Good Things Come in Threes at ISC West 2014

The consensus from all booth visits has thus far has been that foot traffic at this year's show is higher than last year, and I agree, as I'm forced to wedge myself between people, trying to make it to all my appointments. Of course with my thick Southern accent, I do politely excuse myself, but I'm not sure if people actually understand what I'm saying or if I scare them into moving over!

Nevertheless, after speaking with a colleague, a valid point was made: While there is tons of foot traffic, there is equally as many people inside the booths as there are strolling the floor. I began to ponder why this is, and I have concluded that three companies demonstrate why people are so intrigued and engaged this year.

A source of education. After discovering that people truly don't understand the exact level of security they need, Tracie Thomas, marketing director, Boon Edam presented me with a process of thinking through the details before making a security purchase. Known as S.T.A.R.T.S.S. and based on research, people tend to make purchases based on three details: ROI, security features and aesthetics; however, it's important to think about five other details before installing a security solution to ensure the proper level of security is achieved and overall satisfaction is gained.

Boon Edam, Inc. takes the time to properly train their integrators on all eight details, and as I listened to Thomas speak about each one I was truly engaged and tuned in to learning more.

Meeting a need. Painting a story of enterprise, the people at Genetec understand that enterprise is about aspirations, business structure and growth plans; thus, businesses come in all sizes, structured in a variety of ways with all types of goals. With this in mind, Genetec realized that they had two network security appliances meeting the needs of small and large businesses: the SV-16 for lower camera counts and the SV-PRO, prebuilt for a 100 camera system that uses a rack. But, what about the medium sized business?

Back to the drawing board, Genetec designed the SV-32 network security appliance for companies with distributed federation, giving enterprises the ability to operate their own security as well as have the choice of dedicating a security employee to this task.

The SV-32 will be available around May or June of this year.

A glimpse into the future. Bringing to the security industry a portable fingerprint scanning fob known as AXISKEY, Sonavation, a small company in Palm Beach Gardens, Fla., is dedicated to cost-effective biometrics for consumer deployment. In fact, this small company of 50 employees is taking the concept of fingerprint scanning to a whole new level.

Sonavation has devised a way to use ultrasound technology to not only read actual fingerprints, indicating anomalies, patterns and other surface details, but to go below the surface into the fat pad on the tip of the finger, into the bone and to even measure the pulse of blood pumping through the veins in the finger, all while keeping this technology within a key-fob sized device.

The AXISKEY will be available in May 2014 for approximately $99.95, and ultrasound finger print scanning should be available in about a year.

So, why all the foot and booth traffic this year at ISC West 2014? Companies are educating, meeting needs and demonstrating the future of security.

About the Author

Ginger Hill is Group Social Media Manager.


  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity


New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3