Security Products Magazine Digital Edition - March 2016

March 2016

  • Private and Secure
  • Keep it Simple
  • Seven Superior Steps
  • A Prayer for Security
  • Intelligent Action
  • Cloud-Based Solution


Features

Intelligent Action

Intelligent Action

Using one platform to reign in all security applications

By Adlan Hussain

There have been many discussions and articles about PSIM over the last five years, but there is also a lot of confusion around exactly what it does, how it is defined, and in what way it differs from other forms of security management.


Helping Security Directors Sleep at Night

Taking a positive role in how security is managed

By Kim Rahfaldt

Every day the news bombards the public with the newest security breach: stolen identities, intellectual property breaches, unauthorized access, active shooter situations and more.


A Prayer For Security

Securing houses of worship may be easier said than done

By Jon Daum

Houses of worship have long been known as welcoming, open havens, offering support and guidance for people in need, but that mission is being challenged by active shooters and other criminals committing assault, theft, arson and vandalism.


Seven Superior Steps

Enterprises are challenged with having to deal with many categories of identities who need access to myriad of systems and resources that could be geographically dispersed across locations

By Pan Kamal

Today’s instant economy requires that more of a company’s business processes be open to external stakeholders.


Keep It Simple

Keep It Simple

With the goal in mind, don’t do stupid things

By Fernando Pires

Over the past decade, high-tech devices, megapixels, Power over Ethernet, and many other new offerings and improvements have revolutionized the physical security landscape.


Private and Secure

Private and Secure

What it takes to ensure your infrastructure is safe

By Andrew Elvish

Cyberattacks are on the rise. Whether via IT infrastructure or internally, the Security Industry faces the challenge of guaranteeing that the data in their systems remains private, properly protected and encrypted.


CLOUD-BASED SOLUTION

Cloud-based Solution

Reduce costs and grow your bottom line

By Ajay Jain

Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.


Cyber Impact

Cyber Impact

Why physical and IT security are converging

By Stephen Joseph

Today’s retail banks are nothing like they were in your grandfather’s day. Back then customers conducted all their banking business in a physical branch.


Departments

INDUSTRY FOCUS

Ready for the Showdown

By Ralph C. Jensen

All signs are pointing to Las Vegas for ISC West. Even though I’m writing this two months ahead of the show, it is pretty much all that is on my mind, as far as work is concerned.


INDUSTRY VERTICAL

High-Level Threats

Our connected world needs confident security systems

By Peter Smallridge

Our world is connected through travel now more than ever before. Globalization has made way for a constant coming and going, making border security more necessary.


INDUSTRY PROFESSIONAL

Experience, Longevity Focused on Security

By Ralph C. Jensen

In November 2015, New York-based system integrator Total Recall Corp. celebrated 30 years of designing and delivering technologically advanced video surveillance security solutions for a variety of industries including law enforcement, government agencies and corporations.


Dealer Strategies

Diversifying Company Assets

Diversifying Company Assets

By Ralph C. Jensen

You’ve heard of IdentiSys, and its mission to supply identification and card solutions to end users in North America.


You Can Benefit

Ten types of people who should look at smart lock options

By Larry Goldman

Sales of home automation systems and connected or smart locks are growing every year.


Growing Connection

Working with DIYers can provide another source of revenue, and make sure the job is done right

By Robert Ogle

The industry is starting to see a growing connection between existing home security and home automation providers and their DIY counterparts.


Webinars

New Products

  • HID Signo Readers

    HID Signo Readers

    HID Global has announced its HID® Signo™ Biometric Reader 25B that is designed to capture and read fingerprints in real-world applications and conditions. 3

  • Kangaroo Home Security System

    Kangaroo Home Security System

    Kangaroo is the affordable, easy-to-install home security system designed for anyone who wants an added layer of peace of mind and protection. It has several products, ranging from the fan-favorite Doorbell Camera + Chime, to the more comprehensive Front Door Security Kit with Professional Monitoring. Regardless of the level of desired security, Kangaroo’s designed to move with consumers - wherever that next chapter may be. Motion sensors, keypads and additional features can be part of the package to any Kangaroo system in place, anytime. Additionally, Kangaroo offers scalable protection plans with a variety of benefits ranging from 24/7 professional monitoring to expanded cloud storage, coverage for damage and theft. 3

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3