April 2011


Features

A Better Line of Defense

How to ensure perimeter security meets your expectations

By John Bartolac

On the heels of the government’s reassessment of the SBInet program, or the virtual fence as it’s been called, officials from Department of Homeland Security Customs and Border Protection have decided that there are better ways to deal with the needs for perimeter security at the U.S.-Mexican Border.


Securing the Baby

Infant security programs: a safe way to differentiate your hospital

By Joel Harris

One of the greatest scenes in a hospital is that of newborns coming into the world. If you have been to a hospital recently, however, you may have noticed a change in policy in regard to the nursery. Gone are the days of people visiting the maternity ward just to see the newborns.


The Sweet Smell of Security

Teleflora stakes its reputation on virtual computing stability and performance

By Ryan Pope

Teleflora, the nation’s largest floral delivery network service, has chosen a 2X virtual computing solution to meet its call centers’ computing needs. The company chose to deploy the 2X ApplicationServer with load balancer along with the 2X ThinClientServer Enterprise Edition to optimize employees’ remote access to critical desktop applications.


Protecting a Public Water Supply System

Terror threats shake security to the very core of basic supplies

By James McGowan

The people of the United States maintained confidence in the safety and security of the public drinking water system even as the country endured World War II, the Korean conflict and the Cold War years. That changed after the attacks of Sept. 11, 2001. Their confidence shaken, the people had concerns. Was the public water supply system sufficiently prepared for the threats posed in today’s world?


From Offline to Wireless

Combining networking options has never been simpler

By Karen Keating

Why, users ask, must they choose between offline and online solutions? If online, why must they choose between wired and wireless? Why must they isolate technologies when they could choose them all, working under one system with only one database, to provide a holistic security and safety solution?


Farm-to-Fork Security

By Ronnie Rittenberry

Americans spend more than $1 trillion on food each year, and usually we get what we pay for. Built into the cost in most instances is the safety and security of the various ingredients, from the time they’re grown and prepared to the moment they enter our mouths. From that perspective, we enjoy one of the safest food supplies in the world. But the system’s not perfect.


Departments

A Conversation with Steve Carney

We wanted to know more about IP cameras and how technology began to deliver on the promise of connectivity, improved image resolution and the ability to manage bandwidth, so we talked with Steve Carney, senior product manager of IP cameras and encoders at Tyco Security Products.


Decentralized at the Core

Innovations in storage, camera technology bring high-res solutions to a broader market

By Steve Gorski

IP-based surveillance signals growth and opportunity for the integrator who knows how to determine the best deployment and camera configuration for specific infrastructures. At the same time, end customers ranging from municipalities, schools and large corporations to small retailers are taking advantage of price reductions and the enhanced capabilities of networked-based cameras to build large video surveillance networks.


Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3