Security Products Magazine Digital Edition - February 2016

February 2016

  • Where video Data Will Take Us
  • Protecting the Network
  • Getting the Right Badge
  • Safeguarding the Power
  • Meeting Federal Requirements
  • A Thankless Career


Features

Where Video Data Will Take Us - Successful companies read the tea leaves and saw IoT-connected devices coming. This includes video surveillance, which is now among the fastest growing industries in terms of data generation and adoption of new data storage technologies.

Where Video Data Will Take Us

The state of video surveillance and where storage is taking the industry

By Brian Grainger

Successful companies read the tea leaves and saw IoT-connected devices coming. This includes video surveillance, which is now among the fastest growing industries in terms of data generation and adoption of new data storage technologies.


Safeguarding the Power - Providing protection for some of the nation’s most valuable assets

Safeguarding the Power

Providing protection for some of the nation’s most valuable assets

By Brittany Lauridsen

You are on duty at a large power station when you hear a gunshot coming from the South side of the facility. This shot triggers your security systems sniper detection alarm.


Meeting Federal Requirements - Virgin Islands Port Authority secures the islands with access control

Meeting Federal Requirements

Virgin Islands Port Authority secures the islands with access control

By Kim Rahfaldt

The remote geographic location with each island being separated by miles of ocean posed some challenges for the project, making air, land and sea transportation necessary to complete the job.


It

It's All About the Network

Continued increase in data breaches reinforces need for holistic security approach

By Gregory Grant

The daily increase in the number of cyber attacks launched and the success hackers are having against heavily guarded businesses are a wake-up call for all companies to be more proactive and vigilant in their security efforts.


How to choose the perfect ID card printer for your business

Getting the Right Badge

How to choose the perfect ID card printer for your business

By Monique Merhige

Each industry has its own specific requirements for photo ID card solutions. The guidelines used by each market vary depending on the type of badges that companies need to print and the frequency.


Departments

A Thankless Career - Because of recent news and my frequent visits through the security checkpoint, I have come to lack confidence in TSA employees.

Industry Focus

A Thankless Career

By Ralph C. Jensen

Because of recent news and my frequent visits through the security checkpoint, I have come to lack confidence in TSA employees.


Industry Professional

Ahead of the Curve

By Ralph C. Jensen

Thirty years ago, maybe more, the dream of the IP camera was about to make its debut. The technology, as I remember it, wasn’t all that well received, but that didn’t mean it was a bad idea. It became an exercise of marketing the future to the here and now.


Security for All Sizes

Industry Vertical

Security for All Sizes

Bank employees think about security a lot

By Scott Thomas

We almost never think about the fact that the public flows through our banks day after day or that suppliers and partners are in and out of branch locations, some requiring access to sensitive areas, all the time.


Networking Security

Boosting Security - Saratoga Springs’ businesses, residents and tourists are safer with secure VMS

Boosting Security

Saratoga Springs’ businesses, residents and tourists are safer with secure VMS

By Courtney Dillon Pedersen

Every summer, the Saratoga Race Course brings thousands of visitors to the City of Saratoga Springs, NY. The revenue generated during the racing season boosts the city’s economy for the rest of the year.


The New Standard

The transformative impact for video intercoms and network technology

By Karl Hill

Have you ever stopped to notice that as video surveillance goes, so goes the security industry? Nowhere is that more evident than in the major shift from analog to IP technology.


Protecting the Network - Improving physical security with operations’ team help

Protecting the Network

Improving physical security with operations’ team help

By Ajay Jain

For many years, physical and network security existed as separate disciplines, each managed by an independent operations team on its own side of the house with little or no crossover between the two.


The Security of Your Security System - More often than not, passwords are left as defaults

The Security of Your Security System

More often than not, passwords are left as defaults

By Brian Carle

In the past two years several high profile data breaches, namely the Target data breach in 2014, have put greater focus on the data security of all network connected devices.


Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3