sp_1505dgd

108
www.security-today.com Integrated New Product and Technology Solutions for Security Professionals May 2015 Vol. 19, No. 5 Securitech Deadbolt locks Securitech’s QID (Quick Intruder Deadbolt) classroom lock quickly locks down classrooms and deadbolts the door with one push of the red button. The DHS-compliant QID maintains single-action egress for occupant safety and remains unlockable by key from the outside, allowing first responders or other authorized staff fast entry. A visual indicator confirms deadbolt locking, accomplished without use of a key. 100 percent code compliant, QID exceeds safe school government standards and requires virtually no training. Securitech. Go to sp.hotims.com and enter number 300 for product information. IC Realtime IC720 dual-sensor 24-megapixel virtual PTZ camera IC Realtime’s IC720 dual-sensor 24-MP Virtual PTZ camera and proprietary software App captures 360-degrees vertically and 360-degrees horizontally. The camera includes zoom and freeze options, all in an ultra-smooth fash- ion, free of blind spots or distortion. Monitoring is achieved via iPad or iPhone and navigated by either pointing the display device in the desired directions, or via finger-control of the touch screen. The end-result is a virtual reality-like monitoring experience that is sure to change the way surveillance systems will be designed and monitored. IC Realtime. Go to sp.hotims.com and enter number 301 for product information. AvaLAN Wireless Long range wireless Ethernet solutions AvaLAN has announced their new 800 Mbps, 5.8 GHz long range wireless Ethernet solutions. This is an industrially hardened 802.11ac product to the market that addresses customers’ needs for higher throughput and uses custom AvaLAN Wireless firmware and multiple- in-multiple-out (MIMO) technology. AvaLAN’s AW58800 series delivers Ethernet throughput up to 540 Mbps. The 800 Mbps radios are great for applications with high bandwidth or applications that may need scalability and are optimized to support IP-based megapixel surveillance cameras. AvaLAN Wireless. Go to sp.hotims.com and enter number 302 for product information. Hikvision USA 6MP Smart IP Outdoor Dome Camera Hikvision’s newest Smart IP outdoor dome camera (DS-2CD4565F- IZH) captures high-quality, real-time color 6MP images at up to 24fps. The camera boasts digital WDR, defogging, and 3D digital noise reduction, as well as a complete set of Smart features such as facial detection and object counting. Other smart features allow the camera to detect events such as intrusion, line crossing, objects removed or objects left behind, audio level or audio loss, and loss of focus—all in a rugged vandal resistant housing. Hikvision USA. Go to sp.hotims.com and enter number 303 for product information. Speco Technologies HD-TVI cameras Upgrade to high definition without sacrificing existing coax infrastructure or the bank. Speco Technologies’ brand new lineup of HD-TVI cameras and DVRs offer recording at full HD 1080p resolution using coax. In addition, price levels similar to standard analog allow for immediate upgrades in quality without costly rewiring. Speco’s HTINT591T camera offers 1080p resolution and maintains a color image in low light using the Intensifier technology. Speco Technologies. Go to sp.hotims.com and enter number 304 for product information. Open Options Fusion Suite—access control when you need it Open Options Fusion Suite has everything that’s needed in an access control solution with award-winning DNA Fusion access control software and auxiliary Fusion products. Fusion Web and Fusion Mobile allow users access control software on-the-go—when it’s needed most. Users can also take advantage of Fusion ID which allows the creation, management and printing of badges centrally. Partnerships with leaders in all facets of the security industry mean users will always have options when choosing a comprehensive security solution. Open Options. Go to sp.hotims.com and enter number 305 for product information. Orion Entrance Control Inc. Barrier swing glass The Optical Barrier Swing Glass is a high glass access control solution that comes standard with a stainless steel finish and 3/8-inch, clear, tempered, “no touch” swinging glass. Entry is authorized with an access card or other cre- dential, and indicated by a top-mounted, LED-lit, green ar- row and a sound from an 8 ohm speaker. Beam Scanning Optical Detection technology scans lanes in both directions simultaneously, allowing authorized users fast and effortless throughput while manipulating belongings. The visual and audible alarms signal unauthorized users and tailgaters. Orion Entrance Control Inc. Go to sp.hotims.com and enter number 306 for product information. The value of quality. Beyond standards and datasheets. www.axis.com/quality Campus Video Surveillance Simplified Maximize video surveillance coverage while reducing cost. Video Insight VMS software provides an easy-to-use, feature-rich enterprise solution that integrates with most popular access control and supports over 2,500 camera models from over 100 manufacturers. Key Benefits • Simple and Easy-to-use • Scale without limitations • Access Control Integrated • Free mobile clients (Android/IOS) For more information visit us at: http://www.video-insight.com/software/index.php Go to sp.hotims.com and enter 46 for product information.

Upload: astralis007

Post on 07-Nov-2015

251 views

Category:

Documents


19 download

DESCRIPTION

SECURITY PRODUCTS 05/2015

TRANSCRIPT

  • www.security-today.com

    Integrated New Product and Technology Solutions for Security Professionals May 2015 Vol. 19, No. 5

    SecuritechDeadbolt locksSecuritechs QID (Quick Intruder Deadbolt) classroom lock quickly locks down classrooms and deadbolts the door with one push of the red button. The DHS-compliant QID maintains single-action egress for occupant safety and remains unlockable by key from the outside, allowing first responders or other authorized staff fast entry. A visual indicator confirms deadbolt locking, accomplished without use of a key. 100 percent code compliant, QID exceeds

    safe school government standards and requires virtually no training. Securitech.Go to sp.hotims.com and enter number 300 for product information.

    IC RealtimeIC720 dual-sensor 24-megapixel virtual PTZ cameraIC Realtimes IC720 dual-sensor 24-MP Virtual PTZ camera and proprietary software App captures 360-degrees vertically and 360-degrees horizontally. The camera includes zoom and freeze options, all in an ultra-smooth fash-ion, free of blind spots or distortion.Monitoring is achieved via iPad or iPhone and navigated by either pointing the display device in the desired directions, or via finger-control of the touch screen. The end-result is a virtual reality-like monitoring experience that is sure to change the way surveillance systems will be designed and monitored. IC Realtime.Go to sp.hotims.com and enter number 301 for product information.

    AvaLAN WirelessLong range wireless Ethernet solutionsAvaLAN has announced their new 800 Mbps, 5.8 GHz long range wireless Ethernet solutions. This is an industrially hardened 802.11ac product to the market that addresses customers needs for higher throughput and uses custom AvaLAN Wireless firmware and multiple-in-multiple-out (MIMO) technology. AvaLANs AW58800 series delivers Ethernet throughput up to 540 Mbps. The 800 Mbps radios are great

    for applications with high bandwidth or applications that may need scalability and are optimized to support IP-based megapixel surveillance cameras. AvaLAN Wireless.Go to sp.hotims.com and enter number 302 for product information.

    Hikvision USA6MP Smart IP Outdoor Dome Camera Hikvisions newest Smart IP outdoor dome camera (DS-2CD4565F-IZH) captures high-quality, real-time color 6MP images at up to 24fps. The camera boasts digital WDR, defogging, and 3D digital noise reduction, as well as a complete set of Smart features such as facial detection and object counting. Other smart features allow the camera to detect events such as intrusion, line crossing, objects removed or objects left behind, audio level or audio loss, and loss of focusall in a rugged vandal resistant housing. Hikvision USA.Go to sp.hotims.com and enter number 303 for product information.

    Speco TechnologiesHD-TVI camerasUpgrade to high definition without sacrificing existing coax infrastructure or the bank. Speco Technologies brand new lineup of HD-TVI cameras and DVRs offer recording at full HD 1080p resolution using coax. In addition, price levels similar to standard analog allow for immediate upgrades in quality without costly rewiring. Specos HTINT591T camera offers 1080p resolution and maintains a color image in low light using the Intensifier technology. Speco Technologies.Go to sp.hotims.com and enter number 304 for product information.

    Open OptionsFusion Suiteaccess control when you need itOpen Options Fusion Suite has everything thats needed in an access control solution with award-winning DNA Fusion access control software and auxiliary Fusion products. Fusion

    Web and Fusion Mobile allow users access control software on-the-gowhen its needed most. Users can also take advantage of Fusion ID which allows the creation, management and printing of badges centrally. Partnerships with leaders in all facets of the security industry mean users will always have options when choosing a comprehensive security solution. Open Options.Go to sp.hotims.com and enter number 305 for product information.

    Orion Entrance Control Inc.Barrier swing glassThe Optical Barrier Swing Glass is a high glass access control solution that comes standard with a stainless steel finish and 3/8-inch, clear, tempered, no touch swinging glass. Entry is authorized with an access card or other cre-dential, and indicated by a top-mounted, LED-lit, green ar-row and a sound from an 8 ohm speaker. Beam Scanning Optical Detection technology scans lanes in both directions simultaneously, allowing authorized users fast and effortless throughput while manipulating belongings. The visual and audible alarms signal unauthorized users and tailgaters. Orion Entrance Control Inc.Go to sp.hotims.com and enter number 306 for product information.

    The value of quality.

    Beyond standards

    and datasheets.

    www.axis.com/quality

    Campus Video Surveillance SimpliedMaximize video surveillance coverage while reducing cost.

    Video Insight VMS software provides aneasy-to-use, feature-rich enterprise solution thatintegrates with most popular access control andsupports over 2,500 camera models from over 100manufacturers.

    Key Benets

    Simple and Easy-to-use Scale without limitations Access Control Integrated Free mobile clients (Android/IOS)For more information visit us at: http://www.video-insight.com/software/index.php

    Untitled-3 1 4/15/15 10:46 AM

    Go to sp.hotims.com and enter 46 for product information.

    0515sec_0c1_v2.indd 1 4/15/15 2:06 PM

  • Our cameras are used in all sorts of noisy, shaky environments. But were not worried. Thats because weve already subjected them to over one million cycles of very high vibrations and hundreds of shocks. We try to keep them away from jackhammers though.

    Its just one of the tough tests Axis cameras face, so you can be sure youll always get the best image quality and high performance no matter where you install them.

    Unshakeable.

    Learn more about Axis quality assurance work at axis.com/quality

    Distributed by:

    Count on it.

    Visit Axis at ESX Expo 2015: Baltimore Convention Center, MarylandJune 25-26Booth #439

    Go to http://sp.hotims.com and enter 17 for product information.

    Untitled-2 1 3/27/15 4:21 PM

  • POSSIBLE STARTS HERE

    RUN Milestone Mobile AND DOCUMENT

    ANY EVENT WHILE IT HAPPENS

    Let your staff stream live video from their smartphones, wherever they are

    By allowing your staff to stream live video from the devices camera directly into your Milestone solution, the Milestone Mobile app gives operators in your central monitoring station immediate awareness of incidents no matter where they occur.

    Compatible with all Milestone XProtect video management software and the Milestone Husky NVR series, the Milestone Mobile app provides extended live visibility and the ability to use video streams in later investigations.

    Explore more surveillance and security opportunities with Milestone video management solutions at milestonesys.com

    Milestone Systems U.S.Tel: 503 350 1100

    Go to http://sp.hotims.com and enter 13 for product information.

    Untitled-7 1 4/1/15 2:07 PM

  • 4 0 5 1 5 | S E C U R I T Y P R O D U C T S

    www.security-today.comCONTENTS MAY 2015

    FEATURES

    Campus Security 14Capturing Teachable MomentsHow one university uses network video to train next-generation speech and language pathologistsBy John Bartolac

    Internet of Things 20A Strategic ApproachScalable security is the way of networking an IT infrastructure By Jon Ecker

    Venue Security 32The Zoo at NightGiving customers a unique experience thanks to security features By Courtney Pedersen

    Utility Security 34Connecting Disparate SystemsMultiple-vendor link access control systems across all geographic locationsBy Jasvir Gill

    Command Center 36More Comfortable OperationsRetrofit brings a sharper image to command centerBy Randy Smith

    SPECIAL SECTIONS

    Dealer Strategies DS1 DS16

    GovSec GS1-GS16

    Networking Security NS1-NS16

    DEPARTMENTS

    Industry Focus 8The Value of a Smart HomeBy Ralph C. Jensen

    Industry Vertical 10Hearing Security SolutionsBy Cameron Javdani

    Top Picks 12

    Product Solutions: VMS 26

    New Products 38

    Advertisers Index 57

    Industry Professional 58Changes are ComingBy Ralph C. Jensen

    Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offices. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualified subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.

    Copyright 2015 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission. Mail requests to Permissions Editor, c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254

    The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the readers sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

    0515sec_004b_TOC_v2.indd 4 4/15/15 5:53 PM

  • Bright Idea6MP Real-time VideoWith up to 6 megapixel resolution (3072 x 2048) recording at 30fps, Smart IP cameras oer unparalleled image quality and a real-time surveillance experience.

    Smart FeaturesLine Crossing DetectionDetect objects, people and vehicles crossing a dened virtual line An ideal solution for monitoring building entrances, parking lots and other restricted areas.

    Innovative Hikvision Smart IP cameras bring intelligence, eciency and convenience to modern video surveillance. Enriched with Smart technologies, Hikvision's new Smart IP cameras, Smart PTZ cameras and Smart NVRs are all meticulously designed to deliver smart security for a broad variety of applications. Now thats a Bright Idea!

    Tel: +1 909.895.0400Email: [email protected]

    www.hikvision.com

    Hikvision USA Inc.

    Go to http://sp.hotims.com and enter 3 for product information.

    Untitled-2 1 4/13/15 2:04 PM

  • 6 0 5 1 5 | S E C U R I T Y P R O D U C T S

    New Product of the Year Awards

    With the Govies and ISC West behind us, its that time again when we gear up for our New Product of the Year awards. We are currently accepting applications in a large variety of categories such as Ac-

    cess Control, Commercial Monitoring Solutions, Emergency Communications Systems, and more.

    We will be offering a discounted price until May 15, but well continue to accept entries until July 24. Entry forms are available for download on our web-site at www.security-today.com/npoy. If you have any questions or would like to enter our NPOY awards, please feel free to send me an email or give me a call. I look forward to hearing from you.

    Our REACTION blog addresses current events and receives great feedback from our active online community. Wed like to invite you to check out our recent posts and share your thoughts.

    If youre interested in contributing to our Online Exclusives or our blog, please contact me at [email protected] or 972-687-6784.

    Best Regards,

    Lindsay Page

    Online Exclusives

    Online Exclusive: Integrated Security Not Just an Industry BuzzwordBy Cale DowellWith so many business functions becoming inte-grated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical se-curity industry is integrated security services. What comprises integrated security? An internet search might lead you to a few companies; however, like many other marketable phrases in our industry, integrated security doesnt retain a standard definition. And it shouldnt.

    Video Surveillance Exceeds ExpectationsBy Keith WinchesterTheCapital District Transportation Author-ity(CDTA), serving the New York State capital city of Albany and surrounding counties, has seen an 80 to 90 percent decrease in liability claim payouts since deploying a video surveillance system in 2007.

    A Little Chat with ONVIFBy Ginger HillDue to several high-profile and well-publicized recent cyber breaches, data and system security have become top priorities for customers. At the

    same time, the call for increased interoperability grows. As is the case in many markets and across most technologies, customers want their devices to work together, regardless of brand. Within physical security, we are also seeing new developments in the access control market.

    With these trends in mind, we recently spoke with Steering Committee Chair of ONVIF, Per Bjrkdahl for his thoughts on how ONVIF is affected by these trends and how ONVIFs standards are helping to shape the future of physical security.

    http://security-today.com/01131

    Recent Headlines

    Police Say Dash Cams Dont Show S.C. Shooting

    White House Computers are Vulnerable to Hackers

    Kenyan University Students March to Demand Security

    http://security-today.com/news

    Upcoming Webinars

    Its About Time: 4 Reasons Why Your Access Control is on the ClockJoin experts from Avigilon on February 25th as they highlight the key topics you need to consider when assessing your physical access control system this year.

    What Makes Security in a Campus Work; the Role Social Media Plays in Protecting StudentsSecurity projects where the newest technology has been deployed but did the actual security level in-crease and lessons learned following the devastating shooting at Sandy Hook Elementary School.

    To view these Webinars at any time, please visit http://security-today.com/webinars.

    REACTION Blog Recent Posts

    Grandfather Arrested for Fatally Stabbing Granddaughters Boyfriend

    Gunfire Rings Out During Boys Basketball Game

    Execution by Firing Squad a Reality

    Members of our staff and guest bloggers take advantage of REACTION to add their own per-spectives on a broad range of security topics and issues. If youd like to be a contributor, please contact Group Social Media Editor, Ginger Hill at [email protected].

    Online Communities

    Follow us on Twitter: www.twitter.com/SecProds

    Become a fan on Facebook:http://www.facebook.com/secprodonline

    Pin with Us:http://pinterest.com/securitytoday/

    Go to sp.hotims.com and enter 39 for product information.

    0515sec_006_eTOC_v2.indd 6 4/15/15 5:56 PM

  • SUPERSONIC - Faster than a bullet train.

    ICR

    ealt

    ime.

    com

    The NVR-8256DR is the next step in the evolution of high performance 4K resolution network video recorders. The NVR-8256DR NVR is blazing fast utilizing an Intel i7 quad-core processor and can store up to 96TB internally. Reset your expectations with this ground breaking super recorder.

    Intel Core i7 Processor 512Mps of Real-time processing 256 Channels of High Definition Up to 96TB of Storage 2 HDMI/1 VGA 4 Gigabit Ethernet Cards ONVIF Compatible 2 Redundant Power Supplies

    IC Realtime will reset your expectations of surveillance capabilities. Our products provide real-time, customized and innovative solutions unparalleled in the surveillance industry. Learn more by visiting ICRealtime.com

    NVR-8256DR

    2015 ICRealtime. ALL RIGHTS RESERVED

    Go to http://sp.hotims.com and enter 12 for product information.

    Untitled-5 1 3/12/15 12:23 PM

  • 8INDUSTRYFOCUSBy Ralph C. Jensen, Editor-in-Chief

    www.security-today.com

    Volume 19, No. 5

    EDITORIAL STAFF

    Editor-in-Chief/Associate Publisher Ralph C. Jensen

    Senior Editor Lindsay Page

    E-news Editor Brent Dirks

    Content Development Matt Holden

    ART STAFF

    Art Director Dale Chinn

    PRODUCTION STAFF

    Director, Print and Online Production David Seymour

    Production Coordinator Teresa Antonio

    EDITORIAL ADVISORY BOARD

    Thomas Carnevale, president/CEO, Sentry 360

    William Crews, President/CEO, Security & Resilience Consulting, LLC, Houston

    Merlin Guilbeau, Electronic Security Association, Irving, Texas

    Robert Hile, director of strategic accounts, Sure View Systems

    Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston

    SALES

    Randy Easton 904-261-5584

    Brian Rendine 972-687-6761

    Sam Baird +44 1883 715 697

    Jane Dai +86-755-26289889

    Peter Kao +886-2-2949-6412

    SECURITY, SAFETY, AND HEALTH GROUP

    President & Group Publisher Kevin OGrady

    Group Circulation Director Margaret Perry

    Group Marketing Director Susan May

    Group Website Manager Scott Newhouse

    Group Webinar Administrator Tammy Renne

    Group Social Media Editor Ginger Hill

    Chief Executive Officer Rajeev Kapur

    Senior Vice President & Chief Financial Officer Richard Vitale

    Chief Operating Officer Henry Allain

    Executive Vice President Michael J. Valenti

    Vice President, Erik A. Lindgren Information Technology & Application Development

    Chairman of the Board Jeffrey S. Klein

    REACHING THE STAFF

    Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.

    E-mail: To e-mail any member of the staff, please use the following form: [email protected]

    Dallas Office (weekdays, 8:30 a.m. 5:30 p.m. CT) Telephone (972) 687-6700; Fax (972) 687-6799 14901 Quorum Dr., Suite 425, Dallas, TX 75254

    Corporate Office (weekdays, 8:30 a.m. 5:30 p.m. PT) Telephone (818) 814-5200; Fax (818) 734-1522 9201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

    New Focus on the ClassroomPrior to two weeks ago, as of this writing, I paid attention to cameras in the classrooms as they affected others. Then, on March 31, my grand-daughter was enrolled in daycare. My wife and I are raising this 16 month old, and the first thing I did when touring daycare centers was look at access con-trol, and the cameras in the rooms.

    Shocked, I found that some day care centers do not have cameras in each room, and as far as locks on the front door, well, thats another story. When we nar-rowed the list of where she should be enrolled, it came down to whom had video surveillance in each room, and what type of cameras they were using.

    Maybe it was my old age; some daycare provid-ers thought they could baffle me with their (lack of) knowledge of video surveillance. I listened and found I wasnt completely happy with any of the daycare centers, though we had to choose one. Now, I find myself checking in to the shared video feed to make sure my little one is okay.

    Its been two weeks and its time for me to intro-duce the latest video surveillance technology to the daycare center. They need to install IP cameras, so I can clearly see what that baby girl is doing, and make sure she is treated like I expect my granddaughter to be treated.

    It is amazing how security solutions become part of our lives, whether by security solutions at work, home or now, at daycare. I understand that there are still plenty of people who swear by an analog camera; Im more convinced than ever before that an IP net-worked camera is the only way to go.

    Mergers and AcquisitionsThere have been some amazing transactions this year in the security industry. Im anxious to watch them mature over the next few months. Surprising to me: the public offering of Axis Communications by Can-on. Im anxious to watch this solution evolve under the new ownership; it makes me think that Canon is excited to reemerge in the security vertical.

    Milestone Systems was snapped up by Canon, in order to build up its surveillance brand.

    Canon is aiming to take a leadership position in network video surveillance and we are making an important strategic investment today to realize our objective to expand in this market, said Rokus van Iperen, president and CEO, Canon Europe, Middle East and Africa.

    Video Insight was also part of the action as Pana-sonic acquired all shares of the Houston-based com-pany. Panasonic said the acquisition was to strengthen its North American presence in the education market solution business.

    Were excited and honored to partner with the Panasonic Group, said J. Robert Shaw, CEO of Vid-eo Insight. We believe this partnership will help us accelerate innovation, enhance product development, and allow us to provide our customers with better se-curity solutions for years to come.

    Perhaps the biggest surprise to me stemming from last year at ASIS, Eric Fullerton, formerly with Mile-stone Systems, has taken over at Vicon as CEO. Vicon acquired the assets and technology of IQinVision, and really, Fullerton is the right person for the job.

    IQinVision is a very good name for a camera company, and the continuing company is not just a camera company, Fullerton said. Vicon actually has 47 years on it, with a lot of knowledge in certain parts of the industry that has a value.

    Vicon plans to retain the name, using either IQin-Vision or IQeye as the camera brand. Which form its fully going to take has not yet been ironed out.

    There have been numerous mergers and acquisi-tions, too many to name in this short space. I think the security industry at large will be keeping an eye on each business model to see how it plays out. I think it will be very interesting.

    One Last ThingBrinks, a security firm that hauls around a lot of cash for its clients, found an honest man, and the story is worth repeating.

    Dan Kennedy, who lives in the Salt Lake City area, found a bag of cash (75 pounds) that had fallen from a Brinks truck on a local a freeway. Brinks offered Kennedy $5,000 because he returned the bag of cash. That bag probably had about $22,000 inside.

    My folks called me, told me they were proud of me, Kennedy said. It felt real good.

    Kennedy insists that almost anyone else would have returned the cash in the same situation. Id be curious to know if that would be the case.

    Two good things resulted: The two employees who were in the truck made it possible for steps to be taken to ensure that this doesnt happen again. More importantly, a true gentlemen emerged in the form of Tom Kennedy.

    0515sec_008_IndFocus_v3.indd 8 4/15/15 11:09 AM

  • Video Insight VMS software provides an easy-to-use, feature-rich enterprise solution that allows you to monitor a single location or multiple facilities across multiple locations. The solution integrates with most of the popular access control solutions and supports over 3,000 camera models from over 100 manufacturers. Video Insight is the perfect solution for businesses looking to lower the cost of video surveillance and expand opportunities. Key Benets

    Easy-to-use

    Lower Total Cost of Ownership

    Scale without limitations

    Access Control Integrated

    Support for over 3,000 cameras

    Free mobile clients (Android/IOS)

    For more information visit us at: http://www.video-insight.com/software/index.php

    Campus Video Surveillance SimpliedVideo Insight Maximize video surveillance coverage while reducing cost.

    Go to http://sp.hotims.com and enter 16 for product information.

    Untitled-4 1 4/15/15 11:23 AM

  • 1 0 0 5 1 5 | S E C U R I T Y P R O D U C T S

    Audio is a vital compo-nent in the security in-dustry. For years, com-panies have focused on video, trying to perfect

    image capture, data storage and analyt-ics. While many security manufacturers based their products and value proposi-tion in visual monitoring, one man did not. Louis Weiss saw a need to create a high quality microphone that was far better than the typical audio equipment that was housed inside cameras.

    Driven by his passion for audio and electronics, Louis Weiss founded Louroe Electronics in his garage in Van Nuys, Calif. in 1979. The company incorpo-rated in 1981, and later Weiss hired his first employees and engineer. By the late 2000s, the Louroe team occupied a 17,000 square foot building and exported audio solutions to 34 countries. When Weiss passed away in 2009, his nephew, Richard Brent, was asked to lead the company.

    I always admired my uncles work with Louroe Electronics and the great people and products he got to interact with each day, said Richard Brent, CEO of Louroe Electronics. I was honored to be given the opportunity to continue his

    legacy and lead Louroe as it entered this new stage of growth.

    Brent added a wealth of knowledge in advocacy to the Louroe team. Prior to joining the security company in 2009, Brent worked for Caterpillars Solar Tur-bine Inc. for 24 years. Much of his no-table achievements occurred when he was director of government affairs and based in Washington, D.C. Brent influenced the adoption of several components to ener-gy policies like The Energy Independence and Security Act of 2007. He also chaired multiple committees including the World Alliance for Decentralized Energy.

    Weiss nephew instilled a passion for collaborating with government officials and organizations in Louroe. Under Brents leadership, Louroe has partici-pated in a number of domestic and in-ternational security initiatives that have resulted in an explosive growth in sales. In 2012, the United States Commerce Department invited Louroe to represent the United States on a trade mission to Mexico. Because of the partnerships that were formed from that trip, Louroes sales increased by 1,200 percent in the Mexican market. A year later, Louroe was awarded the 2013 Export Achievement Award at

    the Los Angeles Chamber of Commerces 87th Annual World Trade Week. In 2014, Louroe Electronics, along with 17 export-ready companies, joined Secretary of Commerce Penny Pritzker on her first-ever trade mission.

    We couldnt have accomplished the increase in our business without the value of the International Trade Admin-istration within the U.S. Department of Commerce. This is a prime example of our governments commitment to put-ting our tax dollars to work for the pub-lic, Brent said.

    Throughout 2014, Brent represent-ed Louroe on more trade missions to Mexico, Panama and Colombia, and participated in the U.S.-Mexico CEO Dialoguea coalition of Mexican and American business leaders who meet to discuss how to enhance economic growth for the two countries. By the end of 2014, Louroe was exporting more than 100 products to 50 countries.

    Brent has not only used his expertise in government affairs to benefit Louroe Electronics, but also to advance the se-curity industry. He is committed to hav-ing Louroe actively participate in meet-ings that will shape policy, standards and

    Hearing Security SolutionsBy Cameron Javdani

    Cameron Javdani is the director of sales and marketing at Louroe Electronics.

    0515sec_010_011_IndVert_v4.indd 10 4/15/15 2:06 PM

  • W W W . S E C U R I T Y - T O D A Y. C O M 1 1

    regulations for security. For this rea-son, Louroe continually partners with thought leaders and organizations like the Security Industry Association. In fact, Brent was tasked with chairing the planning committee and conference for SIAs 2014 Government Summit.

    Louroe has hit some impressive mile-stones when it comes to trade, but what makes Brent truly proud is the fact that Louroe is an American manufacturer.

    We are deeply gratified to be able to keep the manufacturing process inside U.S. borders, said Brent. We love being able to provide jobs for residents in our community and were happy to do our part to advance the Los Angeles economy.

    Since its inception, all of Louroes products have been made at its head-quarters. Each solution is tested by a staff member to guarantee the technol-ogy is functioning properly.

    Another defining attribute of Lou-roe is its audio technology.

    The companys signature product is its Verifact line of pre-amplified mi-crophones, complementing base sta-tions and communication accessories that provide audio output to interface with other security devices. The micro-phones are known for their sensitivity, omnidirectional capability, easy instal-lation and compatibility with recorders, cameras and IP video systems. Louroes solutions have earned multiple awards. Most notably, their IF-PX power extrac-tor won Best Commercial and Moni-toring Solutions at ISC West 2013.

    Louroes audio devices are frequent-ly integrated with video surveillance and access control systems to provide additional evidence, alarm verifica-tion, crime deterrence, and real-time re-sponse. Many end users in the retail in-dustry are also using the microphones to monitor business operations. For ex-ample, a store manager can listen live to an employees interactions with a cus-tomer, which in turn helps him to know how to improve their customer service, enhance their employee relations and increase their loss prevention efforts. The audio systems are also commonly used in the commercial, education, transportation and law enforcement in-dustries, just to name a few.

    Since the audio surveillance market is a lesser known vertical within the security industry, Louroe is not only

    dedicated to selling their product, but also to educating their peers on the value of audio.

    We want to lead the way in mini-mizing the false perceptions of audio as a Big Brother device or a mecha-

    nism to invade privacy, Brent said. Instead, we want to shed light on the issue by disseminating truths about how audio increases security, deters incidents and provides insights that improve business operations.

    Audio is too valuable a preventa-tive tool for security professionals not to use it, he said.

    Cameron Javdani is the director of sales and marketing at Louroe Electronics.

    AlertEnterprise delivers next generation security convergence software to manage security, risk and compliance, manage insider threat and safeguard critical infrastructure from fraud, theft and sabotage in asset-intensive industries. AlertEnterprise works with existing PACS (including HSPD-12 support for PIV cards), video surveillance systems, multiple sensor types and enterprise applications to deliver real-time Situational Intelligence and Incident Management capabilities.

    Untitled-5 1 4/15/15 11:59 AM

    Go to sp.hotims.com and enter 35 for product information.

    0515sec_010_011_IndVert_v4.indd 11 4/15/15 2:06 PM

  • 0515 TOP PICKSCompiled by Security Products Staff

    1 2 0 5 1 5 | S E C U R I T Y P R O D U C T S

    SIKLUWorlds smallest backhaul radio

    The EH-600T blackhaul radio is practically in-visible with its small size of 5.9 x 6.1 x 3.54.

    Users can enjoy gigabit capacity all the way from their security cameras and view dozens of real-time full-motion 4K-HD video streams.

    Easy 15-minute installation by a single in-staller is possible, with no telco background necessary.

    Fast frequency planning and site acquisition is available in the interference free 57-64GHz unlicensed band.

    The radio features robust performance and scalable deployment with the only 60GHz prod-uct that supports 8 user configurable channels.

    SIKLU.Go to sp.hotims.com and enter number

    314 for product information.

    FireVuVideo smoke and flame detector

    FireVu 500 video smoke and flame detector detects flame by identifying colour and the in-tensity of black body emitters while ignoring other sources of bright light (patent pending).

    The detector has effective long range detec-tion at 100m or more within the field of view.

    FireVu 500 also works in challenging volumi-nous, dirty and outdoor areas.

    The product features early warning and situation-al awareness; alerts operators to the size/scale of the fire so fast appropriate action is taken.

    FireVu.Go to sp.hotims.com and enter number

    315 for product information.

    FST BiomentricsIMID mobile Smartphone application

    IMID Mobile, the newest product offering from FST Biometrics, is a smartphone application designed to supplement the important work of security staff.

    Downloadable from the Google Store, IMID Mobile complements the award-winning FST Biometrics IMID Access system and brings mobility to the secure access experience.

    IMID Mobile identifies authorized and unauthor-ized users and provides complementary infor-mation on the guards personal mobile device

    IMID Mobile logs all information and enables advanced reporting and analytics via IMID Ac-cess software

    FST Biometrics.Go to sp.hotims.com and enter number

    316 for product information.

    KiwiSecurityPrivacy protected video surveillance

    With KiwiSecuritys privacy protected video surveillance, persons are pixelized in real time while actions remain recognizable with de-cryption of video via four-eye-principle.

    People counting is done in real time, with an unlimited amount of zones and counting lines. Maximum accuracy is possible with 3D-infra-red sensors (99.5 percent).

    Visualized activity and hot-spots, paths and dwelling are visualized and evaluated statisti-cally and instantaneously.

    Parking area monitoring and LPR are includ-ed. License plates of entering vehicles are recognized, collected and matched to black/whitelists. Parking duration and occupied parking spaces are analyzed to trigger events.

    KiwiSecurity.Go to sp.hotims.com and enter number

    317 for product information.

    CIAS Elettronica SrlMicroway barriers and sensors moving to IP

    CIAS has created IP-Doorway that is an inter-face designed to make all HIS digital detectors IP-ready.

    Using IP-doorway, barriers or sensors in which it is installed, has all the elements of an IP native detector.

    Through an Ethernet Cat-5E ftp cable, it is pos-sible to power the product while also remotely managing the alarm data and configuration.

    There is a significant economic advantage to the installer as, using a single cable, means that almost anything can be implemented with ease.

    The product can be powered using the PoE 802.3AF standard.

    CIAS Elettronica Srl.Go to sp.hotims.com and enter number

    310 for product information.

    Intellio12-MP image capturing with H.264 compression

    Intellios ILD-810S camera captures 12.5-MP compressed images with 8 fps at full resolu-tion and 4k format support.

    The cameras on-board intelligence supports various functions and true day/night vision with as low as 0.01 lux sensitivity.

    The devices field of vision is variable with lenses from 4.5 to 50 mm.

    All image capturing and event recording may be synchronized with a shared Windows folder or saved on a built-in SD card.

    The camera is PoE compatible for single-cable connection and ONVIF Profile S certified.

    Intellio.Go to sp.hotims.com and enter number

    311 for product information.

    CognitecDetection/tracking and

    camera tech in a single device

    FaceVACS provides detection/tracking and camera technology in a single device.

    The software provides high image quality of ma-chine vision cameras while using bandwidth and network structures for surveillance cameras.

    FaceVACS migrates video processing intelligence of the stream processor into the input device.

    It performs real-time, gapless face detection/tracking of multiple faces.

    The product offers integrated exposure control for the face area.

    It also supports RTSP/H.264 video streams for integration with digital video recording systems.

    Cognitec.Go to sp.hotims.com and enter number

    312 for product information.

    ARH Inc.Automated parking and access

    control system

    ParkIT System is a complete access control and parking management system for any size of application such as residential, industrial, commercial or government installations.

    The components are designed together for sim-ple integration with any access control environ-ment and without requiring programming skills.

    ParkIT System is simple to operate and it per-mits separate user access levels for straight-forward operation and data management.

    The system is comprised of ParkIT Camera(s), the industry-leading CARMEN LPR engine, ParkIT Application, expandable server and customizable GUI.

    ARH Inc.Go to sp.hotims.com and enter number

    313 for product information.

    0515sec_012_Toppicks_v2.indd 12 4/15/15 11:11 AM

  • FULL HDOVER COAX Clear Digital Zoom

    Superior Image Quality

    UpgRADE yOUR AnALOg systEm tO FULL 1080p using your existing coax infrastructure with specos HD-tVI cameras. Our HD-tVI cameras offer high resolution images with clear digital zoom. With specos HD-tVI cameras you wont have to touch your wiring system or your wallet.

    Heater circuitry & anti-moisture glass

    reduce fog or condensation

    Superior low-light performance

    For more information contact us at: [email protected] 1.800.645.5516 or specotech.com

    Intensifier T HD-TVI 1080p 2MP Indoor/Outdoor Vandal Resistant Dome Camera

    HTINT591T 3.6mm fixed lens

    D4VT, D8VT, D16VT 4, 8 or 16 Channel 1080p HD-TVI Digital Video Recorder

    VT 1080p HD-TVI Digital Video Recorder

    Superior low-light performance

    Intense IR HD-TVI 1080p 2MP Indoor/Outdoor Vandal Resistant Dome/Turret Camera

    HT6041T 3.6mm fixed lens

    Intense IR functionno saturation of images

    EZ Set-Up Wizards EZ Search EZ Record EZ Copy

    Also available in bullet housing HTINT70T 2.8-12mm auto iris varifocal lensHTINT701T 3.6mm fixed lens

    Also available in bullet housing HT7040T 2.8-12mm auto iris varifocal lensHT7041T 3.6mm fixed lens

    Go to http://sp.hotims.com and enter 18 for product information.

    Untitled-6 1 4/8/15 5:15 PM

  • 1 4 0 5 1 5 | S E C U R I T Y P R O D U C T S

    CAMPUS SECURITYIm

    age Point Fr/Shutterstock.com

    CAPTURING TEACHABLE MOMENTS How one university uses network video to train next-generation speech and language pathologistsBy John Bartolac

    When youre conducting a therapy session, its virtually im-possible to be fully engaged with the client and be an objec-tive observer of your own interactions at the same time. Yet both modes are essential to honing a students clinical skills. Thats why the professors in the Department of Communi-

    cation Sciences & Disorders at the University of Wisconsin River Falls campus began taping therapy sessions to provide students with immediate, constructive feedback on their performance.

    Sarah Smits, associate clinical professor in the Department of Communication Sciences & Disorders, gave an example of how the process works. There was a case where a speech and language pathology graduate student was given the assignment to evaluate a young child with delayed speech development. The network video

    camera in the therapy room allowed Smits to monitor the session from her office computer. As Smits watched the session unfold she noticed that the childs mother, who was also in the room, was becoming increasingly upset about the task the student clinician was giving the child to do. The student, being so focused on the child, was completely unaware of the mothers agitation.

    Immediately after the evaluation I brought the student into my office, cued up the recording of the session, and showed her what I had seen, Smits said. The mothers facial expression said it all. The student instantly understood that she should have spent time at the beginning of the session putting the mother at ease by explaining the testing process and involving her in the task. It was a teachable moment that we might never have had with our old analog system because the VHS tapes were so inconvenient to deal with.

    0515sec_014_019_Bartolac_v3.indd 14 4/15/15 2:07 PM

  • May 2015www.security-today.com

    NETWORKINGNETWORKINGNETWORKINGNETWORKINGNETWORKINGNETWORKING SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY

    HOW CYBER-SECURE ARE YOUR PHYSICAL SECURITY DEVICES?

    Protecting the network with your sensitive business data

    NS6

    A Special Section to Security Products

    0515nws_NS01_v1.indd 1 4/6/15 10:04 AM

  • EDITORIAL STAFFEditor-in-Chief/Associate Publisher Ralph C. JensenSenior Editor Lindsay PageE-news Editor Brent Dirks

    ART STAFFArt Director Dale Chinn

    PRODUCTION STAFFDirector, Print and Online Production David SeymourProduction Coordinator Teresa Antonio

    EDITORIAL ADVISORY BOARDSteve Collen, Cisco Physical Security, San Jose, Calif.Charlie Howell, Division 28 Consulting, San Antonio, TexasJeff Lemoine, General Mills, Minneapolis, Minn.Fredrik Nilsson, Axis Communications, Chelmsford, Mass.Dick OLeary, EMC, Hopkinton, Mass.

    SALESSam Baird +44 1883 715 697Randy Easton 904-261-5584Brian Rendine 972-687-6761

    SECURITY, SAFETY, AND HEALTH GROUPPresident & Group Publisher Kevin OGrady Group Circulation Director Margaret PerryGroup Marketing Director Susan MayGroup Website Manager Scott NewhouseGroup Webinar Administrator Tammy RenneGroup Social Media Editor Ginger Hill

    Chief Executive Officer Rajeev Kapur

    Senior Vice President & Chief Financial Officer Richard Vitale

    Chief Operating Officer Henry Allain

    Executive Vice President Michael J. Valenti

    Vice President, Information Technology & Application Development Erik A. Lindgren

    Chairman of the Board Jeffrey S. Klein

    REACHING THE STAFF Staff may be reached via email, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.E-mail: To e-mail any member of the staff, please use the following form: [email protected]

    Dallas Office (weekdays, 8:30 a.m. 5:30 p.m. CT) Telephone (972) 687-6700; Fax (972) 687-6799 14901 Quorum Dr., Suite 425, Dallas, TX 75254

    Corporate Office (weekdays, 8:30 a.m. 5:30 p.m. PT) Telephone (818) 814-5200; Fax (818) 734-1522 9201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311 Copyright 2015, all rights reserved. Networking Security is a supplement to Security Products, an 1105 Media Inc. publication, and is published

    four times a year: February, May, August, and November.The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed

    or implied. Implementation or use of any information contained herein is the readers sole responsibility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

    Networking Security welcomes vendor information and briefings. To arrange a briefing, please contact our editor-in-chief, Ralph C. Jensen, via email at [email protected]. Our agreement to accept or review product material or backgrounders is not a guarantee of publication.

    www.security-today.com May 2015 | Volume 9, No. 2

    NS2 0 5 1 5 | N E T W O R K I N G S E C U R I T Y

    NETWORKING SECURITYNETWORKING SECURITYNETWORKING SECURITYWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security Converge

    Features

    NS14Exitby Michael GallantCOLLABORATION IS KEY IN THE VIDEO VORTEX

    NS4Enterby Ralph C. JensenHOW SECURE ARE YOUR DEVICES?

    NS6 Healthcare Campus SecurityHOW CYBER-SECURE ARE YOUR PHYSICAL SECURITY DEVICES?Protecting the network with your sensitive business data

    By Vince Ricco

    NS10 Vulnerability ManagementBUILDING A FOUNDATIONTaking a look at a holistic information security perspective

    By Madeline Domma

    NS12 Network SecurityAN ELEPHANT IN THE LIVING ROOMDont forget to lock the obvious front door to your network

    By Julie Olenski

    Departments

    0515nws_NS02_TOC_v1.indd 2 4/6/15 10:06 AM

  • Go to http://sp.hotims.com and enter 203 for product information.

    Untitled-10 1 4/1/15 3:53 PM

  • ENTERBy Ralph C. Jensen

    NS4 0 5 1 5 | N E T W O R K I N G S E C U R I T Y

    HOW SECURE ARE YOUR DEVICES?Whenever I receive a cover story from Vince Ricco I listen, and I learn. Ive known Vince for quite a while, and when he asks if your security devices are connected to your sensi-tive business data, it really makes you think.

    He writes that any network node left unpro-tected well, you can read about it in the cover

    story, but get it in your mind that if youre doing this, youre at risk. Threats abound in the networking world; first and foremost, you must harden your connections.

    There are so many new technologies available today, and most are on the same network structure. This is probably not a good idea, and besides, it puts undue burdens on the IT staff to pay attention to cyber security.

    Ricco makes a compelling argument of strategies for protect-ing network ports. He says its important to protect yourself, pay particular attention to the user/administrator credential manage-ment, physical port security, and video and data flow protection.

    Our other editorial contributors, such as Julie Olenski, write about locking the obvious front door to your network and what digital defenses might work best for you. Madeline Domma writes about building a foundation as part of a vulnerability manage-ment plan. Im sure you know and understand that problems can emerge without a proper plan.

    While it seems that physical security depends upon the IT in-frastructure, the reverse also is true. It makes a lot of sense for everyone to pull together in their commitment of the security infrastructure.

    Untitled-2 1 4/1/15 12:52 PM

    Go to sp.hotims.com and enter 202 for product information.

    0515nws_NS04_Enter_v2.indd 4 4/6/15 10:07 AM

  • Surveillance - Audio - Accessories

    $POUBDUVTBUTBMFT!TQFDPUFDIDPNt5PMM'SFFtTQFDPUFDIDPN

    SEE COLOR IN LOW LIGHT IN FULL HD 1080p WITHOUT IRs

    Intensifier IP Provides crisp, detailed images in full HD resolution. 8JUI*OUFOTJFS*1UFDIOPMPHZDVTUPNFSTEPOPUIBWFUPXPSSZBCPVUMPTJOHUIFWJTJCJMJUZPGJNBHFTJOWBSJPVTMJHIUJOHDPOEJUJPOT 777777777777777777UUUUUUUUUUUUUUUUUUXXXXXXXXXXXXXXXXXXHHHHHHHHHHHHHHHHHH::::::::::::::::::''''''''''''''''''555555555555555555$$$XXX$$XXW WHUUUUXXXXWWWRRRRQQQQQGGGGG$$$$$XXXXXWWWWWRRRRR5555HHHHJJJJJJLLLLLVVVVVWWWWWHHHHHUUUUU&&&&&&&&&&&&&&&DDDDDDDDDDDDDDDPPPPPPPPPPPPPPHHHHHHHHHHHHHUUUUUUUUUUUDDDDDDDDDDDVVVVVVVVVV&&&DDDPPPPHHHHHUUUUUUDDDDDDVVVVVVVV R Supports Full HD resolution @ 30fps Built-in standard PoE (IEEE 802.3af)

    No problems caused by objects that reflect or absorb IR light sources

    Presets for different scenarios: Indoor, Outdoor, Elevator, Lobby, Hallway & Low Light

    Wide dynamic range (WDR) operation

    Supports H.264 and MJPEG codecs

    2-way audio communication

    Sensor input and relay output

    IP66 compliant (outdoor models)

    O2iBD1O2iB3M O2iMD1O2iD4M O2iMT61

    Works seamlessly with our Free SecureGuard Plus Video Management Software & our NS NVRs.

    9LVLWXVDW(6;ERRWKGo to http://sp.hotims.com and enter 205 for product information.

    Untitled-3 1 4/2/15 1:19 PM

  • H E A LT H C A R E C A M P U S S E C U R I T Y

    NS6 0 5 1 5 | N E T W O R K I N G S E C U R I T Y

    HOW CYBER-SECURE ARE YOUR PHYSICAL SECURITY DEVICES?Protecting the network with your sensitive business dataBy Vince Ricco

    Are your physical security devices attached to the same network as your sensitive business data? Then, you had better take as much care to cyber secure those devices as you do your wireless access points, printer connec-tions, scanners and other traditional network-

    attached technology. Any network node left unprotected could become a potential threat to overall network security.

    What you need to do to harden your network connections de-pends on your risk assessment. First identify what assets need protection. Then investigate what threats or vulnerabilities pose a risk to those assets. Once you have that information in hand you can decide whether those risks are worth mitigating. For or-ganizations handling credit card payments and/or patient data, the physical security of stored datawhether in the cloud or an in-house data centeris mandated by law and the financial pen-alties for non-compliance are significant. For some business own-ers, the consequences of unauthorized system breaches might be minimal which would influence how much they spend on protec-tion technology.

    Sometimes, the solution is as simple as network segmentation either through physical wiring or a VLAN. Separating network resources that shouldnt interact or have no need to interact with each other increases overall network protection levels and assists in optimizing resource management.

    Breaches Arent Always the Result of a Frontal AttackThe convergence of so many new technologies on the same net-work infrastructure has placed an enormous burden on IT de-partments to pay particular attention to the cyber security of a plethora of non-traditional network-attached devices. Due dili-gence must be paid to the security configuration of these devices to eliminate exploitationwhether the devices are heating, ven-tilation and air conditioning (HVAC) controls and monitors; in-telligent building automation devices such as smart thermostats, Smart Grid power monitoring and control devices; or networked

    surveillance cameras and IP-based access control systems.One recent, highly publicized and massive retail customer data

    breach stemmed from the hijacked login credentials of a third-party HVAC service provider. Typically the HVAC services com-pany would remotely log into the retail stores HVAC monitoring systems for maintenance. Cyber hackers followed the same pro-tocol, logging into the system using the stolen services companys login credentials to gain access to the network. From there they were able to tap into the retailers point of sale systems which

    0515nws_NS06_08_Ricco_v2.indd 6 4/6/15 10:13 AM

  • Go to http://sp.hotims.com and enter 204 for product information.

    Untitled-3 1 4/2/15 11:24 AM

  • NS8 0 5 1 5 | N E T W O R K I N G S E C U R I T Y

    resided on the same physical network in-frastructure. As a result confidential cus-tomer data was compromised.

    The moral of the story? Keep a close eye on all network connected systems. They could be your Achilles Heel when it comes to securing sensitive corporate and client data. Once you understand what impact a successful breach might have on your businessfinancial penalties, loss of company reputation and market share, or perhaps negligible repercussionsyou can plan your security spending accordingly.

    Strategies for Protecting Network Ports With more companies migrating to IP-based video surveillance and access con-trol systems, both IT and physical security departments need to educate themselves on best practices for protecting these po-tentially vulnerable network nodes. To help you decide which security mecha-nisms, policies and procedures to deploy lets look at how a typical IP-based video system is configured.

    Video cameras and access control de-vices attach over the network to a video and/or access control server. Or, the sys-tem can contain multiple servers for load sharing and redundancy. The video can be stored to a local hard drive, a network-attached storage device (NAS), or a server storage array located at a remote data center or in the cloud. The network can also contain video viewing clients that can access video directly from the cameras or through a VMS.

    To cyber-harden these physical security component, you need to focus on three areas: user/administrator credential man-agement, physical port security, and video and data flow protection.

    User/Administrator credential manage-ment: Credential management can be as simple as making sure that default logins and passwords are changed from factory defaults. IT professionals already do this as a default installation and maintenance best practice for networking hardware and attached devices. You can add another lay-er of protection by creating separate user and administrative logins, passwords and privileges.

    IT can install other credential security

    measures such as multi-factor authentica-tion if the camera/access control manu-facturer supports this feature. Many of the major VMS application platforms can help you automate the setup and maintain those attached device credentials.

    Physical port security: There are a num-ber of measures you can employ to pre-vent a devices removal from the network and the attachment of a laptop or other device configured to spoof the MAC or IP address of the camera or access control pad in order to gain access to the network and network assets. Depending on the ca-pabilities of your network hardware man-agement software, this can be as simple as a port-based MAC address lockdown that requires manual provisioning when a port link is lost and then recovered. This does not address cable tapping, however. In that case more rigorous measures are needed such as onboard credential au-thentication.

    When it comes to defending against network port hijacking, there are a num-ber of network standard authentication measures you can deploy. It all depends on which ones are supported by the cameras and access control devices youve installed. For instance, many cameras support basic .X or RADIUS client for edge device au-thentication. Some camera manufactures support PKI or token-based resident cer-tificate authentication.

    The bottom line is that you should in-clude port-based/edge-connection cyber security on all your network edge devices no matter what they are. And the cyber se-curity of those devices should align with the high security standards your company already has in place to protect other de-vices and data residing on the network.

    Video and data flow protection: Pro-tecting the transmission of video or data focuses on preventing the wrong people from putting eyes on or having access to your organizations video. You can just imagine how tactical it can be for bad guys to have visibility inside the walls of your business or what a PR or legal nightmare youd have on your hands if certain sensitive video footage showed up on YouTube.

    The goal is to protect the data flowing from end to end: from the camera or ac-

    cess control device through the network to the server and ultimately the storage device. To achieve that, your first step would be to define the protection scheme you want to deploy and then search out components that can readily integrate into that scheme. For instance, some video sys-tem manufacturers support a variety of encryption schemes from edge devices to servers. Other system components support encryption from the servers to the viewing client PCs, laptops and smartphones.

    Network camera and access control system encryption generally adhere to IT methodologies standards such as .x, SSL/TLS, HTTPS, and PKI certificates. There are also appliance-based heavier encryp-tion methods available. But because video transmissions are extremely sensitive to transmission latency, anything short of zero latency encryption will likely disrupt recoding capabilities.

    Before you make any decisions about encryption, research what your camera and VMS suppliers recommend. Then, to ensure compatibility across the board, surveillance and physical security decision makers should closely align themselves with IT to confirm that the hardware and software products they plan on deploying will meet IT standards for cyber security.

    Know What Security Options are Out ThereTo keep abreast of what encryption and other physical security technologies are on the horizon and what are currently avail-able on the market, you can surf online content from camera and server manufac-turers, participate in physical security sem-inars and trade shows held in the US and around the world, as well as attend tradi-tional IT tradeshows and events where a sizable number of physical security com-panies participate as well.

    The point is to educate yourself and get involved in cyber-security issues early in the vendor selection process whether you own the solution or are supporting the solution on your companys network infrastructure.

    Vince Ricco is the business development manager for Axis Communications Tech-nology Partner Program in North America.

    0515nws_NS06_08_Ricco_v2.indd 8 4/6/15 10:13 AM

  • quantumsecure.com [email protected]

    seamless identity management and physical access in one solution

    SAFE is an innovative software solution that integrates diverse security systems with identity management onto a unified policy-based platform. SAFE ensures that every employee, contractor, vendor and visitor has clearly defined and controlled access privileges. And SAFE is fully automated with comprehensive management and reporting features. Its the most efficient way to manage the lifecycle of identities and their access across your enterprise in order to maintain compliance 24/7. Make your world SAFE with Quantum Secure.

    AUTOMATEDPHYSICALIDENTITY

    MANAGEMENT

    CENTRALID

    REPOSITORY

    AUTOMATEDWORK FLOW

    REAL-TIMECOMPLIANCE

    INTEGRATESWITH

    EXISTINGINFRASTRUCTURE

    INTEGRATESWITH HR,ACCESS

    CONTROL & IT SYSTEMS AUTHENTICATE

    IDENTITIES

    Go to http://sp.hotims.com and enter 206 for product information.

    Untitled-3 1 4/2/15 2:47 PM

  • V U L N E R A B I L I T Y M A N A G E M E N T

    NS10 0 5 1 5 | N E T W O R K I N G S E C U R I T Y

    BUILDING A FOUNDATIONTaking a look at a holistic information security perspectiveBy Madeline Domma

    Now more than ever, major network vulner-abilities are making national and interna-tional news headlines. Heartbleed, Shellshock

    and POODLE are considered by many to be among the worst bugs present on the Internet and, in recent months, have all formed their own unique paths of de-struction across networks everywhere. These vulnerabilities, as well as count-less others, are extremely harmful when used to attack companies and can be detrimental to a companys future suc-cess if not addressed properly.

    Although understanding the global im-pact of these vulnerabilities can be both interesting and useful, the primary concern for network security professionals must be the impact of these vulnerabilities on the specific IT environments that they oversee. At some point, all companiesregardless of size or industrymust develop infor-mation security programs to protect both themselves and their customers from these vulnerabilities and other IT-related threats. From creating policies and vendor con-tracts to performing risk assessments and audits, organizations are recurrently faced with the challenge of securing their data from internal and external exploitation.

    Additionally, most company security practices may need to comply with the standards of different governing bod-ies, authorities, or regulations, depending upon the industry. This requirement for the synchronization of a companys se-curity efforts has made way for the emer-gence of the information security model known as IT GRC (Governance, Risk and Compliance).

    One of the best strategies by which companies can develop a secure and com-

    prehensive IT GRC program begins with a thorough and vigilant vulnerability man-agement process. Network vulnerability scans and the results that they yield offer a plethora of information about network de-vices and can be employed in many different ways. Leveraging vulnerability data when creating IT GRC practices is crucial to de-veloping a comprehensive, consistent, and sustainable information security program.

    Problems Emerge Without Proper Vulnerability ManagementAttempting to mature an information secu-rity program without integrating vulnera-bility data can cause several different prob-lems over time. Without an understanding of the vulnerabilities of a networks de-vices, network oversight becomes limited. If network oversight does not include

    vulnerability management, those making security-related decisions cannot cultivate best practices to combat the specific vulner-abilities that pose the greatest threats to the organizations unique environment.

    Without incorporating well-managed vulnerability data to improve upon a com-panys security program, inconsistencies in security posturing will inevitably oc-cur. For instance, an IT audit of company systems may verify that the configuration settings of workstations or servers do not reflect those defined in the security policy. While this inconsistency may result in a citation or fine in the context of an audit, it may be discovered and mitigated before-hand if the company is utilizing a vulner-ability management tool or software.

    Contrastingly, vulnerability manage-ment can validate claims made in com-pany policies, during risk assessments and

    ww

    webm

    eister/Shutterstock.com

    0515nws_NS10_11_Domma_v3.indd 10 4/6/15 10:14 AM

  • W W W . S E C U R I T Y - T O D A Y . C O M NS11

    audits, or when verifying compliance with a given authority. If the vulnerability data is consistent with the claims made in other areas of the companys IT GRC program, vulnerability data serves as context to the other areas of the information security program. Problems that result from the absence of vulnerability management in an organizations IT GRC program prove that vulnerability management is not only beneficial but also critical to a holistic and viable information security program.

    Vulnerability Management is the Cornerstone for a Consistent IT GRC PracticeProper vulnerability management gener-ates a database of information about the hardware and software of devices that comprise a network. The types of infor-mation gathered from a vulnerability scan vary greatly from hardware manufacturer information to software versioning data and even serious exploitable settings of devices on a network.

    Vulnerability management efforts not only verify areas of the network that are secure but, more importantly, highlight potential threats to network security before the threats escalate to major company-wide incidents or issues. Making use of vulner-ability data when executing security-related tasks, such as completing a risk assessment or compliance assessment, creating vendor or third party contracts, or performing an audit or training course allows for consis-tent, company-wide security posturing. Once network devices are scanned, vulnera-bility data as well as software and hardware versioning are populated into a centralized location. This data can then be applied in several different aspects of both network and operations management: Patch management: Vulnerability man-

    agement will identify the weak aspects of network devices and provides infor-mation on which devices need to be patched. Patch management practices can then be established based on the frequency with which different types of systems require patches as reported by vulnerability data.

    Asset management: Vulnerability data will provide details as to which types and versions of hardware and software are active on the network. Vulnerabili-ty data managers are then able to iden-

    tify the devices that are outdated and can eliminate potential problems with these devices before they cause serious issues if otherwise unnoticed or un-addressed. For example, vulnerability data can deliver password configura-tion information, minimum password requirements, and versioning informa-tion of device operating systems, ap-plications, and programs before weak-nesses to the devices are exploited and cause harm to a network.

    Vendor management: Vulnerability scans may be run on network equipment that is either owned or maintained by a third party. Vulnerability management pro-vides insight to network administrators as to whether or not a vendor is main-taining their systems on your network and will alert administrators if vendor systems are forming weaknesses in the companys network.

    Policy management: Vulnerability scan data and management offers context to claims made within company policies and can prove that requirements de-fined in a companys policies are being implemented properly. For instance, if an organizations configuration man-agement policy states that certain con-figuration standards must be adhered to on all company equipment but vul-nerability scan results indicate that the devices do not meet the described stan-dards, these inconsistencies can be ad-dressed (either by adjusting the policy to accurately outline the configurations of company systems or by updating the devices to meet the standards pre-scribed in the policy). This consistency creates a well-defined configuration management policy that can be more easily adhered to and maintained.

    Risk assessment: Vulnerability manage-ment proves most valuable when con-ducting IT risk assessments because the data provided may then be utilized to identify, prioritize, and implement security controls to minimize the over-all risk of an organization.

    Verifying compliance: Data provided through fastidious vulnerability man-agement may also provide useful in-formation when an organization must adhere to different compliance regula-tions for their industry. For example, outdated JBoss versions on network

    systems will cause a company to be out of compliance with todays PCI standards. Most regulating bodies clearly define the versions of software that networked systems must maintain and, if outdated versions are found on company systems, the company can-not be considered in compliance with the authority. While companies who do not fully integrate vulnerability management information into other aspects of their information security program will be either fined or repri-manded by regulators, network ad-ministrators and security profession-als who manage vulnerability data on a regular basis will recognize the need to update their systems and will initi-ate a process to accomplish the task and remain in compliance when re-viewed by regulators.

    Audit: Finally, vulnerability manage-ment data can be utilized during an audit to verify security controls, poli-cies, and practices of an organization. Maintaining a structured and well-defined IT GRC program based on vulnerability management will result in shorter audits that require fewer com-pany resources to perform and yield positive findings and results.

    Sustainable Information Security Programs for Continued Company SuccessVulnerability management is a core prac-tice of a well-maintained IT GRC space. Identification, prioritization, and mitiga-tion of vulnerabilities dictate how infor-mation security processes flow throughout a company and create viable processes for secure and efficient IT environments.

    The results of a vulnerability scan re-veal potential flaws in the network as well as a plethora of other information about the different devices connected to an or-ganizations network. This information should be applied to other key areas of an information security program to stan-dardize the data that is used throughout the company and establish a holistic, well-managed, and sustainable IT GRC and security program.

    Madeline Domma is the product design specialist at TraceSecurity.

    0515nws_NS10_11_Domma_v3.indd 11 4/6/15 10:55 AM

  • N E T W O R K S E C U R I T Y

    NS12 0 5 1 5 | N E T W O R K I N G S E C U R I T Y

    AN ELEPHANT IN THE LIVING ROOMDont forget to lock the obvious front door to your networkBy Julie Olenski

    Security managers are more aware than ever that information security requires a layered approach with components ad-dressing every point of intrusion on the cor-porate network. Yet with an estimated 196 billion emails to be sent daily worldwide in

    2015 and email continuing to dominate internal network traffic at most organizations, a network security plan that fails to address the risks posed by email is like leaving the front door unlocked.

    Data loss or breach is arguably the largest risk of email com-munication. The concern is just as great among unregulated in-dustries as it is in sectors where privacy is of heightened concern such as in financial services and healthcare. Here are a few facts that illustrate the urgency: 53percentofemployeeshavereceivedunencrypted,riskycor-

    porate data via emails or email attachments. 21percentofemployeesreportsendingsensitiveinformation

    without encryption.The costs of data loss are staggering, not to mention the

    damage it does to a companys reputation (who can forget the contents of those Sony emails?) and any legal repercussions for violating regulations regarding the transmission and storage of sensitiveinformationsuchas,HIPAA,FIPPAorPCI. 22percentofcompaniesexperiencedata loss throughemail

    each year. Theaveragecorporatedatabreachcosts$3.5million.

    Agrowingthreattocorporateemailusersisphishing.Send-ingemailsfromaforgedsenderaddress,calledspoofing,isonewayofcarryingoutaphishingattack,withthegoaloftrickingthe unsuspecting recipient into downloading malware or entering confidential information into a fake web site where it is accessible to the hacker. Though its often viewed as a consumer problemit seems every week theres a new attack targeting customers of retail sites or online serviceshackers have started to set their sights on corporate users by impersonating the company and tar-geting employees. Anestimated1outof392emailsispartofaphishingattack. 300percentgrowthinphishingemailsinthepastyear. 33percentofFortune500executivesfallforphishingbait.

    Digitally Signed and Encrypted Email: Network DefensesNotsurprisingly35percentoforganizationsnowuseencryptedemail,upfrom29percentaccordingtoaPonemonInstitutere-port.As of thisFebruary,Google reported that 78 percent ofoutboundGmailmessagesareencrypted.

    The most common approaches to email encryption are based onpublickeycryptography.GoogleusesTLS,thesametechnol-ogy that secures your connection to websites (as indicated by the httpsandpadlockintheaddressbar).Fordesktopemailclients(e.g.,MicrosoftOutlook,AppleMail,Thunderbird),whichareoftenmorecommonincorporateenvironments,S/MIMEisthemost popular option.

    S/MIME,orSecure/MultipurposeInternetMailExtensions,is the industry standard for public key encryption forMIME-based(message-based)data.S/MIMEofferstwokeyemailsecu-rity functions: DigitalSignature Encryption

    Todigitallysignandencryptemails,youwillneedanS/MIMEdigitalcertificate.Adigitalcertificateisavirtualpassport;awayof proving your identity in online transactions. Just as a local governmentneedstoverifyanidentitybeforeissuingapassport,athirdpartyverificationentityknownasaCertificateAuthority(CA)needstovetanindividualbeforeissuingadigitalcertificate.Sincethecertificateisuniquetotheindividual,usingittosignanemailisawaytoprove,yes,itsreallymesendingthisemail.

    Digitally Signed Emails Mitigate PhishingDigitally signing your emails is a way to assure recipients that the email is legitimate and actually came from you. You can see how this mitigates the corporate phishing risks discussed above. If yourcompanystandardizesondigitallysigningallemailcom-munication,anyspoofedemails fromphisherswill immediatelyraise a red flag since they arent signed.

    Encrypted Emails Prevent Sensitive Data from Falling into the Wrong HandsEncryptinganemailensuresonlytheintendedrecipientcanac-cess the contents. This is because the encryption process requires information from your recipients digital certificate. Unless some-one has access to the certificate (and only the individual should haveaccess),hewontbeabletoreadthecontentsoftheemail.

    0515nws_NS12_13_Olenski_v3.indd 12 4/6/15 10:56 AM

  • W W W . S E C U R I T Y - T O D A Y . C O M NS13

    One erroneous perception is that digital signatures and en-cryptionaddtime.Infact,digitallysigninganemailisassimpleasclickingabutton,withmanyemailclientsenablingtheusertoset digital signatures as a default on all outgoing messages.

    A Red-Ribbon Badge of AuthenticityDigitally signed and encrypted emails literally wear an emblem oftheiraddedsecurity.InMicrosoftOutlook,aredribbonin-dicates that the email was digitally signed and the identity of the signerislistedunderthesubjectline.Encryptedemailsdisplaya padlock.

    Clicking on the red ribbon or padlock verifies the identityof the sender and offers more details about the signature. These clear trust indicators mean the recipient of the email can instantly see that the emailwasdigitally signedor encrypted,bywhom,andknowthattheemailactuallycamefromthecorrectperson,hasnotbeenforged,andthatthecontentsoftheemailhavenotbeen changed since it was sent.

    Is It Best for Me?Determining if an email security solution is the best fit for a given

    organizationrequiresathoughtfulreviewofmanyfactors: Doyouneedtosendsensitiveinformationviaemail? Whattypesofregulationsdoyouneedtomeet?(Forinstance,

    HIPAA,FIPPA,PCIregulationsregardingthetransmissionof sensitive information)

    Hasyourorganizationbeenvictimtoemailspoofingorotherphishing threats?

    Howdoesthesolutionauthenticatetheemailsender? Doesthesolutionensurethecontentsofemailsarenotaltered

    after theyre sent? Whatistheimplementationprocesslike?Willtherebeabur-

    denonIT? Willthissolutionbeeasyforyouandotherenduserstoadopt? Whatemailclientsdoyouneedtosupport?

    Withhacks,breachesand information theft rampantoncor-poratenetworkstoday,anyapproachthatpromisestolessenthelikelihood of information losswith minimal if any impact on end user ease and workday efficiencyis an important step toward controlling those digital assets within the corporate perimeter.

    Julie Olenski is enterprise product manager at GlobalSign.

    0515nws_NS12_13_Olenski_v3.indd 13 4/6/15 10:15 AM

  • EXIT

    NS14 0 5 1 5 | N E T W O R K I N G S E C U R I T Y

    COLLABORATION IS KEY IN THE VIDEO VORTEXBy Michael Gallant

    Increased security concerns, availability of IP networks, camera sprawl and im-provement in video content analytics are all contributing to a rapid growth in the amount of video surveillance data that federal agencies are gathering today. By 2018, the video surveillance equipment market is forecast to reach $25.6 billion,

    and by 2020, video surveillance data is expected to reach approximately 3.3 trillion hours globally.

    From facial recognition to instant event search and inter-agency real-time surveillance, the benefits of video surveillance data are numerous. The surveillance data enables significant op-portunities for Big Data analysis critical to our nations security, such as monitoring suspicious behavior, object recognition, in-cident detection, face matching, safety alerts and anomaly de-tection. Its no secret that federal video surveillance data is an important component to improved security across the federal governmentbut only if that data is safely captured, stored, and effectively analyzed.

    So, Where Do We Stand?MeriTalks new report, The Video Vortex, found that although 99 percent of feds believe that video surveillance technology will play a significant role in their ability to prevent crime, theft, and terrorism over the next five years, 54 percent of federal video sur-veillance data goes unanalyzed. This study sponsored by EMC Corp., a global IT and security leader, is based on a survey of 151 federal decision makersevenly split between physical security and IT managers.

    As the amount of video surveillance data grows rapidly, so does the potential for improved securityas long as the data is fully examined. But, since over half of video surveillance data goes unanalyzed, we must figure out how to harness its full po-tential in order to succeed.

    According to the study, one answer lies in collaboration be-tween physical security and IT. Seventy-nine percent of feds be-lieve their agency needs to improve collaboration between the departments in order to be successful. A more collaborative ap-proach will make agencies more prepared for the video surveil-lance data deluge, and more likely to analyze video surveillance data to derive actionable insights. The study found that agencies who implement collaboration between the two are significantly ahead of agencies that do not.

    Agencies that have departmental collaboration are: Morepreparedfortheinfluxofvideosurveillancedata

    81 percent versus 24 percent; morelikelytoanalyzeatleast50percentofthedata

    63 percent versus 47 percent; andmorethantwiceaslikelytooperateedge-to-core

    platform architecture for surveillance92 percent versus 44 percent

    How Do We Get There?In order to work together successfully, there must be a consensus between physical security and IT managers to determine who has primary responsibility for managing their agencys video surveil-lance infrastructure. The study revealed there is confusion over to whom that responsibility belongs76 percent of physical secu-rity managers vs. 33 percent of IT managers believe the responsi-bility is shared between the two departments.

    Looking at infrastructure, the need for improvement is evi-dent. While agencies recognize the potential that video surveil-lance holds, approximately nine in ten believe their infrastruc-turesarecurrentlyunpreparedforthevideodatainflux.Overthenext five years, 91 percent believe storage needs to increase, 89

    0515nws_NS14_15_Exit_v2.indd 14 4/6/15 10:48 AM

  • W W W . S E C U R I T Y - T O D A Y . C O M NS15

    percent believe computing power needs to increase, and 84 per-cent believe personnel needs to increase, in order to adapt and handle the oncoming growth.

    As a step in the right direction, three-quarters of respondents say their agencys IT department is currently working on integrat-ing video surveillance data into a central repository for analysis.

    The Where and HowTo accurately understand how to handle video surveillance data and maximize insights, we must understand how this technology is used today. In what ways do Feds collect video surveillance data? How are surveillance cameras distributed? Where are they located, and are they fixed or mobile? Todays video surveillance solutions are characterized by a combination of distributed tech-nologies also known as centralized technologies or the core.

    According to the study, 74 percent of survey respondents op-erate an enterprise approach, including an edge-to-core architec-ture for video surveillance.

    Feds collect video surveillance data through a variety of sen-sors. The study found that 88 percent collect the data through stationarycameras,and80percentusescanningcamerasbothmonitoring a fixed location. Although cameras at fixed locations have become one standard approach to collecting data, mobile camera usage is becoming more popular, especially across the De-fense Department. The study found that in Defense agencies, 77 percent use cameras on vehicles (vs. 53 percent of Civilian), 75 percent use cameras on people (vs. 44 percent of Civilian), and 78 percent use cameras on drones (vs. 17 percent of Civilian).

    Additionally, to optimize video surveillance effective-ness, the feds are looking into advanced solutions to add to their video strategy92 percent are looking into Machine-to-Machine (M2M) technology, and 93 percent are looking into intelligent data storage. Each brings their own benefits to the tableM2M enables both wireless and wired devices to automatically communicate via a network, and intelligent datastorageflexestooptimizestoragecapacity,backuptimes,costs, and performance.

    The TakeawayNow that everything has been laid out on the table, the following question must be addressed:

    Are the feds ready for the massive increase in video surveil-lance data?

    Onethingisclearthereiscertainlyroomforadvancement.With nearly all feds identifying necessary increases in storage, computing power, and personnel, these are important areas for investment today.

    Another focus for agencies needs to be the collaboration piece of the puzzlephysical security and IT managers need to join forces in order to handle the oncoming growth in video surveil-lancedata.Oncefederalagenciestackletheircurrenthurdlesfrom edge to corethe potential of video surveillance data will hold limitless possibilities for better protecting our nation.

    Michael Gallant is the senior director for global surveillance & security practice at EMC Corp.

    Ad IndexAdvertiser ........................................... Circle # ...........Page .........URL

    Open Options, Inc. ........................................ 203 ...................... NS3 ..............www.ooinc.com

    McGard Security Products ............................ 202 ...................... NS4 ..............www.mcgard.com

    Speco Technologies ...................................... 205 ...................... NS5 ..............www.specotech.com

    Middle Atlantic Products ............................... 204 ...................... NS7 ..............www.middleatlantic.com

    Quantum Secure ........................................... 206 ...................... NS9 ..............www.quantumsecure.com

    DSX Access Systems .................................... 201 ...................... NS16 ............www.dsxinc.com

    0515nws_NS14_15_Exit_v2.indd 15 4/6/15 10:48 AM

  • 10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

    %DFNZDUGV&RPSDWLEOH$UFKLWHFWXUH$ODUP7H[W0HVVDJH(0DLO1RWLILFDWLRQ+RW6ZDS5HGXQGDQW&RPPXQLFDWLRQ6HUYHU+LJK/HYHO(OHYDWRU&RQWURO,QWHUIDFH,QWHJUDWHG:LUHOHVV/RFNVHWV

    4XDOLW\5HOLDELOLW\,QWHJULW\7KH6HFXULW\3URIHVVLRQDOV)LUVW&KRLFH

    www.dsxinc.com

    '6;$FFHVV6\VWHPV,QF1R3HU6HDW/LFHQVLQJ,Q6\VWHP3ULFLQJ/$1:$1&RPSDWLEOH6PDUW&DUGDQG%LRPHWULF,QWHJUDWLRQ8QOLPLWHG$FFHVV/HYHOV3HU&DUGKROGHU,QWHJUDWHG3KRWR,'%DGJLQJ%DFNXS64/6HUYHU

    CREATING THE FUTUREOF SECURITY . . . TODAY

    7KH 6HFXULW\ 3URIHVVLRQDOV ILUVW FKRLFH IRU WRGD\V VHFXULW\ LQIUDVWUXFWXUH IURPRQHURRP WRPXOWLORFDWLRQ FRPSOH[HVDURXQG WKHZRUOG 2XU UHSXWDWLRQ LV EDVHGRQDWLPHKRQRUHGWUDGLWLRQRIURFNVROLGTXDOLW\SUHPLXPUHOLDELOLW\DQGWKHLQWHJULW\RI'6;DQGRXUQHWZRUNRIIDFWRU\WUDLQHGDXWKRUL]HGGHDOHUVDQGVXSSRUW:KHQ\RXDUHVWDNLQJ\RXUUHSXWDWLRQRQDVROXWLRQFKRRVHWKHPRVWSRZHUIXO DQGLQWHOOLJHQWDFFHVVFRQWUROV\VWHPVLQWKHZRUOGFKRRVHWKHWRWDOVHFXULW\UHODWLRQVKLSZLWK'6;

    Go to http://sp.hotims.com and enter 201 for product information.

    Untitled-10 1 1/2/13 4:21 PM

  • W W W . S E C U R I T Y - T O D A Y. C O M 1 5

    MAKING A GOOD IDEA BETTERThe Community Speech, Language and Hearing Clinic run by the Department of Communication Sciences & Disorders provides an important training ground for undergraduate and graduate students in its speech pathology program. Graduate students work with real clients who come to the practical learning lab with a host of speech and language disordersfrom stuttering and aphasia to Aspergers syndrome.

    Supervising professors watch each student-led therapy session either from an observation room with one-way glass or remotely over the network from their office elsewhere in the building. In addition, video cameras in the therapy rooms stream the sessions over the network so that they can be viewed remotely in real time on more than one professors desktop and simultaneously archived for later review and evalua-tion of students clinical skills.

    When the department introduced analog VCR-based cameras into the clinical curriculum years ago, it was considered quite an advanced teaching tool. But because it was so cumbersome to operate, it wasnt being used to its fullest potential. As it aged, break-downs become more frequent. And because the sys-tem was too complex for instructors to troubleshoot themselves, the equipment would be out of commis-

    sion for days until a service call could be scheduled.Even when the system was operational, recording

    and reviewing stacks of VHS tapes, finding the exact sessions you wanted to use, queuing them up, and then taking them up to the classroom to show was pretty time consuming, said Smits. And even after all that effort you just crossed your fingers that the

    tapes worked on the classroom VCR. Consequently, many teaching opportunities were lost.

    So, when the system reached its end of life, the department looked for a replacement that was more user-friendly and would provide higher quality au-dio and video recordings of student-led therapy ses-sions. They felt that adopting a network video model

    Make us your homepage!Now with responsive design, our website adapts to whatever device youre using.

    security-today.com

    Make us your homepage!

    Breaking news

    Relevant industry news and trends

    The newest security products

    Online product database and directory

    Security Today Academy

    1.5988 in

    security-today.com

    Untitled-3 1 4/13/15 2:23 PM

    Go to sp.hotims.com and enter 34 for product information.

    0515sec_014_019_Bartolac_v3.indd 15 4/15/15 2:07 PM

  • 1 6 0 5 1 5 | S E C U R I T Y P R O D U C T S

    would make it much easier for students and faculty to review and analyze the sessions on demand. It would also allow faculty to remotely observe stu-dents live during client sessions.

    REVAMPING THE CLINIC THERAPY ROOMSThe department chose a turnkey solution from PDS, Inc. similar to the system installed in its sister campus in Eau Claire. CompView, an audio-visual systems integrator, installed the intuitive intelligent stream

    CAMPUS SECURITY

    Go to sp.hotims.com and enter 40 for product information.

    Regional Airport Gets a World-Class IP Surveillance SolutionBy Guy Apple

    During World War II, Grumman Aircraft Corp. was located across the street from Linden Airport. Grumman started the production of the manufacture of the Wildcat, Avenger and Hellcat aircrafts and as the fighters were produced, they were towed over to Linden for test flights and delivery. After the war, Linden Airport was turned over to the city of Linden, which still owns and operates the air-port under contract.

    The airport itself, just three miles from Newark Airport, covers an area of 188 acres, and has a landing area of 4,140ft by 100ft and conducts about 120 flight operations per day, 99 percent general aviation, 1 percent military, with about 100 aircraft based at this regional airport.

    Under a grant from the Department of Homeland Security, Linden Airport management was able to upgrade the regional airports overall security. That modernization would include: a Keyscan access control system with modern badging and biometrics, the installation of numerous IP surveillance cameras and associated modern video analytics.

    The selected security systems integrator, Technocality Inc, a full service provider of security solutions, worked with Linden Airport Administration staff to design a comprehensive and advanced solution. The touch points of the upgrade included: fence entry points, public areas, fuel storage farm, ha