Key Takeaways from ASIS 2014

With over 600 exhibitors and over 20,000 attendees, security knowledge was floating around Atlanta’s Georgia World Congress Center. As I jetted around the showroom floor, I was able to pick up on 5 key takeaways from this year’s show:

  1. Things are getting smaller. End-users are demanding it. People want products that don’t take up a lot of real estate, but that produce a number of sophisticated functions.
  2. Security is going mobile. Take the smart home as an example. We can now control our security system, door locks, lighting, garage doors and shades from an app on our smartphones.
  3. The show’s focus has changed. Rather than focusing just on end-users, it seemed that the focus was on all things security to include commercial integrators, residential, consultants and other security professionals.
  4. The use of Twitter. Companies were using this social media platform to drive traffic to their booths, talk about ASIS 2014 with #ASIS14, and tweet pictures of their booths and products. Plus, selfies abounded this year!
  5. Partnerships are increasing. Companies in the security industry are embracing other companies by forming partnerships in order to provide more high-tech security products to offer to the masses.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Tyco Kantech EntraPass security management software

    Tyco Kantech EntraPass security management software

    Johnson Controls, the global leader in smart, healthy and sustainable buildings, and architect of the Open Blue digital connected platforms, has released the newest version of the Tyco Kantech EntraPass security management software. 3

  • SecureAuth

    SecureAuth

    The acceleration of digital transformation initiatives as a result of COVID-19 has created a lasting impact on how businesses empower their workforce and engage customers. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3