Security Products Magazine March 2013 Digital Edition

May 2013

  • VIDEO SURVEILLANCE - An Eye on Paradise
  • VENUE SECURITY - Protecting the Priceless
  • MOBILE SECURITY - The New Mobility
  • BIOMETRICS - What's in Your BYOD World?


Features

Safeguarding Assets

Safeguarding Assets

Employees at desktop computers monitor surveillance live to protect the past.

By Rick Ramsay

With a history dating back to the 1850s, the Sioux City Public Museum has evolved from its original focus on natural science to a broader emphasis on preserving the area’s heritage, offering a variety of educational programs, events and historical exhibitions valued at more than $2 million.


The New Mobility

Technological dreams come to life

By Frank Defina

When I was growing up, one of my favorite comic book characters was Dick Tracy—not the Warren Beatty variety— but the heroic police detective of Sunday newspaper comic strips.


Protecting the Priceless

Protecting The Priceless

One-of-a-kind facility uses advanced video analytics and megapixel technology

By Wendi Burke

The National Museum of Funeral History in Houston houses the country’s largest collection of funeral service artifacts and highlights renowned exhibits on one of man’s oldest cultural customs.


An Eye on Paradise

An Eye on Paradise

Maui County migrates to a centralized security system

By Steve Carney

Recently, the county implemented an initiative to migrate toward one centralized system for all security, including access control, biometrics and surveillance on its three populated islands, excluding Kahoolawe, which does not have any residents or county buildings.


The Edge of Intelligence

The Edge of Intelligence

Why today’s network cameras are so smart

By Robert Muehlbauer

When the first network camera was introduced in 1996, its functionality was pretty bare bones: digitize images and send them across the network to a centralized video management system.


What’s in Your BYOD World?

What’s in Your BYOD World?

Biometrics is key to network-centric security

By Michael Harris

As network security professionals are acutely aware, they must be continuously vigilant to meet the ever-evolving threats driven by the bring your own device (BYOD) trend that is extending the network outside the office.


Wireless Access Links Diverse Buildings

Wireless Access Links Diverse Buildings

Technology provides longer-lasting protection

By April Dalton-Noblitt

With scattered buildings and each with different access control needs, the town of Estes Park, Colo., faced a complicated security situation.


Identity, the New Security Perimeter

Identity, the New Security Perimeter

Mobile users have access to more information, better communication than ever before

By Peter Cattaneo

Whether traveling, working from home, in flex offices or a conference room at a home office, we expect information access to be immediate and communication via voice, chat, text or email to be always available.


Departments

Put that Knife Back in Your Pocket

By Ralph C. Jensen

A few years ago, someone sent me a little knife that, when you push a lever, the blade flies from inside the stock. It is a wicked little weapon that I had put away and forgot about. I found it during my annual office spring cleaning.


Centralizing Your Video Management Software

By James Whitcomb

The industry-wide migration to IP video surveillance over the last few years has had many benefits, but chief among them may be the ability to centralize.


Networking Security

Biometrics on the Move

Biometrics on the Move

Smart cards and smartphones make play for access control

By Dave Adams

Multiple factors of authentication, including biometrics, can increase the probability that a person presenting a card to a reader is the same person who was initially issued the card.


Technology Game Changer

Technology Game-Changer

Linear tape file system revolutionizes video surveillance storage

By Paul Leury

According to IBM, 2.5 quintillion new bytes of information are created each day—that’s 1 with 18 trailing zeros. The explosion of “Big Data” has touched every industry. Video surveillance is no exception.


Boosting Legacy Infrastructure

Boosting Legacy Infrastructure

Networking will enhance capabilities for communication and monitoring functions

By Jim McLaughlin

The transition of existing physical security systems, such as fire and burglar alarm or video surveillance systems, to the next generation of technology has never been easier or more affordable than it is today.


Cameras Covering the Theatre

Cameras Covering the Theatre

Megapixel cameras provide comprehensive coverage at Montalbán facility

By Ralph C. Jensen

Located in the heart of Hollywood, Calif., The Ricardo Montalbán Foundation Theatre, named after the late actor and performing arts patron, is a venue for diverse cultural events.


Power to the People

Power to the People

How PoE applications can help future-proof customer networks

By Steven Olen

What you don’t know about PoE technology could actually be costing you business. Once you understand its broad usefulness and the numerous applications it supports, the more you realize it’s a perfect fit for an incredible number of customers and vertical markets.


Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3