Security Products Magazine Digital Edition - March 2016

March 2016

  • Private and Secure
  • Keep it Simple
  • Seven Superior Steps
  • A Prayer for Security
  • Intelligent Action
  • Cloud-Based Solution


Features

Intelligent Action

Intelligent Action

Using one platform to reign in all security applications

By Adlan Hussain

There have been many discussions and articles about PSIM over the last five years, but there is also a lot of confusion around exactly what it does, how it is defined, and in what way it differs from other forms of security management.


Cyber Impact

Cyber Impact

Why physical and IT security are converging

By Stephen Joseph

Today’s retail banks are nothing like they were in your grandfather’s day. Back then customers conducted all their banking business in a physical branch.


Keep It Simple

Keep It Simple

With the goal in mind, don’t do stupid things

By Fernando Pires

Over the past decade, high-tech devices, megapixels, Power over Ethernet, and many other new offerings and improvements have revolutionized the physical security landscape.


Private and Secure

Private and Secure

What it takes to ensure your infrastructure is safe

By Andrew Elvish

Cyberattacks are on the rise. Whether via IT infrastructure or internally, the Security Industry faces the challenge of guaranteeing that the data in their systems remains private, properly protected and encrypted.


Helping Security Directors Sleep at Night

Taking a positive role in how security is managed

By Kim Rahfaldt

Every day the news bombards the public with the newest security breach: stolen identities, intellectual property breaches, unauthorized access, active shooter situations and more.


A Prayer For Security

Securing houses of worship may be easier said than done

By Jon Daum

Houses of worship have long been known as welcoming, open havens, offering support and guidance for people in need, but that mission is being challenged by active shooters and other criminals committing assault, theft, arson and vandalism.


Seven Superior Steps

Enterprises are challenged with having to deal with many categories of identities who need access to myriad of systems and resources that could be geographically dispersed across locations

By Pan Kamal

Today’s instant economy requires that more of a company’s business processes be open to external stakeholders.


CLOUD-BASED SOLUTION

Cloud-based Solution

Reduce costs and grow your bottom line

By Ajay Jain

Even though the security industry has been talking about the concept of “The Cloud” for a number of years, the industry has been slow to capitalize on the capabilities and power of the platform on a widespread basis.


Departments

INDUSTRY FOCUS

Ready for the Showdown

By Ralph C. Jensen

All signs are pointing to Las Vegas for ISC West. Even though I’m writing this two months ahead of the show, it is pretty much all that is on my mind, as far as work is concerned.


INDUSTRY PROFESSIONAL

Experience, Longevity Focused on Security

By Ralph C. Jensen

In November 2015, New York-based system integrator Total Recall Corp. celebrated 30 years of designing and delivering technologically advanced video surveillance security solutions for a variety of industries including law enforcement, government agencies and corporations.


INDUSTRY VERTICAL

High-Level Threats

Our connected world needs confident security systems

By Peter Smallridge

Our world is connected through travel now more than ever before. Globalization has made way for a constant coming and going, making border security more necessary.


Dealer Strategies

You Can Benefit

Ten types of people who should look at smart lock options

By Larry Goldman

Sales of home automation systems and connected or smart locks are growing every year.


Diversifying Company Assets

Diversifying Company Assets

By Ralph C. Jensen

You’ve heard of IdentiSys, and its mission to supply identification and card solutions to end users in North America.


Growing Connection

Working with DIYers can provide another source of revenue, and make sure the job is done right

By Robert Ogle

The industry is starting to see a growing connection between existing home security and home automation providers and their DIY counterparts.


Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3