September 2012


Features

Reaching New Heights

Advancing video technologies are poised to meet emerging application needs

By Greg Peratt

Security challenges in the airport environment are likely to increase rather than decrease over time. The trends toward more passengers, traffic and frequent flights also will mean more people, baggage and airplanes to watch and protect.


To The Chalkboard

Diagramming a multi-campus strategy

By Fredrik Nilsson

When police in Racine, Wis., issued an “attempt to locate” alert for a sexual assault suspect at Gateway Technical College, students received an email from campus security stating that the college had video footage of the event that might help authorities apprehend the culprit.


A Port In The Storm

Maritime regulations and security systems have changed rapidly since 2001

By Debjit Das

In 2011, U.S. imports of manufactured goods exceeded $2 trillion and exports reached approximately $1.3 trillion, reflecting an annual growth of more than 15 percent from 2010.


New To Emergency

Students, faculty offer words of support for lighted towers

By Eric Holtane

A year ago—new to the industry and lacking any special knowledge associated with campus safety or general security—I started working at an Illinoisbased emergency communication company.


Think Ink

Finding the perfect technology for your cards

By Jeff Tingley

As the number of applications that require visual authentication and increased security grows, identification cards are commonly taken as a cost-of-entry to ensure physical security and access.


Work Hard Play Hard

Albuquerque hotel, casino upgrades surveillance system to provide best customer experience

By Todd Flowers

Whether you’re visiting for a weekend getaway or a business conference, a meeting or a round of golf, the four-star, family-friendly Hard Rock Hotel & Casino Albuquerque is dedicated to offering its guests a pleasant stay with amenities that include a full-service spa.


Situational Awareness

The key to security on the high seas

By Thurston Brooks

Due to increases in maritime commercial trade and related terrorist activity, challenges to maritime security have produced a demand for better and smarter technology to support our forces and protect our offshore assets.


Departments

Total Situational Awareness

Taking a look at PSIM and PIAM convergence

By Ajay Jain

It begins with a single system. It could be an access control system or a video system, but for a time it is enough to serve the company’s needs.


Meeting of the Minds

By Ralph C. Jensen

Like most worthwhile enterprises, the security industry is made up of numerous valuable partnerships.


Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3