Security Products October 2011 Edition

October 2011


Features

Saving Money

Saving Money

Money Wireless locking opens the door to access control in areas unreachable with a wired system

By Sean Leonard

Most security professionals know that wireless systems remove the expense of running wire to all access points, a project that takes too much time and wreaks havoc throughout the facility while the job is being done.


Get in Shape

Get in Shape

Seven essentials for enterprise security success

By Philip Lieberman

In a year in which some of the biggest names in both physical and logical security have been named and shamed for security lapses and subsequent breaches, reality is bearing down hard on the IT executive.


Guarding the Mainstream

Guarding the Mainstream

Remote video-guarding can actually improve overall security

By Mahesh Saptharishi, Ph.D.

It’s well-documented that effectively monitoring security cameras is difficult. Human operators routinely suffer from fatigue and lack of focus, even after short periods of time, which results in missed events.


On Duty

On Duty

High-end video keeps watch

By Del V. Salvi

When a golf cart went missing at CordeValle, a 44-room Rosewood golf resort on 1,700 acres in the foothills of the Santa Cruz mountains about 25 miles south of San Jose, Calif., it was a wakeup call about the resort’s need to upgrade its aging video surveillance system.


All Clear at the Port

All Clear at the Port

British ports need flexibility and high definition

By Keith Marett

To help comply with industry regulations, boost security and improve operational efficiencies, Associated British Ports (ABP) needed a flexible HD surveillance system that could easily integrate with the port operator’s existing analog system.


Departments

Tale from the Dark Side

Tale from the Dark Side

Penumbrous forces wait to feed on your calamity

By Ronnie Rittenberry

In this autumnal month of witchery, trickery, and general tom-ghoulery, there comes a Halloween-worthy tale disturbing enough to haunt the mind of any business owner or information technology professional.


Four Keys to Building an RMR Machine

Changing your business model is not the same as changing your shirt

By John Szczygiel

Everywhere, we are seeing articles, blogs, advertising and conferences about growing recurring monthly revenue, or RMR. It seems that the security industry is obsessed with this concept. It’s a good obsession, provided that we keep in mind that building RMR is more about philosophy and execution than technology, and that we focus on a few key facts.


Supplement

IP based Physical Access Control

Five reasons to adopt this technology now

By Dan O’Malley

Organizations of all sizes are migrating from analog to IP-based physical access control solutions, drawn by increased security, increased operational efficiency and better availability.


Not for the Faint of Heart

Not for the Faint of Heart

By Dan Myslewski

Providing security in the government sector is not for the faint of heart or the uncommitted. The government sector requires expertise in high-level security applications, advanced compliance requirements and the challenge of securing funding.


Chopper Control

Chopper Control

High-tech helipads modernize emergency transport services in Travis County, Texas

By Christina Miralla

Helicopter emergency safety decisions are separate from medical decisions. Helicopter personnel need to be armed with the latest navigation tools to ensure safety for all onboard, especially when a matter of minutes can mean the difference between life and death.


Verification Versus Priority Dispatch

By Stan Martin

Over the last decade, the alarm industry has spent millions of dollars and thousands of hours addressing the issue of preventing unnecessary police dispatches from alarm systems.


Achieving Integrated Security Excellence

Achieving Integrated Security Excellence

In lean times, system convergence can help businesses do more with less

By Warren Rosebraugh

With the number of IT devices used in businesses today growing rapidly, organizations are seeking solutions that not only reduce risk and secure property and staff, but also offer IT and security convergence for maximum protection of people and property across buildings systems.


Protecting the Corridor

Deployed cameras keep watch over a campus in the bustling area surrounding the nation’s capital

By Del V. Salvi

This need for better image quality led GMU directly to IP-based megapixel camera technology. The university evaluated several wellknown camera suppliers before deciding on Arecont Vision.


Lets Work Together

Let's Work Together

Finding the right monitoring partner for your business

By Megan Weadock

Building a successful dealer business is much like experimenting with a new recipe: Without the right ingredients, you’re setting yourself up for failure.


Finding Financing

Finding Financing

Alarm dealer expert shares keys to successfully obtaining capital

By Cindy Horbrook

Whether you’re a brand-new alarm dealer starting a company or an established dealer looking to expand through acquisitions, opportunities for financing abound.


Dont Let FIPS Give You Fits

Don't Let FIPS Give You Fits

By Doug Otto

As a result of Homeland Security Presidential Directive 12 (HSPD- 12), smart cards are spreading rapidly through government agencies and many large organizations. The directive’s purpose is to ensure secure and reliable identification for every federal employee and government contractor.


Federal Identity

Federal Identity

Achieve compliance without a rip-and-replace investment

By David Adams

When the Homeland Security Presidential Directive-12 (HSPD-12) was enacted in August 2004, government agencies embarked on the challenging task of complying with an evolving set of standards designed to ensure that all federal employees and contractors have secure and reliable forms of identification.


Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3