Chicagoland Abuzz with Anticipation of ASIS 2013

With active sidewalks filled with people strolling about in the crisp, autumn winds and signs almost everywhere you look referring to ASIS 2013, downtown Chicago is filled with the excitement and anticipation of opening day at McCormick Place.

This enthusiasm is demonstrated in the two pre-show events that I was invited to attend in which I learned more about interoperability as well as a revolutionary cloud solution.

PSIA Showcase

Just a short stroll from the hotel that I will be calling "home" for the next three nights, I had the opportunity to set in on a panel discussion about interoperability hosted by PSIA.

"There are three ways to interoperate," explained Deon Chatterton, senior manager integrated risk technologies department, Cisco, "custom integration, third party PSIM integration and system standards."

Unless manufacturers embrace and decide to use system standards that allow security devices to work together, the security industry can become a pure nightmare, filled with proprietary devices.

"An ID is an ID is an ID. At some point interaction needs to happen to add value to an organization," said Chatterton. "It's not enough to keep the bad guys out; locking doors is a given. We must go beyond just letting people in and out of doors."

Mike Faddis, Microsoft Global Security, further supported interoperability as he spoke about the cloud and IP being the future of the security industry and the need for interoperability to support both.

"This is not about competing," assured Faddis. "We must come together as an industry and embrace a holistic approach to drive specs from the end users' perspective."

How does PSIA plan to support this notion of interoperability? With the Physical-Logical Access Interoperability (PLAI) Working Group whose main goal is to develop a specification to unify logical and physical identities that allow manufacturers, integrators and end users to develop cost effective, easy-to-deploy solutions.

According to Mohammad Soleimani with Kastle Systems, PLAI has developed three levels of integration:

  • Level 1: Multiple PACS;
  • Level 2: Functional role managed by IT; and
  • Level 3: Mobile credentials.

Faddis concluded that in the end, organizations are looking to enhance functionality, improve efficiency and lower costs; therefore, to fulfill each of these goals, interoperability is the answer.

Sony Dinner at The Palmer House

The changing face of Sony through the transformation from product-focused to solution-focused versatility concluded my pre-show festivities. After a small meet and greet, and before a lovely dinner, we were presented with Sony's IPELA Cloud solution serviced by NextConnect video from Next Level Security, representing a tight integrated relationship.

What makes the IPELA Cloud solution different from all the other cloud services out there? Sony's cameras connect directly to the cloud, so there is no need for additional hardware and video is not limited. In fact, video streams directly from the site to the user, so no host costs are incurred either.

This provides a flexible system that is easy to install and gives the best quality video - even on the free app - allowed by the device in which the user is viewing it on.

"This technology allows you to break into the cloud industry without investing in a data center," said Brian Thomas, president of A3 Communications, who is piloting the IPELA Cloud.

(I will actually be visiting the Sony booth during ASIS so I can get a closer look at the IPELA Cloud along with other security solutions that Sony offers.)

With these two pre-show events acting as teasers to what is to come at ASIS 2013, I anxiously the first day of tradeshow exploration!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.