sp_1410dgd

92
www.security-today.com Integrated New Product and Technology Solutions for Security Professionals October 2014 Vol. 18, No. 10 Discreet High-Performance Covert Camera Provides full HD images, video analytics and powerful low-light performance Designed for discretion, Samsung Techwin America’s SNB- 6010 provides highly advanced functions and capabilities to deliver clear 2-MP full HD images at 30 fps. Featuring a WDR of 120dB, the SNB-6010 delivers clear, high-quality images in challenging or varying lighting conditions. The camera’s defog function improves images in harsh environmen- tal conditions such as fog and dust. Among the camera’s advanced features are intelligent video analytics, including advanced motion, tampering, virtual line, enter/exit, appear/disappear and face detection. Samsung Techwin America. Go to sp.hotims.com and enter number 300 for product information. Compact and Cost-Effective 4K Surveillance Outdoor-ready, bullet-style camera AXIS P1428-E Network Camera brings the 4K Ultra HD standard to video surveillance with full frame rate performance in an outdoor-ready model. The 4K standard offers a video resolution of 3840 x 2160 pixels at 30 frames per second. The AXIS P1428-E features remote zoom and focus, a built-in slot for a micro SD/SDHC/SDXC memory card and I/O connectors for interfacing with external devices. Axis Communications. Go to sp.hotims.com and enter number 301 for product information. Dual Door Control Bathroom System Ideal for use in a two-door restroom facility Dortronics Systems’ communication-capable, fail-safe control system is ideal for public restroom applications. The 43211-CB Communicating Bathroom System provides power to operate most low voltage locking mechanisms including maglocks, strikes and electrified locksets, and is ideal for use in a two-door restroom facility such as those located in dor- mitories or healthcare facilities. Either of the “privacy” push buttons will energize door locks for both doors and illuminate the “occupied” high intensity LED indicators outside the bathroom. The privacy push buttons illuminate to indicate to the user when the doors are locked. Dortronics. Go to sp.hotims.com and enter number 302 for product information. OBI Technology Intelligently tracks motion VITEK’s OBI technology intelligently tracks motion, then optically zooms in to capture full 2.1 megapixel video. The capture window can be set to any off-center area enabling zoom on critical points of an overall im- age. VITEK OBI Technology is available in OnCue (HD-SDI) and ENVI (IP) versions. Vitek. Go to sp.hotims.com and enter number 303 for product information. Today’s Analog Customer Tomorrow’s IP technology Speco’s HS hybrid DVR was designed specifically as a cost- effective solution to easily migrate existing analog systems to IP. With both 1080p and 960H tech- nology, the DVR provides the most optimal image resolutions available today.  All (8 or 16) channels are fully configurable for either 960H or IP, and up to 5-MP resolution on the last channel. Dual net- work ports isolate IP camera and remote network traffic, while EZ Wizards make installation simple. The DVR offers looping outputs, 2-way audio, and Onvif support. Speco Technologies. Go to sp.hotims.com and enter number 304 for product information. Low Frequency Sounder Sounder strobes are first listed to UL low frequency System Sensor SpectrAlert Advance Low Frequency Sounders and Sounder Strobes are the first listed to the UL low frequency, 520Hz requirements found to be more effective for waking occupants. The sounders are compatible with 12/24 volt systems and with the System Sensor synchronization protocol for easy integration with traditional notification lines. Both sounders include uni- versal mounting plates with plug-in design. System Sensor. Go to sp.hotims.com and enter number 305 for product information. Fire Protection Guards Perfect for schools, commercial buildings and HUD projects Chase Security enclosures are designed to protect thermostats, smoke detectors, pull stations, horn strobes and other devices. These guards are used in locations such as K-12 schools, commercial buildings, hotels, parks, condo associations, HUD projects, correctional facilities, and universities. Chase guards come in complimentary finishes such as red or white polyester, as well as nickel lacquer to match the en- closed device. Chase Security Systems. Go to sp.hotims.com and enter number 306 for product information. We care. Staying with you all the way. www.axis.com/support Electronic security that secures more business. Schlage ® NDE wireless locks with ENGAGE™ technology open up a whole new business opportunity: more doors. With NDE wireless locks, you can offer your clients the benefits of electronic access control in interior spaces – leading to higher client satisfaction and, of course, higher market share. Learn how to secure more doors at allegionengage.com/sp or call us at (877) 556-1272. Go to sp.hotims.com and enter 65 for product information.

Upload: astralis007

Post on 15-Jan-2016

243 views

Category:

Documents


16 download

DESCRIPTION

SECURITY PRODUCTS 10/2015

TRANSCRIPT

Page 1: SP_1410DGD

www.security-today.com

Integrated New Product and Technology Solutions for Security Professionals October 2014 Vol. 18, No. 10

Discreet High-Performance Covert Camera Provides full HD images, video analytics and

powerful low-light performanceDesigned for discretion, Samsung Techwin America’s SNB-

6010 provides highly advanced functions and capabilities to deliver clear 2-MP full HD images at 30 fps. Featuring a WDR of 120dB, the SNB-6010 delivers clear, high-quality images in challenging or varying lighting conditions. The camera’s defog function improves images in harsh environmen-tal conditions such as fog and dust. Among the camera’s advanced features are intelligent video analytics, including advanced motion, tampering, virtual line, enter/exit, appear/disappear and face detection. Samsung Techwin America.Go to sp.hotims.com and enter number 300 for product information.

Compact and Cost-Effective 4K SurveillanceOutdoor-ready, bullet-style camera

AXIS P1428-E Network Camera brings the 4K Ultra HD standard to video surveillance with full frame rate performance in an outdoor-ready model. The 4K standard offers a video resolution of 3840 x 2160 pixels at 30 frames per second. The AXIS P1428-E features remote zoom and focus, a built-in slot for a micro SD/SDHC/SDXC memory card and I/O connectors for interfacing with external devices. Axis Communications.Go to sp.hotims.com and enter number 301 for product information.

Dual Door Control Bathroom System Ideal for use in a two-door restroom facility

Dortronics Systems’ communication-capable, fail-safe control system is ideal for public restroom applications. The 43211-CB Communicating Bathroom System provides power to operate most low voltage locking mechanisms including maglocks, strikes and electrifi ed locksets, and is ideal for use in a two-door restroom facility such as those located in dor-

mitories or healthcare facilities. Either of the “privacy” push buttons will energize door locks for both doors and illuminate the “occupied” high intensity LED indicators outside the bathroom. The privacy push buttons illuminate to indicate to the user when the doors are locked. Dortronics.Go to sp.hotims.com and enter number 302 for product information.

OBI TechnologyIntelligently tracks motion

VITEK’s OBI technology intelligently tracks motion, then optically  zooms in to capture full 2.1 megapixel video. The capture window can be set to any off-center area enabling zoom on critical points of an overall im-age. VITEK OBI Technology  is available in OnCue (HD-SDI) and ENVI (IP) versions. Vitek.Go to sp.hotims.com and enter number 303 for product information.

Today’s Analog CustomerTomorrow’s IP technology

Speco’s HS hybrid DVR was designed specifi cally as a cost-effective solution to easily migrate existing analog systems to IP.  With both 1080p and 960H tech-nology, the DVR provides the most optimal image resolutions available today.   All (8 or 16) channels are fully confi gurable for either 960H or IP, and up to 5-MP resolution on the last channel. Dual net-work ports isolate IP camera and remote network traffi c, while EZ Wizards make installation simple. The DVR offers looping outputs, 2-way audio, and Onvif support. Speco Technologies.Go to sp.hotims.com and enter number 304 for product information.

Low Frequency SounderSounder strobes are fi rst listed to UL low frequency

System Sensor SpectrAlert Advance Low Frequency Sounders and Sounder Strobes are the fi rst listed to the UL low frequency, 520Hz requirements found to be more effective for waking occupants. The sounders are compatible with 12/24 volt systems and with the System Sensor synchronization protocol for easy integration with traditional notifi cation lines. Both sounders include uni-versal mounting plates with plug-in design. System Sensor.Go to sp.hotims.com and enter number 305 for product information.

Fire Protection GuardsPerfect for schools, commercial buildings and HUD projects

Chase Security enclosures are designed to protect thermostats, smoke detectors, pull stations, horn strobes and other devices. These guards are used in locations such as K-12 schools, commercial buildings, hotels, parks, condo associations, HUD projects, correctional facilities, and universities. Chase guards come in complimentary fi nishes such as red or white polyester, as well as nickel lacquer to match the en-closed device. Chase Security Systems.Go to sp.hotims.com and enter number 306 for product information.

We care.Staying with you all the way.www.axis.com/support

Electronic security that secures more business.

Schlage® NDE wireless locks with

ENGAGE™ technology open up a

whole new business opportunity:

more doors. With NDE wireless

locks, you can off er your clients

the benefi ts of electronic access

control in interior spaces – leading

to higher client satisfaction and,

of course, higher market share.

Learn how to secure more doors at allegionengage.com/sp or call us at (877) 556-1272.

Go to sp.hotims.com and enter 65 for product information.

1014sec_c1_v2.indd 1 9/16/14 1:23 PM

Page 2: SP_1410DGD

Visit www.axis.com/support

We care.Staying with you all the way.

5

Axis Technical Support provides efficient assistance for your Axis product –

from extended warranties and repair, to our Helpdesk and Chat. With 23 support

personnel based locally in North America speaking 7 languages, and over 90 support

personnel across the globe speaking more than 15 languages, you can rest assured

that you’ll receive assistance wherever you are, whenever you need it.

ChatFAQ

Helpdesk

Phone

Warranty

RMA Extended

Warranty

Distributed by:

Count on it.

Visit Axis at ISC EastBooth #314

November 19-20New York, NY

Go to http://sp.hotims.com and enter 9 for product information.

Untitled-6 1 9/3/14 2:51 PM

Page 3: SP_1410DGD

Memories. iFly Singapore, the world’s largest indoor skydiving simulator, uses Milestone XProtect® Enterprise surveillance software to monitor

park grounds and give visitors a lasting memory. Flying at speeds of up to 186 miles per hour, the software records each skydiver’s

flight and information using Radio Frequency Identification (RFID). After their flight, a video souvenir helps

visitors relive all of the adrenaline-fueled moments. Proving again that XProtect

is more than security.

Milestone XProtect® is the world’s leading IP video surveillance management software and is reliable, future proof and easy to use. It supports the widest choice in cameras and seamlessly integrates with business and security solutions such as RFID. Which means your possibilities are unlimited and you can keep your security options open.

See our new products and the new ways to use XProtect at: www.milestonesys.com

Milestone Systems U.S.Tel: 503 350 1100

Morethan security

Go to http://sp.hotims.com and enter 13 for product information.

Untitled-1 1 9/4/14 10:43 AM

Page 4: SP_1410DGD

4 1 0 1 4 | S E C U R I T Y P R O D U C T S

www.security-today.com CONTENTS OCTOBER 2014

FEATURES

The Roots of Remote Monitoring 14Implementing large-scale monitoring systemsBy Kenichi Mori

Security is Personal 22Today’s focus is priority for the small business ownerBy Andrew Wren

Providing Effi cient Technologies 28Wireless access control in several forms aid tight budgets for facility managersBy Benjamin Hopkins

Cutting-Edge Surveillance 39Video solutions help reduce crime in New York CityBy Alex Asnovich

Securing the Old with the New 46New England healthcare system addresses unique security issuesBy Jim Stankevich

The Truth About Biometric Exit 52Technology to verify departures by foreigners has become affordableBy James Albers

Dual View and Density 58U.K. legislation will be phased in for freight-handling companiesBy John Leach

Security Within Reach 60Terminals have been ramping up security for more than a decadeBy Mark H. Johnson and Greg Russell

SPECIAL SECTION

Government Security G1-G16

PRODUCT SECTIONS

IP Cameras 32

DVRs/NVRs 44

DEPARTMENTS

Industry Focus 8The Quicker Things Change, the More They Stay the SameBy Ralph C. Jensen

Industry Vertical 10Putting Out the Welcome Mat for Video SurveillanceBy Fredrik Nilsson

Top Picks 12

New Products 62

Advertisers’ Index 73

Industry Professional 74All American to the CoreBy Ralph C. Jensen

Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.

© Copyright 2014 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission.Mail requests to “Permissions Editor,” c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254

The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the reader’s sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

1014sec_004_TOC_v2.indd 4 9/16/14 1:26 PM

Page 5: SP_1410DGD

isthe

The One source for all of your transmission requirements,Fiber Optic Video, Audio and Data, Fiber Optic, Copper and Wireless Ethernet.

The top One for product quality. The One to turn to for the best service, and for product support. The only One for “Made in the USA Quality” and you found the One for the Lifetime Product Performance Guarantee.

The One place to turn to and the One to solve all of your transmission challenges.

See Us at ISC East | New York, NY | Booth 517 | Nov 19 – 20

Contact the ComNet Design Center for Free Assistance in Choosing

the Correct Fiber Optic, Copper or Wireless Connectivity Solution

Call 1-888-678-9427 or 1-203-796-5300, or email [email protected]

comnet.net/register.html

[email protected]

1-203-796-5300

1-888-678-9427

The Single-Source Solution For All Your Transmission Products

Go to http://sp.hotims.com and enter 43 for product information.

Untitled-10 1 9/9/14 4:18 PM

Page 6: SP_1410DGD

6 1 0 1 4 | S E C U R I T Y P R O D U C T S

With school back in full swing, quite a few of our Online Exclusives discuss

the importance of securing campus-es, whether it’s an elementary school or a large university. Toby Heath discusses “DETECT, DETER, and

DELAY”, a fundamental and successful security strategy. The topic of active shooter training is ex-plored in another Online Exclusive by Paul Hughes, and serves as just another way to keep students and faculty safe while they’re on campus.

Our REACTION blog addresses current events and receives great feedback from our active online community. We’d like to invite you to check out our recent posts and share your thoughts.

If you’re interested in contributing to our Online Exclusives or our blog, please contact me at [email protected] or 972-687-6784.

Best Regards,

Lindsay Page

Online Exclusives

Highlighting the Hotsheet:

2nd Quarter Cargo Theft UpdateBy Jack DeMao

The second quarter statistics on cargo theft in 2014 (Q2-14) are in from the Supply Chain- Informa-tion Sharing and Analysis Center (SC-ISAC).  For those unfamiliar, SC-ISAC is a liaison for informa-tion sharing between Department of Homeland Security (DHS) and the nation’s supply chain. DHS identifi ed Transportation Systems as one of sixteen critical infrastructures to the nation’s supply chain, and cargo theft as a constant threat to stability.

Back-to-School BasicsBy Toby Heath

The challenge of providing a safe and secure learn-ing environment, while presenting an open, inviting campus atmosphere, is almost unique to the col-lege/university environment. However, it is always important to remember the core fundamentals for a successful security strategy: DETER, DETECT, and DELAY. While it is imperative to consider all three of these, this article discusses the three high-lights for the fi rst fundamental, deter.

There’s more to School Safety than

Active Shooter TrainingBy Paul Hughes

Soon after the Columbine shooting, security experts, school administrators and other observers at the time began looking for lessons in the “teachable mo-ment.” Since then, with shootings from Virginia Tech to Sandy Hook to Isla Vista, we’ve had a teachable decade-and-a-half to learn from these incidents, yet

there’s little evidence schools are getting any safer. Some experts say they may even be getting less safe. What are we not learning? Are we even asking the right questions?

http://security-today.com/01131

Recent Headlines

FBI Facial Recognition System Completed

The Home Depot Hack was Easy

Security Footage is a Valuable Asset that Must Not be Taken Lightly

http://security-today.com/news

Upcoming Webinars

Optimize Your Physical Identity Management

from Your Secure and Budget-Friendly CloudJoin Quantum Secure for this FREE webinar on how a Virtual Private Cloud is the ideal solution to manage the physical security and compliance re-quirements for any organization in a secure and cost effective way.

Achieving Interoperability in Prevention,

Preparation and Response to School ShootingsThis presentation will focus on prevention, prepara-tions and response to a school shooting.

Don’t Get Left in the Dark: HD Surveillance

Options for Different Lighting ConditionsJoin us to learn what cameras to choose for your en-vironment, and how to combine them with powerful VMS software, to get the most out of your security investment.

To view these Webinars at any time, please visit http://security-today.com/webinars.

REACTION Blog – Recent Posts

Wife Sues Gun Dealer over Slain Husband

Beefed Up Security in Schools Shows the Effects of Sandy Hook Remain Fresh

Six Flags Great Adventure Refuses to Allow Former Marine Inside Park

Members of our staff and guest bloggers take advantage of REACTION to add their own per-spectives on a broad range of security topics and issues. If you’d like to be a contributor, please contact Group Social Media Editor, Ginger Hill at [email protected].

Online Communities

Follow us on Twitter: www.twitter.com/SecProds

Become a fan on Facebook:http://www.facebook.com/secprodonline

Pin with Us:http://pinterest.com/securitytoday/

Go to sp.hotims.com and enter 25 for product information.

1014sec_006_eTOC_v2.indd 6 9/16/14 4:33 PM

Page 7: SP_1410DGD

www.icrealtime.com866.997.9009

Brand-newdealer portal.**

You talked.We listened.

*

Lifetime technical support.Unparalleled

customer support.

Track all ordersInventory managementAccount informationBilling

*excluding hard drives**coming third quarter of 2014

Go to http://sp.hotims.com and enter 47 for product information.

Untitled-2 1 3/13/14 10:39 AM

Page 8: SP_1410DGD

INDUSTRYFOCUS By Ralph C. Jensen, Editor-in-Chief

8

www.security-today.com

Volume 18, No. 10

EDITORIAL STAFF

Editor-in-Chief/Associate Publisher Ralph C. Jensen

E-news Editor Brent Dirks

Senior Editor Lindsay Page

Content Development Matt Holden

ART STAFF

Art Director Dale Chinn

PRODUCTION STAFF

Director, Print and Online Production David Seymour

Production Coordinator Teresa Antonio

EDITORIAL ADVISORY BOARD

Thomas Carnevale, president/CEO, Sentry 360

William Crews, President/CEO, Security & Resilience Consulting, LLC, Houston

Merlin Guilbeau, Electronic Security Association, Irving, Texas

Robert Hile, director of strategic accounts, Sure View Systems

Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston

SALES

Randy Easton 678-401-5543

Brian Rendine 972-687-6761

Sam Baird +44 1883 715 697

Jane Dai +86-755-26289889

Peter Kao +886-2-2949-6412

SECURITY, SAFETY, AND HEALTH GROUP

President & Group Publisher Kevin O’Grady

Group Circulation Director Margaret Perry

Group Marketing Director Susan May

Group Website Manager Scott Newhouse

Group Webinar Administrator Tammy Renne

Group Social Media Editor Ginger Hill

President & Chief Executive Offi cer Neal Vitale

Senior Vice President & Chief Financial Offi cer Richard Vitale

Executive Vice President Michael J. Valenti

Vice President, Erik A. LindgrenInformation Technology & Application Development

Vice President, Event Operations David F. Myers

Chairman of the Board Jeffrey S. Klein

REACHING THE STAFF

Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.

E-mail: To e-mail any member of the staff, please use thefollowing form: [email protected]

Dallas Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254

Corporate Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. PT)Telephone (818) 814-5200; Fax (818) 734-15229201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

The Quicker Things Change, the More They Stay the SameOne of the perks of my job is the opportunity

to travel around the country and visit various product manufacturers. Not long ago, I took

a swing through Southern California with an itinerary of visiting seven or eight companies.

I made every appointment, but one. Traffi c is so bad in California it’s diffi cult to travel from one side of the valley to the other. Of course, it didn’t help that I wrote down the wrong address and city. Thanks to Google Maps, I arrived on time and without incident, though, to most of my appointments.

The MegaLabA couple years ago, I wrote a story about Glendale-based Arecont Vision’s MegaLab, where technicians and engineers spin up VMS solutions and push them to their limit. Arecont Vision now has 130 cameras at work in the lab. It’s all about technology partnerships.

One thing that has changed at MegaLab is Arecont Vision testing its own Omni camera. The camera has been so successful that they sold 600 units on the fi rst day it was offered. And, true to form, the camera was put through the ringer at MegaLab.

Arecont Vision introduced its version of a low-light lab, unveiling a camera that excels at night through a new algorithm. For management, it is a Spatio Tem-poral Low Light Architecture (STELLAR), and it will be part of the MegaDome 2 series.

However, as things change in the world of tech-nology, there are still some matters that remain the same. For instance, VMS companies that want to par-ticipate with the MegaLab can do so 24/7 worldwide. Companies are able to remotely access the system and spin up their software. They also can examine remote focus and remote zoom on a camera. There are cur-rently 25 VMS programs installed at MegaLab.

“We’re also fi nding that our VMS partners are re-leasing better quality software,” said Diego Simkin, technology partner manager. “MegaLab is really an Easy Button concept.”

After All the Glitz and GlamourMy journey in California also took me out of the city to visit Greg Bier, the CEO and director at Vitek. This company has been around since 1999, and claims its key verticals in automation and electrical supply.

“I’m glad to say we’ve come a long way since those humble beginnings, but one important thing has never changed,” Bier said. “Our commitment to our custom-ers is to go above and beyond their expectations with every opportunity. These relationships forged over many years are our most cherished asset, and we will never forget those who have been supportive of us and those whom we’ve been able to support over time.”

I had an insightful meeting with Greg. Seems he left New York after high school to become a musi-cian. That goal worked out well, but after the glitz and glamour, the security industry became his goal.

Bier and his company, located in Valencia, are de-veloping and manufacturing video surveillance prod-ucts that meet all expectations of the end user, and come at a value that will never change.

In the Wee Hours of the MorningEarly one morning, I ran into an old friend, Doug Wheaton at HIKVision. I almost didn’t recognize Doug as he has dropped a bunch of weight. He looks awesome and is a good model for some of us who need to drop more than a few pounds.

HIKVision had a good name in cameras and equipment; but then, it seemed, they disappeared. I can tell you that they are back in the chase. The com-pany has been around for about 13 years. They started with 28 employees and have grown into a global en-terprise of more than 8,000 workers, including 2,800 research and development engineers.

It was great to see Doug again, and I can assure you they will be making an impact in the U.S. market again very soon.

Built by HandBecause I depend upon PR agencies for so much, I was steered in the direction of Louroe Electronics, located in Van Nuys. In my travels, I’ve seen a lot of automation, especially when building circuit boards, but this is not the case at Louroe.

CEO Richard Brent gave me a tour of the facility. When we entered the high-tech area, I was surprised to fi nd workers building circuit boards by hand. Using a slide line, employees would meticulously add various parts, one after another, using their hands as tools.

“It’s all about teamwork at Louroe,” Brent said. “Our employees like what they are doing, and they enjoy working together.”

Brent said that business in California is sometimes challenging, but they meet a minimum pay standard of $18 per hour and pay for employee healthcare. He said that he is pleased that the company can do all of this and keep people employed.

“We invest in our employees,” Brent said. “We have a very diverse group of people, and I believe that works to our advantage.”

I love these work trips where I can see fi rst-hand at what pace the security industry is moving. Since the draught in 2008, it seems to me that the industry is picking up; buyers are spending more money; and people are working more. All of this is exciting news.

1014sec_008_IndFocus_v2.indd 8 9/16/14 1:09 PM

Page 9: SP_1410DGD

Video Insight v6 now withaccess control–FREE!The new Video Insight v6 is now bundled with MonitorCastEDU, an enterprise access control application designed for the education market. Video Insight recognizes the unique security, budgetary and infrastructure challenges faced by educational institutions. The new v6 leverages existing network infrastructure and Mercury-based access control system and provides necessary features to enhance your campus security with no additional cost.

• Unlimited scalability• No limit for the number of doors, administrators, or simultaneous connections• No hardware purchase required from Video Insight• It’s FREE of charge with Video Insight Server v6 or Advidia Cameras (each camera license is bundled with a door license.)• Support Mercury access control boards• No client or server licenses required • Zero recurring access control fees with current Video Insight SUP• It runs on your existing Video Insight Server

For more information visit us at: www.video-insight.com/access-control.phpGo to http://sp.hotims.com and enter 7 for product information.

Untitled-1 1 9/16/14 11:07 AM

Page 10: SP_1410DGD

1 0

Neon green hula-hoops twirled outside a Des Moines, Iowa apart-ment complex as kids hopped in bounce

houses from systems integrator ICS Advanced Technologies. On that sunny afternoon in July 2013, while local vol-unteers served pizza, residents of the low-income housing units, managed by Conlin Properties, celebrated their an-nual Tenant Social sponsored by the lo-cal Crime Free Multi-Housing program.

As an international initiative de-signed to reduce crime, drugs and gangs on apartment premises, the Crime Free Multi-Housing program is operated by local police departments and has been embraced by various property manage-ment companies since its introduction to the Des Moines area in the late 1990s. This program awards certifi cation based on physical security procedures, intensive management training and community outreach events. It also strongly encour-ages the use of advanced security tech-nology, such as IP surveillance cameras, to further improve the quality of life.

For Conlin Properties, IP surveil-lance cameras from Axis Communica-tions have played a critical role in the program’s success. Executives estimate that they have seen a 40 percent reduc-tion in incident calls since they started using and publicizing these cameras. They have seen their waiting lists grow full with quality tenants committed to maintaining a safe and happy living environment.

“The Axis cameras have become a huge selling point with current and future residents,” said Beth Ehlers,

vice president of Conlin Properties. “They’re really impressed when they see the large screen monitor in the rental offi ce displaying all those camera views of the property.”

Building the Foundation for IP VideoInitially, Conlin Properties relied on analog cameras for their prop-erties; but, in 2009, ICS Advanced

Technologies recommended upgrading to digital technology with Axis network cameras. With an IP infrastructure, in-dividual site managers could manage all the cameras on their property from a central location, and Conlin executives could access cameras from across the en-tire system at any time. The video could be called up whenever necessary on a mobile phone or tablet, and ICS would be able to monitor performance remotely with daily system checks.

Additionally, Axis cameras offered features well-suited for apartment com-plexes such as HDTV-quality video, split panoramic views with image de-warping and “Corridor Format.” These features increased the value and usability of vid-eo for both security and business intel-ligence purposes.

“When we analyzed the total cost of ownership, including the cost of service combined with the higher image qual-ity offered, Axis cameras made good economic sense,” said Patrick Bailey, ex-ecutive vice president of ICS Advanced Technologies.

Creating a Safe Haven for Tenants Starting in 2010, ICS began installing the fi ber optic network and adding IP cameras at a rate of 200 to 300 per year for a current total of 1,000. During the design phase, they worked closely with the property managers to choose the right cameras for each location.

“As a rule, in the hallways, we try to keep everything 720p or higher resolu-tion because that gives us a lot of good quality data to work with,” Bailey said.

A mix of AXIS M30 Series Network Cameras has helped prevent vandalism, smoking and fi ghts in hallways. The vandal-resistant, palm-size cameras are often set to the vertically-oriented Cor-ridor Format for full views of the hall-ways, without unnecessary footage of walls or empty space. Panoramic AXIS M3007-PV cameras provide complete 360 degree overviews of short hallways and recessed alcoves.

“We’re able to capture all the hallway entrances with a single camera,” Bailey said.

The image de-warping function al-lows the cameras to produce up to four separate views from sections of the cov-erage area without the “fi sh-eye” effect produced by wide-angle lenses.

When selecting cameras facing exte-rior doorways, ICS chose HDTV-720p AXIS P3364-V Fixed Dome Network Cameras. This option ensured they had a camera with the resolution necessary to fully capture the faces of those entering the building. The cameras also provided Lightfi nder technology to see color de-tails in low light and a vandal-resistant casing to withstand abuse.

Salient Systems’ CompleteView VMS software ties the system together with fast retrieval of video evidence for investigat-ing security events even over remote or wireless network connections. Most prop-erties store the video on local Salient serv-ers, but locations with fewer cameras are hosted in ICS’ data cloud servers.

“With the Salient VMS, the way the property managers access the cameras is seamless across the system,” Bailey said. “Their experience is the same whether they’re accessing hosted video or their on-site video.”

All the properties are connected through ICS’ Virtual Private Network service and easily accessed via the ICS Proxy. This puts all the cameras at their fi ngertips quickly and easily without the need to log into the VPN.

Crime Prevention at the Touch of a Button The fl exibility of the system and high-quality images has played a signifi cant role in reducing crime and making resi-dents feel safe.

With the new system, property man-agers can instantly call up video on their mobile devices when suspicious activity occurs. In the past, Conlin Properties’ staff had to go through a time-consum-ing process of locating video, determin-ing what technology the police had avail-able and burning a compatible fi le to CD. Now, video can be shared instantly with police at the scene to confi rm a suspect’s identity on the spot. In one instance,

Putting Out the Welcome Mat for Video SurveillanceIP video plays a key role in making rental properties safe and profi tableBy Fredrik Nilsson

Fredrik Nilsson is the general manager for Axis Communications, Inc. in North America and the author of “Intelligent Network Video: Understanding Modern Video Surveillance Systems,” published by CRC Press.

1014sec_010_011_IndVert_v3.indd 10 9/16/14 1:11 PM

Page 11: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y. C O M 1 1

they were able to successfully compare a small insignia on the shirt of a sus-pect, who was covering his face on vid-eo, with the shirt of a man police had in custody.

“After an incident, managers can log right into their mobile devices,” Bailey said. “It’s a lot easier to access the data and get it to the offi cers. That has helped increase the successful arrest rate quite a bit.”

Effi cient, Cost-Effective Property Maintenance In addition to security, exterior cam-eras are helping Conlin Properties im-prove their business operations by al-lowing them to observe vendor service in real time.

“They’ve come in handy for over-seeing snow removal and landscape maintenance,” said Jeremey Hummel, director of apartment operations “Now we have video proof as to the number of hours and the quality of work, so vendors can’t overcharge us or deliver sub-par service. That advantage goes straight to our bottom line.”

The cameras are also able to direct their staff more precisely to address is-sues as they arise.

“Instead of saying, ‘There’s a prob-lem in Building 3 that needs to be looked at,’ managers can direct mainte-nance staff to the specifi c location that needs attention,” said Bailey. “Manag-ers were telling me that the cameras are a huge time saver for performing regu-lar maintenance.”

Visibility Increases Security According to Ehlers, publically adver-tising the cameras and promoting their results has contributed greatly to the system’s success. Criminals and trou-blemakers are learning to avoid proper-ties with cameras as the reputation of the security system spreads.

A video recording that identifi es ten-ants or guests engaging in misbehav-ior means culprits cannot lie or direct blame elsewhere. The forensic evidence can also be used to evict bad tenants, though the process is often self-select-ing as troublemakers generally do not want to stay in buildings where surveil-lance cameras record, holding them ac-countable for their behavior.

“A lot of crime is opportunistic,” Bailey said. “An ill-intentioned per-son walking down the hallway may see somebody’s door is not quite shut and slip in to steal something. Yet, having

signage at eye line in hallways and en-trances announcing cameras are moni-toring the property seems to make a pretty big difference.”

Additionally, advertising the cameras has proven to be a draw for tenants who want the promise of safety and security offered by well-monitored properties.

“We always put in a big screen TV or monitor in the [manager’s] offi ce that displays the cameras,” said Bailey. “The great thing is that as the tenants come in, they see that their property is monitored and can tell that their property is safe.”

The assurance of safety creates a positive feedback loop that benefi ts

both residents and property manag-ers. The reduction in crime increases the desirability of the property, and in turn attracts quality tenants who are interested in maintaining a high stan-dard of living.

“When your home is safe, you are a happier person,” Bailey said.

This solution is

available directly from

DM Network Video

Introducing the NVR MEDIA SERVER AND SMARTVU

There’s more to Dedicated Micros...

ask about our Video Smoke Detection products...Cal l 1-877-367-8778 or v is i t

www.dm-networkvideo.com

Installation benefi ts:

• Fast to install: built in 16 port Layer 3 POE(Closed IPTV) switch

• Easy to expand: up to 32 cameras

• Auto detection and self confi guration of DM’s CamVu IP cameras , PTZ domes and SmartVu series

• Starts recording with no further configuration

• Same local, remote configuration and user interface

• Secure lock down of IP cameras with unique key applied, to avoid network vulnerability

• MultiMode recording can save 50% of storage. Dynamically select which recordings are HD to save on storage

• Ask us about the NEW SmartVu line of HD IP cameras

End user and operator benefi ts:

• Corporate network segregation and security through dual IP addressing scheme

• High defi nition HDMI local display output and local joystick PTZ keyboard

• Internal storage capacity up to 6TB, expandable via USB

• Built in DVD writer and USB ports for evidence retrieval

• Control this and unlimited NetVu Connected systems through NetVu ObserVer video management software

• The perfect HD IP solution for a number of practical applications including: schools, offi ce locations, warehousing, retail.

• 100% scalable, NetVu Connected IP cameras managed remotely from the same VMS, NetVu ObserVer with no extra investment

© Copyright AD Group 8th November 2014

Secure HD IP SurveillanceHigh defi nition, secure, plug and play IP network video solution

Go to sp.hotims.com and enter 17 for product information.

1014sec_010_011_IndVert_v3.indd 11 9/16/14 1:11 PM

Page 12: SP_1410DGD

1014 TOP PICKS Compiled by Security Products’ Staff

1 2 1 0 1 4 | S E C U R I T Y P R O D U C T S

DortronicsElectromagnetic mortise

lock and pull

• The electromagnetic mortise lock and aes-thetically attractive door pull features a holding force of 1,000 pounds.

• The pull handle allows concealment of the locking hardware, making it an appealing op-tion for lobby and vestibule entrances.

• While the fail-safe Dortronics electromagnetic locking device ensures instant release upon command or loss of power, the “direct pull” design insures maximum holding force for en-hanced security.

• With no moving parts to wear, stick or bind, and no mechanical linkages to bend or break, locking/unlocking is accomplished with ease and effi ciency. Dortronics.Go to sp.hotims.com and enter number

308 for product information.

YaleReal Living Key Free

Pushbutton Deadbolt B1L

• Yale provides a key free deadbolt with built-in Z-Wave that also features the smallest resi-dential keypad for a Z-Wave lock.

• With the fast one-button Z-Wave enrollment, the lock can be enrolled prior to connecting the lock’s single wire by simply bringing the inte-rior half of the lock to within pairing distance of the control panel and pressing the new one-touch enrollment button.

• The lock also features universal code entry and setting symbols for ease of use.

• Programmable up to 100 users, the lock can withstand many demanding environments and locations.Yale.Go to sp.hotims.com and enter number

309 for product information.

Sargent and GreenleafModel 2890B PDL

Pedestrian Door Lock

• First lock is designed to meet U.S. Federal Specifi cation FF-L-2890B for high security, pedestrian door locks, and to combine security of S&G Model 2740B electromechanical com-bination lock on the outside of the door.

• The lock provides single motion egress, while meeting the highest government security standards. A push of the panic bar releases the entire locking mechanism to allow for fast, intuitive egress.

• Some of the same heavy-duty components found in the Type I- IV units can be used to construct a high security, auto-escape door lock mechanism.Sargent and Greenleaf.Go to sp.hotims.com and enter number

310 for product information.

Southco Inc.Self-Contained Electronic

Locking System

• Southco’s fully integrated self-contained elec-tronic locking system incorporates an access control device, electronic lock, electrical over-ride and power supply.

• AA battery-operated unit is available with key-pad or RFID access, features drop in assembly and provides full electronic locking functional-ity for a variety of applications.

• The locking system features a single compo-nent design that can be easily mounted into a standard 25x150 panel prep, simplifying the in-tegration of an electronic access solution into a cabinet design, and eliminating the need for the wiring or connecting of separate components.Southco Inc.Go to sp.hotims.com and enter number

311 for product information.

SchlageWireless Electronic Locks

• Wireless electronic locks by Schlage allow for easy migration from mechanical locks to electronic access control.

• The locks cost less than half the price of perimeter electronic locks.

• Users can add and delete employees in seconds through the ENGAGE web-based and mobile app.

• The electronic locks integrate into most popu-lar access control systems for even greater capabilities.

• The locks accommodate popular proximity and smart cards plus NFC-enabled smart phones.

• There is no need to install additional compo-nents, drill holes or run wires.Schlage.Go to sp.hotims.com and enter number

312 for product information.

ASSA ABLOYIN120 Wi-Fi Lock

• The IN120 WiFi lock, available from ASSA ABLOY Group brands Corbin Russwin and SARGENT, offers the ease and fl exibility of WiFi in a new streamlined design, setting a new standard for aesthetics and performance.

• The IN120 uses 802.11b/g/n WiFi infrastruc-ture and a fl exible feature set for easier, more cost-effective installations, allowing facilities to expand access control coverage to more doors.

• Featuring HID multiCLASS SE technology, the lock offers heightened identity security and simultaneous support for multiple credential types, including NFC-enabled mobile phones.ASSA ABLOY.Go to sp.hotims.com and enter number

313 for product information.

Olympus Lock Inc.MRI Locks (N Series or R Series)

• Olympus announces the addition of our MRI line of cabinet door and drawer locks for use in Magnetic Resonance Imaging (MRI) areas.

• The MRI locks are available on either the N Se-ries 100M and 200M locks or R Series 500M and 600M locks.

• Features for the products include all non-mag-netic materials and components and the same easy rekeyability as our standard series locks.

• MRI locks are available in US26D fi nish and can be ordered on our stock keyed alike num-bers, keyed different or custom keyed to your specifi cations.

• An optional key-retaining function is available.Olympus Lock Inc.Go to sp.hotims.com and enter number

314 for product information.

KwiksetSmartCode 916

• Kwikset’s Smartcode 916 is keyless entry, combined with the added convenience and en-hanced aesthetics of a capacitive touchscreen.

• The lock can auto-detect to quickly sense a correct code and unlock. 

• Cool white LED display for crisp, the lock fea-tures high-defi nition illumination. 

• The lock provides convenient and fast one-touch locking with an intuitive user interface.

• Equipped with SecureScreen, an impor-tant feature, helps protect the lock against “smudge” attacks.

• Home Connect technology allows the lock to communicate with other wireless products in the home.Kwikset.Go to sp.hotims.com and enter number

315 for product information.

1014sec_012_Toppicks_v3.indd 12 9/16/14 1:12 PM

Page 13: SP_1410DGD

[email protected] 1.800.645.5516

OiMD1Intensifier IP® HD Megapixel Indoor/Outdoor Miniature Dome IP Camera3.7mm fixed lens, dark grey housing

OiD4Intensifier IP® HD Megapixel Indoor/Outdoor Vandal Dome IP Camera 3.6-16mm auto iris varifocal lens, dark grey housingTURN ON THE NIGHT!

Intensifier IP® provides crisp, detailed images in HD resolution. With Intensifier IP® technology, customers do not have to worry about losing the visibility of images in variable lighting conditions.

The Intensifier IP® Series cameras allow users to see color video in low light without IR LEDs since they work with a minimum illumination of 0.0005 lux (Intensify @ 128x) and HD color resolution. These cameras amplify existing light with no distance limitations. All objects display in perfect clarity with minimum light.

With built-in standard PoE, WDR operation, 2 way audio communication, and alarm in/out - these cameras are perfect indoors or outdoors. These cameras work seamlessly with Speco’s Plug and Play NS/NSP NVRs, which can autofind the cameras in less than 60 seconds.

Features: » See color in low light without IR LEDs » Supports HD resolution @ 60fps » Built-in standard PoE (IEEE 802.3af) » No problems caused by objects that

reflect or absorb IR light sources » Presets for different scenarios:

Indoor, Outdoor, Elevator, Lobby, Hallway & Low Light » Wide dynamic range (WDR) operation » Supports H.264 and MJPEG codecs » 2-way audio communication » Sensor input and relay output » 3 axis lens mount - for easy installation » IP66 compliant » ONVIF Profile S

Intensifier IP® HD Camera

IR LED Camera Standard Color Camera

INTENSIFIED IP!New!

Go to http://sp.hotims.com and enter 28 for product information.

Untitled-4 1 8/8/14 11:04 AM

Page 14: SP_1410DGD

1 4 1 0 1 4 | S E C U R I T Y P R O D U C T S

REMOTE MONITORING

THE ROOTS OF REMOTE MONITORINGImplementing large-scale monitoring systemsBy Kenichi Mori

The concept of remote monitoring started in the 1970s, when it be-came possible to send black/white analog video images over regular phone lines. Granted, the transmission was painfully slow—taking around 30 to 60 seconds per image—but the roots of remote moni-toring were there. When the fi rst IP camera came to market in the

late 1990s, it did not take long for integrators and end users alike to grasp the benefi ts of accessing video via the Internet.

Over the years, remote monitoring has become increasingly sophisticated as wire-less area network (WAN) bandwidth, transmission speeds and image quality have im-proved. Today’s remote monitoring systems can scale almost infi nitely, making them

cost-effective solutions for securing large, geographically dispersed environments. Monitoring IP cameras from a central location is an effective way to provide

live, 24-hour site protection, without the costs associated with manned patrols. The more sites and the greater the geographical distance, the more the savings scale. For instance, a chain of stores might have hundreds of locations scattered across the country or even the world, yet a single control center can secure each location and respond to emergencies.

The basis of all remote monitoring systems, large or small, is that they funnel video feeds and other security information back to a main control center at a re-mote site. This provides customers with:

1014sec_014_020_Mori_v3.indd 14 9/16/14 1:13 PM

Page 15: SP_1410DGD

Superior identificationLower costs

Get 4K ultra HD images with lower bandwidth and storage requirements. DINION IP ultra 8000 MP delivers a tremendous advantage in detail capture, even when moving objects and challenging lighting pervade the scene. And, intelligent Dynamic Noise Reduction minimizes bit rates to lower bandwidth and storage requirements up to 50%, reducing system costs and network strain. This makes 4K ultra HD imaging relevant for many surveillance applications, enabling you to see every detail, everywhere.Learn more at www.boschsecurity.us

Go to http://sp.hotims.com and enter 2 for product information.

Untitled-5 1 5/14/14 1:01 PM

Page 16: SP_1410DGD

1 6 1 0 1 4 | S E C U R I T Y P R O D U C T S

REMOTE MONITORING

Web-based access to live video. The remote moni-toring application itself resides on a centralized server and users access the application from PCs or hand-held devices via any standard Web browser. The appli-cation interfaces with IP cameras via terminal servers and network connections. More sophisticated remote monitoring applications can integrate with other se-curity devices, as well. For example, control relays at the site can be manipulated remotely via the Web-based access. These can operate gates, sound alarms, or turn on smoke-generating machines.

Multi-user capabilities. Remote monitoring sys-tems are easily scalable to accommodate multiple users simultaneously. Each user is assigned a unique account with access to the various functions governed by their role. This can range from view-only modes to executing system administration. View-only access can also be provided to the general public, such as a department of transportation making highway cam-era feeds accessible to drivers who would like to moni-tor traffi c conditions.

Storage for critical video. Remote monitoring sys-tems need ample hard disk storage in order to save video linked to critical events. Whether this storage system is housed in the main control center or anoth-er offsite location is a question of how fail-safe the storage needs to be. The amount and type of storage needed varies based on video quality, frame rate, the compression standard used by the IP cameras, the number of cameras, the number of hours per day video needs to be recorded, and how long the video will be stored.

Remote monitoring systems work by connecting IP cameras to 24-hour control centers, where video can be viewed and managed based on any number of criteria. For example, a remote operation specialist might receive an alarm—an email message or page—if a camera detects motion, or if a virtual “trip line” is triggered. If an alarm is triggered, the operator specialist can easily pull up video from the associat-ed camera and determine the cause and any relevant next steps. Was the trip line activated by an intruder, or was it a stray dog? Depending on the answer, the course of action will be very different.

If the video indicates that there is a problem, the operator can manage the incident from the control center by implementing a series of approved proto-cols. Can a verbal warning be issued to the intruder via an onsite speaker? Or do local police need to be called? Generally in a remote monitoring scenario, operators are given customized procedures to follow in order to mitigate various security issues. This helps facilitate faster decision making and improves the outcome of the response.

To keep support staff informed, the monitoring system needs to send operators unambiguous and in-formative notifi cations about each problem. Such no-tifi cations must be confi gured according to the source and severity of the issue. An escalation path should be outlined along with the operator’s ability to take action. A report of the incident should be reviewed

afterward in order to ensure that the best possible outcome was achieved.

In concept, remote monitoring sounds simple enough: access and view video online and make se-curity decisions according to the information pro-vided. However, it’s important to correctly set up the infrastructure in order to minimize costs and maxi-mize functionality, now and in the future. The larger the system, the more critical the underlying network infrastructure becomes. The following overview will give end users and installers some things to think about when installing such systems.

NETWORK CONSIDERATIONS The fi rst step in designing a network for remote monitoring is to take inventory of the existing equipment and its functionality. Does the network do what it needs to do? Will it have the capacity to support future needs or advanced features like PoE? If not, upgrades to the cabling, routers and servers could be required in order to make sure everything is in working order.

For large-scale remote monitoring installations, multiple servers should be confi gured in a multi-tiered hierarchical architecture, such as a star or re-dundant star topology. Star confi gurations minimize the load on each switch and reduce the overall server load. They also provide a high level of redundancy for the LAN, which is critical to maintaining network uptime. In addition, star networks make it easier to repair faults and to remove parts because there are no disruptions to the network if a component fails.

By contrast, a daisy chain confi guration should never be used, even though it is one of the simplest ways to add IP cameras to a network. A daisy chain topography presents too many bottleneck issues and has low redundancy, which can lead to more frequent network failures.

Another consideration that will enhance the reli-ability of a remote monitoring system is an uninter-ruptible power supply (UPS). A UPS is an electrical device that provides emergency power if the primary power source fails. Unlike an auxiliary or standby generator, a UPS provides almost instant protection from power outages. The life of a UPS is relatively short—usually up to 15 or 30 minutes—but this is typically suffi cient time until standby power sources are turned on.

Documentation is often overlooked when design-ing the network. However, the correct documenta-tion is immensely valuable for an end user, particu-larly when there is a need for system maintenance, additions or changes. Documenting how all the cables are wired can reduce the number of customer support calls, which is good for both the customer and the integrator.

Good network documentation should include a map of the physical network with all cable locations, a description of the port numbering scheme, a list of camera and server IP addresses, and a reference for camera settings.

Go to sp.hotims.com and enter 26 for product information.

1014sec_014_020_Mori_v3.indd 16 9/16/14 1:13 PM

Page 17: SP_1410DGD

Go to http://sp.hotims.com and enter 15 for product information.

Untitled-2 1 9/10/14 2:41 PM

Page 18: SP_1410DGD

REMOTE MONITORING

1 8 1 0 1 4 | S E C U R I T Y P R O D U C T S

CONNECTING THE NETWORKIn order to connect the LAN to the Internet, a net-work connection via an Internet Service Provider (ISP) or T service must be maintained, otherwise the control center will lose communication with the re-mote sites it is meant to be managing. While a star network can help ensure reliability of the LAN, what would happen to the remote monitoring system should the customer’s chosen ISP go down?

Some ISPs will guarantee “99 percent uptime,” meaning that a customer’s Internet connection will be live and working 99 percent of the time. That sounds like a great guarantee, but looking at those numbers in terms of days per year means that there could be up to 3.5 days a year in which the Internet connec-tion fails. Of course, those Internet outages may not occur in such large blocks of times. It’s more likely to happen a few seconds or minutes at a time, which eventually adds up to 1 percent downtime. But what if the ISP encounters a major problem and does ex-perience an outage for several hours, or even a few days? Can customers function without access to their remote monitoring systems for that long?

The answer, of course, depends on the customer. A retailer may be able to function better than perhaps a school district, where security is of the utmost concern. For those customers needing access to their remote monitoring systems 100 percent of the time, backup

When THE POWER IS IN THE KEY you have the ability to . . .

• Control access to every lock

• Eliminate re-keying costs

• Reduce unauthorized entry

• Monitor and report all access activity

Learn more at www.cyberlock.com/lock4 541-738-5500 • [email protected]

CyberLock®

Go to sp.hotims.com and enter 3 for product information.

1014sec_014_020_Mori_v3.indd 18 9/16/14 1:13 PM

Page 19: SP_1410DGD

4

Like CO and Smoke in a single detector. The award-winning

i4 Series Combination CO/Smoke Detector and i4 Interface Module work

together to provide the first system-connected combination solution for

conventional fire and security systems.

The i4 Detector truly hits the spot for installers as well as homeowners. It uses

the most reliable and accurate CO and Smoke sensing technologies to detect

dangerous levels of smoke or CO. Ongoing maintenance is easy, thanks to its

field-replaceable CO cell. And the i4 Combination Detector’s 2- or 4-wire

design makes installation quick and easy, just like making a PB&J should be.

The i4 system works with most conventional security panels, and the i4 Module even

interconnects sounders on the loop. Plus, you’ll have the freedom to mix and match

up to 12 i4 Combination Detectors and compatible i3 Smoke Detectors per i4 Module.

Sink your teeth into a life safety solution that means less wire, less labor, and fewer

devices on the wall or ceiling. To learn more visit:

i4 Interface Module(Required)

i4 CO/Smoke Detector

Some things arejust great together.

go.systemsensor.com/i4pbj-sp

©2014 System Sensor. All Rights Reserved.

Go to http://sp.hotims.com and enter 11 for product information.

Untitled-2 1 7/9/14 10:24 AM

Page 20: SP_1410DGD

REMOTE MONITORING

2 0 1 0 1 4 | S E C U R I T Y P R O D U C T S

Internet connections must be consid-ered. In many cases, backup connections can be established over a 4G mobile net-work. This protects customers from net-work downtime or even from potential intruders who would look to interfere with communications between the cen-

tral command center and remote sites. Making this a reality does require

some advanced planning, though. IP cameras and other security devices need to be outfi tted with 4G SIM cards, which usually come at an additional cost. Also, contracts with the 4G pro-

viders need to be negotiated to ensure bandwidth is not throttled down. This level of backup will not be necessary in every case, but it is available to those who require it.

Another benefi t of 4G is that it can enable IP cameras to be installed in ar-

eas where broadband connections do not exist, and where it would be cost-prohibitive to install them. This can give customers greater fl exibility when plan-ning their remote monitoring systems.

In fact, 4G may be the major tipping point for professional-grade remote monitoring applications. The tremen-dous increase in over-the-air (OTA) bandwidth means that 4G networks can now provide multi-megabit wire-less data rates that were never possible before. While we are already seeing 3G infrastructure replacing cables in some smaller remote monitoring systems, the technology is still not quite reliable enough for large-scale installations.

DON’T FORGET TO TRAINRemote monitoring systems often in-troduce new equipment and procedures that are likely to be unfamiliar to users, so training is one of the most impor-tant elements of implementing a suc-cessful system. After all, the system can only be as good as those who are operating it. The proper training helps operators make better decisions and use the remote monitoring system to its full capacity.

Training can be particularly impor-tant when it comes to new processes and procedures. Oftentimes operators pick up on the new technology much more quickly than new procedures, which require changes to ingrained be-havior. Also, various user groups will require different levels of training, de-pending on how they will be interacting with the system. This is an important step because the right training will re-duce the number of support calls.

Remote monitoring is one of the many benefi ts of IP-based surveillance solutions, and it’s a feature that many customers want to use. Setting up the network correctly and implementing the right documentation and training procedures will help make the system more reliable and functional and will reduce the level of post-installation support. The larger and more com-plex the remote monitoring system, the more critical these elements are to en-suring success.

Kenichi Mori is the director of marketing and product manage-ment at Sony Electron-ics, Security Systems Division.

Seneca Data Distributors. Inc. | 7401 Round Pond Road | N. Syracuse, NY 13212 | p: 877.814.0348 | www.xvaultsecurity.comIntel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

xVault systems feature the Intel® Xeon® processors.

A new Intel®-based PC starts in a flash, has the power to do more and is less expensive than you think.

For more information about the xVault product line please call 877.814.0348 or visit www.xvaultsecurity.com

ARE YOU SATISFIED WITH YOUR CURRENT SURVEILLANCE SOLUTION?

Bring us your challenges and we will prove xVault is the best solution to meet your project needs. xVault beats the competition with product performance and price. Guaranteed.

TAKE THE XVAULTCHALLENGE!

EXPERIENCE THE DIFFERENCE. EXPERIENCE XVAULT.

TRUE VMS CERTIFICATIONSSeneca builds video servers around each specific VMS. We know what they can do and how to design NVRs for the best performance. We have true VMS certifications including Milestone, OnSSI, and Genetec.

TRUE CUSTOMIZATION AND SUPPORTOur team of experts will determine the right solution based on your requirements. We stand behind our products, guaranteed; from pre to post sales. Seneca leverages our VMS and camera relationships to resolve any support challenges.

TRUE MANUFACTURERSeneca manufacturers all xVault products which means we perform our own engineering to ensure every product will meet the needs of the exact requirements and testing.

EASY INSTALLATION We will configure RAID and optimize your OS to reduce installation time. Our security team can provide many tools to make the installation process easier including a VMS installer utility for an easy step by step process under ten minutes.

Go to sp.hotims.com and enter 40 for product information.

1014sec_014_020_Mori_v3.indd 20 9/16/14 1:13 PM

Page 21: SP_1410DGD

Go to http://sp.hotims.com and enter 18 for product information.

Untitled-3 1 8/19/14 12:36 PM

Page 22: SP_1410DGD

2 2 1 0 1 4 | S E C U R I T Y P R O D U C T S

SECURITY IS PERSONAL Today’s focus is priority for the small business ownerBy Andrew Wren

Security—be it personal, fi nancial, logical or physical—is a top focus of today’s small business owner. The protection of people, property and assets is a key part of any small business’ overall strategy and stability, and the way people think about physical access control is changing because of this focus. The average electronic access con-

trol deal is now less than 10 doors and the average access control customer is a small business owner.

For small to medium-sized businesses (SMBs), access control needs to be af-fordable, scalable and easy to install, manage and maintain. Business is no longer left at the offi ce, as today’s small business owner needs control and visibility of the organization while on the go. This peace of mind, however, can come with a hefty price tag, even though business owners are continually tasked to do more with less money and fewer resources. Because of this reality, a typical access control buyer is looking to invest in only what is required and leverage existing investments when implementing new security solutions.

With the changing needs of access control end-users comes the need for secu-rity dealers to evolve and upgrade their access control offerings. Dealers should ask a few key questions before diving into this new avenue for growth:

• Why is the access control market changing? • Why is SMB a focus? • What’s the competitive landscape? • How can I create a turnkey model for access control? • What type of product should I invest my resources in?

THE GROWTH OF ACCESS CONTROLThe security market has seen incredible growth over the past few years, with par-ticular advancement within IP video surveillance. Video has become an oversatu-rated segment of the industry, with integrators and resellers fi ghting over smaller margins to win deals.

Access control, though, has had a slower entry into the marketplace, perhaps because of its reputation of being an intricate solution with higher design and in-stallation complexity than video surveillance. However, due to changing technolo-gies, it is now easier than ever to enter into the access control market.

Because of the emphasis placed on safety and security in today’s business land-scape, end-users now insist on a complete security strategy, and they are realizing access control is a major component of that. Once an add-on to a video solution,

ACCESS CONTROL

1014sec_022_026_Wren_v3.indd 22 9/16/14 1:27 PM

Page 23: SP_1410DGD

INCH screens for easy identification

7” Screen with Touch Buttons7” Touchscreen

Expand your entry horizonsView visitors clearly on Aiphone’s 7” displays• Larger screens to see images from across the room

• Modern and attractive designs

• Select Touchscreen or Touch Button interfaces

• Unlock doors, gates, and entrances

• Perfect for schools, offices, homes, and retail businesses

Northeast U.S. Security ConventionNovember 19-20, 2014 | New York, NY

Booth #547 EAST www.aiphone.comGo to http://sp.hotims.com and enter 10 for product information.

Untitled-6 1 9/3/14 2:58 PM

Page 24: SP_1410DGD

ACCESS CONTROL

2 4

access control is now seen as a necessity. Because of this changing frame of mind, and because of the improvement of access control technology, the access control market—already a beast at $3 billion (in 2012)—is projected to grow at a 7 percent growth rate to $4.2 billion by 2017, according to market research fi rm IHS.

THE MOVE FROM ENTERPRISE TO SMBTraditionally, electronic access control was a security solution built for the enter-prise. Expensive and complicated panels controlled systems through expensive, initial hardware investments and extensive, proprietary cabling, resulting in com-plex and costly installations by trained experts. Even after installation was com-plete, it was necessary for the enterprise to maintain a dedicated security staff to manage the access control systems.

With the advent of IP access control—a sister solution to the already well-adopted IP video—end-users are now able to leverage their existing network in-frastructure when implementing access control. This means simpler installation processes, utilization of existing cabling and infrastructure, and management capabilities that are easy and convenient. Dedicated security staff is no longer a requirement, and personnel who manage other network equipment can take over and manage these IP-based systems.

Once known as a solution for government entities and large corporations, ac-cess control is now available and accessible to all industry verticals. In fact, access control is becoming a requirement in many verticals. Regulatory compliance is a driving factor of access control growth in education, healthcare, data centers and other markets. And, with such a wide variety of verticals, organizations are required to follow a strict set of protocols and rules to protect privacy, information and assets. This includes HIPAA and countless others.

Access control is not a convenience; it is a necessity. This necessity will only continue to expand as, for example, all of our personal and private information is

stored on computers in data centers across the globe. Physical protection is the fi rst line of defense to logical data protection.

AN ACCESS SOLUTION THAT FITS EVERY NEEDBecause the access control market is changing due to advancements in technology, increasing compliance complexity and the evolving desires of the end-user, access control solutions should also be evolving to fi t these needs. An access control so-lution should be intuitive enough for smartphone-dependent end-users, sophisti-cated enough to meet the strictest of compliance regulations, and lucrative enough for a dealer to invest and support a new product to grow their business.

Networked access control is the smart decision to meet all of these needs be-cause of its fl exibility, affordability and ease-of-use. Unlike traditional access con-trol, networked access control leverages the existing network infrastructure with-out any special network confi guration. This cuts down on installation time and complexity, as well as overall cost of the system. In addition, networked access control is fl exible for the needs of a growing small business. Unlike traditional ac-cess control, where centralized controllers manage a set number of doors, (usually 4, 8, 16, 32) networked access control does not force constraints on multiples of doors. Access control can be added as required by the end-user’s needs, one door at a time, if desired.

The ability for an access control system to directly connect to a company’s ex-isting network is another huge benefi t of investing in a networked access control solution. Not only does the software convey real-time information, but it also al-lows for remote and enterprise management of multiple locations. Encapsulon, the networked access control from Wren Solutions, for example, has the ability to manage up to 250 doors in multiple locations—even on different sides of the world—through one device.

Software should also be intuitive, easy-to-use and easily upgradable. Many

Go to sp.hotims.com and enter 48 for product information.

1014sec_022_026_Wren_v3.indd 24 9/16/14 1:28 PM

Page 25: SP_1410DGD

Untitled-7 1 3/17/14 3:32 PM

Go to http://sp.hotims.com and enter 29 for product information.

Page 26: SP_1410DGD

ACCESS CONTROL

2 6

traditional access control solutions are built on antiquated software that requires extensive training and a sizeable project to change or upgrade the software. Solu-tions like Encapsulon, though, are built with simple upgrade paths that include automated upgrade downloads and an intuitive user interface, similar to many other modern software interfaces the user is already comfortable with.

As mentioned earlier, business is no longer kept at the offi ce, and an access control solution should refl ect that. End-users are used to having their most im-portant and necessary information available at their fi ngertips and security solu-tions should be no different. Many access control solutions offer mobile man-agement of the system. Encapsulon allows businesses to view the status of their facilities, control doors and lock out employees or other visitors that should no longer have access.

Without dedicated security employees on staff, end-users need an access control solution that is powerful yet simple enough to be managed by non-security experts. They also need a trusted partner to confi gure and install their system It’s impor-tant that access control vendors have well-developed methodologies and programs for their partners, as well as end users, to ensure that solutions are developed and deployed to meet specifi c needs of a given application.

THE CUSTOMER IS ALWAYS RIGHTPerhaps the biggest reason to invest in an access control product line is the end-user himself. The access control end-user is fi rstly a consumer, and the consumer market is leading the way in access control. Surrounded by home automation, smartphone apps and continuous technology upgrades, today’s access control end-user expects and demands the convenience and effi ciency seen in the consumer market in his buying decisions.

The end-user wants his electronic access control system to be convenient, ef-fi cient, easy-to-use and cost effective. An end-user is no longer convinced that his business is best secured by a complex panel system managed by an even more

complex software program, especially when he can lock doors, turn off lights and control the temperature at his house, all with a few touches on his smartphone. We live in a world of smartphone apps and one-click purchasing, and these habits are beginning to infl uence the buying decisions of end-users.

Although end-users want simple and intuitive security, they still require secu-rity investments to be reliable and to work well. The security of employees and assets is a top priority, and a security system must be capable of providing peace-of-mind through secure operation.

A NON-TRADITIONAL CURVEBALLThe increased accessibility, affordability and simplicity of networked access con-trol is not going unnoticed within the security industry—and outside of it. IT resellers who have previously steered clear of physical security are beginning to see the benefi ts of IP access control and the market opportunities available within their existing customer base. These resellers are often times trusted advisors for all technology solutions for their SMB end-users due to their IT expertise.

IT resellers are beginning to see that networked access control complements their business model and are beginning to add access control solutions to their product lines to grow their business and their profi ts. These resellers, in turn, may begin taking business away from traditional security dealers who have been more conservative in bringing on access control as a business offering.

Because of the increased awareness surrounding access control, end-users are beginning to request access control solutions in their businesses, and IT and other non-traditional security resellers are tired of turning these business requests away.

A solution like Encapsulon is an easy choice to enter into this growing market.

Andrew Wren is the president of Wren Solutions.

I WANT YOUTO BUY AMERICAN!

Our Steel Gooseneck Pedestals areMade in America from American SteelOur Steel Gooseneck Pedestals areMade in America from American Steel

Our Lexan Polycarbonate Housings areMade in America from American Plastic ResinOur Lexan Polycarbonate Housings areMade in America from American Plastic Resin

[email protected](770) 529-1040

h h i

Stop Feeding the Foreign Beast To Save a Buck!

Go to sp.hotims.com and enter 4 for product information.

1014sec_022_026_Wren_v3.indd 26 9/16/14 1:28 PM

Page 27: SP_1410DGD

Go to http://sp.hotims.com and enter 39 for product information.

Untitled-1 1 9/16/14 12:00 PM

Page 28: SP_1410DGD

2 8 1 0 1 4 | S E C U R I T Y P R O D U C T S

WIRELESS TECHNOLOGY

PROVIDING EFFICIENT TECHNOLOGIES Wireless access control in several forms aid tight budgets for facility managers By Benjamin Hopkins

By now, most security professionals are familiar with the two types of wireless that have been used in access control implementations for the last decade or so. One is where 900 MHz

communication is installed to a panel interface mod-ule (PIM) and onto a hardwired source network. The other is 2.4 GHz/802.11 Wi-Fi in which communica-tion goes from the lock or sensor to a Wi-Fi antenna and onto a network. However, there are now two more wireless technologies being deployed by security professionals: Bluetooth Low Energy (LE) and Near Field Communications (NFC), both of which create increased capabilities and novel solutions.

Very few electronic access control (EAC) solu-tions are found on interior doors. Most EAC locks are simply too powerful and, as a result, too costly to put on the scores of interior doors in Class A and B commercial real estate buildings. To provide EAC to offi ce space entries, interior offi ces, conference rooms, equipment rooms and IT rooms in commercial real estate buildings, within tenant offi ces, at school ad-ministration offi ces, government offi ces and scores of other buildings ranging from those housing ambula-tory care to manufacturing facilities, a less expensive lock has been needed.

NEW TWIST ON WIRELESS ACCESS CONTROLRecently, Allegion introduced a new twist on wireless access control. ENGAGE technology, a cloud-based, wireless, offl ine security solution, uses the latest in wireless technology, Bluetooth LE, marketed as Blue-tooth Smart, to simplify connecting people and open-ings to deliver cost-effective intelligence and effi cien-cy. Developed specifi cally for facilities that want to upgrade from mechanical locks and keys to electronic credentials for improved security and effi ciency, EN-GAGE-enabled wireless locks are ideal for interior of-fi ce doors, common area doors and sensitive storage spaces at a fraction of the cost of traditional EAC.

With the ENGAGE web and mobile apps, it’s easy to confi gure lock settings and manage basic user access from anywhere. When connected to the Internet, EN-GAGE-enabled devices, such as Schlage NDE Series electronic locks, use Wi-Fi to automatically update the locks once a day, eliminating the need to update locks on-site as with traditional, offl ine, electronic locks. Ad-ministrators can also approach the individual locks and use the Bluetooth Low Energy technology on their

smartphone or tablet to program them. For small to mid-sized businesses, an affordable EAC solution can deliver new levels of security and fl exibility in addition to cost savings associated with re-keying.

Taking a cue from the latest in external locks, EN-GAGE-enabled wireless locks are designed to be easy to install, use, manage and connect. They simplify installation by combining the lock, credential reader, door position switch and request-to-exit switch into one unit. Additionally, they use standard cylindrical door prep and can be installed in minutes with only a Phillips screwdriver.

USING A SMARTPHONE AS THE ACCESS CONTROL CREDENTIALAs NFC technology is now being added to a growing number of mobile handsets to enable access control as well as many other applications, more and more organizations are considering joining the bring your own device (BYOD) trend and having their users de-ploy their own smartphones as their access control credentials. It is projected that over 285 million NFC-enabled smartphones were sold in 2013 and over half of the smartphones sold in 2015 will be NFC-capable.

NFC provides simplifi ed transactions, data ex-

change and wireless connections between two devices that are in close proximity to each other, usually by no more than a few inches. For example, Allegion’s aptiQmobile web-based key management system al-lows NFC-enabled smartphones to grant access to buildings and dorm rooms as well as partake in other badge ID applications.

To turn NFC-enabled smartphones into an access control credential, users simply download the app onto their smartphone. Then, their access control ad-ministrator uses the software cloud service to send a secure mobile credential directly to the user’s phone. Once the mobile credential is downloaded, users open the app and tap their smartphone to the reader in the same way they use an ID card.

900 MHZ WIRELESS EXTENDS THE REACH OF ONLINE SYSTEMSMost everybody understands that wireless systems re-move the expense of running wire to all access points, a project that also takes too much time and raises havoc throughout the facility as the job is being done. With no wire to pull or trenches to dig, a wireless access control solution takes only 45 minutes to install per door, versus eight hours for a wired alternative.

1014sec_028_031_Hopkins_v3.indd 28 9/16/14 1:28 PM

Page 29: SP_1410DGD

at warehouse

while analog saw

attempting to

Avigilon saw a

CAM1 2014-MAR-14 3:04:52 AM

2014-Mar-14 03:04:52.196 AM

2014-Mar-14 03:04:52.196 AM

2014-Mar-14 03:04:52.196 AM

Only our high-defi nition surveillance solutions give you the full story. Get the image detail you need to reduce break-ins and keep inventory secure with an Avigilon end-to-end solution. Our broad range of cameras lets you monitor multiple interior and exterior environments to provide you maximum coverage even in the absence of security personnel. Learn more about the benefi ts of Avigilon’s end-to-end solutions at avigilon.com/endtoendGo to http://sp.hotims.com and enter 30 for product information.

Untitled-8 1 9/11/14 5:28 PM

Page 30: SP_1410DGD

WIRELESS TECHNOLOGY

3 0

It implements online access control without taxing the budget. The use of wireless, particularly on existing build-ings, eliminates any hardwiring of net-worked card readers, door position switches and request-to-exit switches. It reduces costs signifi cantly, speeds up installation and maintains building aes-thetics by avoiding the need to run wires that can’t be concealed.

With these savings, facility profes-sionals can now extend the reach of their card-based systems at a cost that used to include extra materials and in-creased labor. Wireless helps migrate the present access control system so that it can be used for more doors as well as other unique applications that have been impracticable or too expen-sive to install:

Remote applications. With a por-table wireless reader, security personnel can leverage the existing card system for remote and offsite applications in-cluding mustering, attendance, event admission, checkpoints and similar ap-plications. Remote buildings can have the same type of locking systems and credentials to enter that other places within the organizations have; whether or not the original system is wired or hardwired is irrelevant. The system reads all doors the same.

Outdoor applications. For vehicle and pedestrian gate access, for ex-ample, wireless links will bridge up to 1,000 feet, eliminating costly trenching. As such, wireless systems are ideal for garages, parking lots, airports, utility companies and military bases. They are especially cost effective for control-ling gates around a facility.

Even more impressive, optional di-rectional or gain antennae are available for longer distances, up to 1,300 meters away. With wireless access control, peo-ple can enter a parking lot just like they enter a front door, with their credential.

Elevators. As prime candidates for a wireless system, traveling cables are rou-tinely included at the time of installation, but they are often ill equipped to reliably transport credential data from the cab to the elevator controller. Elevator shafts are harsh electrical environments and are often the source of data corrupting noise that becomes induced onto the card reader’s data lines. This causes in-consistent performance, which often gets worse over time as cable shielding decays due to continual movement.

Conversely, wireless solutions elimi-nate the need for the data lines in elevators up to 300+ meters. In fact, they thrive in this environment and provide consistent, reliable data transport that doesn’t wear out. With traveling cable installation costs

ranging from $2,600 to $13,000 or more per cab, wireless alternatives can save thousands of dollars per elevator.

Lockdowns. This issue is major with wireless access control. Usually with Wi-Fi, access control decisions are down-

loaded by the host into the lock 5 to 6 times-per-day versus 5 to 6 times-per-hour with 900 MHz solutions, a 10-min-ute heartbeat. Access control decisions may also be managed within the locks—as is the case with offl ine locks—to min-

Go to sp.hotims.com and enter 44 for product information.

1014sec_028_031_Hopkins_v3.indd 30 9/16/14 1:28 PM

Page 31: SP_1410DGD

3 1

imize communication from the lock to the host and to conserve battery power. However, such limited (non-online) con-nectivity with the host limits the locks’ ability to receive urgent commands from the host. For instance, even with a 900

MHz platform, a direction to immedi-ately lockdown could be ignored for 10-plus minutes.

With new modular locks, a “wake up on radio” feature works in parallel with the 10-minute heartbeat. Without

waking up the entire lock, it listens for complementary commands and re-sponds within ten seconds. Thus, ten seconds is the longest it will take to ini-tiate a lockdown.

In addition, for those concerned

about hacking, each RF transmission is encrypted with AES-128 bit keys to provide virtually uncompromising security. This Advanced Encryption Standard is the same that is preferred by most governments.

YOU ARE PROBABLY USING WI-FI IN YOUR HOUSEWith a Wi-Fi system, communication goes from the lock or sensor to a Wi-Fi antenna and onto a network. Wi-Fi is used everywhere, making that its big benefi t.

In the great majority of buildings built in the last 30 years (or more), the copper cabling or optical glass fi -bers used to operate Wi-Fi network systems have been installed. In most cases, their capacity is a long way from being reached. Since the TCP/IP net-works are already everywhere, running every imaginable software application, it often makes sense to leverage these networks in access control. Because Ethernet systems are so widespread, most large organizations already have IT people on site that understand them. The same goes for the leading security integrators.

Typically, when creating an access control system, a large area is covered, from exterior door to exterior door and much of what is in between. Since Ethernet networks are highly scalable, they let security professionals expand the size of their coverage easily at an extremely reasonable cost.

Whatever the industry or applica-tion, wireless is becoming the solution for getting more doors covered and extending the present access control system, especially when the facility requires something that is not too in-vasive and can be easily installed. In addition to providing a system that is easy to administrate, wireless solves the many installation restrictions in medi-cal, education and historic buildings, including limitations on where you can drill and lay wire.

Best of all, with four different types of wireless access control technologies, integrators and end users can leverage the best one for each and every application.

Benjamin Hopkins is product manager-elec-tronic locks for Allegion.

Go to sp.hotims.com and enter 44 for product information.

1014sec_028_031_Hopkins_v3.indd 31 9/16/14 1:28 PM

Page 32: SP_1410DGD

PRODUCT SOLUTIONS Compiled by Lindsay Page, Senior Editor

IP CAMERAS

3 2 1 0 1 4 | S E C U R I T Y P R O D U C T S

Honeywell equIP Series Cameras

Honeywell’s equIP Series of IP-network cameras give dealers a broad portfolio of options for resi-dential and commercial surveillance needs. The series is a family of IP-ready products, including microdome, box, indoor IR dome, indoor dome, and rugged cameras that integrate with DVRs and NVRs for complete video management. All camer-as in the suite use Honeywell technology for cam-era video motion detection, tamper detection, re-mote fi rmware updating and for security storage of camera settings. The cameras provide high-defi ni-tion picture, effi ciency and real-time video. The series is ONVIF Profi le S compliant, enabling seamless integration with existing analog and IP cameras. Honeywell.

Go to sp.hotims.com and enter 335 for product information.

Bosch Security Systems Inc.AUTODOME IP Starlight 7000

HD Cameras

The AUTODOME IP Starlight 7000 HD cameras de-liver HD video images in extreme low light situa-tions and capture moving objects in 720p HD reso-lution at up to 60 frames per second. The latest sensor technology combined with sophisticated noise suppression results in a light sensitivity of 0.052 lux in color mode and even 0.0103 lux in

monochrome mode. The cameras feature wide dy-namic range and intelligent backlight compensa-tion technology to ensure that moving objects or those of interest are enhanced and can be easily identifi ed in scenes with simultaneously bright and dark areas. Bosch Security Systems Inc.

Go to sp.hotims.com and enter 336 for product information.

ToshibaIK-WR05A and IK-WD05A

Toshiba’s outdoor-ready IK-WR05A and indoor IK-WD05A are pre-focused, full HDTV (1080p) mini-dome IP cameras for objects at close range up to infi nity, making them easier for customers to mount and confi gure. Both models are ONVIF Pro-fi le-S compliant for simplifi ed integration with third-party ONVIF products and have 802.3af PoE technology to eliminate the need to run electrical cables for power. The cameras can stream live video at 30 frames-per-second at full frame rate, two-megapixel (1920 x 1080) resolution. Their 4X digital zoom, combined with the HDTV resolution, provides highly detailed, close-up images for bet-ter identifi cation, even when the subject is travel-ing at high speeds. Toshiba.

Go to sp.hotims.com and enter 337 for product information.

Axis CommunicationsAXIS Q1615/-E

AXIS Q1615/-E cameras offer exceptional image quality with HDTV 1080p resolution at 60 frames per second for indoor and outdoor surveillance, day and night. The cameras feature Lightfi nder

and Axis’ WDR Forensic Capture with the ability to automatically switch settings, ensuring all details are captured in both bright and dark areas. AXIS Q1615/-E also offer several image processing fea-tures to enhance image usability, such as barrel distortion correction and electronic image stabili-zation for steady images in an environment with tough vibrations. Ideal for use in airports, train sta-tions, government building and perimeter protec-tion to minimize investigation time and protect assets. Axis Communications.

Go to sp.hotims.com and enter 338 for product information.

HoneywelliPCAM-WL

Honeywell’s iPCAM-WL is an indoor IP video camera that uses advanced night vision and light sensors to help home and business owners view activity in poorly lit spaces. The camera—with wired or wire-less Internet connectivity—can capture clear, high-quality video and uses H.264 high-compression technology to maintain image sharpness. The cam-era is the latest addition to the Honeywell Total Con-nect video suite of solutions, which lets consumers access and manage their surveillance systems re-motely from Wi-Fi enabled devices such as smart-phones or tablets. Honeywell.

Go to sp.hotims.com and enter 339 for product information.

SonySNC-XM631

Sony Electronics’ SNC-XM631 is a new model in its X Series line of IP mini-dome cameras. The SNC-XM631 is powered by the IPELA ENGINE EX signal processing system, allowing it to deliver full HD picture quality in challenging lighting condi-tions using Sony´s unique wide dynamic range technology (View-DR) and image stabilization technology. The indoor camera has a wide viewing angle of 113° to improve the fi eld of view in com-pact spaces. It is also vandal-resistant  with an IK10  rating, and  it has sensor in/out capabilities that allow it to integrate easily with other security systems such as alarms or infrared devices. Sony.

Go to sp.hotims.com and enter 340 for product information.

OpenEyeOE-C7312-AWR

OpenEye’s OE-C7312-AWR, features true Wide Dy-namic Range and 3~9mm autofocus lens with P-Iris. The camera produces crystal clear images with exceptional clarity and detail no matter the lighting conditions, and comes standard with IR LED illumination. The IP camera is fully powered by PoE+ including the onboard heater. For quick and easy installation, the OE-C7312-AWR features a new base plate compatible with 4S single gang and 2 gang electrical boxes. The base plate comes standard with the OE-C7312 and allows surface mounting to walls while preserving its IP-66 out-door rating. OpenEye.

Go to sp.hotims.com and enter 341 for product information.

VideotecULISSE Compact HD

Videotec’s ULISSE Compact PTZ is in full HD and offers unrivaled features. With the addition of LED illuminator, wiper, high speed positioning and ON-VIF Profi le S, the UCHD is designed for continuous duty in any outdoor environment. Built to with-stand diffi cult external conditions, the camera en-sures high speed and accurate target detection. Thanks to its reliability, robustness and accuracy, the PTZ is the ideal solution for the most demand-ing security applications including traffi c and high-way control, prison, stadium, industrial and perim-eter surveillance. Videotec.

Go to sp.hotims.com and enter 342 for product information.

NXPTZ and NXPTZT PTZ

Marine Camera Range

Videotec’s stainless steel video surveillance prod-

An IP camera, also known as a network camera, can send and receive data through a computer network and/or the Internet. IP cameras are typically used

for surveillance purposes, but can also be used as webcams. There are two types of IP cameras: centralized and decen-tralized. Centralized IP cameras are managed by Network Video Recorders (NVRs), and decentralized IP cameras do

not need to be managed by an NVR because all functioning is completely built-in and the cameras can record images and footage directly to digital storage, such as fl ash drives.

1014sec_032_038_PS_cameras_v3.indd 32 9/16/14 1:15 PM

Page 33: SP_1410DGD

Mounted directly on the door frame, the Ganz IP Height Stripand IP Door Frame Cameras will supplement any existing security system by clearly capturing a subject’s facial

image upon exit.

Unlike many surveillance cameras, the unitsare typically mounted to any standard doorframe at eye level– low enough to see undera hat or hood.

Both units feature a PixelPro GXi 1080pcamera with a 3.7mm or 2.8mm lens,housed in a low profile enclosure with a discrete 3/16” viewing slot. The camera’s GXi Technology provides SDXC Edge

recording, WDR performance and Imbedded Intelligence providing analysis of video with application areas including intrusion detection, people counting, loitering detection, camera tampering and failure detection (standard and optional licenses).

NY: 1-800-422-6707 CA: 1-877-407-9555 ©2014, CBC. All Rights Reserved. www.ganzsecurity.com

CBC AMERICA Corp.

YOUR BEST DEFENSE IN RETAIL SURVEILLANCEIS AN EFFECTIVE EXIT STRATEGY.

Features:>1080p color IP camera with

GXi Technology

>SDXC Edge Recording

>3.7mm or 2.8mm wide lens

>Fits most standard door frames

>Durable aluminum construction

>Curved surface with 180º camera adjustment

>12VDC or 24VAC

> In wall and corner mount models also available.

> Pinhole camera also sold separately

> Made in the USA

IP Height Strip Camera

IP Door Frame Camera

Go to http://sp.hotims.com and enter 46 for product information.

Untitled-5 1 8/14/14 3:24 PM

Page 34: SP_1410DGD

3 4 1 0 1 4 | S E C U R I T Y P R O D U C T S

PRODUCT SOLUTIONSIP CAMERAS

ucts operate in the harshest and most corrosive environments, such as industrial and offshore/on-shore applications, ensuring long-term perfor-mance with low maintenance. The passivated and electropolished AIS316L construction makes these products completely impervious to air and water rusting and offers excellent weather proof protec-tion. The NXPTZ and NXPTZT are day/night and dual vision thermal imaging cameras, and are new to the marine camera range. The cameras offer extreme ruggedness to operate in the harshest environments such as road tunnels and marine environments in total darkness, through fog, rain, heavy smoke or in the far distance. Videotec.

Go to sp.hotims.com and enter 343 for product information.

SightLogixThermal SightSensor

The SightLogix Thermal SightSensor is designed for accurate outdoor perimeter and area security, day and night, in all weather conditions. The Sight-Sensor has four times the processing, is one-third the size, and consumes half the power of the prior generation, with solar and wireless capabilities that eliminate most of the infrastructure once needed for video security systems. With lens op-tions that range from wide areas (90˚ FOV) to 600m distances, the nitrogen-purged, NEMA 4X SightSensor leverages on-board video processing for high Probability of Detect (PD) and low Nui-sance Alarm Rate (NAR) analytics while providing crisp, clear video at all times. Increased perfor-mance and lower costs meet a broad range of ap-plications and budgets, from critical asset protec-tion to theft and vandalism prevention. SightLogix.

Go to sp.hotims.com and enter 344 for product information.

VitekENVI and On Cue Cameras

VITEK introduces OBI Technology delivering On-Board Intelligence to both the ENVI and On Cue camera line ups. VITEK OBI Technology incorpo-rates Auto Focus Zoom by intelligently tracking motion, then optically zooming in to capture full 2.1 MegaPixel video. The capture window can also be set to any off-center area enabling zoom

on critical points of an overall image. OBI Tech-nology is available in both ENVI IP and On Cue HD SDI formats. Vitek.

Go to sp.hotims.com and enter 345 for product information.

Advanced Technology VideoIPMB2FI

Advanced Technology Video’s 2MP Mini-Bullet IP Camera offers true day/night functionality for low light conditions, progressive scanning for sharper video motion images, powerful IR LEDs for 0-Lux Night-time operation up to 60ft, and three simulta-neously streaming videos, up to 30-ips at 1080p resolution using H.264 and MJPEG compression. The camera is equipped with a 3-7mm wide angle fi xed lens and supports a micro-SD memory card slot for local, event detection recording. The unob-trusive camera weighs less than a pound and is ONVIF Profi le S compliant, offering PoE and 12VDC power options. Advanced Technology Video.

Go to sp.hotims.com and enter 346 for product information.

IPCH2M43PB

Advanced Technology Video’s IP Height Strip Cam-era (IPCH2M43PB) offers brilliant video quality with 2MP Full HD, 1920 x 1080 Resolution which allows for full face capture at eye level. It comes equipped with a 4.3mm Mega-Pixel lens and of-fers Wide Dynamic Range for high contrast light-ning conditions. The camera is highly effi cient with H.264 Video Compression which drastically re-duces bandwidth & storage requirements. The color coded height measurements which come in US or Metric dimensions make it perfect for covert retail environments. Advanced Technology Video.

Go to sp.hotims.com and enter 347 for product information.

IPSDMV122

The Low Profi le network dome camera by Ad-

Go to sp.hotims.com and enter 35 for product information.

1014sec_032_038_PS_cameras_v3.indd 34 9/16/14 1:15 PM

Page 35: SP_1410DGD

Go to http://sp.hotims.com and enter 16 for product information.

Untitled-8 1 9/15/14 4:36 PM

Page 36: SP_1410DGD

PRODUCT SOLUTIONSIP CAMERAS

3 6 1 0 1 4 | S E C U R I T Y P R O D U C T S

vanced Technology Video is equipped with a 3.7mm wide angle, fi xed lens, with superior 2MP Full HD, 1920 x 1080 resolution. The camera fea-tures progressive scanning for sharper video mo-tion images and triple stream video simultane-ously up to 30-ips at 1080p using H.264 and MJPEG Compression. Designed for discretion, the

camera weighs half a pound and is only two inches in height. In addition, the camera is powered by PoE, which simplifi es the task of installing the de-vice. Advanced Technology Video.

Go to sp.hotims.com and enter 348 for product information.

IPLP2TFAdvanced Technology Video presents the IPSD-MV122, a 2MP Full HD PTZ IP camera that delivers triple streaming, H.264 and MJPEG compression up to 60-ips at 1080p. The network camera offers progressive scanning for sharper video motion im-ages, a 12X, 5.3 – 62.6mm, Auto-Focus, Optical

Zoom lens with 16X digital zoom and TRUE Day/Night with digital WDR for all lightning applica-tions. The high speed PTZ dome also offers DNR and DIS, in addition to being IP66 rated. The PoE power option allows for a simplifi ed installation. Advanced Technology Video.

Go to sp.hotims.com and enter 349 for product information.

PanasonicSFV631LT

The SFV631LT, and Panasonic’s entire 6 Series camera line, offers outstanding video images in low-light at less than 0.01lx illumination and its 3D Noise Reduction (3DNR) and Multi-process Noise Reduction (MNR) ensures both bright and dark ar-eas are reproduced to deliver best-in-class perfor-mance with minimum video noise and accurate color reproduction. The new 6 Series models also feature dual SDXC memory card slots offering high-capacity H.264/JPEG edge-recording with fl exible record modes including alarm-recording and backup-recording in the event of network fail-ure. Panasonic.

Go to sp.hotims.com and enter 350 for product information.

ToshibaIK-WR14A

Toshiba’s IK-WR14A is a two-megapixel IP net-work dome camera that reduces upfront installa-tion time by up to fi fty percent with its incorpora-tion of remote optical zoom, one-touch remote focus, and a new cable management system based on time-saving Power over Ethernet (PoE). Once installed, the camera captures 1080p full HD resolution video at 30 frames-per-second in virtu-ally any lighting condition, indoors or outdoors. The IK-WR14A features a unique remote optical zoom and one-touch auto focus system that permits the lens focusing process to be completed remotely on a laptop computer by a single technician, quickly and easily. Toshiba.

Go to sp.hotims.com and enter 351 for product information.

Go to sp.hotims.com and enter 34 for product information.

1014sec_032_038_PS_cameras_v3.indd 36 9/16/14 1:15 PM

Page 37: SP_1410DGD

Much more than meets the eye. Imagine IP cameras that prevent backlight, low light, camera shake or fast action from spoiling or making you miss a crucial shot. That thinking is the soul of Sony’s IPELA ENGINE™ platform and it made possible our most advanced W, V, E, X and C Series IP cameras. Conquer intense backlight with Sony’s View-DR® technology, which gets up to 130 dB dynamic range at Full HD. Overcome low light with Sony’s XDNR® noise reduction. Subdue camera shake with built-in image stabilization. And track fast action with up to 60 frames per second. Sony’s IPELA ENGINE cameras don’t just improve your vision. They extend your reach.

Learn the Five Essentials of Surveillance Cameras at sony.com/security.

© 2014 Sony Electronics Inc. All rights reserved. Reproduction in whole or in part without written permission is prohibited. Features and specifications are subject to change without notice. Sony, IPELA ENGINE, View-DR and XDNR are trademarks of Sony.

Go to http://sp.hotims.com and enter 24 for product information.

Untitled-4 1 8/8/14 10:58 AM

Page 38: SP_1410DGD

PRODUCT SOLUTIONSIP CAMERAS

3 8 1 0 1 4 | S E C U R I T Y P R O D U C T S

JVCVN-H557U

JVC’s VN-H557U Megapixel Non-Endless PTZ Camera delivers HD image quality, accurate color reproduction and low light performance with Day/Night operation. The 10x optical and 10x digital zooms together produce 100x zoom capability. The 2-megapixel image sensor produces 1920x1080 pixel resolution at 30 fps for full HD imaging per-formance with H.264 and MJPEG dual streaming. Super LoLux HD technology provides color sensi-tivity of 0.4 lux enabling color Day/Night operation. With PoE, 3D noise reduction, 350° pan/tilt opera-tion, audio communications, on-board SD record-ing and average MTFB (Mean Time Between Fail-ures) of 30,000 hours for extended operation and lower total cost of ownership. JVC.

Go to sp.hotims.com and enter 352 for product information.

Vicon Industries Inc.SN680D-WNIR

Vicon Industries’ SN680D-WNIR rugged HD IP PTZ Dome was designed for high level performance in the most demanding security installations. This camera delivers high megapixel resolution in a rugged IP66 rated housing, protecting it from van-dalism, rain, dust and harsh outdoor environments. In addition, the integrated 30x optical zoom lens, synchronized IR LEDs, and wide dynamic range (WDR) ensure the best possible image and provide illumination up to approx. 400 ft. These cameras are ideal for city surveillance, airports, train sta-tions, harbors and stadiums. Vicon Industries Inc.

Go to sp.hotims.com and enter 353 for product information.

Grandstream NetworksGXV3662

The GXV3662 series consists of two fi xed dome IP camera models in a weatherproof, vandal-proof and tamper-proof casing to withstand harsh weather conditions or tampering in settings like banks, retail and more. The vari-focal lens is man-ually adjustable from 3.3mm to 12mm making this series suitable for any indoor or outdoor monitor-ing situation – whether it is an area in the distance or area in close-proximity to the camera. IR-Cut allows for advanced day/night/low-light video re-cording; color or black & white. Both cameras have integrated PoE, IP66 certifi ed casing, ONVIF com-pliancy, advanced security and fl exible HTTP API, SIP/VoIP for 2-way audio and video streaming to mobile/video phones and free GSurf Pro Video Management Software. Grandstream Networks.

Go to sp.hotims.com and enter 354 for product information.

IQinVisionAlliance-Mini

Known for compact size and versatility, the Alli-ance-mini not only includes the increased pro-cessing power needed to run analytics or VMS applications at the edge, it also features WDR, on-camera storage, and true day/night capability. The camera is available in H.264 vandal dome models with support for HD720p, HD1080p, 3MP and 5MP resolutions. The Alliance-mini delivers the highest quality megapixel images with the lowest band-width demands. Both ONVIF and PSIA compliant, this camera is designed for a wide range of indoor applications and works seamlessly with all leading NVR/VMS providers. IQinVision.

Go to sp.hotims.com and enter 355 for product information.

ENHANCE YOUR SECURITY

PRODUCED BYNancy Calabrese –Midwest, [email protected](702) 228-3293

Kharry Wolinsky –[email protected](703) 876-5069

FOR SPONSORSHIP AND EXHIBIT OPPORTUNITIES, PLEASE CONTACT

WORKSHOPS: NOVEMBER 17, 2014

CONFERENCE & EXPO: NOVEMBER 18–19, 2014

Gaylord Texan ResortDallas, Texas

safesecurecampus.com

Register today for Safe & Secure Campus Symposium— where security experts and leaders from public and private institutions at all levels will educate attendees with strategies, best practices and case studies for effectively preparing, preventing and responding to threats to students, facility, administration and staff.

In 2 short days, you will have the opportunity to enhance your knowledge, stay abreast

of current and future trends and important issues, and network with your peers.

egister online today with promo code SSC !

Go to sp.hotims.com and enter 14 for product information.

1014sec_032_038_PS_cameras_v3.indd 38 9/16/14 1:15 PM

Page 39: SP_1410DGD

Brought to you by Volume 4 | Issue 2 | October 2014

LEVERAGING IT FOR ACCESS CONTROLSolutions that use 13.02 FICAM topology eliminate the need for proprietary access control panelsG10

THE CLOUD CAN CHANGE EVERY-THING FOR LAW ENFORCEMENTLooking at some of the develop-ments taking place in the marketG6

HISTORIC SOUTHERN CITY UPGRADES TO HIGH-TECH TRAFFIC MANAGEMENTCity of Savannah creates safe, welcoming environment for residents and visitors with IP videoG4

A special section to SECURITY PRODUCTS, FEDERAL COMPUTER WEEK and GOVERNMENT COMPUTER NEWS

A Capitol IdeaBarriers and bollards secure

California’s state buildingG8

1014secSup_G01_v2.indd 1 9/4/14 11:56 AM

Page 40: SP_1410DGD

ComNet is Your Source for Made in the USA Transmission Solutions – Available now under GSA Contract GS-07F0398W

GS-07F-0398W

FIBER OPTIC CONNECTIVITY AND ETHERNET NETWORK SOLUTIONS

ComNet™ Fiber Optic and Ethernet Products are now on the GSA Schedule

Signal Transmission Solutions for: • Security • Intelligent Transportation Systems

• Control & Automation • Border and Perimeter Protection

For more information about ComNet and our complete product line of connectivity and communication network solutions: Visit www.comnet.net/register.html, Email [email protected], Call 1 (203) 796-5300 or Toll Free 1 (888) 678-9427

ComNet: Delighting the Customer• Free Design Center Application Support • Pre and Post Sale Technical Support –

US Based Staff • The Industry’s Broadest Line of Fiber Optic and

Ethernet Transmission Products• Lifetime Product Warranty • Our “Customer is Always Right” Attitude

Untitled-12 1 3/6/14 4:04 PM

Page 42: SP_1410DGD

U r b a n S e c u r i t y

G4 G O V E R N M E N T S E C U R I T Y O C T O B E R 2 0 1 4

Historic Southern City Upgrades to High-Tech Traffi c ManagementCity of Savannah creates safe, welcoming environment for residents and visitors with IP video

Savannah, Georgia is a study in con-trast. As the state’s oldest city, it was founded long before the American Revolution. Yet, beneath its cobble-

stoned streets lies 38 miles of fi ber optic ca-ble, evidence of a metro-region fi rmly rooted in modernity. Touted by national and inter-national press as a trendy travel hot spot, nearly a million visitors per month fl ock to the city for music and cultural arts festivals, business summits, creative cuisine and to ex-perience a place where southern hospitality has been raised to an art form.

Because this quaint, historic city was nev-er designed to handle such a large infl ux of people and cars, managing traffi c and safety through a congested maze of one-way streets was a real challenge. Attempts to redirect events at one intersection oft en caused a cas-

cade of traffi c jams elsewhere in the bustling downtown area. Savannah realized that they needed a force multiplier to proactively man-age event traffi c in real-time. Th eir initial foray into video-based traffi c management occurred in 2004, when the city strategical-ly installed a handful of analog cameras on buildings to help police monitor roadways during the G8 Conference.

Relying on DVR recordings, however, proved to be an awkward proposition. Th e next year, Savannah used Axis video encod-ers to stream the cameras to the city’s data center. Th ey also added seven AXIS 213 and AXIS 214 PTZ network cameras, with wire-less connections at police headquarters. Th e city integrated the cameras with OnSSI’s Ocularis VMS, replacing less-intuitive legacy recording soft ware.

Every subsequent year and as budgets permit, the city adds more sophisticated Axis camera technology. Today, more than 25 Axis cameras—including a mix of AXIS Q60 PTZ Series and AXIS P33 Fixed Dome Series cameras—dot the Savannah landscape to monitor roadways and buildings, enter-tainment venues, parking garages, commu-nity centers, cemeteries and landfi lls. Th e majority of the cameras stream video to serv-ers in the city’s data center while a few of the remote facilities maintain standalone servers connected to the city’s wide area network so that police can remotely access the live cam-eras and stored video as needed.

“We’ve found Axis cameras to be really durable and simple to set up,” said Mike DiS-anza, network technician in the IT Depart-ment for the City of Savannah. “Th ey just plug into the network via PoE switches. We like how easy they are to custom confi gure. Plus, you can adjust the focus and fi eld-of-view remotely.”

Th e IT Department noted that with H.264 compression of the video, the city is able to use storage resources far more effi ciently.

Keeping Traffi c Flowing Like Dyed-Green Water From a FountainEach year, the city of Savannah hosts one of the biggest St. Patrick’s Day celebrations in the United States, with more than a million spectators attending the parade. Axis net-work cameras play a key role in helping of-fi cers manage the crowds.

“We really appreciate the big picture the Axis cameras provide, especially on heavy traffi c nights like St. Patrick’s Day,” said Lieu-tenant David Gay, special events offi cer of the Savannah/Chatham Metropolitan Police Department.

By John Merlino

1014secSup_G04_05_Merlino_v3.indd 4 9/4/14 11:57 AM

Page 43: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y . C O M G5

AXIS Q6032-E PTZ Dome Network Cameras mounted on tele-phone poles in key, downtown intersections give police and traffi c engineers in the command center a 360-degree view of the area. As garages fi ll up and downtown parking becomes scarce, the police department notifi es the public through social media to seek parking elsewhere.

During the celebration, police are sometimes forced to close ma-jor roadways due to surges in pedestrian traffi c. Rerouting these ve-hicles can cause signifi cant congestion elsewhere.

“Savannah’s layout involves a number of one-way streets which really complicates any large-scale eff ort to control traffi c,” Gay said. “Our Axis cameras help us in real-time to understand the big picture, how rerouting vehicles at one intersection will impact traffi c through-out the downtown area.”

Th e video allows the police and traffi c departments to coordinate the timing of signal lights to accommodate the ebb and fl ow of pedes-trians and cars, as well as when it is safe to reopen normal routes. As a result, outings to the downtown area have become more pleasant, safer experiences for residents and visitors alike.

“We actively monitor the cameras so that when we see the pe-destrian surges subside, we can immediately reopen the street and alleviate the congestion,” Gay said.

Real-Time, Integrated City SecurityTh ough the cameras were fi rst installed for traffi c management, their use has grown over the years to include public safety operations

across the city. While camera access is typically restricted by the mu-nicipal department, the metropolitan police can access all city-owned cameras. Th e access to this real-time video helps them to synchronize their eff orts when protecting city residents.

“It’s been huge asset for our SWAT team,” said Jason Pagliaro, emergency management liaison for the city of Savannah. “Having that situational awareness immediately at hand can be a real life saver.”

Th e video evidence can also be crucial for investigating incidents, especially if they occur in big crowds or during dynamic events. If the need arises, the police can push video from any camera to mobile devices in the fi eld.

Interdepartmental Cooperation Yields ResultsSavannah’s success with its video surveillance system is due to a col-laborative eff ort between law enforcement, the IT department, traffi c engineers and others.

“Th e police and traffi c engineering folks pick the locations and IT coordinates the process,” said Damien Hoff man, network manager in the IT department for the city of Savannah. “We look at the network connectivity challenges, arrange permissions for camera placement and determine how to get power to the site. Th en it’s just a matter of implementation and confi guration. Th e system wouldn’t exist as it is without the close relationship between departments.”

John Merlino is the business development manager, government, at Axis Communications.

• Motion activated trigger as fast as 1/10th of a second.• 1080P High Definition color images by day, NoGlowTM CovertInfrared illumination by night.

• Compact size (5.5” x 4.5” x 3”) aids in concealment.• On-board memory and power with a battery life of up to oneyear or 40,000 images.

• Completely weatherproof housing designed forextreme duty usage.

• General surveillance and license plate capturemodels available.

• Made in the U.S.A.

Reconyx HyperFire security series cameras are designed for quick and easy deployment in areaswhere no power or communication lines exist.

Visit www.reconyx.com for more information.

CovertInfrared

CovertInfrared

NoGlow

1014secSup_G04_05_Merlino_v3.indd 5 9/4/14 11:57 AM

Page 44: SP_1410DGD

Te c h n o l o g y T r e n d s

G6 G O V E R N M E N T S E C U R I T Y O C T O B E R 2 0 1 4

Th e Cloud Can Change Everything for Law Enforcement Looking at some of the developments taking place in the market

Many people envision law enforcement agencies around the country as resembling mythical portrayals on TV and in movies, with leading-edge technology that can track every suspect’s move across the grid. In fact,

law enforcement is oft en behind commercial enterprises, lacking the budgets and mission requirements to install costly security sys-tems. But, advances in and acceptance of cloud technology and other trends within the law enforcement community are changing that, and agencies need to adapt to keep up.

Here are some of the developments that we are seeing in the mar-ket for law enforcement agencies.

Look to the CloudFirst and foremost, it is all about security, whether physical surveil-lance or inside networks. Let’s start with the physical.

Only a few years ago, video surveillance was a diffi cult and costly proposition, requiring a proprietary video management system to

collect and monitor the various available video cameras. Cloud tech-nology has altered that landscape dramatically, though, eliminat-ing the need to invest in cameras and video infrastructure. Now, an agency can hang a camera virtually anywhere and run it through a cloud system. Coupled with new IP cameras, a world of possibilities has been opened. Instead of collecting video for analysis, live feeds are a reality.

More importantly, agencies charged with law enforcement and homeland security responsibilities can use IP cameras to get cross-agency feeds in real time, allowing police departments, for example, to view feeds from a school during an emergency. Th is has ushered in a new era of cross-agency collaboration. And, those cameras no longer have to be static, but can now be on-the-move on cars, aircraft and drones, and offi cers themselves. None of this is possible without cloud technology.

Th e focus on the use of cloud technology calls into question which cloud confi guration is the most appropriate. Advances in

By Dave Denson

1014secSup_G06_07_Denson_v2.indd 6 9/4/14 3:20 PM

Page 45: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y . C O M G7

cloud structure—public, private or hybrid—allow law enforcement agencies to move elastically from one cloud to another, allowing for shift ing data and information to diff erent cloud environments.

Th e cloud, in general, is opening up the law enforcement world in other ways, as well. Soft ware as a service is beginning to penetrate the law enforcement approach, helping to eliminate the capital invest-ments and human resources that would otherwise be prohibitively expensive. Th is enables small municipalities to purchase surveillance in ways that previously would have been unrealistic. In addition, some forward-looking agencies see ways to generate revenues from these services in the form of what the Department of Homeland Se-curity is calling “regional solutions” to data center requirements and data sharing.

Cybersecurity Needs Play a Vital RoleApart from physical security are the trends in cybersecurity that re-quire law enforcement agencies to closely monitor and guard their own networks. Much of this is driven by public awareness and the recognition that cyber-attacks are proliferating at an ever-accelerat-ing pace.

Just as agencies need to know who is entering and leaving their physical locations, they also need to understand who is coming and going on their networks. Th at means building smart fi rewalls to make sure everything is scrutinized, while at the same time allowing infor-mation to be obtained and analyzed from many outside sources. And, this surveillance has to include access to servers in a data center, for example, to discourage insider threat.

Agencies are becoming more adept at leveraging technology for lawful intercepts for criminal and security investigations. Today, these can range far beyond the traditional phone call to text messag-es, tweets and a variety of other media and platforms—all of which can paint a picture of where a criminal enterprise may be operating and how to obtain evidence that can be used to stop crimes and pros-ecute the perpetrators.

Th is need for security information management has led to ad-vances in building infrastructure, paving the way for imbedding this type of security information management right into the structure it-self, tying the physical into the virtual. Th at allows agencies to see whether someone inside the building may also be accessing a VPN, either deliberately or inadvertently, and passing information beyond the fi rewalls. Additionally, as new buildings are being designed, a cloud infrastructure can be incorporated right into the layout.

Th ese types of advances can come at virtually no cost, if planned in advance, as the energy savings will more than pay for itself. In some designs, the heat recovered from the building data centers can be used to heat the hot water. With the right design, desktop comput-ers that might be sitting idle for much of the day can be reallocated to provide computing power for data collection and analysis.

While none of these advances can be a substitute for traditional law enforcement practices, new IP-based technology and cloud ser-vices can provide capabilities long sought aft er but never before prac-tical or cost-eff ective.

Dave Denson is the big data solutions architect at NetApp.

WORKSHOPS: MARCH 31, 2015

CONFERENCE & EXPO: APRIL 1-2, 2015

Walter E. Washington Convention CenterWashington, DC • GovSecInfo.com

T H E L A W E N F O R C E M E N T E X P O

FEATURING

REGISTER TODAY!GovSec 2015 will be the epicenter for breakthrough government security solutions. Register now for

access to training, education and the tools you need to achieve your mission of protecting our critical

infrastructure, key assets, communities and the nation.

LEARN from public and private sector industry experts on today’s hot topics and challenges

EVALUATE hundreds of new and emerging products, services and solutions designed specifically for

security professionals

CONNECT with industry leaders, like-minded colleagues and old friends

DISCOVER the latest advances in infrastructure protection, cyber warfare technology,

IP security and much more!

From an expo floor featuring cutting-edge security products and solutions, to top-notch learning

and invaluable face-to-face time, you can’t afford to miss GovSec 2015.

HELD JOINTLY WITH

CPMPRODUCED BY

INTERESTED IN EXHIBITING? PLEASE CONTACT:

East: Kharry [email protected](703) 876-5069

Midwest, West: Nancy [email protected](702) 228-3293

Register today. GovSecInfo.com Promo code: GS15

1014secSup_G06_07_Denson_v2.indd 7 9/4/14 3:20 PM

Page 46: SP_1410DGD

P e r i m e t e r S e c u r i t y

G8 G O V E R N M E N T S E C U R I T Y O C T O B E R 2 0 1 4

A Capitol Idea Barriers and bollards secure California’s state building

California’s historic State Capitol building, completed in Sacramento in 1874, has seen its share of serious security episodes during its colorful existence. In 1927, a lobby-ist shot and murdered a secretary on the fourth fl oor. In

1967, the capitol was occupied by armed Black Panthers, and a gun-man once took a hostage in its bill room. A female follower of Charles Manson attempted to assassinate then-President Gerald Ford on its east steps. And, a mentally unstable man with a rifl e once drove into the capitol’s basement parking lot, demanding to see the governor.

For most of this four-story capitol’s early history, it was protected by a granite and cast-iron fence. However, the fence was removed during extensive renovations in 1949 and the capitol building became a symbol of a freely accessible and open government.

Events Change Th ingsFollowing the Oklahoma City federal building bombing in 1995, leg-islators began to discuss, in earnest, erecting a security fence around California’s capitol building. Whatever misgivings state legislators may have had about the lack of security were soon overshadowed by political concerns.

However, the security mood in Sacramento changed again in 2001, when a suicidal trucker crashed into the south entrance of the capitol in January. Aft erwards, all resistance to a security fence faded aft er the attacks of 9/11 later that same year. Every one of the coun-try’s 50 state capitals responded to Sept. 11, 2001 by adding security measures to their statehouses.

Nobody had to convince the man in charge of security at Califor-nia’s Capitol of the need for a security fence. Chief Sergeant-at-Arms Tony Beard had been quietly lobbying for such a solution for decades.

Beard, whose father and grandfather both spent most of their working lives helping to secure the state capitol, fi rst worked in spe-cial services for the Senate at age 17. At 29, he was the youngest per-son ever elected Senate chief and now supervises a staff of more than 100 people, including 16 sworn offi cers.

Needless to say, Beard was thrilled to oversee a $6.8 million secu-rity overhaul of the capitol’s perimeter, which consists of a series of three-foot-tall concrete planters and security posts, and retractable bollards that are linked by inch-thick cable.

Perimeter Security Enhanced AestheticallyTh e planter barriers and bollards are designed to complement both the capitol architecture and lush landscaping. In addition, decorative security bollards, which are normally kept in the “up” position and lowered to let authorized vehicles through, are placed in high traffi c areas. Th ey sport the state seal on top.

Th e decorative bollard protecting the capitol is Delta Scientifi c’s highest crash rated bollard, the DSC720. It will stop and destroy a 15,000-pound vehicle going 50 mph. It is the same bollard that pro-tects federal and DOD facilities, U.S. and British embassies, and other

high profi le, high-risk locales. Th ey meet or exceed Department of State and Department of Defense certifi cations, having been tested to the highest standards for repelling terrorist attacks.

“Fortunately, we didn’t have to choose between security and aes-thetics,” Beard said. “Th e Delta barriers and bollards we have chosen to protect the capitol’s perimeter are designed to blend in with their surroundings. But they’re also designed to do the job, which means stopping a truck dead in its tracks.”

Delta’s bollard systems operate individually or in groups of up to ten. Individual bollards are up to 13.25 inches in diameter, up to 35 inches high and are usually mounted on 3-foot centers. Hydraulic and pneumatic versions can be operated by a variety of control sys-tems. Manual versions are counter balanced and lock in the up or down position.

For Beard, Delta’s bollards mean he doesn’t have to choose be-tween preserving the capitol building’s stately, historic beauty, and protecting it from those who would do it harm.

“I believe this is a win-win situation for everyone involved,” said Beard. “It’s a balance between preserving the historical aspects of the building—and all that it symbolizes—and on a more practical level, protecting the people who actually work and visit the capitol on a day-to-day basis.”

Greg Hamm is the vice president of sales and marketing at Delta Scientifi c.

By Greg Hamm

1014secSup_G08_Hamm_v2.indd 8 9/4/14 11:58 AM

Page 47: SP_1410DGD

FEWER POWER SUPPLIES

LOWER COSTTO OPERATE

ENERGY SAVINGS

UP TO

96%

IMPROVEDBATTERY LIFE

DRAWS LESS POWER

Your new lock technology with benefits.Introducing the EcoflexTM Lock, an innovation in mortise lock technology that will raise your efficiencies to new heights – and leave room in your wallet. With the strength and durability of Grade 1 hardware from CORBIN RUSSWIN and SARGENT, the benefits can’t be beat.

Get to know the smart technology for electrified mortise locks:www.intelligentopenings.com/ecoflex

RELIABILITYEliminate voltage drops and inductive kickback, while increasing performance and peace of mind.

VERSATILITYReduce costs and inventory space with a single field-selectable lock for fail-safe/fail-secure and 12-24V applications.

SUSTAINABILITYGet up to 96% energy savings with lower operating cost, fewer power supplies and improved battery life.

Available from ASSA ABLOY Group brands: CORBIN RUSSWIN | SARGENT

*Versus standard electrified mortise locks.

Copyright © 2014 ASSA ABLOY Inc. All rights reserved.Scan this QR code using your mobile phone to learn more.

Meet EcoflexTM.Efficient. Flexible. Dependable.

Untitled-2 1 9/5/14 11:06 AM

Page 48: SP_1410DGD

G o v e r n m e n t S e c u r i t y

G10 G O V E R N M E N T S E C U R I T Y O C T O B E R 2 0 1 4

Leveraging IT for Access ControlSolutions that use 13.02 FICAM topology eliminate the need for proprietary access control panels

Trying to navigate through the numerous security regu-lations that are in place for government agencies and facilities can be a daunting challenge, even to the most seasoned security professionals. Buying access control so-

lutions that are compliant with federal mandates, such as HSPD-12 or FIPS-201, means there are only a select few products that end us-ers in the government sector can purchase. Th e only way to ensure these purchased solutions are in compliance with these requirements is to turn to the General Services Administration’s (GSA) approved products list (APL).

But even then, there are still budgetary constraints that may make implementing the best access control system nearly impossible, and government end users are still faced with the prospect of investing a signifi cant amount of money to upgrade their existing access control infrastructure without a reasonable ROI.

Requirements AboundIn the past, government facilities could implement low-cost access cards and readers as a simple means of securing doors. Now, they are required to have a particular type of smart access card—usually a personal identity verifi cation (PIV) card—and that card has to be authenticated at the reader. Th is means that the system has to check to determine that each card hasn’t been duplicated or spoofed; hence, there are many requirements in place at certain facilities to deploy some type of biometric credential solution in conjunction with the traditional card access system. Some even require the use of a PIN number in addition to these other layers.

All of these things have amounted to increasing costs across the government spectrum as agencies have sought to create secure digi-tal identities for employees, most of who are required to be fi nger-printed, photographed and issued cards that have digital certifi cates linked to them.

Th e quandary for many in the market has been how to link this new generation of secure credentials with existing physical access control systems (PACS) infrastructure, card readers, control panels and the like. Th e problem is that the majority of these products are on the lower end of the access control technology spectrum, specifi cally control panels, and don’t have the capability to check and see if a card is fraudulent at the time it is presented.

One of the major hurdles federal offi cials ran into is that aft er agencies went on the APL and purchased the components neces-sary to achieve this new level of required security, they quickly found many of these solutions were incompatible with one another. In re-sponse, the government introduced a new program called Federal Identity, Credential, and Access Management or FICAM that outlines the requirements of an end-to-end access control solution in which all of the devices are interoperable with one another.

Two Diff erent Topologies Off ered for FICAM Compliance Historically, most of these systems—identity, credential manage-ment, logical access and physical access—operated in silos and did not work very well together. With FICAM, the GSA is attempting to create a new level of interoperability between these solutions.

Topology 13.01. One of the options available to address this issue is that of an additional hardware component being installed between the reader and the control panel that has all of the intelligence necessary to check the card and ensure that the credential is authentic. It does this by leveraging the IT network to verify the information on the card, and checks if the credential has been reported as lost or stolen.

Th is method includes three categories of components: the card reader, the access control system or the PACS, and the intermediary validation system between the reader and the panel.

Topology 13.02. Th is is a completely new architecture that is op-timized for leveraging an IT infrastructure to meet the FICAM re-quirements by “virtualizing” the PIV and PIV-I credential certifi cate validation and authentication functionality within the access control soft ware. Physical access points are controlled using IP encryption bridges to connect door hardware and transform card readers into IP addressable devices. Th is topology was introduced as an alterna-tive to the 13.01 topology because it does not require the additional hardware and third party soft ware needed to add authentication and validation capabilities to traditional control panel systems. Creden-tials are presented at the reader and cryptographically challenged by the Freedom 1302 PACS and Validation soft ware. Th ese credentials are then authenticated and validated before an authorization check is performed to grant or deny access to the cardholder.

Th is unique approach eliminates the need for an intelligent hard-ware component that would otherwise be necessary to meet the re-quirements for FICAM by using a traditional PACS architecture. All data is encrypted to eliminate the opportunity for cyber threats, en-suring that a high-level of security is maintained to meet one of the stringent testing requirements of FICAM-approved products.

Th e Benefi ts of Using an IT-centric Solution In an IT-centric environment, solutions leverage soft ware running on hardware as opposed to fi rmware-supported hardware, which is counter to how things typically work in government access control applications. For the end user, they’re able to take their existing IT infrastructure (TCP over IP) and run soft ware on it to control their access control system in the same way they control network security for logical access to computers.

Using an IT-centric solution also provides users with signifi cant costs savings, which is an issue when dealing with clients that have strict budgetary requirements like the government. Because much of

By Dennis Raefi eld

1014secSup_G10_12_Raefield_v2.indd 10 9/4/14 11:59 AM

Page 49: SP_1410DGD

Samsung delivers the best in mobile surveillance technology. Our 360° and flat dome IP megapixel

cameras capture HD images in both tight spaces and wide open areas. Plus our award winning

ultra-compact mobile NVR features a fast 64 Mbps throughput to quickly download video from

up to eight megapixel cameras, as well as GPS data recording support, a panic box with two-way

audio, and Smart Viewer software for remote access. Get ready, set and go with Samsung.

1.877.213.1222 • samsung-security.com

ready, set... go!

mobile standard certified

compact discreet design

performance driven

technology on the move...

360°AND 2MPCOMPACT MOBILE CAMERAS

8CH MOBILE NVR

SRM-872 SNF-7010VM SNV-6012M

Untitled-6 1 8/29/14 1:30 PM

Page 50: SP_1410DGD

G12 G O V E R N M E N T S E C U R I T Y O C T O B E R 2 0 1 4

G o v e r n m e n t S e c u r i t y

the hardware that’s required in a traditional access control system is unnecessary under this kind of architecture, end users do not need to have the antiquated devices that would typically be required.

For instance, a solution that runs on the IT network doesn’t re-quire the use of any proprietary access control boards or panels to perform the authentication check at the door that other systems re-quire. Th e user only needs the computers operating in their data bank running soft ware with some type of interface at the door to connect the electric-strike contact, monitor whether or not the door is open and have a push button that people can use in the event of an emer-gency to exit the building.

Another potential drawback in using a solution that relies on pan-els is that even when the devices are supplemented with an intelligent component to complete the credential validation process, the tech-nologies still do not have access to the real-time data that a solution using the IT-centric model does. When it comes to interoperability and the time it takes for validation of a credential, the 13.02 topol-ogy can interact with these other systems much faster to determine what policies or attributes may have changed, and make that decision quicker than a typical panel-based solution.

Why Buying FICAM-compliant Products MattersBecause federal agencies are required to purchase products on GSA’s approved products list, any type of PACS solution—be it a traditional hardware-based system or one that is IT-centric—needs to have pre-viously achieved FICAM approval before it is deployed. Having this approval paves the way for the deployment of various access control products in all federal agencies as well as all buildings leased by the GSA for other federal agencies.

Although the user is limited in what they can implement in their facility by what products are on the APL, they are protected. Th ey can rest assured that what they do purchase works, is not vulnerable and meets all of the compliance checklist items.

Th e rigorous FICAM test program ensures that each product on the GSA’s APL meets the functional requirements of FIPS 201 and NIST SP 800-116, that the system is secure from a network perspec-tive, and that there is complete interoperability between all topology components.

Evaluating FICAM’s Impact on Government End UsersAt the end of the day, government users are looking for solutions that meet the necessary requirements at the lowest possible cost. Each agency has a prime directive, be it serving veterans, retirees or ensur-ing homeland security, not spending millions and millions of dollars on access control measures.

While the government has had access control mandates in place for well over a decade, there are still a number of agencies that have yet to fully meet all of the requirements. However, with FICAM, the GSA has said that all access control products purchased moving for-ward must meet these standards or else they won’t be approved for use in buildings owned or operated by the federal government.

Eventually, everyone in the government sector is going to move toward interoperability in physical access, logical access and identity management. Th e best way to accomplish this is through the deploy-ment of a solution that takes advantage of the IT infrastructure al-ready in place.

Dennis Raefi eld is the president and CEO of Viscount Systems.

Stick with an American brand you can trust for safety, security and peace of mind. Garrett Metal Detectors is the worldwide leader in hand-held, walk-through and ground search metal detectors.

LLaw Enforcement Military Sppecial Events Evidence RecoveryLoss Prevention Mass Traansit Government Facilities

THE TRUSTED LEADER FOR 50 YEARS

Proudly Made In The USA

®

Tel: 1.972.494.6151 www.garrett.com

1014secSup_G10_12_Raefield_v2.indd 12 9/4/14 11:59 AM

Page 51: SP_1410DGD

It’s time to RETHINK physical data security!Do you really know what activity is taking place at your server racks? Unless you’re securing and monitoring access to each server rack door with an INTELLIGENT system… your data is at risk!

Rack Armor™ is the INNOVATIVE & UNIQUE physical data security system from IDenticard®. Its sophisticated features include:

CALL TODAY! 855-367-4721www.IDenticard.com/rackarmor

Rack Armor™ uses the authentic Mercury Open hardware platform. IDenticard® has been a Strategic Technology Alliance Partner with Mercury Security since 2007.

Multi-party control requires two valid card reads for access.

Remotely lock, unlock, or lock-out server rack doors.

Plus FULL access control capabilities.

Integrates with video management systems.

Easy graphic interface per rack door.

Untitled-1 1 9/5/14 10:59 AM

Page 52: SP_1410DGD

G o v e r n m e n t N e w s

G14 G O V E R N M E N T S E C U R I T Y O C T O B E R 2 0 1 4

Defendant Extradited to U.S. to Face Terrorism ChargesAhmad Ibrahim Al-Ahmad made his initial appearance on Aug. 20 in federal court in Phoenix, Arizona, on federal terrorism of-fenses. Th e charges stem from Al-Ahmad’s alleged participation in a conspiracy to use improvised explosive devices (IEDs) to at-tack U.S. military personnel in Iraq from ap-proximately 2005 to 2010.

Following his appearance in court, Al-Ahmad was placed in custody of the U.S. Marshals Service, pending a status confer-ence on the issue of detention on Sept. 8, 2014. A trial date is set for Oct. 7, 2014.

On Aug. 12, 2014, a federal grand jury in the District of Arizona returned a super-seding indictment charging Ahmad Ibrahim Al-Ahmad, a Syrian national, with multiple charges related to Al-Ahmad’s alleged partic-ipation in a conspiracy to supply component parts to the 1920 Revolution Brigades—an Iraqi insurgent group—for use in IEDs that were employed against U.S. military per-sonnel in Iraq during that time period. Th e charges include conspiracy to use a weapon of mass destruction; conspiracy to mali-ciously damage or destroy U.S. government property by means of an explosive; posses-sion of a destructive device during a crime of violence and aiding and abetting; conspiracy to commit extraterritorial murder of a U.S. national, and providing support to terrorists.

If convicted of the off enses alleged in the indictment, Al-Ahmad would face a statu-tory maximum sentence of life in prison. An indictment is merely a formal allegation that a defendant has committed a violation of crimi-nal laws and every defendant is presumed in-nocent until and unless proven guilty.

Th is case is being investigated by the FBI Phoenix Division Joint Terrorism Task Force with substantial assistance from various other government agencies. Th e case is being prosecuted by the U. S. Attorney’s Offi ce for the District of Arizona and the Counterter-rorism Section of the Justice Department’s National Security Division.

TSA Application Programs Enroll Millions of TravelersTh e U.S. Department of Homeland Security recently achieved two major milestones for its trusted traveler programs. Th e Transpor-tation Security Administration Pre✓ appli-cation program, which began in December 2013, has now enrolled more than half a

million travelers.Additionally, U.S. Customs and Border

Protection have enrolled more than three million users in their trusted traveler pro-grams: Global Entry, NEXUS and SENTRI. Together, all of these DHS trusted traveler programs provide an improved passenger experience, while enhancing security and in-creasing system-wide effi ciencies.

“Th ese programs enable us to facilitate and expedite travel to, from, and within the United States, while maintaining the highest standards of security,” said Deputy Secretary of Homeland Security Alejandro Mayorkas. “We will continue to work to improve the passenger experience for millions of travelers who go through our airports every day, in a manner that is effi cient, eff ective and secure.”

TSA Pre✓  allows low-risk travelers to experience faster, more effi cient screening at  118 U.S. airports nationwide currently. TSA Pre✓ is an expedited screening pro-gram that allows pre-approved airline trav-elers to leave on their shoes, light outerwear and belt, keep their laptop in its case and their 3-1-1 compliant liquids/gels bag in a carry-on in select screening lanes.

Upon arrival in the United States from abroad, Global Entry members are able to bypass the traditional CBP inspection lines and use an automated kiosk. With more than 70,000 new applicants each month, travelers enrolled in this program can scan their pass-port and fi ngerprints, answer the customs declaration questions using the kiosk’s touch screen and proceed with a receipt. Global Entry is a permanent program and has 51 locations in the U.S. and at CBP Preclearance stations in Canada. Th ese locations serve 99 percent of incoming travelers to the U.S.

Th e NEXUS program allows pre-screened travelers expedited processing by United States and Canadian offi cials at dedicated processing lanes at designated northern border ports of entry, at Canadian airports, and at marine reporting locations. NEXUS members are automatically eligible to use Global Entry kiosks when entering the U.S. Th e SENTRI program also provides expedited processing through CBP at South-west border crossings.

In partnership with TSA, many CBP Trust-ed Traveler program members are pre-eligible to participate in TSA Pre✓. Th ese participants do not need to apply separately for TSA Pre✓, as they will receive their Known Traveler Num-ber once successfully enrolled in a CBP trusted traveler program.

South Texas ICE Detention Facility to House Adults with ChildrenAs of August 2014, the U.S. Immigration and Customs Enforcement (ICE) will use its civil detention facility in Karnes City to house adults with children in response to the infl ux of families that have recently illegally entered the United States. Th e newly modifi ed cen-ter is one of several facilities the Department of Homeland Security (DHS) is using to in-crease the capacity to detain and expedite the removal of adults with children illegally crossing the Southwest border. 

Th ese facilities help ensure more timely and eff ective removals, and deter others from taking the dangerous journey and illegally crossing into the United States. 

“In the face of unprecedented levels of il-legal migration of adults with children and unaccompanied children in the Rio Grande Valley, we have reiterated that our borders are not open to illegal migration; if you come here illegally, and don’t have a legal basis to stay under our laws, we will send you back,” said Secretary of Homeland Security Jeh Johnson. “Th e opening of this additional fa-cility represents our continued commitment to provide temporary facilities for adults with children while they undergo removal proceedings, and it is part of DHS’ sustained and aggressive campaign to stem the tide of illegal migration from Central America.”

On July 11, 2014, ICE modifi ed its con-tract with Karnes County, Texas, in order to transition the Karnes center from an exist-ing immigration detention facility housing adults to a residential facility to house adults with children. Th is was done in order to ex-pand the agency’s capacity to house adults with children who have been apprehended at the border and placed into expedited re-moval proceedings. Karnes County Residen-tial Center will be able to accommodate up to 532 adults with children. 

ICE’s family detention facilities are an ef-fective and humane alternative to maintain family unity as families await the outcome of immigration hearings or return to their home countries. Adults with children will be housed in facilities that adequately provide for their safety, security, and medical needs. ICE ensures that family detention facilities operate in an open environment, which in-cludes classrooms with state-certifi ed teach-ers, access to an online legal library, and bi-lingual teachers.

1014secSup_G14_News_v3.indd 14 9/4/14 12:00 PM

Page 53: SP_1410DGD

From stopping a bomb-laden car and SUV from penetrating the entrances to the U.S. consulate in Herat, Afghanistan in September of 2013 to protecting dams, border crossings, courthouses, embassies, presidential libraries and many other important facilities, Delta’s bollards, barricades, beams, barriers, gates and guard booths have helped keep people and property safe in over 130 countries throughout the world since 1974.

17,000 Systems Deployed Around the World!

40 Years Protecting the

World’s Most Important Facilities

U.S. CAPITOLDelta TT210 Bollards

UK EMBASSY, BUDAPESTDelta DSC1100 Barricade

BERTH LIMA—SAN DIEGODelta TT280 Linear Crash Gate

REAGAN LIBRARYDelta DSC800 Bollards

CITIFIELD STADIUM—NEW YORK METSDSC1200 Barricade

U.S. FEDERAL COURTHOUSE—LOS ANGELES

Delta Fixed Bollards

SINGAPORE PARLIAMENTDelta DSC720 Bollards

U.S. DEPARTMENT OF STATEDelta TT210 Bollards

SOCIAL SECURITYBUILDING, DC

Delta IP500 Portable Barrier

LOS ANGELES INTL. AIRPORTDelta SC3000 Sliding Gate

U.S. EMBASSY, YEMENDelta DSC501 Barricade

UNIVERSAL STUDIOSDelta Booth

PENN STATEDelta MP5000 Mobile System

BUCKINGHAM PALACEDelta DSC720 Bollards

Go to www.deltascientific.com for full details & specifications.

40355 Delta Lane, Palmdale, CA 93551 1-661-575-1100 [email protected]

Untitled-1 1 3/3/14 11:35 AM

Page 54: SP_1410DGD

10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

www.dsxinc.com

CREATING THE FUTUREOF SECURITY . . . TODAY

Untitled-10 1 1/2/13 4:21 PM

Page 55: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y. C O M 3 9

CUTTING-EDGE SURVEILLANCE Video solutions help reduce crime in New York CityBy Alex Asnovich

Declining crime rates in many major cities can be attributed in part to technological advancements that deter prospective criminals and bolster rapid response time when crime does occur. New York City, for example, had a crime rate that decreased by 3 per-cent from 2009 to 2013, due in part to an increase in use of IP

security cameras and cutting-edge software that allows thousands of camera feeds from a single site to be accessed remotely.

Following this approach, property owners of low-income housing projects across New York City rise above the challenge of unlawful activity by placing em-phasis on well-maintained facilities and on-site security teams that cultivate safety via video surveillance.

BUILDING FROM THE GROUND UPWhen Omni New York purchased the River Park complex in the Bronx in 2012, the purchase was the largest in New York subsidized housing history. The fi rm

sought to dramatically increase the quality of life for River Park’s more than 4,000 residents by renovating the development’s 1,654 tenant units and drastically re-ducing the amount of unwanted or unlawful activity. To achieve this goal, Reli-ant Safety, a subsidiary of Omni, devised a comprehensive security solution that included an on-site security team and thousands of video cameras.

In designing the system, Reliant sought a solution that was easy to install and operate, and that offered user-friendly VMS that could be effortlessly accessed by multiple users from a variety of locations. Early on, they conducted thorough market research into different CCTV system providers, ultimately concluding that Hikvision equipment was the best choice to meet their needs for ease of use, supe-rior image quality and innovative software solutions.

ONE CAMERA PER UNIT KEEPS RESIDENTS SAFEReliant Safety’s goals included establishing a more secure atmosphere, installing new cameras to provide comprehensive coverage, both inside and outside of the

RETAIL SECURITY

1014sec_039_042_Boudinot_v3.indd 39 9/16/14 1:16 PM

Page 56: SP_1410DGD

RETAIL SECURITY

4 0 1 0 1 4 | S E C U R I T Y P R O D U C T S

buildings; and incorporating intelligent video management software (iVMS) to streamline and coordinate the solution.

When asked why Omni’s proper-ties stand out from other subsidized housing developments, Ash Abolos,

vice president of technology at Reliant Safety, said, “Every inch of our prop-erty is covered; we usually have on aver-age one camera per unit.”

The IR Mini Bullet Camera, sta-tioned in corridors, stairwells, lobbies

and exterior areas of River Park Tow-ers, works alongside megapixel mini dome cameras. These hardy cameras easily withstand harsh weather condi-tions and exhibit true day/night sur-veillance. In addition, the mini dome

boasts an impact resistance rating greater than IK10 to safeguard against even the most determined vandal.

CUSTOM-DESIGNED IVMS SOFTWAREHikvision’s iVMS-5000 Integral Moni-toring Management System Software ties the whole solution together.

“This software allows us to manage all of the new cameras, as well as older, preexisting models, on one convenient platform,” Abolos said. “We also use iVMS-5000 Enterprise to remotely link the NYPD and our own private secu-rity staff.”

Hikvision originally developed its innovative VMS for the Beijing Olym-pics. Although the software was ini-tially made for a closed network, Re-liant identifi ed a need to connect with the New York City Police Department (NYPD) during special investigations into activities in violation of River Park’s rules and regulations. To ensure the success of the installation at River Park and at Omni’s other properties, Hikvision research and development custom-tailored the software so it could travel over the network to client ma-chines. The reconfi gured software was introduced as iVMS-5000, and now links River Park’s control room directly to the NYPD when the need arises.

“We work very closely with the po-lice department,” Abolos said. “They have full access to all of our surveil-lance systems during any crisis so they are aware of the surroundings before they arrive on site.”

Detectives are assigned unique user-names and passwords as Reliant desig-nates certain areas for each detective to access. If they are working on under-cover investigations, for instance, they can view video footage remotely, en-abling them to observe suspects in de-tail without the conspicuous presence of a police cruiser.

“The police love working with us because not only do we provide them remote eyes with our video surveillance system, but the software is incredibly easy to use,” Abolos said.

THE IMPACT OF RAPID RESPONSE TIMEThe combined forces of Reliant’s on-site security team, NYPD and Hikvision equipment have all played a role in re-ducing criminal activity at River Park

Go to sp.hotims.com and enter 33 for product information.

1014sec_039_042_Boudinot_v3.indd 40 9/16/14 1:16 PM

Page 57: SP_1410DGD

12-SeriesGas Detection Powered by 100-240VAC

Gas Detection and ControlThe Macurco 12-Series are line voltage (100-240VAC), dual relay gas detector, controller and transducers. The 12-Seriesutilizes an internal switching power supply that is capable of using line voltage between 100 and 240VAC and 50-60Hz. The12-Series have selectable 4-20mA output, buzzer and digital display options. It is an electronic detection system used tomeasure the concentration of various gases and provide feedback and automatic control to help reduce gas concentrationsin parking garages, maintenance facilities or other commercial applications. Selectable options include:

Features

GD-12 Combustibles (EX)

TX-12-HS Hydrogen Sulfide (H2S)

Go to http://sp.hotims.com and enter 5 for product information.

Untitled-1 1 9/4/14 2:21 PM

Page 58: SP_1410DGD

RETAIL SECURITY

4 2 1 0 1 4 | S E C U R I T Y P R O D U C T S

Towers. Criminal activity decreased noticeably as soon as the cameras were installed, their presence acting as a de-terrent to potential criminals. But, the function of the system is not simply sur-veillance; it boosts response times when unwanted activities occur and even pre-

pares the security team for the future.All facets of this system work in

tandem with tremendously success-ful results. Recently a young man who was wanted by the police came onto the River Park property but fl ed before the police could respond. His image was

captured on camera and stored in the IP video surveillance system. One week later, the in-house security team saw him re-enter the property, called the police and used the cameras to track the sus-pect through the lobby, into the elevator and up to a unit on the fourteenth fl oor.

When the police arrived on the scene, the security team was able to let them know exactly where the suspect was. As the police took the elevator up to the fourteenth fl oor, the suspect ex-ited the apartment with another man. Because the real-time functionality of the high-defi nition cameras permitted the security team to follow the action, they relayed to the police that their sus-pects would be standing in the elevator lobby as soon as the doors opened.

The police immediately apprehend-ed one suspect when they exited the elevator, but the other escaped down the stairs. He exited the stairwell on the tenth fl oor, ran across the hallway and headed down another stairwell on the opposite side of the building. The po-lice who were pursuing him didn’t see him exit, so they continued down the fi rst stairwell. Technology upheld the mission as the security team watching in the control room was able to fol-low every move of the fl eeing suspect. They alerted the police waiting on the ground level and the second man was taken into custody as soon as he burst out into the open.

COLLABORATION TRIUMPHS OVER CRIMESuch a successful endeavor is a testament not only to the coordination and quick action of Reliant Safety and the NYPD, but to the dependability of the security equipment for real-time imagery and software that effortlessly manages mul-tiple cameras operating in tandem.

Reliant has installed 8,000 Hikvi-sion cameras in approximately 30 hous-ing complexes spanning all fi ve bor-oughs of New York City and extending to Omni properties in Boston as well.

“Hikvision’s state of the art technol-ogy gives us the ability to monitor thou-sands of real-time video feeds and link directly to law enforcement during any incident to immediately respond to the concerns of our tenants,” Abolos said.

Advanced video surveillance tech-nology such as this serves the commu-nity by curbing criminal activity while helping residents feel safer and more secure in their sur-roundings.

Alex Asnovich is di-rector of marketing at HIKVision USA.

Samsung delivers the best in mobile surveillance technology. Our 360° and flat dome IP megapixel

cameras capture HD images in both tight spaces and wide open areas. Plus our award winning

ultra-compact mobile NVR features a fast 64 Mbps throughput to quickly download video from

up to eight megapixel cameras, as well as GPS data recording support, a panic box with two-way

audio, and Smart Viewer software for remote access. Get ready, set and go with Samsung.

1.877.213.1222 • samsung-security.com

ready, set... go!

mobile standard certified

compact discreet design

performance driven

technology on the move...

360°AND 2MPCOMPACT MOBILE CAMERAS

8CH MOBILE NVR

SRM-872 SNF-7010VM SNV-6012M

Go to sp.hotims.com and enter 6 for product information.

1014sec_039_042_Boudinot_v3.indd 42 9/16/14 1:16 PM

Page 59: SP_1410DGD

NEED HELP WITH AN OUTDOOR WIRELESS CONFIGURATION?

Try our new wireless solution selector tool at www.avalanwireless.com

(866) 533-6216www.avalanwireless.com

Leaders in Wireless IP Video Connectivity

MAX POWER, HIGH SPEED, LINE-OF-SIGHT300 MBPS ETHERNET SOLUTIONS

SECURE WIRELESS SOLUTIONS FOR INDUSTRIAL APPLICATIONS

Try our n

• NEW: Maximum legal transmit power - 1 Watt

• NEW: LEDs showing signal quality, Ethernet link, network activity and power

• NEW: Built in lightning arrestors

• Line of Sight Range up to 30 miles

• 3-Port POE out 802.3at option

Go to http://sp.hotims.com and enter 41 for product information

Untitled-8 1 7/15/14 2:28 PM

Page 60: SP_1410DGD

PRODUCT SOLUTIONS Compiled by Lindsay Page, Senior Editor

DVRS/NVRS

4 4 1 0 1 4 | S E C U R I T Y P R O D U C T S

Swann SecurityD1 DVR

Swann Security introduces D1 high defi nition tech-nology that records video four times larger and clearer than traditional security cameras, without sacrifi cing real time recording and live viewing. The SwannLink app syncs cameras with tablets or smartphones for remote viewing. It records in color during the day, black and white at night, using IR LEDs. The DVR’s 500GB hard drive allow for “set and forget” functionality for up to 30 days of con-tinuous recording, motion-activated feature extends continuous recording time. Swann Security.

Go to sp.hotims.com and enter 317 for product information.

Secura Key SK-NET Version 5.1

The SK-NET Version 5.1 from Secura Key in-cludes support for video integration with Hikvi-sion DVRs and NVRs. This integration allows the user to view video clips related to access control or intrusion events, as well as live video with PTZ control. The SK-NET Explorer, Right Click Popup Menu was developed not to obscure the live vid-eo window. Recently translated text has been added for non-English versions of SK-NET. The SK-NET-DM basic software can control up to 200 doors. SK-NET-MLD Multi-Location Software is required for dial-up modem use or multiple TCP/IP connections. Secura Key.

Go to sp.hotims.com and enter 318 for product information.

JVC VR-D100

JVC’s VR-D100 Series DVRs feature exclusive Su-per LoLux processing, advanced performance fea-tures and extended capacity recording storage for today’s high resolution analog cameras. Three new models include the 4-channel VR-D1004-500 with 500MB internal recording capacity; 8-channel VR-D1008-1TB with 1TB internal recording capacity; and VR-D1016-1TB with 1TB internal recording capacity. All offer H.264 compression for reduced storage and bandwidth and encoding support for analog cameras capable of capturing up to 700 TVL. With dual-stream recording at 30fps, HDMI and VGA outputs (1920x1080) for synchronous playback, two-way audio, and 12VDC operation for mobile use plus a free mobile app and three-year warranty. JVC.

Go to sp.hotims.com and enter 319 for product information.

SamsungSRN-4000

Samsung has introduced its new addition to their Network Video Recorder line with the SRN-4000. The NVR is Linux based, featuring 400Mbps re-cording throughput; full function 64 channel with license included; capable of recording simultane-ously 64, 5 megapixel cameras with ease; a user-friendly single interface that eliminates the need to set up your cameras separately; standard 12 front removable hot swappable hard drives allowing for internal storage up to 48TB; iSCSI and NAS capa-bility. The NVR was designed with its own standard independent redundant power supply and RAID 5/6 ideal for for enterprise or mission critical re-cording where 100 percent up time is needed and camera metadata collection for enhanced search. Other advanced analytics include people counting and heat mapping. Samsung.

Go to sp.hotims.com and enter 320 for product information.

Samsung Techwin AmericaSRM-872

Samsung Techwin’s SRM-872 is a full featured, 8 channel NVR for mobile use with POE to power all connected cameras, and has been designed to withstand the extreme environments faced in the mobile and railroad industries. Boasting the small-est footprint on the market, it has only one single DIN and features built in VGA/HDMI out for HD mon-itor connection with full menu driven mouse sup-port. Additional features for the NVR include high quality HD recording Samsung Style with 64 Meg of throughput for up to 8 megapixel cameras, and in-cludes accessories such as GPS, driver status and panic box, remote control, universal mounting bracket, built-in web server and Smart viewer soft-ware to remotely access the unit. The NVR also of-fers options such as Wi-Fi, 3/4G cellular and M12 connectivity. Samsung Techwin America.

Go to sp.hotims.com and enter 321 for product information.

InterlogixTruVision DVR11

The TruVision DVR 11 is a cost-effective, digital video recorder with 4-, 8- or 16-channel capabili-ties utilizing H.264 video compression technology to deliver real-time recording per channel at a CIF resolution. A built-in Web browser and access via mobile apps allow users to stay connected re-motely via any Web-enabled device. Compatible with TruVision Navigator, the DVR integrates easily with existing systems and features a familiar, user-friendly interface with internal storage from 500GB up to 4TB. Interlogix.

Go to sp.hotims.com and enter 322 for product information.

infi nias Intelli-M Access NVR

The infi nias Intelli-M Access NVR provides an all-in-one video and access control management so-lution for monitoring your business around-the-clock. The network video recorder enables you to monitor your locations, manage video and control access—and offers a fl exible, cost-effective secu-rity solution for a range of industries, including healthcare, banking, education and small to large enterprises. infi nias.

Go to sp.hotims.com and enter 323 for product information.

American Dynamics VideoEdge NVR

The VideoEdge Network Video Recorder has fea-tures such as Auto Discovery, which allows users to locate cameras on the network and assign IP addresses to any VideoEdge NVR with the click of a button. This is version 4.5 from American Dy-namics, and it includes a watermarking process that allows security offi cials to assign a unique vi-sual mark to the video that is specifi c to its busi-ness. American Dynamics.

Go to sp.hotims.com and enter 324 for product information.

OnSSIOcularis

The latest version of OnSSI’s Ocularis changes the landscape in system design, implementation, scal-ability, functionality and cost-effi ciency. Open plat-form enables integration with leading video and access solutions. Mix & Match architecture allows for fl exibility in design and cost savings, and the “Powered by OnSSI” NVR Appliances integrate with exisiting or new Ocularis systems. Critical Camera Failover assures you never lose sight of critical areas, switching automatically to another camera with the same fi eld of view. In the event that a recorder fails, Ocularis can automatically switch to cameras from another recorder as well. Audit Logging provides reporting on all system ac-tivities for even greater value. OnSSI.

Go to sp.hotims.com and enter 325 for product information.

Van Cleve & Associates’Clip 11

Van Cleve & Associates’ Clip 11 is a mini-DVR that

DVRs and NVRs are both essential pieces of secu-rity equipment because they record video and audio from security cameras. With both of these products,

users can take advantage of having real-time and recorded video for both businesses and residences. DVRs typically use analog cabling in order to bring the analog signal from the camera to the device. For IP-based NVRs, the IP network

transfers the information from its LAN port. Both the DVR and the NVR are critical additions to any surveillance system.

1014sec_044_045_PS_DVRs_v2.indd 44 9/16/14 1:29 PM

Page 61: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y. C O M 4 5

has been designed for body-worn applications, but also usable in many other scenarios. The DVR is small (1.57 x 2.17 x 0.43 inches) and rugged, and inputs 2 microphones, a battery and any compos-ite (analog) video feed. The unit has 32GB internal memory and a removable micro-SD slot for an ad-ditional 32GB. A docking station is included and allows for settings adjustment, video playback and scheduled recording setup. Optional 3G/4G & Wi-Fi modules can enable live or pre-recorded video streaming to any PC. Van Cleve & Associates.

Go to sp.hotims.com and enter 326 for product information.

FLIRSuper-R DVR

Users can supersize their recording capacity with FLIR’s Super-R 960H 32-channel DVR The robust unit supports 960H super-resolution (960x480) recording at real-time (30 fps) per channel on all 32 channels. The 960H platform records with 34 percent more resolution than standard D1, offering a true to life aspect ratio designed for 16:9 wide screen viewing. The DVR enables the realization of the full potential of 700+ TVL 960H cameras by providing sharper, more detailed and accurate im-ages. Advanced features of the 32 channel DVR include 16 Looping Outputs, HDMI, eSata backup support, CMS software, FLIR DDNS service, 8x HDD bays, full PC/Mac compatibility and Mobile apps for iPhone, iPad and Android devices. FLIR.

Go to sp.hotims.com and enter 327 for product information.

Crest ElectronicsCDR-3500

Crest Electronics’ CDR-3500 Series embedded DVR offers 960H resolution, supporting real time display, recorded playback of full WD1 (960x480) for all channels. The DVR is available in 4, 8 and 16 chan-nels, with H.264 compression. The user-friendly setup has many menu options, including individual camera settings for resolution, recording and play-back quality for local and remote. The DVR also of-fers proprietary backup with watermark or AVI via USB port, allows setup of calendar, event, emer-gency or intensive recording per channel, and net-work connectivity utilizing easy-to-use remote soft-ware. The unit is compatible with all analog cameras in the market and supports mobile device applica-tions for Android and Apple. Crest Electronics.

Go to sp.hotims.com and enter 328 for product information.

KJB Security ProductsPower Case DVR

The Power Case DVR is a standalone system with all the set up and features built into the case itself. Your iPhone does not need to function in order for this case to work. Users simply position the Power

Case DVR to record any targeted area.  The Auto-matic Camera Orientation means that the camera

will always be in the correct horizontal position, no matter if the case itself is facing up or down. The Power Case DVR records to 16GB of fl ash memory and can be connected to a PC via the USB cable to view playback. KJB Security Products.

Go to sp.hotims.com and enter 329 for product information.

Distributed by

INSTALLS like analog - PRICED like analog - PERFORMS like HD IP.

COAX runs up to 1650 ft! None of the length limitations and high cost of HD-SDI.

The EASIEST HD upgrade ever! Replace cameras, replace recorder... DONE.

DISTRIBUTION OPPORTUNIES AVAILABLE. Contact: North American Cable Equipment (800) 688-9282 [email protected] www.securitytronix.com

HD-COAXINATOR™

terminates analog and HD-SDI !

T H E I M A G E O F Q U A L I T Y

TRONIXSECURITY ®

• • • • • • •

• •

• • •

North American Cable Equipment Inc.www.northamericancable.com

Go to sp.hotims.com and enter 37 for product information.

1014sec_044_045_PS_DVRs_v2.indd 45 9/16/14 1:29 PM

Page 62: SP_1410DGD

4 6 1 0 1 4 | S E C U R I T Y P R O D U C T S

MULTI-CAMPUS FACILITY SECURITY

SECURING THE OLD WITH THE NEWNew England healthcare system addresses unique security issuesBy Jim Stankevich

It’s an institution that boasts several medical fi rsts—the fi rst X-ray in the United States in 1896; the fi rst facility to use chemotherapy to treat cancer in 1942; and, in 1949, the development of the world’s fi rst artifi cial heart pump, a device now part of the permanent collection of the Smithsonian. For Yale-New Haven Hospital (YNHH), a 1,500-bed tertiary care hospital

with world-renowned specialties in pediatrics, cancer treatment and psychiatrics, technological advancements are part of its DNA.

The teaching hospital for the prestigious Yale School of Medicine is the fl ag-ship facility of Yale New Haven Health System, Connecticut’s largest healthcare system, which encompasses a host of other treatment facilities dotting New Eng-land’s southern shoreline. The YNHH organization and its parent health system occupy buildings that range from brand new to more than 150 years old.

The cornucopia of access control and video surveillance technologies that ac-companied these facilities, ranging in size, age and technologies, presented their own integration challenges for security and safety staff.

SECURITY NEEDS AN UPGRADEHospital security offi cials knew an upgrade to this disparate and diverse array of equipment would allow them to centralize the management and maintenance of security operations of the major YNHH facilities, a list that includes such loca-tions as the former Hospital of Saint Raphael Campus, a neighboring New Haven hospital that YNHH acquired in September 2012. Other sites include a new, large, off-site IT Administration and Outpatient Clinical Care facility in nearby North Haven and eight other major satellite inpatient and outpatient treatment centers. Streamlining would represent savings not only for Protective Services’ Security Technology Division, but also for Patrol Operations, which performs foot and ve-hicle patrols, security response units, emergency dispatch, and locksmith duties for all YNHH facilities.

On the access control side, the realization that the hospital’s existing access con-trol platform would no longer give YNHH a technological edge occurred during the construction of Smilow Cancer Hospital in 2009, a 17-story, 500,000-square-foot building on downtown New Haven’s Park Street. Because the system was not scalable to meet the needs of the new building, this marked a turning point for the hospital and the direction of the security technology.

“We knew that our mix of different systems was not giving us the critical infor-mation we needed to make the split-second and strategic decisions about our on-going security operations,” said Marvin White, manager of physical security and protective services at the Yale-New Haven Hospital. “Not only did we need to have this information for our own department, but we lacked the system intelligence to provide that information to the rest of our organization.”

OVERHAULING SECURITY TECHNOLOGYWith a new technology direction that involved Johnson Controls, who was selected as the systems integrator for Smilow Cancer Hospital, and an upgrade and expan-sion of the video and access systems, YNHH chose the C•CURE 9000 security and event management platform from Software House. The team carved out a phased approach that would ultimately transition more than 12 individual YNHH sites onto C•CURE 9000 over the hospital’s robust central network.

“The deployment of this new centralized management platform will integrate the hospital’s disparate security systems together to make YNHH’s overall secu-

1014sec_046_050_Stankevich_v4.indd 46 9/16/14 1:18 PM

Page 63: SP_1410DGD

Supported Surveillance

Access PointsLink remote IP camera installations to a

network with rugged TRENDnet outdoor-rated access points.

PointManage network access to

surveillance systems with TRENDnet Web Smart and Layer 2 switches.

Smart SwitchesPoE Solutions

IP Cameras

Expand a surveillance system with reliable TRENDnet PoE and PoE+ switches, injectors, and splitters.

E S l ti

TRENDnet offers a complete networking hardware foundation which supports the efficient expansion of IP based surveillance systems. Look to TRENDnet for all of your IP camera networking hardware needs.

Outdoor

Scan me

888-326-6061 (Option 1)[email protected]

©2014 TRENDnet. TRENDnet and its logos are the registered trademarks of TRENDnet Inc. All rights reserved.

PoE Wireless

Go to http://sp.hotims.com and enter 36 for product information.

Untitled-3 1 8/19/14 12:04 PM

Page 64: SP_1410DGD

4 8 1 0 1 4 | S E C U R I T Y P R O D U C T S

MULTI-CAMPUS FACILITY SECURITY

rity operation and response more effi cient and effective,” said Michael Parks, ac-count executive with Johnson Controls. “The ability to see both video and access alarms on one unifi ed platform provides the necessary information to the offi cers monitoring the security operations. Once the hospital has fully deployed C•CURE 9000, they will have the benefi t of expanding and scaling the system to meet their needs, however big they might grow.”

Such a sweeping overhaul of the hospital’s security technology was considered necessary by hospital offi cials to maintain and enhance not only the institution’s level of safety and security, but as an overall contribution to YNHH’s renowned standard of patient care.

“We’re very proud of our position as one of the leading hospitals in the United States, and staying ahead of the technology curve is paramount in keeping pa-tients, visitors and staff safe,” said Nicholas Proto, director of protective services, parking and transit at the Yale-New Haven Hospital.

Employee credentials and badging. The multi-tiered plan would include the sig-nifi cant undertaking of updating access credentials for more than 12,000 workers in the YNHH network as well as additional staff from Yale New Haven Health System. This massive upgrade would affect more than 1,000 doors and readers in the YNHH network alone.

To accomplish such a comprehensive and multi-stage migration and expan-sion—and avoid issuing brand new credentials to nearly 20,000 employees —the team devised a strategy to run C•CURE 9000 on the front end using proximi-ty technology with the legacy access control system running in the background to support the existing magnetic stripe cards. At the Saint Raphael Campus, C•CURE 9000 is in the process of being installed to replace barcode technology from yet another legacy access control platform.

Workstations running C•CURE 9000 and the legacy system are placed next to each other and are both tied to the HR database for new badge creation. When a new employee credential is created, the feed from the HR database goes into both C•CURE 9000 and the legacy system so that the new cardholders can use readers on both systems.

Upgrading analog to IP. In tandem with the access control project, Johnson Controls set out to upgrade YNHH’s analog CCTV system to a more modern IP surveillance network that would allow for a similar centralized command-and-control approach. Using the victor unifi ed video management system from Ameri-can Dynamics that merges video from IP and analog devices into a single, unifi ed interface, security personnel can view feeds from more than 800 cameras from the central command center on York Street.

Remote programming by IT. New iSTAR controllers from Software House were installed in IT closets throughout the YNHH network. Because the data closets are very small, there is little space for technicians to move around, making it dif-fi cult to perform on-site programming. However, using the iSTAR Confi guration Utility (ICU), technicians could easily perform remote programming, which was a great benefi t to the hardware transition. To save additional space, rack-mounted iStars were incorporated in the recent Emergency Department renovation as well.

Thermal imaging. The hospital also installed its fi rst thermal imaging camera, which is also running on the victor unifi ed management system. YNHH installed the camera to monitor an employee parking area at its North Haven Medical Cen-ter. The thermal imaging camera enables YNHH to see through the foliage of the trees, track the heat of people and works in conjunction with surveillance cameras, emergency phones and the ability to dispatch based on suspect activity.

SUCCESSES OF THE NEW SECURITY SYSTEMWith the addition of victor, migrating to IP cameras has been a much easier tran-sition. New facilities, like the New Haven off-site emergency room and an ambu-latory care center that opened in early 2013, with more than 20 IP cameras and about 30 card readers, was easily added to the hospital’s IT network. Simple PoE switches feed the video back to the hospital’s server farm in New Haven, where it’s recorded on a bank of 22 VideoEdge network video servers.

In all, Yale-New Haven’s 900 cameras—about 150 of which are analog—are

Transponder and Reader Engineered Systems, Inc.

Experience and Innovation in RFID

EXPERIENCE AND INNOVATION AVAILABLE NOW!

ALL PRODUCTS SHOWN ARE FCC CERTIFIED – PART15 COMPLIANT (888) 574-8737 - [email protected]

www.tresrfsolutions.com

Long Range Passive (15 to 28 ft.) for Vehicle ID, Access Control, Asset Monitoring. Field Program Tags

Custom Graphics Available. Tags in Inventory for Immediate Delivery.

Super Long Range Active (10 to 2000 ft.) for Gate Controls, Personnel/Asset Tracking, Theft

Prevention. Wiegand Output, TCP/IP, USB or Serial.

Tags Have Replaceable Batteries!

Go to sp.hotims.com and enter 19 for product information.

1014sec_046_050_Stankevich_v4.indd 48 9/16/14 1:18 PM

Page 65: SP_1410DGD

KEYSCAN GIVES LEGACY ACCESS CONTROL SYSTEMS WHAT THEY NEED

...A FUTURE.

With Keyscan’s full complement of feature-rich 1, 2, 4 and 8-reader door and elevator floor access control units and our renowned software, we can provide a simple solution to upgrading your aged or failing accesscontrol system.

Keyscan’s ‘hybrid’ approach to access control mixes network appliance-based hardware architecture as well asour ‘At-the-Edge’ solution. It simplifies system design by utilizing some, if not all, of your existing readers, credentials, network and power cables.

Keyscan’s approach helps you breathe new life into your aged or failing system by providing the latest in accesscontrol technology and making it easy for you to upgrade.

1 888 KEYSCAN (539-7226) toll free Canada or USA

www.keyscan.ca

Contact us today to find out how we can assist you.

Go to http://sp.hotims.com and enter 31 for product information.

Untitled-10 1 9/9/14 4:21 PM

Page 66: SP_1410DGD

MULTI-CAMPUS FACILITY SECURITY

5 0 1 0 1 4 | S E C U R I T Y P R O D U C T S

viewable on fi ve 42-inch monitors in the security control center facility at the hospital’s main campus. All other systems, such as the hospital’s Mo-torola radio system and PPM 2000 in-cident management software, are also

centralized here. More than 150 panic alarms from the hospital’s Lynx Duress and mass notifi cation system, deployed in areas such as Psychiatrics and the Adult Emergency Department, are also fed back to the dispatch facility into

C•CURE 9000.Centralized reporting functions,

as part of the access control software, were also an integral part of new sys-tem’s success. The Business Intelligence Reporting Suite (BIRS) from Software

House is able to provide White and his team with customized reports from C•CURE 9000 that can be, in turn, provided to other directors within the hospital network. Those reports could include card reader usage over a given period of time or specifi c data on badge holders who accessed a particular area over the previous weekend.

“A standardization project of this size, nearly 5 million square feet of real estate on a corporate level, will allow us to monitor, track and analyze ev-erything with greater ease,” said White. “We’ll have a snapshot of the system’s history at any given time, and we’ll know what types of things need to be attended to and how we can continue to improve.”

The new access and video systems have allowed the hospital to enhance other areas of its operations, as well, including internal food theft in cafete-ria locations. A number of card readers are installed on refrigerators and freez-ers, while 12 new cameras in the East Pavilion cafeteria are mounted above cash registers.

The benefi ts from a standardized, enterprise-level security upgrade also can help YNHH comply with a multi-tude of industry regulations that govern hospital operations. For example, the hospital is currently exploring how the access and video systems can stream-line YNHH compliance with new rules from The Joint Commission concern-ing the storage of certain prescription narcotics by using electronic locks and card readers tied into C•CURE 9000. Using the security management system, security offi cials will also be able to cen-trally manage access to the hospital’s more than 175 prescription cabinets as well as use BIRS reporting to generate audit trail reports.

To date, about 50 percent of YNHH locations have transitioned to C•CURE 9000, including sites such as a pediatric radiology center in Norwalk and the Saint Raphael Campus. When the upgrades are complete, YNHH will have an established platform capable of supporting healthy, scalable growth for years to come.

Jim Stankevich is the global manager of secu-rity and Lynx at Tyco Security Products.

quantumsecure.com • [email protected]

seamless identity management and physical access… in one solution

SAFE is an innovative software solution that integrates diverse security systems with identity management onto a unified policy-based platform. SAFE ensures that every employee, contractor, vendor and visitor has clearly defined and controlled access privileges. And SAFE is fully automated with comprehensive management and reporting features. It’s the most efficient way to manage the lifecycle of identities and their access across your enterprise in order to maintain compliance 24/7. Make your world SAFE with Quantum Secure.

AUTOMATEDPHYSICALIDENTITY

MANAGEMENT

CENTRALID

REPOSITORY

AUTOMATEDWORK FLOW

REAL-TIMECOMPLIANCE

INTEGRATESWITH

EXISTINGINFRASTRUCTURE

INTEGRATEPHYSICALACCESS

CONTROL SYSTEMS AUTHENTICATE

IDENTITIES

Go to sp.hotims.com and enter 21 for product information.

1014sec_046_050_Stankevich_v4.indd 50 9/16/14 1:18 PM

Page 67: SP_1410DGD

The new wireless Securitron R100 Surface Mount Reader provides a clean, elegant appearance for glass, stone or brick entrances.

Protect the aesthetics of your entryway while you

protect its security. The wireless Securitron R100

provides secure entry when used with a Securitron

Magnalock® and an Aperio® wireless hub. The

R100 installs in minutes without drilling or pulling

unsightly wires. With the wireless R100, there is

beauty in a simple installation and a stunning

finished product. Visit our website or call for details.

Experience the beauty of wireless.

SECURITRON.COM | 1.800.624.5625

Go to http://sp.hotims.com and enter 8 for product information.

Untitled-3 1 9/2/14 11:55 AM

Page 68: SP_1410DGD

AIRPORT SECURITY

THE TRUTH ABOUT BIOMETRIC EXITTechnology to verify departures by foreigners has become affordableBy James Albers

How can the United States ensure that the millions of visitors who travel to this country with a temporary visa uphold their agree-ment to leave before it expires, while also enhancing convenience for travelers? Biometrics technology holds the answer. In fact, this technology dramatically lowered cost estimates for U.S. air-

port exit control systems from $6 to $3 billion in 2008 to $1 billion today.However, despite more than 17 years since a law called for a biometric exit

system to help secure our nation’s air and seaports and more than 12 years since the 9/11 Commission recommended it, we still don’t have a system in place in the United States. The problem is that some people continue to rely on outdated cost estimates and technology when considering the solution.

In reality, advanced biometric entry and exit control systems are already being used in airports and border crossings outside of the United States. These systems are affordable, convenient, and can accommodate a high rate of traveler through-put. When properly implemented, biometric exit controls can provide a higher degree of identity assurance than biographic controls alone. Furthermore, this can be done without disrupting operations at airports, seaports or other ports of entry, and at a reasonable cost when considering the benefi ts.

WHAT IS BIOMETRICS?While the latest iPhone familiarized us with biometric technology, particularly fi n-gerprints, most people still don’t have a full understanding of it. Biometrics is who

5 2 1 0 1 4 | S E C U R I T Y P R O D U C T S

1014sec_052_056_Albers_v2.indd 52 9/16/14 1:20 PM

Page 69: SP_1410DGD

Small, Yet Powerful

The eIDC32 single door controller delivers the power you need in the smallest form factor in the industry, managing up to 64,000 credentials when paired with the Intelli-M Access® browser-based software. Server down? No problem, this intelligent little device buffers 16,000 local events until connectivity is restored.

Experience the power of IP based electronic access control today. View our demo online at www.infinias.com/main/POWER | 317.348.1086

Intelligent IP Access Control

Go to http://sp.hotims.com and enter 22 for product information.

Untitled-5 1 8/14/14 11:55 AM

Page 70: SP_1410DGD

AIRPORT SECURITY

5 4 1 0 1 4 | S E C U R I T Y P R O D U C T S

we are; each mode of biometrics, including face, fi nger-print and iris, contains a number of unique identifying features. They are completely unique to individuals and cannot easily be faked. Each distinct biometric modal-ity offers numerous unique benefi ts, that, when used together, can dramatically increase identity assurance.

Facial recognition. Though not a new concept, as police offi cers have been using it for as long as there have been criminals such as when reviewing mug shots, algorithms for face recognition have progressed to the point where software is better at matching faces than the average human could. Face recognition is a potential solution for biometric entry and exit as high-quality video cameras are already installed at most major airports. If mounted in the gates used for international departure, these cameras could capture the faces of departing visitors.

Iris enrollment and verifi cation. In 2008, this was still a niche technology, but today, iris devices have become reasonably priced, as several iris camera man-ufacturers have driven down the costs per unit with high-quality image results. The recent addition of iris to the NIST Personal Identity Verifi cation specifi ca-tions has added certainty to the technology and gives it room to grow.

An iris template cannot easily be reverse engineered to the original iris photo; thereby, it protects the priva-cy of the traveler’s biometric information. Iris recogni-tion can be unobtrusive. High resolution cameras have improved to the point that photographs taken from up to three meters away from the subject will have the de-sired quality, along with the good focus that is required for iris recognition. Similarly, iris recognition systems are contactless and hygienic. There is no need to touch a surface that has been touched by thousands of travel-ers, helping to prevent the transmission of disease via contact. Considering fi ngerprints can sometimes be as-sociated with criminal behavior, iris may be less offen-sive to a subset of travelers.

Iris recognition systems are stable. The iris is an internal organ that is protected against damage and wear by the cornea. It is mostly fl at with a geometric confi guration that is mainly dictated by pupil dilation. This makes the iris shape far more predictable and stable than an individual’s face. Because of this, iris recognition is highly reliable with the ability to reach extremely low false accept rates, comparable to that of any other biometric modality.

Finally, iris results are returned quickly. Iris tem-plates are small, and as a result, database searches are fast. Current server hardware can match an iris template to tens of millions of templates in less than a second. This means that iris can provide a “lights out match,” comparing one template to many records faster than any other biometric.

Stand-off dual capture. There is even more to gain by using stand-off dual capture units, which simulta-neously captures both face and iris images. Today’s dual face and iris cameras are of suffi ciently high res-olution; a photograph taken with the appropriate lens

and lighting, from a distance, still has the resolution necessary to perform accurate matches.

Stand-off technologies allow for photographs to be taken unobtrusively, in seconds and can be confi g-ured to fi t into natural chokepoints at airports, such as check-in counters, security checkpoints or at the departure gate. Within seconds, a stand-off simulta-neous face and dual iris biometric collection device can take photographs of a subject’s face and eyes and send the images to a back-end search engine. Depend-ing on the complexity of the search workfl ows, results can return in seconds. At natural document han-dling points, search results could be returned before the document examination is completed. With faster computer systems and advances in computer vision algorithms, these systems will only get better.

Fingerprint recognition. There are exciting ad-vances in fi ngerprint capture devices that provide new options for exit confi gurations. There are contactless fi ngerprint capture solutions that can capture four fi n-ger images with a single movement of the hand in less than a second. Its fast acquisition capability allows subjects to provide fi ngerprints while on the move, making it suitable for high-traffi c environments. This method of fi ngerprint capture alleviates hygienic con-cerns when using a commonly touched surface.

BIOMETRIC EXIT OFFERS GREATER SECURITY The use of biometrics is the single best way to quickly and accurately prove an identity. Biographic informa-tion, such as a person’s name and date of birth, as well as the documents used to verify biographic informa-tion, are all vulnerable to fraud. All of this information and documentation can be falsifi ed and stolen. In ad-dition, biographic data is fraught with errors because it is reliant, in most cases, on human collection. The Boston Marathon bombing serves as an example of this: Russia warned the United States about Tamer-lan Tsarnaev, but an opportunity to question him was missed because our records contained a spelling error.

Biographic data is presented inconsistently around the world. Birth dates can be presented as day/month/year or as month/day/year and names can be pre-sented as fi rst/middle/last or the reverse. This is in addition to limitations associated with transposed or erroneous numbers or letters. Many names—espe-cially those associated with foreign languages—allow multiple spellings or use of hyphens or other marks that can reduce the reliability of biographic systems. Biometric identifi cation and verifi cation, on the other hand, is based on international standards and is gen-erally not subject to the same vulnerabilities as bio-graphic data.

MULTI-MODAL BIOMETRICS TAKES SECURITY TO A NEW LEVELToday, when a nonimmigrant arrives at a U.S. port of entry and applies for admission to the United States by air or sea, the only biometrics collected are fi ngerprints and photographs; but, the photographs

are often not suitable for use by facial recognition technology. Because of this, many assume that an exit system should be based on a fi ngerprint match-ing system. Collecting additional biometrics from visitors, fi ngerprints for sure, but also quality pho-tos that work with facial recognition systems and are iris-capture compliant with recently issued National Institute of Standards and Technology (NIST) stan-dards would provide additional fl exibility to employ a system that works most effectively in different airport environments. In some instances, this may include iris scans; in other instances, facial recogni-tion; and in others, fi ngerprints.

Regardless, collecting multiple modalities of bio-metrics at the time of entry would provide more op-tions for capturing biometrics at exits. Contactless biometric capture using face, fi ngerprint, iris scans or a combination thereof would allow operators to take advantage of the relative benefi ts of each biometric identifi er and method of capture such as accuracy, passenger throughput, convenience and cost. In this scenario, fi ngerprints would continue to be collected during enrollment, allowing for comparison against relevant databases. And, with the addition of iris and facial recognition scans at the time of entry, the added security benefi t of allowing matching against face and iris databases would be provided.

With multiple modalities implemented, the pri-mary modality used on a given day can be changed, mitigating the ability to plan for methods to spoof any single biometric. In addition, a multi-modal sys-tem ensures that each visitor would have at least one biometric identifi er in the system that can be used to confi rm identity. And, while each of the three biomet-ric technologies has a relative margin of error, col-lectively they can ensure high probability matches on data sets with tens of millions of records and more, and can be used to reduce the impact of failed bio-metric capture, for instance, due to dry fi ngerprints. Statistics from the Indonesian multi-modal national ID card project, for example, shows that there is only a 0.008 percent chance of false positive identifi cation and a 0.18 percent chance of false negative identifi ca-tion on a database of more than 100 million records.

Additionally, multi-modal biometric entry/exit systems actually reduce processing times. Combina-tion facial recognition and document scanning sys-tems can process a passenger in as little as eight sec-onds. Iris scanning systems can capture and process an iris image in a few seconds, while contactless, fi n-ger-on-the-fl y technology can read four fi ngerprints in as little as three seconds.

THE COST OF BIOMETRIC TECHNOLOGY CONTINUES TO DROPIn studying the opposition to biometric exit controls, there is signifi cant reliance on a 2008 report that esti-mates the costs for implementing a biometric exit sys-tem at airports and seaports between $3 billion and $6 billion. These cost estimates are out of date and

1014sec_052_056_Albers_v2.indd 54 9/16/14 1:20 PM

Page 71: SP_1410DGD

Go to http://sp.hotims.com and enter 20 for product information.

Untitled-2 1 9/10/14 10:35 AM

Page 72: SP_1410DGD

AIRPORT SECURITY

5 6

orders of magnitude too high, and do not take into account the dramatic price declines in biometric technologies in the six years since—the same kind of declines we’ve seen in other technologies.

This original study rested on the assumption of building a system to speci-fi cations without considering the range of commercially-available, off-the-shelf (COTS) biometric capture devices offered by vendors today that are affordable, highly accurate and are designed specifi cally to fi t within an airport footprint. To illustrate this point, the fi rst live scan fi ngerprint devices were put into use 20 years ago, were big and bulky, and cost $15,000 or more per unit. Today, live scan devices are small and cheap enough to put on an iPhone, and law enforcement agencies buy high volume, 10-print fi ngerprint devices for less than $1,500.

Smartphones are a good example of how the cost and size of cameras has de-clined. An iPhone 5 has an 8-Megapixel camera, and the newer models even have autofocus. Nokia now has a 41-Megapixel camera. When this study was done, a 41-megapixel camera was impossible to buy at any price. These remarkable chang-es have allowed cameras to become ubiquitous, and have facilitated law enforce-ment activities using facial recognition.

Likewise, iris recognition was in its early days about six years ago, but it is now recognized as the most effi cient and effective biometric when comparing one tem-plate with many records. A prime example of the scalability of biometric enroll-ment and verifi cation is the Unique Identifi cation (UID) program in India. There are 425 million Indian citizens now enrolled in that national ID program, with a goal of enrolling 600 million by 2014.

BIOMETRIC EXIT SYSTEMS AROUND THE WORLD Australia has an eGate based on facial recognition and ePassports called Smart-Gate. SmartGate has since been expanded to New Zealand and has processed a combined 15.1 million passengers since 2007. Currently, there are over 150 eGate

systems within 24 international airports across eight countries, processing over one million passengers per month.

Other major deployments include fi ngerprint-based systems in France and In-donesia; iris recognition systems in the United Kingdom and the United Arab Emirates; and facial recognition systems in Germany and the Czech Republic. Many of these systems are not limited to ePassport holders of the host country. Of the systems mentioned, holders of second generation American ePassports are able to use Australia and New Zealand’s SmartGate and the French Parafe, and the systems in France, the United Kingdom, Germany and the Czech Republic are open to all second generation ePassport holders of the European Union.

Closer to home, a collaborative partnership between government agencies, known as the Apex Air Entry/Exit Re-Engineering (AEER) project, is evaluat-ing a variety of readily available biometric applications in a Maryland testing fa-cility designed to replicate airport environments. This testing is squarely focused on helping the U.S. increase screening capacity to accommodate growing traveler volumes and identifying cost-effective biometric exit solutions to meet the require-ments of the law.

Considering the signifi cant advances in biometric technology, dramatically falling costs and successful implementations worldwide, it is clear that a fully functioning biometric exit system is quite practical in airport settings without disrupting legitimate trade and travel. Nearly 12 years since the 9/11 Commis-sion recommended it and 17 years since Congress mandated it, biometric technology to verify that foreigners have left the country when scheduled is more than ready for deployment in U.S. airports.

James Albers is the senior vice president for government operations at MorphoTrust USA.

Night and Day

HyperGraphic is the one!Beneath the moon or under the sun, HyperGraphic Impressions

custom manufactured, reflective security yard signs work to generate sales leads for your company.

Toll Free: 1-800-437-4973Fax: 1-800-536-4467E-mail: [email protected] or

[email protected]@hypergraphicimpressions.com

Go to sp.hotims.com and enter 51 for product information.

We have you covered with SpectrAlert®

Advance Low Frequency Sounders and

Sounder Strobes.

To see if your State requires low frequency,

check the adoption map at go.systemsensor.com/lfsp

Worried about NewCode Requirements?

©2014 System Sensor. All Rights Reserved.

Go to sp.hotims.com and enter 23 for product information.

1014sec_052_056_Albers_v2.indd 56 9/16/14 1:20 PM

Page 73: SP_1410DGD

Advidia - Unparalleled Valuefor Every Application

options that are perfect for video surveillance projects of any size.

Each network camera includes a 3-year advanced replacement

warranty, a FREE License of Video Insight Video Management

Software (VMS), and FREE software upgrades for the life of the

camera. Advidia products deliver more than just a clear image -

www.advidia.com or call (832) 240.1768

Go to http://sp.hotims.com and enter 50 for product information.

Untitled-1 1 9/16/14 11:08 AM

Page 74: SP_1410DGD

5 8 1 0 1 4 | S E C U R I T Y P R O D U C T S

CARGO SECURITY

DUAL VIEW AND DENSITY U.K. legislation will be phased-in for freight-handling companiesBy John Leach

Dual view legislation for cargo screening in the United Kingdom will fall into place in January 2015. This has been a phased-in approach to allow freight-handling companies to make the neces-sary equipment and procedural changes.

Freight handlers currently use single view X-ray equipment to screen their cargo, but, if the freight is larger than 4.26 feet, they must complete two passes of the cargo at different 90 degree angles. Effectively, they must do the work of a dual view screening device manually, a time consuming process for any handler that processes a lot of freight.

The next stage, therefore, will demand that a dual view screening device must be used to screen freight, and will mean that single view can no longer be used for screening objects that are in excess of 4.26 feet.

THE PERSPECTIVE OF THE EUROPEAN UNION (EU)The rules of compliance for dual view are more stringent in the U.K. For the rest of the EU, the dates for compliance are later, giving EU counterparts until July 2014 to start completing dual view screening by using a single view machine. Fur-ther, the rest of the EU hasn’t been given a deadline at all for the mandatory use of dual view machinery. However, as the time and costs associated with using a single view to carry out dual view screening are so large, it is thought that the changeover to dual view machinery will occur naturally.

There have been further concessions for the EU based on the fact that some countries have widely been using smaller tunnel dimensions, making it impossible for them to do the full 90-degree manual double screening. These cases have been allowed the concession of a smaller rotation up until Dec. 31, 2015.

1014sec_058_059_Leach_v3.indd 58 9/16/14 1:21 PM

Page 75: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y. C O M 5 9

Dual view is important legislation because ul-timately, it makes air travel safer. Freight is often carried on passenger fl ights, and dual view enables freight handlers to see much more of the contents of freight, down to minute detail. Two views of the cargo give the screener a clearer picture of what is inside the freight and enables them to be able to identify hidden threats much more easily.

X-RAY SCREENING DENSITYThe next challenge is to improve the level of density that X-ray screening technology can screen to. Larger or more dense cargo, such as metal liquid containers or metal items like machinery, are diffi cult to screen adequately via standard X-ray screening because the machines cannot screen to the full depth of the items. This means the costly and time-consuming process of secondary screening is required, and that the item being screened has to be opened up and manually interrogated. Undertaking this process requires per-mission from the sender and often from the person receiving the item, as well, so there can be a lengthy delay before the secondary screening can even begin.There is software within X-ray screening devices for measuring the dense area recognition capability (DARC) alarm. It has been rumored that the next piece of legislation to come in for the UK, follow-ing dual view, will be around DARC alarm as this software is currently being trialed with the purpose of eventually introducing a standard around it. The DARC alarm will automatically advise when a con-signment has not been suffi ciently penetrated by the X-ray machine. If the machine cannot screen to a high enough density for the particular object, an alarm will alert the screener that a secondary screen-ing is required.For example, a standard 200kV-powered machine can screen to a depth of around 35mm to 45mm of steel whereas Astrophysics Inc. 320kV-powered devices can typically screen to a depth of about 80mm of steel.

BENEFITS OF 320KV-POWERED DEVICESAlthough there are other high-powered X-ray screen-ing devices on the market, the difference with Astro-physics’ models is that in addition to the 320kV of power, these machines provide 7ma of current, com-pared to the industry standard of 1ma. It is this com-bination of high power and high current that provides 2,247 watts of total power, enabling clearer imagery to a greater depth.

For example, objects like engines can be seen clearly, compared to lower powered screening de-vices that otherwise would not provide imagery to the whole depth of the engine. This would mean that when using lower powered X-ray, in order to ensure that the object was safe, secondary manual screen-ing would be required. Secondary screening is time consuming as permissions have to be acquired from the sender of the object before the further screening process can begin.

THE FIRST U.K. 320KV MACHINE INSTALLATIONFreightnet Handling installed the fi rst 320kV X-ray security screening device in the U.K., enabling effi -cient detection via screening previously none-detect-able threats within large and dense cargo. Previously, such cargo was impenetrable to full depth.

This X-ray security screener was supplied by Total-post Services Plc and manufactured by Astrophysics Inc. It is one of the only few supplied worldwide at this level of power output for a security screening ma-chine. This 320kV device enables the operator to see more deeply and clearly into a screened object, mak-ing it effi cient in screening items such as liquid drums and metals.

Typically screened cargo for Freightnet includes: chemical drums, powders, oil fi eld equipment, mo-torbikes, generator and pumps. Whereas this type of freight screening operation would previously have been delayed because additional screening would have been required, it is now able to accurately screen whole tractors and trailers. Lower penetration screening de-vices simply cannot handle the density of such items.

“Our priority is passenger safety, and this machine helps us to improve this because our security screen-ing operatives can see so much more using this ma-chine,” said Daz Salmon, an aviation security consul-tant at Frieghtnet.

“The nearest power output level available commer-cially in the U.K. market is a 200kV X-ray security screening device. We have historically used this level of machine, but increasingly, we were aware that we needed to invest in a higher powered machine in or-der to be able to deal with demand for screening high density cargo.

“This machine has enhanced our capacity. On the busiest day we’ve had so far, this machine screened half a million tons of freight in a single day.”

MACHINE’S ABILITY DICTATES LONG-TERM CONTRACTAstrophysics Inc.’s 320kV X-ray device is a large-scale machine specifi cally designed for use in the cargo in-dustry. It has an internal tunnel size of 180 x 180 cm and a low conveyor for easy loading. The length of the machine is the same as a standard bus, and theo-retically, three smart cars could fi t end- to-end inside the machine, although cars are screened differently. Despite this, the actual footprint of the device is rela-tively compact making it ideal for freight forwarding applications where space is at a premium.

Because of this, Totalpost was awarded a signifi -cant U.K. contract to be the exclusive supplier of X-ray security screening machines to the Home Of-fi ce/ Border Force late last year. Therefore, Totalpost will supply all required baggage, mail and parcel, and freight pallet X-ray security screening machines for the next four years.

“We are delighted to have been selected to supply X-ray security screening equipment and services to the Border Force,” said David Hymers, the manag-ing director of totalpost. “The equipment we sup-ply is state-of-the-art, and the X-ray team we have is perhaps the most experienced, dedicated and knowl-edgeable in the market.”

John Leach is the technical director at Totalpost Services Plc.

1014sec_058_059_Leach_v3.indd 59 9/16/14 1:21 PM

Page 76: SP_1410DGD

6 0 1 0 1 4 | S E C U R I T Y P R O D U C T S

MARITIME SECURITY

SECURITY WITHIN REACH Terminals have been ramping up security for more than a decadeBy Mark H. Johnson and Greg Russell

Since the aftermath of 9/11, the United States has intensifi ed trans-portation security efforts across the board. For most of us, stron-ger security measures have been focused at the nation’s airports, where travelers are subject to more stringent screening protocols. But, other critical points of transportation infrastructure have been

impacted by the need for heightened vigilance as well. The country’s maritime terminals have been ramping up security since 2002,

navigating requirements from various authorities and implementing technologi-cal advancements to protect the maritime economic infrastructure from terrorism.

America’s ports, waterways and vessels are involved in billions of dollars of commerce on an annual basis. Because of their size, proximity to metropolitan areas, volume and value of cargo, and integral place in the global supply chain, U.S. ports are potentially attractive targets for terrorist activity. While security is of paramount importance, terminal operators must fi nd ways to balance vigilance with commerce to ensure as little interruption as possible.

PROGRESS IN SECURING MARITIME FACILITIESThis past June, the Government Accountability Offi ce (GAO) issued a new report describing progress made in elevating security in key areas of the country’s mari-time terminals since the adoption of the Maritime Transportation Security Act (MTSA) of 2002. The MTSA provides a framework for developing assessments, plans and protocols for protecting ports and waterways. According to the report, the Department of Homeland Security (DHS) and its agencies, particularly the Coast Guard and Customs and Border Protection (CBP), have made signifi cant progress in implementing security measures. However, challenges remain; among them is the implementation of biometric identifi cation programs.

Through a program administered by the Transportation Security Adminis-tration (TSA) and the Coast Guard, MTSA-regulated maritime facilities and vessels must require workers to obtain biometric identifi cation cards for une-scorted access to secure areas of maritime facilities and U.S.-fl agged vessels. Currently, at most maritime terminals, these Transportation Worker Identifi ca-tion Credentials (TWIC) are verifi ed by visual inspection; but, if proposed regu-lations are approved, those terminals may need to adopt a process that validates credentials electronically.

POTENTIAL PAIN POINTS FOR TERMINAL OPERATORSTo meet proposed electronic verifi cation rules, terminal operators would need to acquire specially-certifi ed verifi cation readers that are on the TSA’s Qualifi ed Tech-nology List (QTL). In anticipation of legislation that will require a greater use of this technology, some operators have already made an investment in such readers while others are holding off until receiving greater regulatory clarity. Ultimately, though, the switch seems to be inevitable.

Moving away from visual inspection of TWICs to electronic verifi cation raises some concerns among maritime terminals. First, the timing and extent of the im-plementation of regulations could impact terminal operations. The Coast Guard, which is responsible for enforcement, could impose fi nes on terminals that are out of compliance. It could also prevent commerce at a facility that has not upgraded its systems to meet new regulations.

In addition, maritime terminals must consider the cost of implementing these new regulations. Depending on the QTL-certifi ed product selected, the price for a system could result in an annual cost of tens of thousands of dollars per system.

Lastly, although it is often assumed that an electronic approach will speed up any processing need, this may not always be the case. Electronic verifi cation may add more time to the screening process, especially under elevated threat conditions that may require multi-factor authentication, thereby slowing through-put into a termi-nal. Even an additional few seconds per screening can create back-up traffi c in some of the nation’s busiest terminals and could adversely impact commercial activity.

IMPROVING TRANSITIONS TO QTL-CERTIFIED TOOLSWhile a transition to electronic verifi cation presents certain risks to terminal operators, there are some steps that security offi cers can take to get ahead of the proposed changes and minimize those risks. TSA updates its QTL on a regular basis, providing terminal and ship operators with a carefully curated selection of vendors and products to consider that meet regulatory requirements. Investing some time in evaluating QTL-certifi ed providers and the solutions they offer can assist security offi cers in adopting a systems approach to ensuring their infra-structure’s security. Consideration of the hazards and value of handled cargo, in conjunction with the broader security plan requirements of the Coast Guard with QTL-approved solutions, puts security offi cers in the best position to meet their responsibilities.

A key feature of TWIC readers is that they compare presented credentials to the agency’s daily updated canceled card list for an immediate security fl ag. In addition, some QTL readers include software that allows maritime operators to customize their security protocols. Certain readers may have the capability to scan a variety of authoritative credentials (Federal “PIV” or Commercial “PIV-I”) be-yond TWIC to help facilitate additional terminal-specifi c access controls for those desiring to enter the facilities. Some readers have the ability create tailored bar-ment lists, allowing guards to conduct automatic and instantaneous comparisons between credentials and an individual’s facility status.

TSA breaks down vendors further according to whether or not readers are fi xed

1014sec_060_061_Johnson_v3.indd 60 9/16/14 1:22 PM

Page 77: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y. C O M 6 1

or portable. Depending on a maritime terminal’s needs, a portable device may of-fer greater fl exibility in daily operations. Security offi cers would be able to move around and check credentials, doing spot checks at different locations within a facility rather than just checking credentials at the gate. Such fl exibility could help reduce backlogs and keep commerce moving.

The costs for implementing a QTL reader solution will vary depending on the hardware, software and chosen feature set. However, maritime terminals can get help in funding their upgrades through the Federal Emergency Management Agency (FEMA) Port Security Grant Program (PSGP) that offers funding assis-tance to eligible operations. In fi scal year 2014, $100 million was made available to support maritime transportation infrastructure security activities; 55 percent of monies are allocated to the highest risk port areas in the country; 45 percent is dedicated to the remaining qualifying ports.

While owners and operators of federally-regulated terminals are encouraged to apply for PSGP funding, the process requires dedication. FEMA recommends setting aside 15 business days to complete the fi ve-step process. Some vendors of the QTL are well-versed in the grant application process and can provide some as-sistance. If funds are awarded, a maritime terminal has 24 months to implement its projects, and recipients must agree to regular fi nancial and programmatic report-ing, as well as FEMA oversight.

SUPPLEMENTING TWIC WITH EVEN GREATER ASSURANCEAlong with investigating a QTL solution, security offi cers may want to consider a particular vendor’s broader security capabilities. Some vendors have amassed signifi cant experience in providing identity and access management solutions to highly-sensitive government, military and civilian facilities. Consider the track re-cord of these vendors’ installations to get a sense of their identity assurance and

electronic verifi cation capabilities. As security requirements are likely to become more stringent over time, a mari-

time operation may want to consider additional means to bolster identifi cation solutions, particularly if dealing with commodities considered a higher risk for tar-geting by terrorists. TWIC offers a certain level of assurance, as individuals must pass an FBI background check. However, criminal records are only evaluated for TWIC eligibility at the time of issuance and reissuance, and not all felony convic-tions may result in disqualifi cation. Additionally, individuals holding TWICs are responsible for reporting convictions that may adversely affect their eligibility.

For maritime terminal operators who desire a higher level of assurance, it may be worthwhile to consider utilizing a TWIC verifi cation solution that provides a more robust and ongoing vetting program. Some of today’s more advanced systems refresh eligibility on a regular basis and conduct recurring background checks, incorporating the latest records to ensure that port security stays constant even when people change.

Keeping America’s ports, waterways and vessels secure is no small task. To pro-tect their facilities, cargo and commercial viability, operators must adopt robust se-curity management solutions that are equipped to handle the demands of today and the technological advancements and regulatory requirements of tomorrow. By investing time now into researching options and pursuing the available fi nancial as-sistance, maritime terminals can position them-selves to ensure the next level of port security.

Mark H. Johnson is the vice president of strategic account management for Eid Passport, Inc. Greg Russell is a senior product manager with Eid Pass-port, Inc. and manages the RAPIDGate program.

Security for Today...and Beyond

P O W E R E D B Y T H E S E C U R I T Y P R O D U C T S M E D I A B R A N D S

Explore the Security Products site today at security-today.com

security-today.com

All the security information you need today in one place!

Go to sp.hotims.com and enter 49 for product information.

1014sec_060_061_Johnson_v3.indd 61 9/16/14 1:22 PM

Page 78: SP_1410DGD

1014 NEW PRODUCTSCompiled by Matt Holden, Associate Content Editor

6 2 1 0 1 4 | S E C U R I T Y P R O D U C T S

Single Door ControllerHighly scalable

The KT-1 single door controller provides simplic-ity at the edge of an IP network. With its single button programming and on-board Ethernet port for direct network connection, the controller is up and running in just a few easy steps. Because of its unique form factor, the controller can be in-stalled in a variety of locations, from plain view to a traditional security cabinet. Combine the KT-1 controller with EntraPass security management software, including EntraPass Web and the Entra-Pass GO mobile app to create a highly scalable solution that installs quickly and provides a supe-rior user experience. Tyco Security Products.

Go to sp.hotims.com and enter 360 for product information.

Door Controller SystemSupports up to 32 readers

Ideal for enterprise and government applications, iSTAR Ultra features dual GigE network ports and FIPS 197 certifi ed AES 256 network encryption. Custom key management, embedded Denial-of-Service protection, DNS support, and an embed-ded web diagnostics tool provide customers with the ultimate in network security and reliability. It supports up to 32 readers – both traditional hard-wired and wireless locks, all in the same controller. Rack-mount and wall-mount options provide in-stallation fl exibility while unique lock power man-agement eliminates the need for separate lock power interface boards. iSTAR Ultra communicates with the latest version of C•CURE 9000 security and event management system for a complete ac-cess control solution. Tyco Security Products.

Go to sp.hotims.com and enter 361 for product information.

LoLux DVRExtended recording storage

JVC’s VR-D100 Series DVRs feature exclusive

Super LoLux processing, advanced performance features and extended capacity recording stor-age for today’s high resolution analog cameras. Three new models include the 4-channel VR-D1004-500 with 500MB internal recording ca-pacity; 8-channel VR-D1008-1TB with 1TB inter-nal recording capacity; and VR-D1016-1TB with 1TB internal recording capacity. All offer H.264 compression for reduced storage and bandwidth and encoding support for analog cameras capa-ble of capturing up to 700 TVL. With dual-stream recording at 30fps, HDMI and VGA outputs (1920x1080) for synchronous playback, two-way audio, and 12VDC operation for mobile use plus a free mobile app and three-year warranty. JVC.

Go to sp.hotims.com and enter 362 for product information.

2-MP Dome CameraReduces installation fees

The IK-WR14A is a two-megapixel IP network dome camera that reduces upfront installation time by up to fi fty percent with its incorporation of remote optical zoom, one-touch remote focus, and a new cable management system based on time-saving Power over Ethernet (PoE). Once installed, the camera captures 1080p full HD resolution vid-eo at 30 frames-per-second in virtually any light-ing condition, indoors or outdoors.Toshiba.

Go to sp.hotims.com and enter 363 for product information.

Fire RadioEliminates dedicated phone lines

The iGSMCFP4G from Honeywell is a commercial fi re radio that meets NFPA72 2013 requirements for sixty minute supervision and can function as the sole path of alarm signal transport. By install-ing the radio in place of POTS lines, security pro-fessionals have a new stream of recurring monthly revenue. End users benefi t from the eliminated expense of dedicated phone lines. Honeywell.

Go to sp.hotims.com and enter 364 for product information.

Compression ToolOne-cycle motion

In a smooth, one-cycle full ratchet motion, the Om-niSeal Pro XL tool compresses F-type, RCA, RG11, BNC and mini connectors onto coaxial cable for a permanent, high-integrity connection. Because of its universal design, the OmniSeal Pro XL elimi-nates the need to carry multiple crimp or compres-sion tools. It is factory preset and calibrated to terminate all IDEAL-branded compression connec-tors. In additional, it can terminate other manufac-turers connectors simply by adjusting the tool’s plunger depth - no adapters required. There is also a handy 7/16-inch hex socket built-in to install CATV connectors. Ideal Industries Inc.

Go to sp.hotims.com and enter 365 for product information.

Network IlluminatorsPoE capability

The VARIO network illuminators from Raytec have been extended to include PoE capability and 4 new model sizes in both Infra-Red and White-Light. PoE allows for quicker and more effective lighting in-stallations. VARIO IP PoE illuminators can be easily integrated onto an existing network infrastructure, with no local mains connections or special electri-cal labor required. Operated via integrated web interface or VMS, VARIO IP PoE allows for quick remote set up, commissioning, operation and maintenance of your lighting scheme from any-where on the network 24/7. Raytec.

Go to sp.hotims.com and enter 366 for product information.

Indoor IP Video CameraAdvanced night vision

The iPCAM-WL indoor IP video camera from

Honeywell uses advanced night vision and light sensors to help home and business owners view activity in poorly lit spaces. The camera includes wired or wireless Internet connectivity and can capture clear, high quality video using H.264 high-compression technology to maintain image sharp-ness. This camera is an addition to the Honeywell Total Connect video suite of solutions, which lets consumers access and manage their surveillance systems remotely from Wi-Fi enabled devices such as smartphones or tablets. Honeywell.

Go to sp.hotims.com and enter 367 for product information.

Compression Starter KitHDTV and CCTV installation

The Pro Compression Starter Kit is designed for installers of HDTV and analog CCTV systems. It contains a collection of necessary tools to prepare and connect F-Type and BNC compression con-nectors on coaxial cable with the inclusion of the industry-standard IDEAL OmniSEAL™ Pro XL compression tool to provide contractors with a better bang for their tool dollar. The kit also elimi-nates the need to carry multiple crimp or compres-sion tools, and is factory preset and calibrated to terminate all IDEAL-branded compression connec-tors. Ideal Industries Inc.

Go to sp.hotims.com and enter 368 for product information.

Password EncryptionSupports multiple identities

SecretAgent 7 was designed as a single instance application that can cache passwords as needed to eliminate any need for users to enter passwords multiple times. A text-based toolbar allows the user to quickly locate the desired task to encrypt and/or sign. The toolbar automatically updates it-self, adding and removing items, based on the ac-tive application context. SecretAgent 7 supports multiple identities (with different credentials) and allows a user creating a new archive to easily switch roles for signature purposes via a simple drop-down list. Information Security Corporation.

Go to sp.hotims.com and enter 369 for product information.

1014sec_062_072_NP_v2.indd 62 9/17/14 9:56 AM

Page 79: SP_1410DGD

unlock potential...

For more information,www.honeywellintegrated.com or call 1.800.323.4576

© 2014 Honeywell International Inc. All Rights Reserved.

...and throw away the keys!With Pro-Watch 4.2, state-of-the-art access control is available at the most affordable price yet! With an enhanced lockset and biometric portfolio, it offers numerous reader options to meet specific security needs. With fewer wires and reduced costs, customers can now employ access control in areas that were once considered difficult, or even impossible! Plus, Pro-Watch 4.2 delivers enhanced biometric integration options that are easy to use, and provide fast, reliable and secure access points. You can finally throw away the

keys and start enjoying the benefits of a robust access control management system. Unlock potential, and lock in the savings!

Go to http://sp.hotims.com and enter 55 for product information.

Untitled-5 1 8/14/14 12:05 PM

Page 80: SP_1410DGD

6 4 1 0 1 4 | S E C U R I T Y P R O D U C T S

1014 NEW PRODUCTS

Asset TrackingUnifi ed security monitoring

ConvergenceTP connectivity modules create a Unifi ed Security mon-itoring and analysis solution for your Ocularis platform. Make Ocu-laris your command center head-end by integrating real time on-screen visual confi rmation of asset tracking events seamlessly into OnSSI. All events are time synchronized with the OnSSI surveillance video. Powerful text search tool links all text received with all stored surveillance video. All asset monitoring events are traceable whether its merchandise at the shipping and receiving loading docks or mon-itoring personnel in hazardous environments - all events are stored and searchable. ConvergenceTP.

Go to sp.hotims.com and enter 370 for product information.

Access Control IntegrationTime synchronized events

ConvergenceTP connectivity modules create a Unifi ed Security mon-itoring and analysis solution for your Ocularis platform. Make Ocu-laris your command center head-end by having real-time onscreen visual confi rmation of access control activity. All events are time synchronized with the OnSSI surveillance video. The ConvergenceTP powerful text search tool links all text received with all stored surveil-lance video. All badge swipes and access control system level events are stored and searchable. ConvergenceTP.

Go to sp.hotims.com and enter 371 for product information.

Point of Sale IntegrationTraceable point of sale items

Make Ocularis your command center head-end by integrating real time point of sale transactions seamlessly into OnSSI. All point of sale events are time synchronized with the OnSSI surveillance video. Powerful text search tool links all text received with all stored surveil-lance video. All sale events are traceable from line item description to Voids, Refunds and No Sale transactions - all events are stored and searchable. ConvergenceTP.

Go to sp.hotims.com and enter 372 for product information.

LPR IntegrationReal-time video confi rmation

Make Ocularis your command center head-end by integrating real time onscreen visual confi rmation of LPR activity seamlessly into OnSSI. All LPR reads are time synchronized with the OnSSI surveil-lance video. Powerful text search tool links all text received with all stored surveillance video. All LPR events are traceable from partial plate numbers, lane numbers, gate entrance ID’s , alert names, ve-hicles of interest, etc. - all events are stored and searchable. The End User is able to create unique real-time onscreen event annotations to alert security personnel immediately of events or through Email and SMS alerts when events occur. ConvergenceTP.

Go to sp.hotims.com and enter 373 for product information.

Vindicator and SpotterRFProtect high-profi le locations

Honeywell’s Vindicator customers will have access to SpotterRF’s se-ries of Compact Surveillance Radar systems, which can be used to detect intruders along perimeters when traditional ground surveillance radar systems are not practical. The devices, which weigh less than four pounds, use standard Ethernet cables and feature built-in Web servers. They are highly effective in monitoring wide areas. Honeywell.

Go to sp.hotims.com and enter 374 for product information.

Omni-Tilt switchSenses disturbance and tilt

Magnasphere’s T3 Omni-Tilt switch is designed to sense horizontal inertial disturbance and tilt from its vertical position. The T3 can be wired directly to panels or used with wireless transmitters. Objects secured with the T3 Omni-Tilt won’t tolerate movements such as jostling, loading, rolling, impact, tilt, or transit without providing an alarm signal. The Omni Tilt uses a magnetic latch to resist false alarms from light vibration. Magnasphere.

Go to sp.hotims.com and enter 375 for product information.

NOPATCH-W O R KIN SECURITY SOLUTIONS

WELCOME TO THE G-WORLD

Competence in Video Security

Don’t accept patchwork solutionsfor your security! Demand the

right video security solution for your

needs! Simple. Power ful. Flexible.

Reliable and from a single source.

Made in Germany. Video security from

GEUTEBRÜCK – Welcome to the G-World!

www.geutebrueck.com

Go to sp.hotims.com and enter 12 for product information.

1014sec_062_072_NP_v2.indd 64 9/17/14 9:56 AM

Page 81: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y. C O M 6 5

Electronic Locking SystemIncorporates access control

Southco, Inc. has launched a fully integrated Self-Contained Electronic Locking System that incorporates an access control device, electronic lock, electrical override and power supply. This AA battery-operated unit is available with keypad or RFID access, features a stylish, drop in assem-bly and provides full electronic locking function-ality for a variety of applications. Southco’s SC Self-Contained Electronic Locking System fea-tures a single component design that can be eas-ily mounted into a standard 25x150 panel prep, simplifying the integration of an electronic ac-cess solution into a cabinet design, and eliminat-ing the need for the wiring or connecting of sepa-rate components. Southco.

Go to sp.hotims.com and enter 376 for product information.

Access Control SoftwareRemote viewing

AMAG Technology releases Symmetry V8 Access Control software. Available in Business, Profes-sional and Enterprise versions, it supports Micro-soft Windows Version 8.1, Server 2012 R2 and SQL 2012. Symmetry V8 supports the ONVIF Profi le S camera plug-in, which allows dual streaming, pro-viding customers the ability to use a high resolu-tion stream for video recording and a lower resolu-tion stream for live remote viewing of their ONVIF cameras. View video from unlimited locations and record simultaneously. New card holder vacation calendar tracks employee vacations and prevents unauthorized access. Temporary card feature au-tomatically disables the standard card when a temporary one is issued. AMAG Technology.

Go to sp.hotims.com and enter 377 for product information.

Dual Reader ModuleEnables up to 64 readers

Galaxy Control Systems Dual Reader Module (DRM) is designed for use with the company’s 635 Dual Serial Interface over RS485 UTP cabling. It enables up to 64 readers to be connected without the need to run dedicated cabling from a central-

ized controller, which signifi cantly reduces over-all costs. The DRM accommodates a single door with a single reader, two doors each with a single reader, or a single door with two readers for in/out anti-passback operation. Galaxy Control Systems.

Go to sp.hotims.com and enter 378 for product information.

Go to sp.hotims.com and enter 56 for product information.

1014sec_062_072_NP_v2.indd 65 9/17/14 9:56 AM

Page 82: SP_1410DGD

6 6 1 0 1 4 | S E C U R I T Y P R O D U C T S

1014 NEW PRODUCTS

Tubular LockAesthetic continuity

Schlage LT Series decorative tubular locks were created for use in high-end commercial and multifamily properties. Built from the same foundational technology of the popular Schlage L Series mortise locks, the LT Series tubular locks utilize the same lever designs as the L series and thus provide seamless suiting with both the Schlage mortise lock and most Von Duprin exit devices. Design details com-bine a feeling of durability with a touch of elegance. The levers of the LT Series tubular locks are manufactured from solid brass and stain-less steel to create a fi rm, heavy feel. Allegion.

Go to sp.hotims.com and enter 379 for product information.

HD Barrier24-inch foundation

Delta Scientifi c’s HD300 barrier, available with either a fully electric or hydraulic control unit, can stop a 15,000 pound vehicle traveling 50 mph. Upon impact, the barrier remains in its foundation and the opening stays blocked, providing a multiple hit capability. In its M50 crash test, the barrier disabled the test vehicle, causing severe dam-age to the occupant department and power train. The P1 penetration rating was given because the penetration beyond the protected side of the barrier was less than 1.0 m at the lower leading edge of the test vehicle’s cargo bed. Delta Scientifi c.

Go to sp.hotims.com and enter 380 for product information.

System Galaxy SoftwareEmphasizes connectivity

The System Galaxy Software emphasizes connectivity, interfacing with all legacy Galaxy hardware and infrastructure. With active direc-tory support for real-time identity management, individualized iden-tity-based door access, and audit reports for each screen view or credential holder. Share data with visitor management, time clocks, parking garages etc. Includes one-minute door open schedules with 100 additional day types. The system has an unconditional two-year warranty, accommodates unlimited users and is accessible from mo-bile devices. Galaxy Control Systems.

Go to sp.hotims.com and enter 381 for product information.

Incident ResponseCaptures complete details

Addressing the needs of both security operations and investigation management, Perspective EIM delivers an end-to-end solution for re-sponding to, reporting on, and investigating incidents. It starts at the beginning with incident response, capturing complete details for fur-ther investigation and future reference. During the incident, it’s about managing resources, minimizing impact, and gathering intelligence. After the incident, it’s about security metrics and incident prevention. Featuring real-time dispatching, in-depth analytics, sophisticated data segregation, automated workfl ows, and PSIM integration. PPM.

Go to sp.hotims.com and enter 382 for product information.

IP CamerasDisplay cameras on a single device

ipVista is a spot monitoring solution for ONVIF compliant IP cameras which support MPEG4/H.264. This unique device has an option to display 1, 4, or 6 cameras on a single view or create 5 page switch-ing view with options of 1, or 4 camera views in each page. No extra cabling is required as IP cameras are directly connected to ipVista through WIFI, plus there is no need for decoder, NVR or VMS connec-tion. ipVista’s HDMI output gives you free choice of any LED/LCD TV or monitor. ipVista.

Go to sp.hotims.com and enter 383 for product information.

Cloud ManagementReduces risk and analyzes trends

SAFE for Secure Cloud Physical Identity and Access Management (PIAM) by Quantum Secure is a ready-to-use web-based SaaS solu-tion for PIAM, Visitor Management, Compliance, Security Analytics and more. It integrates with multiple authoritative systems and the PACS for automatic updates of all identity or access change informa-tion. All functions of web badging and visitor management are in-cluded, along with compliance/risk management enforcement and reporting. Security intelligence analyzes trends and provides action-able insights to reduce risk. Quantum Secure.

Go to sp.hotims.com and enter 384 for product information.

PRICES STARTING AT $219

www.armorlogix.com • (904) 674-2976

CALL TODAY OR VISIT US ONLINETO LEARN MORE

TOUGH • LOCKABLE • OUTDOOR

NEMA 3 & 4ENCLOSURES

Go to sp.hotims.com and enter 42 for product information.

1014sec_062_072_NP_v2.indd 66 9/17/14 9:56 AM

Page 83: SP_1410DGD

WORKSHOPS: NOVEMBER 17, 2014

CONFERENCE & EXPO: NOVEMBER 18–19, 2014

Gaylord Texan ResortDallas, Texas

Register today for Security Today—the most comprehensive event in the

western U.S. addressing the security challenges of the public and private sectors

where you will:

• EXPERIENCE firsthand the latest physical and IT-based security on the market

• LEARN from the pros during insightful sessions and workshops—all focused on

your most pressing security challenges, needs and goals

• CONNECT with industry leaders, like-minded colleagues, new peers and old friends

• UNCOVER buzzworthy trends driving the growth of the industry

Come see for yourself why Security Today 2014 is the best resource for the

knowledge and strategies you need to succeed. You can’t afford to miss this

opportunity to see the latest advances in the industry, all in one short week.

egister online today with promo code STM !

ENHANCE YOUR SECURITY

PRODUCED BY Nancy Calabrese –Midwest, [email protected](702) 228-3293

Kharry Wolinsky –[email protected](703) 876-5069

FOR SPONSORSHIP AND EXHIBIT OPPORTUNITIES, PLEASE CONTACT

SecurityTodayInfo.com

COLLOCATED WITH:FEATURING:

Go to http://sp.hotims.com and enter 45 for product information.

Untitled-6 1 9/11/14 11:10 AM

Page 84: SP_1410DGD

6 8 1 0 1 4 | S E C U R I T Y P R O D U C T S

1014 NEW PRODUCTS

Key Management SystemFull scalability

With easier-to-use onscreen icons, Morse Watch-mans’ KeyWatcher Touch enterprise key control and management system has a large touchscreen and user-intuitive interface. KeyAnywhere lets you return a key to any KeyWatcher in your enterprise. Locate which KeyWatcher a specifi c key is in or fi nd who has it with KeyFind. Every transaction is automatically recorded. With improved integration capabilities, patented SmartKey system, modular design and full scalability, we just keep making key management better. Morse Watchmans.

Go to sp.hotims.com and enter 385 for product information.

Corner-Mount CameraAll-in-one solution

The Roughneck V-CELL-HD corner-mount camera is designed as an all-in-one solution, with an inte-grated stainless steel housing, camera, lens and IR illuminators. The ONVIF certifi cation provides an open platform and compatibility with a wide range of video management systems. These popular cameras are ideal for viewing small, high security rooms under all lighting conditions such as in prison cells. Vicon Industries Inc.

Go to sp.hotims.com and enter 386 for product information.

Cylinderless DeadboltsKey free

The Yale Real Living Key Free Push Button B1L and

Key Free Touchscreen T1L Deadbolts follow Yale’s introduction last year of the industry’s fi rst cylin-derless deadbolts, which offer integrators simpli-fi ed installation and homeowners superior securi-ty. For integrators, installation is a much smoother process without a cylinder since no keying is re-quired. For homeowners, eliminating the keyway provides a more secure product by making the lock pick and bump proof. Yale.

Go to sp.hotims.com and enter 387 for product information.

Modular Locking DevicesFully confi gurable

Sargent & Greenleaf has developed a range of products to meet Federal Specifi cation FF-L-2890B for high security pedestrian door locks. These range from an auxiliary door deadbolt to a single motion egress panic exit device controlled by an FF-L-2740B approved electromechanical combination lock. These modular locking devices are confi gurable for right-hand and left-hand doors, with heavy duty roller strikes for in-swing and out-swing doors. Sargent & Greenleaf.

Go to sp.hotims.com and enter 388 for product information

SuperWall CurtainwallBlast hazard mitigation

Wausau Window and Wall Systems® Blast Hazard Mitigation (BHM) Series combines blast mitigation, energy performance and recycled content to meet government buildings’ high-security and green goals. BHM Series SuperWall™ Curtainwall meets blast performance up to 33 psi peak pressure, 81 psi-msec impulse. The system accommodates cladding for steel tubes, which may be necessary to ensure structural performance in blast mitigat-ing designs. SuperWall’s screw-spline construc-tion in multiple frame depths presents a uniform, three-inch exterior sightline. These products are designed for compliance with the GSA ISC and DoD UFC, and supported with an industry-leading warranty of up to 10 years. Wausau.

Go to sp.hotims.com and enter 389 for product information.

garrett.com Tel: 1.972.494.6151

Team with GARRETT to create your SAFE ZONE

Sports fans are passionate about their teams. Garrett Metal Detectors help keep them safe so they can simply relax and enjoy their big game.

Our American-made products have been an integral part of the security plan at major sports events such as professional football, the Olympic Games, FIFA World Cup venues, the Pan American Games, and even the Little League Baseball® World Series. Contact us to fi nd out more about our trusted hand-held scanners and advanced technology walk-through detectors.

®

Proudly Made In The USA

LLaw Enforcemeent Military Sppecial Events Evidence Recovery Loss Preveention Mass Traansit Government Facilities

Go to sp.hotims.com and enter 12 for product information.

1014sec_062_072_NP_v2.indd 68 9/17/14 9:56 AM

Page 85: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y. C O M 6 9

Security Ceiling SystemsAluminum panels

ROCKFON Metaline security ceiling systems are suitable for interior applications and exterior soffi ts in light- to medium-security settings that require restricted access to the ceiling plenum. Metaline sys-tems consist of aluminum panels that lock under the bulb of heavy-duty, galvanized steel, suspension grid. The system accommodates light fi xtures, HVAC equipment and access doors for a continuous, clean look. The panels are available as perforated to provide noise control when an acoustical batt is installed above them. The metal used contains no organic compounds to support mold and microbial growth, and may be specifi ed with up to 100 percent post-consumer recycled content. ROCKFON.

Go to sp.hotims.com and enter 390 for product information.

Network Security ApplianceRecords and manages access control devices

The SV-32 network security appliance is powered by Genetec’s uni-fi ed security platform, Security Center. It has been designed to sup-port IP edge devices such as IP cameras and encoders, as well as IP door controllers such as the Mercury EP panels and the Axis A1001. As an all-in-one appliance, the SV-32 can be used as both a server to record video and manage access control devices, and as a moni-toring workstation to view live or recorded video, run access control reports, and more. Genetec.

Go to sp.hotims.com and enter 391 for product information

Wireless SecurityHandheld remote

A handheld security device has been developed to fi ght crime against students. EduProtect is the only system that allows you to instantly

alert police of an emergency without having a phone in your hand. When facing danger on or off campus, students simply push the but-ton on the wireless hand-held remote to activate the EduProtect app which automatically transmits their personal profi le and GPS location to the local police. EduProtect.

Go to sp.hotims.com and enter 392 for product information.

Virtual Security ConsoleSecure SOC capabilities

The Pivot3 Virtual Security Console (VSC) allows users to fl exibly de-liver secure, centralized video management capabilities at any time and any place without deploying additional expensive, graphics-en-abled PCs. The infrastructure enhances mobility by offering access to VMS permissions through any Web-enabled device, including mobile phones and tablets. The solution is completely scalable and designed to meet the demanding needs of markets such as corrections, casi-nos, retail and manufacturing or any environment in which secure viewing is a priority. Pivot3.

Go to sp.hotims.com and enter 393 for product information

Digital Security SystemComplete DIY kit

Go digital with your wireless security needs; the simplest and secure way to protect your home and business. The DigioutLCD is a D.I.Y (do-it-yourself) complete digital wireless security system. Five key benefi ts of this product - (1) Easy to setup and use, (2) Secure wire-less signal, (3) Multi-channel video recording, (4) Strong weather-proof camera with night vision up to 120 ft, & (5) Easy to relocate 7” LCD monitor. SecurityMan.

Go to sp.hotims.com and enter 394 for product information

Video Asset ManagementDaily storage solutions

Sans Digital provides storage solution daily to companies worldwide in the following ways: asset management and protection in one plat-

For more information:

doorking.com/connect

3 Ways to Connect with or without the Connection

No matter what your situation, DKS gives you the flexibility to manage Access Control from your computer. Our 1830 Series Access Controllers can be programmed through the existing phone line, through our IM-Server, directly via an RG 45 network, or wirelessly with our TCP/IP module. With so many options, the 1830 Series is perfect for medium to large apartments and high rise buildings, gated communities, condo and office buildings, as well as industrial sites.

DKS, the company of choice for Access Control for over 65 years.

800-673-3299 [email protected]

Go to sp.hotims.com and enter 32 for product information.

1014sec_062_072_NP_v2.indd 69 9/17/14 9:56 AM

Page 86: SP_1410DGD

1014 NEW PRODUCTS

7 0 1 0 1 4 | S E C U R I T Y P R O D U C T S

form, 3U Rackmount or Tower Form factor, built-in offl ine backup, plug and play with ready to use ap-pliances and pay as you grow scales. They also include unlimited, multiple user access, support FCP and Avid, and work with your existing infra-structure. Sans Digital.

Go to sp.hotims.com and enter 395 for product information

Video-Over-IP Multi-functional

Matrox Maevex PowerStream software gives ad-ministrators an intuitive user interface to remotely discover and manage their entire network of Mae-vex encoders and decoders and fi ne-tune individ-ual device parameters. The latest 1.03 software release lets integrators take advantage of new Maevex functionality enabled through Maevex 1.03 fi rmware and software, including AV record-ing over IP. Matrox.

Go to sp.hotims.com and enter 396 for product information

Network Attached StorageFeature rich systems

Sans Digital Network Attached Storage (NAS) prod-ucts provide both performance and protection for your shared storage. Compare to other typical NAS in the market, Sans Digital EliteNAS series offer more features that no other NAS product can compare, such as: NFS volume import, SSD caching, hardware raid and build-in deduplication. Sans Digital.

Go to sp.hotims.com and enter 397 for product information

Outdoor Resistant DomesUltra-high resolution

The inMotion in61S2x2D Tigershark is the next generation in their line of Outdoor vandal resistant

domes. Offering ultra-high 800TVL resolution, new Wide-D WDR performance combined with 3D Digi-tal Noise reduction, this compact camera will pro-duce high quality video in the varying lighting con-ditions experienced in modern installations. The Tigershark line features Wide Dynamic Range (130dB max), Optical Dual Vari- Focal, Motion digi-tal zoom, Dual Voltage, On-board OSD programmer and service jack output, Dual Voltage and many more features. inMotion.

Go to sp.hotims.com and enter 398 for product information

Network Door ControllerCutting-edge software

In addition to cutting-edge software, Open Options continually develops partnerships with industry lead-ers to provide the most advanced in access control technology. DNA Fusion access control software has added a driver for integration with the A1001 Net-work Door Controller—Axis’ new IP access control hardware platform. Using the same IP technology

AXIS pioneered in video surveillance, the A1001 Net-work Door Controller is a great solution for both small and enterprise systems. Open Options.

Go to sp.hotims.com and enter 399 for product information

Registration UnitEasy authenticatio

SafeHand is a robust authentication system that utilizes vascular pattern biometric technology to deliver fast and convenient identifi cation. This in-novation offers secure physical and logical access control to customers in healthcare, fi nancial ser-vices, government, and other industries with a highly reliable, contactless biometric authentica-tion solution that is nonintrusive and easy to use. World Compliance Technologies.

Go to sp.hotims.com and enter 400 for product information

WORKSHOPS: NOVEMBER 17, 2014

CONFERENCE: NOVEMBER 18-20, 2014

EXPO: NOVEMBER 18-19, 2014

Gaylord Texan ResortDallas, Texas

Register today for the CPM Symposium—where you will find proven strategies

and cost effective technologies to achieve your mission of preparing and planning for

emergencies and disruptions of operations, including response and recovery.

In 3 short days, you will have the opportunity to enhance your knowledge, stay abreast

of current and future trends and important issues, and network with your peers.

Register online today with promo code CPM0 !

EXPECT THE UNEXPECTED

cpm-west.com

PRODUCED BYNancy Calabrese –Midwest, [email protected](702) 228-3293

Kharry Wolinsky –[email protected](703) 876-5069

FOR SPONSORSHIP AND EXHIBIT OPPORTUNITIES, PLEASE CONTACT

Go to sp.hotims.com and enter 27 for product information.

1014sec_062_072_NP_v2.indd 70 9/17/14 9:56 AM

Page 87: SP_1410DGD

W W W . S E C U R I T Y - T O D A Y. C O M 7 1

Embedded Recorder 8-TB storage

Compact but powerful, the ESLIM from OpenEye is the latest addition to the E-Series line of embedded recorders. Sporting a fully-loaded chassis, the ESLIM can store up to 8 TB of 960H high defi nition re-cording at 480 images per second on up to 16 channels. Designed for ease of installation and operation, it comes with multi-site remote management software RADIUS and cloud-based health monitoring service ReportStar. The embedded Heartbeat function checks your system every fi ve minutes to ensure its functionality. Customers re-ceive free DDNS for the product’s life and OpenEye’s industry re-nowned Heroic Customer Service. OpenEye.

Go to sp.hotims.com and enter 401 for product information

Comprehensive Security SolutionIntegration with new milestone ACM

Because access control and video surveillance often partner to provide a comprehensive security solution, the ability to use fea-tures from both components—without having to toggle between software applications—is key. DNA Fusion version 6.1 includes FLEX API (Application Programming Interface), a clean and easy-to-use mechanism for developing third-party interfaces to Open Op-tions’ powerful access control software. Via FLEX API, Milestone Systems’ new ACM (Access Control Module) allows XProtect Enter-prise and Corporate users access to DNA Fusion from within their own VMS Smart Clients. Open Options.

Go to sp.hotims.com and enter 402 for product information

Dome CamerasVandal resistant

The inMotion in51S2x2D Tigershark is the next generation in their line of ultra-compact vandal resistant domes. Offering ultra-high 800TVL resolution, new Wide-D WDR performance combined with 3D Digital Noise reduction, this compact camera will produce high qual-ity video in the varying lighting conditions experienced in modern installations. The Tigershark line features Wide Dynamic Range (130dB max), Optical Dual Vari- Focal, Motion digital zoom, Dual Volt-age, On-board OSD programmer and service jack output, Dual Volt-age and many more features. inMotion.

Go to sp.hotims.com and enter 403 for product information

High-Visibility GarmentsANSI compliant

We have a complete line of ANSI Compliant gear with premium compo-nents like YKK zippers, 3M Scotchlite Refl ective Materials & Thinsulate the most visible and dependable in the industry. Breathable fabrics to keep you cool. Our in-house Art Department will logo without any minimums. BIG and Tall options are available. Refl ective Apparel.

Go to sp.hotims.com and enter 404 for product information

Master Control PanelSingle compact panel

The Serco Master Control Panel combines the operating controls for all dock devices into a single compact panel. Its ability to inter-lock that equipment to operate in a predetermined sequence makes it a very important security tool. For example, controls can be programmed such that the trailer must be securely locked in place by the vehicle restraint before the door will open or dock leveler will operate, and they can even control two dock positions from a single panel. Serco.

Go to sp.hotims.com and enter 405 for product information

Made in the U.S.A. - altronix.com - Lifetime Warranty

LONG RANGEETHERNET

More than just power.™

- IP over CAT5e up to 500m without repeaters

- Single port units also support UTP up to 150m

- Data rate 100mbps, full duplex

- PoE/PoE+ compliant

...5x the distance!Extends ethernet range

Go to sp.hotims.com and enter 53 for product information.

1014sec_062_072_NP_v2.indd 71 9/17/14 9:56 AM

Page 88: SP_1410DGD

7 2 1 0 1 4 | S E C U R I T Y P R O D U C T S

1014 NEW PRODUCTS

Wireless LocksFully electronic

To easily migrate from mechanical locks to electronic access control with pricing less than half that of perimeter electronic locks, Allegion provides an unprecedented level of simplicity and convenience by introducing ENGAGE technology-enabled Schlage NDE Series wire-less electronic locks for interior doors. Through the ENGAGE mobile app, business owners and managers can easily control the daily ac-cess rights of employees and visitors, as well as monitor usage. EN-GAGE enabled wireless locks can be integrated into most popular access control systems for even greater capabilities, including real-time control. Allegion.

Go to sp.hotims.com and enter 406 for product information

Access Control SoftwareEnhanced features

Open Options’ DNA Fusion access control software has added more features to the versatile Web client. In addition to video integration and the ability to capture photos, DNA Fusion Web v2.5 offers en-hanced smart card modifi cations that include magnetic stripe en-coding, ID badging, Prox/iCLASS enrollment, and biometric card enrollment for Schlage Handkey 2 and Bioscrypt 4G fi ngerprint readers. Open Options.

Go to sp.hotims.com and enter 407 for product information

HDCVI Surveillance SystemsUser friendly interface

eLine Technology’s HDCVI (High Defi nition Composite Video Interface) Surveillance Systems allow for HD video transmission using stan-dard coaxial cable. HDCVI surveillance systems allows those with traditional analog systems a cost effective solution to upgrade to high defi nition. HDCVI surveillance systems can transmit HD over long distances up 500m. Systems are user friendly and compatible with most web interfaces and mobile devices. eLine cameras are available in multiple housing solutions. eLine Technologies.

Go to sp.hotims.com and enter 408 for product information

Access Control SystemsWireless connectivity

CyberKey Air brings new technology to key-centric access control systems. Wireless connectivity to the key allows updates of user per-missions in the key and access to the record of events stored in the key memory via Wi-Fi. The CyberKey Air is an addition to the Cyber-Lock access control system, which uses electronic lock cylinders, programmable keys, and CyberAudit software to manage access and provide security to all the locking points throughout your organiza-tion. CyberLock access control is an effective security solution for protecting your assets and tracking access. CyberLock Inc.

Go to sp.hotims.com and enter 409 for product information

Intelligent Key CabinetMulti-functional device

The Vault 20S is the newest intelligent key cabinet from CyberLock, Inc. The Vault 20S secures up to 20 unprogrammed, rechargeable Cyber-Key smart keys. When a user presents an authorized keypad input or RFID card, a key is programmed with the correct permissions from the internal cabinet server. The cabinet also charges the key battery and downloads the audit trail from the key when the key is returned. This convenient, multi-functional device stores, programs, issues, and pro-tects your CyberKey smart keys all in one place. CyberLock Inc.

Go to sp.hotims.com and enter 410 for product information

Video CablingThermal sensor modules

The fl exible video cabling, weatherproof design and tiny footprint allows the two S15D thermal sensor modules to be installed into any location up to two meters away from a single S15D core unit. The advantage of using thermal sensor modules is that they can visualize heat radiating from vehicles and persons, for the pur-pose of accurate movement detection up to 400 meters away from the camera, even under the most challenging lighting and environ-mental conditions. MOBOTIX.

Go to sp.hotims.com and enter 411 for product information

What’s new in

Webinars

Schedule your webinar today with Kevin O’Grady

[email protected]

Archived free webinars include:

PIAM and IAM Debunked - Security Convergence—Understanding How Logical and Physical Identity Management Work Together for a More Comprehensive Approach October 15, 2014, 2:00 PM ET Sponsored by Quantum Secure Inc.

Register to attend this free event live or view it and archived webinars on

demand after the live date!Click on the Webinars tab at

security-today.com

Achieving Interoperability in Prevention, Preparation and Response to School Shootings Sponsored by Video Insight, Tyco International, Security Today, and Safe & Secure Campus Symposium

Optimize Your Physical Identity Management from Your Secure and Budget-Friendly Cloud Sponsored by Quantum Secure Inc.

The Importance of Personnel Surety for Critical Infrastructure Sponsored by Eid Passport

Plus More!

Go to sp.hotims.com and enter 38 for product information.

1014sec_062_072_NP_v2.indd 72 9/17/14 9:56 AM

Page 89: SP_1410DGD

AD INDEXFREE PRODUCT INFOQuick, Easy and Direct...get the info you need NOW!Search by category or by company • Go online to www.security-today.com/productinfo to request free information from advertisers in this issue.

Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page

W W W . S E C U R I T Y - T O D A Y. C O M NOTE: ADVERTISERS WITH AN * ARE REGIONAL ADS AND MAY NOT APPEAR IN THIS ISSUE 7 3

ADVERTISERS50..........Advidia Professional IP Cameras ..............5710..........Aiphone Corp. ..........................................2365..........Allegion .....................................................153..........Altronix ....................................................7142..........Armorlogix ...............................................6641..........AvaLAN Wireless ......................................4330..........Avigilon Corp. ..........................................29..............Axis Communications ................................19............Axis Communications ................................244..........Axxonsoft ......................................... 30-3116..........BCD Video................................................352............Bosch Security Systems ..........................1546..........CBC America ...........................................3335..........Chase Security Systems .........................3443..........ComNet .....................................................527..........CPM Symposium .....................................703............Cyberlock Inc. .........................................1817..........Dedicated Micros .....................................1132..........Doorking ..................................................6925..........Dotworkz ...................................................626..........Dotworkz .................................................161............DSX Access Systems ...............................7656..........Everfocus ................................................6512..........Garrett Metal Detectors ............................6812..........Geutebrueck GmbH .................................64..............HID Global ...............................................7555..........Honeywell ................................................634............Housing Company, The ............................2651..........Hypergraphic Impressions .......................5647..........IC Realtime ................................................722..........infi nias ....................................................5333..........IPVideo Corp. ...........................................4031..........Keyscan Ink .............................................495............Macurco Gas Detection ............................4134..........Middle Atlantic .........................................3613..........Milestone Systems ....................................337..........North American Cable Equipment.............4518..........Open Options Inc. ....................................2121..........Quantum Secure ......................................5014..........Safe & Secure Campus Symposium .........3815..........Salient Systems .......................................176............Samsung Techwin America ......................428............Securitron/ASSA ABLOY ...........................5138..........Security Today .........................................7249..........Security Today .......................................61

45..........Security Today Conference & Expo Discount ..6740..........Seneca Data Systems ..............................2039..........Smartvue Corp. .......................................2724..........Sony Electronics ......................................3728..........Speco Technologies .................................1311..........System Sensor ........................................1923..........System Sensor ........................................5619..........Transponder & Reader Engineered System ..4836..........TrendNet ..................................................477............Video Insight ..............................................920..........Vitek .......................................................5529..........Winsted Corp. ..........................................2548..........Wonwoo USA ...........................................24

EDITORIALCover Products

301........Axis Communications ................................1306........Chase Security Systems ............................1302........Dortronics ..................................................1300........Samsung Techwin America ........................1304........Speco Technologies ...................................1305........System Sensor ..........................................1303........Vitek ..........................................................1

Top Picks

313........ASSA ABLOY ............................................12308........Dortronics ................................................12315........Kwikset ...................................................12314........Olympus Lock Inc. ...................................12310........Sargent & Greenleaf ................................12312........Schlage ...................................................12311........Southco Inc..............................................12309........Yale .........................................................12

Product Solutions: Cameras

346........Advanced Technology Video .....................34347........Advanced Technology Video .....................34348........Advanced Technology Video .....................34349........Advanced Technology Video .....................36338........Axis Communications ..............................32336........Bosch Security Systems ..........................32354........Grandstream Networks ............................38335........Honeywell ................................................32339........Honeywell ................................................32355........IQinVision ................................................38352........JVC..........................................................38341........OpenEye ..................................................32

350........Panasonic ................................................36344........SightLogix ...............................................34340........Sony Electronics ......................................32337........Toshiba ....................................................32351........Toshiba ....................................................36353........Vicon Industries Inc. .................................38342........Videotec ..................................................32343........Videotec ..................................................32345........Vitek ........................................................34

Product Solutions: DVRs/NVRs

324........American Dynamics .................................44328........Crest Electronics ......................................45327........FLIR .........................................................45323........infi nias ....................................................44322........Interlogix .................................................44319........JVC..........................................................44329........KJB Security Products .............................45325........OnSSI ......................................................44320........Samsung ................................................44321........Samsung Techwin America ......................44318........Secura Key ..............................................44317........Swann Security .......................................44326........Van Cleeve & Assoc. ................................44

New Products

379........Allegion ...................................................66406........Allegion ...................................................72377........AMG Technology ......................................65370........ConvergenceTP .......................................64371........ConvergenceTP .......................................64372........ConvergenceTP .......................................64373........ConvergenceTP .......................................64409........Cyberlock Inc. .........................................72410........Cyberlock Inc. .........................................72380........Delta Scientifi c ........................................66392........EduProtect ...............................................69408........eLine Technologies ..................................72378........Galaxy Control Systems ...........................65381........Galaxy Control Systems ...........................66391........Genetec ...................................................69364........Honeywell ................................................62367........Honeywell ................................................62374........Honeywell ................................................64365........Ideal Industries Inc. ..................................62368........Ideal Industries Inc. ..................................62369........Information Security Corp. .......................62

398........inMotion ..................................................70403........inMotion ..................................................71383........ipVista .....................................................66362........JVC..........................................................62375........Magnasphere ..........................................64396........Matrox .....................................................70411........MOBOTIX .................................................72385........Morse Watchmans ...................................68399........Open Options Inc. ....................................70402........Open Options Inc. ....................................71407........Open Options Inc. ....................................72401........OpenEye ..................................................71393........Pivot3 ......................................................69382........PPM ........................................................66384........Quantum Secure ......................................66366........Raytec .....................................................62404........Refl ective Apparel ....................................71390........ROCKFON ................................................69395........Sans Digital .............................................69397........Sans Digital .............................................70388........Sargent & Greenleaf ................................68394........SecurityMan ............................................69405........Serco .......................................................71376........Southco Inc..............................................65363........Toshiba ....................................................62360........Tyco Security Products ............................62361........Tyco Security Products ............................62386........Vicon Industries Inc. .................................68389........Wausau ...................................................68400........World Compliance Technologies ...............70387........Yale .........................................................68

SPECIAL SECTIONGovSec

* ............ASSA ABLOY ............................................G9* ............ComNet ...................................................G2* ............Delta Scientifi c ......................................G15* ............DSX Access Systems .............................G16* ............Garrett Metal Detectors ..........................G12* ............GovSec ....................................................G7* ............Identicard ..............................................G13* ............Minuteman UPS .......................................G3* ............Reconyx ..................................................G5* ............Samsung Techwin America ....................G11

TAIWAN

CHINA

EUROPE

CANADAHAWAII

ALASKA

Jane Dai,International Sales ManagerChinaNew Buddy Limited [email protected]@public.szptt.net.cn

Peter Kao,International Sales ManagerTaiwanIdea [email protected]

INTERNATIONAL

Randy Easton,Integrated Media ConsultantEast (678) [email protected]

Brian Rendine,Integrated Media ConsultantWest, Canada, AK, HI(972) [email protected]

UNITED STATES & CANADA

Sam Baird,International Sales ManagerEurope, IsraelWhitehill Media Ltd.+44 1883 715 [email protected]

Kevin O'Grady President & Group Publisher

(972) [email protected]

Reprints: For single article reprints (in minimum quantities of 250-500), e-prints, plaques and posters contact:PARS International, Phone (212) 221-9595, [email protected],www.magreprints.com/QuickQuote.asp

List Rentals: This publication’s subscriber list, as well as other lists from 1105 Media, Inc., is available for rental. For more information, please contact our list manager, Jane Long, Merit Direct. Phone: 913-685-1301; E-mail: [email protected]; Web: www.meritdirect.com/1105

Media Kits: Download the current media kit atwww.security-today.com/pages/adv/media-kit

1014sec_073_Adindex_v2.indd 73 9/17/14 1:50 PM

Page 90: SP_1410DGD

INDUSTRYPROFESSIONAL By Ralph C. Jensen

7 4 1 0 1 4 | S E C U R I T Y P R O D U C T S

All American to the CoreYou don’t get much more pas-

sionate than Alan Forman, and there isn’t anyone more person-

able to their staff and co-workers. For-man is the co-founder and president of Altronix, located in Brooklyn, N.Y.

Forman and Jonathan Sohnis, the company’s CTO, co-founded the company in 1983, and for the past 30-plus years have introduced innovative technologies as the security industry evolved from analog into the IP world.

“We always look to develop rel-evant new products that incorporate new technologies to stay ahead of the curve,” Forman said. “With the integra-tion of what were once disparate sys-tem infrastructures, Altronix is focused on providing our reseller partners and end-users with solutions that are both highly effi cient and cost effective.”

And while Altronix has not departed from its successful power business, many new products are being designed for IP and networked applications. Altronix designs and manufactures a compre-hensive line of high-quality electronics for the video surveillance, security, fi re, access control and automation markets. Altronix is focused on the security in-dustry and their expertise is the result of years of experience and involvement. Forman attributes much of the com-pany’s success to the quality, reliability and uniqueness of Altronix products for mission critical applications.

“We are always seeking to enhance our portfolio of products and solu-tions,” Sohnis said. “We typically have numerous projects on the drawing board, and are now working on new and improved ways to integrate prod-ucts and how they communicate with each other.

“Altronix products have an unprec-edented reputation throughout the in-dustry. This is the result of several fac-tors starting with intense research and development to design the best prod-ucts available.”

Best of all, Altronix is made in the U.S.A. That label alone is highly sought after and coveted not only in the Unit-ed States, but worldwide.

“Made in the U.S.A.” has a special

meaning to both Forman and Sohnis. Altronix employs a staff of about 250, and there is a prevailing feeling of fam-ily that contributes to the success and continued growth of the company. For-man also clearly stated that Altronix is committed to promoting from within and establishing a great working envi-ronment that supports employees’ well-being, which is integral to the compa-ny’s longstanding success.

For approximately two decades, Al-tronix has been located in the newly repurposed Brooklyn Army Terminal, and has continued to expand its business operations since its inception. And some of this growth is due to the importance that Forman and Sohnis place on build-ing strong relationships with technology partners, resellers and end-users.

In addition to producing a compre-hensive range of products, Altronix of-

fers OEM design and manufacturing services for custom electronics for com-mercial and industrial applications. A tour of the facility begins at the very root of the manufacturing process. Ev-ery Altronix product is manufactured at the Brooklyn Army Terminal. Scores of people handle every aspect of produc-tion from robotic assembly and quality control to packaging and shipping.

“One thing that never changes is that the customer always comes fi rst,” Forman said. “You can’t always run a business solely based on process man-agement. You have to be focused on your customers’ challenges to design and deliver the right solution. When we started this company, we were pret-ty much a grassroots operation. Now we look at everything in a bigger way, but we still have the ability to make fast decisions to respond quickly to

market demands.”Sohnis said that Altronix is a para-

dox for U.S. industry today. His team of engineers spend their time sharing innovative ideas and concepts in the de-veloping new products. Forman added that even existing and successful prod-ucts are continually evaluated and im-proved upon as warranted to provide value add.

Altronix is all about the American dream and how individuals can rise to the occasion to achieve success and per-sonal fulfi llment. And why the words “Made in America” carry a far greater meaning and signifi cance than they may appear to on the surface.

Ralph C. Jensen is the editor-in-chief of Security Products magazine, and the content director for the Security Divi-sion of 1105 Media Inc.

1014sec_074_IndPro_v3.indd 74 9/16/14 1:22 PM

Page 91: SP_1410DGD

Move to HID Global’s adaptable iCLASS SE® Platform and start using the technology of tomorrow, today.

Switch to the access control that changes with you.

When it comes to access control, it can be difficult to stay ahead of changing security concerns and

technology demands. Go with HID Global’s iCLASS SE® Platform—the new standard in access control

that positions you for the future with an open, adaptable solution that easily integrates smart cards,

mobile devices and whatever tomorrow brings. Join the revolution in evolution and get greater security,

flexibility and simplicity.

Make your change by visiting hidglobal.com/change-SP

© 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design, and iCLASS SE are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.

Untitled-1 1 5/30/14 10:18 AM

Page 92: SP_1410DGD

10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

www.dsxinc.com

CREATING THE FUTUREOF SECURITY . . . TODAY

10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

www.dsxinc.comwww dsxinc com

Go to http://sp.hotims.com and enter 1 for product information.

Untitled-5 1 12/13/12 11:53 AM