Lumidigm’s Mariner fi ngerprint reader extends the reliable reading accuracy of multispectral imaging to popular, value-conscious, Windows PC-based biometrics applications. Mariner sensors make biometric authentication simple and affordable for real business applications in industries ranging

from healthcare to transportation, logistics, pas-senger ID, heavy industry, construction and others that require durability and reliability. The product is capable of reading both surface and subsurface fi ngerprints in the cold, hot, wet, dirty, dry and other severe conditions that impede traditional biometric sensors. Lumidigm.

Go to sp.hotims.com and enter 515 for product information.

Modular NVRIdeal for multiple environments

The Modular NVR is ideal for security and surveil-lance solutions that require video management applications to run on multiple servers. Built on Multi-Flex Technology, the system integrates stor-age, computing, and networking to simplify IT en-vironments. The NVR meets the requirements for multiple environments including video manage-ment, client management, perimeter control and analytics all in a single chassis. By providing a scalable and fl exible server solution, the NVR meet the needs of complex physical security de-ployments. Seneca.

Go to sp.hotims.com and enter 516 for product information.

Handheld Cable and Network Qualifi er

Tests features for modern networks

The IDEAL SignalTEK II multifunctional handheld cable and network qualifi er is a cost-effective alter-

Migrating FromAnalog To IP?

• Supports existing or newly installed cabling – coax, UTP, STP or 18/2

• Uses any combination of topologies – star, peer-to-peer, or daisy-chain

• Delivers PoE power at distance to IP devices/megapixel cameras

• Browser-based network monitoring and control from anywhere

• Network speeds up to 200Mbps with data transmission distances of 8,000ft on RG59U

Tel: 650.462.8100 • [email protected]

...IP Migration Technology From NVT

Go to sp.hotims.com and enter 38 for product information. See us at ASIS Booth 2217.

0913sec_096_103_NP_v4.indd 102 8/20/13 4:24 PM

Page 103: ASIS BOOTH 963

W W W . S E C U R I T Y - T O D A Y. C O M 1 0 3

native to certifi ers, and is perfect for small- to medi-um-sized LANs. The product can validate that cop-per or fi ber cabling is capable of supporting bandwidth-heavy Voice, Data, Video and IP-based video surveillance applications over 10/100 Mega-bit or Gigabit Ethernet, then generates documenta-tion verifying network connectivity and job comple-tion to initiate customer payment. With multiple network troubleshooting features including wire-map by pin with distance to fault, cable tracing and verifying Ethernet connectivity, SignalTEK II is high-ly versatile and capable of multiple performance testing. Ideal Industries Inc.

Go to sp.hotims.com and enter 517 for product information.

Tyco Security ProductsVideoEdge NVR

American Dynamics, part of Tyco, has introduced the VideoEdge Go mobile application for use with VideoEdge NVR. The app is compatible with iOS devices, including the iPhone, iPad, iPad Mini and iPod Touch. Designed to extend the security reach for VideoEdge users, VideoEdge Go provides re-mote monitoring and forensic capabilities wher-ever the location. By using the app, security per-sonnel can receive the latest information as a critical situation unfolds, and quickly respond to the event. Tyco Security Products.

Go to sp.hotims.com and enter 518 for product information.

LED LightsHighly visible even in sunlight

Dortronics Systems Inc. 7201 Series hi-intensity LEDs are highly visible in virtually any lighting con-dition, including bright sunlight. Door security sta-tus can be immediately conveyed to system users and security personnel. The weather-resistant units are ideal perimeter access control gates ex-posed to the weather. If mounted near card read-ers, the LEDs can be used to clearly indicate when individual doors and/or gates can be accessed. Perfect for industrial applications, these LEDs are easily seen when viewed from a truck cab or fork-lift. Dortronics.

Go to sp.hotims.com and enter 519 for product information.

PoE ExtenderReaches long distances

AZIPPOE300 is a “PoE extender over coax” solu-tion. By using RF technology, it can extend the transmission distance of power and 100Mbps Ethernet data over legacy coaxial cable to save re-cabling costs. Using this newly developed technol-

ogy based on coaxial cable to extend the distance for PoE. This is the fi rst “true” PoE extender (not repeater) technology, to achieve greater distances beyond the standards and the fl exibility of using existing cable plant. Azco Technologies Inc.

Go to sp.hotims.com and enter 520 for product information.

Go to sp.hotims.com and enter 48 for product information.

0913sec_096_103_NP_v4.indd 103 8/20/13 4:24 PM

Page 104: ASIS BOOTH 963

REGISTER TODAY! USE CODE: NQGW4

PRODUCED BY

COMPREHENSIVE SECURITY EVENT

Workshops: November 18, 2013Conference & Expo: November 19 – 20, 2013 Gaylord Texan Resort – Dallas, TexasGovSecWest.com

Protect our communities, critical infrastructures, and key assets with the tools and strategies you can only get at GovSec West.

For more information, visit: GovSecWest.com!

FREE EXPO

Discover and evaluate

products, tools and

technologies from an

exclusive list of top

security solution

providers!

Early Bird Prices Available for a Limited Time!

Keynotes Announced!

Mark DonaldNavy SEAL (ret’d) U.S. Navy

Captain Neil ShawDirector of Site Security-George W. Bush Presidential Center

Go to http://sp.hotims.com and enter 57 for product information.

Untitled-9 1 8/6/13 1:09 PM

Page 105: ASIS BOOTH 963

AD INDEXFREE PRODUCT INFOQuick, Easy and Direct...get the info you need NOW!Search by category or by company • Go online to www.security-today.com/productinfo to request free information from advertisers in this issue.

Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page

W W W . S E C U R I T Y - T O D A Y. C O M 1 0 5

ADVERTISERS

60..........3M Cogent ...............................................9158..........Altronix ....................................................568............Alert Enterprise ........................................7451..........American Dynamics/Tyco.........................4959..........Aiphone ...................................................2710..........Arecont Vision ..........................................5056..........ASSA ABLOY ..........................................10111..........Avalan Wireless .......................................259............Avigilon ...................................................297............Axis Communications ................................2..............Axxonsoft ..................................................113..........B.I.G. Enterprises .....................................4612..........Bosch ......................................................1516..........CBC America ...........................................3361..........Code Blue ................................................3517..........COMNET ..................................................3139..........Continental Access ...................................552..........Cyberlock, Inc. .........................................4414..........Community Pro ........................................7562..........Datacard Group .......................................5425..........Dedicated Micros .....................................1120..........Diebold ....................................................4321..........Digital ID View .......................................10019..........Digital Watchdog .....................................1718..........Doorking ..................................................6463..........Dortronics ................................................8723..........Dotworkz ...................................................624..........Dotworkz .................................................161............DSX Access Systems ............................... c422..........Dynalock .................................................9828..........G4S ................................................... 60-6127..........Garrett Metal Detectors ............................4857..........Gov Sec West.........................................104..............HID Global ............................................... c329..........Housing Company, The ............................7264..........Hypergraphic Impressions .......................8230..........IC Realtime ................................................731..........IC Realtime ..............................................653............Indigo Vision ............................................2832..........Iqinvision .................................................7742..........ISC East ...................................................6865..........Kaba Access & Data Systems ..................5734..........LiLin USA .................................................4133..........Louroe Electronics ............................. 62-6337..........March Networks ......................................5236..........Mercury Security .....................................3935..........Milestone Systems ....................................381..........Mission 500 .............................................8979..........Morse Watchman ............................... 22-2366..........Napco Security Technologies ..................5138..........Network Video Technologies ..................10282..........Observint Technologies ............................9967..........Open Options ...........................................4283..........Pelco by Schneider Electric ......................9740..........Quantum Secure ......................................7641..........Reconyx ..................................................9645..........Safety Technology International Inc ..........306............Salient Systems .......................................5568..........Salto Systems ..........................................5869..........Samsung Techwin ...................................262............Smart Card Alliance .................................7376..........Smartvue .................................................7146..........Secura Key ..............................................8470..........Seneca Data Systems ..............................8575..........Sony Electronics ......................................1943..........Speco Technologies .................................1344..........Speco Technologies .................................5347..........Stanley Security Solutions .......................2171..........Talk-A-Phone ...........................................4749..........Tamron ....................................................7948..........Topnos...................................................10350..........Totus Solutions ........................................674............Tres by RFID ............................................83

72..........Verint Systems.........................................9553..........Video Insight ..............................................954..........Video IQ, Inc. ............................................6955..........Vivotek ....................................................5973..........Winsted Corporation ................................4574..........Zistos Corporation ...................................82

EDITORIALCover Products

313........Arecont Vision ............................................1316........Axis Communications ................................1314........D-Link .......................................................1311........Samsung ...................................................1312........Seneca Data ..............................................1315........STANLEY Security ......................................1310........Talaeris ......................................................1

Top Picks304........Arecont Vision ..........................................12303........AxxonSoft ................................................12306........Dallmeir ...................................................12300........FST21......................................................12307........HID Global ...............................................12302........HTS .........................................................12305........Smiths Detection .....................................12301........Winsted ...................................................12

Product Solutions: ASIS437........Aiphone ...................................................81452........AlertEnterprise .........................................84428........Altronix ....................................................80438........Arecont Vision ..........................................81448........Avigilon ...................................................83441........B.I.G. .......................................................82425........Code Blue Corp. .......................................80445........CyberLock Inc. .........................................82453........Datacard .................................................84431........D-Link .....................................................81454........Dotworkz .................................................84420........Garrett Metal Detectors ............................80436........HID Global ...............................................81451........IC Realtime ..............................................84422........Ingersoll Rand Security Technologies .......80456........IQinVIsion ................................................85457........Kaba Access and Data Systems Americas ...85430........Morse Watchmans ...................................81450........Napco Security Technologies ...................83423........Network Video Technologies (NVT) ...........80433........NITEK ......................................................81447........Open Options Inc. ....................................83427........Pivot3 ......................................................80442........Quantum Secure ......................................82424........Safety Technology International (STI) ........80440........Salient Systems .......................................81439........Samsung .................................................81432........Secura Key ..............................................81444........Speco Technologies .................................82426........Talk-A-Phone ...........................................80443........Tamron ....................................................82421........Totus Solutions ........................................80449........Tyco Security Products ............................83434........Verint .......................................................81446........Video Insight ............................................83429........VIVOTEK ..................................................80435........Winsted ...................................................81455........Zistos ......................................................85

Product Solutions:

New Product of the Year EntriesThe Govies

361........2X Software .............................................40479........3M Cogent Inc. ........................................72466........Accellion ..................................................70375........Alert Logic Inc. .........................................45

377........Alert Logic Inc. .........................................45471........AlertEnterprise .........................................70482........Altronix ...................................................73349........Arecont Vision ..........................................38350........Arecont Vision ..........................................38469........Arecont Vision ..........................................70486........Arecont Vision ..........................................74379........AtHoc Inc. ................................................45384........AtHoc Inc. ................................................48398........Automatic Systems ..................................57394........AvaLAN Wireless ......................................56344........Axis Communications ..............................36351........Axis Communications ..............................38352........Axis Communications ..............................38476........AXIS Communications ..............................72487........AXIS Communications ..............................75411........AxxonSoft ................................................61477........AxxonSoft ................................................72392........BAE Systems Detica ................................54400........Belden Inc. ..............................................58478........Berkeley Varitronics .................................72402........Berkeley Varitronics Systems Inc..............58489........BeyondTrust ............................................75383........Bitzer Mobile ...........................................48491........Bitzer Mobile ...........................................76348........Bosch Security Systems Inc. ....................38353........Brickcom Corporation ..............................38488........Brickcom Corporation ..............................75373........BriefCam .................................................44468........Cisco .......................................................70470........Cisco .......................................................70494........Cisco .......................................................77380........CodeBlue Corp. ........................................48416........ComNet ...................................................64370........Cooper Notifi cation ..................................42378........Dell Software ...........................................45393........Dell SonicWall ..........................................54355........D-Link .....................................................38409........DVTEL Inc. ...............................................60382........Fire-Lite Alarms/Honeywell ......................48366........Fire-Lite/Honeywell Power .......................40341........FLIR Systems ...........................................36326........FST21......................................................32465........Gallager ...................................................70327........Genetec Inc. ............................................32473........Good Technology .....................................71328........HID Global ...............................................32372........Honeywell ................................................44387........Honeywell ................................................50358........IC Realtime ..............................................40496........Ingersoll Rand..........................................77415........Innovonics ...............................................64414........I-View Now ..............................................64333........Kwikset ...................................................34332........Lenel Systems Internatioal Inc. ................34410........Lenel Systems Internatioal Inc. ................61364........Leviton ....................................................40472........Liberman Software ..................................70324........Linear ......................................................32339........LifeSafety Power......................................36386........March Networks ......................................50412........Milestone Systems ..................................64359........MOBOTIX Corp. ........................................40480........Monitor Dynamics ....................................73492........NCP Engineering ......................................76385........Network Video Technologies (NTV) ...........50331........Observint Technologies/Infi nias Inc. .........34388........Oncam Grandeye .....................................52413........OnSSI ......................................................64347........Panasonic ................................................36335........Parabit Systems Inc. ................................34321........Paxton .....................................................32374........Plixer International Inc. ............................44395........Precise Biometrics ...................................56329........Quantum Secure ......................................32

391........Quantum Secure ......................................54484........Real-Time Technology Group ...................74495........Salient Systems .......................................77408........Salient Systems Corp. ..............................60345........Samsung .................................................36356........Samsung .................................................38483........Schneider Electric ....................................73493........Schneider Electric ....................................76367........SDi ..........................................................42323........Securitrion Magnalock Corp. ....................32330........Securitrion Magnalock Corp. ....................34396........Sentry360 ...............................................56346........Sepco Technologies .................................36363........Sielox ......................................................40467........Silent Knight ............................................70381........Silent Knight/Honeywell ...........................48362........Smartvue Corp. ........................................40481........Smartvue Corporation ..............................73354........Sony Electronics Inc. ................................38357........Sony Electronics Inc. ................................38342........Speco Technologies .................................36343........Speco Technologies .................................36485........Sperry West .............................................74320........SRI International ......................................32322........STANLEY Security ....................................32325........STANLEY Security ....................................32334........STANLEY Security ....................................34336........STANLEY Security ....................................34404........STANLEY Security ....................................59365........System Sensor ........................................40337........Talk-A-Phone ...........................................34390........Telguard ..................................................52490........Terra Ferma .............................................75376........Thales e-Security.....................................45340........The Housing Company .............................36474........Titania Ltd. ..............................................71397........TOTUS Solutions ......................................57475........TOTUS Solutions ......................................71403........Transponder and Readers Engineered ......... ..............Systems Inc. ............................................59338........Tyco Integrated Security ..........................34360........VASCO Data Security ...............................40406........Verint Inc. ................................................60389........Video Insight ............................................52407........Video Insight ............................................60368........Videofi eld ................................................42405........WavestoreUSA .........................................59369........Xtralis ......................................................42371........Xtralis ......................................................44399........Xtralis ......................................................57401........Xtralis ......................................................58

New Products504........ADPRO.....................................................98509........American Portwell .................................100502........Atsumi Electric Co. Ltd. ............................96514........Azco Technologies Inc. ...........................101520........Azco Technologies Inc. ...........................103500........Complete Inspection Systems Inc. ............96508........Delta Scientifi c ......................................100512........DoorKing ...............................................101519........Dortronics ..............................................103505........DTT .........................................................98501........DynaQuip Controls ...................................96503........Fluidity ....................................................96511........HAI ........................................................101517........Ideal Industries ......................................102515........Lumidigm ..............................................102513........Matrox Graphics Inc. ..............................101506........Secura Key ..............................................98516........Seneca ..................................................102507........System Sensor ........................................98518........Tyco Security Products ..........................103510........Vicon Industries Inc. ...............................100

0913sec_105_Adindex_v5.indd 105 8/21/13 9:57 AM

Page 106: ASIS BOOTH 963

INDUSTRYPROFESSIONAL By Ralph C. Jensen

1 0 6 0 9 1 3 | S E C U R I T Y P R O D U C T S

While many young adults in their 20s are still fi guring out what they are going to do with their life, Thomas Carnevale was in

the developmental stages of security innovations for his own company. One thing he did have in common with some other “twenty-somethings” was this—he was starting his company from his parent’s basement.

Carnevale, president and CEO of Sentry 360, comes from a long line of entrepreneurs so it was fi t-ting that his father’s basement was the starting place of his business. His grandfather, an entrepreneur in the diamond business and his father, an instrumental part in redefi ning point-of-sale management software, both inspired Carnevale to pursue his dream of being the biggest and best in the security industry.

It all began with an idea to become the best video management software (VMS) manufacturer in the in-dustry. This big idea grew into a valuable learning ex-perience for Carnevale, with great opportunities from W Hotels, Des Plains Public Works and the Chicago Housing Authority.

While work remained consistent from 2004 to 2007, security installations took place predominantly in the Chicagoland area and growth for Carnevale’s small company was on the horizon.

Sentry360 evolved and took on new partners in 2008—partners with development backgrounds, and an expertise in sensors, algorithms and embedded hardware engineering. With a focus on user experi-ence and fi nding a niche, Carnevale was preparing to embark on a tour with new camera technology, while battling a harsh recession. One thing that was in his favor then, and still benefi ts Sentry360 today, is that all Sentry360 products are made in America, by an American-owned company.

Carnevale was eager to share his “made-in-the-USA” products with the world, hoping they would have a great infl uence on the global market. These products proved to be problem-solvers, as the 360-degree fi sh eye camera solved the blind-spot problem in video surveil-lance, reducing labor and maintenance and giving the end user full coverage with persistent detail.

“Our goal was a camera that meets all open archi-tecture specifi cations, and that works with any VMS,” Carnevale said. “We also wanted to introduce a prod-uct that provides lower power consumption, meets certain form factor criteria, adopts H.264 standards and is cost effective.”

Like many other manufacturers, Sentry360 was hit hard by the recession in 2008. While they were fortu-nate it didn’t stop production or shut the company down entirely, it certainly had Carnevale, now 33 years of age, worried about the future of his business.

“My wife is what kept me going,” he said. “She

said if you give-up now you will regret it for the rest of your life. I knew I had her support, so we kept on moving forward.”

Like other small manufacturers, Sentry360 is now experiencing rapid growth and outgrowing their sur-roundings. They are in the process of looking for a

larger facility for shipping, receiving, distribution as well as a comfortable workspace for all employees. Since 2010, the company has grown over 350% in revenue and says 2013 has been a breakthrough year introducing two new locations in Dubai and Turkey. The company’s success is due, in large part, to the em-ployees who have become a family over the years.

“When we fi rst started out, there were three, may-be four of us in the offi ce,” said Liz Brady, operations coordinator at Sentry360. “It feels like we’re adding

new people every month and have several working overseas, where our business is booming.”

At Sentry360, no one person is one-dimensional, and success is a team effort. In support of this idea, the team holds each other accountable by having what they call a “Boulder Meeting” every Monday morning to start the week off on the right foot. Each person takes the time to talk about their successes and challenges.

“We’re focused as a team,” Carnevale said. “We’ve built a community here, and we like to have fun at work and enjoy our successes together. Even though I feel we’ve grown out of the ‘start-up’ phase I like to keep us still in that mind-set. A few of our principals are: inter-dependency and accountability; continuous im-provement, openness and transparency; adaptability and resourcefulness, innovation, creation and growth.”

In the future, Sentry360 expects to see more de-bate on cloud storage, intelligence at the camera and more communication about edge storage. Carnevale believes that his company will take a forward position in higher-resolution cameras, as well as a lower-cost camera so that the majority of security end users will adopt the IP camera more readily than the outdated analog program. “A big mission for us in 2013 was to let the world know Sentry360 does a lot more than just 360° cameras. In the past 2 years we’ve intro-duced a 180° panoramic series & Ultra HD resolution directional cameras,” said Carnevale. “We may even take a stab at the consumer market.”

Carnevale explained how the company is develop-ing a control panel for IP video to work as a health-monitoring platform. It will double as a confi guration tool and monitoring in the cloud for any problems on the server, switches, hard drive, software or problems within the camera system. This will be introduced to the market by sentryView, a Universal IP camera con-fi guration tool where the installation process of up to 250 camera systems takes less than 120 seconds and then have export features to the VMS of choice.

“We want the experience with our products to be elite,” Carnevale said. “We truly believe that if we make our products easy to use, install, and maintain with a careful balance of innovation that keeps us one step ahead of our competitors that we have a recipe for long-term success.”

While it’s been many years since the business oper-ated out of a basement, Carnevale ensures that the same mindset used back then is still being promoted at Sentry360 today. Sometimes, the road less traveled can lead the way in the end.

Ralph C. Jensen is the editor-in-chief of Security Products magazine.

Out of the BasementThe rise of a surveillance technology start-up

0913sec_106_IndPro_v6.indd 106 8/19/13 9:42 AM

Page 107: ASIS BOOTH 963

© 2013 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design, Seos and iCLASS SE are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.

iCLASS SE® is HID Global’s next generation access control platform that enables authentication of a wide

variety of commercial credential technologies. A highly flexible reader family along with an array of multi-

technology credentials ensure interoperability in a variety of technology environments. iCLASS SE is also

enabled for (NFC) mobile phones and other smart devices. Now, you can use multiple form factors to create

your ideal access control solution today. For more information, visit hidglobal.com/path-sp

Open, adaptable and powerfully secure, iCLASS SE® is the platform that simplifies everything.

The path to interoperability.

HID iCLASS SE

Untitled-6 1 7/15/13 12:24 PM

See us at ASIS, Booth #329

Page 108: ASIS BOOTH 963

10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

www.dsxinc.com

CREATING THE FUTUREOF SECURITY . . . TODAY

10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

www.dsxinc.comwww dsxinc com

Go to http://sp.hotims.com and enter 1 for product information.

Untitled-5 1 12/13/12 11:53 AM

See us at ASIS, Booth #963