You can also view this issue in our new Security Products magazine Digital Edition format.

September 2010


The New Safety U

By David Howorka

Through the eyes of a safety professional, the bucolic scene on a college campus is a complex set of issues that need to be addressed in an emergency. That’s why Loyola University Chicago started to look into employing an electronic pre-plan for its entire campus.

Deterrence or Arrests

By Keith Jentoft

Every month, more products pour into security magazines and catalogs. We see a torrent of innovation and evolution continually adding features and reducing costs along the way. We need to step back from the tsunami of progress and ask, “So what?” What is the purpose of all this effort? Is there some technical nirvana we can bask in when we finally reach 100 megapixels, or ultimate peace when mesh networks consume our geography? Or is it all simply a pointless game of live fast and die? It is time to step back and consider the true goal.

New Threats, New Arsenal

By Rob Hile

When entering an airport, travelers can’t help but reflect back on the events of Sept. 11, and how things have changed since then. In recent years, travelers have gained the ability to check in for their flight online, change their seat and download an electronic boarding pass to a PDA. It’s also possible to check the flight status from a PDA before leaving for the airport. The rapid advancements in technology have enabled passengers to be more efficient and informed. But has airport security changed or evolved?

A Conversation with Drew Levine

G4S Secure Solutions USA is the relatively new name for a well-known company many know as Wackenhut, a successful provider of manned security services. Along with the new name comes a broader focus for the growing company, to include not only manned security services but also the element of technology, which continues to change the practice of security. We spoke to Drew Levine, president of G4S Secure Solutions, about how the company is broadening its approach, which includes acquisitions and internal product development.

Total Site Security

By Elliot Rose

A bewildering variety of technologies is available in the security market, and determining which will meet both future regulatory requirements and your budget can be difficult. The first step is to review your facility and define the various areas that require security. Examples are perimeter security, gate security, access control, visitor and contractor management, building security, live monitoring and an audit trail. There are many products designed to address one or more of these requirements.

The Big Show

By Joseph R. Granger

More than 20,000 professionals from all vertical industries and government sectors -- from Fortune 100 companies to the Department of Homeland Security -- will gather in Dallas Oct. 12 to 15, for the ASIS International 56th annual seminar and exhibits. For thousands of security management professionals from around the world, and hundreds of product manufacturers and service providers, ASIS 2010 is the best place to meet peers face-to-face, share information and best practices, and discover how others are solving security challenges in today’s complex environment.

Let the Games Begin

By Sherleen Mahoney

For the first time in history, the World Equestrian Games leaves Europe and comes to the United States, where, also for the first time, all eight disciplines will be held at one location: the Kentucky Horse Park in Lexington, Ky., a 1,200-acre working horse farm, theme park and equine competition center. This year, the World Equestrian Games has a title sponsor, Alltech, an animal health and nutrition group.

On Alert

By Andy Hilverda

“We are required to have a system of checks and balances in place that would provide an account of the handling of all controlled substances on medical calls,” said Jeff Reagor, Clark County Fire Department EMS supervisor. “It’s imperative we provide accountability for the drugs we use. Clark County F.D. needed a system that would allow them to know when their narcotic safes were being accessed and by whom.” After researching available products, they found that CyberLock offered the best solution.

Getting a Handle on TWIC

By Geri B. Castaldo

The Port of Wilmington, which opened in 1923, is the busiest port on the Delaware River and the leading North American importation site for fresh fruit, bananas and juice concentrate. It also was the first seaport to use the TWIC card, beginning with the TWIC Technology Phase pilot program in October 2003. TWIC is designed to add a layer of security at ports by ensuring that workers in secure areas have received a background check and do not pose a national security threat.

On Approach

By Kim Rahfaldt

South Carolina’s Myrtle Beach International Airport serves more than 1.5 million travelers each year to and from one of the most popular golfing destinations in the United States. The airport is host to six major U.S. airlines. To accommodate the growth the area has experienced, the airport replaced its legacy security system, which was no longer servicing its needs, with intelligent field hardware and smart-card readers with bidirectional encryption. Airport officials reviewed five security management systems in detail prior to making a selection for their new system. Based on scalability, ease of use and operation, along with the lower cost of maintaining the system, they chose AMAG’s Symmetry SMS. Airport officials highlighted how secure the system was from end to end and the enhanced video integration that the new system offered. They replaced their old analog video system with a digital system that is seamlessly integrated. The IP solution is one of the first all-digital security systems in the southeastern United States.

Bulking Up Surveillance

By Mark S. Wilson

With the transition from analog to digital video surveillance marching forward, there remains a crucial requirement for reliable transmission of the video signal -- especially during today’s period of coexistence. With many legacy installations, coaxial cable is used to transmit images from a camera for monitoring or recording, or both. Coax has its limitations, including restricted transmission distance, signal degradation over long cable runs and interference.

On Guard

By Mark S. Wilson, Rick White

Multi-campus users want a new model for security and safety that offers customization today while providing easy migration or upgrades in the future. They want their next security system to be flexible, adaptable and scalable. The solution must provide the right products for their specific applications now and in the future. Users look forward to eventually incorporating emergency lockdown, Wi-Fi, network on a card, mesh networks, video analytics and other new technologies without complications.


Larger than Life

By Megan Weadock

As the saying goes, everything’s bigger in Texas. That’s why Dallas is the perfect home for ASIS 2010, one of the industry’s largest and most important tradeshows. The 56th annual seminar will be held Oct. 12-15 at the Dallas Convention Center. Dallas is a lively, forward- thinking city in the middle of the fourth-largest metropolitan area in the United States -- and home to Security Products magazine.

The Future is Now

With ASIS right around the corner, this month’s Industry Insight column is presented in a question-and-answer format, in which network video surveillance expert Fredrik Nilsson and editor-in-chief Ralph C. Jensen discuss surveillance industry trends, as well as what to expect at the show.

Seeing Through the Lies

By Sherleen Mahoney

Hard as one may try, our bodies do not lie. In addition to the polygraph and fMRI brain scans that measure physiological responses when someone is lying, researchers at the University of Utah have created ocular motor deception detection technology, which employs eye-tracking technology to measure cognitive responses, specifically pupil dilation, to determine when someone is lying.

Upcoming Webinar

5/23: Aligning your physical security infrastructure with your organizational growth strategy
Learn how several global organizations have executed enterprise security risk management strategies to clearly define a vision of the future and innovative solutions to solve critical business problems and lower risk.