Choice of Words

In my business we get to use words to explain and herald new products, technology and solutions. In this business, our writing follows the AP Stylebook. It's supposed to help journalists use the right words.

I have a few choice words that I don't allow as the editor in chief. For instance, I never allow utilize. We substitute use. I don't like the word personnel. We use staff.

A new word has entered what I call, Ralph's style. The word, convergence.

Convergence was part of the security industry a few years back. I'm sure you remember all the hype. It's one of those words we have to let go of. Convergence has happened, and if you still waiting for convergence, you missed the boat.

I bring this up because during the tradeshow travels on Tuesday, one of the exhibitors began the conversation with, "when the industry converges with IT …."

We've converged.

Here are a few things I found interesting on Tuesday.

Protection 1 has earned a coveted Cisco Cloud and Managed Services Express Partner certification. This award recognizes companies that have attained expertise in the preparation, planning and designing and implementing phases for selling and supporting cloud or managed services based on Cisco platforms. Oh yeah, they are the only monitoring company that has earned this honor.

Sielox has introduced its Sielox Class Crisis Lockdown Alert Status System. This is a great solution in the K-12 education vertical. Getting a handle on crisis situations in our schools and universities is important to students, parents, educators and law enforcement.

The product is accessible from anywhere, anytime on your iPad, Android, smartphone, desktop and more.

Now that Tyco IS and ADT are two separate companies, I had the opportunity to meet with Mark VanDover, president of Tyco IS about the new strategy for Tyco IS.

Tyco IS is targeting small- to medium-sized businesses as new clients. Tyco is known for its focus on commercial accounts, but now are looking at the other end of the market.

"Small business is now a stable market," VanDover said. "Entering this market is a good value proposition."

Five market areas have been targeted for a test drive of the new Tyco IS. They include two areas in Southern California, Chicago, South Florida and Dallas. The criteria for this trial run involves current areas of growth and opportunity, and the skill set of Tyco leadership in these areas.

I think it will be very interesting to watch Tyco IS grow and mature its new business model, which is expected to be fully implemented in 2015. VanDover said the company is always looking for the right opportunity to grow, and they will. Watch them.

It's been a great tradeshow. The traffic near the convention center is horrible, but inside the building is business as usual. Good hard work by hard working people.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3