sp_1406dgd

68
www.security-today.com Integrated New Product and Technology Solutions for Security Professionals June 2014 Vol. 18, No. 6 4K Ultra HD Superior identification The DINION IP ultra 8000 MP delivers a tremendous advantage in detail capture, even when moving objects and challenging light- ing pervade the scene. The camera features intelligent Dynamic Noise Reduction to minimize bit rates and lower bandwidth and storage requirements up to 50 percent—reducing system costs and network strain. Ideal for tracking people, the camera captures facial characteristics, numbers and large area surveillance. Bosch Security Systems Inc. Go to sp.hotims.com and enter number 350 for product information. QuickTrack with Audio Application gives loss prevention another avenue of help QuickTrack allows users to track an event by dragging and dropping video feeds into the QuickTrack camera location on their monitor and captures the video and audio recording for playback as a single video feed. Quick- Track allows loss prevention and other security professionals to record live investigations across multiple cameras which can later be reviewed and exported as a single video clip. The system is innovative and user friendly, and takes the guess work out of creating forensic video clips for use in investigations. This feature is scalable across the enterprise and provides technical advances not available from other VMS vendors. Salient Systems. Go to sp.hotims.com and enter number 351 for product information. New Waterflow Detector With easy to see, feel and set timer dial System Sensor’s fully redesigned waterflow detector line includes high-contrast numbering and tactile markers on the timer dial, so installing professionals can ac- curately set the timer by sight or touch, which is a must when detectors are installed in hard-to-reach or dark, recessed spaces. The new easy to see, feel and set timer dial is just one of many new features that will convince you to Keep It System Sen- sor with waterflow detection. System Sensor. Go to sp.hotims.com and enter number 352 for product information. JVC Megapixel PTZ Camera Sets new benchmark in color reproduction JVC’s VN-H657U PTZ HD Megapixel Camera has an 18X optical zoom lens and 10X electronic zoom—total 180X zoom capability—plus a 2-megapixel sen- sor for real-time and forensic viewing. With JVC’s exclusive Super LoLux HD processing for superior low light images and color Day/Night operation; H.264/ JPEG dual streaming; direct drive for positioning accuracy and reliability; 3D noise reduction; online set-up; multicasting for 20 simultaneous users; PoE+ compatibility and more. The camera also meets ONVIF Profile S specifications. JVC. Go to sp.hotims.com and enter number 353 for product information. 960H Technology Record what you’ve been missing 960H, the highest resolution in analog technology avail- able today, allows cameras and DVRs to capture up to 700TVL—nearly 30 percent over D1 resolu- tion resulting in significantly enhanced picture detail. Speco’s DS DVR enhances recording quality of existing installations and is backward compatible with D1 cameras and DVRs. the product is available in 8 and 16 channels, standard desktop or wall mount models for covert or small footprint applications. A full line of 960H cameras, including Speco’s exclusive, award winning Intensifier3 technology are also available. Speco Technologies. Go to sp.hotims.com and enter number 354 for product information. Multimode to Singlemode Fiber Converters New 50P Series accommodates integration of new/existing fiber infrastructure afi’s 50P Multimode to Singlemode Fiber Converters provide bi-direc- tional communications are designed to increase network compatibility between Multimode and Singlemode devices at each end of long-distance singlemode fiber links. The units feature optical link LED diagnostics indicators for instant visual status confirmation, and are available in a variety of configurations with one or two ports and SC or ST connectors. afi. Go to sp.hotims.com and enter number 355 for product information. New EnterprisePlus LCD UPS 3-year warranty with non-prorated battery coverage Minuteman UPS has introduced the all-new EnterprisePlus LCD battery backup systems that provide an unbeatable combination of features and value, making them the ideal solution for security rack installations of all sizes. An LCD status display, automatic voltage regulation hardware, 5 VA ratings, and the option to choose stan- dard or extended runtime capability mean that security managers have more options than ever for protecting vital cameras, DVR/NVRs, access control systems, fire alarms and more. The system is backed by a 3-year warranty that includes non-prorated battery coverage. Minuteman UPS. Go to sp.hotims.com and enter number 356 for product information. Learn more about Wide Dynamic Range www.axis.com/imageusability © 2014 Allegion I sometimes forget my keys, ID card or wallet, but I never forget my phone. Are you ready? Finally, you can use a smart phone just like an ID card… made possible by aptiQmobile and Near Field Communication (NFC). The next generation in access control technology. Can it open doors? Yes! Can I use it to buy a late night snack? Sure! Can you say goodbye to lost cards? You bet! No really. It’s that awesome. Call 877-926-5285 today to learn more. Learn more at: allegion.com/us

Upload: astralis007

Post on 17-Dec-2015

52 views

Category:

Documents


24 download

DESCRIPTION

SECURITY PRODUCTS 06/2014

TRANSCRIPT

  • www.security-today.com

    Integrated New Product and Technology Solutions for Security Professionals June 2014 Vol. 18, No. 6

    4K Ultra HD Superior identifi cationThe DINION IP ultra 8000 MP delivers a tremendous advantage in detail capture, even when moving objects and challenging light-

    ing pervade the scene. The camera features intelligent Dynamic Noise Reduction to minimize bit rates and lower bandwidth and storage requirements up to 50 percentreducing system costs and network strain. Ideal for tracking people, the camera captures facial characteristics, numbers and large area surveillance. Bosch Security Systems Inc.Go to sp.hotims.com and enter number 350 for product information.

    QuickTrack with AudioApplication gives loss prevention another avenue of helpQuickTrack allows users to track an event by dragging and dropping video feeds into the QuickTrack camera location on their monitor and captures the video and audio recording for playback as a single video feed. Quick-Track allows loss prevention and other security professionals to record live investigations across multiple cameras which can later be reviewed and exported as a single video clip. The system is innovative and user friendly, and takes the guess work out of creating forensic video clips for use in investigations. This feature is scalable across the enterprise and provides technical advances not available from other VMS vendors. Salient Systems.Go to sp.hotims.com and enter number 351 for product information.

    New Waterfl ow DetectorWith easy to see, feel and set timer dialSystem Sensors fully redesigned waterfl ow detector line includes high-contrast numbering and tactile markers on the timer dial, so installing professionals can ac-curately set the timer by sight or touch, which is a must when detectors are installed in hard-to-reach or dark, recessed spaces. The new easy to see, feel and set timer dial is just one of many new features that will convince you to Keep It System Sen-sor with waterfl ow detection. System Sensor.

    Go to sp.hotims.com and enter number 352 for product information.

    JVC Megapixel PTZ Camera Sets new benchmark in color reproductionJVCs VN-H657U PTZ HD Megapixel Camera has an 18X optical zoom lens and 10X electronic zoomtotal 180X zoom capabilityplus a 2-megapixel sen-sor for real-time and forensic viewing. With JVCs exclusive Super LoLux HD processing for superior low light images and color Day/Night operation; H.264/JPEG dual streaming; direct drive for positioning accuracy and reliability; 3D noise reduction; online set-up; multicasting for 20 simultaneous users; PoE+ compatibility and more. The camera also meets ONVIF Profi le S specifi cations. JVC.Go to sp.hotims.com and enter number 353 for product information.

    960H TechnologyRecord what youve been missing960H, the highest resolution in analog technology avail-able today, allows cameras and DVRs to capture up to 700TVLnearly 30 percent over D1 resolu-tion resulting in signifi cantly enhanced picture detail.Specos DS DVR enhances recording quality of existing installations and is backward compatible with D1 cameras and DVRs. the product is available in 8 and 16 channels, standard desktop or wall mount models for covert or small footprint applications.A full line of 960H cameras, including Specos exclusive, award winning Intensifi er3 technology are also available. Speco Technologies.Go to sp.hotims.com and enter number 354 for product information.

    Multimode to Singlemode Fiber ConvertersNew 50P Series accommodates integration of new/existing fi ber infrastructure

    afi s 50P Multimode to Singlemode Fiber Converters provide bi-direc-tional communications are designed to increase network compatibility

    between Multimode and Singlemode devices at each end of long-distance singlemode fi ber links. The units feature optical link LED diagnostics indicators for instant visual status confi rmation, and are available in a variety of confi gurations with one or two ports and SC or ST connectors. afi .Go to sp.hotims.com and enter number 355 for product information.

    New EnterprisePlus LCD UPS3-year warranty with non-prorated battery coverageMinuteman UPS has introduced the all-new EnterprisePlus LCD battery backup systems that provide an unbeatable combination of features and value, making them the ideal solution for security rack installations of all sizes. An LCD status display, automatic voltage regulation hardware, 5 VA ratings, and the option to choose stan-dard or extended runtime capability mean that security managers have more options than ever for protecting vital cameras, DVR/NVRs, access control systems, fi re alarms and more. The system is backed by a 3-year warranty that includes non-prorated battery coverage. Minuteman UPS.Go to sp.hotims.com and enter number 356 for product information.

    Learn more about Wide Dynamic Range www.axis.com/imageusability

    2

    014

    Alle

    gion

    I sometimes forget my keys, ID card or wallet,

    but I never forget my phone.

    Are you ready? Finally, you can use a smart phone just like an ID cardmade possible by aptiQmobile and Near Field Communication (NFC). The next generation in access control technology.

    Can it open doors? Yes! Can I use it to buy a late night snack? Sure! Can you say goodbye to lost cards? You bet!No really. Its that awesome. Call 877-926-5285 today to learn more.

    Learn more at: allegion.com/us

    0614sec_c1_v3.indd 1 5/16/14 4:08 PM

  • Thats because Axis network cameras with Wide Dynamic Range technology can handle bright lights and dark shadows in the same image. And that means its easier to spot and identify people, vehicles and incidents, no matter how awkward the lighting conditions. WDR makes life simple for your security manager customers.

    To learn more about WDR, image usability and the surveillance solution thats right for your customers, visit the Axis interactive guide at www.axis.com/imageusability

    Whats the best way to handle light and shade?Simultaneously.

    Distributed by:

    Count on it.

    g yeractive guide attomers, visit the AxAxis inte

    eusability

    Visit Axis at ESX:www.axis.com/events/us

    Booth #117June 24-25

    Nashville, TN

    Go to http://sp.hotims.com and enter 4 for product information.

    Untitled-4 1 3/28/14 11:11 AM

  • Conservation. Protecting the wildlife of South Africas Kruger National Park from poachers was once an impossible challenge.

    But today the park uses Milestone XProtect Enterprise and integrates license plate recognition to track poachers

    vehicles from one central location. Proving again that Milestone can solve problems

    that are more than security.

    Milestone XProtect is the worlds leading IP video surveillance management software and is reliable, future proof and easy to use. It supports the widest choice in cameras and seamlessly integrates with business and security solutions such as license plate recognition. Which means your possibilities are unlimited and you can keep your security options open. See our new products and the new ways to use XProtect at: www.milestonesys.com

    Milestone Systems U.S.Tel: 503 350 1100

    Go to http://sp.hotims.com and enter 24 for product information.

    Untitled-9 1 5/13/14 4:25 PM

  • www.security-today.com CONTENTS JUNE 2014

    4 0 6 1 4 | S E C U R I T Y P R O D U C T S

    FEATURES

    Retail Security 14Putting an LP Spin on Video AnalyticsWhich analytics can give you a quick heads up on potential loss activity?By Jackie Andersen

    Improving Employee RelationsInstalling audio solutions may help deter theftBy Richard Brent

    Hospital Security 22The Prescription for Curing ID Badge IllsIncreased control and advanced reporting are critical for a safe facilityBy Ann Geissler Timme

    Fire/Alarm Solutions 36Fire Alarm Prescription Increases Hospital ProtectionNew facility cuts no corners in offering protectionBy Beth Welch

    Access Control 42Upgrading ElectronicsNew Jersey school improves its locking systemBy April Dalton-Noblitt

    Power over Ethernet 44Media ConversionChoosing the right backboneBy Susan Stanley

    Cargo Security 46Cargo Security Meets LogisticsCommercial air freight shares common infrastructure access with aircraft securityBy Manish Dalal

    PRODUCT SECTIONS

    SIA Showcase Awards 28

    DEPARTMENTS

    Industry Focus 8Hiding in a Wheel WellBy Ralph C. Jensen

    Industry Vertical 10Security Solutions for the Past, Present and Everything in BetweenInnovative technologies rely on past success to enhance the security marketBy Jamie Friedlander

    Top Picks 12

    New Products 48

    Advertisers Index 65

    Industry Professional 66The Man Behind the RevolutionHard work proven to be the pinnacle of successBy Wendy Bowman

    Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.

    Copyright 2014 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission.Mail requests to Permissions Editor, c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254

    The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the readers sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

    0614sec_004_TOC_v1.indd 4 5/16/14 3:16 PM

  • Go to http://sp.hotims.com and enter 28 for product information.

    Untitled-9 1 5/13/14 4:36 PM

  • 6 0 6 1 4 | S E C U R I T Y P R O D U C T S

    The Growing Popularity of Biometrics

    Online fraud and identity theft con-tinue to be common occurrences, but biometrics is becoming more popular as a way to combat such crimes. Our most recent Online Exclusives discuss how biometrics can be used for access control, even at ATMs.

    As Robert Laughlin mentions in his article, access control must continually become more integrated and scalable, providing users with new functionality that will improve overall situational awareness and security. I look forward to the day when we can sim-ply use our fi ngerprints to access our bank accounts, pay our bills, and possibly to enter our homes.

    If youre interested in contributing to our Online Exclusives or our blog, please contact me at [email protected] or 972-687-6784.

    Best Regards,

    Lindsay Page

    Online Exclusives

    Bringing More Value to Business Solutions with Access ControlBy Robert Laughlin

    Access control continues to evolve as a core ele-ment of professional security. From small systems to enterprise solutions spanning multiple locations around the globe, controlling access is central to the very concept of securing an environment. With the landscape for security changing as rapidly as new technology can be introduced, access control must continually become more integrated and scalable, providing users with new functionality that will im-prove overall situational awareness and security.

    Biometrics at the ATM: You Can Bank On ItBy Bill Spence

    Whos transacting? This timeless question has be-come more complicated in recent years for the bank-ing industry. A typical bank customer visits an ATM a few times a week and only rarely pays a visit to a human teller. In todays anonymous landscape, how does the bank know whos transacting? More and more often at banks around the world, the answer is fi ngerprint authentication.

    When Online Fraud Targets YouBy Eileen Turner

    When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on remov-ing the malware. Customers will continue to browse to specifi c sites and access infected content, whether they know they are doing it or not. Because of this,

    its critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.

    http://security-today.com/01131

    Recent Headlines

    Proof of Presence to Eliminate Billing Fraud from Home Health Market

    Trick Surveillance Cameras by Wearing Artists Face Mask

    Teen Plotted to Bomb Schools and Open Fire on Students

    No Drones Allowed at Yosemite National Park

    http://security-today.com/news

    Upcoming Webinars

    The Importance of Personnel Surety for Critical InfrastructureThis webinar is an overview of the personnel surety measures that can help facilities achieve CIP and CFATS regulatory compliance.

    Leveraging Security Analytics to Add Value to the Bottom LineJoin us for this FREE webinar to understand how leveraging security analytics can provide new op-portunities to improve the effi ciency of day-to-day operations and the effectiveness of strategic planning when armed with the capabilities and technologies to transform huge amounts of transactional physical access data into actionable insights.

    Critical Components for K-12 Safety and SecurityJoin this school safety and security webinar to under-stand school administrators concerns and plausible responses to security within a K-12 environment.

    To view these Webinars at any time, please visit http://security-today.com/webinars.

    REACTION Blog Recent Posts

    TSA Uses App to Speed Up Security Lines

    NRA Looks to Ban Smart Guns

    Gunman Opens Fire at FedEx in Georgia

    Members of our staff and guest bloggers take advan-tage of REACTION to add their own perspectives on a broad range of security topics and issues. If youd like to be a contributor, please contact Associate Content Editor, Ginger Hill at [email protected].

    Online Communities

    Follow us on Twitter: www.twitter.com/SecProds

    Become a fan on Facebook:http://www.facebook.com/secprodonline

    Pin with Us:http://pinterest.com/securitytoday/

    Featuring our exclusive integrated sun shield and universal mounting

    bracket (included).

    PROTECT YOUR EQUIPMENT FROM THE ELEMENTS WITH

    Marine Grade Aluminum EnclosuresNEMA 3 & 4

    GO THE DISTANCE WITH

    Transmits 2, 4 or 8 cameras and PTZ datareal-time on one ber up to 2 miles.

    FIBER MODEMS

    www.armorlogix.com(904) 674-2976

    Go to sp.hotims.com and enter 3 for product information.

    0614sec_006_eTOC_v2.indd 6 5/16/14 3:17 PM

  • www.icrealtime.com866.997.9009

    Brand-newdealer portal.**

    You talked.We listened.

    *

    Lifetime technical support.Unparalleled

    customer support.

    Track all ordersInventory managementAccount informationBilling

    *excluding hard drives**coming third quarter of 2014

    Go to http://sp.hotims.com and enter 6 for product information.

    Untitled-2 1 3/13/14 10:39 AM

  • INDUSTRYFOCUS By Ralph C. Jensen, Editor-in-Chief

    www.security-today.com

    Volume 18, No. 6

    EDITORIAL STAFF

    Editor-in-Chief/Associate Publisher Ralph C. Jensen

    E-news Editor Brent Dirks

    Senior Editor Lindsay Page

    Content Development Team Ginger Hill

    Jamie Friedlander

    ART STAFF

    Art Director Dale Chinn

    PRODUCTION STAFF

    Director, Print and Online Production David Seymour

    Production Coordinator Teresa Antonio

    EDITORIAL ADVISORY BOARD

    Frank Defi na, Samsung Techwin America, Ridgefi eld Park, N.J.

    William Crews, CPP, CHS I, INVISTA, Houston

    Charles Chamberlain, Missouri Lottery, Jefferson City, Mo.

    Kimberly Kuhn, Tyco, Lexington, Mass.

    Merlin Guilbeau, Electronic Security Association, Irving, Texas

    Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston

    SALES

    Randy Easton 678-401-5543

    Brian Rendine 972-687-6761

    Sam Baird +44 1883 715 697

    Jane Dai +86-755-26289889

    Peter Kao +886-2-2949-6412

    SECURITY, SAFETY, AND HEALTH GROUP

    President & Group Publisher Kevin OGrady

    Group Circulation Director Margaret Perry

    Group Marketing Director Susan May

    Group Website Manager Scott Newhouse

    Group Webinar Administrator Tammy Renne

    President & Chief Executive Offi cer Neal Vitale

    Senior Vice President & Chief Financial Offi cer Richard Vitale

    Executive Vice President Michael J. Valenti

    Vice President, Finance & Administration Christopher M. Coates

    Vice President, Erik A. LindgrenInformation Technology & Application Development

    Vice President, Event Operations David F. Myers

    Chairman of the Board Jeffrey S. Klein

    REACHING THE STAFF

    Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.

    E-mail: To e-mail any member of the staff, please use thefollowing form: [email protected]

    Dallas Offi ce (weekdays, 8:30 a.m. 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254

    Corporate Offi ce (weekdays, 8:30 a.m. 5:30 p.m. PT)Telephone (818) 814-5200; Fax (818) 734-15229201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

    8 0 6 1 4 | S E C U R I T Y P R O D U C T S

    Hiding in a Wheel WellIt is a well-known fact that video surveillance cameras can help detect trespassers; however, if no one is looking at the surveillance or if the hu-man element has not been notifi ed of a breach, tres-passing can leap to new heights.

    Case in point is a 16-year-old runaway from San Jose, Calif. who argues with his father, runs to the nearby airport and stows away in the front landing gear of a Boeing 767 headed for Maui, Hawaii. Its not like this happens every day, so when a teenager (who at this writing remains unidentifi ed) is so deter-mined to leave the United States and get to Somalia to visit his mother, this generates news.

    How could he not have been caught? Was security asleep at the wheel? Were the video surveillance cam-eras not properly maintained? Or, worse yet, was no one looking at the images? Also part of the mystery is how the boy survived the fi ve-hour fl ight.

    Surveillance cameras at San Jose International Airport did capture images of the teenager on the tar-mac and climbing into the nose gear of the airplane. So, for those who question if this really happened, it would seem that the boy did enter the plane. But, what about the cameras on the perimeter of the tar-mac? Shouldnt his entry at the perimeter have been caught and properly dealt with?

    According to John Nance, an ABC News aviation consultant, the weak link is at the perimeter, or the fence, in this case.

    Security was not as effective as expected, he said.The use of cameras in this situation was a failure

    because no one noticed the security breach until the plane, and the stowaway, landed in Hawaii.

    We all know there is technology available that can be programmed to sound an alert when a line of se-curity has been breached or when there is something that seems potentially suspicious. Implementation of analytics software would probably have successfully alerted offi cials of the breach, stopping the youth from slipping past layers of security.

    Just because something is caught on camera, though, it doesnt mean it will make an impression; yet, once the boy climbed down from the wheel well in Maui, a defi nite impression was made.

    With proper security in place and with the human element being alerted, there still is no guarantee that the youth would have been detected, even though the chances do increase dramatically.

    Sometimes the actual results are quite under-whelming when it gets to the real world, where people are fatigued; people are preoccupied, said Richard Bloom, an airport security expert at Embry Riddle Aeronautical University in Arizona. There is no way to guarantee security, even if you had one person per video screen.

    While security offi cials at San Jose International Airport are reviewing how the boy slipped onto se-cure airport property, there has been no indication that those same offi cials will step up security or police presence at the site, though improvements are expect-ed once a review has been completed. The question remains how the boy was able to scale a fence with barbed wire without injury, and not be detected by German shepherd dogs and Segway-riding police offi -cers. Problem is, not all sections of fencing around the airport have barbed wire, and the youth approached the plane during the early morning hour of 1 a.m.

    The fact remains that security still has its weak-nesses, despite the billions of dollars spent.

    Skeptics believe the boy really didnt make the fl ight, but there is video surveillance showing the youth climbing out of the wheel well once the fl ight landed in Kahului International Airport in Maui. He also was found wandering the tarmac at the airport. I suppose if there is a will, there is a way to make some-thing happen. While the boy didnt have malicious intent, there are the what ifs of someone else with malevolent designs.

    On the fl ip side of this security question, the Fed-eral Aviation Administration said that about one-fourth of the 105 stowaways worldwide have survived. It is a remarkable tale that this fella was able to live through the ordeal. Many people have died trying this free ride, if not for the unbearable conditions of altitude, fi ghting cold, deadly temperatures and lack of oxygen, then for the fact that when the wheel well opens on its glide path to the runway, a body typically falls out.

    The fact that this boy is still alive is curious. California runs the airports in the state, and there

    are some serious questions being asked and others that need answers. I hope this serves as a wake-up call for all airports nationwide and that security directors will review their multiple layers of security.

    0614sec_008_IndFocus_v3.indd 8 5/16/14 3:18 PM

  • Go to http://sp.hotims.com and enter 34 for product information.

    Untitled-3 1 5/16/14 2:13 PM

  • 1 0 0 6 1 4 | S E C U R I T Y P R O D U C T S

    Operating in the United Kingdom and America for over 30 years, surveil-lance technology com-pany Dedicated Micros

    continues to innovate on a regular basis. The company ensures its customersboth old and newtransition to HD in a way that works best for their company while also realizing that users are pri-marily looking for an exceptional return on their investment.

    Dedicated Micros designs and manu-factures cameras and recording equip-ment that can be seen in a variety of installations, from transportation, to re-tail, to education. The company has also pioneered various technologies, such as closed IP network security, and has di-versifi ed into using multi-mode record-ing, making Dedicated Micros a security company to look out for in the future.

    Closed IP Network SecurityAccording to Pauline Norstrom, the vice president and marketing director at Dedicated Micros and the COO at the AD Group, the invention of closed IP network security is arguably the most im-portant part of this companys portfolio.

    The key advancement in the Dedi-cated Micros portfolio is the invention of the closed IP network security fea-ture, said Norstrom. Not only does this ensure that end users can have one hundred percent peace of mind, but that IP cameras are one hundred percent safe and trusted.

    In addition to being safe and secure, the closed IP network security feature is

    also cost-effective and easy-to-use. The installers and integrators

    who put this together can confi gure the system automatically without hav-ing to use highly-skilled labor, which is not only a benefi t for installers and integrators, its a benefi t for the user in that once they start using the sys-tem; the skill of the labor involved is much lower.

    Another benefi t of the closed IP network security feature is that users do not have to re-license their cameras.

    Dedicated Micros sets itself apart from other companies by addressing the fact that analog cameras cannot be fully phased out quite yet. Dedicated Micros has created technologies that help make the transition from analog to HD less drastic and more cost effi cient.

    The customers who have been in the analog market are taking a long time to transition into IP, said Norstrom, add-ing that closed IP network security helps make the transition easier. However, once theyve seen the closed IP system, it enables them to offer IP cameras to their customers without the retraining of installation teams.

    Product LineDedicated Micros product line includes a handful of solutions that help make the transition from analog to digital easier. Two of these products include the Hybrid IP Video Solution and the NVR Cloud Solution.

    Hybrid IP Video Solution. Most us-ers cannot make the jump from analog to HD in one swift move. Therefore, this solution enables an incremental upgrade to an HD solution while allowing the customers to get the most for their mon-ey by letting their analog cameras, which can last for 10 to 12 years, approach their end of life. The solution is ideal for ap-plications in small businesses, retail, edu-cation and small manufacturing.

    The Hybrid IP Video Solution is a transitional product that enables users who have invested a great deal in analog systems to continue using their analog cameras, because in many cases, analog cameras outlive the recording device, said Norstrom. During the life of the system, there is going to come a point when the recording device has to become upgraded, but the user cant afford the update and moves to a high resolution IP camera system estate. So, they want to use those analog cameras for a bit lon-ger. And, weve found that by switching to one of the hybrid systems, they can retain their analog cameras, and they gradually update the estate to include IP cameras in which one system will man-age both from the same user and space.

    Cloud NVR Solution. This product ac-counts for the variety that exists among video security users by offering fail-safe architecture that can be managed seam-lessly through a single user interface. It can also be replicated at multiple loca-tions on a property, campus or estate. Ideally designed for use in multi-site or multi-fl oor buildings, the Cloud NVR Solution includes lower maintenance budgets, fl exibility, the option for remote hosting and more.

    The Cloud NVR Solution uses the closed IP system, which enables IP cam-eras to be confi gured and secure lines to be set up with very little programming, said Norstrom. The cameras are confi g-ured from a remote location, so it is very easy to actually deploy a multiple cam-era system.

    The system, according to Norstrom, also allows the user to deploy in a secure, private cloud security system that gives them complete trust in the secureness of the IP cameras being used.

    Multi-mode RecordingDedicated Micros has developed multi-mode recording over the last few years. During the time when users primar-ily used analog video, a major problem was an abundance of tapes that did not contain relevant footage. Multi-mode re-cording eliminates this problem by using video cameras that only use high-res cap-turing when action occurs on the video.

    Multi-mode recording was invented to help analog systems reduce their num-ber of tapes, said Norstrom. When hard drives came out, they were very small and it wasnt possible to store a lot of data on them, so we solved this problem by cre-ating a way of recording video such that you can have a very low resolution for background recording when nothings happening. And, based on event triggers and analytics, we can up the resolution re-cord rate to ensure the critical aspects of the eventthe face shot, the identifying shotare actually captured.

    Multi-mode recording has been a technology used in Dedicated Micros portfolio for quite some time. When HD video became mainstream, many users

    Security Solutions for the Past, Present and Everything In BetweenInnovative technologies rely on past success to enhance the security market. By Jamie Friedlander

    Jamie Friedlander is an associate content editor at Security Products magazine.

    0614sec_010_011_IndVert_v3.indd 10 5/16/14 3:19 PM

  • W W W . S E C U R I T Y - T O D A Y. C O M 1 1

    did not fully understand the storage problem they were going to face, and multi-mode recording helped them deal with this storage problem.

    ImplementationsThough Dedicated Micros can be seen in retail, small business, education, fi -nance and hospitality sectors, they have recently diversifi ed into other sectors.

    Were very strong in the transpor-tation sector because we have a rugge-dized recording solution for buses and trains which is combined with a pow-erful video management system, said Norstrom. Its probably a little known fact, but were very strong in this sec-tor because it doesnt go anywhere near the traditional installer base. It involves specialized sizes and typically working with the actual bus manufacturers.

    Dedicated Micros has diversifi ed into the transportation sector in the UK and the political sector in the Unit-ed States. Though the companys high-profi le clients cannot be publicized, Norstrom said that the installations are in areas that secure high-profi le politi-cians, and the feedback from these cli-ents has been pronounced.

    A Look to the FutureWhat makes Dedicated Micros unique, according to Norstrom, is that the com-pany has a completely harmonized vid-eo system in which all the products work in the same way. The interface works with all productsincluding the older, legacy productswhich ensure that cost of ownership remains constant.

    In terms of cost of ownership and the upgrade of an estate, there is a sig-nifi cant benefi t in choosing Dedicated Micros because we commit long-term to our customers and ensure that we provide support not just through our people, but also for the legacy estate of the product, said Norstrom. And that solution is provided free of licenses, so if you choose our product, you dont have to pay any license fees.

    In the coming months, Dedicated Micros plans on bringing a new ver-sion of its FireVu products to market. They have redeveloped the products to make them more sophisticated and better at detecting false alarms, the main barrier to sales for a video-based detection product.

    Weve put such sophisticated pro-cesses in our product that the false alarm rate in many circumstances is

    down to zero, which is very important to high-risk environments, said Nor-strom. This positions the product as the leader in the market and thats an area well be focusing on over the next 12 months.

    Another goal for Dedicated Micros is to get their products out there. The

    companys traditional marketing route was through the security distributors, but that is no longer effective. The com-panys new business model doesnt align with the security distributors business model because they are selling a single solution. Norstrom sees this change in marketing as a benefi t.

    What we are saying is we are far more consultative now. We help install-ers design systems, and we help the user get the best out of the product, which means theres far greater direct interac-tion with ourselves and also the ability to buy all these solutions directly from Dedicated Micros.

    Go to sp.hotims.com and enter 18 for product information.

    0614sec_010_011_IndVert_v3.indd 11 5/16/14 3:19 PM

  • 0614 TOP PICKS Compiled by Security Products Staff

    1 2 0 6 1 4 | S E C U R I T Y P R O D U C T S

    Awareness, Control and Rapid Response

    R4 empowers organizations to achieve high levels of security

    Frontier announces its integrated security management software suite, which stream-lines operator workfl ow, saves time, reduces costs and simplifi es system management and operation.

    Management of credentials is more effi cient, even in environments with complex credential requirements.

    With seamless video integration, Frontier Video transforms Frontier access control software into a comprehensive unifi ed security man-agement solution for a variety of environments.

    A Web Client allows operators to use any stan-dard Web browser to connect to the platform for system administration and control. Frontier.Go to sp.hotims.com and enter number

    344 for product information.

    The Power of Anti-TheftIncrease the security of

    your current system

    Scorpion Security Products introduces The SA2 is an all-inclusive anti-theft power secu-rity display designed to optimize product pre-sentation and encourage customer interaction.

    Available in a variety of sizes, it secures virtu-ally all phones, phablets, tablets, and readers.

    It features a removable head for ease of re-merchandising and is equipped with 5 and 12 volt charging, continuous demo display, 90 decibel alarm, and LED lighting to visually display the security status.

    The SA2 will compliment and signifi cantly in-crease the security of your current system. Scorpion Security Products.Go to sp.hotims.com and enter number

    345 for product information.

    Open, Unifi ed Software Platforms

    Application will streamline response

    SMC enhances industry standard workfl ows to respond to routine and emergency situations.

    Driven by Fusion, which combines and analyzes device relations, location, user management and more, SMC unifi es a wide range of sensors and systems into a centralized, intuitive security and situation intelligence platform.

    The platform manages systems with up to tens of thousands of devices.

    Incorporates data on traffi c violations, radar, weather, identity systems and information from mobile phones.

    A GIS-referenced visual database links sen-sors, maps and events together to help users comply with standard operating procedures.Verint SMC.Go to sp.hotims.com and enter number

    346 for product information.

    Analytic Recognition Enterprise Solutions

    Complete end-to-end video solution based on license plate recognition

    The solution turns any existing camera in a video surveillance system into an LPR camera.

    Working with an unlimited number of cameras, this product produces industry-leading LPR accuracy.

    The product functions as a stand-alone system or integrates with existing video security tech-nology such as the Video Management System (VMS).

    Combines real-time automatic license plate data extraction with state-of-the-art analytics for complete situational awareness and pre-dictive capabilities.

    Instant alerts via email or text message capa-bilities make this solution the most cost-effec-tive video analytics product of its kind.Platesmart Technologies.Go to sp.hotims.com and enter number

    347 for product information.

    Visibility into Your Business360IQ anywhere, anytime

    360-IQ combines live data with real-time video surveillance, creating a dynamic business operations tool.

    The product delivers a simple, but powerful solution, coordinating all critical data into a single, easy-to-use application.

    Designed to help operators manage their business, the tool saves time and adds peace of mind.

    360IQ provides visibility into business op-erations using dashboard views of immediate store performance data, critical time alerts and access to real-time and archived video.

    The product also uses cloud-based algorithms to analyze store-level anomalies across the enterprise.360IQ.Go to sp.hotims.com and enter number

    340 for product information.

    Four-Door Control PanelCan be installed in existing enclosures

    Symmetry SR-2000 is AMAG Technologys four-door control panel that delivers proven access control technology for new and retrofi t security applications.

    The panel is designed for plug-and-play up-grade of Picture Perfect and other legacy Casi Rusco and similar systems, and directly re-places the legacy M2000.

    The product supports F/2F reader communica-tion protocol and includes a four door control-ler board with input/output (I/O), and a power-ful database unit.

    The SR-2000 can be installed in existing en-closures, eliminating the need for any wiring or termination changes.AMAG Technology.Go to sp.hotims.com and enter number

    341 for product information.

    Software ApplicationVMS Integration

    Open Options DNA Fusion v6.1 comes with even more cutting edge features and integrations.

    Users can implement persistent access groups to simplify access assignment across multiple controllers, and can take advantage of popular biometric technology with enrollment to the Suprema line of readers through DNA Fusion.

    Version 6.1 features a new VMS integration with March Networks including live and ar-chived video, PTZ control, and scanning for cameras.

    Open Options partnership with Milestone Sys-tems provides through support for their Access Control Module which allows events and data to be monitored from Milestones Smart Client.Open Options.Go to sp.hotims.com and enter number

    342 for product information.

    Outdoor Emergency PhonesUpdated LED lighted surface mount

    Talk-A-Phones updated LED Lighted Surface Mount Accessory features a new sleek, con-temporary contoured design that improves the functionality of an emergency phone.

    The emergency phone faceplate is illuminated by an ultra-bright, long-lasting LED panel light at all times, making it ideal for poorly lit out-door locations.

    The surface mount is constructed of vandal-resistant stainless steel and features a pro-tective hood designed to withstand outdoor elements.

    The mount comes equipped with removable internal panels for additional devices, including model ETP-GSM cellular interface and a power supply.Talk-A-Phone.Go to sp.hotims.com and enter number

    343 for product information.

    0614sec_012_Toppicks_v2.indd 12 5/16/14 3:20 PM

  • RETAIL SECURITY

    PUTTING AN LP SPIN ON VIDEO ANALYTICS Which analytics can give you a quick heads-up on potential loss activity?By Jackie Andersen

    Video analytics arent just tools for marketing and merchandising; these intelligent algorithms can also spot atypical customer behav-ior that might suggest potential loss activity when viewed by the Loss Prevention department.

    By looking at four of the common video analytics used by re-tailers today, we can quickly see how departments can gain different business intel-ligence from the same applications.

    HEAT MAPPING: SEEING WHERE SHOPPERS GOHeat mapping lets retailers visualize customer traffi c patterns through the store over time. This analytic uses color overlays to denote hot spots of activity and cold spots with little or no foot traffi c.

    Marketing and merchandising departments have been using this information for years to optimize store performance. They can see whether changing store lay-outs or moving a new promotional display to a hotter location improves merchan-dise performance. They can see where additional customer associates are needed to assist customers on a busy sales fl oor.

    The LP spin. When LP reviews a heat map, those cold and hot spots take on a different meaning. Cold spots might indicate an area of the store where thieves could more easily conceal items. Hot spots might indicate a potential fl ash mob, especially if it suddenly comes out of nowhere with no underlying reasons for its appearance, like a doorbuster promotion. Knowing that crimes of opportunity often spike when theres a lack of guardianship, an LP response to intelligence gained from heat mapping would be to step up staffi ng in hot and cold areas.

    From an LP perspective, heat mapping is especially useful in static environ-ments where the fl oor layout remains fairly constant. You can establish a good baseline of activity that makes it easier to judge spikes and anomalies.

    Take, for instance, a cosmetics counter. You might have make-up artists in the aisles and sales associates behind the counter ringing up sales. But, if a popular cosmetics brand is offering a free gift with purchase that day, you might get a sud-den infl ux of activity in the department. While the analytic might trigger an alert to management to make sure that there is suffi cient staff in the area to ring up sales, LP will read the alert as a warning to beef up security and staffi ng to deter customers from walking off with testers and products.

    1 4 0 6 1 4 | S E C U R I T Y P R O D U C T S

    0614sec_014_020_Andersen_v3.indd 14 5/16/14 3:20 PM

  • Superior identicationLower costs

    Get 4K ultra HD images with lower bandwidth and storage requirements. DINION IP ultra 8000 MP delivers a tremendous advantage in detail capture, even when moving objects and challenging lighting pervade the scene. And, intelligent Dynamic Noise Reduction minimizes bit rates to lower bandwidth and storage requirements up to 50%, reducing system costs and network strain. This makes 4K ultra HD imaging relevant for many surveillance applications, enabling you to see every detail, everywhere.Learn more at www.boschsecurity.us

    Go to http://sp.hotims.com and enter 12 for product information.

    Untitled-5 1 5/14/14 1:01 PM

  • RETAIL SECURITY

    1 6 0 6 1 4 | S E C U R I T Y P R O D U C T S

    Choosing the right camera. When it comes to heat mapping analytics, you dont need a pricey, megapixel camera, as youre only concerned about movement, not image details. A cost-effective fi xed or dome camera with a good lens, a decent depth of fi eld and either SVGA or 720p resolution would be suffi cient for this ap-plication. Though the typical orientation is horizontal, you might want to operate the camera in corridor view for heat mapping long aisles.

    Caveats. Because heat mapping relies on establishing a good baseline, it would be a challenge to deploy this analytic in locations where the fl oor plan confi gura-tion is constantly shifting. Without a reliable baseline, any comparative results would be erroneous. Also, if the location experiences a wide range of lighting con-ditions throughout the daysuch as areas facing plate glass windows and doorsyou will need a camera that supports wide dynamic range to compensate for glare.

    DWELL TIME: DISCOVERING WHERE SHOPPERS LINGERDwell time lets retailers see which areas of the store catch a customers eye and keep their attention. This analytic is designed to detect a person remaining station-ary in a particular location beyond a set period of time, a parameter designated by the retailer. This application uses a graphic overlay on the video to pinpoint the location where the dwell threshold has been exceeded.

    From a marketing perspective, dwell time analytics can indicate if a display is effective in attracting shopper interest. It can alert management to send a customer service associate to the location to convert the browser to a buyer and perhaps even upsell additional merchandise.

    The LP spin. For LP, a dwell time alert can be a red fl ag that someone might be looking for an opportunity to conceal a product or scoping out the location for an organized retail theft sweep. In response, LP may simply send a store associate to inquire if the person needs assistance. Once the individual realizes theyre being observed, the window of opportunity for the concealment slams shut.

    Consider a drugstore where shelves of baby formula might present a tempting target for organized retail crime gangs. If dwell time analysis indicates someone or several individuals are spending an inordinate amount of time comparing brands, LP might view the alert as a warning for a potential sweep and take proactive steps to avert it.

    Choosing the right camera. When it comes to dwell time analytics, most retailers use fi xed-dome cameras mainly because they provide the right depth-of-fi eld and angle for good situational awareness. Plus, their unobtrusive design blends in well with a retail environment. If the camera is being used solely for dwell time analy-sis, SVGA or 720p resolution would be suffi cient. But, if youre using the camera for multiple purposes, you might want to choose a 1080p camera to capture facial details.

    Caveat. LP will face additional challenges as organized retail crime becomes more sophisticated and incidents happen even faster. As with heat mapping, if the location experiences a wide range of lighting conditions throughout the day, you would need a camera that supports wide dynamic range to compensate for glare.

    PEOPLE COUNTING: TALLYING CUSTOMER TRAFFICPeople counting lets retailers keep track of how many shoppers are entering the store. This algorithm is designed traditionally to be one-directional so that it doesnt count people leaving the premises. The information is generally presented in a graph broken down into units of time.

    Retailers most often use people counting to calculate conversion rates and pre-dict peak times when more staff is needed as traffi c ebbs and fl ows. By aggregating this information over time, management can compare their store sales with other storesthe Holy Grail of retailing.

    The LP spin. When LP studies people-counting statistics, theyre looking to fi nd a correlation between customer density and returns. By familiarizing themselves

    TEMPERATURE CONTROLLED ENCLOSURES

    1-800-473-0213 | www.mierproducts.com

    PROTECT FIRE PANELSDVRs, SECURITY AND ELECTRICAL

    EQUIPMENT FROM VANDALSAND WEATHER

    NEMA 4 Outdoor/Indoor Enclosures with:

    s!IRCONDITIONINGAND(EATs!IRCONDITIONINGONLYs(EATONLYors%NCLOSUREONLY

    7%6%'/49/5#/6%2%$

    AVAILABLEWITHORWITHOUTWINDOWS

    NEMA 3R Outdoor/Indoor Enclosures with:

    sORCUBICFTMINFANSIndoor DVR & CPU Lockboxes with:

    sVOLTORVOLTFANS

    .%7RACKENCLOSURESINCLUDEINTERNAL25RACK.ON-ETALLIC6ERSIONS!LSO!VAILABLE

    OVER 50 MODELS AVAILABLE

    PROU

    DLY MADE IN THE USA

    FOR OVER 25 YEAR

    S!

    Go to sp.hotims.com and enter 5 for product information.

    0614sec_014_020_Andersen_v3.indd 16 5/16/14 3:21 PM

  • 4Like CO and Smoke in a single detector. The award-winning i4 Series Combination CO/Smoke Detector and i4 Interface Module work together to provide the rst system-connected combination solution for conventional re and security systems.

    The i4 Detector truly hits the spot for installers as well as homeowners. It uses the most reliable and accurate CO and Smoke sensing technologies to detect dangerous levels of smoke or CO. Ongoing maintenance is easy, thanks to its eld-replaceable CO cell. And the i4 Combination Detectors 2- or 4-wiredesign makes installation quick and easy, just like making a PB&J should be.

    The i4 system works with most conventional security panels, and the i4 Module even interconnects sounders on the loop. Plus, youll have the freedom to mix and match up to 12 i4 Combination Detectors and compatible i3 Smoke Detectors per i4 Module. Sink your teeth into a life safety solution that means less wire, less labor, and fewer devices on the wall or ceiling. To learn more visit:

    i4 Interface Module(Required)

    i4 CO/Smoke Detector

    Some things arejust great together.

    go.systemsensor.com/i4pbj-sp

    2014 System Sensor. All Rights Reserved.

    Go to http://sp.hotims.com and enter 31 for product information.

    Untitled-4 1 5/7/14 10:54 AM

  • RETAIL SECURITY

    1 8 0 6 1 4 | S E C U R I T Y P R O D U C T S

    with the baselinethe average density of shoppers from sales to returnsthey can spot anomalies that might indicate fraudulent rather than honest returns.

    For instance, if LP discovers that the highest rate of return is occurring one or two hours before closing, they would likely conclude that these trans-actions bear further scrutiny. It could be that dishonest patrons are looking for times when staff is busy restock-ing shelves and closing down the store, making them too distracted to review return receipts carefully. Or, it could be that with few customers at the end of the day, an employee might be do-ing their own fraudulent returns. Upon further investigation, LP could discov-er tell-tale signs, like the absence of a customer and an associated credit card receipt linked to the original purchase.

    In some retail establishments that op-erate stores within stores, management might install secondary people-counting cameras just to measure traffi c to luxury specialty or high ticket item areas. For marketing and merchandising, it would be a way to calculate conversion rates and profi tability of those locations sepa-rate from the overall performance of the store. But for LP, seeing unusual spikes in head count in those areas with higher-value merchandise might set off warn-ing bells. This would be especially true if the secondary people-counting cameras were strategically deployed in a distribu-tion center where high-end inventory, like expensive jewelry and accessories, were stored.

    Choosing the right camera. A fi xed dome would mostly likely be your go-to camera for people counting. Depend-ing on the size of the area being cov-ered and the type of detail you need to capture, youre probably fi ne with a standard SVGA image. You could, however, bump all the way up to a fi ve megapixel camera if youre using the video for other situational awareness.

    Caveat. Its important to establish a baseline for typical customer traffi c at different times of the day so that you can set alerts for deviations. You need to recognize that many people-counting analytics are self-learned and become more accurate over time. With continuous usage, they become smarter at discerning between human and non-human images, such as guide dogs, shopping carts and strollers, so occasionally recalibrate your baseline

    to ensure it refl ects actual traffi c into the store.

    FACIAL CATALOGING: IDENTIFYING TYPES OF SHOPPERSFacial cataloging is one of the new ana-

    lytics gaining attention and traction in retail. This algorithm is designed to de-duce the gender and approximate age of shoppers based on facial geometry. It can also predict general mood by analyzing facial expressions.

    Marketing and merchandising de-partments often use facial cataloging in conjunction with smart monitors scattered throughout the fl oor. Once the video analytic determines the de-mographic of the individual in the vi-

    Securing Your Most Precious AssetIQinVision has been a trusted name in campus surveillance for over 15 years. IQeye cameras produce clear, high-quality video backed by comprehensive warranty programs, award-winning customer service and competitive pricing.

    HD Megapixel IP Cameras | H.264 | Indoor and Outdoor | Audio | WDR | Built-in IR | True Day/Night | Integration with Access Control | On-camera storage | Analytics | ONVIF | Accessories

    Q

    Go to sp.hotims.com and enter 21 for product information.

    0614sec_014_020_Andersen_v3.indd 18 5/16/14 3:21 PM

  • W W W . S E C U R I T Y - T O D A Y. C O M 1 9

    cinity of the monitor, the screen begins to stream content that might appeal to that gender and age group.

    For instance, if facial catalog-ing identifi es the shopper as a female between the ages of 40 and 50, the

    screen might display advertisements for wrinkle cream or accessories to complement the newest ready-to-wear apparel. If the shopper was recognized as a male, the promotional content might be for grooming tools or the

    latest mens sportswear. The goal is to upsell the customer on additional pur-chases wherever the opportunity pres-ents itself.

    Facial cataloging can be used to alert management of the presence of VIP

    customers in the store so that personal shoppers can be dispatched to assist these customers with their purchases.

    The LP spin. Facial cataloging helps LP quickly spot repetitive criminal be-haviors by re-offenders or known retail crime members as they enter the prem-ises by sending an alert to staff, who can then respond according to store policy and local laws. The reference fa-cial database might include links to lo-cal law enforcement or other retailers watch lists.

    In addition to identifying known suspects, LP can use facial cataloging to thwart internal theft. For example, if an associate repeatedly shows up in a high-ticket area of the store that is not part of their usual assigned territory, especially with no customer in tow, then that sends up a red fl ag for LP to further investigate the situation.

    Choosing the right camera. When it comes to facial cataloging, you need a megapixel camera to capture enough facial details for identifi cation. The camera has to be mounted with no more than a 9 degree slope or youll end up with hair follicle recognition instead. Depending on the lighting levels, you may need a camera with wide dynamic range or lowlight technology to deliver usable images, especially in dynamically-changing lighting conditions. Another thing to keep in mind is that cameras used for facial cataloging should only be used for that single purpose.

    Caveat. The biggest roadblock to implementing facial cataloging is pri-vacy rights, which are regulated on a state-by-state basis.

    In the beginning, video analyt-ics were primarily used for marketing and merchandising, but as these algo-rithms integrate into standard operat-ing procedures, their cross-functional value is becoming even more apparent. When LP applies this intelligence to its surveillance toolbox, the ability to anticipate and avert loss increases sig-nifi cantly, as does the retailers overall return on investment.

    Jackie Andersen is the North America retail business development manager for Axis Communications.

    Go to sp.hotims.com and enter 21 for product information.

    Are You Receiving White Glove Service?

    Engineering CommitmentAll IQinVision cameras are designed, engineered and tested for quality and reliability at our San Juan Capistrano, CA corporate headquarters.

    Service CommitmentFrom our superior customer-centric team to our renowned line of IP camera products, IQinVision is proud to stand behind everything we do, including the industrys best 5-year all-inclusive warranty.

    Support CommitmentLive service, support and training is available in 6 languages

    Committed to Exceeding Your Expectations14-Hour/Day Live Support M-F | 6 Languages | 98% Documented Satisfaction Rating | Short Hold Times | Field Support Available | Knowledgeable and Courteous Support Staff | 100% Warranty Advanced RMA | 5-Year Warranty (Dome and 3 Series Cameras Excluding AZF Models) | 3-Year Warranty (Standard, Stick and Bullet Cameras) | MTBF Tracking | Research and Development | Software API and SDK Available for Partner Integration | Comprehensive Quality Control Protocols

    www.iqeye.com

    Q White Glove Service Quality Engineering Quality Service Quality Support

    14A D V A N C E D R M AARMA

    111001000011

    11000000110101010100001

    1111000001111000001100101011001

    00000011111000001100101011001110

    101101

    1

    1111000000011

    11100110000001000011010010110100101000011011101011010100101 011

    11110001000011001101011010100100100101

    1111111110001100001001011111111001000011011011011010101101010010011

    1000100001000011100111100000001001101101010010010110110100111110110110

    100 0100100100100

    0110000001100101

    1111110000000011

    1101111111111000000000011000001111 011011

    11000110100011001010110001010110101

    00111010110100101001010010101110011101 111

    0110 1100100111000110011110

    110

    010010010010

    11111

    0

    11111111

    110010101010001000100100000001111110000 00000000

    011011

    01100001111

    0

    1

    1011110000111100011 011010101

    111111 00110101001010100

    11000001011

    0001000

    00011111

    0110110110110110111

    000000001011111111111000

    010111011010110010110100

    110011 11011110011101010

    0011001100011001

    110

    1000101

    111111011001001111110

    1101100101011010110010101 0001010 100101011100

    1011010100101011101101010010101110110101001010111011010100101010110101001010110101001010101010010 11111000001111 0

    11011001010110101001010110101000001100011011

    1100101011010100001010110101010101101101011011010110101011001011001011001011001011101110101 1100110001111110

    01010111010110

    101001011001101011

    101010010100

    00101000101000101010110

    010110101110110101 000

    101011000010

    011011

    0000

    1111

    111

    00

    11000

    11

    011

    11

    0111

    01

    00

    01

    00

    1

    100

    000

    1

    000

    01

    1

    10

    11

    11

    1

    10

    1

    11

    0000

    1

    1111

    1

    0100000

    1100000

    110110011111

    0

    10101100

    010100101001010011111 0000000000000

    10011001011001010010

    1010

    0000

    000110

    101

    0614sec_014_020_Andersen_v3.indd 19 5/16/14 3:21 PM

  • RETAIL SECURITY

    2 0

    Improving Employee Relations Installing audio solutions may help deter theftBy Richard Brent

    Retailers often have to deal with high-traffi c seasons, like the holidays and back-to-school, in which there are spikes in customer foot traffi c. While booming sales are always good for retailers, one thing that isnt is shoplift-ing. To help decrease theft, many retailers are installing an audio security device because the culprits are not only customers, but also employees.

    In fact, the National Federation of International Business (NFIB) estimates that $600 billion is lost annually$4,500 on average, per employeedue to employee theft. As many as 30 percent of an average companys employees steal and another 60 percent would steal, if given a motive and opportunity. Furthermore, a recent securityreport stated that on a per case average, dishonest employees steal almost six times more than the amount stolen by shoplifters, and 1 out of every 40 employees stole from their retail employer in 2012.

    While video surveillance is usually the go-to for security, more retailers are also turn-ing to audio as a supplementary technology to help manage security and employee rela-tions. For example, Massage Envy, a popular massage franchise, leverages the power of audio in addition to video cameras to manage operations and shrinkage (internal theft).

    My wife and I have been using audio products for almost fi ve years now, said Mark Blaz, owner of two Massage Envy locations in Southern California. Its great to be able to go back and listen to audio footage to help dispute a customer complaint or to hear if employees are dishonest.

    Specifi cally, Blaz uses the Louroe ASK-4 Kit #300 that includes a microphone and in-terface unit to connect to an Avigilon IP surveillance camera. The camera synchronizes the audio and video streams for both real-time monitoring through the Avigilon software. One microphone is powerful enough to cover the entire reception area; even with a multiple camera setup, one channel of audio is all that is needed to monitor employees.

    Blaz is also able to successfully manage employee relations. For example, he recalls a time when a customer was upset over the terms of the Massage Envy services contract, claiming that the employee had never explained the terms and conditions. While Blaz fol-lows the philosophy that the customer is always right, he and his wife wanted to make sure that their employee was doing her job correctly. So, they listened to the audio footage and confi rmed that the employee did, in fact, fully explain the terms and conditions of the services contract to the customer, using the agreed upon speech that employees are re-quired to say to each customer.

    Audio is useful for operational needs such as this, Blaz said. If we only had video then we would not be able to verify that our employee did her job correctly by verbally explaining the contract to each customer.

    Moreover, Blaz uses audio to combat sales reduction. He explained that during one particularly slow night, some employees wanted to go home early so they called the few customers who were scheduled to come in later and lied to them, saying that their mas-sage therapists were unavailable and they had to reschedule their appointments.

    By listening to the audio, we were able to reprimand these employees appropriately, Blaz said. This comes in handy when trying to prevent inappropriate employee conduct.

    Blaz employees are aware that their audio is being recorded as it is disclosed in the employee handbook. Meanwhile, customers are notifi ed via signage on the front door of the facilities.

    Audio is really the best way to manage employee relations as it allows you to give accurate feedback to your employees and help them overcome their learning curve more quickly by being able to hear themselves in action when we play back footage for them, Blaz said.

    It is more important than ever to consider audio security to help protect businesses from employee theft and to help manage poor customer service. As industry professionals, recognizing audio as a complementary technology to video in a security solution further protects customers assets.

    Richard Brent is the CEO of Louroe Electronics.

    When THE POWER IS IN THE KEY you have the ability to . . .

    Control access to every lock

    Eliminate re-keying costs

    Reduce unauthorized entry

    Monitor and report all access activity

    Learn more at www.cyberlock.com/lock4 541-738-5500 [email protected]

    CyberLock

    Go to sp.hotims.com and enter 14 for product information.

    0614sec_014_020_Andersen_v3.indd 20 5/16/14 3:21 PM

  • revive your security

    Revive your security today with the M-5 Conversion! Call 1-800-323-4576, option 3, or visit www.honeywellintegrated.com to learn more.

    2014 Honeywell International Inc. All rights reserved.

    Transform your legacy security system to an affordable, end-to-end enterprise solution.

    Bring your obsolete system back to life with Honeywells M-5 Conversion

    a simple board replacement option within Pro-Watch that supports

    Mercurys M-5 Series Control Modules.

    So, whats the big deal? The M-5 Conversion drop-in replacement

    saves you money while providing added features. Not only does it help you leverage your current

    investments in existing readers and wiring by allowing you to continue using your own equipment,

    it also provides an instant upgrade to Pro-Watch Honeywells robust, state-of-the-art integrated

    security system.

    The M-5 is non-proprietary, allowing for open integration and more exibility. Its easy. Its affordable.

    And its just what the doctor ordered.

    Go to http://sp.hotims.com and enter 36 for product information.

    Untitled-16 1 5/6/14 1:59 PM

  • 2 2 0 6 1 4 | S E C U R I T Y P R O D U C T S

    HOSPITAL SECURITY

    THE PRESCRIPTION FOR CURING ID BADGE ILLSIncreased control and advanced reporting are critical for a safe facilityBy Ann Geissler Timme

    Many hospitals are fi nding it necessary to increase the number of access controlled openings in their facilities. Whether its due to increased violence, additional privacy requirements or emer-gency preparedness, they are fi nding the need for increased control and advanced reporting a critical part of keeping their

    facilities safe. Parallel to this increased security is the need for more advanced cre-dentials to ensure the data being exchanged with every transaction is secure.

    In addition, a major value proposition for hospitals is to provide convenient and effi cient tools for their staff, especially their doctors. Since physicians often work in several locations, with each typically having a different type of access con-trol system, they are usually forced to obtain, carry and use a different credential at each hospital and clinic. Sometimes, they even need multiple credentials for one location. Ask a doctor what type of credential they would prefer to use and, in loud unity, they would reply, none.

    Healthcare organizations want to work with their physicians and staff to achieve the right balance between security and convenience. Most of them dont realize how easy that has actually become.

    CREDENTIALS ARE GETTING SMARTThere are a lot of credential choices out there, but its important that healthcare organizations do their homework and choose wisely. What might have been stan-dard technology in the past, may no longer provide them with the functionality

    and security they will need in the future. With the advent of smart and mobile credentials, the choice made now may not only affect access control applications, but many other aspects of daily life in a healthcare environment.

    Smart credentials provide healthcare organizations with a superior solution over other card products at approximately the same price as a proximity card. Smart cards increase the security of data and provide added convenience to the user. In addition, smart credentials allow for greater functionality by allowing users to use them for access control, logical access, payments and many other functions.

    By considering open architecture capabilities, hospitals can easily provide se-cure access for staff to more applications and add value to the many proprietary systems currently in the marketplace.

    Saying that a smart card is open architecture means that it is capable of ac-cepting customized keys for multiple, diversifi ed applications, regardless of whose application it is. This lets hospitals add applications on their own terms, expanding as slowly or as quickly as they like. Also, with memory options of 2K, 4K and 8K bytes, hospitals can get the memory they need, without paying for extra memory they dont.

    As Near Field Communication (NFC) technology is being added to a growing number of mobile handsets to enable access control and many other applications, more and more organizations, including healthcare, are considering joining the bring your own device (BYOD) trend and having staff members use their own smart phones as their access control credentials.

    0614sec_022_026_Timme_v3.indd 22 5/16/14 3:21 PM

  • Go to http://sp.hotims.com and enter 20 for product information.

    Untitled-1 1 5/15/14 2:55 PM

  • HOSPITAL SECURITY

    2 4

    To turn NFC-enabled smartphones into an access control credential, users sim-ply download an app to their smartphone. Then, their access control administra-tor uses the cloud service to send a secure mobile credential directly to the users phone. Once the mobile credential is downloaded, users open the app and tap their smart phone to the reader in the same way they use a card or fob.

    For many employees, including doctors, using their personal smart phone would be much easier than searching for a card. While a doctor could use a per-sonal smart phone to get into the various facilities served, the IT staff would have the confi dence that the data is being exchanged is encrypted and secure. Health-care organizations may want to start off using smart phones with their doctors only and later migrate their use with the rest of the staff, providing a choice of credentials that could be used.

    BYOD IS BECOMING A REALITY EVERYWHEREEach and every day, hospital staff are fi nding it easier to bring and use their per-sonal devices to work in the hospital. Of course, this is a double-edged sword. Em-ployees get to work on devices that they like and that are probably more advanced than what is issued to them through their IT department. Plus, instead of carrying around a variety of equipment, they get to choose the one device that works best for them.

    Although employees may wish to use their own device, IT teams need to ensure the security/encryption, which is needed for patient and organizational informa-tion, is strong, implementation is seamless, and management of software/applica-tions for all of these personal devices doesnt add vulnerability to the enterprise. IT professionals want strong authentication credentials, the level of security provided by smart credentials.

    Unlike proximity and magnetic stripe cards and their readers, smart credentials initiate a challenge and response sequence to initiate conversations with the net-

    work. These communications are encrypted using industry standard encryption techniques. By welcoming their involvement and showing the ability to speak their language and answer their questions, you will gain additional layers of approval within the IT organization.

    In todays world, a smartphone can act just like a smart card and can be used for access control and payments, simply extending the functionality of the phone. Any smart phone owner already sees this happening in their everyday life, using their phone for multiple purposes, from game playing or paying for coffee to im-portant work-related tasks. Today, college students and their campus card admin-istrators are using their phones to access their access control systems and pay for meals, laundry services and more.

    While the BYOD migration moves forward, there will be a mixed environment of cards and phones. With more and more NFC-enabled phones coming on the market, the shift to phones being used by the majority of people on a healthcare campus will ultimately follow.

    People prefer the convenience of using their phones instead of digging for their cards. Administrators fi nd that using smart phones as badges saves time that can be better spent on other issues. Assigning the credential to a phone takes less work than printing and delivering a badge.

    WHAT HEALTHCARE FACILITIES CAN DO NOWFor those facilities already using aptiQ multi-technology readers, there is no need to replace readers in order to migrate to smart cards, smart phones or a combination of the two. These readers currently work with magnetic stripe, proximity and smart cards as well as NFC-enabled mobile phone credentials all in one reader, providing an easy migration path to upgrade credentials between any of those versions at their own pace.

    If non-smart access technology is being used today, multi-technology readers should still be installed to help ease future transitions by reading the different types of

    Go to sp.hotims.com and enter 35 for product information.

    0614sec_022_026_Timme_v3.indd 24 5/16/14 3:21 PM

  • www.infinias.com | 800.691.8974Engineered by

    Access Control, Meet Video

    Access Control + Video on a Single Platform infinias 100% IP-based access control and video management systems bring all your doors and video to a single platform. Made possible by the all-in-one Intelli-M Access NVR, you can manage and configure both video and access control from one browser-based UI. infinias continues to bring together the features and capabilities that make access control and video management simple and convenient.

    A C t l Vid Si l P

    All-in-one access control plus video management server

    Go to http://sp.hotims.com and enter 26 for product information.

    Untitled-9 1 5/13/14 4:30 PM

  • HOSPITAL SECURITY

    2 6 0 6 1 4 | S E C U R I T Y P R O D U C T S

    cards and smart phones at the same time.Organizations wanting to use NFC-

    enabled smartphones as their access control credentials can begin the transi-tion now. The recently introduced aptiQ-mobile secure peer-to-peer (P2P) NFC mode lets organizations provide the con-

    venience of using a mobile device today.This secure peer-to-peer solution

    provides several advantages. It lets orga-nizations implement mobile credentials ahead of the market by using Android NFC-enabled phones and Apple iPhones with a special case that enables NFC re-

    gardless of choice of carriers. But, for many, its most important advantage is that it lets healthcare facilities provide their physicians and staff a convenient credential that is easy to use for access control and many other applications.

    It is important that healthcare or-

    ganizations be prepared for smart card and NFC mobile credentials, even if that facility wants to still use proximity, magnetic stripe or keypad technology at present. If new readers are needed, they should select multi-technology readers that combine the ability to read all of these credential technologies in a single unit. That way, when the organiza-tion switches over to smart credentials, there will be no reason to tear out the old readers to install smart card readers. During the transition, the facility can use both their old magnetic stripe and proximity credentials and the new smart cre-dentials.

    Ann Geissler Timme is the healthcare market-ing manager at Allegion.

    Theres more to Dedicated Micros... ask about our Video Smoke Detection products...

    Cal l 1-877-367-8778 or v is i twww.dm-networkvideo.com

    Installation benets:

    Fast to install: built in 16 port Layer 3 POE (Closed IPTV) switch

    Easy to expand: up to 32 cameras

    Auto detection and self conguration: of DMs CamVu IP cameras and PTZ domes

    Starts recording with no further configuration

    Same local and remote configuration and user interface

    Secure lock down of IP cameras with unique key applied, to avoid network vulnerability

    End user and operator benets:

    Corporate network segregation and security through dual IP addressing scheme

    High denition HDMI local display output and local joystick PTZ keyboard

    Internal storage capacity up to 6TB, expandable via USB

    Built in DVD writer and USB ports for evidence retrieval

    Control this and unlimited NetVu Connected systems through NetVu ObserVer video management software

    High definition, secure, plug and play IP network video recorder for smaller IP video installations.

    Introducing the NVR MEDIA SERVER

    This solution is

    available directly from

    DM Network Video

    Copyright AD Group 30th October 2013

    Go to sp.hotims.com and enter 16 for product information.

    As healthcare fa-cilities grow larger and provide round-the-clock care they become more vul-nerable to a wider array of security

    risks and vulnerabilities. Healthcare administration must monitor patient, employee, and visitor traffi c; secure expensive medical equipment and medications; insulate the organiza-tion from potential liability claims; improve operating effi ciencies; reduce administrative costs; and comply with state and national regulatory guide-lines such as HIPAA. Video Manage-ment Software (VMS) solutions play an important part in healthcare facil-ity security processes, particularly the ability to quickly access live and re-corded video. Because its the respon-sibility of each individual hospital and healthcare organization to decide on the right tools to meet specifi c needs, administrators are charged with choosing a proper VMS solution that has work effi ciently with the existing network infrastructure and processes like access control, while also taking into account future needs.

    James Whitcomb, CTO at Video Insight

    0614sec_022_026_Timme_v3.indd 26 5/16/14 3:21 PM

  • Mercury Platinum Elite Partners: your valued source for Authentic Mercury.

    Give your access control solution wings.2014 Mercury Security Corporation

    Whats in a box?

    The legacy that 22 years of leadership brings.

    The reassurance of the most proven subsystem in the industry.

    The knowledge that what is supposed to work, always works.

    The quality that comes from an ethic of pride in engineering.

    And thanks to the exibility of an open platform,

    the promise that we will never build obsolescence,

    or force our partners

    into a box.

    Go to http://sp.hotims.com and enter 23 for product information.

    Untitled-4 1 5/7/14 10:57 AM

  • Compiled by Compiled by Lindsay Page, Senior Editor

    2 8 0 6 1 4 | S E C U R I T Y P R O D U C T S

    2014 SIA SHOWCASE AWARDS

    Best New Product

    Building IntelligenceSV3-Vehicle

    Expanding on access management, SV3 is the next generation in vehicle access management for both entry points and loading docks. As Vehicles, visitors, and vendors pose several critical risks that should not be ignored. SV3 provides the means to manage these risks. SV3 enhances pro-cesses and workfl ows that promote the screening and pre-registration of visitors, vehicles, drivers and vendor companies. This combination of ser-vices provides a signifi cant deterrence to terror-ism, theft and abuse by vendors. Along with the operational effi ciencies that SV3 generates, SV3 provides real-time reports on access, throughput and usage. Upon arrival of the vehicle, SV3 cap-tures the vehicle and driver identity and validates that it is on schedule. The system alternatively may be deployed in a discovery mode such that it as-sociates new vehicles and drivers as they arrive for the fi rst time, and identifi es them accurately on future returns. Building Intelligence.

    Go to sp.hotims.com and enter 300 for product information.

    Judges Choice Award

    dFENCEdFENCE

    dFENCEis a movable ballistic resistant barrier tak-ing the form of an aestheticallymodern and func-tional shelving unit at all other times. The dFENCE unit can be moved easily into place on its inbuilt multi-directional wheels during an armed intrusion with no pre-preparation of the defensive position. Once in the desired position, the dFENCE unit is simply locked into place in front of a door or in the defensive position to provide a ballistic resistant and diffi cult to circumvent barrier. The dFENCE shelving system provides an important time and space factor to help survive such an incident and

    allow emergency services time to respond. The dFENCE unit provides a cost effective, fl exible so-lution instead of expensive retrofi tting of doors, wall and windows of facilities. dFENCE.

    Go to sp.hotims.com and enter 301 for product information.

    Access Control Hardware and Software

    FST21 America Inc.SafeI

    FST21s SafeI is a fully integrated access control controller that delivers advanced, secure and con-venient In Motion Identifi cation access control. SafeI allows approved users access through a fu-sion of biometric recognition, voice and license plate recognition in a more compact version of the SafeRise server and is designed to support one In Motion Identifi cation access point. The controller comes in a standalone plug and play enclosure, and can be easily installed in any secured location. All peripheral devicesfrom the electronic door lock and door positioning switch to the recognition camera, RFID reader, intercom and feedback sig-naling deviceconnect directly to the SafeI. Au-thorized entry is granted instantly and simply by walking to the access point. FST21 America Inc.

    Go to sp.hotims.com and enter 302 for product information.

    Honorable Mention in Access Control

    Hardware and Software

    IDenticard Access ControlRack Armor

    The RACK ARMOR server protection system is a patent-pending physical security solution that se-

    cures and monitors server rack access at the cabinet level. The system features easy-to-use dynamic mapping and customizable reporting ca-pabilities to identify and track who accesses serv-er racks and specifi cally where, when and for how long access takes place. Consisting of innovative software and hardware to improve security of physical data systems, RACK ARMOR server pro-tection provides a complete solution for controlling access and monitoring the security status of serv-er racks, thus protecting valuable data at its source. The rack action screen provides instant verifi cation of the security status for both front and back doors of each cabinet and rack access panel. IDenticard Access Control.

    Go to sp.hotims.com and enter 303 for product information.

    Access Control Products Wireless

    Securitron Magnalock Corp.Securitron R100 Surface Mounted

    Wireless Reader

    The Securitron R100 surface mounted wireless reader and pre-paired Aperio hub allows users to extend access control to glass, stone, granite and marble entryways. The easy-to-install wireless reader requires no drilling or pulling of wires and adheres quickly to the outside of a glass door. Glass entryways can integrate robust access con-trol while maintaining a clean, wireless appear-ance. The reader uses existing ID badges, so there are no keys to control or replace and no codes to secure or remember. The product is also easy to install and uses environmentally sealed electron-ics that provide protection from moisture, heat and cold. Two models are available to support low or high frequency cards. Securitron Magnalock Corp.

    Go to sp.hotims.com and enter 304 for product information.

    Biometrics, Identifi cation and Credentialing

    MorphoTrakMorphoAccess SIGMA Series

    MorphoAccess SIGMA Series biometric access reader combines three powerful attributes that ul-timately contributed to winning the award: Indus-

    try leading genuine 100K user 1:MANY matcher, leveraging Morphos long history of biometric ex-pertise, leadership and NIST#1 ranked algorithms; more than a decade of support for legacy enroll-ments (databases) created in both Morpho and Bioscrypt product lines, respecting faithful cus-tomers and rewarding them for their business by ensuring a smooth transition to the latest and most powerful technology available; incorporating true value-added capabilities on the SIGMA to take the product well beyond traditional access control be-havior. The reader features true tablet-like inter-face and usability; a media and messaging plat-form for video content, audio messages and more. MorphoTrak.

    Go to sp.hotims.com and enter 305 for product information.

    Honorable Mention in Biometrics, Identifi cation

    and Credentialing

    Zwipe ASContactless Smart Credential

    Zwipes contactless smart credential is a next-generation biometric card with on-card fi ngerprint reading. The quickly reads the users fi ngerprint in less than a second and eliminates the problems of solely deploying PINs and standard cards. The on-card fi ngerprint scanner with 3D capacitive tech-nology resides on the contactless smart card which has universal compatibility with all ISO 14443 readers, including aptiQ, iCLASS SE and other leading brands. Fingerprint data is captured by the on-card fi ngerprint scanner and is thereaf-ter encrypted and stored only inside the card. When a positive match occurs, the Zwipe biomet-ric card will activate encrypted communication with the lock or reader in the same way as other ISO 14443 contactless smart cards. Zwipe AS.

    Go to sp.hotims.com and enter 306 for product information.

    Commercial and Monitoring Solutions

    Resolution Products Inc.Interactive Gateway Modules

    The Interactive Gateway Modules, released by Resolution Products in 2013, are a line of plug-and-play devices which allow new services to be added to most existing alarm panel hardware. By adding a gateway module to a legacy alarm panel,

    The Security Industry Associations (SIA) New Product Showcase was established in 1979 to recognize innovative products, services and solutions in electronic physical security. Technologies showcased are used in the protection of life and property in residential, commercial and institutional settings.

    Each year at ISC West, the NPS program recognizes winners in several product and service categories and presents the Best New

    Product, Judges Choice awards, and also awards honorable mentions in various categories. This year, the Best New Product Award went to Building Intelligences SV3-Vehicle.

    0614sec_028_034_sia_v4.indd 28 5/16/14 3:43 PM

  • (866) 533-6216www.avalanwireless.com

    Leaders in Wireless IP Video Connectivity

    Call today for your FREE ZLUHOHVVVXUYHLOODQFHQHWZRUNFRQJXUDWLRQ

    NEW: Maximum legal transmit power - 1 Watt

    NEW: LEDs showing signal quality, Ethernet link, network activity and power

    NEW: Built in lightning arrestors

    Line of Sight Range up to 30 miles

    3-Port POE out 802.3at option

    TRY OUR NEW HIGH SPEED, LINE-OF-SIGHT300 MBPS ETHERNET SOLUTIONS

    SECURE WIRELESS SOLUTIONS FOR INDUSTRIAL APPLICATIONS

    Go to http://sp.hotims.com and enter 11 for product information

    Untitled-8 1 4/1/14 1:17 PM

  • 2014 SIA SHOWCASE AWARDS

    3 0 0 6 1 4 | S E C U R I T Y P R O D U C T S

    alarm dealers and other security providers can as-sume control over the panels hardware and offer services to customers such as event notifi cations and interactive home control services. Each Gate-way module connects to the existing alarm panels keypad bus, requiring no additional hardware. Once installed, the Gateway connects to other de-vices in or around the home wirelessly, via Z-wave technology. The Gateway modules are available in GSM, WiFi, and Ethernet-based versions, and are available today. Resolution Products Inc.

    Go to sp.hotims.com and enter 307 for product information.

    Convergence and Integrated Software

    and Solutions

    IDV Solutions Visual Command Center v3

    The Visual Command Center v3 empowers organi-zations to protect their people, facilities, and op-erations against real or potential threats. It moni-tors real-time risk events such as acts of terrorism, weather, hazardous materials, as well as data from other sources, such as Web feeds or internal and external systems including physical security de-vices. When a risk is detected near an asset or employee location, Visual Command Center auto-matically generates an alert. Operators can use powerful visualization, fi ltering, and query tools to rapidly assess the threat, and then act to mitigate risk. The v3 will provide enhanced alerting for se-vere weather, new alerts for cyber security issues, and updates to the softwares Twitter visualization tool. IDV Solutions.

    Go to sp.hotims.com and enter 308 for product information.

    Emergency Communications

    Systems

    Eatons Cooper Notifi cationALERiTY

    Through advanced programming interfaces, ALERiTY offers full-featured, bi-directional in-teroperability, integrating with other systems, software and devices for enhanced situational awareness. Examples include fi re alarm control panels (FACP), chemical sensors, detection sys-tems and paging systems. The WoIP mass notifi -cation network is comprised of a collection of se-cure, robust and reliable Ethernet communication devices, IP Communicators (IPC). This enterprise

    system solution allows organizations to leverage their Local Area Network (LAN) or utilize the IPC private network to send audible, visual and data messages. This systems also allows multiple sites and facilities located anywhere in the world to be tied together through a Web-client Graphical User Interface (GUI) for managing global notifi cation and system monitoring. The system redundancy allows multiple users to be simultaneously logged into the system for additional points