Security Products Magazine Digital Edition - October 2014

October 2014

  • The Roots of Remote Monitoring
  • Security is Personal
  • Providing Efficient Technologies
  • Cutting-Edge Surveillance
  • Securing the Old with the New
  • The Truth About Biometric Exit


Features

Security Within Reach

By Mark H. Johnson, Greg Russell

Since the aftermath of 9/11, the United States has intensified transportation security efforts across the board. For most of us, stronger security measures have been focused at the nation’s airports, where travelers are subject to more stringent screening protocols.


The Truth about Biometric Exit

By James Albers

How can the United States ensure that the millions of visitors who travel to this country with a temporary visa uphold their agreement to leave before it expires, while also enhancing convenience for travelers? Biometrics technology holds the answer. In fact, this technology dramatically lowered cost estimates for U.S. airport exit control systems from $6 to $3 billion in 2008 to $1 billion today.


Cutting-edge Surveillance

By Alex Asnovich

Declining crime rates in many major cities can be attributed in part to technological advancements that deter prospective criminals and bolster rapid response time when crime does occur.


Providing Efficient Technologies

By Benjamin Hopkins

By now, most security professionals are familiar with the two types of wireless that have been used in access control implementations for the last decade or so.


Dual View and Density

By John Leach

Dual view legislation for cargo screening in the United Kingdom will fall into place in January 2015. This has been a phased-in approach to allow freight-handling companies to make the necessary equipment and procedural changes.


Securing the Old with the New

By Jim Stankevich

To accomplish such a comprehensive and multi-stage migration and expansion— and avoid issuing brand new credentials to nearly 20,000 employees —the team devised a strategy to run C•CURE 9000 on the front end using proximity technology with the legacy access control system running in the background to support the existing magnetic stripe cards.


Security is Personal

By Andrew Wren

For small to medium-sized businesses (SMBs), access control needs to be affordable, scalable and easy to install, manage and maintain. Business is no longer left at the office, as today’s small business owner needs control and visibility of the organization while on the go.


The Roots of Remote Monitoring

By Kenichi Mori

Over the years, remote monitoring has become increasingly sophisticated as wireless area network (WAN) bandwidth, transmission speeds and image quality have improved. Today’s remote monitoring systems can scale almost infinitely, making them cost-effective solutions for securing large, geographically dispersed environments.


Government Security

Leveraging IT for Access Control

By Dennis Raefield

Trying to navigate through the numerous security regulations that are in place for government agencies and facilities can be a daunting challenge, even to the most seasoned security professionals.


Historic Southern City Upgrades to High-Tech Traffic Management

By John Merlino

Savannah, Georgia is a study in contrast. As the state’s oldest city, it was founded long before the American Revolution. Yet, beneath its cobblestoned streets lies 38 miles of fiber optic cable, evidence of a metro-region firmly rooted in modernity.


A Capitol Idea

By Greg Hamm

California’s historic State Capitol building, completed in Sacramento in 1874, has seen its share of serious security episodes during its colorful existence. In 1927, a lobbyist shot and murdered a secretary on the fourth floor.


The Cloud Can Change Everything for Law Enforcement

By Dave Denson

Many people envision law enforcement agencies around the country as resembling mythical portrayals on TV and in movies, with leading-edge technology that can track every suspect’s move across the grid.


New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.