Security Products Magazine March 2013 Digital Edition

April 2013

  • PERIMETER SECURITY - First Line of Defense
  • CASINO SECURITY - In the Eye of the Beholder
  • SOFTWARE SOLUTIONS - Evolving Video
  • REMOTE MONITORING - Trapping Wild Hogs


Features

In the eye of the beholder - full dimensional, 360-degree camera keeps eyes on the floor

In the Eye of the Beholder

Full dimensional, 360-degree camera keeps eyes on the floor

By Ralph C. Jensen

When Graham Wallis walks into a Las Vegas casino, his first look isn’t to the slot machines or gaming tables. He is thinking about security and how his company can improve surveillance for the end user.


Evolving Video - Upgrades to new versions of open platform software help keep the safest campus in England on track

Evolving Video

Upgrades to new versions of open-platform software help keep the safest campus in England on track

By Courtney Dillon Pedersen

The University of East Anglia (UEA) was an early adopter of IP video surveillance in 2005. Milestone partner, Check Your Security (CYS), brought together a number of standalone CCTV systems into one IP-based monitoring system that is proving it can grow with the university.


Mesh Meets Mining - Video surveillance bolsters safety, security at Wyoming operation

Mesh Meets Mining

Video surveillance bolsters safety, security at Wyoming operation

By Pramod Akkarachittor

FMC Corp. is a diversified, chemical company with leading positions in agricultural, industrial and consumer markets. Since the company’s inception in 1883, FMC has been providing solutions to companies worldwide and to their customers.


trapping wild hogs - state harnesses power by using cellular network

Trapping Wild Hogs

State harneses power by using cellular network

By Adam Cohen

Helping the state of Tennessee with a solar-powered, IP video-based solution to catch wild hogs, ICRealtime has installed an autonomous remedy by harnessing the power of Verizon’s nationwide cellular network.


more than analytics - small business owners took for tools to improve productivity

More Than Analytics

Small business owners look for tools to improve productivity

By David Klein

Although video analytics have been around for years in various forms, they haven’t always been easy to use, or economical, at least not for a small business owner.


out with the old, in with the new

Out With the Old, In With the New

Securing Long Beach Airport

By Greg Hetrick

Located just 18 miles southeast of Los Angeles International Airport lies a hidden gem for Southern California air travelers. Long Beach Airport (LGB), which serves more than 3.2 million passengers annually, has one of the strictest noise-abatement ordinances in the nation for its neighboring residential communities.


glowing blue lights - Infrastructure on campus updates to new equipment

Glowing Blue Lights

Infrastructure on campus updates to new equipment

By Samuel Shanes

Colleges across the country have stepped up their safety and security initiatives in the wake of recent mass shootings and tragedies. Campuses large and small have re-worked their security infrastructure and upgraded old and antiquated equipment.


CentraCare Health System takes a multi-pronged approach to medical safety and patient care

Operating with an Aggressive Dose of Security

CentraCare Health System takes a multi-pronged approach to medical safety and patient care

By Fredrik Nilsson

Four hospitals (St. Cloud, Long Prairie, Melrose and Sauk Centre), five long-term care facilities, nearly a dozen clinics and numerous specialty services operate under the growing CentraCare Health System umbrella in central Minnesota. In the past four years, Centra- Care’s growth has skyrocketed, and so, too, has the need to upgrade its security systems.


Perimeter security encompasses a plethora of physical security solutions including, intrusion-detection systems, crash-resistant barriers, access control, gate operators and high-security fencing.

First Line of Defense

New technologies help meet the demand to ward off strangers

By Joseph Goudlock

Perimeter security encompasses a plethora of physical security solutions including, intrusion-detection systems, crash-resistant barriers, access control, gate operators and high-security fencing.


Changing Behavior

Plan for the future rather than react to events

By Barry Willingham

All things in life change over time. As it relates to the world of security, the acceleration of change began with the unforgettable terrorist attacks on our domestic soil in 2001, with multiple other events that followed.


Departments

Creating Secure Zones at School

By Ralph C. Jensen

How secure is your school? Maybe you worry when your children leave in the morning that they won’t come home filled with knowledge and understanding. Perhaps their security is a question mark.


Three Phases of IP Video Evolution

Three Phases of IP Video Evolution

Planning ahead can prevent harm to people and the bottom line

By Lars Thinggaard

Milestone Systems’ sustained growth during its first 15 years is attributed to its introduction of the open-platform approach to the security industry.


Government Security

Wireless access links diverse buildings

Wireless Access Links Diverse Buildings

Technology provides longer-lasting protection

By April Dalton-Noblitt

With scattered buildings and each with different access control needs, the town of Estes Park, Colo., faced a complicated security situation. Initially, the town upgraded its security by converting mechanical locks to several types of compatible electronic locks that improved control over authorized users, yet provided flexibility in meeting access control needs.


grabbing a slice of government pie

Grabbing a Slice of Government Pie

Who is being funded, what they are looking for and what goes into building a proper solution

By John Merlino

Despite the economic uncertainty in our nation’s capital, there is still plenty of upside to government security spending in fiscal 2013 with opportunities to be awarded significant contracts.


evolution of the face

Evolution of the Face

Technology puses science fiction out the door

By Paul Schuepp

Are our faces now like bar codes, easily scanned and instantly traceable? Not quite. But face recognition has grown into a tool that every investigator can benefit from.


Operation bunkers - first responders can make a difference if properly protected

Operation Bunkers

First responders can make a difference if properly protected

By Bob Bradshaw

Portable bunkers provide first responders the ability to make a difference in the early stages of critical crisis response. If staged in schools, airports or a mall, these tools become a needed resource for first responders regardless of the level of training or the equipment they may have.


Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3