Security Products Magazine Digital Edition - May 2016

May 2016

  • Honing in on Conversation
  • Home Security Shouldn't Make Us Less Safe
  • Thinking Outside the Cloud
  • Doubling Down
  • Elevating with Helium
  • Building Software


Building Software

Building Software

Unifying the enterprise will help security run smoother

By Simon Morgan

Today’s security leaders must present solutions to enterprise organizations that meet the needs of these diverse organizations.

Doubling Down

Doubling Down

Stones Gambling Hall protects patrons and neighborhood with HD video cameras

By John Bartolac

In the world of casino card games, opportunity for slight-of-hand is abound. Dealers and players are trading palm-sized chips, swapping cards from the deck, cashing out winnings.

Tackling Shrink

Technology demands that theft stop dead in its tracks

By Jumbi Edulbehram

The winter holiday season is a highly anticipated double-edged sword for retailers. During this time period, brick-and-mortar stores earn a large chunk of annual revenue, and the aggregated sales statistics from big-box stores can often serve as a gauge for how the economy is faring overall.

Yahoo Account Key: Convenience Over Security

Yahoo Account Key: Convenience Over Security

Passwords have had their time and day; now it is time for wireless access control

By Hector Hoyos

Many companies are developing new ways to handle access control and identity authentication for their customers to combat the increasing number of security breaches and the acknowledged flaws in the PIN and password model. Yahoo is the latest company to deploy a service aimed at replacing the password.

Emerging Technologies

Emerging Technologies

Your 2016 radar should include IoT, cyber security and smart codecs

By James Marcella

If you’re like most security professionals, your daily inbox is crammed with updates from industry associations, publications and online communities summarizing the hot topics of the day.

Honing In On Conversation

Honing In On Conversation

People might say things they don’t mean, but why take that chance?

By Zeke Fraint

College and university, corporate, and hospital campuses are all understood to be safe environments. Inevitably, they become easy targets for social media abuse resulting in security threats, and open venues that encourage community gathering.

Elevating With Helium

Elevating With Helium

Managing security at the border might have aerial implications

By John Kiehle

It is well known airships had a more limited role in the late 20th century, following the Hindenburg tragedy that coincided with tremendous innovation in fixed-wing and passenger aviation.

Thinking Outside The Cloud

Security has been slow to adopt Cloud services

By Tom Cook

A series of Microsoft commercials beginning in 2010 brought the concept of “the cloud” into our cultural lexicon. The ensuing five-plus years have grown awareness and adoption of the concept behind that term, especially in the consumer arena.


Industry Professional

What IC720 Means to Advancing Surveillance

By Paul Muto

IC Real Tech CEO Matt Sailor sat down for a few questions to shed some light on the company’s revolutionary technology and how it will benefit many vertical markets.

Industry Focus

How Do You Allow Security to Slip?

By Ralph C. Jensen

It is no secret that terrorism is part of today’s landscape. Governments are responsible for providing a secure and safe environment almost anywhere the public might go.

Smarter Listening

Industry Vertical

Smarter Listening

Cities are adding infrastructure that is more intelligent

By Richard Brent

Recent data shows that crime continues to evolve. In some areas, overall crime is down, yet there has been an alarming increase in mass shootings and terrorism.

Networking Security

Extreme Requirements

Extreme Requirements

One of Europe’s largest energy providers meets a BalaBit solution

By Gábor Marosvári

CEZ recently faced several challenges, including a large increase of IT devices to be monitored, pressure to increase work efficiency and reduce the number of employees at the same time.

Policy Conundrum

Media attention has focus on this issue

By Dwayne Melancon

Cybersecurity isn’t the sexiest topic for presidential candidates right now, but controversial legislation, massive security breaches and increasing tension with China are keeping media attention on the issue.

An Apple A Day

An Apple A Day

Keeps security at bay

By Joseph Mazzarella

Apple’s refusal to unlock the San Bernardino terrorists’ smartphones has generated a heated debate in security, technology and legal circles nationwide.

Dealer Strategies


Don't Gamble The Future

How to improve your odds when picking the best partners and products for your business

By Fredrik Nilsson

When it comes to picking the right strategy, the right partners and the right products, you want to make sure the odds are stacked in your favor.

Smart Business

Smart Business

More than half the population is excited for home technology

By David Box

Security is still number one in driving mass-market adoption, with nine out of 10 consumers noting security remains one of the top reasons to purchase and use a smart home system.

Snap Shot

Snap Shot

Getting a lock on the criminal element citywide

By John Chigos

Out of a vast number of proposals, Montevideo’s leadership ultimately selected the one submitted by SONDA, one of the leading systems integrators in Latin America.

Born Into The Business

Born Into The Business

By Ralph C. Jensen

Like many integrators, AVS specializes in a unique market. Of course they work in the real estate, healthcare, and government industry, but their secret sauce, if you will, is their expertise in securing data centers.

Government Security

Bringing the Feeds Together

Bringing the Feeds Together

LAPD connects more than 400 distributed cameras from multiple organizations in California to secure high-profile international event

By Andrew Elvish

The sheer size and notoriety of the event had the Los Angeles Police Department (LAPD) planning security and operational logistics long before the opening ceremony.

Innovative Solutions

Two decades later, Bradford County Sheriff ’s Office continues to invest in security to ensure compliance

By Mitchell Kane

Leveraging innovative solutions to accomplish these goals, the sheriff ’s office replaced its key-based system with a more advanced access control solution more than 20 years ago.


New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3