sp_1406dgd
DESCRIPTION
SECURITY PRODUCTS 06/2014TRANSCRIPT
-
www.security-today.com
Integrated New Product and Technology Solutions for Security Professionals June 2014 Vol. 18, No. 6
4K Ultra HD Superior identifi cationThe DINION IP ultra 8000 MP delivers a tremendous advantage in detail capture, even when moving objects and challenging light-
ing pervade the scene. The camera features intelligent Dynamic Noise Reduction to minimize bit rates and lower bandwidth and storage requirements up to 50 percentreducing system costs and network strain. Ideal for tracking people, the camera captures facial characteristics, numbers and large area surveillance. Bosch Security Systems Inc.Go to sp.hotims.com and enter number 350 for product information.
QuickTrack with AudioApplication gives loss prevention another avenue of helpQuickTrack allows users to track an event by dragging and dropping video feeds into the QuickTrack camera location on their monitor and captures the video and audio recording for playback as a single video feed. Quick-Track allows loss prevention and other security professionals to record live investigations across multiple cameras which can later be reviewed and exported as a single video clip. The system is innovative and user friendly, and takes the guess work out of creating forensic video clips for use in investigations. This feature is scalable across the enterprise and provides technical advances not available from other VMS vendors. Salient Systems.Go to sp.hotims.com and enter number 351 for product information.
New Waterfl ow DetectorWith easy to see, feel and set timer dialSystem Sensors fully redesigned waterfl ow detector line includes high-contrast numbering and tactile markers on the timer dial, so installing professionals can ac-curately set the timer by sight or touch, which is a must when detectors are installed in hard-to-reach or dark, recessed spaces. The new easy to see, feel and set timer dial is just one of many new features that will convince you to Keep It System Sen-sor with waterfl ow detection. System Sensor.
Go to sp.hotims.com and enter number 352 for product information.
JVC Megapixel PTZ Camera Sets new benchmark in color reproductionJVCs VN-H657U PTZ HD Megapixel Camera has an 18X optical zoom lens and 10X electronic zoomtotal 180X zoom capabilityplus a 2-megapixel sen-sor for real-time and forensic viewing. With JVCs exclusive Super LoLux HD processing for superior low light images and color Day/Night operation; H.264/JPEG dual streaming; direct drive for positioning accuracy and reliability; 3D noise reduction; online set-up; multicasting for 20 simultaneous users; PoE+ compatibility and more. The camera also meets ONVIF Profi le S specifi cations. JVC.Go to sp.hotims.com and enter number 353 for product information.
960H TechnologyRecord what youve been missing960H, the highest resolution in analog technology avail-able today, allows cameras and DVRs to capture up to 700TVLnearly 30 percent over D1 resolu-tion resulting in signifi cantly enhanced picture detail.Specos DS DVR enhances recording quality of existing installations and is backward compatible with D1 cameras and DVRs. the product is available in 8 and 16 channels, standard desktop or wall mount models for covert or small footprint applications.A full line of 960H cameras, including Specos exclusive, award winning Intensifi er3 technology are also available. Speco Technologies.Go to sp.hotims.com and enter number 354 for product information.
Multimode to Singlemode Fiber ConvertersNew 50P Series accommodates integration of new/existing fi ber infrastructure
afi s 50P Multimode to Singlemode Fiber Converters provide bi-direc-tional communications are designed to increase network compatibility
between Multimode and Singlemode devices at each end of long-distance singlemode fi ber links. The units feature optical link LED diagnostics indicators for instant visual status confi rmation, and are available in a variety of confi gurations with one or two ports and SC or ST connectors. afi .Go to sp.hotims.com and enter number 355 for product information.
New EnterprisePlus LCD UPS3-year warranty with non-prorated battery coverageMinuteman UPS has introduced the all-new EnterprisePlus LCD battery backup systems that provide an unbeatable combination of features and value, making them the ideal solution for security rack installations of all sizes. An LCD status display, automatic voltage regulation hardware, 5 VA ratings, and the option to choose stan-dard or extended runtime capability mean that security managers have more options than ever for protecting vital cameras, DVR/NVRs, access control systems, fi re alarms and more. The system is backed by a 3-year warranty that includes non-prorated battery coverage. Minuteman UPS.Go to sp.hotims.com and enter number 356 for product information.
Learn more about Wide Dynamic Range www.axis.com/imageusability
2
014
Alle
gion
I sometimes forget my keys, ID card or wallet,
but I never forget my phone.
Are you ready? Finally, you can use a smart phone just like an ID cardmade possible by aptiQmobile and Near Field Communication (NFC). The next generation in access control technology.
Can it open doors? Yes! Can I use it to buy a late night snack? Sure! Can you say goodbye to lost cards? You bet!No really. Its that awesome. Call 877-926-5285 today to learn more.
Learn more at: allegion.com/us
0614sec_c1_v3.indd 1 5/16/14 4:08 PM
-
Thats because Axis network cameras with Wide Dynamic Range technology can handle bright lights and dark shadows in the same image. And that means its easier to spot and identify people, vehicles and incidents, no matter how awkward the lighting conditions. WDR makes life simple for your security manager customers.
To learn more about WDR, image usability and the surveillance solution thats right for your customers, visit the Axis interactive guide at www.axis.com/imageusability
Whats the best way to handle light and shade?Simultaneously.
Distributed by:
Count on it.
g yeractive guide attomers, visit the AxAxis inte
eusability
Visit Axis at ESX:www.axis.com/events/us
Booth #117June 24-25
Nashville, TN
Go to http://sp.hotims.com and enter 4 for product information.
Untitled-4 1 3/28/14 11:11 AM
-
Conservation. Protecting the wildlife of South Africas Kruger National Park from poachers was once an impossible challenge.
But today the park uses Milestone XProtect Enterprise and integrates license plate recognition to track poachers
vehicles from one central location. Proving again that Milestone can solve problems
that are more than security.
Milestone XProtect is the worlds leading IP video surveillance management software and is reliable, future proof and easy to use. It supports the widest choice in cameras and seamlessly integrates with business and security solutions such as license plate recognition. Which means your possibilities are unlimited and you can keep your security options open. See our new products and the new ways to use XProtect at: www.milestonesys.com
Milestone Systems U.S.Tel: 503 350 1100
Go to http://sp.hotims.com and enter 24 for product information.
Untitled-9 1 5/13/14 4:25 PM
-
www.security-today.com CONTENTS JUNE 2014
4 0 6 1 4 | S E C U R I T Y P R O D U C T S
FEATURES
Retail Security 14Putting an LP Spin on Video AnalyticsWhich analytics can give you a quick heads up on potential loss activity?By Jackie Andersen
Improving Employee RelationsInstalling audio solutions may help deter theftBy Richard Brent
Hospital Security 22The Prescription for Curing ID Badge IllsIncreased control and advanced reporting are critical for a safe facilityBy Ann Geissler Timme
Fire/Alarm Solutions 36Fire Alarm Prescription Increases Hospital ProtectionNew facility cuts no corners in offering protectionBy Beth Welch
Access Control 42Upgrading ElectronicsNew Jersey school improves its locking systemBy April Dalton-Noblitt
Power over Ethernet 44Media ConversionChoosing the right backboneBy Susan Stanley
Cargo Security 46Cargo Security Meets LogisticsCommercial air freight shares common infrastructure access with aircraft securityBy Manish Dalal
PRODUCT SECTIONS
SIA Showcase Awards 28
DEPARTMENTS
Industry Focus 8Hiding in a Wheel WellBy Ralph C. Jensen
Industry Vertical 10Security Solutions for the Past, Present and Everything in BetweenInnovative technologies rely on past success to enhance the security marketBy Jamie Friedlander
Top Picks 12
New Products 48
Advertisers Index 65
Industry Professional 66The Man Behind the RevolutionHard work proven to be the pinnacle of successBy Wendy Bowman
Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.
Copyright 2014 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission.Mail requests to Permissions Editor, c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254
The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the readers sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.
0614sec_004_TOC_v1.indd 4 5/16/14 3:16 PM
-
Go to http://sp.hotims.com and enter 28 for product information.
Untitled-9 1 5/13/14 4:36 PM
-
6 0 6 1 4 | S E C U R I T Y P R O D U C T S
The Growing Popularity of Biometrics
Online fraud and identity theft con-tinue to be common occurrences, but biometrics is becoming more popular as a way to combat such crimes. Our most recent Online Exclusives discuss how biometrics can be used for access control, even at ATMs.
As Robert Laughlin mentions in his article, access control must continually become more integrated and scalable, providing users with new functionality that will improve overall situational awareness and security. I look forward to the day when we can sim-ply use our fi ngerprints to access our bank accounts, pay our bills, and possibly to enter our homes.
If youre interested in contributing to our Online Exclusives or our blog, please contact me at [email protected] or 972-687-6784.
Best Regards,
Lindsay Page
Online Exclusives
Bringing More Value to Business Solutions with Access ControlBy Robert Laughlin
Access control continues to evolve as a core ele-ment of professional security. From small systems to enterprise solutions spanning multiple locations around the globe, controlling access is central to the very concept of securing an environment. With the landscape for security changing as rapidly as new technology can be introduced, access control must continually become more integrated and scalable, providing users with new functionality that will im-prove overall situational awareness and security.
Biometrics at the ATM: You Can Bank On ItBy Bill Spence
Whos transacting? This timeless question has be-come more complicated in recent years for the bank-ing industry. A typical bank customer visits an ATM a few times a week and only rarely pays a visit to a human teller. In todays anonymous landscape, how does the bank know whos transacting? More and more often at banks around the world, the answer is fi ngerprint authentication.
When Online Fraud Targets YouBy Eileen Turner
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on remov-ing the malware. Customers will continue to browse to specifi c sites and access infected content, whether they know they are doing it or not. Because of this,
its critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
http://security-today.com/01131
Recent Headlines
Proof of Presence to Eliminate Billing Fraud from Home Health Market
Trick Surveillance Cameras by Wearing Artists Face Mask
Teen Plotted to Bomb Schools and Open Fire on Students
No Drones Allowed at Yosemite National Park
http://security-today.com/news
Upcoming Webinars
The Importance of Personnel Surety for Critical InfrastructureThis webinar is an overview of the personnel surety measures that can help facilities achieve CIP and CFATS regulatory compliance.
Leveraging Security Analytics to Add Value to the Bottom LineJoin us for this FREE webinar to understand how leveraging security analytics can provide new op-portunities to improve the effi ciency of day-to-day operations and the effectiveness of strategic planning when armed with the capabilities and technologies to transform huge amounts of transactional physical access data into actionable insights.
Critical Components for K-12 Safety and SecurityJoin this school safety and security webinar to under-stand school administrators concerns and plausible responses to security within a K-12 environment.
To view these Webinars at any time, please visit http://security-today.com/webinars.
REACTION Blog Recent Posts
TSA Uses App to Speed Up Security Lines
NRA Looks to Ban Smart Guns
Gunman Opens Fire at FedEx in Georgia
Members of our staff and guest bloggers take advan-tage of REACTION to add their own perspectives on a broad range of security topics and issues. If youd like to be a contributor, please contact Associate Content Editor, Ginger Hill at [email protected].
Online Communities
Follow us on Twitter: www.twitter.com/SecProds
Become a fan on Facebook:http://www.facebook.com/secprodonline
Pin with Us:http://pinterest.com/securitytoday/
Featuring our exclusive integrated sun shield and universal mounting
bracket (included).
PROTECT YOUR EQUIPMENT FROM THE ELEMENTS WITH
Marine Grade Aluminum EnclosuresNEMA 3 & 4
GO THE DISTANCE WITH
Transmits 2, 4 or 8 cameras and PTZ datareal-time on one ber up to 2 miles.
FIBER MODEMS
www.armorlogix.com(904) 674-2976
Go to sp.hotims.com and enter 3 for product information.
0614sec_006_eTOC_v2.indd 6 5/16/14 3:17 PM
-
www.icrealtime.com866.997.9009
Brand-newdealer portal.**
You talked.We listened.
*
Lifetime technical support.Unparalleled
customer support.
Track all ordersInventory managementAccount informationBilling
*excluding hard drives**coming third quarter of 2014
Go to http://sp.hotims.com and enter 6 for product information.
Untitled-2 1 3/13/14 10:39 AM
-
INDUSTRYFOCUS By Ralph C. Jensen, Editor-in-Chief
www.security-today.com
Volume 18, No. 6
EDITORIAL STAFF
Editor-in-Chief/Associate Publisher Ralph C. Jensen
E-news Editor Brent Dirks
Senior Editor Lindsay Page
Content Development Team Ginger Hill
Jamie Friedlander
ART STAFF
Art Director Dale Chinn
PRODUCTION STAFF
Director, Print and Online Production David Seymour
Production Coordinator Teresa Antonio
EDITORIAL ADVISORY BOARD
Frank Defi na, Samsung Techwin America, Ridgefi eld Park, N.J.
William Crews, CPP, CHS I, INVISTA, Houston
Charles Chamberlain, Missouri Lottery, Jefferson City, Mo.
Kimberly Kuhn, Tyco, Lexington, Mass.
Merlin Guilbeau, Electronic Security Association, Irving, Texas
Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston
SALES
Randy Easton 678-401-5543
Brian Rendine 972-687-6761
Sam Baird +44 1883 715 697
Jane Dai +86-755-26289889
Peter Kao +886-2-2949-6412
SECURITY, SAFETY, AND HEALTH GROUP
President & Group Publisher Kevin OGrady
Group Circulation Director Margaret Perry
Group Marketing Director Susan May
Group Website Manager Scott Newhouse
Group Webinar Administrator Tammy Renne
President & Chief Executive Offi cer Neal Vitale
Senior Vice President & Chief Financial Offi cer Richard Vitale
Executive Vice President Michael J. Valenti
Vice President, Finance & Administration Christopher M. Coates
Vice President, Erik A. LindgrenInformation Technology & Application Development
Vice President, Event Operations David F. Myers
Chairman of the Board Jeffrey S. Klein
REACHING THE STAFF
Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.
E-mail: To e-mail any member of the staff, please use thefollowing form: [email protected]
Dallas Offi ce (weekdays, 8:30 a.m. 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254
Corporate Offi ce (weekdays, 8:30 a.m. 5:30 p.m. PT)Telephone (818) 814-5200; Fax (818) 734-15229201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311
8 0 6 1 4 | S E C U R I T Y P R O D U C T S
Hiding in a Wheel WellIt is a well-known fact that video surveillance cameras can help detect trespassers; however, if no one is looking at the surveillance or if the hu-man element has not been notifi ed of a breach, tres-passing can leap to new heights.
Case in point is a 16-year-old runaway from San Jose, Calif. who argues with his father, runs to the nearby airport and stows away in the front landing gear of a Boeing 767 headed for Maui, Hawaii. Its not like this happens every day, so when a teenager (who at this writing remains unidentifi ed) is so deter-mined to leave the United States and get to Somalia to visit his mother, this generates news.
How could he not have been caught? Was security asleep at the wheel? Were the video surveillance cam-eras not properly maintained? Or, worse yet, was no one looking at the images? Also part of the mystery is how the boy survived the fi ve-hour fl ight.
Surveillance cameras at San Jose International Airport did capture images of the teenager on the tar-mac and climbing into the nose gear of the airplane. So, for those who question if this really happened, it would seem that the boy did enter the plane. But, what about the cameras on the perimeter of the tar-mac? Shouldnt his entry at the perimeter have been caught and properly dealt with?
According to John Nance, an ABC News aviation consultant, the weak link is at the perimeter, or the fence, in this case.
Security was not as effective as expected, he said.The use of cameras in this situation was a failure
because no one noticed the security breach until the plane, and the stowaway, landed in Hawaii.
We all know there is technology available that can be programmed to sound an alert when a line of se-curity has been breached or when there is something that seems potentially suspicious. Implementation of analytics software would probably have successfully alerted offi cials of the breach, stopping the youth from slipping past layers of security.
Just because something is caught on camera, though, it doesnt mean it will make an impression; yet, once the boy climbed down from the wheel well in Maui, a defi nite impression was made.
With proper security in place and with the human element being alerted, there still is no guarantee that the youth would have been detected, even though the chances do increase dramatically.
Sometimes the actual results are quite under-whelming when it gets to the real world, where people are fatigued; people are preoccupied, said Richard Bloom, an airport security expert at Embry Riddle Aeronautical University in Arizona. There is no way to guarantee security, even if you had one person per video screen.
While security offi cials at San Jose International Airport are reviewing how the boy slipped onto se-cure airport property, there has been no indication that those same offi cials will step up security or police presence at the site, though improvements are expect-ed once a review has been completed. The question remains how the boy was able to scale a fence with barbed wire without injury, and not be detected by German shepherd dogs and Segway-riding police offi -cers. Problem is, not all sections of fencing around the airport have barbed wire, and the youth approached the plane during the early morning hour of 1 a.m.
The fact remains that security still has its weak-nesses, despite the billions of dollars spent.
Skeptics believe the boy really didnt make the fl ight, but there is video surveillance showing the youth climbing out of the wheel well once the fl ight landed in Kahului International Airport in Maui. He also was found wandering the tarmac at the airport. I suppose if there is a will, there is a way to make some-thing happen. While the boy didnt have malicious intent, there are the what ifs of someone else with malevolent designs.
On the fl ip side of this security question, the Fed-eral Aviation Administration said that about one-fourth of the 105 stowaways worldwide have survived. It is a remarkable tale that this fella was able to live through the ordeal. Many people have died trying this free ride, if not for the unbearable conditions of altitude, fi ghting cold, deadly temperatures and lack of oxygen, then for the fact that when the wheel well opens on its glide path to the runway, a body typically falls out.
The fact that this boy is still alive is curious. California runs the airports in the state, and there
are some serious questions being asked and others that need answers. I hope this serves as a wake-up call for all airports nationwide and that security directors will review their multiple layers of security.
0614sec_008_IndFocus_v3.indd 8 5/16/14 3:18 PM
-
Go to http://sp.hotims.com and enter 34 for product information.
Untitled-3 1 5/16/14 2:13 PM
-
1 0 0 6 1 4 | S E C U R I T Y P R O D U C T S
Operating in the United Kingdom and America for over 30 years, surveil-lance technology com-pany Dedicated Micros
continues to innovate on a regular basis. The company ensures its customersboth old and newtransition to HD in a way that works best for their company while also realizing that users are pri-marily looking for an exceptional return on their investment.
Dedicated Micros designs and manu-factures cameras and recording equip-ment that can be seen in a variety of installations, from transportation, to re-tail, to education. The company has also pioneered various technologies, such as closed IP network security, and has di-versifi ed into using multi-mode record-ing, making Dedicated Micros a security company to look out for in the future.
Closed IP Network SecurityAccording to Pauline Norstrom, the vice president and marketing director at Dedicated Micros and the COO at the AD Group, the invention of closed IP network security is arguably the most im-portant part of this companys portfolio.
The key advancement in the Dedi-cated Micros portfolio is the invention of the closed IP network security fea-ture, said Norstrom. Not only does this ensure that end users can have one hundred percent peace of mind, but that IP cameras are one hundred percent safe and trusted.
In addition to being safe and secure, the closed IP network security feature is
also cost-effective and easy-to-use. The installers and integrators
who put this together can confi gure the system automatically without hav-ing to use highly-skilled labor, which is not only a benefi t for installers and integrators, its a benefi t for the user in that once they start using the sys-tem; the skill of the labor involved is much lower.
Another benefi t of the closed IP network security feature is that users do not have to re-license their cameras.
Dedicated Micros sets itself apart from other companies by addressing the fact that analog cameras cannot be fully phased out quite yet. Dedicated Micros has created technologies that help make the transition from analog to HD less drastic and more cost effi cient.
The customers who have been in the analog market are taking a long time to transition into IP, said Norstrom, add-ing that closed IP network security helps make the transition easier. However, once theyve seen the closed IP system, it enables them to offer IP cameras to their customers without the retraining of installation teams.
Product LineDedicated Micros product line includes a handful of solutions that help make the transition from analog to digital easier. Two of these products include the Hybrid IP Video Solution and the NVR Cloud Solution.
Hybrid IP Video Solution. Most us-ers cannot make the jump from analog to HD in one swift move. Therefore, this solution enables an incremental upgrade to an HD solution while allowing the customers to get the most for their mon-ey by letting their analog cameras, which can last for 10 to 12 years, approach their end of life. The solution is ideal for ap-plications in small businesses, retail, edu-cation and small manufacturing.
The Hybrid IP Video Solution is a transitional product that enables users who have invested a great deal in analog systems to continue using their analog cameras, because in many cases, analog cameras outlive the recording device, said Norstrom. During the life of the system, there is going to come a point when the recording device has to become upgraded, but the user cant afford the update and moves to a high resolution IP camera system estate. So, they want to use those analog cameras for a bit lon-ger. And, weve found that by switching to one of the hybrid systems, they can retain their analog cameras, and they gradually update the estate to include IP cameras in which one system will man-age both from the same user and space.
Cloud NVR Solution. This product ac-counts for the variety that exists among video security users by offering fail-safe architecture that can be managed seam-lessly through a single user interface. It can also be replicated at multiple loca-tions on a property, campus or estate. Ideally designed for use in multi-site or multi-fl oor buildings, the Cloud NVR Solution includes lower maintenance budgets, fl exibility, the option for remote hosting and more.
The Cloud NVR Solution uses the closed IP system, which enables IP cam-eras to be confi gured and secure lines to be set up with very little programming, said Norstrom. The cameras are confi g-ured from a remote location, so it is very easy to actually deploy a multiple cam-era system.
The system, according to Norstrom, also allows the user to deploy in a secure, private cloud security system that gives them complete trust in the secureness of the IP cameras being used.
Multi-mode RecordingDedicated Micros has developed multi-mode recording over the last few years. During the time when users primar-ily used analog video, a major problem was an abundance of tapes that did not contain relevant footage. Multi-mode re-cording eliminates this problem by using video cameras that only use high-res cap-turing when action occurs on the video.
Multi-mode recording was invented to help analog systems reduce their num-ber of tapes, said Norstrom. When hard drives came out, they were very small and it wasnt possible to store a lot of data on them, so we solved this problem by cre-ating a way of recording video such that you can have a very low resolution for background recording when nothings happening. And, based on event triggers and analytics, we can up the resolution re-cord rate to ensure the critical aspects of the eventthe face shot, the identifying shotare actually captured.
Multi-mode recording has been a technology used in Dedicated Micros portfolio for quite some time. When HD video became mainstream, many users
Security Solutions for the Past, Present and Everything In BetweenInnovative technologies rely on past success to enhance the security market. By Jamie Friedlander
Jamie Friedlander is an associate content editor at Security Products magazine.
0614sec_010_011_IndVert_v3.indd 10 5/16/14 3:19 PM
-
W W W . S E C U R I T Y - T O D A Y. C O M 1 1
did not fully understand the storage problem they were going to face, and multi-mode recording helped them deal with this storage problem.
ImplementationsThough Dedicated Micros can be seen in retail, small business, education, fi -nance and hospitality sectors, they have recently diversifi ed into other sectors.
Were very strong in the transpor-tation sector because we have a rugge-dized recording solution for buses and trains which is combined with a pow-erful video management system, said Norstrom. Its probably a little known fact, but were very strong in this sec-tor because it doesnt go anywhere near the traditional installer base. It involves specialized sizes and typically working with the actual bus manufacturers.
Dedicated Micros has diversifi ed into the transportation sector in the UK and the political sector in the Unit-ed States. Though the companys high-profi le clients cannot be publicized, Norstrom said that the installations are in areas that secure high-profi le politi-cians, and the feedback from these cli-ents has been pronounced.
A Look to the FutureWhat makes Dedicated Micros unique, according to Norstrom, is that the com-pany has a completely harmonized vid-eo system in which all the products work in the same way. The interface works with all productsincluding the older, legacy productswhich ensure that cost of ownership remains constant.
In terms of cost of ownership and the upgrade of an estate, there is a sig-nifi cant benefi t in choosing Dedicated Micros because we commit long-term to our customers and ensure that we provide support not just through our people, but also for the legacy estate of the product, said Norstrom. And that solution is provided free of licenses, so if you choose our product, you dont have to pay any license fees.
In the coming months, Dedicated Micros plans on bringing a new ver-sion of its FireVu products to market. They have redeveloped the products to make them more sophisticated and better at detecting false alarms, the main barrier to sales for a video-based detection product.
Weve put such sophisticated pro-cesses in our product that the false alarm rate in many circumstances is
down to zero, which is very important to high-risk environments, said Nor-strom. This positions the product as the leader in the market and thats an area well be focusing on over the next 12 months.
Another goal for Dedicated Micros is to get their products out there. The
companys traditional marketing route was through the security distributors, but that is no longer effective. The com-panys new business model doesnt align with the security distributors business model because they are selling a single solution. Norstrom sees this change in marketing as a benefi t.
What we are saying is we are far more consultative now. We help install-ers design systems, and we help the user get the best out of the product, which means theres far greater direct interac-tion with ourselves and also the ability to buy all these solutions directly from Dedicated Micros.
Go to sp.hotims.com and enter 18 for product information.
0614sec_010_011_IndVert_v3.indd 11 5/16/14 3:19 PM
-
0614 TOP PICKS Compiled by Security Products Staff
1 2 0 6 1 4 | S E C U R I T Y P R O D U C T S
Awareness, Control and Rapid Response
R4 empowers organizations to achieve high levels of security
Frontier announces its integrated security management software suite, which stream-lines operator workfl ow, saves time, reduces costs and simplifi es system management and operation.
Management of credentials is more effi cient, even in environments with complex credential requirements.
With seamless video integration, Frontier Video transforms Frontier access control software into a comprehensive unifi ed security man-agement solution for a variety of environments.
A Web Client allows operators to use any stan-dard Web browser to connect to the platform for system administration and control. Frontier.Go to sp.hotims.com and enter number
344 for product information.
The Power of Anti-TheftIncrease the security of
your current system
Scorpion Security Products introduces The SA2 is an all-inclusive anti-theft power secu-rity display designed to optimize product pre-sentation and encourage customer interaction.
Available in a variety of sizes, it secures virtu-ally all phones, phablets, tablets, and readers.
It features a removable head for ease of re-merchandising and is equipped with 5 and 12 volt charging, continuous demo display, 90 decibel alarm, and LED lighting to visually display the security status.
The SA2 will compliment and signifi cantly in-crease the security of your current system. Scorpion Security Products.Go to sp.hotims.com and enter number
345 for product information.
Open, Unifi ed Software Platforms
Application will streamline response
SMC enhances industry standard workfl ows to respond to routine and emergency situations.
Driven by Fusion, which combines and analyzes device relations, location, user management and more, SMC unifi es a wide range of sensors and systems into a centralized, intuitive security and situation intelligence platform.
The platform manages systems with up to tens of thousands of devices.
Incorporates data on traffi c violations, radar, weather, identity systems and information from mobile phones.
A GIS-referenced visual database links sen-sors, maps and events together to help users comply with standard operating procedures.Verint SMC.Go to sp.hotims.com and enter number
346 for product information.
Analytic Recognition Enterprise Solutions
Complete end-to-end video solution based on license plate recognition
The solution turns any existing camera in a video surveillance system into an LPR camera.
Working with an unlimited number of cameras, this product produces industry-leading LPR accuracy.
The product functions as a stand-alone system or integrates with existing video security tech-nology such as the Video Management System (VMS).
Combines real-time automatic license plate data extraction with state-of-the-art analytics for complete situational awareness and pre-dictive capabilities.
Instant alerts via email or text message capa-bilities make this solution the most cost-effec-tive video analytics product of its kind.Platesmart Technologies.Go to sp.hotims.com and enter number
347 for product information.
Visibility into Your Business360IQ anywhere, anytime
360-IQ combines live data with real-time video surveillance, creating a dynamic business operations tool.
The product delivers a simple, but powerful solution, coordinating all critical data into a single, easy-to-use application.
Designed to help operators manage their business, the tool saves time and adds peace of mind.
360IQ provides visibility into business op-erations using dashboard views of immediate store performance data, critical time alerts and access to real-time and archived video.
The product also uses cloud-based algorithms to analyze store-level anomalies across the enterprise.360IQ.Go to sp.hotims.com and enter number
340 for product information.
Four-Door Control PanelCan be installed in existing enclosures
Symmetry SR-2000 is AMAG Technologys four-door control panel that delivers proven access control technology for new and retrofi t security applications.
The panel is designed for plug-and-play up-grade of Picture Perfect and other legacy Casi Rusco and similar systems, and directly re-places the legacy M2000.
The product supports F/2F reader communica-tion protocol and includes a four door control-ler board with input/output (I/O), and a power-ful database unit.
The SR-2000 can be installed in existing en-closures, eliminating the need for any wiring or termination changes.AMAG Technology.Go to sp.hotims.com and enter number
341 for product information.
Software ApplicationVMS Integration
Open Options DNA Fusion v6.1 comes with even more cutting edge features and integrations.
Users can implement persistent access groups to simplify access assignment across multiple controllers, and can take advantage of popular biometric technology with enrollment to the Suprema line of readers through DNA Fusion.
Version 6.1 features a new VMS integration with March Networks including live and ar-chived video, PTZ control, and scanning for cameras.
Open Options partnership with Milestone Sys-tems provides through support for their Access Control Module which allows events and data to be monitored from Milestones Smart Client.Open Options.Go to sp.hotims.com and enter number
342 for product information.
Outdoor Emergency PhonesUpdated LED lighted surface mount
Talk-A-Phones updated LED Lighted Surface Mount Accessory features a new sleek, con-temporary contoured design that improves the functionality of an emergency phone.
The emergency phone faceplate is illuminated by an ultra-bright, long-lasting LED panel light at all times, making it ideal for poorly lit out-door locations.
The surface mount is constructed of vandal-resistant stainless steel and features a pro-tective hood designed to withstand outdoor elements.
The mount comes equipped with removable internal panels for additional devices, including model ETP-GSM cellular interface and a power supply.Talk-A-Phone.Go to sp.hotims.com and enter number
343 for product information.
0614sec_012_Toppicks_v2.indd 12 5/16/14 3:20 PM
-
RETAIL SECURITY
PUTTING AN LP SPIN ON VIDEO ANALYTICS Which analytics can give you a quick heads-up on potential loss activity?By Jackie Andersen
Video analytics arent just tools for marketing and merchandising; these intelligent algorithms can also spot atypical customer behav-ior that might suggest potential loss activity when viewed by the Loss Prevention department.
By looking at four of the common video analytics used by re-tailers today, we can quickly see how departments can gain different business intel-ligence from the same applications.
HEAT MAPPING: SEEING WHERE SHOPPERS GOHeat mapping lets retailers visualize customer traffi c patterns through the store over time. This analytic uses color overlays to denote hot spots of activity and cold spots with little or no foot traffi c.
Marketing and merchandising departments have been using this information for years to optimize store performance. They can see whether changing store lay-outs or moving a new promotional display to a hotter location improves merchan-dise performance. They can see where additional customer associates are needed to assist customers on a busy sales fl oor.
The LP spin. When LP reviews a heat map, those cold and hot spots take on a different meaning. Cold spots might indicate an area of the store where thieves could more easily conceal items. Hot spots might indicate a potential fl ash mob, especially if it suddenly comes out of nowhere with no underlying reasons for its appearance, like a doorbuster promotion. Knowing that crimes of opportunity often spike when theres a lack of guardianship, an LP response to intelligence gained from heat mapping would be to step up staffi ng in hot and cold areas.
From an LP perspective, heat mapping is especially useful in static environ-ments where the fl oor layout remains fairly constant. You can establish a good baseline of activity that makes it easier to judge spikes and anomalies.
Take, for instance, a cosmetics counter. You might have make-up artists in the aisles and sales associates behind the counter ringing up sales. But, if a popular cosmetics brand is offering a free gift with purchase that day, you might get a sud-den infl ux of activity in the department. While the analytic might trigger an alert to management to make sure that there is suffi cient staff in the area to ring up sales, LP will read the alert as a warning to beef up security and staffi ng to deter customers from walking off with testers and products.
1 4 0 6 1 4 | S E C U R I T Y P R O D U C T S
0614sec_014_020_Andersen_v3.indd 14 5/16/14 3:20 PM
-
Superior identicationLower costs
Get 4K ultra HD images with lower bandwidth and storage requirements. DINION IP ultra 8000 MP delivers a tremendous advantage in detail capture, even when moving objects and challenging lighting pervade the scene. And, intelligent Dynamic Noise Reduction minimizes bit rates to lower bandwidth and storage requirements up to 50%, reducing system costs and network strain. This makes 4K ultra HD imaging relevant for many surveillance applications, enabling you to see every detail, everywhere.Learn more at www.boschsecurity.us
Go to http://sp.hotims.com and enter 12 for product information.
Untitled-5 1 5/14/14 1:01 PM
-
RETAIL SECURITY
1 6 0 6 1 4 | S E C U R I T Y P R O D U C T S
Choosing the right camera. When it comes to heat mapping analytics, you dont need a pricey, megapixel camera, as youre only concerned about movement, not image details. A cost-effective fi xed or dome camera with a good lens, a decent depth of fi eld and either SVGA or 720p resolution would be suffi cient for this ap-plication. Though the typical orientation is horizontal, you might want to operate the camera in corridor view for heat mapping long aisles.
Caveats. Because heat mapping relies on establishing a good baseline, it would be a challenge to deploy this analytic in locations where the fl oor plan confi gura-tion is constantly shifting. Without a reliable baseline, any comparative results would be erroneous. Also, if the location experiences a wide range of lighting con-ditions throughout the daysuch as areas facing plate glass windows and doorsyou will need a camera that supports wide dynamic range to compensate for glare.
DWELL TIME: DISCOVERING WHERE SHOPPERS LINGERDwell time lets retailers see which areas of the store catch a customers eye and keep their attention. This analytic is designed to detect a person remaining station-ary in a particular location beyond a set period of time, a parameter designated by the retailer. This application uses a graphic overlay on the video to pinpoint the location where the dwell threshold has been exceeded.
From a marketing perspective, dwell time analytics can indicate if a display is effective in attracting shopper interest. It can alert management to send a customer service associate to the location to convert the browser to a buyer and perhaps even upsell additional merchandise.
The LP spin. For LP, a dwell time alert can be a red fl ag that someone might be looking for an opportunity to conceal a product or scoping out the location for an organized retail theft sweep. In response, LP may simply send a store associate to inquire if the person needs assistance. Once the individual realizes theyre being observed, the window of opportunity for the concealment slams shut.
Consider a drugstore where shelves of baby formula might present a tempting target for organized retail crime gangs. If dwell time analysis indicates someone or several individuals are spending an inordinate amount of time comparing brands, LP might view the alert as a warning for a potential sweep and take proactive steps to avert it.
Choosing the right camera. When it comes to dwell time analytics, most retailers use fi xed-dome cameras mainly because they provide the right depth-of-fi eld and angle for good situational awareness. Plus, their unobtrusive design blends in well with a retail environment. If the camera is being used solely for dwell time analy-sis, SVGA or 720p resolution would be suffi cient. But, if youre using the camera for multiple purposes, you might want to choose a 1080p camera to capture facial details.
Caveat. LP will face additional challenges as organized retail crime becomes more sophisticated and incidents happen even faster. As with heat mapping, if the location experiences a wide range of lighting conditions throughout the day, you would need a camera that supports wide dynamic range to compensate for glare.
PEOPLE COUNTING: TALLYING CUSTOMER TRAFFICPeople counting lets retailers keep track of how many shoppers are entering the store. This algorithm is designed traditionally to be one-directional so that it doesnt count people leaving the premises. The information is generally presented in a graph broken down into units of time.
Retailers most often use people counting to calculate conversion rates and pre-dict peak times when more staff is needed as traffi c ebbs and fl ows. By aggregating this information over time, management can compare their store sales with other storesthe Holy Grail of retailing.
The LP spin. When LP studies people-counting statistics, theyre looking to fi nd a correlation between customer density and returns. By familiarizing themselves
TEMPERATURE CONTROLLED ENCLOSURES
1-800-473-0213 | www.mierproducts.com
PROTECT FIRE PANELSDVRs, SECURITY AND ELECTRICAL
EQUIPMENT FROM VANDALSAND WEATHER
NEMA 4 Outdoor/Indoor Enclosures with:
s!IRCONDITIONINGAND(EATs!IRCONDITIONINGONLYs(EATONLYors%NCLOSUREONLY
7%6%'/49/5#/6%2%$
AVAILABLEWITHORWITHOUTWINDOWS
NEMA 3R Outdoor/Indoor Enclosures with:
sORCUBICFTMINFANSIndoor DVR & CPU Lockboxes with:
sVOLTORVOLTFANS
.%7RACKENCLOSURESINCLUDEINTERNAL25RACK.ON-ETALLIC6ERSIONS!LSO!VAILABLE
OVER 50 MODELS AVAILABLE
PROU
DLY MADE IN THE USA
FOR OVER 25 YEAR
S!
Go to sp.hotims.com and enter 5 for product information.
0614sec_014_020_Andersen_v3.indd 16 5/16/14 3:21 PM
-
4Like CO and Smoke in a single detector. The award-winning i4 Series Combination CO/Smoke Detector and i4 Interface Module work together to provide the rst system-connected combination solution for conventional re and security systems.
The i4 Detector truly hits the spot for installers as well as homeowners. It uses the most reliable and accurate CO and Smoke sensing technologies to detect dangerous levels of smoke or CO. Ongoing maintenance is easy, thanks to its eld-replaceable CO cell. And the i4 Combination Detectors 2- or 4-wiredesign makes installation quick and easy, just like making a PB&J should be.
The i4 system works with most conventional security panels, and the i4 Module even interconnects sounders on the loop. Plus, youll have the freedom to mix and match up to 12 i4 Combination Detectors and compatible i3 Smoke Detectors per i4 Module. Sink your teeth into a life safety solution that means less wire, less labor, and fewer devices on the wall or ceiling. To learn more visit:
i4 Interface Module(Required)
i4 CO/Smoke Detector
Some things arejust great together.
go.systemsensor.com/i4pbj-sp
2014 System Sensor. All Rights Reserved.
Go to http://sp.hotims.com and enter 31 for product information.
Untitled-4 1 5/7/14 10:54 AM
-
RETAIL SECURITY
1 8 0 6 1 4 | S E C U R I T Y P R O D U C T S
with the baselinethe average density of shoppers from sales to returnsthey can spot anomalies that might indicate fraudulent rather than honest returns.
For instance, if LP discovers that the highest rate of return is occurring one or two hours before closing, they would likely conclude that these trans-actions bear further scrutiny. It could be that dishonest patrons are looking for times when staff is busy restock-ing shelves and closing down the store, making them too distracted to review return receipts carefully. Or, it could be that with few customers at the end of the day, an employee might be do-ing their own fraudulent returns. Upon further investigation, LP could discov-er tell-tale signs, like the absence of a customer and an associated credit card receipt linked to the original purchase.
In some retail establishments that op-erate stores within stores, management might install secondary people-counting cameras just to measure traffi c to luxury specialty or high ticket item areas. For marketing and merchandising, it would be a way to calculate conversion rates and profi tability of those locations sepa-rate from the overall performance of the store. But for LP, seeing unusual spikes in head count in those areas with higher-value merchandise might set off warn-ing bells. This would be especially true if the secondary people-counting cameras were strategically deployed in a distribu-tion center where high-end inventory, like expensive jewelry and accessories, were stored.
Choosing the right camera. A fi xed dome would mostly likely be your go-to camera for people counting. Depend-ing on the size of the area being cov-ered and the type of detail you need to capture, youre probably fi ne with a standard SVGA image. You could, however, bump all the way up to a fi ve megapixel camera if youre using the video for other situational awareness.
Caveat. Its important to establish a baseline for typical customer traffi c at different times of the day so that you can set alerts for deviations. You need to recognize that many people-counting analytics are self-learned and become more accurate over time. With continuous usage, they become smarter at discerning between human and non-human images, such as guide dogs, shopping carts and strollers, so occasionally recalibrate your baseline
to ensure it refl ects actual traffi c into the store.
FACIAL CATALOGING: IDENTIFYING TYPES OF SHOPPERSFacial cataloging is one of the new ana-
lytics gaining attention and traction in retail. This algorithm is designed to de-duce the gender and approximate age of shoppers based on facial geometry. It can also predict general mood by analyzing facial expressions.
Marketing and merchandising de-partments often use facial cataloging in conjunction with smart monitors scattered throughout the fl oor. Once the video analytic determines the de-mographic of the individual in the vi-
Securing Your Most Precious AssetIQinVision has been a trusted name in campus surveillance for over 15 years. IQeye cameras produce clear, high-quality video backed by comprehensive warranty programs, award-winning customer service and competitive pricing.
HD Megapixel IP Cameras | H.264 | Indoor and Outdoor | Audio | WDR | Built-in IR | True Day/Night | Integration with Access Control | On-camera storage | Analytics | ONVIF | Accessories
Q
Go to sp.hotims.com and enter 21 for product information.
0614sec_014_020_Andersen_v3.indd 18 5/16/14 3:21 PM
-
W W W . S E C U R I T Y - T O D A Y. C O M 1 9
cinity of the monitor, the screen begins to stream content that might appeal to that gender and age group.
For instance, if facial catalog-ing identifi es the shopper as a female between the ages of 40 and 50, the
screen might display advertisements for wrinkle cream or accessories to complement the newest ready-to-wear apparel. If the shopper was recognized as a male, the promotional content might be for grooming tools or the
latest mens sportswear. The goal is to upsell the customer on additional pur-chases wherever the opportunity pres-ents itself.
Facial cataloging can be used to alert management of the presence of VIP
customers in the store so that personal shoppers can be dispatched to assist these customers with their purchases.
The LP spin. Facial cataloging helps LP quickly spot repetitive criminal be-haviors by re-offenders or known retail crime members as they enter the prem-ises by sending an alert to staff, who can then respond according to store policy and local laws. The reference fa-cial database might include links to lo-cal law enforcement or other retailers watch lists.
In addition to identifying known suspects, LP can use facial cataloging to thwart internal theft. For example, if an associate repeatedly shows up in a high-ticket area of the store that is not part of their usual assigned territory, especially with no customer in tow, then that sends up a red fl ag for LP to further investigate the situation.
Choosing the right camera. When it comes to facial cataloging, you need a megapixel camera to capture enough facial details for identifi cation. The camera has to be mounted with no more than a 9 degree slope or youll end up with hair follicle recognition instead. Depending on the lighting levels, you may need a camera with wide dynamic range or lowlight technology to deliver usable images, especially in dynamically-changing lighting conditions. Another thing to keep in mind is that cameras used for facial cataloging should only be used for that single purpose.
Caveat. The biggest roadblock to implementing facial cataloging is pri-vacy rights, which are regulated on a state-by-state basis.
In the beginning, video analyt-ics were primarily used for marketing and merchandising, but as these algo-rithms integrate into standard operat-ing procedures, their cross-functional value is becoming even more apparent. When LP applies this intelligence to its surveillance toolbox, the ability to anticipate and avert loss increases sig-nifi cantly, as does the retailers overall return on investment.
Jackie Andersen is the North America retail business development manager for Axis Communications.
Go to sp.hotims.com and enter 21 for product information.
Are You Receiving White Glove Service?
Engineering CommitmentAll IQinVision cameras are designed, engineered and tested for quality and reliability at our San Juan Capistrano, CA corporate headquarters.
Service CommitmentFrom our superior customer-centric team to our renowned line of IP camera products, IQinVision is proud to stand behind everything we do, including the industrys best 5-year all-inclusive warranty.
Support CommitmentLive service, support and training is available in 6 languages
Committed to Exceeding Your Expectations14-Hour/Day Live Support M-F | 6 Languages | 98% Documented Satisfaction Rating | Short Hold Times | Field Support Available | Knowledgeable and Courteous Support Staff | 100% Warranty Advanced RMA | 5-Year Warranty (Dome and 3 Series Cameras Excluding AZF Models) | 3-Year Warranty (Standard, Stick and Bullet Cameras) | MTBF Tracking | Research and Development | Software API and SDK Available for Partner Integration | Comprehensive Quality Control Protocols
www.iqeye.com
Q White Glove Service Quality Engineering Quality Service Quality Support
14A D V A N C E D R M AARMA
111001000011
11000000110101010100001
1111000001111000001100101011001
00000011111000001100101011001110
101101
1
1111000000011
11100110000001000011010010110100101000011011101011010100101 011
11110001000011001101011010100100100101
1111111110001100001001011111111001000011011011011010101101010010011
1000100001000011100111100000001001101101010010010110110100111110110110
100 0100100100100
0110000001100101
1111110000000011
1101111111111000000000011000001111 011011
11000110100011001010110001010110101
00111010110100101001010010101110011101 111
0110 1100100111000110011110
110
010010010010
11111
0
11111111
110010101010001000100100000001111110000 00000000
011011
01100001111
0
1
1011110000111100011 011010101
111111 00110101001010100
11000001011
0001000
00011111
0110110110110110111
000000001011111111111000
010111011010110010110100
110011 11011110011101010
0011001100011001
110
1000101
111111011001001111110
1101100101011010110010101 0001010 100101011100
1011010100101011101101010010101110110101001010111011010100101010110101001010110101001010101010010 11111000001111 0
11011001010110101001010110101000001100011011
1100101011010100001010110101010101101101011011010110101011001011001011001011001011101110101 1100110001111110
01010111010110
101001011001101011
101010010100
00101000101000101010110
010110101110110101 000
101011000010
011011
0000
1111
111
00
11000
11
011
11
0111
01
00
01
00
1
100
000
1
000
01
1
10
11
11
1
10
1
11
0000
1
1111
1
0100000
1100000
110110011111
0
10101100
010100101001010011111 0000000000000
10011001011001010010
1010
0000
000110
101
0614sec_014_020_Andersen_v3.indd 19 5/16/14 3:21 PM
-
RETAIL SECURITY
2 0
Improving Employee Relations Installing audio solutions may help deter theftBy Richard Brent
Retailers often have to deal with high-traffi c seasons, like the holidays and back-to-school, in which there are spikes in customer foot traffi c. While booming sales are always good for retailers, one thing that isnt is shoplift-ing. To help decrease theft, many retailers are installing an audio security device because the culprits are not only customers, but also employees.
In fact, the National Federation of International Business (NFIB) estimates that $600 billion is lost annually$4,500 on average, per employeedue to employee theft. As many as 30 percent of an average companys employees steal and another 60 percent would steal, if given a motive and opportunity. Furthermore, a recent securityreport stated that on a per case average, dishonest employees steal almost six times more than the amount stolen by shoplifters, and 1 out of every 40 employees stole from their retail employer in 2012.
While video surveillance is usually the go-to for security, more retailers are also turn-ing to audio as a supplementary technology to help manage security and employee rela-tions. For example, Massage Envy, a popular massage franchise, leverages the power of audio in addition to video cameras to manage operations and shrinkage (internal theft).
My wife and I have been using audio products for almost fi ve years now, said Mark Blaz, owner of two Massage Envy locations in Southern California. Its great to be able to go back and listen to audio footage to help dispute a customer complaint or to hear if employees are dishonest.
Specifi cally, Blaz uses the Louroe ASK-4 Kit #300 that includes a microphone and in-terface unit to connect to an Avigilon IP surveillance camera. The camera synchronizes the audio and video streams for both real-time monitoring through the Avigilon software. One microphone is powerful enough to cover the entire reception area; even with a multiple camera setup, one channel of audio is all that is needed to monitor employees.
Blaz is also able to successfully manage employee relations. For example, he recalls a time when a customer was upset over the terms of the Massage Envy services contract, claiming that the employee had never explained the terms and conditions. While Blaz fol-lows the philosophy that the customer is always right, he and his wife wanted to make sure that their employee was doing her job correctly. So, they listened to the audio footage and confi rmed that the employee did, in fact, fully explain the terms and conditions of the services contract to the customer, using the agreed upon speech that employees are re-quired to say to each customer.
Audio is useful for operational needs such as this, Blaz said. If we only had video then we would not be able to verify that our employee did her job correctly by verbally explaining the contract to each customer.
Moreover, Blaz uses audio to combat sales reduction. He explained that during one particularly slow night, some employees wanted to go home early so they called the few customers who were scheduled to come in later and lied to them, saying that their mas-sage therapists were unavailable and they had to reschedule their appointments.
By listening to the audio, we were able to reprimand these employees appropriately, Blaz said. This comes in handy when trying to prevent inappropriate employee conduct.
Blaz employees are aware that their audio is being recorded as it is disclosed in the employee handbook. Meanwhile, customers are notifi ed via signage on the front door of the facilities.
Audio is really the best way to manage employee relations as it allows you to give accurate feedback to your employees and help them overcome their learning curve more quickly by being able to hear themselves in action when we play back footage for them, Blaz said.
It is more important than ever to consider audio security to help protect businesses from employee theft and to help manage poor customer service. As industry professionals, recognizing audio as a complementary technology to video in a security solution further protects customers assets.
Richard Brent is the CEO of Louroe Electronics.
When THE POWER IS IN THE KEY you have the ability to . . .
Control access to every lock
Eliminate re-keying costs
Reduce unauthorized entry
Monitor and report all access activity
Learn more at www.cyberlock.com/lock4 541-738-5500 [email protected]
CyberLock
Go to sp.hotims.com and enter 14 for product information.
0614sec_014_020_Andersen_v3.indd 20 5/16/14 3:21 PM
-
revive your security
Revive your security today with the M-5 Conversion! Call 1-800-323-4576, option 3, or visit www.honeywellintegrated.com to learn more.
2014 Honeywell International Inc. All rights reserved.
Transform your legacy security system to an affordable, end-to-end enterprise solution.
Bring your obsolete system back to life with Honeywells M-5 Conversion
a simple board replacement option within Pro-Watch that supports
Mercurys M-5 Series Control Modules.
So, whats the big deal? The M-5 Conversion drop-in replacement
saves you money while providing added features. Not only does it help you leverage your current
investments in existing readers and wiring by allowing you to continue using your own equipment,
it also provides an instant upgrade to Pro-Watch Honeywells robust, state-of-the-art integrated
security system.
The M-5 is non-proprietary, allowing for open integration and more exibility. Its easy. Its affordable.
And its just what the doctor ordered.
Go to http://sp.hotims.com and enter 36 for product information.
Untitled-16 1 5/6/14 1:59 PM
-
2 2 0 6 1 4 | S E C U R I T Y P R O D U C T S
HOSPITAL SECURITY
THE PRESCRIPTION FOR CURING ID BADGE ILLSIncreased control and advanced reporting are critical for a safe facilityBy Ann Geissler Timme
Many hospitals are fi nding it necessary to increase the number of access controlled openings in their facilities. Whether its due to increased violence, additional privacy requirements or emer-gency preparedness, they are fi nding the need for increased control and advanced reporting a critical part of keeping their
facilities safe. Parallel to this increased security is the need for more advanced cre-dentials to ensure the data being exchanged with every transaction is secure.
In addition, a major value proposition for hospitals is to provide convenient and effi cient tools for their staff, especially their doctors. Since physicians often work in several locations, with each typically having a different type of access con-trol system, they are usually forced to obtain, carry and use a different credential at each hospital and clinic. Sometimes, they even need multiple credentials for one location. Ask a doctor what type of credential they would prefer to use and, in loud unity, they would reply, none.
Healthcare organizations want to work with their physicians and staff to achieve the right balance between security and convenience. Most of them dont realize how easy that has actually become.
CREDENTIALS ARE GETTING SMARTThere are a lot of credential choices out there, but its important that healthcare organizations do their homework and choose wisely. What might have been stan-dard technology in the past, may no longer provide them with the functionality
and security they will need in the future. With the advent of smart and mobile credentials, the choice made now may not only affect access control applications, but many other aspects of daily life in a healthcare environment.
Smart credentials provide healthcare organizations with a superior solution over other card products at approximately the same price as a proximity card. Smart cards increase the security of data and provide added convenience to the user. In addition, smart credentials allow for greater functionality by allowing users to use them for access control, logical access, payments and many other functions.
By considering open architecture capabilities, hospitals can easily provide se-cure access for staff to more applications and add value to the many proprietary systems currently in the marketplace.
Saying that a smart card is open architecture means that it is capable of ac-cepting customized keys for multiple, diversifi ed applications, regardless of whose application it is. This lets hospitals add applications on their own terms, expanding as slowly or as quickly as they like. Also, with memory options of 2K, 4K and 8K bytes, hospitals can get the memory they need, without paying for extra memory they dont.
As Near Field Communication (NFC) technology is being added to a growing number of mobile handsets to enable access control and many other applications, more and more organizations, including healthcare, are considering joining the bring your own device (BYOD) trend and having staff members use their own smart phones as their access control credentials.
0614sec_022_026_Timme_v3.indd 22 5/16/14 3:21 PM
-
Go to http://sp.hotims.com and enter 20 for product information.
Untitled-1 1 5/15/14 2:55 PM
-
HOSPITAL SECURITY
2 4
To turn NFC-enabled smartphones into an access control credential, users sim-ply download an app to their smartphone. Then, their access control administra-tor uses the cloud service to send a secure mobile credential directly to the users phone. Once the mobile credential is downloaded, users open the app and tap their smart phone to the reader in the same way they use a card or fob.
For many employees, including doctors, using their personal smart phone would be much easier than searching for a card. While a doctor could use a per-sonal smart phone to get into the various facilities served, the IT staff would have the confi dence that the data is being exchanged is encrypted and secure. Health-care organizations may want to start off using smart phones with their doctors only and later migrate their use with the rest of the staff, providing a choice of credentials that could be used.
BYOD IS BECOMING A REALITY EVERYWHEREEach and every day, hospital staff are fi nding it easier to bring and use their per-sonal devices to work in the hospital. Of course, this is a double-edged sword. Em-ployees get to work on devices that they like and that are probably more advanced than what is issued to them through their IT department. Plus, instead of carrying around a variety of equipment, they get to choose the one device that works best for them.
Although employees may wish to use their own device, IT teams need to ensure the security/encryption, which is needed for patient and organizational informa-tion, is strong, implementation is seamless, and management of software/applica-tions for all of these personal devices doesnt add vulnerability to the enterprise. IT professionals want strong authentication credentials, the level of security provided by smart credentials.
Unlike proximity and magnetic stripe cards and their readers, smart credentials initiate a challenge and response sequence to initiate conversations with the net-
work. These communications are encrypted using industry standard encryption techniques. By welcoming their involvement and showing the ability to speak their language and answer their questions, you will gain additional layers of approval within the IT organization.
In todays world, a smartphone can act just like a smart card and can be used for access control and payments, simply extending the functionality of the phone. Any smart phone owner already sees this happening in their everyday life, using their phone for multiple purposes, from game playing or paying for coffee to im-portant work-related tasks. Today, college students and their campus card admin-istrators are using their phones to access their access control systems and pay for meals, laundry services and more.
While the BYOD migration moves forward, there will be a mixed environment of cards and phones. With more and more NFC-enabled phones coming on the market, the shift to phones being used by the majority of people on a healthcare campus will ultimately follow.
People prefer the convenience of using their phones instead of digging for their cards. Administrators fi nd that using smart phones as badges saves time that can be better spent on other issues. Assigning the credential to a phone takes less work than printing and delivering a badge.
WHAT HEALTHCARE FACILITIES CAN DO NOWFor those facilities already using aptiQ multi-technology readers, there is no need to replace readers in order to migrate to smart cards, smart phones or a combination of the two. These readers currently work with magnetic stripe, proximity and smart cards as well as NFC-enabled mobile phone credentials all in one reader, providing an easy migration path to upgrade credentials between any of those versions at their own pace.
If non-smart access technology is being used today, multi-technology readers should still be installed to help ease future transitions by reading the different types of
Go to sp.hotims.com and enter 35 for product information.
0614sec_022_026_Timme_v3.indd 24 5/16/14 3:21 PM
-
www.infinias.com | 800.691.8974Engineered by
Access Control, Meet Video
Access Control + Video on a Single Platform infinias 100% IP-based access control and video management systems bring all your doors and video to a single platform. Made possible by the all-in-one Intelli-M Access NVR, you can manage and configure both video and access control from one browser-based UI. infinias continues to bring together the features and capabilities that make access control and video management simple and convenient.
A C t l Vid Si l P
All-in-one access control plus video management server
Go to http://sp.hotims.com and enter 26 for product information.
Untitled-9 1 5/13/14 4:30 PM
-
HOSPITAL SECURITY
2 6 0 6 1 4 | S E C U R I T Y P R O D U C T S
cards and smart phones at the same time.Organizations wanting to use NFC-
enabled smartphones as their access control credentials can begin the transi-tion now. The recently introduced aptiQ-mobile secure peer-to-peer (P2P) NFC mode lets organizations provide the con-
venience of using a mobile device today.This secure peer-to-peer solution
provides several advantages. It lets orga-nizations implement mobile credentials ahead of the market by using Android NFC-enabled phones and Apple iPhones with a special case that enables NFC re-
gardless of choice of carriers. But, for many, its most important advantage is that it lets healthcare facilities provide their physicians and staff a convenient credential that is easy to use for access control and many other applications.
It is important that healthcare or-
ganizations be prepared for smart card and NFC mobile credentials, even if that facility wants to still use proximity, magnetic stripe or keypad technology at present. If new readers are needed, they should select multi-technology readers that combine the ability to read all of these credential technologies in a single unit. That way, when the organiza-tion switches over to smart credentials, there will be no reason to tear out the old readers to install smart card readers. During the transition, the facility can use both their old magnetic stripe and proximity credentials and the new smart cre-dentials.
Ann Geissler Timme is the healthcare market-ing manager at Allegion.
Theres more to Dedicated Micros... ask about our Video Smoke Detection products...
Cal l 1-877-367-8778 or v is i twww.dm-networkvideo.com
Installation benets:
Fast to install: built in 16 port Layer 3 POE (Closed IPTV) switch
Easy to expand: up to 32 cameras
Auto detection and self conguration: of DMs CamVu IP cameras and PTZ domes
Starts recording with no further configuration
Same local and remote configuration and user interface
Secure lock down of IP cameras with unique key applied, to avoid network vulnerability
End user and operator benets:
Corporate network segregation and security through dual IP addressing scheme
High denition HDMI local display output and local joystick PTZ keyboard
Internal storage capacity up to 6TB, expandable via USB
Built in DVD writer and USB ports for evidence retrieval
Control this and unlimited NetVu Connected systems through NetVu ObserVer video management software
High definition, secure, plug and play IP network video recorder for smaller IP video installations.
Introducing the NVR MEDIA SERVER
This solution is
available directly from
DM Network Video
Copyright AD Group 30th October 2013
Go to sp.hotims.com and enter 16 for product information.
As healthcare fa-cilities grow larger and provide round-the-clock care they become more vul-nerable to a wider array of security
risks and vulnerabilities. Healthcare administration must monitor patient, employee, and visitor traffi c; secure expensive medical equipment and medications; insulate the organiza-tion from potential liability claims; improve operating effi ciencies; reduce administrative costs; and comply with state and national regulatory guide-lines such as HIPAA. Video Manage-ment Software (VMS) solutions play an important part in healthcare facil-ity security processes, particularly the ability to quickly access live and re-corded video. Because its the respon-sibility of each individual hospital and healthcare organization to decide on the right tools to meet specifi c needs, administrators are charged with choosing a proper VMS solution that has work effi ciently with the existing network infrastructure and processes like access control, while also taking into account future needs.
James Whitcomb, CTO at Video Insight
0614sec_022_026_Timme_v3.indd 26 5/16/14 3:21 PM
-
Mercury Platinum Elite Partners: your valued source for Authentic Mercury.
Give your access control solution wings.2014 Mercury Security Corporation
Whats in a box?
The legacy that 22 years of leadership brings.
The reassurance of the most proven subsystem in the industry.
The knowledge that what is supposed to work, always works.
The quality that comes from an ethic of pride in engineering.
And thanks to the exibility of an open platform,
the promise that we will never build obsolescence,
or force our partners
into a box.
Go to http://sp.hotims.com and enter 23 for product information.
Untitled-4 1 5/7/14 10:57 AM
-
Compiled by Compiled by Lindsay Page, Senior Editor
2 8 0 6 1 4 | S E C U R I T Y P R O D U C T S
2014 SIA SHOWCASE AWARDS
Best New Product
Building IntelligenceSV3-Vehicle
Expanding on access management, SV3 is the next generation in vehicle access management for both entry points and loading docks. As Vehicles, visitors, and vendors pose several critical risks that should not be ignored. SV3 provides the means to manage these risks. SV3 enhances pro-cesses and workfl ows that promote the screening and pre-registration of visitors, vehicles, drivers and vendor companies. This combination of ser-vices provides a signifi cant deterrence to terror-ism, theft and abuse by vendors. Along with the operational effi ciencies that SV3 generates, SV3 provides real-time reports on access, throughput and usage. Upon arrival of the vehicle, SV3 cap-tures the vehicle and driver identity and validates that it is on schedule. The system alternatively may be deployed in a discovery mode such that it as-sociates new vehicles and drivers as they arrive for the fi rst time, and identifi es them accurately on future returns. Building Intelligence.
Go to sp.hotims.com and enter 300 for product information.
Judges Choice Award
dFENCEdFENCE
dFENCEis a movable ballistic resistant barrier tak-ing the form of an aestheticallymodern and func-tional shelving unit at all other times. The dFENCE unit can be moved easily into place on its inbuilt multi-directional wheels during an armed intrusion with no pre-preparation of the defensive position. Once in the desired position, the dFENCE unit is simply locked into place in front of a door or in the defensive position to provide a ballistic resistant and diffi cult to circumvent barrier. The dFENCE shelving system provides an important time and space factor to help survive such an incident and
allow emergency services time to respond. The dFENCE unit provides a cost effective, fl exible so-lution instead of expensive retrofi tting of doors, wall and windows of facilities. dFENCE.
Go to sp.hotims.com and enter 301 for product information.
Access Control Hardware and Software
FST21 America Inc.SafeI
FST21s SafeI is a fully integrated access control controller that delivers advanced, secure and con-venient In Motion Identifi cation access control. SafeI allows approved users access through a fu-sion of biometric recognition, voice and license plate recognition in a more compact version of the SafeRise server and is designed to support one In Motion Identifi cation access point. The controller comes in a standalone plug and play enclosure, and can be easily installed in any secured location. All peripheral devicesfrom the electronic door lock and door positioning switch to the recognition camera, RFID reader, intercom and feedback sig-naling deviceconnect directly to the SafeI. Au-thorized entry is granted instantly and simply by walking to the access point. FST21 America Inc.
Go to sp.hotims.com and enter 302 for product information.
Honorable Mention in Access Control
Hardware and Software
IDenticard Access ControlRack Armor
The RACK ARMOR server protection system is a patent-pending physical security solution that se-
cures and monitors server rack access at the cabinet level. The system features easy-to-use dynamic mapping and customizable reporting ca-pabilities to identify and track who accesses serv-er racks and specifi cally where, when and for how long access takes place. Consisting of innovative software and hardware to improve security of physical data systems, RACK ARMOR server pro-tection provides a complete solution for controlling access and monitoring the security status of serv-er racks, thus protecting valuable data at its source. The rack action screen provides instant verifi cation of the security status for both front and back doors of each cabinet and rack access panel. IDenticard Access Control.
Go to sp.hotims.com and enter 303 for product information.
Access Control Products Wireless
Securitron Magnalock Corp.Securitron R100 Surface Mounted
Wireless Reader
The Securitron R100 surface mounted wireless reader and pre-paired Aperio hub allows users to extend access control to glass, stone, granite and marble entryways. The easy-to-install wireless reader requires no drilling or pulling of wires and adheres quickly to the outside of a glass door. Glass entryways can integrate robust access con-trol while maintaining a clean, wireless appear-ance. The reader uses existing ID badges, so there are no keys to control or replace and no codes to secure or remember. The product is also easy to install and uses environmentally sealed electron-ics that provide protection from moisture, heat and cold. Two models are available to support low or high frequency cards. Securitron Magnalock Corp.
Go to sp.hotims.com and enter 304 for product information.
Biometrics, Identifi cation and Credentialing
MorphoTrakMorphoAccess SIGMA Series
MorphoAccess SIGMA Series biometric access reader combines three powerful attributes that ul-timately contributed to winning the award: Indus-
try leading genuine 100K user 1:MANY matcher, leveraging Morphos long history of biometric ex-pertise, leadership and NIST#1 ranked algorithms; more than a decade of support for legacy enroll-ments (databases) created in both Morpho and Bioscrypt product lines, respecting faithful cus-tomers and rewarding them for their business by ensuring a smooth transition to the latest and most powerful technology available; incorporating true value-added capabilities on the SIGMA to take the product well beyond traditional access control be-havior. The reader features true tablet-like inter-face and usability; a media and messaging plat-form for video content, audio messages and more. MorphoTrak.
Go to sp.hotims.com and enter 305 for product information.
Honorable Mention in Biometrics, Identifi cation
and Credentialing
Zwipe ASContactless Smart Credential
Zwipes contactless smart credential is a next-generation biometric card with on-card fi ngerprint reading. The quickly reads the users fi ngerprint in less than a second and eliminates the problems of solely deploying PINs and standard cards. The on-card fi ngerprint scanner with 3D capacitive tech-nology resides on the contactless smart card which has universal compatibility with all ISO 14443 readers, including aptiQ, iCLASS SE and other leading brands. Fingerprint data is captured by the on-card fi ngerprint scanner and is thereaf-ter encrypted and stored only inside the card. When a positive match occurs, the Zwipe biomet-ric card will activate encrypted communication with the lock or reader in the same way as other ISO 14443 contactless smart cards. Zwipe AS.
Go to sp.hotims.com and enter 306 for product information.
Commercial and Monitoring Solutions
Resolution Products Inc.Interactive Gateway Modules
The Interactive Gateway Modules, released by Resolution Products in 2013, are a line of plug-and-play devices which allow new services to be added to most existing alarm panel hardware. By adding a gateway module to a legacy alarm panel,
The Security Industry Associations (SIA) New Product Showcase was established in 1979 to recognize innovative products, services and solutions in electronic physical security. Technologies showcased are used in the protection of life and property in residential, commercial and institutional settings.
Each year at ISC West, the NPS program recognizes winners in several product and service categories and presents the Best New
Product, Judges Choice awards, and also awards honorable mentions in various categories. This year, the Best New Product Award went to Building Intelligences SV3-Vehicle.
0614sec_028_034_sia_v4.indd 28 5/16/14 3:43 PM
-
(866) 533-6216www.avalanwireless.com
Leaders in Wireless IP Video Connectivity
Call today for your FREE ZLUHOHVVVXUYHLOODQFHQHWZRUNFRQJXUDWLRQ
NEW: Maximum legal transmit power - 1 Watt
NEW: LEDs showing signal quality, Ethernet link, network activity and power
NEW: Built in lightning arrestors
Line of Sight Range up to 30 miles
3-Port POE out 802.3at option
TRY OUR NEW HIGH SPEED, LINE-OF-SIGHT300 MBPS ETHERNET SOLUTIONS
SECURE WIRELESS SOLUTIONS FOR INDUSTRIAL APPLICATIONS
Go to http://sp.hotims.com and enter 11 for product information
Untitled-8 1 4/1/14 1:17 PM
-
2014 SIA SHOWCASE AWARDS
3 0 0 6 1 4 | S E C U R I T Y P R O D U C T S
alarm dealers and other security providers can as-sume control over the panels hardware and offer services to customers such as event notifi cations and interactive home control services. Each Gate-way module connects to the existing alarm panels keypad bus, requiring no additional hardware. Once installed, the Gateway connects to other de-vices in or around the home wirelessly, via Z-wave technology. The Gateway modules are available in GSM, WiFi, and Ethernet-based versions, and are available today. Resolution Products Inc.
Go to sp.hotims.com and enter 307 for product information.
Convergence and Integrated Software
and Solutions
IDV Solutions Visual Command Center v3
The Visual Command Center v3 empowers organi-zations to protect their people, facilities, and op-erations against real or potential threats. It moni-tors real-time risk events such as acts of terrorism, weather, hazardous materials, as well as data from other sources, such as Web feeds or internal and external systems including physical security de-vices. When a risk is detected near an asset or employee location, Visual Command Center auto-matically generates an alert. Operators can use powerful visualization, fi ltering, and query tools to rapidly assess the threat, and then act to mitigate risk. The v3 will provide enhanced alerting for se-vere weather, new alerts for cyber security issues, and updates to the softwares Twitter visualization tool. IDV Solutions.
Go to sp.hotims.com and enter 308 for product information.
Emergency Communications
Systems
Eatons Cooper Notifi cationALERiTY
Through advanced programming interfaces, ALERiTY offers full-featured, bi-directional in-teroperability, integrating with other systems, software and devices for enhanced situational awareness. Examples include fi re alarm control panels (FACP), chemical sensors, detection sys-tems and paging systems. The WoIP mass notifi -cation network is comprised of a collection of se-cure, robust and reliable Ethernet communication devices, IP Communicators (IPC). This enterprise
system solution allows organizations to leverage their Local Area Network (LAN) or utilize the IPC private network to send audible, visual and data messages. This systems also allows multiple sites and facilities located anywhere in the world to be tied together through a Web-client Graphical User Interface (GUI) for managing global notifi cation and system monitoring. The system redundancy allows multiple users to be simultaneously logged into the system for additional points