Security Today Magazine Digital Edition - May 2018

May 2018

  • Solid on the Ground
  • A Good Endpoint
  • Beyond the Basics
  • Automated Critical Security
  • Adapting to Complex Demands


Adapting to Complex Demands

Adapting to Complex Demands

Business security is expanding and there are increasingly more connections to secure

By Peter Boriskin

The true promise of the Internet of Things in the physical security space is that connected, network-enabled products will simplify both life and work, make companies more profitable, and provide better solutions than could be achieved through non-IoT products.

Solid on the Ground

Solid on the Ground

Engineers collaborate on access control ideas to keep the gates open

By Ralph C. Jensen

Talk about intensity, Aeroturn engineers have found a new passion for developing turnstiles. In fact, they treat everything they do as if it is the only thing they do.

Creating an Effective Solution

Creating an Effective Solution

Cameras help address an invasive species epidemic

By Jennifer Hackenburg

These days you hear a lot about the use of surveillance equipment is all avenues of life from banks to airports to your front porch, but a significant area that can often be overlooked is the agricultural, livestock and wildlife industry.

Automated Critical Security

Automated Critical Security

Trusted ID solutions will make smart buildings safer

By Mark Robinton

Thousands of people pour into and out of high-rise office buildings each day, and each must be kept safe and secure.

Beyond the Basics

Beyond the Basics

Understanding the analytics behind the networked security camera

By Paul Kong

A security camera is much more than a security camera when it’s part of an analytics infrastructure that serves completely new goals, advancing the organization and management of businesses and even entire cities.

The Problem Persists

The Problem Persists

Throwing new hardware at your security system may not solve the problem

By Vincent DeMaio

While the security industry is being sold on UPS battery back-ups that come with “power conditioning” built in, the reality is that over 90 percent of these battery back-ups only offer surge suppression and surge suppressors that solely protect against large power fluctuations, such as lightning, which only account for two percent of failures.

The Evolution of Intercom

Cover Story

The Evolution of Intercom

By Ralph C. Jensen

In 1970, intercoms were all about convenience. They made it easy for secretaries to communicate with their boss and for company employees to connect between offices within the same building.

A Good Endpoint

Visibility is a good way to start to achieve success in the age of IoT

By Richard Henderson

Most of the malicious or criminal activity targeting today’s enterprises involves the endpoint. Insecure endpoints are an expensive risk and difficult to address.


Web Giants Driving Violence

By Ralph C. Jensen

I stand firmly behind the Second Amendment of the Constitution of the United States. Those persons wanting to rewrite this document would first have to prove to me that they have more wisdom and knowledge than the Founding Fathers before this is repealed.

Industry Professional

Integrating Law Enforcement into Security

By Ralph C. Jensen

Longtime law enforcement professional Gawain Guedry has joined Total Recall Corporation as a senior account executive representing the Western Region of the United States. Based in Las Vegas,

Dealer Strategies

GSOCs And Artificial Intelligence Give Businesses A Predictive Edge In Identitying Threats

GSOCs And Artificial Intelligence Give Businesses A Predictive Edge In Identifying Threats

By Ralph C. Jensen

There are a lot of amazing things to say and write about Allied Universal. For starters, these security professionals are headlong into predictive analytics, and WOW, what a difference it makes in providing security services to the customer.

On The Job

How new devices are helping security network installers get on and off job sites faster

By Dennis Troxel

The adoption of IP-based video surveillance cameras is driving the growth of the overall video surveillance market.

Rolling Video Showcases

Rolling Video Showcases

Locks Plus outfits mobile fleet with AXIS Companion to deliver surveillance demos to customers’ doors

By Larry Chay

Locks Plus Security Solutions, based in southern Florida, was founded in 2002 as a traditional locksmith company.

Government Security

Leading the Way

Technology is promoting a safer and more secure society

By Peter Jones

With society facing new challenges, such as the changing nature of crime and pressure on police time, our cities are being forced to update their security responses to ensure they remain safe.

Intelligence Driven

Intelligence Driven

Don’t be caught by surprise in your security operations

By John Goolgasian

Whether you’re a government, corporate or nonprofit organization the enemy of security operation is surprise. Surprise causes losses: losses in revenue, losses in operational agility and even loss of life.

Safer Cities

Safer Cities

Sinaloa, Mexico sees connected cities as the proper alternative

By Margie Gurwin

In Sinaloa, Mexico, the state’s government views enhancing public safety and security as priority number one. Sinaloa’s climate and terrain are perfect for supporting its booming agricultural and industrial economy, and this prosperity is dependent on effective law enforcement efforts that combat the influence of powerful drug cartels entrenched within the region.

Smartphone Popularity

Government credentials finding a new home on the smartphone

By Scott Lindley

Smartphones fulfill many needs, including telephone, camera, navigation, music, video, clock, news, calculator, email, internet, gaming, contacts, and more.

Security on a Grand Scale

By Ralph C. Jensen

When we talk about government security, the first thoughts are of the federal government. It is true that the federal government is bloated and somewhat mismanaged, but let’s talk about security on the grander scale; safe cities and even safer schools.

Forensic Analysis and Security

Forensic Analysis and Security

As IoT gains momentum among consumers, you need to know what the implications are for government security

By Christa Miller

Connected or smart devices in or on buildings, vehicles, and even people include software, mobile apps, sensors, and network connectivity used to collect and exchange data.

New Products

  • HID Signo Readers

    HID Signo Readers

    HID Global has announced its HID® Signo™ Biometric Reader 25B that is designed to capture and read fingerprints in real-world applications and conditions. 3

  • Unique Oversized ID Card Printer

    Unique Oversized ID Card Printer

    Idesco Corp. is announcing its card printer – the XCR100 2.0 printer- that allows customers to personalize oversized ID cards on demand. The printer is ideal for assisting healthcare organizations find the right badging solution. As healthcare facilities continue to combat the spread of COVID-19, issuing oversized ID cards has helped identify staff clearly while adding an extra layer of security. The XCR100 2.0 printer is the only dye-sublimation printer on the market that can personalize CR100 cards (3.88" x 2.63"). The cards that are 42% larger than the standard credit card size. The printer can produce up to 180 full cards per hour in color, and up to 1,400 cards per hour in monochrome. An optional flipper is available to print dual-sided badges in one pass. Contactless encoding comes as an option to help healthcare facilities produce secure access badges on demand and the card printer features a 2-year warranty. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3