Apr 06 - 08

Las Vegas, NV

Sands Expo

With Cloud, BYOD and now Internet of Things (IoT) strategies continuing to take shape, digital and physical security leaders across industries are being challenged to keep pace and secure their critical data, people, physical assets and supply chains across a more connected world. Chief Information Security Officers and their teams are facing increasingly complex risk scenarios. In the last decade threats have multiplied in both physical and information security areas. Today everything is connected onto the IP network creating a blending of physical and cyber security footprints. While the convergence of cyber and physical security has already occurred at the technical level, it is still evolving at the organizational level.

CISO CIOs & Enterprise Decision-Makers Chief IoT Officer CSO Director IT Security Enterprise Architects IoT Executives Systems Integrators & Business Process Outsourcers Venture Capital, Private Equity and other investment firms focusing on IoT

Registration Opens: 01/17/2016

Contact Name: Cassandra Lobo

ph: 203-840-5504 email: clobo@reedexpo.com

New Products

  • Paxton10 CORE Cameras

    Paxton10 CORE Cameras

    The new CORE Series cameras feature edge processing for ultimate scalability, built-in edge storage, and plug-and-play installation. The addition of the CORE Series gives installers new hardware, better choice, and more value than ever before. 3

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3

  • PDK IO Access Control Software

    PDK.IO Access Control Software

    ProdataKey now allows for "custom fields" within the interface of its pdk.io software. Custom fields increase PDK's solutions' overall functionality by allowing administrators to include a wide range of pertinent data associated with each user. 3