Security Products October 2011 Edition

October 2011


Features

Saving Money

Saving Money

Money Wireless locking opens the door to access control in areas unreachable with a wired system

By Sean Leonard

Most security professionals know that wireless systems remove the expense of running wire to all access points, a project that takes too much time and wreaks havoc throughout the facility while the job is being done.


Get in Shape

Get in Shape

Seven essentials for enterprise security success

By Philip Lieberman

In a year in which some of the biggest names in both physical and logical security have been named and shamed for security lapses and subsequent breaches, reality is bearing down hard on the IT executive.


Guarding the Mainstream

Guarding the Mainstream

Remote video-guarding can actually improve overall security

By Mahesh Saptharishi, Ph.D.

It’s well-documented that effectively monitoring security cameras is difficult. Human operators routinely suffer from fatigue and lack of focus, even after short periods of time, which results in missed events.


On Duty

On Duty

High-end video keeps watch

By Del V. Salvi

When a golf cart went missing at CordeValle, a 44-room Rosewood golf resort on 1,700 acres in the foothills of the Santa Cruz mountains about 25 miles south of San Jose, Calif., it was a wakeup call about the resort’s need to upgrade its aging video surveillance system.


All Clear at the Port

All Clear at the Port

British ports need flexibility and high definition

By Keith Marett

To help comply with industry regulations, boost security and improve operational efficiencies, Associated British Ports (ABP) needed a flexible HD surveillance system that could easily integrate with the port operator’s existing analog system.


Departments

Tale from the Dark Side

Tale from the Dark Side

Penumbrous forces wait to feed on your calamity

By Ronnie Rittenberry

In this autumnal month of witchery, trickery, and general tom-ghoulery, there comes a Halloween-worthy tale disturbing enough to haunt the mind of any business owner or information technology professional.


Four Keys to Building an RMR Machine

Changing your business model is not the same as changing your shirt

By John Szczygiel

Everywhere, we are seeing articles, blogs, advertising and conferences about growing recurring monthly revenue, or RMR. It seems that the security industry is obsessed with this concept. It’s a good obsession, provided that we keep in mind that building RMR is more about philosophy and execution than technology, and that we focus on a few key facts.


Supplement

IP based Physical Access Control

Five reasons to adopt this technology now

By Dan O’Malley

Organizations of all sizes are migrating from analog to IP-based physical access control solutions, drawn by increased security, increased operational efficiency and better availability.


Not for the Faint of Heart

Not for the Faint of Heart

By Dan Myslewski

Providing security in the government sector is not for the faint of heart or the uncommitted. The government sector requires expertise in high-level security applications, advanced compliance requirements and the challenge of securing funding.


Chopper Control

Chopper Control

High-tech helipads modernize emergency transport services in Travis County, Texas

By Christina Miralla

Helicopter emergency safety decisions are separate from medical decisions. Helicopter personnel need to be armed with the latest navigation tools to ensure safety for all onboard, especially when a matter of minutes can mean the difference between life and death.


Verification Versus Priority Dispatch

By Stan Martin

Over the last decade, the alarm industry has spent millions of dollars and thousands of hours addressing the issue of preventing unnecessary police dispatches from alarm systems.


Achieving Integrated Security Excellence

Achieving Integrated Security Excellence

In lean times, system convergence can help businesses do more with less

By Warren Rosebraugh

With the number of IT devices used in businesses today growing rapidly, organizations are seeking solutions that not only reduce risk and secure property and staff, but also offer IT and security convergence for maximum protection of people and property across buildings systems.


Protecting the Corridor

Deployed cameras keep watch over a campus in the bustling area surrounding the nation’s capital

By Del V. Salvi

This need for better image quality led GMU directly to IP-based megapixel camera technology. The university evaluated several wellknown camera suppliers before deciding on Arecont Vision.


Lets Work Together

Let's Work Together

Finding the right monitoring partner for your business

By Megan Weadock

Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.


Finding Financing

Finding Financing

Alarm dealer expert shares keys to successfully obtaining capital

By Cindy Horbrook

Whether you’re a brand-new alarm dealer starting a company or an established dealer looking to expand through acquisitions, opportunities for financing abound.


Dont Let FIPS Give You Fits

Don't Let FIPS Give You Fits

By Doug Otto

As a result of Homeland Security Presidential Directive 12 (HSPD- 12), smart cards are spreading rapidly through government agencies and many large organizations. The directive’s purpose is to ensure secure and reliable identification for every federal employee and government contractor.


Federal Identity

Federal Identity

Achieve compliance without a rip-and-replace investment

By David Adams

When the Homeland Security Presidential Directive-12 (HSPD-12) was enacted in August 2004, government agencies embarked on the challenging task of complying with an evolving set of standards designed to ensure that all federal employees and contractors have secure and reliable forms of identification.


New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.