Security Products Magazine Digital Edition - August 2015

August 2015

  • Ensuring Success
  • High Value Assets
  • A Protective Circle
  • The User Experience
  • Securing Your Car
  • Shifting the Selling Paradigm


Features

Navigating the High Seas

Navigating the High Seas

New Coast Guard rules redefine video requirements onboard cruise ships

By Jumbi Edulbehram

In recent years, the cruise industry has received a lot of attention from the news media regarding serious security issues onboard its vessels, ranging from people falling overboard to sexual assaults.


Shifting the Selling Paradigm

Shifting the Selling Paradigm

Turning security dealers into home automation dealers

By Larry Goldman

With the increased focus on home automation and associated “smart home” devices, it is incumbent on security dealers, installers and integrators to do more than simply sell security products.


Ensuring Success

Ensuring Success

Make sure you have the right camera placement for optimal use of analytics

By Ian Westmacott

Those words are often associated with the real estate industry, but the security community can also apply that mantra to the all-important issue of camera placement for optimizing analytics.


The Big House

The Big House

PLC controllers provide reliability, greater security and lower risk

By Ralph C. Jensen

A large corrections campus encompassing more than 30 buildings in the southeast United States houses approximately 5,000 inmates with separate jail facilities for men and women who are awaiting sentencing, serving sentenced jail time and are in maximum security.


The User Experience

The User Experience

Improving security by implementing tap authentication

By Tim Phipps

With the move to a mobile- and cloud-first world, corporate data has become increasingly difficult to protect.


High Value Assets

High Value Assets

Finding a cost-effective perimeter solution

By Dale Climie

Perimeter security: Just the words conjure-up visions of horror.


A Key Role

A Key Role

Data Reporting and Dispatching Features Essential for Converged Security Systems

By Tony V. Capelli

The city of Calgary in southern Alberta, Canada has achieved international acclaim with its annual Calgary Stampede and its legacy of world-class sporting facilities and events.


Securing Your Car

Securing Your Car

When you’re at work, there is someone watching your vehicle

By Mary Wilbur

Chances are, when you picked a parking place this morning, you weren’t thinking about security in that facility.


Departments

One Innovation at a Time

Industry Professional

One Innovation at a Time

Quality and innovation among key factors for success

By Neil Robertson

Today, Dedicated Micros continues to conceptualize and develop ground breaking video surveillance solutions to meet industry needs.


Security in the Sanctuary

Industry Focus

Security in the Sanctuary

By Ralph C. Jensen

I wouldn’t consider myself an extremely religious man, but I do go to church on a weekly basis, and I do expect my presence in the church to be safe and secure.


Networking Security

Everyone Is At Risk

By Ralph C. Jensen

Technology is amazing stuff. However, some of the greatest threats that today’s businessman or woman faces is a cyberattack. Just count the number of breaches in the last couple of years; you know what I mean.


Access Control in the Midst of an IP Revolution

By Mitchell Kane

Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control.


No Protection From Bad Data

No Protection From Bad Data

Beware what the experts claim as noise and a security signal

By Jonathan Sander

Walking the expo floor at the most recent RSA conference, it was hard to miss how many companies were talking about big data.


Breaching the Network

Breaching the Network

All businesses are at risk of a cyberattack

By Lee Pernice

Cyberattacks are one of the greatest threats facing global businesses today.


Privileged Identities

Privileged Identities

Learning what is at the core of online attacks

By Philip Lieberman

Over the last year, we have witnessed a series of staggering data breaches affecting some of the world’s leading businesses— with each breach seemingly worse than the last in terms of financial and reputational damage.


New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.