Security Products Magazine Digital Edition - November 2016

November 2016

  • Turn on the Lights
  • Tornado Tracking
  • Heads Up
  • Securing the Network
  • Key Management


Securing The Network

Securing The Network

Is your network secure? Hardening guide covers cyber security practices for deploying Milestone IP video

By Bjørn Eilertsen

It is an understatement to say that IP networks have been a game changer for specifying, installing or managing video security and surveillance systems.

Turn On The Lights

Turn On The Lights

Deploying advanced IP cameras in the challenging light conditions of rolling stock environments

By Kevin Shen

Most security professionals have acquired important video only to see that the resulting footage is over or under exposed because the camera is unable to adapt to the challenging light environment.

Tornado Tracking

Tornado Tracking

Independent alarm installer watches and reacts, saving lives

By Peggy Page

April 28, 2014, stands out in the memory of the residents of northern Mississippi as a violent F4 Tornado left a wake of major damage killing 10 people and injuring more than 80.

Heads Up

Heads Up

Achieving enhanced situational awareness through intelligence gathering in the financial market

By Kevin Wine

The financial business is always evolving to meet the growing demands of customers, and organizations have shifted priorities significantly to provide the highest level of service and convenience.


Industry Commentary

Combatting Patent Trolls: Federal Legislation Is The Solution

By Don Erickson

During this unusual political season, the presidential nominees have focused on significant national issues that receive constant media coverage such as border security and immigration, race relations, criminal justice reform, and taxes.

Vision in Volumes

Industry Professional

Vision in Volumes

SVP of Global Engineering at HID Global discusses accomplishment, goals, and what he thinks the future holds for the trusted identity

By Lindsay Page

One of the biggest accomplishments for Learmonth with HID Global has been the move to mobile, which was first rolled out in 2014 with HID Mobile Access. This solution allows mobile devices to be used for access control.

Industry Focus

Long Lines at Pre-Check

By Ralph C. Jensen

Remember back in the old days when having pre-check stamped on your boarding pass meant getting through security a little bit quicker, and with the convenience of not having to take your laptop out, removing your shoes and not having to have an inspection on toiletries.

Key Management

Industry Vertical

Key Management

Benefits include improvements to cost, productivity, efficiency, security and convenience

By Fernando Pires

More than ever, the incidents of theft and property crime as well as information security are of greater concern for corporations, universities, hospitals and other large organizations.

Networking Security

Widen The Approach

Widen The Approach

IT professional must review skill sets to meet new threats

By Tom Gilheany

Remember the Jurassic Age of organizational security? You built the stronghold, hardened the perimeter, established a set of rules and walked away. Security? Done.

Software Defined

Wide-area networking comes to physical security

By Dr. Cahit (Jay) Akin

As physical security technology continues to advance in both complexity and capability, it is increasingly bumping into and being influenced by other technology segments.

Sophisticated Attacks

Sophisticated Attacks

Enhancing cyber infrastructure security with virtual sandboxes and cyber ranges

By Shashi Kiran

With cyber-attacks on the ascent, the need to strengthen the security posture and be responsive is top of mind for CIOs, CEOs and CISOs. Security is closely interlinked to all aspects of the business and has a direct bearing on business reputation, privacy and intellectual property

Securing Confidences

Securing and validating critical vision data

By John Stamos

Manufacturing companies are placing increasing emphasis on data security throughout their operations to protect confidential data and to validate their systems are protected against unauthorized and unwanted changes.

Dealer Strategies

Once A Champio...Always

Once A Champion...Always

By Ralph C. Jensen

There is something to be said about a close family business. There can be trying times, but by and large there are close ties not only to business projects, but for family matters as well.

Adjust Your Marketing and Sales Practices

Different sales strategies and practices will ensure compliance

By Barbara Holliday

Baby Boomers are typically defined as the group born from 1946 to 1964, which means they are now between 50 and 70 years old. According to the U.S. Census Bureau, by the year 2030, 20 percent of Americans will be 65 and older, up from 13 percent in 2010.

Always Connected, Always Protecting

Always Connected, Always Protecting

Today’s technology provides security at the fingertips

By Joe Oliveri

In today’s world, businesses and organizations require a multitude of security solutions at their fingertips to adequately help protect their customers, employees and facilities from harm. The always-on, always- connected nature of our workforce calls for managers to have oversight and control over the security systems in place 24/7.

Campus Security & Life Safety

Knowledge Of The District

Knowledge Of The District

Campus officials work together when buying first-rate equipment

By Steve Darragh

While the number of cameras per property varies anywhere from 15 at a smaller elementary up to 80 or more at a larger high school, the Weber School District initially used design tools from Axis to determine an efficient solution now implemented across the board with a simple mix of network cameras.

The Proper Foundation

Independent school in England boosts security on the perimeter

By Steve Carney

Wakefield Grammar School Foundation has chosen a complete Tyco Security Products surveillance package that includes Illustra IP cameras and exacqVision network video recorders with exacqVision VMS software and Kantech EntraPass access control system pre-installed.

Next Gen Technology

Event-based security solutions for a new scholastic generation

By Steve Birkmeier

To ensure the safety of students and faculty members in these new facilities, Campbell decided to significantly upgrade its video surveillance system beginning with its Fine Arts building.

Dismissing Analog

Dismissing Analog

Topeka School District greatly improves security for safer educational environment with IP video surveillance

By Courtney Pedersen

The increase in incidents and safety concerns prompted the district to perform a security audit that involved the Topeka Police Department school resource officers, the FBI Joint Terrorism Task Force and the Department of Homeland Security.

Clean Bill Of Health

Clean Bill Of Health

Security check-up proves successful for Idesco and Adelphi University

By Monique Merhige

Adelphi University has built a solid reputation and position of strength when it comes to safety due to its proactive philosophy and building the right team of people around them that consists of security professionals and electronic security contractors that are true experts in the field.


Reacting With Reason

By Ralph C. Jensen

Every month, almost every day, I hope that there has not been another school shooting where youngsters are hurt, or killed, on an educational campus. Too often that hope goes unfulfilled.

Class In Session

Class In Session

How analytics and video surveillance are changing the face of learning

By Jumbi Edulbehram

Video analytics enable schools to proactively recognize behaviors to create an efficient and safe environment with minimal disruption.

Protecting Outdoor Campus Spaces

Protecting Outdoor Campus Spaces

Targeting the criminal who targets you

By Bruce Czerwinski

Securing these outdoor spaces takes a different mindset. Indoors, a lot of effort is spent protecting assets. Outdoors, it’s mostly about protecting people. It’s about the student walking late at night between the library and dorm or the last student heading to their car in a remote parking lot.

Locking Up A Win

Replacement of locks meant a look at security technology

By Ralph C. Jensen

In the beginning, however, Yelinek was hardly an easy sell. In fact, in his own words he was “dead set against” changing lock brands. That’s because simplicity is a priority for Yelinek, who for the past 20 years has been the only locksmith for all of the college’s campuses.

The Battle For Bandwidth

The Battle For Bandwidth

Don’t drive your sports car on a county road

By Minu Youngkin

Helping customers understand the importance of effective bandwidth management is the key to designing a system that truly supports their needs and priorities.


New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3