Change is coming... see on p.18 www.secprodonline.com

Integrated New Product and Technology Solutions for Security Professionals January 2011 Vol. 15, No. 1

IP Cameras DVR Replacement H.264 compression 40-channel encoder American Dynamics’ Illustra brand of IP cameras are designed to pro- Video Insight’s 40-channel analog encoder in- vide superior video, deploying industry-leading H.264 compression and cludes licenses to its enterprise class IP video dynamic bandwidth management techniques, encompassing 2/3 mega- surveillance software, offering a truly fl exible pixel to 3 megapixel resolution. Delivering outstanding clarity in low light, hybrid solution. With up to 40 analog inputs per the cameras offer high resolution, true day/night capabilities, and a wide 4U rack, this cost-effective solution featuring range of options to ensure a clear and accurate picture each and every time. H.264 compression and up to 30 fps per port, streams back to a central server providing a more Illustra IP cameras support PoE and are compatible with most NVRs. American Dynamics. robust solution than traditional hybrid DVRs. As analog cameras are replaced with IP, no additional Circle 301 on card, or visit www.secprodonline.com/productinfo. software licenses are required. Video Insight. Circle 305 on card, or visit www.secprodonline.com/productinfo. Smart Card Advanced security Dome Cameras aptiQ from Schlage is the new smart card designed to put you in con- 600 TVL WDR trol and your mind at ease. From education and government to health- As part of the “Lilin Champion” line of products, Lilin Americas presents its care and commercial, wherever you need it Schlage’s most advanced, Titan class of cameras. The Titan range includes a 600 TVL (3D-DNR,WDR) “contactless” card works with most any system. The cards employ 0.0002-lux camera, down to the more basic Titan fi xed-lens camera (N 3.6 advanced security features that make them an ideal candidate for or N6). With its fi ve-year warranty, the Titan class camera is designed to fi t both high-security applications and those in which important data or budgets at any price point. Lilin Americas. fi nancial information will be transmitted. Schlage. Circle 306 on card, or visit www.secprodonline.com/productinfo. Circle 302 on card, or visit www.secprodonline.com/productinfo. IP Video Control Power Supply/ Touchscreen functionality Receiver Hubs Version 1.1 of OnSSI’s Ocularis video control platform is 8, 16 or 32 channels designed for better performance and greater effi ciency. It NVT’s Power Suppy StubEQ Hubs provide camera power, auto-equal- includes two new features: VideoSynopsis, an optional em- ized video, and telemetry connection at distances up to 1,500 feet UTP. They are available in 8, 16 or bedded module that enables fast viewing of hours of video 32 channels (model numbers NV-8PS42-PVD, NV-16PS42-PVD and NV-32PS42-PVD, respectively) footage within the Ocularis Client view; and OpenSight, and deliver up to 28VAC of individually fl oating camera power per channel. The 8- and 16-channel which lets users share information from video surveillance and models feature a built-in 1-input:2-output distribution amplifi er. Network Video Technologies. other security systems outside their own system. Ocularis 1.1 Circle 303 on card, or visit www.secprodonline.com/productinfo. puts information from large video surveillance and physical secu- rity systems at the operator’s fi ngertips with an intuitive interface, HDTV Camera touchscreen functionality and map-based navigation. OnSSI. Hybrid design Circle 307 on card, or visit www.secprodonline.com/productinfo. Visionhitech introduces the fi rst high-defi nition armor dome cam- era with IR LEDs. The VDA110HD offers broadcast-quality digital In this issue... HD video over coax, providing an easy upgrade path without the hassles of IP network issues. The IP66-rated, vandal-resistant en- AIRPORTSECURITY closure is well suited to harsh environments, with integrated IR LEDs for TAKING NEW FLIGHT illumination up to 98 feet. The hybrid design allows simultaneous HD+ analog output, providing unprecedented fl exibility for system integration. You are now free to realize security effi ciencies Visionhitech Americas Inc. and cost savings Circle 304 on card, or visit www.secprodonline.com/productinfo. By Lee Caswell Page 14 CLOUDCOMPUTING THE YEAR OF THE CLOUD Vendors unite to address security issues By Margaret Dawson Page 32

0111sec_c1_v3.indd 2 12/17/10 11:48 AM Introducing the network video certification that shows your strengths

Get ready! This winter Axis is launching a new verifies your proficiency, and speaks volumes of global standard in network video certification to your company’s ability to deliver effective net- help people and companies demonstrate their work video surveillance. competence and skills in IP-Surveillance. Get ready for the new certification standard To achieve certification, you will need to pass an in network video. Axis offers both online- and advanced level test covering the latest in net- classroom-based training to help you acquire work video surveillance technologies, solutions, the knowledge needed to pass the exam. Go to products, and best-practice techniques. Once www.axis.com/certification to find our online certified, you’ll have a stamp of endorsement certification center for more information. from Axis, the global leader in network video. It’s good for your career and your company’s reputation as it

Prepare for certification. Go to www.axis.com/certification | Circle 3 on card

Untitled-4 1 12/10/10 1:39 PM INTELLIGENT INTEGRATION FOR CRITICAL INFRASTRUCTURES_

SECURITY • SENSORS • SURVEILLANCE In today’s world, protection of critical assets is vital. Moog QuickSet is a designer, manufacturer and integrator of positioning systems and components. Our technology utilizes electromechanical motion control that accommodates all your advanced surveillance and communication requirements. Rely on Moog QuickSet for customized surveillance nodes, pan & tilts, controllers, trackers, tripods, and camera housings.

3650 Woodhead Drive | Northbrook, IL 60062-1895 USA | +1.847.498.0700 | Fax: +1.847.498.1258 | www.quickset.com | Circle 13 on card

Untitled-4 1 12/10/10 1:54 PM CONTENTS JANUARY 2011 www.secprodonline.com

FEATURES Cloud Computing 32 PRODUCT SOLUTIONS The Year of the Cloud Airport Security 14 Vendors unite to address security issues Biometrics 28 Taking New Flight By Margaret Dawson ID Cards/Printers 38 You are now free to realize security effi ciencies and cost savings By Lee Caswell DEPARTMENTS Industry Focus 8 They’re at it Again By Ralph C. Jensen Industry Insight 10 Contemplating the Cloud The cost of storage, mobile access demands will defi ne the future of hosting By Eric Fullerton Top Picks — January 2011 12 Industry Perspective 34 Questions & Answers From the Top With Richard Connor New Products 40 Access Control 36 The Network is Alive Classifi eds 56 Albert Einstein Healthcare Network fi nds Advertisers’ Index 57 IP Video Analytics 24 seamless and secure re-badging Global Surveillance, Remotely Unifi ed By Eric Widlitz Industry Exchange 58 Panduit monitors multiple facilities worldwide Once Bitten, 91 Percent Shy from a single Unifi ed Operations Center with Most U.S. adults would not return to a the help of analytics business where their personal information By Fredrik Nilsson was stolen By Ronnie Rittenberry

Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu- rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email SECmag@1105service. com or call (847)763-9688. POSTMASTER: Send address changes to Security Prod- ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or IMS/NJ. Attn: Returns, 310 Paterson Plank Road, Carlstadt, NJ 07072. © Copyright 2011 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission. Mail requests to “Permissions Editor,” c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254 The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple- SPECIAL SECTION mentation or use of any information contained herein is the reader’s sole responsi- bility. While the information has been reviewed for accuracy, there is no guarantee Education Security S1-S16 that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

4 0111 | SECURITY PRODUCTS

0111sec_004_TOC_v2.indd 4 12/17/10 12:37 PM Circle 39 on card

Untitled-4 1 12/10/10 1:44 PM Exclusively Online

Security Cameras That Meet Today’s Needs By Seth Cirker For local governments and citizens, the term “Surveillance Dilemma” may not be considerably well-defi ned or eminent. The concept, however, certainly is. It has always been implied. Ever since technology afforded government with the oppor- tunity to remotely monitor communities, a struggle has persisted to balance the inherent public safety benefi ts of security cameras without eroding privacy. REACTION Blog REACTION bloggers share their perspectives on a range of compelling security issues and news. One of our latest topics is about police using facial recognition software. Share your reaction and join in the conversation. secprodonline.com/blogs/reaction/list/reaction.aspx Ralph’s List Want to buy or sell security products? Join Ralph’s List, the world’s best online marketplace for buyers and sellers of all things security related, both old and new. ralphslist.secprodonline.com Security Career Network New! Visit the Security Career Network. Thousands of industry jobs are just a click away. careers.secprodonline.com RSS Get daily news updates delivered right to your desktop from secprodonline.com. Visit secprodonline.com/mcv/resourcecenter/rssfeeds/ to subscribe. Recent Headlines Study: Cost Of IP Surveillance Drops Below Analog for Midsized Installations DHS Grant Funding Research to Develop Thinner, Lighter Blast-Resistant Glass Cloud Computing, Virtualization Will Increase Security Demands on Service Providers, According to Trend Micro Study: Hospital Shootings Rare, But Rate of Other Assaults High California College Deploys HD Surveillance System for Campus-wide Crime Prevention Research: Service, Maintenance to Account for Third of Systems Integration Market by 2014 secprodonline.com/articles/list/news.aspx Online Communities Follow us on Twitter: www.twitter.com/SecProds www.twitter.com/BrentDirks

Become a fan on Facebook: http://www.facebook.com/secprodonline

6 Circle 22 on card. 0111 | SECURITY PRODUCTS

0111sec_006_eTOC_v2.indd 6 12/17/10 11:06 AM ONE PLATFORM ONE SOFTWARE ONE SOLUTION...

• NVR (Pure IP/MEGA PIXIL SOLUTION) • HYBRID (IP/MEGA PIXIL & ANALOG) • MOBIL DVR (MOBIL SOLUTION) • INTERROGATOR (Specially designed for Gov/Military) ...ONE COMPANY

ALL OF ICR PRODUCTS:

(iPHONE/iPAD, DOID, WINDOWS MOBIL & BLACKBERRY)

USE THE SAME WORK WITH ALL FULLY MAC/APPLE LIFETIME SUPPORT SOFTWARE/GUI MOBILE DEVICES COMPATIBLE

Head Office West Coast Office European Head Office Cork Office IC Realtime, IC Realtime, IC Realtime, IC Realtime, 3050 N Andrews Ave EXT, 14200 W. Van Buren st, 12 Knockmitten Lane, 34 Eastgate Drive, Pompano Beach, Suite C-106 Goodyear, Western Industrial Estate, Little Island, FL 33064, USA AZ 85338, USA Dublin12, Ireland Cork, Ireland T 1 866 997 9009 T 1 602 910 3432 T 01 426 8216 T 021 435 5818 F 1 954 827 5900 F 1 602 626 3545 F 01 419 6245 F 021 435 5817 E [email protected] E [email protected] E [email protected] E [email protected] W www.icrealtime.com W www.icrealtime.com W www.icrealtime.ie W www.icrealtime.ie www.icrealtime.com See us at CES, Booth #21560 Circle 8 on card

Untitled-6 1 12/16/10 11:25 AM INDUSTRYFOCUS www.secprodonline.com by Ralph C. Jensen, Editor-in-Chief Volume 15, No. 1 EDITORIAL STAFF Editor-in-Chief/Associate Publisher Ralph C. Jensen Print Managing Editor Ronnie Rittenberry Web Managing Editor Sherleen Mahoney Senior Content Development Editor Lisa Williams They’re at it Again Content Development Team Laura Swift Cindy Horbrook eldom when the federal government speaks do despite the more than $200 million annual price tag, Laura Williams I believe what I hear. Offi cials brought this dis- not a single apprehension had occurred. Another ART STAFF trust upon themselves through years of pulling GAO report stated that 16 people later accused of S Art Director Dale Chinn our collective leg on issues that affect the American terrorist involvement and plots had fl own 23 differ- PRODUCTION STAFF public, or when they’ve failed to issue information ent times through U.S. airports since 2004, but TSA Director, Print Production Jenny Hernandez-Asandas that concerns us, the citizenry. failed to pick up a single one. Production Coordinator Teresa Antonio For once, though, the Transportation Security Ad- Up to this point, Americans have gone along with ministration is being true to its promise: TSA is de- everything: the shoes, coats and belt buckles. Yes, ONLINE/DIGITAL MEDIA ploying backscatter X-ray systems to screen airplane there have been annoyances and inconveniences, but E-news Editor Brent Dirks passengers as though they were naked. When fl iers people have not taken them as a personal affront. The EDITORIAL ADVISORY BOARD object to the low-dose radiation search, they are ef- difference now is the public viewing of images of pas- fectively opting for a physical pat-down. sengers’ naked bodies. Frank Defi na, Samsung Techwin America, Ridgefi eld Park, N.J. I’ve had one of those infamous pat-downs, and it’s Meanwhile, the government also fi nds itself in yet William Crews, Port of Houston Authority, Houston more like a grizzly bear searching for a pot of honey another insecure mess as WikiLeaks has outed more Charles Chamberlain, Missouri Lottery, Jefferson City, Mo. than a security agent looking for contraband. It was a than 250,000 classifi ed diplomatic cables from the Kimberly Kuhn, Tyco, Lexington, Mass. very physical search. State Department. Kind of makes me wonder who’s Merlin Guilbeau, Electronic Security Association, Irving, Texas Realize, however, that TSA probably got caught minding the store while the leadership, such as it is, is Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston with its pants down, again, and now it has to prove out gallivanting about the globe. The Obama admin- Darren A. Nix, CPP, Risk Management Associates, Raleigh, NC it takes security seriously. It’s been in this position be- istration is in full damage-control mode. The White SALES fore, and I’m sure it’s not comfortable. House has condemned the release by WikiLeaks, Sam Baird +44 1883 715 697 “Following the thwarted terrorist plot last week, to saying U.S. informants abroad could be endangered. Randy Easton 678-401-5543 conceal and ship explosive devices on board aircraft This unauthorized release of information squarely Brian Rendine 972-687-6761 bound for the United States, the administration took lies on the shoulders of the administration, and it Benjamin Skidmore 972-587-9064 a number of immediate steps to increase security by would seem to me that the Obama White House can’t SECURITY, SAFETY AND tightening existing measures related to cargo bound be trusted with state secrets, or more importantly, ENVIRONMENTAL PROTECTION GROUP for the United States,” read a Nov. 8 statement from with securing them. Group Publisher Kevin O’Grady Homeland Security Secretary Janet Napolitano. The leaks have proven rather embarrassing to the Group Circulation Director Margaret Perry I’m all about security, and I appreciate that air- White House, as some communiqués provide candid planes are pretty secure these days. But cartoonists and, at times, critical views of foreign leaders, as well have rightly had their fun with TSA because let’s as sensitive information fi led by U.S. diplomats on face it: After Richard Reid tried to blow up a plane terrorism and nuclear proliferation. with his shoes, we all had to take off our shoes for ex- Federal agencies now have been told to establish President & Chief Executive Offi cer Neal Vitale amination. Then came the Detroit-bound underwear security assessment teams to ensure that employees Senior Vice President & Chief Financial Offi cer Richard Vitale Executive Vice President Michael J. Valenti bomber, and now we are being screened through low- do not have broader than necessary access to clas- dose X-ray machines as though we weren’t wearing sifi ed information. I would have thought this surely Senior Vice President, Abraham M. Langer any underwear. Before you know it, a full strip-search would have been in place before now. Audience Development & Digital Media might be required. Terrorists continue to innovate and Among the leaked cables, according to the U.K. Vice President, Finance & Administration Christopher M. Coates adapt, and who knows what they will think of next? newspaper The Guardian, are reports of calls from Vice President, Erik A. Lindgren Information Technology & Application Development I wonder if TSA ever catches any terrorists. said offi cials in Jordan and Bahrain, calling for Iran’s Vice President, Attendee Marketing Carmel McDonagh It’s really hard to say. TSA will not provide any nuclear program to be stopped by any means, and of Vice President, Event Operations David F. Myers comprehensive data covering the nine years of its ex- leaders of Saudi Arabia, the United Arab Emirates istence, though it does share some success stories. For and Egypt referring to Iran “as ‘evil,’ an ‘existential Chairman of the Board Jeffrey S. Klein instance, several years ago at the Dallas/Fort Worth threat’ and a power that ‘is going to take us to war.’” REACHING THE STAFF International Airport, it would seem that then Dallas “The catastrophic issue here is just a breakdown Staff may be reached via e-mail, telephone, fax or mail. A list Cowboys head coach Barry Switzer “forgot” about a in trust,” said Rep. Peter Hoekstra (R-Mich.), rank- of editors and contact information also is available online at handgun in his carry-on luggage. Yes, that made all ing member of the House Intelligence Committee. www.secprodonline.com. the papers, radio and TV news programs. He prob- “Many other countries—allies and foes alike—are E-mail: To e-mail any member of the staff, please use the following form: [email protected] ably is not a terrorist, but carrying a gun onboard an likely to ask, ‘Can the United States be trusted? Can Dallas Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. CT) airplane, no matter who you are, just isn’t right. the United States keep a secret?’” Telephone (972) 687-6700; Fax (972) 687-6799 TSA also implemented a behavioral detection pro- I think it’s time to strip-search the administration 14901 Quorum Dr., Suite 425, Dallas, TX 75254 gram known as SPOT (Screening of Passengers by and do a thorough security screening. Corporate Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. PT)

Observational Techniques). This initiative has been Telephone (818) 814-5200; Fax (818) 734-1522 9201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311 soundly criticized, and in May 2010, the Government Accountability Offi ce released a report saying that

8

0111sec_008_IndFocus_v4.indd 8 12/17/10 11:08 AM The new Rio Pro Professionals see the value of true security

The new Rio Pro from Magicard gives you true security for your ID cards. Using Custom HoloKote Flex, exclusive to the Rio Pro, you can print your own security design or logo as a watermark on every card and uniquely, this costs you no extra in consumables. For added security choose from a wide range of encoding options, including contactless, contact, combi and magnetic stripe.

www.magicard.com

Call toll free for more info: 877 236 0933 Email: [email protected] Circle 4 on card

Untitled-4 1 12/10/10 2:02 PM INDUSTRYINSIGHT by Eric Fullerton

Contemplating the Cloud The cost of storage, mobile access demands will defi ne the future of hosting

Eventually, hosting will happen. And the video management software application will continue to have a central role in video surveillance because, by its nature, video gathers a lot of data input. That data is going to be stored either on the camera, on a local server, pulled back to a central server or pulled into the cloud. But hosting is not going to change the importance of video man- agement—just the way it happens. People are still going to want and need to continue to use all the great VMS features and functionality that let them work with their video data today. It’s just a difference of how the data comes from the cameras into the user client of the VMS and how it is con- trolled and stored.

THE COST OF BANDWIDTH The cost of bandwidth is going to fall, and at a certain time when there’s enough low-cost bandwidth available, hosting will start to happen on a wider scale. The single biggest inhibitor for the hosting model today is the cost of bringing the video into the cloud. What happens when you bring the video sur- veillance into the cloud is that it adds carry the cost of 100 percent of it. ment in private networks—this is very without going into what is defi ned as more cost to the stored video in a sur- One scenario to improve this cost similar to what enabled hosting for the hosting. So mobility is driving a new veillance system. This indirectly and dilemma could be to have only smart IT data world in the 1990s. way of accessing and using video, but negatively impacts the total cost of cameras—with analytics on board to There was a cut-over phase when the it is not necessarily driving true host- ownership and return on investment defi ne which video segments need to cost of putting the data into the cloud ing in the cloud. It could be one of the calculation for operating a video sur- be sent to storage. But if you look at became lower—that started fueling the elements that have to be in place for veillance system. the nature of the way people use video whole cloud computing trend, where hosting to happen—as people expect to Some people say that not more than today, they always like to have access the tipping point will be for video to have full access to full-featured video at half a percent of all video is ever viewed to whatever was recorded. Therefore, be cost effi cient in the cloud. We don’t any place and any time. after it is recorded; others think it could there might be some improvements do- know yet. As we move forward, there will be be as much as 5 percent. So if hosting ing local recording at the edge to lift Mobility is another driver that video stored in cameras, in local serv- is to bring all this video into the cloud only a certain amount of the video into will infl uence hosting. Devices such ers, in central servers and, eventually, in for storage, in reality you are adding the cloud for later viewing. Still, that’s as smart phones and tablets are sig- the cloud. The demand on a video man- cost to 100 percent of the video when not the way people are using video now. nifi cantly changing the way people do agement system in the future will be to you are interested in only a maximum things. But that’s just on the user-client give people seamless access to whatever 5 percent of it. So when you are using THE TIPPING POINT side, in the way people want to access video there is at the point of a fi ngertip up to only 5 percent of that video, the The real enabler of hosting will be the their data. with maximum usability.

accumulated cost of the total storage in day when the cost of using a hosted so- For video data, we’ve already en- the cloud would be prohibitive at this lution is equivalent to the cost of doing abled remote access through the In- Eric Fullerton is the chief sales and time because only 5 percent of it has to local storage and centralized manage- ternet or private access through VPNs marketing offi cer at Milestone Systems.

10 0111 | SECURITY PRODUCTS

0111sec_010_IndInsight_v2.indd 10 12/17/10 11:09 AM Introducing Interlogix™ global security

Offering best-in-class intrusion, video surveillance, access control, transmission and fi re & life safety solutions, Interlogix brings together some of the most recognized names in security. Our comprehensive portfolio includes well- known product brands such as GE, IFS and Verex, backed by ongoing partner services and support. From residential to commercial applications, count on Interlogix to help your customers secure and protect what matters most.

Learn more at interlogix.com Circle 5 on card

Untitled-4 1 12/10/10 1:49 PM 0111 TOP PICKS Compiled by Ronnie Rittenberry, Print Managing Editor

Day/Night Dome Surveillance Application Video Analysis Multichannel DVRs H.264 compression Browse hours in minutes High-power platform Universal Plug and Play

• BriefCam VS Forensics is an easy-to-use of- • Specifi cally engineered to simplify network fl ine application enabling the browsing of implementation, NUVICO introduces the next- hours of surveillance video in minutes. It al- generation H.264 video compression APEX™ lows users to process, review and export sum- Lite series DVRs, which come with built-in mary videos for investigative purposes and Universal Plug and Play (UPnP) that supports • IQinVision’s Alliance-mx H.264 all-weather index back to the original video with one click. automatic discovery and zero-confi guration for day/night dome is a full-featured, value-priced • Powered by award-winning Video Synopsis seamless integration and connectivity of your solution that with the Alliance-mini and Alli- technology, VS Forensics is a stand-alone local network to the Internet. ance-pro models fully rounds out the popular product that does not require integration to • Able to analyze 24 or more channels at once, • Available in 4-, 8-, and 16-channel models, the Alliance line. the DVR/NVR and can process multiple AVI fi les the GeViScope-AS/R is Geutebruck’s new AL series offers a max frame rate of 480pps • The Alliance-mx features an industry-leading simultaneously. high-end, high-power processing platform for in CIF resolution and has compatibility with all main profi le H.264 compression, a varifocal BriefCam. VCA4IP (Video Content Analysis for IP) or ANPR types of popular smart phones. megapixel lens, a vandal-resistant IP66 ex- Circle 312 on card, or visit applications. • The system automatically confi gures your terior enclosure, and impressively low power www.secprodonline.com/productinfo. • It offers high availability and performance, ef- router, making your DVR connection to the In- consumption. It complies with both PSIA and fective video surveillance and accurate alarm ternet instantaneous and error-free. ONVIF standards, ensuring compatibility with reporting and has a redundant power sup- NUVICO. the most popular VMS platforms. Biometric Cabinet Lock IQinVision. ply, an SSD system hard disk and a separate Circle 316 on card, or visit Fingerprint ID system graphics card. www.secprodonline.com/productinfo. Circle 310 on card, or visit Geutebruck. www.secprodonline.com/productinfo. Circle 314 on card, or visit Video Services www.secprodonline.com/productinfo. Visitor Management System Access up to 50 sites S2 and DSX integration Bullet Camera IP66-rated

• Intelli-Pass Biometric Access Control for Cabi- nets, the latest addition to the lineup of bio- metric solutions from Black Box Corp., is de- • Jolly Technologies continues to enhance its signed to provide the perfect blend of security • With Honeywell’s Total Connect Video Servic- Lobby Track visitor management technology and simplicity, protecting sensitive equipment • The EZ610 from the EverFocus Polestar II es, commercial end-users can receive event- with the release of 5.03. The system allows for and servers from tampering while enabling in- series provides full-color images in low light driven video alerts, record and store clips, the fast registration, badge creation and track- stant, easy access to authorized users. while featuring a digital wide dynamic range, take snapshots and view live video from up ing of visitors, contractors and employees. • Featuring a reliable and accurate multistage an OSD Menu, a varifocal 2.8-10mm lens, pri- to six cameras at a time on an iPhone, iPad, • New with Lobby Track 5.03 is integration with fi ngerprint verifi cation system, the biometric vacy masking, 32X digital zoom, 256X SENS- BlackBerry, Android or any compatible mobile the S2 and DSX access control systems; fast lock eliminates keys that can be lost, sto- UP (max of 0.0002 lux) and more. device—even without a security system. registration from driver’s license barcodes and len or duplicated, and the need to memorize • Equipped with a speedy-mount base plate, • Ideal for chain store owners, the multi-site magnetic stripes; single sign-on integration combinations. The lock opens only when an the vandal-resistant, IP66-rated EZ610 is de- feature lets users access up to 50 sites with with Active Directory; support for Arabic and authorized user touches the fi ngerprint scan- signed to fi t a standard 4-inch electrical box one login—letting them use the same account other non-western character sets; and many ner—just one touch of a fi ngertip opens the for convenient and reliable wall or ceiling to view video feeds from facilities at various other enhancements. cabinet door. mounting. locations. Jolly Technologies. Black Box Corp. EverFocus Electronics Corp. Honeywell. Circle 311 on card, or visit Circle 313 on card, or visit Circle 315 on card, or visit Circle 317 on card, or visit www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. www.secprodonline.com/productinfo.

12 0111 | SECURITY PRODUCTS

0111sec_012_Toppicks_v2.indd 12 12/17/10 11:10 AM Circle 17 on card

Untitled-4 1 12/10/10 1:59 PM AIRPORT SECURITY

TAKING NEW FLIGHT You are now free to realize security effi ciencies and cost savings

By Lee Caswell

14 0111 | SECURITY PRODUCTS

0111sec_014_023_caswell_v5.indd 14 12/17/10 11:19 AM here are many challenges to creating an effective security program in any airport infrastructure. Technology plays a signifi cant role in any robust airport security initiative and, when deployed properly, can help T security personnel address potential vulnerabilities in a more timely fashion, in addition to increasing effectiveness overall. With this in mind, airport offi cials seek out new technologies that help them meet these goals while maintaining high levels of protection for passengers and employees. Many airports realize the value and benefi ts IP-based security devices can bring to their facilities and are moving forward with plans to transition CCTV systems to network-based technologies. Furthermore, the value of high-defi nition video surveillance as evidentiary support has grown, and airports are deploying more high-resolution cam- eras. There also are plans to integrate video surveillance with other technologies—such as access control, video analytics, license plate recognition and facial recognition—to streamline security operations and reduce the need for manpower. Even with these upgrades and new installations, there is no room for scheduled system downtime.

WWW.SECPRODONLINE.COM 15

0111sec_014_023_caswell_v5.indd 15 12/17/10 11:19 AM AIRPORT SECURITY

“Security systems in airports are categorized as mission-critical systems, so Peleg added that airports can make use of existing technologies to maximize those systems cannot be down,” said Danny Peleg, director of market develop- existing infrastructure. Facilities with an open-architecture video management ment for transportation at Genetec. “When an airport transitions from one system system have an easier time of it. Some VMS vendors offer systems with a closed to another, it is important that they still be able to maintain and use their system architecture, making interoperability between systems and technologies nearly regardless of the transition. The transition has to be smooth, relatively fast, and impossible. The beauty of open architecture is that it makes it easier to integrate cannot impact the performance and reliability of the system.” on both the hardware and software level, and it avoids the additional costs of a

An Evolving Frontier ment platform, airport authorities can easily identify crucial details to help improve the By Debjit Das quality of evidence gathered and reduce investigation time. In today’s complex world, myriad technologies in the aviation market- Video analytics also are being deployed in conjunction with CCTV. Video analytics are place are essential to ensuring safe and effi cient travel. As airports used to ensure travelers do not enter exit points, and to track suspects who breach security continue to modernize and adopt emerging technologies, the common checkpoints, detect objects left behind and identify those who are loitering. Such business traveler often has little knowledge of the cutting-edge measures the in- intelligence allows airport authorities to avoid evacuating terminals, which can result in dustry is deploying. millions of dollars in lost revenue to both the airport and airlines. Technologies such as identifi cation management and access control, Another technology trend in aviation is the deployment of physical security information which are highly regulated within the aviation marketplace, regulate the management platforms that allow integration of disparate safety and security systems into movement of people to areas and resources throughout an airport facility. These technolo- a single graphical user interface. PSIM provides airport security staff the ability to stream- gies also regulate who can perform certain activities such as access airport operations ar- line the fl ow of information and associated security policies into a single alarm-response eas, provide CPR or operate a vehicle on the tarmac. software platform. These platforms are built upon rule engines that create the ability to Other technologies, including ground and water-based radar systems, also are being de- monitor multiple inputs and alarms that individually may not be of concern, but combined ployed to monitor airport perimeters. These systems are employed within the airport space may represent a much larger threat. for tracking people, vehicles, boats and animals to detect potential problems or emergency Considered to be among the busiest places in the world, airports have thousands of situations and then initiate effective action. people coming and going in a single day. In order to ensure the safe and effi cient fl ow of Perhaps the most important security layer in an airport today is CCTV. In order to effec- people, property and goods in an increasingly complex fl ight security environment, it is tively monitor security checkpoints, TSA-funded video deployments are underway at many imperative that airport authorities continue adopting cutting-edge technology to protect air of the nation’s airports. Scores of these projects feature megapixel camera technologies travelers, a task that offers little room for mistakes. that provide enhanced image clarity and detail, while reducing the total number of cameras necessary to monitor the area effi ciently. With crisp detail and an effective video manage- Debjit Das is the vice president of global marketing at Verint Video Intelligence Solutions.

TheT Avigilon system The World’s First Open HD Surveillance Platform delivers complete awareness www.avigilon.com without requiring a guard for each cell pod – a savings of more than $10 million annually.y.

Dave Baisden Oklahoma County Sheriff's Office

16 Circle 11 on card.

0111sec_014_023_caswell_v5.indd 16 12/17/10 11:19 AM TOTALLY WIRELESS VIDEO SECURITY

10/19/10 12:50 PM . The The

® Securing Motion Sensor Camera Videofied Protect Cell Towers Illuminators priority response. Award-Winning Provider ı Circle 18 on card 18 Circle

.

and | Inc , and battery operated alarm system battery and alarm operated utilizing revolutionary Rooftops HVAC Protection HVAC Rooftops ™ www.stanleycss.com ı

is deliveredby Stanley’s industry eServices. leading high apprehensions,false alarms low high Construction Sites MotionViewer 1.888.476.4787 Stanley Convergent Security Solutions Videofied wireless and cellular technology, withVideofied technology, wireless extended cellular battery and capability (up to years) 4 provides anywhere, anytime and outdoor indoor security. Stanley’s Alarm eVideo Verification, provides completely a technology, wireless that delivers A P P L I C A T I O N S Remote Locations 24/7 of activity video and viewing alarm

NAIL DOWN SECURITY YOUR Utilities

nnn%m`[\f]`\[%Zfd Up to 24Up to MotionViewers system on a single Operates Operates for years on a single of set batteries

remote construction sites, protecting lots fenced buildings, guarding vacant and rooftop HVAC systems – Stanley delivers cost-effective outdoor security. Videofied formerly technology makes outdoor impossibleprojects reality. a In addition, real-time online, WITH THE CUTTING EDGE SOLUTION Untitled-2 1 GVI IS CHAN SECURITY IN AGAIN.

Untitled-4 2 12/16/10 9:53 AM NGING THE NDUSTRY.

CHANGE IS G OD.

Circle 19 on card |

Untitled-4 3 12/16/10 10:07 AM AIRPORT SECURITY

complete overhaul. other systems and technologies that ers to an analog camera would help rec- of reducing crime and speeding up in- As long as an airport has network will be connected,” Peleg said. “As tify this issue.” vestigations, which is why there is an in- connectivity among its systems, tech- long as those systems speak the same fl ux of camera deployments on a global nologies and sites, it is possible to inte- language—in other words IP—then it THE ABSOLUTE VALUE scale. There also is an uptick in the use grate various system components. should not be a problem. In the case of OF SURVEILLANCE of high-resolution cameras and digital- “However, this depends on the cameras, for example, adding IP encod- Video surveillance is a proven method based systems. “Airport security executives recog- nize the value of high-resolution video,” said Robert Hile, director of integrated security solutions at Siemens Industry Inc. “The adoption of these emerg- ing technologies provides an enhanced layer of security for employees and pas- sengers, and reduces the likelihood of a terrorist event or security breach.” Peleg said for an airport to move to a feature-rich, IP-based system, it needs network infrastructure in place before beginning a transformation. This means all elements of the IP se- curity infrastructure, including the physical network, switches, storage and workstations. With these neces- sary elements in place and a clear ac- tion plan for the transition itself, an airport should be able overcome any challenges and successfully implement an IP security solution. An open-architecture VMS can quickly retrieve recorded video footage and security data, which is critically im- portant because every minute that goes by when a potential breach occurs costs airports $20,000 to $25,000, according to Peleg. Fast retrieval of security video and data is thus vital, he said. In the same respect, failover and redundancy features also are impor- tant to ensure access to all live and archived camera feeds. This capability is requested in almost all airport appli- cations. Airports need to have a system that guarantees 24/7 access to security data, he said. If the system is down, air- port offi cials would not be able to pull up video and data during that down period. For airports, that scenario is unacceptable.

INCREASED SECURITY AND COST SAVINGS All of the above lends itself to a high demand for IP storage devices. In a typical surveillance installation, stor- age can comprise up to 50 percent of the cost of the system, including acqui- sition and ongoing maintenance fees. This can lead to a signifi cant invest- ment from a user standpoint. Virtualization can reduce hardware investment and increase availability in

Circle 25 on card. 20 0111 | SECURITY PRODUCTS

0111sec_014_023_caswell_v5.indd 20 12/17/10 11:19 AM high-capacity environments such as air- hardware and therefore benefi t from a tool to help limit risk, increase safety ances, drives are the most common ports. As storage is a signifi cant portion another alternative for energy-savings.” and investigate incidents. Peleg said component to fail. When a failure does of the cost of a traditional surveillance that the high cost of shutting down occur, system administrators must have system, facility managers often make NO ROOM FOR ERROR, means there is no room for system fail- immediate access to replace the drives compromises on retention times, video OR FOR DOWNTIME ure or subsequent downtime. quickly and easily. Storage systems that resolution or camera counts to meet Airports rely on video surveillance as When it comes to storage appli- do not provide simple user access or their budgets. These virtual servers reside on stor- age appliances, allowing airports to eliminate stand-alone servers and sav- ing them about 25 percent overall. In addition to having lower support costs, theedge virtual servers can help airports realize about 40 percent savings in power and cooling and in rack space. And virtual servers still meet the reliability, perfor- mance and management needs of to- day’s surveillance systems. “Anytime you can help customers reduce the amount of storage hard- the best in ware, you help them tremendously,” Peleg said. “Why? First, space is lim- IP video surveillance ited in airports, and these facilities do just keeps getting better not always have enough real estate to hold a signifi cant number of storage and server devices. Secondly, purchas- ing, maintaining and cooling physical storage devices can become expensive. “Therefore, the ideal is to fi nd a stor- age solution that can help airports store massive amounts of video and security data in the most effi cient and cost-effec- tive way. Seattle-Tacoma International Airport, for example, opted for a vir- tual storage solution that helped reduce costs and save energy. And similar to IP video management systems, leveraging the IP network for storage purposes with virtual servers offers fl exibility and ease of growth.” There is rapid adoption of com- bined storage and server solutions in the transportation market because the reliability requirements are well-suited to the failover and recovery features • advanced megapixel cameras • superior image quality these facilities require. On top of that, Peleg said the cost savings and environ- • vandal proof Auto Back Focus cameras • encoders with video analytics mental benefi ts are immediate. • NVRs with customizable storage • HD decoders “Being environmentally friendly comes down to using storage that is • IP management software • integrated system solutions more effi cient, that does not require ad- ditional hardware purchases, mainte- nance and climate control,” Peleg said. get the edge at panasonic.com/theedge “On the VMS side, working with an open-architecture system helps airports reuse existing equipment and leverage existing network infrastructure. Using an advanced VMS gives airports the ability to host 300 cameras per server. In a physical storage option, this means an airport would require less storage

Circle 26 on card. WWW.SECPRODONLINE.COM 21

0111sec_014_023_caswell_v5.indd 21 12/17/10 11:19 AM AIRPORT SECURITY

that require removal of drive trays are rely heavily on captured video because and are more cost-effective and reliable REAL-WORLD RESULTS: more diffi cult to maintain and often re- faulty drives are easily replaceable and than traditional storage products,” Hile SEATTLE-TACOMA quire scheduled downtime because the easier to maintain. Users can simply re- said. “Furthermore, these platforms ex- INTERNATIONAL AIRPORT drives cannot be removed without over- place a failed drive by plugging a spare perience less downtime due to the ease Seattle-Tacoma International Airport, heating. Therefore, storage appliances into the system while it is running. in drive replacements and, for the user, which sees more than 30 million trav- with front-accessible drives are strongly “Digital storage appliances store re- make video readily available for foren- elers each year, is a perfect example of preferred for critical environments that corded video for longer periods of time sic purposes when needed.” an airport facing a variety of security changes and challenges, and it is taking them head-on. Sea-Tac, a division of the Port of Seattle, was looking to upgrade its 7LPHWRJHWEDFNWREDVLFV" six disparate and analog-based video surveillance systems with one fully merged IP-based solution, while pre- serving its existing investment in ana- log cameras. On the recommendation of systems integrator Ingersoll Rand, the airport chose Genetec Omnicast as its security management platform, as it could leverage the airport’s existing security infrastructure. The Omnicast system also allowed the airport to fully integrate its surveillance system to a third-party access control solution, as well as to an internal application that provides situational awareness to key airport managers. Today, the airport’s surveillance system consists of hundreds of analog cameras that are IP-enabled with en- coders and a mix of IP-based surveil- lance cameras in critical areas. Sea-Tac Airport also opted for Pivot3 Cloud- Bank appliances for video storage, ar- chiving recorded video on 11 virtual servers. The airport saved 40 percent ,I\RXQHHGEDVLFDFFHVVFRQWUROIRUWRGRRUV in power and cooling by leveraging the Œ Pivot3 Scale-Out Application Platform, FKRRVH6HFXUD.H\6.1(7  which combines server functionality ,I\RX¶UHDV\VWHPLQWHJUDWRU\RX¶UHSUREDEO\DOUHDG\XVLQJDKLJKHQGDFFHVVFRQWUROV\VWHP and storage into a single appliance. IRUODUJHLQVWDOODWLRQVEXWRQHVL]HGRHVQRW¿WDOO6PDOOPDQXIDFWXULQJRUUHWDLO¿UPVJDWHG Overall, Sea-Tac uses 120 terabytes FRPPXQLWLHVPXOWLWHQDQWRI¿FHVUHVLGHQWLDOFRPSOH[HVDQGFOXEVQHHGEDVLFDFFHVVFRQWURO of Pivot3 storage with embedded vir- EXWWKH\GRQ¶WQHHGHODERUDWHDODUPUHVSRQVHVRIWZDUHRUKLJKOHYHOV\VWHPLQWHJUDWLRQIHDWXUHV tual servers to support more than 1,100 DQGWKH\FDQ¶WDIIRUGWRSD\WRSHUSDQHODQGWKRXVDQGVRIGROODUVIRUVRIWZDUH cameras. Virtual network video record- ers eliminated the need for stand-alone 6HFXUD.H\¶VUHOLDEOHSURYHQ6.1(7ŒV\VWHPKDVHYHU\WKLQJ\RXU physical servers. VPDOOHUFXVWRPHUVQHHGDWOHVVWKDQSHUGRRU06537KHEDVLF The virtualization strategy also de- VRIWZDUH LV D IUHH GRZQORDG DQG ZH RIIHU DJJUHVVLYH NLW SULFLQJ livered failover for video applications to ZKHQWKHSDQHOVDUHEXQGOHGZLWK6HFXUD.H\SUR[RUFRQWDFWOHVV meet the TSA’s stringent requirements VPDUWFDUGUHDGHUV

Circle 7 on card. 22 0111 | SECURITY PRODUCTS

0111sec_014_023_caswell_v5.indd 22 12/17/10 11:19 AM ment inaaits main equipment room by 80 percent. This was good news for the Port of Seattle, which oversees the airport: According to Chris Evans, Sea-Tac’s electronic systems foreman, who has administrative responsibili- rs ties for the physical security system, the authority strives to be 30 Yea the “greenest” authority in the country. Thanks to Pivot3’s virtual Š storage capabilities, the Port of Seattle is one step closer.

Lee Caswell is the founder and chief marketing offi cer of Pivot3. A TOUGH A Model of Airport Security Low-cost airport ramps up security against terrorism OUTER SHELL By Simone Herold IS A GOOD IDEA You’ve heard about low-cost or discount airlines: how about a low- cost airport? As the fi rst low-cost airport in the , Coventry Airport is offering fl ights to many points of interest for low prices. For instance, Koln/Bonn, which is about 500 miles away, is about 25 euros—a little less than $35. Since March 31, 2004, the TUI subsidiary Thomson-fl y.com has been using the Coventry Airport located in the heart of the English midlands as the ideal center for low-cost fl ights to 17 European cities. Coventry also will become a destination for the German low-cost airline Hapag-Lloyd Express. In only six months, more than 380,000 travelers have started their vacations from Coven- try. More than 500,000 passengers are expected to fl y from Coventry in a 12-month period. The secret to its success seems to be running the airport with costs so low that air- lines can offer fl ights on competitive, low-cost terms. This means the infrastructure is not as luxurious as that of other major airports, but passengers seem glad to give up some of the luxury in order to save money. Even with all the cost-savings, security at Coventry Airport does not fall short, espe- cially with the threat of international terrorism. In fact, facility operators say security has the highest priority. To meet the strict demands, Coventry offi cials selected MOBOTIX IP cameras for their video surveillance system, which not only meets the requirements of the Ministry of Transport but also is a model for other airport systems. “At Coventry Airport, we have further improved our security measures with the instal- lation of CCTV,” said Mike Morton, director of customer service. “To be sure, we keep an ® eye on our passengers from the check-in to boarding and also upon arrival—the entire STOPPER STATION SHIELD time they are on the airport premises.” • Tough polycarbonate construction The original video system comprised six analog cameras with six recorders, which • Stopper ® Station Shield helps prevent proved to be unsuitable. Morton said the analog video technology was too expensive and damage and accidental activation awkward, and the image quality was not suffi cient. The new, digital cameras provided an • Attaches directly to any Stopper® Station ideal solution and the German manufacturer quickly became part of the English airport button (also available in retrofit) landscape. • Lifetime guarantee against breakage in “The cameras include internal memory and can temporarily store the video sequenc- normal use es in the case of server failure,” said Dilip Mistry, Coventry Airport security administrator. “When there is a disturbance on the network, it is not a problem to access the cameras’ Shield Protects storage. When the server is again available, it is automatically updated.” Button Coventry Airport has deployed 26 Mobotix IP cameras that focus on as wide an area as possible. Seven of the cameras are megapixel cameras with zoom function, and they can deliver expressive images from distances such as the parking areas, the check-in and the departure hall. All cameras are arranged so that the appropriate sequence of im- ages is transferred from each important location the passenger walks through, including check-in, security check, passport control, departure hall and the boarding gate. Luggage also is kept under surveillance just as the arrival hall baggage claim is. “Even the British Ministry of Transport is impressed by this solution,” Morton said. “London-Heathrow airport is planning on a new terminal, and a colleague from there came to visit us to see our IP camera solution. “The railway company Central Trains and the British Telecom also are interested in Safety Technology International, Inc. our surveillance system,” Morton said. www.sti-usa.com/sp12 800-888-4784 Simone Herold is the assistant to the CEO of corporate communications at MOBOTIX AG.

2011 STI

WWW.SECPRODONLINE.COM Circle 27 on card. 23

0111sec_014_023_caswell_v5.indd 23 12/17/10 11:19 AM IP VIDEO ANALYTICS

GLOBAL SURVEILLANCE, REMOTELY UNIFIED Panduit monitors its headquarters, factories and warehouses worldwide from a single Unifi ed Operations Center with the help of analytics By Fredrik Nilsson hen your business is founded on transforming infrastructure RECOMMENDING THE NETWORK silos into holistic solutions, it makes sense to practice what IPVision, a national integrator of intelligent physical security solutions, recom- you preach. So when Panduit built its new world headquar- mended Axis network cameras because they could easily converge with Panduit’s ters just outside of Chicago in 2010, it approached the proj- existing network-based security, safety and environmental control systems. The ect as an opportunity to showcase its own unifi ed physical PTZ network cameras use intelligent video analytics to provide perimeter security Winfrastructure approach to converging core business systems—including security, for Panduit facilities worldwide and serve as a unique lobby exhibit in the com- power and communications. As part of this effort, Panduit installed a global video pany’s new headquarters. surveillance system that could be managed remotely from its world headquarters. Rather than maintaining separate security and network operations centers, the The unifi ed system includes an array of network cameras to safeguard the pe- cabling and infrastructure manufacturer joined the two groups together in a single rimeters of its new headquarters and six domestic manufacturing and warehous- unifi ed operations center. ing sites, as well as manufacturing plants in Costa Rica, Romania and Mexico. “We put both groups in a single room since all these systems operate on the

24 0111 | SECURITY PRODUCTS

0111sec_024_027_nilsson_v4.indd 24 12/17/10 11:11 AM Circle 20 on card

Untitled-5 1 12/16/10 10:43 AM IP VIDEO ANALYTICS

same network and it makes it easier world. Though video is archived lo- tion, Panduit can maximize the time of for everyone to share information,” cally at each building, Panduit security its security team. said Jeffrey Woodward, Panduit’s se- staff view event-based video streamed “Being able to globally monitor, nior manager of global environment, to world headquarters and control the control and manage those cameras health, safety and security. Axis PTZ network cameras remotely to from a central point limits the amount From the unifi ed operations center, investigate whether situations require of resources you need to have on site to corporate staff can monitor camera intervention. By leveraging event-based respond to an alarm,” Woodward said. feeds from all the facilities around the analytics in the central monitoring sta- “Instead of automatically dispatching

security staff to physically investigate every alarm, we use the video camer- as as the fi rst-level response. Once we check out the situation remotely, we A. NEW EMPLOYEE can determine if it’s really necessary to send someone to the location of the B. PRE-APPROVED VISITOR triggering event.” ON HIGH ALERT C. SECURITY THREAT For example, the cameras integrate with access control so that if an employee D. CEO’S DAUGHTER triggers an alarm by holding a door open too long, security can observe the scene remotely until it’s resolved instead of putting local staff on high alert. Woodward estimates a 16-month With our Visitor Management ROI on the surveillance equipment just from that labor savings alone. System you’ll know who is in Before Panduit built its new head- your building. And why. quarters last year, each facility in the company operated its own independent f(QWHUSULVHFODVVYLVLWRUUHJLVWUDWLRQWUDFNLQJ analog surveillance system. “To update our security system UHSRUWLQJDQGEDGJHSULQWLQJ to match our Unifi ed Physical Infra- f:HEEDVHGSUHUHJLVWUDWLRQE\HPSOR\HHV structure strategy, we needed to deploy f7LJKWLQWHJUDWLRQZLWKRYHUPDMRUDFFHVV the appropriate network technology,” Woodward said. FRQWUROV\VWHPV Because Axis cameras are IP-based, f(PSOR\HHDQGFRQWUDFWRUWLPHDQGDWWHQGDQFH Panduit can leverage its own strong f6FDODEOHIURPDVLQJOHV\VWHPWRKXQGUHGVZLWK wide area network to globally moni- FHQWUDOL]HGDGPLQLVWUDWLRQ tor, control and manage those cameras from one central point. f$IIRUGDEOHHDV\WRLQVWDOODQGHDV\WRXVH “While the safety and security of our employees is certainly foremost, having our surveillance technology net- 6FDQHDFKYLVLWRUV,'DXWRPDWLFDOO\DQGSULQWD work-based meant we could converge FXVWRPL]HGEDGJHLQVHFRQGVRUOHVV surveillance with our other systems, like access control, and gather more in- 7KRXVDQGVRIFXVWRPHUVZRUOGZLGHKDYHUHSODFHG telligent data to better secure our prop- WKHLUSDSHUJXHVWORJZLWK(DV\/REE\WRLPSURYH erties,” Woodward said. Specifi cally, the network cameras are WKHLUVHFXULW\DQGPDQDJHYLVLWRUVPRUHSURIHVVLRQDOO\ deployed on building exteriors, over- looking expansive parking lots. With video analytics, they create a special- ized virtual trip line around property Contact us today for a FREE Web Demo perimeters. “If an object of a certain size breaks Phone: 781-455-8558 that perimeter, the Axis PTZ cameras Email: [email protected] The Global Leader in Secure are strategically placed to alert security Online: www.easylobby.com Visitor Management Systems staff, send the video stream to head- quarters to be investigated in real-time, and also automatically track that ob- Circle 9 on card. 26 0111 | SECURITY PRODUCTS

0111sec_024_027_nilsson_v4.indd 26 12/17/10 11:11 AM ject,” said Ben Green of IPVision. Panduit also uses PTZ cameras to “We want to maintain an open and employees and property,” Woodward Once the video stream is sent to remotely monitor public areas of the welcoming atmosphere on our fi rst said. headquarters, security staff can re- customer experience exhibit in its lob- fl oor, but we also want to make sure motely zoom, pan and tilt the cameras by. The self-guided tour showcases an people are staying within our security Fredrik Nilsson is to closely observe the scene. audio visual display of the company’s policies,” Woodward said. general manager of “Adding intelligence to the video al- solutions and capabilities, as well as a “The network cameras complement the Americas for Axis lows us to selectively push video to the behind-the-glass view of Panduit’s data our strong security policies and help Communications. Unifi ed Operations Center, which limits and operations centers. us stay proactive in safeguarding our how much video we need to aggregate on a regular basis,” Woodward said. Woodward credits the intelligence for improving the effectiveness of his security staff. “In the old days, we’d just be end- lessly staring at video monitors just waiting for something to happen,” he Most Popular Combo Deals said. “Now we can receive actionable video—feeds that are based on alarm events like security breaches triggered from crossing a virtual trip line.”

NETWORK CAMERA PROTECTION Even though many network cameras are designed for exterior use, IPVision turned to Dotworkz Dome enclosures to ensure optimum performance under conditions ranging from harsh Chicago winters to Costa Rica’s tropical humid- ity. A variety of models with built-in heaters and blowers operate in temper- atures ranging from minus 40 degrees F to 150 degrees F. The enclosures also step down the Mini Combo Combo Meal 9”Combo 14”Combo voltage of the air conditioning power 1 2 3 4 8-Port Telephone Module Large Angus Double Stack 8-Port Telephone Module 8-Port Telephone Module coming into the enclosure to the 25 to 30 8-Port CAT 5e Data Module Supersized Fries 8-Port CAT 6 Data Module 8-Port CAT 6 Data Module 1x4 CATV Module Supersized Drink 1x6 CATV Module 1x6 CATV Module watts required by the Axis PTZ cameras. Compact, Surface Mount Toughest Plastic Enclosure Reversible Hinged Door “Panduit runs fi ber to the edge of Ideal for MDUs Surface or Flush Mount 20 Gauge Steel the buildings to avoid electromagnetic interference and protect against light- ning strikes,” Green said. “The Dot- workz enclosures allow us to install a media converter between the fi ber cable and the Ethernet cable we use to power For small and mid-size installers and builders the cameras.”

TYING INTO OTHER Combo means value. In this economy, it is critical that we look SECURITY SYSTEMS for value. That’s the principle behind our combo deals. We IPVision also tied the PTZ cameras loaded the industry’s toughest boxes with Voice, Data, CATV into Panduit’s access control system to modules and accessories, and then we tag them with incredibly help the company monitor other secu- low prices, even lower than some brands’ empty boxes. Tired of rity breaches, such as doors held open your supplier nickel and diming you on every module? Tired of longer than usual. not having the modules in stock when you needed them? Want “If an employee is just casually to win jobs and make money in this down economy? Our standing in a doorway and exceeds the Elite Installers do. Give us a call. time we’ve programmed for a door con- tact to remain open, it’s not a real se- curity threat,” Woodward said. “That’s

the advantage of having cameras there. Available at Once they’ve closed the door, the inves- 888.ASK.4ICC icc.com/sp [email protected] tigation is over. We can remotely inves- Everywhere tigate and document the reason for the alarm without sending someone out to © Copyright 2011, ICC. physically investigate the situation.” Circle 24 on card. WWW.SECPRODONLINE.COM 27

0111sec_024_027_nilsson_v4.indd 27 12/17/10 11:11 AM PRODUCT SOLUTIONS Compiled by Cindy Horbrook, Content Development Editor BIOMETRICS

Kent Security Services Fast Access Security Corp. e-DATA Datastrip Inc. SafeRise System Door Access Kit Single Door Unit EasyRead

The SafeRise System facilitates management and The Biometric Fingerprint Door Access Kit provides The EasyRead handheld biometric reader provides control of building entry points, common areas, non-wireless entry access control. The kit includes travel document verifi cation. The mobile device elevators and parking lots. It uses second-genera- the SBF700 biometric fi ngerprint keyless entry The Single Door Unit provides biometric access reads and inspects fi rst- and second-generation tion facial, voice and behavioral biometrics to au- system, a 1,000 mA power supply and a DS150i control. The embedded unit features 4.7x2.4x1.8- e-passports and other documents in accordance thenticate a user’s identity and determine whether motion detector. A magnetic lock, electric strike or inch biometric reader dimensions and a 24-volt DC with the International Civil Aviation Organization’s the individual is cleared for access to a protected electric deadbolt and an egress button may be power source. The single-gang mount can be used 9303 standard. The optical camera-based scanner area. The system features facial, speech, speaker added. Users can program the unit using the infra- with a door strike or a magnetic lock and is de- reads up to three lines of machine-readable data and license plate recognition; a redundant on-site red remote control keypad or fi ngerprint manager. signed for indoor and outdoor use in residential, from passports, ID cards and visas. The unit fea- server; networked door controllers and intercoms; The system can store up to 120 fi ngerprints. There commercial, warehouse, garage and IT applica- tures a 508 dpi NIST-approved fi ngerprint sensor high-resolution surveillance cameras; and elec- are two fi ngerprint managers, and each fi ngerprint tions. The stand-alone device does not require a and Bluetooth, Wi-Fi and cellular network connec- tronic locks. Kent Security Services. has one ID code. Fast Access Security Corp. server or software. e-DATA. tivity. Datastrip Inc. Circle 320 on card, or visit Circle 321 on card, or visit Circle 322 on card, or visit Circle 323 on card, or visit www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. www.secprodonline.com/productinfo.

28 Circle 31 on card. 0111 | SECURITY PRODUCTS

0111sec_028_029_PS_biometric_v5.indd 28 12/17/10 11:13 AM Cogent Inc. Black Box Corp. Reader and controller units are separate, and all Search-Gate Intelli-Pass the mechanics for opening the door install in the protected area. Proprietary encryption is used to The Intelli-Pass is a biometric fi ngerprint ID sys- secure communications between the reader and tem designed to ensure authorized entry into controller. It requires both a fi nger scan and PIN secure areas. The system features advanced for access. Black Box Corp. fi ngerprint recognition technology and a two- Circle 326 on card, or visit part architecture with an anti-tamper design. www.secprodonline.com/productinfo. NiSCANiSCA PlasticPlastic CardCard SolutionsSolutions FromFrom schoolschool IDsIDs toto traintrain tickets,tickets,

The Search-Gate stores up to 1,200 fi ngerprint fromfrom driver’sdriver’s licenseslicenses templates to provide on-device matching. The unit can be confi gured to compare fi ngerprints re- toto nationalnational IDsIDs motely from a server, which enables users to scale the biometric access control system. The Reliable • Fast • Secure device features customizable Weigand setup, PoE Reliable • Fast • Secure and SecurSetup administration software and is available in indoor and outdoor models. The prod- Brilliant 24-bit color, 300 DPI uct is powered by a SecurASIC chip and matching technology. Cogent Inc. 2-year warranty* Circle 324 on card, or visit www.secprodonline.com/productinfo. 100,000 cards MTBF* Napco Security Holograms Technologies * Contact Team NiSCA for more details. BioReader

PR5350 Smart Card, High Volume The BioReader indoor/outdoor biometric keypad Booth 23128 integrates with alarm panels or functions as a stand-alone alarm and garage door access con- troller. The vandal-resistant unit is made with alloy PR5350/PR5302 metals to withstand 14- to 122-degree Fahrenheit Security Lamination temperatures. A one-touch button arms/disarms the system and activates relay groups, and audi- PR-C101 Cost Effective, Brilliant Image, ble, visual and biofeedback indicators display the Smart Card Optional keypad’s armed status. The biometric ambush fea- ture allows pre-selected buttons or a fi ngerprint scan to silently call police during a robbery. Napco Security Technologies. Circle 325 on card, or visit [email protected] • US: 800-359-7300 • International: 001-732-271-7367 • www.teamnisca.com/spjan www.secprodonline.com/productinfo.

Circle 1 on card. WWW.SECPRODONLINE.COM 29

0111sec_028_029_PS_biometric_v5.indd 29 12/17/10 11:13 AM MARCH 29–31, 2011 • WASHINGTON D.C.

YOU PREPARE, PREVENT, PROTECT, AND RESPOND.

SPONSORED BY NEW THIS YEAR: GovSec Force and Firearms Championship Test your shooting skills on the show fl oor!

SIGN UP TODAY—IT’S FREE!

Untitled-5 2 12/10/10 2:38 PM EDUCATIONJANUARY 2011 SECURITY

A SPECIAL SECTION TO SECURITY PRODUCTS, T.H.E. JOURNAL AND CAMPUS TECHNOLOGY

VMS Emergency Lights Control Center Version 4.2 of Video Insight’s Education Talk-A-Phone’s ultra-bright, all-LED, fl ashing Avigilon’s Control Center 4.6 with Focused IP Video Management System Blue Lights feature a prismatic pattern for High Defi nition Stream Management (HDSM) supports more than 675 camera models visibility at greater distances and are typically is engineered from the ground up to from 50 manufacturers. used in conjunction with emergency phones. intelligently manage HD video.

0111secSup_c1_v4.indd 1 12/9/10 11:24 AM A. B. C. D. Any of the above.

Campus security has more than one right answer.

You can’t go wrong with the AD-Series – the first of many flexible products from Schlage®. Customize each opening with networking options, credential readers and more, and then upgrade your lock as needs change in the future. Visit schlage.com/ad-series to make a difference on your campus this year. Whether it’s one door or one building, the AD-Series is the right choice for a more flexible future.

© 2011 Ingersoll Rand

Untitled-5 1 12/7/10 12:24 PM University of Nevada, Las Vegas, NV Communicate with Confidence

IN AN EMERGENCY, a Community R-Series loudspeaker system can be your most effective tool for crowd control and evacuation. Indoors or out, R-Series are recognized world-wide for high intelligibility, musical sound quality and long-term dependability.

 22 Models for long-throw, short-throw or distributed applications indoors or out.  Attractive, paintable enclosures and stainless steel hardware.  Backed by a 5-year product warranty and 15-year enclosure warranty.

Visit our website communitypro.com/rseries to download our All-Weather/All-Purpose brochure.

communitypro.com

Untitled-10 1 12/2/10 1:25 PM 0111secSup_s04_s05_jensen_v4.indd 4 EDUCATION SECURITY S4 EDUCATION SECURITY mean afi mean were not-so-quietly talking over the teacher. Today, disruption could meant someone back inthe row waschewing gumor acouple of kids some kindof disruption breaks out. day, inthe Back that probably way into videosurveillance. it during our annual visit at ASIS. It isatool that thankfully madeits tool that actually found application. a security He informed me about can asavital they part fully ofso graspsecurity thecurriculum. our readers, and from those our sister publications, toinformation this dents, K-12 whether or in the campus setting. We want all to expose THEN AGAIN INJULY ANDNOVEMBER. THESE SUPPLEMENTS WILL APPEARINTHISISSUE, TY ASTHETHEMEOFEACH OFOURSUPPLEMENTS. RITY: IN2011, WE’RELOOKINGAT EDUCATION SECURI- YEAR WHEN IT COMES TO SCHOOL OR CAMPUS SECU- WE’RE TAKING ALITTLEBITOFDIFFERENTTACT THIS C.JensenBy Ralph COMMENTARY DELVING DEEPER Imagine, ifyou will, sitting inyour class, eighth-grade and science In our cover story, Bill Taylor of Panasonic writes about ateaching Our goal isto delve alittle into deeper that themes aff st fi ght or someone with agun.Commotion hits afever pitch. www.basler-ipcam.com | JANUARY 2011| A SPECIALSECTION TO SECURITYPRODUCTS, T.H.E. JOURNALAND allstu-ect Pennsylvania, took fi ve hostages, and killedfi enteredCharles Roberts Carl aone-room inrural Amishschoolhouse But it happen, does without regard to school or location. In 2006, tions aswell asthat of law enforcement. plancrisis would clearly outline role the of teachers and administra- onlyof incase an asvideosurveillance emergency.used In a case, this documents, maps and whatever instructor the needs,would else be onfocuses the activity in the classroom. network camera document moves away from lesson plans the and or anyone security school alerts chosen to else receive Th alert. the judge. Th e teacher touches a button pendant,the on which instantly When mayhem breaks out, instructor isneitherreferee the the nor the a network document camera focusing on material. instructional the tor is wearing a pendant microphone that up cues day’sthe lesson, with playsvisual systems. Security akey role inthat classroom the instruc- bone inplace; classrooms are integrated with networked audio and I know what you’re thinking: Th Th Taylor’s article points out that today mostschools have an ITback- ecamera, by enhances which learning the experience displaying One-of-a-kind IP cameras Originals True German

Megapixel, CCD, CMOS, H.264 reliability Industrial-grade image quality Superior click. see. smile! CAMPUS TECHNOLOGY Full HD • 30 fps iswould happen never inmy school. ve girlsand himself. 12/9/10 11:13AM e EDUCATION SECURITY e 12/9/10 11:13 AM S5

magazine. EDUCATION SECURITY EDUCATION | Security Products ncern was to protect vulnerable vulnerable protect ncern was to | JANUARY 2011 | JANUARY is the editor-in-chief of of editor-in-chief is the CAMPUS TECHNOLOGY nance have access to live and recorded video using the school the school using video recorded and live to access have nance ware keeps cameras in line and access control points in focus. points access control and in line cameras keeps ware As schools grow, or are renovated, security plays a key role. Plano Plano role. a key security plays renovated, are or schools grow, As the lion’s gotten has company his that out points JVC of Barrett Matt security is important campus that so convinced are residents Plano College also Community Vancouver northern border, our Across HD surveillance system, the Avigilon using digital, went VCC soft across I live growing. still is in Texas District School Independent near newest high up school its is springing and PISD, from the street backyard. my High McMillan Plano’s at and money, security of installation share the monitoring 150 cameras to up School, the district is deploying campus. its on areas common of exterior and interior for funding of in favor initiative bond passed a public they have that PISD. and parents for point selling Security important an is security. environ- a safe creating security by of proposition the value recognized underwent an the college said Avigilon of Fernandes Alexander ment. analog-based its that realizing risk assessment, third-party extensive the way. by go to have would system evidence, useable should more capture to the college which enables the The primary need arise. co increasing experience the learning enhance by and students college safety. Ralph C. Jensen tor of fi of at entrances the placement is camera focusof interest e Th network. Th buildings. administrative and as in classroom as well the school, cials at cials at t in well in the in the t in well SECURITY PRODUCTS, T.H.E. JOURNAL AND T.H.E. SECURITY PRODUCTS, TO A SPECIAL SECTION are required to wear badges, which makes people people makes which badges, wear to required are venue. What makes the IT backbone work in the education security security in the education work the IT backbone makes What Students and staff and Students Managing or tracking students is another vital role of schools.Beverly of role vital another is students tracking or Managing In order to go head-to-head with Mother Nature, FSU initiated the the initiated FSU Nature, Mother head-to-head with go to order In Crisis can come in the form of a lightning bolt. Just ask offi Just bolt. a lightning of in the form come Crisis can We have, posted online, several case studies that fi several posted online, case that studies have, We requirement is soft ware. James Whitcomb of Video Insight tells of a of tells Insight Video of Whitcomb James ware. soft is requirement the direc- and facilities of the director in which curriculum in Houston without badges more recognizable. Vigue also mentions that a visitor a visitor that also mentions Vigue recognizable. more badges without that and each be marked, school should clearly at center management hardware newer door with tted be locks retrofi should and doors older systems. locking and Vigue of Ingersoll Rand Security Technologies writes that ID cards are are cards ID that writes Rand Security Technologies Ingersoll of Vigue everything be can used for the cards and students, tracking for tool one the library. books at out checking to lunch buying from Blue Light Trail, which is actually 400 strategically placed blue light light blue placed 400 strategically is actually which Trail, Light Blue Talk-A-Phone. from lights blue and phones emergency with towers when safe- erected are towers security a sense get of as more Passersby ty needscommunica- emergency onreliable the Havinga campusgrow. perspec- relations public and a legal both from cant link is signifi tions and region, a thunderstorm of is in the dead center Tallahassee tive. visi- and students faculty, for safety provide to want cials offi university program. they emergency phone an developed why so that’s tors, Florida State University, which faces more lightning strikes than any any strikes than lightning which more faces University, State Florida in the nation. university other Education Security Education Tragedy can happen anytime, anywhere. anytime, happen can Tragedy 0111secSup_s04_s05_jensen_v4.indd 5 FEATURE EDUCATION SECURITY EDUCATION

A SOUND APPROACH

Systems that boost classroom learning now also provide security benefi ts By Bill Taylor

KEEPING STUDENTS AND TEACHERS SAFE IN THE happen every day at schools across the country. Classrooms can be CLASSROOM IS A TOP PRIORITY AND A BASELINE disrupted by fights or other disciplinary problems, by an irate or REQUIREMENT FOR EFFECTIVE EDUCATION. IN RECENT intoxicated student, by an unexpected visitor or even by an illness or YEARS, SOME HIGH-PROFILE SCHOOL TRAGEDIES HAVE medical emergency. REMINDED TEACHERS, ADMINISTRATORS, PARENTS, When it comes to responding in an emergency situation, technology LAW ENFORCEMENT AND THE PUBLIC OF THE POSSIBLE can be a helpful tool. For example, school video surveillance systems can provide important information in the midst of a crisis. Use of com- SCALE AND TRAGIC IMPACT OF SCHOOL VIOLENCE. munication equipment keeps everyone in touch and promotes a time- When Charles Carl Roberts walked into a one-room Amish school- ly and eff ective response. house in Pennsylvania in 2006, took fi ve hostages and eventually killed In fact, technology is transforming schools on a variety of fronts. fi ve girls and himself, we were reminded that tragedy could happen at Today, most schools have an IT backbone in place, and many class- any school and in any classroom. rooms are integrated with networked audio and visual systems. Th e Such high-profile incidents of school violence can overshadow connectivity and functionality of these systems also provides an the potential for less dramatic, but still troubling, incidents that can opportunity for them to play a role in security and emergency response

S6 EDUCATION SECURITY | JANUARY 2011 | A SPECIAL SECTION TO SECURITY PRODUCTS, T.H.E. JOURNAL AND CAMPUS TECHNOLOGY

0111secSup_s06_s10_taylor_v4.indd 6 12/9/10 2:50 PM Untitled-5 1 12/7/10 12:31 PM 0111secSup_s06_s10_taylor_v4.indd 8 EDUCATION SECURITY S8 EDUCATION SECURITY environment. It’s that true videocameras are invaluable inhelping day-to-day of function and school the of apart become school the do not interfere for with experience school the students and teachers. systemsschools—and not are like that security prisons—the best those for environment? school the As we needour to schools feel like any threat, possible but what would consequences the be of doing so teaching environment. It is possible to protect any from school almost elementsideally the of that protection should not interfere with the While protecting students should always foremost be for K-12 schools, SECURITY ANDTHETEACHING ENVIRONMENT outbreak of violence. systems thatof incase an canused emergencysituation be or an well known. There are additional of benefits integrated classroom exceptional images invirtually any lighting condition. camera, similar to the video cameras for used surveillance, provides andrials projects on classroom. ascreeninthe Anetwork document camera, captureswhich images of maps books, or other teaching mate- boards and hand-held tablets along with awireless audio system. tions today allow for integration of videos,computers, projectors, white- such asiPods, laptop computers and LCD projectors. Intelligent solu- sound systems, teachers can now plug inavariety of multimedia devices, worked, classroom technology-driven environment. In addition to heard. Anintegrated audio and visualsystem of ispart net- new the and-eraser systems and teachers sometimes who hadto shout to be rooms, which difffrom er yesterday’sschoolrooms dominated by chalk- academicperformance.higher heard more easilyby teacher and the fellow students. Th eresult is gain confi teachers’ classroom management skillsand reduce stress. Students from insuffi cient insulation. Studies show that boost sound systems tioners, noise hallway, inthe or other audible interference resulting classroom,the above ambient sounds such asheaters and air condi- ability for students to hear teacher’s the voice of part clearly inevery roomthe to help students participate inclass. held microphone that infrared uses also signals around can passed be microphonethe hangs on his or her neck. A separate, wireless hand- ed on microphone, the enabling teacher to the have hands both free, as a teacher’s voice. Full control of power, mute and volume can locat- be infrared receivers, and connect which to amplify speakers sound of the teacher wears awireless pendant microphone that asignalto sends cate better and achieve better results on sidesof both desk.Th the systemstechnology-based can help teachers and students communi- education iswith classroom experience audio systems. These infrared One area hasmadegreat technology inwhich gains inimproving the CLASSROOM AUDIOSYSTEMS innovative ways to leverage. ence. It isan opportunity that top providers technology are fi in addition of function to everyday their enriching learning the experi- In elements fact, ofshould incorporated ideallysecurity be into the The ability of such systems to improve student learning is Another component of integrated the classroom document isthe Audio systems are just one electronic component of today’s class- Day-to-day advantages of aclassroom audio system include the dence and participate more because their answers can be | JANUARY 2011| A SPECIALSECTION TO SECURITYPRODUCTS, T.H.E. JOURNALAND nding e immediately of case inthe an incident. with apanic button that allows theteacher to initiate afi option transforms classroom the audio solution system to asecurity and SAFEsystem addedthe asan option on A+ product. the Th room. Th isyear, took we a lookbroader the needs at the of classroom that provide learning allthe benefi ts of enhanced the audio in class- systems include wireless microphones and amplifi room audio systems for in K-12 classroom use settings. These infrared Panasonic System Networks Co. of Americadeveloped A+ the class- FROM CLASSROOM SYSTEMTO SECURITYSYSTEM injury resulting from aviolent isone episode many. too Violent out- happening low, inaclassroom isvery but obviously death asingle or Statistics suggest that possibility the of an extreme, violent incident WHEN TRAGEDY STRIKES being done.being response. emergency the Let’sboost at look an example of how is this and powerfully—to callfor help and to provide sound and videoto way ofto leverage in case thatan emergency—instantly technology high-tech classroom. With outside-the-box we thinking, have found a ity and even videoimaging capability are allalready there intoday’s situation?emergency Th ing in day-to-daythe classroom environment to aid response in an camera inan emergencysituation once or twiceayear. possible negative eff certainly ects overshadowbenefithe t of having the lems ifparents object to having theirchildren recorded on video. Th potentially intimidate the teacher, it could cause district-level prob- classroom.the Not only would it change classroom the dynamic and wouldmost, schools not accept placement the of avideocamera inside ways, and evenremote stairwells of parts campus. the But many, ifnot administrators and teachers monitor what ishappening hall- inthe recorded and ifneededat asevidence can used alater be date. responsegency asneeded. In addition, audio and videoinformation is informationthe available to administrators aswell and aspolice emer- room for anyone inemergencyresponse. Network connectivity makes tion about unfolding the event. available anywhere on network the to provide instant visualinforma- incorporating it into school’s the system and surveillance making it documentthe camera instantly camera, avideosurveillance becomes not orfocus on map abook but on classroom the asawhole. In eff in theclassroom, which will automatically reposition thecamera to button can asignalto document the camera send already used being using videofrom surveillance adocument camera. Pressing panic the audio of any unfolding emergency. world, thus leveraging classroom the sound system to capture clear audio line of communication classroombetween the and outsidethe emergency via network,the pressing buttonthe opens an immediate has amedicalemergency. In addition to administration alerting of the happens,gency an whether intruder comes into room the or achild teacher can easily and discreetly push button the any whenever emer- Th But what ifwe that could same the technology enhances use learn- Such asystem can instantly provide “eyes and ears” into class- the Th e system also can esystem also document and record classroom the activity e panic button is located on pendant the microphone, the so CAMPUS TECHNOLOGY enetwork connectivity, communication abil- ers and receivers rst response response rst ese ese 12/9/10 2:50PM ect, is is VIDEO SURVEILLANCE Made Easy

InstalledInsta and used on thousands ooff U.S.U school campuses EasyEasy to use - designed for non-technologynon- users SSchoolcho officials can monitor fromf the web or monitoring station, viewing all schools and buildingsbuild in a single display RetrRetrieve and record stored video to a CDCD or DVD with the click of a mouse Can be used in conjunction with access ccontrolont and other systems Campus-wide Security for UUsese on one or thousands of campuses the Next Generation WorksWorW efficiently making maximum use of for more information visit bandwidthbdbandd and network systems www.video-insight.com SSupportsupp both analog and IP cameras or call SupportsSuppS 700 IP camera models from 713-621-9779 5050 majorm manufacturers MapMap and floor-plan-based navigation ScalableSca US-basedUS-USUS- Technical Support NO HIDDEN FEES

Untitled-5 1 12/7/10 12:22 PM breaks are totally random, and unfortunately, they are almost certain to continue. Day-to-day emergencies are also a reality. Schools and classrooms must therefore be prepared for any emer- gency and have systems and processes in place to respond. Every school and classroom needs a thoughtful crisis plan that is updated annually and includes training for school staff . Th e plan needs to be specifi c and to outline the roles of teach- ers, administrators and law enforcement in case of an emergency. Who’s in charge in various emergency situations? Who calls whom? How are students relocated or sheltered-in-place? Where do I go, and what do I do? A key element in responding to any emergency is the need for information. A system that provides video and audio as an emergency unfolds can help to guide every aspect of emergency response. Video and audio help administrators to cater their response specifi cally to the needs of the emergency, avoid overreacting, and rethink and redeploy resources as appropriate, even as an ongoing situation changes. What is the right approach, and what if it fails? It helps to have GRADUATE additional eyes and ears watching and hearing what is going on, ready to escalate the response EDUCATION SECURITY EDUCATION TO A BETTER if the situation changes. ID SOLUTION COST CONSIDERATIONS IN SCHOOLS A benefi t of leveraging classroom technology to aid emergency response is the extreme cost- effi ciency of using solution elements already in place and serving important educational func- Only Zebra’s tions. Th e panic button is a feature on the wireless teacher microphone, and the video surveil-

TM lance camera is a document camera; all the other elements of functionality are additional ZXP Series 8 benefi ts of existing networking capabilities. Developing a solution like this is a result of thinking printer and more broadly about what a system can do, rather than restricting its use to what it was initially laminator delivers: created to do. It also is an approach that highlights the benefi ts of incorporating security into every aspect • Best-in-class speed of school operation. School security professionals should be looking at ways the new networked and t hroughput infrastructure can help to keep students and teachers safe, in addition to investing in security- specifi c technologies that also have proven value. • Two-sided retransfer Tight education budgets are a given, and K-12 schools understandably seek to maximize the printing in a single pass portion of those budgets that goes toward improving student achievement and teacher satisfac- tion. Technologies such as classroom audio systems can improve both of these, and now they • Photo-quality, can even help make students safer, too. Particularly for schools with limited budgets, the ability high-resolution im ages to boost education and security with a single expenditure is an attractive opportunity. Techno- logical advances have made these products aff ordable, and they integrate easily with other • Optional magnetic-strip, classroom systems, which also can save costs. smart-card and RFID One of the key criteria for buying anything in any economy is whether it adds value, and encoding classroom audio systems can improve the learning environment for students and make teachers’ jobs easier. Th is can make them highly cost-eff ective, even when times are tough. Th e added • Student ID cards that last elements of security and emergency response boost the value even higher. through g raduation THE POWER OF INTEGRATION Integration is a buzzword in the security market, but it also refl ects a new level of functionality and benefi t for customers. Too oft en in the security market, we think of security systems as integrated but don’t consider fully the benefi ts of integrating security systems with other sys- tems. Networking drives all kinds of systems for various uses among today’s customers—the same networking technologies that make IP-based security systems possible. It is time for the security industry to look at the broader impact of integrating security and other systems. It’s a mindset that enables leveraging of other technologies, such as classroom audio systems, for security functions. It also enables leveraging security systems for non-secu- rity functions such as process control and traffi c management. Only by taking a broad view can users maximize the benefi ts of modern technology. Learn more: Using classroom audio systems to help boost security is just one example. Th ere are others, www.zebra.com/securityed emerging now and yet to come, that provide both an opportunity for the security industry and new benefi ts and functions that make our industry’s systems more valuable than ever.

Bill Taylor is the president of Panasonic System Networks Co. of America.

S10 EDUCATION SECURITY | JANUARY 2011

0111secSup_s06_s10_taylor_v4.indd 10 12/9/10 2:50 PM 536 dorm meals 322 computer lab visits 137 library books 27 football games

ONE STUDENT ID FOR ALL FOUR YEARS

Output IDs that outlast college.

With Zebra’s new ZXP Series 8™ retransfer printer and laminator, you can streamline your security operations by quickly creating all-purpose student IDs. Our incredibly durable cards not only last through graduation, but are compatible with a wide array of features—from magnetic strips to smart card technology. Discover the single ID system that delivers everything you need. Learn why the ZXP Series 8 printer with lamination is the smartest choice for your security and access applications. Read our white paper now at www.zebra.com/securityed.

Untitled-10 1 12/8/10 3:57 PM FEATUREA HANDS-ON LESSON By Beverly Vigue SECURING EDUCATIONAL FACILITIES IS A COMPLICATED SUBJECT WITH MUCH DEPENDING ON THE INDIVIDUAL INSTITUTION, NOT TO MENTION THE DIFFERENCES BETWEEN SECURING K-12 SCHOOLS AND HIGHER EDU- CATION CAMPUSES. In K-12 schools, administrators must be able to track students from pickup to drop-off , eff ectively control visitors at the school and be pre- pared to lock down the school in a time of emergency. Th e overriding

EDUCATION SECURITY EDUCATION issue on higher education campuses, on the other hand, is the ability to lock down quickly.

K-12 — WHERE IS JOHNNY RIGHT NOW? Whether tracking students with simple roll calls, requiring that stu- dents show identifi cation cards to gain access to designated vehicles, or using GPS tracking of buses, student tracking is now possible for all school districts, even when children are no longer at the school. More schools are taking advantage of these systems, even with children who aren’t bused. Additionally, schools using ID cards can use them for other applica- tions, from buying lunch to checking out books at the school library. cy continues to lie with individual facility administrators. By design, Today, nearly all schools require visitors to sign or check in when an emergency lockdown procedure ensures that all internal and exter- entering the school building. Some states, including Florida and Cali- nal doors and windows are locked or secured. Building occupants fornia, require criminal background checks for anyone working in or remain inside their secured rooms, awaiting an “all clear” from emer- regularly visiting a school. Communicating a visitor policy to all par- gency personnel. ents and guardians helps ensure that everyone supports and complies Th e most eff ective lockdown procedures include regular training for with the access plan. not only students but also faculty and staff , who are oft en the initial Most schools use some form of badge to identify visitors to the responders to an emergency but are seldom properly trained to building. Th e badges, when displayed properly, help staff , faculty and respond. Training may include lockdown drills conducted annually, students easily identify whether someone they do not recognize is school maps distributed to responders and inventories of classroom authorized to be in the school. Visitor badge programs also make peo- emergency equipment. ple without badges more noticeable. Eff ective emergency management plans rely on communication Schools should designate a single entrance/exit door in the facility. methods that will distribute emergency instructions quickly and wide- Th e main entrance should be clearly marked by signs with directions ly during a crisis. Public address systems, messaging via networked to a visitor management center. Older doors and locks can be retrofi t- computers, electronic signage and other devices can alert everyone to ted with newer door hardware and locking systems. Electronic release a dangerous condition and the need for an emergency lockdown. Noti- of door locking mechanisms coupled with video and intercom systems fi cation systems should alert all areas of the building, campus or dis- enable interior monitors to screen visitors before allowing them into trict, including remote buildings and outside areas. the school. Th ere are a host of everyday actions school can take immediately to Digital video camera systems off er state-of-the-art resolution, track- get procedures and systems where they need to be. Some actions include ing and Internet access to internal space monitoring and control. equipping classroom and common-area doors with locking devices that School safety surveys show that most K-12 school districts use secu- allow the doors to be secured from inside the room, installing a reliable rity cameras to monitor parts of their facilities or campuses. Th e most security and emergency warning system, establishing district-wide com- common uses for security cameras are at entrances, exits, gathering munication capabilities and creating a central monitoring station to areas and parking lots. receive lockdown signals and to notify authorities. School districts should enable their local agencies — police, fi re or For a relatively low-cost security enhancement, doors with mechan- emergency responders — to view security camera footage in real time. ical locks can be enhanced by upgrading the locks to a patented or patented restricted keyway in which keys cannot be duplicated without CRITICAL ELEMENTS OF A K-12 authorization. EMERGENCY LOCKDOWN PLAN Electronic locks or card readers take security to a higher level by Terrorist attacks and hostile intruder situations have emerged as seri- requiring a unique credential for access. Electronic security makes it ous threats to school safety. Th ese threats may require an emergency easy to manage adding and deleting users and allows administrators to lockdown or shelter-in-place procedures, which are the opposite of a know who went where and when. facility evacuation. New construction or remodeling lets schools hardwire electronic National standards for school lockdown procedures are beginning locking to the computer network for centralized management. When to emerge. However, the responsibility of developing a lockdown poli- managed from a central location, lockdowns are fast and eff ective.

S12 EDUCATION SECURITY | JANUARY 2011 | A SPECIAL SECTION TO SECURITY PRODUCTS, T.H.E. JOURNAL AND CAMPUS TECHNOLOGY

0111secSup_s12_s14_vigue_v3.indd 12 12/9/10 11:15 AM TwoTwo MarketMarket LeadersLeaders -- NowNow OneOne SolutionSolution

DVTel’s award winning Smart Security Solutions™ protect critical infrastructure using leading-edge IP cameras and analytics, integrated by powerful, customizable video management software. Our flexible, scalable solutions address the physical security needs of a single location, as well as those of clients with operations spread across the globe.

With DVTel, simplicity is the ultimate sophistication.

Untitled-1 1 12/8/10 9:35 AM 0111secSup_s12_s14_vigue_v3.indd 14 EDUCATION SECURITY S14 EDUCATION SECURITY life safety door and solution. security easily integrated be with other electronic hardware for an integrated system installation isfastand with easy minimaldisruption and can school’s network for fast,eff ofenhanced ahardwired security system. Th system provides fl exibility and simplicity of installationsame withthe diff With advanced programming, accesscontrol systems can respond to lock down abuilding, of aseries buildings or even an entire campus. ized system. Th building perimeters with accesscontrol connected devices to acentral- many campuses have systematically upgraded traditional on locks four-yeartheir cousins inimplementing such solutions. going on with country’sthe community colleges, which lag behind such procedures inplace. It isone reason why there issuch ascramble facilities to normal their state. prove equally ineffi a time. Aft er resolutionthe issue, security reverse process may a of with instructions to facility lock access doors manually, one building at systems may rely on landline phone systems to calleachdepartment offi buildings. With traditional controls security and procedures, campus during emergencyconditions that callfor alockdown of some or all campusOpen environments signifi pose SET OF LOCKDOWN CHALLENGES COLLEGES BRING ON A WHOLE NEW cials may struggle to downcials may lock buildings struggle quickly. Mass notifi As an alternative to hardwired awireless locks, electronic locking With recent advances inelectronic management security systems, Interestingly, campuses those receiving Title Ifunding must have erent threat levels to automatically lockdown buildings and turn ese systems ese allow authorized individuals to quickly –asubstantial savings. additional cameras to support servers and time of running more cable andadding new With theAvigilonW system, we eliminate thecost www.avigilon.com HD SurveillancePlatform The World’s FirstOpen Coffeyville UnitedSchoolDistrict Network Administrator Bryan Kinnamon cient manual when procedures are to return used | JANUARY 2011| A SPECIALSECTION TO SECURITYPRODUCTS, T.H.E. JOURNALAND ective lockdown. Wireless accesscontrol cant challenges, particularly ey connect ey easily to the cation s. eff longest isthe 10 seconds it to willtake initiate lockdown.” complementary 1toand 10seconds commands responds. Th every 10-minute Without heartbeat. waking up entire the it lock, listens for immediately down lock could ignored be for 10-plus minutes. host. Forthe instance, even with a 900 MHz platform, a direction to with hostlimits the locks’ the ability to receive urgent commands from to thehostand batteries. conserve However, such limited connectivity the case with offl Access control decisions may managed be within (asis locks also the hourto-six timesper with 900MHz solutions, a10-minute heartbeat. loaded by hostinto the fi lock the per day,ve-to-six times versus fi ley, points out, “Usually, with WiFi, access control decisions are down- brings with it a lockdown caveat. As University of Virginia’s Con- Gary locks and proximity or smart cards can also eff ectively control access. requires proper IDcards for entry. Keyless systems that electronic use unlocked, allowing free access,or maintain alocked system that or ofall part campus the at diff erent times. esystem can keep doors Th control over to apredetermined system procedure. Security Technologies. Beverly Vigue When possible,redundant systems provide solution. best the tems should fi sages to avariety of communication channels. Mass notifi campus buildings to apublic address system and broadcasting mes- systems include text sending messagesto students’ cellphones, linking ective way to people notify of theneedto lockdown facilities. Th Emergency notifi Emergency ‘wake “(Anew) up on radio’ feature works in parallel with the Wireless accesscontrol isquite prevalent on college campuses but it can programmed also be Locking devices to automatically secure situationt the local and of type campus organization. is vice president isvice for education markets for Ingersoll Rand ine locks) toine locks) minimizecommunication from lock the CAMPUS TECHNOLOGY cation and broadcast systems alert provide an cationsys- 12/9/10 11:15AM ese ese us, ve- EDUCATION SECURITY

12/9/10 3:26 PM S15

EDUCATION SECURITY EDUCATION | | JANUARY 2011 | JANUARY www.videx.com. ,QVWDOO DQGFDELQHWV .H\VZRUNGXULQJGD\V .H\VFDQQRWEHGXSOLFDWHG (DFKRSHQLQJLVUHFRUGHG /RFNVKDYHQRNH\ZD\WRSLFN ‡ DQGWLPHV\RXVSHFLI\ ‡ ‡ ‡ LQGRRUVSDGORFNV &\EHU/RFNF\OLQGHUV ³ZLWKRXWZLULQJ³ CAMPUS TECHNOLOGY  Š Mater Academy has issued 150 electronic keys to its staff and has issued 150 electronic keys Mater Academy set high academic expectations for has Just as Mater Academy was replace the cores in their existing door locks with CyberLock cores in their existing door locks with CyberLock replace the was electronic cylinders. access permissions. contains that individual’s teachers. key Each to be active only during school are programmed keys Teachers’ to need they privileges access the contains key hours.janitor’s Each has minimized the security risks from fre- do their job. “CyberLock audit reporting of department.quent turnover in this The system’s our administrators activity helps when secu- lock openings and key been have re-keying with associated expenses The arise. issues rity completely eliminated.” it is just as committed to making and staff, teachers, its students, security very take “We its school a safe place to be. Macho states, for a safe learning Our objective is to provide environment seriously. and staff.” teachers, our students, that Videx CyberLock Solutions is an engineering design company institu- academic for products control access CyberLock manufactures and [email protected]. at 541-738-5500, can be reached They tions. to: information go more For ADVERTISEMENT &\EHU/RFN &RPSOHWH$FFHVV&RQWUROLQ(YHU\/RFN&\OLQGHU VDOHV#YLGH[FRP ‡ SECURITY PRODUCTS, T.H.E. JOURNAL AND T.H.E. SECURITY PRODUCTS, TO A SPECIAL SECTION ZZZF\EHUORFNFRPORFN  $UH

Now a safer environment sounds better too.

Make your classrooms safer with the only security solution that also enhances learning. That’s the advantage you get with the Panasonic A+ series – the only classroom audio system with a security button right on the teacher’s microphone. Pressing the button instantly alerts administration that there is an incident. Schools get a safer environment for students and teachers, plus the proven benefits of classroom audio from the industry’s audio expert. Innovation plus integration – that’s a plus only A+ from Panasonic can offer.

see more with your smartphone

Home & Business Communications Panasonic System Networks Company of America panasonic.com/Aplus

Untitled-3 1 12/7/10 1:50 PM FEATURING

GovSec delivers the latest training, education and tactical tools you need to fulfi ll your mission.

REGISTRATION IS KEYNOTES ANNOUNCED!  Thad Allen, NOW OPEN! USCG (Retired), National Incident , FREE EXPO Deepwater Horizon Meet hundreds of leading security vendors essential to keeping our oil spill country safe and secure. Plus participate in interactive workshops and see demos showcasing the latest advances in infrastructure Nicholas Stein protection, cyber warfare technology, personal protection equipment Series Producer, and much more! Border Wars, National TWO-DAY CONFERENCE topics include: Geographic Television • Cyberterrorism and Cybercrime • Domestic and International Terrorism • Critical Infrastructure Protection • Law Enforcement Case Studies, Tactics and Technologies

www.GovSecInfo.com/security

Untitled-5 3 12/10/10 2:38 PM CLOUD COMPUTING

THE YEAR OF THE CLOUD Vendors unite to address security issues

By Margaret Dawson

early every day, a new report or headline touts the latest cloud based consumption model does have clear, measurable benefi ts, such as faster computing security scare. Take these recent news bits: only 47 time-to-implementation, less infrastructure burden, more affordable pay-as-you- percent of respondents believe cloud services are evaluated for go pricing and easy scalability up or down. security before deployment; 60 percent of 1,600 senior executives As with any solution, cloud-based products bring risk. Because putting your in 56 countries perceive an increase in risk from the use of cloud infrastructure, Web development environment or application in the cloud takes computingN and 48.1 percent said they are not confi dent a compliance audit of away IT control, the fears around data protection and overall security are un- their cloud-based apps would show that all user access is appropriate. derstandable. The hype about cloud computing is hard to ignore, as industry analysts, pun- However, evaluating cloud security should be no different than evaluating any dits, bloggers, IT departments and CIOs all try to fi gure it out while being told other solution. A good cloud vendor should be able to withstand a security review, to leverage its agility and cost-effectiveness, yet given little guidance about how produce security audit reports, prove compliance adherence and document access to do so. control rules, among a number of other security-related best practices. First, it is necessary to clarify an important point that cloud computing is noth- Not so long ago, network administrators thought putting an SSL VPN in the ing more than a new consumption model for technology. This point gets lost in all DMZ was absolute foolishness, and there was no way they were going to allow a the hype, and people often talk about the cloud as if, by itself, it will create world “hole” in their fi rewall to let mobile workers access data on the corporate network. peace, or at least eliminate all technology woes. While it’s not a panacea, a cloud- The cloud is today’s deperimiterization argument.

32 0111 | SECURITY PRODUCTS

0111sec_032_033_dawson_v3.indd 32 12/17/10 11:13 AM 0;:LJ\YP[` 7O`ZPJHS:LJ\YP[` *VU]LYNL,]LY`+H`H[ Just as there are differences among products in any category, all clouds are not created equal. There is not yet a standard by which to judge clouds; however, the ^^^UL[JLU[YPJZLJ\YP[`JVT people in the cloud industry are moving in that direction. The industry is responding to IT concerns about cloud security and lack of standardization or criteria around cloud computing, and we are seeing the forma- tion of industry groups, forums and associations across vendors and standards bodies. In 2011, this cooperation will accelerate, as much of the groundwork has already been put in place in the last year. Even the government is trying to help. For example, the National Institute of Standards and Technology—the folks who brought you the Federal Information Processing Standards known as FIPS—recently hosted a cloud computing forum and workshop on next steps in developing cloud computing standards. In Asia, 11 companies representing the computing, software, hardware and ser- vice provider communities, including Cisco, Microsoft and Verizon, have pooled their resources to form a nonprofi t organization called the Asia Cloud Computing Association or “Asia Cloud.” One of the fi rst organizations to create a unifi ed recommendation for cloud se- curity was the Cloud Security Alliance. Born in 2008 from an idea and discussion during a security practitioners’ conference, the ISSA CISO Forum in Las Vegas, the founders have brought together academics, enterprises, vendors and experts to develop guidance and promote best practices for security assurance within cloud computing. CSA’s mission is to promote a common level of understanding be- tween the consumers and providers of cloud. This might sound very “kumbaya,” but in two short years, the CSA has grown into a strong organization that has successfully shifted the discussion on cloud security. Today, it has more than 10,000 members and a myriad of resources. In November 2010, the CSA hosted its annual Congress, and its published “Security Guidance for Critical Areas of Focus in Cloud Computing” is in version 2.1. The Open Web Application Security Project (OWASP) is another nonprofi t or- ganization and open community dedicated to improving the security of applica- tion software. It draws its spirit from the open-source community and is focused on the element of trust on the Web. The OWASP Top 10 identifi es the 10 most critical Web application security risks and also provides guidance on how to avoid or avert these risks. Remember, a cloud solution is built on the Internet. The PCI DSS compliance mandate, which is a must-have for the credit card industry, includes the OWASP Top 10 as part of its framework. We also will see regulations such as PCI DSS start to apply specifi c cloud security mandates to its requirements. *SV\K*VTW\[PUN5L[^VYR:VS\[PVUZ While anxiety over cloud security is not likely to go away anytime soon, we will see heightened cooperation and focus by cloud vendors and the industry at large to help companies increase confi dence and understand when leveraging the cloud :[VYHNL;LJOUVSVN`HUK4VYL is appropriate and safe. In addition, as more companies employ cloud solutions, best practices will =PZP[^^^UL[JLU[YPJZLJ\YP[`JVT emerge on the enterprise side from which we can all learn. MVYPUZPNO[HUKHUHS`ZPZHIV\[PU[LNYH[LKZVS\[PVUZ And we are already seeing a shift in attitude. In a recent survey we conducted, [OH[[PL[VNL[OLY]PKLVZ\Y]LPSSHUJLHUHS`[PJZ 84 percent of respondents said they believe sensitive data can be secure in the HJJLZZJVU[YVSHUKHSHYTZ`Z[LTZ^P[OPU cloud, while nearly half said they believe cloud solutions are as secure as on-prem- ise solutions. [OLSHYNLYJVYWVYH[LPUMVYTH[PVU Survey results aside, you need to decide what is right for your organization. If [LJOUVSVN`PUMYHZ[Y\J[\YL the business needs to move quickly to address customer needs, you most likely will be looking to the cloud to solve the challenge. When you do, approach the cloud -VYLKP[VYPHSZ\ITPZZPVUZ -VYHK]LY[PZPUNPUMVYTH[PVU solution with the same security requirements and criteria as you would any solu- JVU[HJ[:OLYSLLU4HOVUL` JVU[HJ[9PJR5LPNOLY tion in your own data center. And a reminder to my cloud vendor brethren: The onus is on us to continue to raise the bar on best >LI4HUHNPUN,KP[VY 6USPUL:HSLZ+PYLJ[VY practices, be compliant and develop SLAs that provide the most ZTHOVUL`'TLKPHJVT YULPNOLY'TLKPHJVT secure environment possible to our customers. 7OVUL    7OVUL    

Margaret Dawson is vice president of product management for Hubspan. 7\ISPZOLYVM

WWW.SECPRODONLINE.COM 33

0111sec_032_033_dawson_v3.indd 33 12/17/10 11:55 AM INDUSTRYPERSPECTIVE Richard Connor Questions+Answers From The Top A conversation with Richard Connor

The retail environment is truly changing, but when it the loss-prevention staff when the device is reaching intelligibility of the announcement and continuous comes to fi re systems, a retrofi t might be the best up- the point of requiring service. Another option is the supervision of the system to ensure it is 100 percent grade and possibly the best solution. We wanted to know use of intelligent duct smoke detectors with multiple operational. more about retail activities combined with fi re protection, levels of service indicators that are displayed at the Can you expand upon the advantages of intel- so we sat down with Richard Connor, a product manager system’s addressable fi re alarm control panel. These Q.ligibility and supervision? at NOTIFIER, to fi nd out more. warnings allow for a non-emergency visit by a quali- When upgrading to a voice evacuation system, What benefits can retail facilities gain from up- fi ed fi re alarm technician before an emergency alarm A. there is an opportunity either to interface to Q.dating their fire protection systems? situation occurs. an existing paging system-to add coverage within the A fi re protection system upgrade can improve In addition to the advanced warning feature, sens- facility-or replace the PA system. The performance A.areas of detection, notifi cation and monitor- ing technology has drastically improved over time to benefi t of replacing the PA system is a clear: you get ing. It reduces the risk of high maintenance costs and reduce false alarms and increase speed of detection. intelligible messages being delivered over a supervised disruption in operations. Older legacy systems are Upgrading legacy duct smoke detectors, along with communication path to the fi re alarm speakers. much more prone to incidents involving poor detec- a service agreement with a qualifi ed fi re alarm com- The digital voice evacuation system offers features tion, false alarms and excessive maintenance alerts. pany, are the right steps in maintaining up-time and for background music and non-emergency paging This is especially vital for single or multi-story prop- reducing out-of-budget expenses. that may be used with approval from the local author- erties that have a large retail space and high foot traf- ity having jurisdiction. fi c. Retailers should engage fi re and security experts These features make a digital voice system an excel- to ensure the fi re alarm system has a positive impact lent alternative to a PA system in many applications, and is not an impediment to risk and crisis manage- thus decreasing the investment and cost of ownership ment plans. by combining both systems. What potential impact can older legacy systems You mentioned the monitoring of fire alarm Q.have on a retail facility’s bottom line? Q.systems can be improved with new technology. More than ever, retailers are focusing on se- How? A.curity and operating effi ciency. Unfortunately, The ability to receive and review detailed emer- the fi re alarm may not receive the attention necessary A. gency information from the fi re alarm systems to evaluate its impact on the business’s profi t and loss in all store locations is benefi cial for loss-prevention statement. Operating a legacy system for many years professionals. Information from the individual loca- is advantageous to controlling life-cycle costs; how- tions helps identify issues early and reduce the loss ever, investing in newer technology offers fi nancial side of the P&L equation. Traditional monitoring benefi ts beyond just keeping a legacy fi re protection What can a newer fire alarm notification system included communications to an off-premises moni- system active. A fi re alarm retrofi t improves areas of Q.really offer? toring station over phone lines. Historically, this has detection, notifi cation and monitoring, all providing As the need increases to communicate specifi c been done with a digital alarm communicator trans- a positive contribution to a retail operation’s P&L. A. instructions and capture the attention of build- mitter that may not easily lend itself to simultaneous Can you elaborate on the benefits of upgrading ing occupants, voice evacuation systems are used as reporting to two locations. Q.a system’s detection? part of fi re alarm notifi cation. Voice evacuation sys- A solution is an IP Communicator that can pro- One aspect of the fi re alarm system that war- tems have become more prevalent due to changing fi re vide detailed emergency information and communi- A.rants an update is duct smoke detection in alarm codes and the need to overcome our society’s cate over an existing TCP/IP line to the monitoring the heating, ventilation and air-conditioning system. desensitization to standard fi re alarm horns. Legacy station and corporate offi ce. Specifi c, timely infor- Conventional or intelligent duct smoke detectors in- systems are mainly horn-type notifi cation, which does mation regarding the status of the fi re alarm system stalled more than 10 years ago are more susceptible not allow for specifi c messages to be communicated. can be transmitted to IP receivers in both locations. to dust that commonly accumulates in an HVAC As an integral part of a fi re alarm system, a voice Moreover, the monthly cost of leasing two phone system than those on the market today. Without the evacuation system provides the functionality of com- lines-approximately $60 per month, per fi re alarm advanced warning provided by today’s technology, municating either pre-recorded or live instructions to control panel-traditionally used for fi re alarm com- this leads to an emergency condition on the fi re alarm occupants. It serves the purpose of evacuation for a munications with a central station can be eliminated. panel. Local codes may require the facility to be evac- fi re alarm while providing the capability of specifi c, Increased performance and decreased monitoring uated, therefore creating a disruption to the business. live voice messages. costs add real value when considering a fi re alarm Imagine a false alarm on an important selling day. There are advantages to using the digital voice retrofi t.

A solution is to use the latest technology in conven- evacuation system versus a standard public address tional duct smoke detectors with means of notifying system for emergency communications, including Richard Connor is a product manager at NOTIFIER.

34 0111 | SECURITY PRODUCTS

0111sec_034_IndPersp_v2.indd 34 12/17/10 11:14 AM More Features Less Money Maximum Performance Maximum Value

Hybrid-CMS

Multiple DVR or IP Camera Connection up to 128 Sites Up to 8 DW IP Camera Recording Simultaneously Watch Live View and a Playback Video on the Same Screen

Blackberry i-Phone 3G Smart Phone MAC Compatible

Advanced H.264 Pentaplex DVR Plug-n-Play Networking Automatic Network Enrollment New Scheduled Network Backup New Auto Firmware Upgrade Available Central Management Software up to 128 Devices Built-in Help Screen Simple & Free DDNS Support HDD Recording Calculator and Auto Rec. Configuration DVR Health Check E-Mail Event Notification Graphic Mapping One Touch Video Backup 4, 8, or 16 Channel Models New Network Bandwidth Control 500GB-4TB Internal Storage D1/60fps, 2CIF/120fps, 1CIF/240fps Recording Quality Auto or Manual Firmware Upgrade Available

5436 W. Crenshaw StreetÂTampa, FL 33634 / Toll Free : 866.446.3595 / FAX : 813.888.9262 / www.digital-watchdog.com Circle 14 on card

Untitled-1 1 9/10/10 10:21 AM ACCESS CONTROL THE NETWORK IS ALIVE Albert Einstein Healthcare Network fi nds seamless and secure re-badging By Eric Widlitz GETTING THE JOB DONE With his challenges outlined, Jones selected Siemens Industry Inc., a global securi- or more than 140 years, The Albert Einstein Healthcare Network has ty systems integrator, to be the technology integrator on the project. Siemens chose provided impeccable medical care to the greater Philadelphia area HID Global’s iCLASS technology readers and smart cards and HID Identity on and has earned a reputation for quality, excellence and leadership in Demand Services to securely produce the thousands of new ID badges. the healthcare fi eld. HID Global provided AEHN’s Wiegand system, so it was a natural progres- To better serve the communities of greater Philadelphia, the net- sion to upgrade the access control system and produce badges using HID Global’s Fwork split from Jefferson Health System, Philadelphia’s largest healthcare system, solutions, as Jones and his department already trusted the company’s products to pursue its own strategic direction. and services. As a result, Albert Einstein Medical Center changed its name to Albert Einstein “Siemens, HID and I put a tremendous amount of effort into planning and Healthcare Network. Senior management implemented a rebranding strategy that implementing the best solution for Albert Einstein Healthcare Network,” Jones included a new corporate identity and mission as well as a new logo. said. “The reader and badge upgrade could not have gone as well as it did without the partnership of Siemens and HID Global. Our partnership was pivotal in the LEADING THE CHARGE success of this large and complicated project.” The fi rst major challenge for AEHN security, led by Russell Jones, the network The healthcare network’s facilities have higher levels of security with iCLASS director for protective services, was replacing the employees’, doctors’, volunteers’ contactless smart cards than they would with traditional access-control tech- and other medical staff’s badges with ID cards featuring the network’s new logo. nologies. They also benefi t from a platform that not only incorporates the pay- And while developing a re-badging production strategy, Jones decided to leverage roll system but can also easily add other applications, such as single sign-on and the project to upgrade AEHN’s entire access control system as well. cashless vending. This was no small task. With four hospitals, seven campuses and approximately As the new technology was to be installed in phases, old and new card readers 50 off-site primary care physician and surgical center locations, the medical center were going to exist in the facilities at the same time. To ensure a seamless transition and its network host 1,200 beds, 6,000 employees, 1,200 staff and voluntary physi- for employees, HID Global offered dual-technology iCLASS cards that worked on cians, 10,000 visitors a day and more than 100,000 emergency room patients a year. both systems. AEHN required new readers to replace its 300 existing Wiegand swipe card At the start of the project, Jones had considered the option of producing the readers. In addition, it needed to produce 7,000 new badges securely and distrib- ID badges in-house with rented equipment and temporary staff. But in addition ute them to ID cardholders effi ciently, with minimal disruption to the normal to the cost and time that would require from his protective services team to man- fl ow of business. age and supervise the project, Jones was concerned about the possible waste due “The Protective Services Department is a lean group of people responsi- to mistakes made in badge creation. He wanted a turnkey solution to produce the ble for all aspects of security at Albert Einstein,” Jones said. “With our small cards quickly with the least amount of handholding. team, it was imperative to identify a cost-effective method to re-badge the em- Based on Siemens and HID Global’s recommendations, AEHN leveraged ployees, volunteers and other personnel that wouldn’t dominate our time for HID’s expertise by choosing to use HID Identity on Demand Services rather than weeks on end.” producing the badges in-house. Since AEHN has multiple campuses spread over a wide geographical distance, “A major concern was to get the KRONOS payroll system tied into the cards,” installation of the new readers and re-badging needed to take place in phases. Jones said. “We chose HID Global IoD because it was extremely reliable and had “We needed a solution that would work with our old Wiegand swipe card a quick turnaround time.” technology and allow us to migrate in phases to a more technologically advanced HID Global’s IoD services securely produced personalized credentials quickly, access control solution,” Jones said. effi ciently and within budget. IoD worked with AEHN every step of the way, en- Another important requirement for AEHN was to integrate its KRONOS pay- suring each card detail was perfect so that they could securely transfer sensitive roll system, which tracks time and attendance, into the new badges. Integrating information from their database. To guarantee that AEHN’s KRONOS payroll payroll into the system added a layer of complexity to the card technology that system worked accurately with these cards, IoD printed 50 cards that were then was personally important to employees and the overall healthcare system, and al- tested over two payroll cycles. The cards performed perfectly each time and proved lowed no margin for error. their compatibility with the KRONOS payroll system.

36 0111 | SECURITY PRODUCTS

0111sec_036_037_widlitz_v3.indd 36 12/17/10 11:16 AM “Allowing us to do a test run of the A side benefi t to the project is a ma- duced by Identity on Demand services, new ID cards with our payroll system jor savings in card replacements. With fewer than 100 are replaced yearly. Eric Widlitz is manag- gave us the peace of mind we are ac- the legacy Wiegand swipe technology, “HID is a gold-plated company when ing director of the Amer- customed to with HID Global and Sie- AEHN replaced approximately 1,000 it comes to access control cards and em- icas at HID Global. mens,” Jones said. employee ID cards every year due to ployee badges,” Jones said. “We wanted Once they confi rmed the payroll and wear and tear. Now with the HID to be confi dent in our investment, so we ID cards were fully integrated, AEHN Global iCLASS contactless cards, pro- went with genuine HID.”

provided a database of employees and their photos so the badges could be printed and encoded off-site at IoD’s card production facility. Within four weeks, the healthcare network had 7,000 newly branded badges incorpo- rating the new technology. “Using HID Global’s Identity on Demand services for the re-badging aspect of this project was a signifi cant benefi t because it required minimal in- volvement from me and my team, al- lowing us to focus on other high-prior- ity issues,” Jones said. As the Wiegand swipe readers were replaced in phases with iCLASS con- tactless card readers, the dual-technol- ogy cards are compatible across mul- tiple facilities. The remaining 3,000 of the 10,000 printed cards only featured contactless technology because eventu- ally all the Wiegand equipment will be replaced with the new iCLASS readers.

RESULTS AND THE FUTURE Four weeks after initiating the project with HID Global’s IoD group, AEHN had 7,000 personalized badges that an- nounced its new brand, increased se- curity with the latest technology and seamlessly integrated with its payroll system. The entire project was complet- ed on time and within budget. Since adoption of the new smart- card badges, departments have in- tegrated other functions including: select your mode of perfection single sign-on to computers, enhanc- ing the security of AEHN informa- tion throughout the organization, and cashless vending, integrating cafeteria and vending systems to work with the 10MP or 1080p payroll system. Future plans for the multi-applica- There’s only one professional Dual Mode  Dual Mode 10MP or 1080p resolution  Dual Compression H.264 video surveillance camera that delivers both  6fps @ 3648 x 2752 (10MP Mode) and MJPEG tion platform include tracking employ- 10 megapixel resolution and the ability to  30fps @ 1920 x 1080 (1080p Mode)  Day/Night Functionality ees’ mandatory vaccinations and add- switch to Full HD 1080p at 30 frames per second  Binning Mode for improved sensitivity  Image Cropping ing physicians’ credentials for visiting – the AV10005 from Arecont Vision. At 3648 x 2752 doctors in case of a disaster. Down the resolution, the AV10005 delivers 30 times more pixel density and forensic detail than standard definition analog or IP road, Einstein is hoping to integrate the cameras – all while minimizing bandwidth and storage access control cards with medical re- requirements by using H.264 compression. The AV10005 can cords and patient information as well. be your one camera solution for most of your megapixel needs by cropping to any other lesser resolution or aspect ratio. Make 1-818-937-0700 • arecontvision.com In the near future, AEHN is incor- your mode of perfection the AV10005 from Arecont Vision. porating a fi fth hospital and campus MADE IN THE USA in Montgomery, Pa., to the security network that HID Global and Siemens provided. Circle 21 on card. WWW.SECPRODONLINE.COM 37

0111sec_036_037_widlitz_v3.indd 37 12/17/10 11:16 AM PRODUCT SOLUTIONS Compiled by Cindy Horbrook, Content Development Editor ID CARDS / PRINTERS

IDentiphoto Co. device provides high-defi nition printing technolo- EK Ekcessories building access cards for other forms of identifi ca- EntryPoint gy, magnetic-strip encoding, RFID technology, du- One Hander Card Holder tion and security. It is available either embedded in al-sided printing and single- or dual-sided simul- a keyboard or through the standard wedge type taneous lamination, which applies Fargo’s housing. The plug-and-play reader comes with PolyGuard Overlaminate to one or both sides of a fl ash memory, allowing the user to quickly confi g- printed card. The unit prints images between HDP ure the output. When the reader is deployed, no fi lm and an ID card to make cards tamper-proof software is needed. RF IDeas. and resistant to abrasion. HID Global. Circle 339 on card, or visit Circle 334 on card, or visit www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. The EntryPoint RFID Solution joins the Evolis Peb- Data Management Inc. DYMO Industrial ble UHF-RFID printer with the ID Keeper card issu- Rhino 5200 ance software, providing an integrated identifi ca- Visitor Pass Registry Book tion badge and card encoding solution to track employees, students, customers, contractors, visi- The One Hander Card Holder protects personal tors or assets. The EntryPoint is the UHF-RFID an- information from unauthorized data skimming. tenna built inside the printer. It prints, reads and The holder features a design similar to a fl ip cell encodes the card in one process. UHF technology, phone. The card does not have to be removed to with its long read range, offers the ability to track be scanned. The face of the protective clear case multiple people entering/exiting a portal at a fast fl ips open to expose an ID or proximity card for rate. IDentiphoto Co. scanning. In the closed position, a protective Circle 332 on card, or visit shield prevents unauthorized scanning of the ID www.secprodonline.com/productinfo. card. The product holds up to two CAC or TWIC cards. EK Ekcessories. K-Sun Corp. Circle 337 on card, or visit www.secprodonline.com/productinfo. GREEN MACHINE/MaxiLabel Pro Version 3.0 The Visitor Pass Registry Book is a manual se- Guardian Card Holder curity tool that creates both a temporary visitor The Rhino 5200 handheld label printer features badge and a permanent, confidential visitor log Hot Key technology, which allows users to auto- in one step. When visitors sign in, they fill out matically format and size labels for the most-used their ID badge, which is a label. This automati- industrial applications, such as patch panels, elec- cally transfers the visitor’s information onto a trical panels, terminal-blocks, modules, wires, ca- duplicate record sheet underneath. Each regis- bles and fl ags. The printer also features an ergo- try book contains 400 to 500 badges. Most are nomic design and an intuitive graphic interface. ordered custom-printed with an organization’s DYMO Industrial. logo and shipped within two business days. Circle 340 on card, or visit Data Management Inc. www.secprodonline.com/productinfo. Circle 335 on card, or visit www.secprodonline.com/productinfo. The Guardian Card Holder is designed to reduce Team NiSCA the loss of important credentials while providing NiSCA PR5350 Direct Thermal TAB-Expiring protection from unauthorized skimming of per- sonal information. The card holder features an The GREEN MACHINE and MaxiLabel Pro Version Visitor Pass impact-resistant outer shell making it waterproof 3.0 Windows Labeling Software is a label printer while providing additional protection to cards. The system that enables users to design and print pro- product holds up to two smartcards and comes at- fessional pressure-sensitive labels. The robust la- tached to the company’s Sport Lanyard Plus with bel, heat-shrink tube and bar code labeling printer Soft End and safety breakaway. EK Motor Sports/ features a large, high-intensity backlit display for EK Ekcessories. use in all lighting conditions. It also has hot keys Circle 338 on card, or visit for instant selection of type styles and point sizes, www.secprodonline.com/productinfo. 12 Euro/Latin language prompts, and includes the PEELGUARD electronic tape trimmer that rounds RF IDeas label corners. K-Sun Corp. Circle 333 on card, or visit pcProx Enroll www.secprodonline.com/productinfo. HID Global The Direct Thermal TAB-Expiring Visitor Pass is de- HDP5000 signed for electronic and manual visitor manage- The NiSCA PR5350 Plastic Card Printer offers a ment systems. The pass has a tab extending from mean time between failure of 100,000 prints. The one end of the self-adhesive label. After the visitor’s printer features a small footprint, 24-bit color, information is printed (or written) onto the badge, it 256 grayscale, security lamination, encoding op- is peeled from its liner, and the tab is folded behind tions and 16 MB of memory. The product prints the badge to activate the color-changing chemistry. more than 164 cards per hour and is available Overnight, a “VOID” image appears on the badge, with options for MagStripe, IC Chip and RFID dissuading departed visitors from reusing their reading as well as security lamination with the badge without authorization. Once activated, the addition of the PR5302 laminator. Variable UV tamperproof expiring process cannot be reversed. The pcProx Enroll reader eliminates the need for printing is also available for an additional security Data Management Inc. manual entry, providing error-free identifi cation. It layer. Team NiSCA. The HDP5000 prints 113 cards per hour and fea- Circle 336 on card, or visit is compatible with more than 300 million physical Circle 341 on card, or visit tures a print speed of 32 seconds per card. The www.secprodonline.com/productinfo. access proximity cards and allows users to use www.secprodonline.com/productinfo.

38 0111 | SECURITY PRODUCTS

0111sec_038_039_PS_printers_v3.indd 38 12/17/10 11:17 AM Digital Identifi cation Evolis Inc. Ultra Electronics Borer Data Systems Ltd Solutions LLC Quantum Card Systems FUSION Smartcard Reader EDIsecure XID 8300 Magicard Prima 4

The EDIsecure XID 8300 Retransfer ID Card Printer The Magicard Prima 4 is a reverse-transfer printer features high-resolution UV printing as well as The Quantum is a modular printing and encoding that is ideal for high-demand card printing appli- contact and contactless smartcard and magnetic system for high-volume and dual-sided card per- cations. Features include built-in Ethernet and USB The FUSION Smartcard Reader is a door entry so- stripe encoding. The device prints on a variety of sonalization. The machine comes with a detach- 2.0; a wide range of add-in contact chip, contact- lution for use in networked access control applica- card materials, including long-lasting, durable able and reversible encoding unit that combines less chip and magnetic encoding options; UV print- tions. The reader has a black housing, measures non-PVC cards such as ABS, PET and polycarbon- magnetic, smart contact and contactless encod- ing security; and the availability of clear, standard 45 millimeters wide and has full card validation ate. The lockable card hopper stores up to 200 ers. The unit enables users to print and encode and various custom holographic technologies of and decision-making capabilities at the point of blank cards, and the printer has a user friendly the same side of the card without fl ipping it over. laminates. The printer is available in both single- entry, eliminating the need for a separate control front-loading system with replaceable cartridges. The system also includes a dual-sided printing and double-sided versions. Both versions work panel, wall box and main power supply at each The printer also offers simultaneous, dual-sided module that releases more than 1,000 cards per with a Prima Inline Laminator option, also available door. Firmware updates can be automatically lamination with the one-step, tool-less installation hour in monochrome and 150 cards in color (on in single- and double-sided versions. Ultra Elec- downloaded directly to the reader head over the of an ILM-DS. Digital Identifi cation Solutions LLC. one side). Evolis Inc. tronics Card Systems. LAN. Borer Data Systems Ltd. Circle 342 on card, or visit Circle 343 on card, or visit Circle 344 on card, or visit Circle 420 on card, or visit www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. www.secprodonline.com/productinfo.

NEWS: ISC West readies to run TRENDS: Identity theft is the new FEATURES: Investing in surveillance the tables in Vegas. American plague. yields benefits. New in Security Products Magazine! DealerQuarterlyVolume 1 | Issue 1 | March 2011 Brought to you by This new special section in Security Products magazine will focus on solutions for security systems integrators, installers and dealers. Serving over 28,000,* each issue will feature business solutions, sales and marketing tips, installation tips, manufacturer new product and

ENTERPRISE technology updates, dealer opportunities and hot market niches, plus SECURITY INCREASING TAKES OFF INTEROPERABILITY PROFITABLY much more. Issues are planned for March, May, October and December of 2011. INTEGRATING *Publisher’s Own Data THE CLOUD

For editorial submissions contact For advertising information contact Ralph C. Jensen, Editor-in-Chief Kevin O’Grady, Publisher Axis M-Line Network Cameras Visit Axis at www.axis.com/focus [email protected] [email protected]

www.secprodonline.com

WWW.SECPRODONLINE.COM 39

0111sec_038_039_PS_printers_v3.indd 39 12/17/10 11:17 AM 0111 NEW PRODUCTS Compiled by Cindy Horbrook, Content Development Editor

Mobile DVR max., a built-in DC iris varifocal lens, built-in SR Multichannel DVR - Juniper Edition enables customers to extend H.264 video compression LEDs, privacy zone, motion detection and an RS- Browser-based endpoint fl exibility and security, and will replace 485 (Pelco-D, CNB) interface. It is equipped with the NetScreen-Remote VPN client. The bundled 1/3-inch high-sensitivity CCD and Monalisa DSP. software suite includes data encryption, support of CNB Technology Inc. mobile connect cards and one-time password to- Circle 411 on card, or visit ken and certifi cate support through a public key www.secprodonline.com/productinfo. infrastructure. It also is equipped with an intuitive GUI. NCP engineering Inc. Circle 416 on card, or visit Day/Night Camera www.secprodonline.com/productinfo. Bilinx technology HDR DVRs The XTS-MDVR is a surveillance solution for vehi- TurnKeyCCTV’s All In One DVR Series is a 17-inch Nine supported languages cles with H.264 video compression and a stand- LCD with a built-in DVR and is available in four- alone Linux-based real-time operating system. Its and eight-channel versions. It can be accessed via rugged construction features an anti-vibration and iPhone, BlackBerry or Windows CE phone. The DVR anti-vandal system. The unit features two-way au- features up to 2 TB storage and is fully browser- dio communication, real-time video monitoring based with live, playback, backup and setup, mak- with 3G module, high-resolution recording up to 1 ing it software free. Free DNS service also is avail- TB, speed-dome control via RS-485 and GPS Bosch Security Systems’ LTC 0465 Series Dinion able. TurnKeyCCTV. tracking via 3G and GPS module. XTS Video. Day/Night camera incorporates 10-bit digital sig- Circle 414 on card, or visit Circle 409 on card, or visit nal processing and provides 540 TVL. A mechani- www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. cally switching infrared fi lter delivers improved sensitivity at night, and the internal through-the- Access Control Software Fire Alarm Monitor lens detector enhances stability in low light by DSP technology ensuring the camera remains in monochrome FIPS-201 compliant mode when IR illumination is dominant. Built-in Bilinx technology provides a bi-directional com- munication capability that allows technicians to Advanced Technology Video’s HDR DVR series is check status, change camera settings and update designed for medium to large CCTV applications fi rmware from virtually anywhere along the video requiring local and remote viewing capabilities. cable. Bosch Security Systems Inc. The units are built with real-time H.264 compres- Circle 412 on card, or visit sion technology and are available in four, eight or www.secprodonline.com/productinfo. 16 channels. The DVRs feature an intuitive graphi- cal user interface menu system with nine sup- ported languages, selectable record resolutions Monitoring Software Codebench’s PIVCheck authentication software and up to 3 TB HDD options for eight- and 16-chan- Supports Mac OS suite for HSPD-12 compliance is now integrated nel DVRs. Advanced Technology Video. with RS2 Technologies’ Access It! access control Circle 417 on card, or visit FireEar’s FE-1100 Monitor provides four-way pro- software and the company’s full line of access www.secprodonline.com/productinfo. tection from fi re, indoor freeze, power outage and control hardware. The pairing allows users to vali- temperature damage by relaying instantaneous date FIPS-201 compliant credentials in real-time alerts via e-mail, text and phone, helping prevent and to continue that validation with an ongoing, Keyless Entry System future loss when away from a residence. Applying user-defi ned schedule. Combined with the one- Touchscreen its patent-pending technology, the monitor and step badge creation tool, the integration allows alert system is equipped with wireless features to entities to register PIV, TWIC, CAC or FRAC cards work with pre-existing smoke detectors so there without providing additional data entry on each are no installation fees associated with the easy cardholder. Codebench Inc. setup and use. FireEar Corp. Circle 415 on card, or visit Circle 410 on card, or visit www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. VPN Software Camera Supports Junos DSP technology SpectorSoft’s new version of Spector 360 monitor- ing and surveillance software now supports Mac OS. The software continuously records user activ- ity on every PC, Mac, laptop and server throughout an organization, including e-mail, chat/IM, Web Arrow Lock’s Revolution Touch-screen keyless en- searches, fi les transferred, application usage and try system is impervious to water, heat and impact, network activity. By centrally monitoring all user yet offers controlled access for multiple users. The activity, businesses and schools can increase se- system reduces the need to distribute and keep curity and productivity, investigate at-risk behav- track of multiple keys and is ideal for buildings that ior, enforce policies and meet compliance require- need to limit traffi c to controlled areas. Installation CNB’s CCM-24VF intelligent IR camera offers ments. The software also provides tools to block takes about fi ve minutes with a multilingual voice DSP technology, which automatically controls the specifi c traffi c, record screen snapshots, schedule prompt guiding the user through the programming intensity of IR illumination to capture the details network access and generate keyword alerts. NCP engineering’s IPsec VPN client suite now sup- process. Up to 1,000 codes are available in ad- of objects in close range, eliminating the “wash- SpectorSoft Corp. ports Juniper Networks’ Junos operating system. vanced mode. Arrow Lock. out effect.” The camera features high-resolution Circle 413 on card, or visit Available for all current Windows platforms in ei- Circle 418 on card, or visit images of 600TVL, a visible IR range of 75-ft. www.secprodonline.com/productinfo. ther 32- or 64-bit versions, the NCP Secure Client www.secprodonline.com/productinfo.

40 0111 | SECURITY PRODUCTS

0111sec_040_055_NP_v5.indd 40 12/17/10 1:41 PM Time for a Change

The fi rst system-connected CO detectors have reached their end-of-life. Now is the time to get new product sales and recurring The only monthly revenue by upgrading your customers to the award-winning CO1224T with RealTest™ — the fi rst and only functional CO test CO detector fully compliant with NFPA 720: 2009. available with We’ve made it easy. TM To upgrade competitive detectors to the CO1224T, the CO-PLATE RealTest CO Detector Replacement Plate perfectly covers the outline of the old and bulky competitive detector. The CO1224T then mounts to the CO-PLATE in seconds for a clean, low-profi le fi nish ideal for commercial and residential applications.

Most importantly, only the CO1224T with RealTest enables you to leave the job knowing that the people your system protects are also being protected from deadly CO gas. Visit systemsensor.com/co to learn more.

Circle 42 on card

Untitled-1 1 12/17/10 8:43 AM 0111 NEW PRODUCTS

Carbon Monoxide Detection custom arm for housing exterior lamps and stan- ers and integrators reduce the likelihood of dam- Mini Input Module Online Tools dard Pelco Spectra IV PTZ cameras. ISS regularly aging cable during installation. The fl exible, ridged Three LED indicators creates custom housing solutions in the design jacketing design minimizes kinks and tearing phase of its integrated security plans. Applications braids or shielding, allowing the installer to move include custom brackets, arms, decorative hous- on to the next job more quickly. It also makes cable ings and modifi ed lighting posts that include cam- easier to strip and terminate. The jacketing with- era mounts. Integrated Security Solutions Inc./ stands the rigors of challenging installations while Sternberg Lighting. maintaining full UL specifi cations. Honeywell. Circle 347 on card, or visit Circle 350 on card, or visit www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. IP Camera Safety Station System Sensor’s free online tools and training op- Exmor CMOS image sensor Steel construction VES’ Apollo VF5608 mini input module is the SLC tions are designed to help engineers, dealers and component for the VES manual pull stations and installers stay up to date on the current state of can be used as a stand-alone input module. It carbon monoxide detector codes and legislation. features three separate LED indicators-green for To get the details of state CO laws, customers can polling status, yellow for trouble and red for acti- use the interactive map at http://www.systemsen- vation. The small form factor module protects sor.com/co/map/. Users can click on a state for terminals for mounting inside boxes and is DIN existing legislation and links to other important rail mountable, allowing as many as 49 modules information or download and print a summary of to be mounted in the company’s auxiliary enclo- state CO legislation. System Sensor. sure. VES LLC. Sony’s SNC-CH140 is a dual-stream, multi-format Circle 345 on card, or visit Circle 353 on card, or visit IP camera, ideal for CCTV surveillance. The camera www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. uses an Exmor CMOS image sensor to deliver pic- ture quality in HD resolution. The fi xed camera in- Carbon Monoxide cludes image enhancement technologies to in- Storage Cabinet crease the dynamic range and provide improved Large capacity Detector Plate picture quality in challenging lighting environ- Low-profi le fi nish ments. Sony. Circle 348 on card, or visit The Shure Safety Station stores fi rst aid kits, ban- www.secprodonline.com/productinfo. dages and supplies safely and effi ciently. An Emer- gency Eye Wash attachment is standard in case of CCTV DVR Server an eye emergency or injury. The station features Instant video retrieval heavy-duty reinforced steel construction, a stain- less steel top and chase panel, leg levelers, a mir- ror, soap and towel dispensers and a waste recep- tacle. The deluxe station includes a 36-inch-wide sink, a 24-inch storage cabinet and a 5-foot upper binder cabinet with gas spring shocks and task light. Shure Manufacturing Corp. Circle 351 on card, or visit Shure Manufacturing’s Space Saver Cabinet is de- www.secprodonline.com/productinfo. signed to maximize any storage requirement. The System Sensor’s CO-PLATE Carbon Monoxide standard unit has two cabinets with four adjust- Detector Plate is designed to cover the footprint able shelves per cabinet. Cabinets can be added to of a previously installed detector that has reached ICT’s VistaPlex EPIC 425(R5) is a CCTV DVR serv- Camera meet individual storage requirements. Features the end of its life. The plate can be mounted er. Features include instant retrieval of recorded Network zoom include a large storage capacity, leg levelers and a in seconds for a clean, low-profi le fi nish and is video from analog and IP cameras, dynamic powder-coat paint fi nish with a choice of 22 col- ideal for commercial and residential applications. frame rate allocation, up to 480 fps displayed on ors. The cabinet is shipped assembled. Shure System Sensor. a spot monitor and a record rate of up to 30 fps Manufacturing Corp. Circle 346 on card, or visit per camera. The server also has a dedicated Circle 354 on card, or visit www.secprodonline.com/productinfo. hardware RAID controller for levels 0, 1, 5, 6, 10, www.secprodonline.com/productinfo. 50; hot swappable power supply and hard drive Custom Housing Solution options; and up to 24 hard drives or storage ca- pacity per unit. ICT Inc. Video Encoder Exterior lamps Circle 349 on card, or visit Four-channel www.secprodonline.com/productinfo.

Infi nova’s V6221-G Series 2-megapixel network Cable Jacketing zoom camera features a 1/2.5-inch progressive Flexible scan CMOS sensor and a 10x optical zoom lens. Ideal for any surveillance application, the camera Sony’s SNT-EX104 four-channel video encoder en- captures small details and provides the horizontal ables the migration of analog CCTV surveillance to view of several standard defi nition cameras. The a network-based system. The encoder incorpo- cameras use both H.264 and M-JPEG compres- rates proprietary technologies, improving the ana- sion formats to meet users’ special needs and log video signal for clearer and sharper images. deliver reliable images. Resolution is as high as Additionally, the product can stream 30 fps in D1 1,920x1,080 in the H.264 format. An optional SD resolution in JPEG, MPEG-4 or H.264 and includes card storage device is available. Infi nova. DEPA advanced analytics. Sony. Integrated Security Solutions and Sternberg Light- Circle 352 on card, or visit Circle 355 on card, or visit ing have teamed up to design and manufacture a Honeywell’s WaveFLEX cable jacketing helps deal- www.secprodonline.com/productinfo. www.secprodonline.com/productinfo.

42 0111 | SECURITY PRODUCTS

0111sec_040_055_NP_v5.indd 42 12/17/10 1:41 PM Coax Tester ward IP camera networks, as well as switches that Closed IPTV Integrated tone generator offer fi ber interfaces, embedded serial server data Zero confi guration ports and SFP ports. The switches provide redun- Dedicated Micros’ Closed IPTV is designed to dancy through DT-Ring or DT-Ring+ technology. bring the simplicity and security of a traditional With an operating temperature range between -40 CCTV installation to the IP environment. A suit- and 85 degrees Celsius and a protection class rat- ably equipped DVR/NVR, such as the SD Ad- ing of IP-40, the switches feature plug-and-play vanced Closed IPTV Model coupled with DM’s design and automatic confi guration of all ports. Layer 3 Enhanced CCTV Switch, can automati- KBC Networks. cally identify the standard of HD resolution IP Circle 358 on card, or visit cameras. Combining patent-pending innovation www.secprodonline.com/productinfo. in the application layer with zero configura-

Platinum Tools’ 4Mapper Coax Tester fi nds and identifi es single or multiple coax cables connected to televisions, security cameras, splitters, monitors or routers. The tester features a one-button de- sign, line voltage warning and fl ashing low battery high-intensity LEDs, an integrated tone generator and automatic power off. It displays pass, open or short, and the tester includes four custom F re- motes, which allow the user to track up to four connections at a time from the main cable box. Platinum Tools. Circle 356 on card, or visit www.secprodonline.com/productinfo. Termination Tool Uses standard 110 blades

Platinum Tools’ JackAX 110 Termination Tool ter- minates all standard brands of jacks, including 90- and 180-degree jacks as well as single-row pairings. The tool’s design ensures 110 jacks are properly terminated, eliminating common NEXT and FEXT failures. It uses standard 110 blades and is engineered for ease of use, including ap- plications inside walls and junction boxes. The blade is securely held in place with a simple screw. Platinum Tools. Circle 357 on card, or visit www.secprodonline.com/productinfo. Ethernet Switches IP-40 rating

KBC Networks’ ES range of environmentally hard- ened, Ethernet edge switches include an unman- aged entry-level series, suitable for straightfor- Circle 29 on card. WWW.SECPRODONLINE.COM 43

0111sec_040_055_NP_v5.indd 43 12/17/10 1:41 PM 0111 NEW PRODUCTS

tion networking technology, each camera is Energy Supply able for both external use under harsh climatic assigned a specific network port. Dedicated Stand-alone conditions and for deployment underground. The Micros Inc. integrated system solution is based on a hybrid SFC Energy AG’s JENNY ND Terra is a portable Circle 359 on card, or visit concept of fuel cell, fuel cartridge and battery. Ev- plug-and-play solution for off-grid energy supplies www.secprodonline.com/productinfo. ery electrical device can be locally supplied with and is designed as a stand-alone, non-detectable, power as required through the SFC Power Man- long-term energy supply for defense and security ager. SFC Energy AG. applications. The system is weatherproof, suit- Circle 360 on card, or visit www.secprodonline.com/productinfo. Fixed-dome Cameras Pre-assembled

Pelco’s Camclosure 2 fi xed-dome camera series delivers clear images in diffi cult lighting environ- ments. The camera comes pre-assembled, ready for a quick and reliable installation in applications ranging from retail to industrial, as well as health care, corrections and education environments. The series features indoor, environmental, and vandal- resistant cameras and offers a full line of mounting options. Pelco. Circle 361 on card, or visit www.secprodonline.com/productinfo. Mobile Surveillance Application Live video

Intelligent Designs Group’s Total Control software suite now includes a surveillance application that allows users to view live video directly on a mo- bile device. The application supports Android, BlackBerry, iPhone, iTouch, iPad and Windows Mobile devices, as well as more than 500 models of single and multiple DVRs, IP cameras, NVRs and video encoders. The software features func- tions that allow users to change cameras while viewing and automatically rotate through camer- as based on a specifi c time period. Intelligent Designs Group LLC. Circle 362 on card, or visit www.secprodonline.com/productinfo.

Circle 28 on card. 44 0111 | SECURITY PRODUCTS

0111sec_040_055_NP_v5.indd 44 12/17/10 1:41 PM Dual-HF Credentials fl at panels with 75- or 100-millimeter VESA stan- Switcher/Scaler/Converter Contactless technology dards, features adjustable tilt from -5 to 15 de- 3-in-1 processing grees, uses tamper-resistant hardware and has a Liberty AV Solutions’ Intelix DIGI-SCAL-11x2 HD load capacity of 25 lbs. The distance from the wall switcher, scaler and format converter integrates to the back of the fl at panel is 1.7 inches. Video multiple analog and digital devices into a single, Mount Products. all-encompassing high-defi nition environment. Circle 365 on card, or visit The device provides switching among 11 different www.secprodonline.com/productinfo.

HID Global’s dual-HF credentials ease the transi- tion from legacy solutions to secure contactless technologies over time, across multiple facilities or within subsets of a larger cardholder base. The credentials use advanced radio frequency engi- neering to combine iCLASS with MIFARE or MI- For the Most Extreme Environments FARE DESFire EV1 technologies, or to combine MIFARE Classic with MIFARE DESFire EV1 technol- ogy. The technologies are embeddable with a con- tact chip and can be combined with HID Prox tech- nology, enabling users to combine access control on a single credential. HID Global. Circle 363 on card, or visit www.secprodonline.com/productinfo. DVR Lockbox Plexiglas window

Video Mount Products’ DVR-LB2 Lockbox en- sures electronics are not harmed or stolen with- out compromising remote control accessibility. The lockbox features a smoked Plexiglas window that allows IR signal pass-through, an interlock- ing lift-off lid, a key-locked hinging front door and black powder coat fi nish. The lockbox is vented and includes a fan for additional ventilation. Video IP 65 rated 4G V-Station Extreme™. Designed for biometric Access Control and Mount Products. Circle 364 on card, or visit –25ºC to +70ºC Time & Attendance in rain, ice, snow and desert conditions, this IP 65 www.secprodonline.com/productinfo. Full IP and PoE enabled rated solution is built to perform in the most extreme outdoor conditions. PIV & TWIC versions available Confi dently deploy a biometric device created for organizations that Flat Panel Flush Mount 500,000 template capacity cannot compromise on security regardless of the weather. Tilt capabilities

To see the 4G products in action visit www.L1ID.com/4Gvideo

L-1 enterprise access solutions protect and secure identities and assets by helping customers address demanding access control and identity authentication requirements with innovative and reliable systems.

Use a mobile device to take a picture of the QR Code and go straight to our new 4G video. (Mobile QR Reader App required)

Video Mount Products’ FP-SFTB small, fl at panel Bioscrypt is now L-1 Identity Solutions fl ush mount is ideal for use where 10- to 23-inch Contact us at 1-800-444-0496 Email: [email protected] www.L1ID.com/4Gvideo fl at panels require a low profi le yet the installation demands a tilt option. The mount accommodates

Circle 35 on card. WWW.SECPRODONLINE.COM 45

0111sec_040_055_NP_v5.indd 45 12/17/10 1:41 PM 0111 NEW PRODUCTS

AV components, scales the sources up to 720p or Emergency Lighting dual-voltage input with surge protection and In- 1,080p and converts signals to HDMI. It is outfi tted Self diagnostics telli-Charge self diagnostics, which continuously with composite video, S-video, component video, monitor critical functions. The series includes a Chloride Systems’ CMF/TMF/ZMF Series of emer- VGA and stereo audio inputs, as well as DVI, HDMI, maintenance-free, sealed lead calcium or nickel gency lighting is available in 6-, 12- or 24-volt, and optical audio inputs. Built-in audio conver- cadmium battery and can be wall, column, pole or 25-450 watt units with newly designed high- sion is based on high-quality analog-to-digital and I-beam mounted. Chloride Systems. performance MR16 lamp head assembly options. digital-to-analog converters. Liberty AV Solutions. Circle 367 on card, or visit Mounting options include the top, sides or bottom Circle 366 on card, or visit www.secprodonline.com/productinfo. of an enclosure. The lighting features a 120/277 www.secprodonline.com/productinfo. Mount Outlet Boxes Compact PVC housing

WAGO Corp.’s CPO Series DIN-rail Mount Outlet Boxes provide power to control cabinets for com- mon tools, including laptops and testing equip- ment. The series uses a UL 498 Receptacle, which is ideal for UL 508 panels. The compact PVC housing measures 60x109 millimeters and features an ABS plastic cover with a top-mount ground pin. The series offers either color-coded CAGE CLAMP Spring Pressure termination or MCS Pluggable Connectors and the series con- sists of 26 variants. Specialty confi gurations also are available. WAGO Corp. Circle 368 on card, or visit www.secprodonline.com/productinfo. PTZ Camera High-speed dome

Pelco’s Spectra HD Video PTZ high-speed dome delivers clear images via IP for live streaming to a standard Web browser, Endura, Digital Sentry or other HD video management systems. The camera features open architecture connectivity for third- party software recording solutions, allowing inte- gration into virtually any IP-based HD system. The camera incorporates the Sarix technology plat- form, delivers 960p resolution, and includes auto- tracking, 18x optical zoom, USB expansion slots and 360-degree continuous pan rotation. Pelco. Circle 369 on card, or visit www.secprodonline.com/productinfo.

Circle 30 on card. 46 0111 | SECURITY PRODUCTS

0111sec_040_055_NP_v5.indd 46 12/17/10 1:41 PM LED Modules vide a solution for upgrading from legacy reader Media Converters Long operating life technology to contactless smart card capabilities. Fiber-optic The readers support ANSI/ISO 7811 magstripe ComNet’s CWFE2SCM2 and CWFE2SCS2 are data conversion or pass-through confi guration in fi ber-optic media converters for commercial ap- combination with HID Prox and 13.56 MHz con- plications. The devices offer fi xed SC optics and tactless access control technologies, including are available in multimode and single-mode mod- iCLASS credentials. HID Global. els. The products allow 10/100TX Ethernet data Circle 372 on card, or visit to be transmitted optically over two multimode www.secprodonline.com/productinfo. GoTheDistance SECO-LARM’s two new high-intensity LED mod- ules have 19 built-in programmable fl ash patterns and are available in clear, red, blue and amber. The SL-1311-MA is a rectangular module with four WithYourCCTVVideo! high-intensity 1-watt LEDs. The SL-1302-MA is a disk module with 52 LEDs. The modules have an operating life of up to 100,000 hours of continuous use. Up to 15 units can be synchronized to fl ash simultaneously or alternately, and a non-volatile memory recalls the last fl ash pattern used at pow- er-up. SECO-LARM U.S.A. Inc. Circle 370 on card, or visit www.secprodonline.com/productinfo. Wireless Door Plunger Easy installation VideoDistributionAmplifiers BalunsForVideoOverUnshielded &Splitters TwistedPair

Ion Security Products’ wireless door plunger, de- signed for concealed door security, can be in- stalled without permanently altering the aesthetics of a door or room, as surface mount sensors do. The plunger is easily installed by drilling one hole on the hinge side of a door frame and is engi- neered to work with all current DSC and GE wire- less receivers. Ion Security Products. Circle 371 on card, or visit www.secprodonline.com/productinfo. Migration Readers Non-keypad FiberOpticDistributionEquipment

SolutionsForCCTVVideo DistributionOverCoax,TwistedPair&Fiber

Distributed By:

HID Global’s multiCLASS RM40 and RMP40 migra- www.alarmax.com tion readers are non-keypad versions of the Stocking Locations www.securitytronix.com company’s RMK40 and RMPK40 readers for Across The United States [email protected] Magstripe-to-iCLASS and Magstripe- and Prox-to- iCLASS migration, respectively. The readers pro-

Circle 12 on card. WWW.SECPRODONLINE.COM 47

0111sec_040_055_NP_v5.indd 47 12/17/10 1:41 PM   0111 NEW PRODUCTS  What’s new in or single-mode optical fi bers and are ideally suited for applications product line and features IGMP snooping and Spanning Tree. The in benign environments where temperature extremes are rarely switch is suited for applications in benign environments where tem- encountered. The converters are rated for operation from 0 to 50 perature extremes are rarely encountered. ComNet. degrees Celsius. ComNet. Circle 376 on card, or visit Circle 373 on card, or visit www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. Access Control Software LED Flashlight Webinars Improved reporting capabilities Rechargeable

Click on the Resource Center at www.secprodonline.com to view our latest archived webinars.

UÊProtecting America— Borders and Beyond Honeywell’s WIN-PAK CS 4.1 managed access control software in- Ê Sponsored by Moog QuickSet Joby’s Gorillatorch Blade is a hands-free and tactical LED fl ashlight cludes Web browser enhancements, such as remote locking and that combines light with positioning capabilities. The high-effi ciency unlocking, schedule creation and editing and improved reporting ca- UÊThe Benefits of CREE XLamp XP-C LED produces up to 130 lumens of light. The even pabilities. The new features allow the fl exibility for a complete deal- light profi le can be adjusted from spot to fl ood for detailed tasks or er-hosted remote management model or an end user solution using Smart ID/Access CardsÊ work on refl ective surfaces. The lithium-ion battery can be recharged the enhanced Web browser. The software eliminates the need for Ê Sponsored by Zebra Technologies using either the included USB cable or AC adapter. A 360-degree pan dealers to execute many of the daily requests normally received from and 180-degree tilt allow precise illumination of tough-to-reach end users. Dealers can easily assign various levels of access to dif- spaces. Joby Inc. ferent accounts and customers. Honeywell. UÊMaking It Easier and More Circle 374 on card, or visit Circle 377 on card, or visit Cost Effective to Deploy www.secprodonline.com/productinfo. www.secprodonline.com/productinfo. Megapixel Systems X-ray People Scanner Electronic Deadbolt Lock Sponsored by GVI Security Ê Non-intrusive LED illumination UÊMainstream Analytics — Preventing Theft and Vandalism Sponsored by VideoIQ, Inc.

UÊPlus More!

Schedule your webinar today Lockey Digital Systems’ E-Digital Electronic Deadbolt Lock replaces with Rick Neigher existing deadbolts and is keypad operated so no keys are necessary. The lock has an auto-locking function, improving security and conve- Online Sales Director Smiths Detection’s B-SCAN X-ray people scanning series for U.S. nience. Auto latch-bolt locking detection prevents incomplete door prisons and other security checkpoint screening applications pro- locking. The weatherproof lock features up to six user codes for ac- [email protected] vides advanced security to uncover threats and contraband con- cess and one-time user code capability. The LED illumination enables cealed in body cavities, artifi cial limbs or on a person. In a non-intru- 818-597-9029 users to operate in the dark. Users can program and change codes sive single pass, using a smaller dose than backscatter X-ray, the with the touch of a button. Lockey Digital Systems Inc. scanner provides a high-resolution, head-to-toe image of a person in Circle 378 on card, or visit less than seven seconds. Imaging enhancement tools then provide www.secprodonline.com/productinfo. the operator with information to evaluate the image for concealed objects. Smiths Detection. Circle 375 on card, or visit Wireless Ethernet Bridge www.secprodonline.com/productinfo. Camera integration Ethernet Switch Eight-port

ComNet’s CWFE8TX8MS is an Ethernet switch for commercial ap- AvaLAN Wireless Systems’ 5.8 GHz Wireless Ethernet Bridge is now plications that offers eight 10/100TX RJ-45 electrical ports and a integrated with Dotworkz’s outdoor PTZ camera housing. The AW- self-contained power supply. The switch is part of the ComWorx VL D2-5800HTP is a matched set of radios, one integrated into the PTZ

48 0111 | SECURITY PRODUCTS

0111sec_040_055_NP_v5.indd 48 12/17/10 1:41 PM camera housing, preconfi gured as a point-to-point NVR Ethernet bridge. The 5 Mbps Ethernet bridge sup- Free with camera ports IP-based megapixel surveillance cameras. The enclosure enables the use of indoor camera models in rugged outdoor system environments. AvaLAN Wireless Systems Inc. Circle 379 on card, or visit www.secprodonline.com/productinfo.

Digital Video Surveillance GeoVision’s 32-channel full featured GV-NVR V8.4 Hybrid is free when bundled with its IP cameras and video servers. The NVR is ONVIF and PSIA compliant and features smart dual-streaming technology for live viewing of multi-megapixel IP cameras. The ver- sion supports the company’s 360-degree Fisheye IP camera de-wrapping technology for multiple live views, remote monitoring and playback. The company offers more than 20 models of IP cam- eras, featuring resolutions of 1.3, 1.3 low lux, 2, 3, 5 and 10 megapixels. GeoVision Inc. Circle 382 on card, or visit www.secprodonline.com/productinfo.

TimeSight Systems’ TimeSight BASIC is an ad- Electronic Padlock vanced hybrid digital video surveillance platform CyberLock technology offering networked video recording for both analog and digital camera systems. The full-featured NVR platform is available as either software-only or pre-installed on integrated video surveillance ap- pliances. The 16-camera system can hold six months of data, and the software can be upgraded to the full Enterprise VLM system, allowing more than a year’s retention. VLM technology allows us- ers to deploy large numbers of high-resolution cameras with extended retention of the security data. TimeSight Systems. Circle 380 on card, or visit www.secprodonline.com/productinfo. Videx’s intelligent padlocks feature CyberLock technology, which provides full-featured elec- Uninterruptible Power tronic access control and feedback to manage- Supply ment when potential security issues arise. The Economical electronic padlocks are ideal for outdoor applica- tions such as securing equipment and gates in areas where controlling and tracking access is important. The CyberLock system keeps man- agement informed through automatic audit re- ports and alerts. Each time an employee’s elec- tronic key opens a padlock, a record is stored in both the lock and the key. Videx. Circle 383 on card, or visit www.secprodonline.com/productinfo. Camera System Dual-video Staco Energy Products’ FLU-10S is an economical 10kva, three-phase, online, double-conversion un- interruptible power supply that offers computer- grade power quality. The UPS features a small footprint, light weight and a standard battery run- time of more than nine minutes with optional bat- teries for extended run times. Power electronics technology provides blackout protection and pow- er conditioning. Front-end harmonic correction eliminates the need for additional fi ltering. Double- conversion technology protects the connected load from sags, swells, harmonics, noise and volt- age imbalances without switching to battery op- eration. Staco Energy Products Co. Keytroller’s SMARTEST is an easy-to-install, dual- Circle 381 on card, or visit video drive camera system that can provide im- www.secprodonline.com/productinfo. mediate video proof of what happened before and

WWW.SECPRODONLINE.COM Circle 37 on card. 49

0111sec_040_055_NP_v5.indd 49 12/17/10 1:41 PM 0111 NEW PRODUCTS

after an incident. The forward- and rearward-looking video recorder continually records digital video whenever a vehicle’s ignition is on, then overwrites the oldest video when the memory card is full. All software is preloaded to the SD card that records video, audio, GPS location, speed, direction and G-force movement from both cameras. Keytroller LLC. Circle 384 on card, or visit www.secprodonline.com/productinfo. -YVT6\Y4HU\MHJ[\YPUN3PULZ Camera [V@V\Y+PZ[YPI\[VY Panoramic You can’t buy a DKS product without More power than ever - Access Plus a DKS distributor or dealer – Ideal for homeowners, multi units, and businesses UÊ œ˜vˆ}ÕÀiÊÌ iÃiÊÃÞÃÌi“ÃÊÜˆÌ Ê -ÊÜvÌÜ>Ài° we won’t sell direct online. UÊÊ œ˜˜iVÌÊÌ ÀœÕ} ÊÌ iʈ˜ÌiÀ˜iÌ]Ê Ê­œV>ÊÀi>Ê iÌܜÀŽ®]ʓœ`i“]ʜÀÊ`ˆÀiVÌÊ̜ÊޜÕÀÊ* ° UÊÊ œ˜ÌÀœÊvÀœ“Ê>VÀœÃÃÊÌ iÊ œÕÃiʜÀÊ>VÀœÃÃÊÌ iÊVœÕ˜ÌÀÞ° Protection beyond the competition DKS does not sell direct UÊÊ -Ê«Àœ`ÕVÌÃÊ>Àiʜ˜ÞÊ܏`ÊÌ ÀœÕ} Ê`ˆÃÌÀˆLÕ̜ÀÃÊ and dealers. UÊÊ iÌܜÀŽÊœvʈ˜ÃÌ>>̈œ˜Ê>˜`ʓ>ˆ˜Ìi˜>˜ViÊ«ÀœviÃȜ˜>ÃÊ supported by DKS every step of the way. UÊÊ œ˜Ì>VÌÊÕÃÊ̜Êvˆ˜`ÊޜÕÀʏœV>ÊÕÌ œÀˆâi`Ê,i}ˆœ˜>Ê ->iÃÊ"vvˆViÊ̜Ê}iÌÊÃÌ>ÀÌi`° www.doorking.com 1-800-673-3299 ÜÜÜ°`œœÀŽˆ˜}°Vœ“É ˆÃÌÀˆLÕ̜Àà Scallop Imaging’s Digital Window A7-180 analog security camera [email protected] uses a 7-megapixel staring array to deliver non-fi sheye, panoramic video across a 180x48-degree fi eld of view. The staring array has the Circle 6 on card. resolution of 23 standard VGA cameras, and the camera’s internal imaging engine delivers a 180-degree view, plus up to three 8x opti- cal zoom detail views packaged into one NTSC frame compatible with standard CCTV analog networks. A single camera can replace multiple fi xed and PTZ cameras. Scallop Imaging. Circle 385 on card, or visit www.secprodonline.com/productinfo. Lockset Wi-Fi access control

Corbin Russwin’s Access 800 WI1 lockset with Wi-Fi access control is ideal for building areas where wiring is cost-prohibitive and chal- lenging. It is a complete solution, integrating the company’s ANSI/ BHMA Grade 1 hardware, proximity reader and door monitoring into a single device. Using an existing IEEE 802.11 b/g Wi-Fi network and HID 125 kHz-proximity credentials, the lockset features real-time alarms and local decision-making to ensure operation regardless of network status. Corbin Russwin. Circle 386 on card, or visit www.secprodonline.com/productinfo.

50 Circle 32 on card. 0111 | SECURITY PRODUCTS

0111sec_040_055_NP_v5.indd 50 12/17/10 1:41 PM Hidden Camera Digital wireless streaming

KJB Security Products’ SleuthGear All Digital NightOwl cube clock is a hidden camera that combines infrared total darkness recording and digital wireless streaming. With full-color recording during the day, the camera switches to black and white recording at night and can record up to 30 feet away. The built-in digital transmitter allows users to stream video live over the Internet and have zero wireless interference. KJB Security Products. Circle 387 on card, or visit www.secprodonline.com/productinfo. Intelligent Locks Touchscreen or pushbutton

Yale Locks & Hardware’s intelligent deadbolt and lever locks are available with either a touchscreen or pushbutton keypad. The locks operate with Control4 platform’s 2.0 user interface, which allows users to create personalized events or scenes triggered by the push of a button from anywhere in the home or remotely via the Internet. The locks feature voice-assisted programming in English, Spanish and French; personalized access-control scenes for up to 250 users; and access to all user programmable settings via Con- trol4. Yale Locks & Hardware. Circle 388 on card, or visit www.secprodonline.com/productinfo. Security Gateway Attack prevention mechanisms

The RadiSys LTE SEG is a high-performance IPsec tunneling and fi re- wall network element that enables security in the wireless infra- structure. The device features 10-15 Gbps of throughput and also provides a fi rewall with IP fi lters and attack prevention mechanisms to protect Enhanced Packet Core network elements from security threats and cyberattacks. It supports more than four million concur- rent IP fl ows with pre-defi ned and custom fi lters, consistency checks and denial-of-service prevention mechanisms in a fully redundant 2U ATCA system. RadiSys Corp. Circle 389 on card, or visit www.secprodonline.com/productinfo.

WWW.SECPRODONLINE.COM Circle 33 on card. 51

0111sec_040_055_NP_v5.indd 51 12/17/10 1:41 PM Let’s Connect Again at

March 8, 2011

Virtual Event 2010 Attendee Reactions

²5IJTXBTBHSFBUDPODFQUBOEDFSUBJOMZBUJNFTBWFS  BMMPXJOHVTUPQJDLBOEDIPPTFWFOVFTBSPVOEB   USBEJUJPOBMXPSLEBZ³

Become a Sponsor or Exhibitor Today! ²*UXBTXFMMPSHBOJ[FEBOEGSFF³ To learn more, please contact Rick Neigher, Online Sales Director ²5IFDIBUGPSVNGPSRVFTUJPOTXBTPVUTUBOEJOH³  SOFJHIFS!NFEJBDPN

²*HPUMPUTPGJOGPPOOFX UPNF WFOEPSTQMVTVQEBUFE   JOGPPOBMSFBEZLOPXOWFOEPST BMMJOPOFQMBDF³  

   Interested in presenting at an upcoming event? 1MFBTFDPOUBDU3BMQI$+FOTFO &EJUPSJO$IJFG  SKFOTFO!NFEJBDPN More details soon at secprodonline.com/virtualevent

Untitled-8 1 12/14/10 3:36 PM Situational Awareness and analog, 3-megapixel 360-degree cameras, ed virtual camera views, each of which can be Mobile Barrier featuring Grandeye technology, enable 12-bit controlled manually or by using the in-camera Easy setup System 5- and 3-megapixel color and image process- video analytics. Complete scenes can be Universal Safety Response’s Expeditionary Mobile Wireless ing along with sophisticated video analytics. viewed in panoramic or multi-view screen Barrier system features proprietary technology The cameras also feature support for electronic mode. North American Video. that reduces the risk of injury to occupants while PTZ throughout the entire 360-degree field of Circle 392 on card, or visit bringing a vehicle to a complete stop. The system view during live viewing or playback and up to www.secprodonline.com/productinfo. can be transported in a standard pick-up truck and four multiple, independent perspective-correct-

Inovonics’ Radius is a situational awareness sys- tem that combines mass notifi cation capabilities Lock the doors… with wireless positioning technology to pinpoint mobile duress alarm devices. The system monitors any of the company’s security and sensor end de- vices and interfaces to fi re, access control and environment systems, providing instant notifi ca- tion to mass communication alert devices. The complete end-to-end, IP-enabled wireless solution Keep intruders out of your: can work alone or be integrated with other safety and security systems. Inovonics Wireless Corp. Circle 390 on card, or visit » Premises www.secprodonline.com/productinfo. » Cabinets Situational Awareness » Networks Scalable architecture » Communications

Mitigate threats with Black Box’s physical and cyber security solutions. Start with keeping unauthorized people out of But don’t stop there. With cybercrime being at an sensitive areas. After all, if someone has physical all-time high, you need to look at all the open doors Raytheon’s Clear View system integrates and con- access to communications closets and IT cabinets, and open ports in your network, too. solidates data from multiple sources to deliver then you have an open door to intentional breaches or Black Box can provide you with: rapid situational awareness, and enhances threat even unintentional mishaps caused by curious fingers. assessment and decision-making for security s)RONCLADNETWORKACCESSCONTROL.!# management. The system’s scalable architecture Lock the door with Intelli-Pass™ and vulnerability management. supports all types of security applications, and its biometric access control. sensor management and data correlation tracking s3ECURE7EBGATEWAYSFORUNPARALLELEDVISIBILITY capabilities reduce false alarms. The open archi- With Intelli-Pass, you can of Internet traffic and Web policy enforcement. tecture integrates with third-party software and secure your premises, your hardware and can evolve as security requirements vital server cabinets, your s3ECURE+6-SWITCHESFORKEEPINGDATA change. Raytheon Co. Circle 391 on card, or visit intellectual property — on a secure network from “leaking” onto www.secprodonline.com/productinfo. and quite possibly even your job. unsecure ones. Intelli-Pass can also be integrated with the Cameras AlertWerks™ environmental monitoring system. Grandeye technology AlertWerks detects changes in temperature, humidity, and other conditions that, unchecked, can damage your property and valuable assets.

For details on these and other security solutions, visit blackbox.com/go/Security or call 800-637-9503.

North American Video’s Oncam IP, 5-megapixel

Circle 40 on card. WWW.SECPRODONLINE.COM 53

0111sec_040_055_NP_v5.indd 53 12/17/10 1:41 PM 0111 NEW PRODUCTS

WJ-NV200 connects and records up to 16 network seaports, pipelines, petro-chemical storage sites IP Video Door Station cameras and features a real-time face-matching and campuses can be effi ciently designed, ensur- Fisheye lens function, which matches registered images with a ing that camera blind spots, visual obstructions, face displayed on a live camera feed. A face- coverage gaps or other vulnerabilities are ad- matching alarm notifi cation can be sent by e-mail, dressed. SightLogix. Panasonic system alarm, terminal output, buzzer Circle 395 on card, or visit or indicator. The recorder uses H.264, MPEG-4 and www.secprodonline.com/productinfo. JPEG formats and can simultaneously display live images from as many as 16 cameras. Panasonic System Networks Co. of America. Online Data Protection Circle 394 on card, or visit Prevents key logging www.secprodonline.com/productinfo.

set up by two individuals in less than fi ve minutes with no tools. It can be reset and reused after an Perimeter Security impact in less than fi ve minutes, requiring mini- Design Tool mal replacement parts. The barrier can span one-, Web-based two- and three-lane roads (up to 40 feet). Univer- sal Safety Response Inc. Circle 393 on card, or visit www.secprodonline.com/productinfo. The T24 IP Video Door Station from MOBOTIX fea- tures a fi sheye lens that captures the entire en- Network Disk Recorder trance area of a home or offi ce without any blind spots. Based on the international VoIP/SIP tele- Face-matching function Europ Assistance USA’s Online Data Protection phony standard, the device connects directly with Suite is designed to protect consumers from key an IP video phone, standard PC or tablet computer, logging and phishing attacks. The tools work SightLogix’s Web-based perimeter security design allowing two-way video connection from any- alongside desktop antivirus and security suites- tool enables users to model a video intrusion de- where in the world. RFID-driven keyless access combating new malware that conventional solu- tection system using Google Maps’ depiction of and integrated voice messaging round out the tions often fail to detect. The online suite pre- the actual site. The tool uses an intuitive interface product’s features. The device is based on the vents malware from taking pictures of data and to convert security requirements into camera loca- company’s decentralized IP network video surveil- stealing it; stops users from being lured to a fake Panasonic System Networks Co. of America’s tions, ensuring that an entire perimeter is protect- lance concept. MOBOTIX. (phishing) site that steals data; and displays a i-PRO SmartHD Network Disk Recorder model ed. Large, open areas around airports, rail yards, Circle 398 on card, or visit monthly report showing what data has been pro- www.secprodonline.com/productinfo. tected. Europ Assistance USA. Circle 396 on card, or visit www.secprodonline.com/productinfo. Communication Module Building automation protocol Lock Aperio technology

USB Wiegand 232 Wiegand

• Barcode Sargent Manufacturing’s Profi le Series v.N2 lock • Proximity features ASSA ABLOY’s Aperio technology, which FieldServer Technologies’ SlotServer Communica- • Magstripe provides a simple way to connect additional open- tion Module is a building automation protocol con- ings to an existing electronic access control sys- version module for the Allen Bradley ControlLogix with wiegand output tem. The product uses IEEE standards-based local PLC. The module enables ControlLogix to interface other interfaces available wireless communication to connect to an online with devices and networks using building automa- access control system while eliminating the wiring tion protocols or fi re alarm control panels. It uses at the door. The lock combines integrated reader, protocol drivers from the company’s library of BAS International Bar Code, Inc. monitoring and radio with ANSI/BHMA Grade 1 and fi re panel drivers. ProSoft Technology, a manu- 160 Oak St., Glastonbury, CT 06033 U.S.A. hardware and is available in 10 Line Bored Lock, facturer of third-party data modules for Allen Brad- (860) 659-9660 • Fax (860) 657-3860 8200 Series Mortise Lock and 80 Series Exit De- ley PLCs, is the exclusive provider of the SlotServ- email: [email protected] vice confi gurations. Sargent Manufacturing. er. FieldServer Technologies/ProSoft Technology. Circle 397 on card, or visit Circle 399 on card, or visit Visit our Web site: http://interbar.com www.secprodonline.com/productinfo. www.secprodonline.com/productinfo.

Circle 10 on card. 54 0111 | SECURITY PRODUCTS

0111sec_040_055_NP_v5.indd 54 12/17/10 1:41 PM Circle 43 on card

Untitled-4 1 12/17/10 11:44 AM CLASSIFIEDADS

For more information on classifi ed advertising call Stan Pruitt at 972-687-6738

Circle 81 on card.

Kevin O'Grady Group Publisher (818) 814-5380 [email protected]

EUROPE

CHINA

HAWAII ALASKA CANADA TAIWAN

UNITED STATES & CANADA INTERNATIONAL Randy Easton, Rick Neigher, Jane Dai, Northeast Regional Sales Manager Online Advertising Director International Sales Manager Northeast U.S., Eastern, Central Canada, (818) 597-9029 China AK, AZ, CO, HI, IA, ID, KS, MO, MT, ND, NE, [email protected] New Buddy Limited China NV, NM, OR, SD, UT, WA, WY +86-755-26289889 (678) 401-5543 Stan Pruitt, [email protected] [email protected] Account Specialist [email protected] (972) 687-6738 Brian Rendine, [email protected] Peter Kao, District Sales Manager International Sales Manager AR, LA, OK, TX, Midwest, Southeast Taiwan (972) 687-6761 Idea Media [email protected] +886-2-2949-6412 [email protected] Benjamin Skidmore, District Sales Manager Sam Baird, CA, Alberta, BC, Manitoba, Saskatchewan International Sales Manager (972) 587-9064 Europe [email protected] Whitehill Media Ltd. +44 1883 715 697 [email protected]

Reprints: For single article reprints List Rentals: This publication’s Media Kits: Download the current media kit at (in minimum quantities of 250-500), subscriber list, as well as other www.secprodonline.com/pages/adv/media-kit e-prints, plaques and posters contact: lists from 1105 Media Inc., is available PARS International, for rental. For more information, Phone (212) 221-9595, please contact our list manager, [email protected], Merit Direct. Phone: (914) 368-1000; www.magreprints.com/QuickQuote.asp [email protected]; www.meritdirect.com/1105

56 0111 | SECURITY PRODUCTS

0111sec_056_classified_v1.indd 56 12/17/10 11:25 AM FREE PRODUCT INFO AD INDEX Quick, Easy and Direct...get the info you need NOW! Search by category or by company • Go online to secprodonline.com/productinfo to request free information from advertisers in this issue.

Circle Company Name Page Circle Company Name Page Circle Company Name Page Circle Company Name Page

ADVERTISERS 4...... Ultra Electronics/Magicard ...... 9 Top Picks 378...... Lockey Digital Systems Inc...... 48

5...... UTC Fire & Security (Interlogix)...... 11 398...... MOBOTIX ...... 54 21...... Arecont Vision ...... 37 313...... Black Box Corp...... 12 Education Security 312...... BriefCam ...... 12 416...... NCP engineering Inc...... 40 11...... Avigilon ...... 16 Special Section 303...... Network Video Technologies ...... 1 3...... Axis Communications ...... 2 315...... EverFocus Electronics Corp...... 12 ...... Avigilon ...... S14 392...... North American Video ...... 53 35...... Bioscrypt/L-1 ID ...... 45 314...... Geutebruck ...... 12 ...... Basler Inc...... S4 307...... OnSSI ...... 1 40...... Black Box Corp...... 53 317...... Honeywell ...... 12 ...... Community Professional Loudspeakers ..S3 394...... Panasonic System Networks Co...... 54 39...... CCTV Outlet ...... 5 310...... IQinVision ...... 12 ...... DVTel ...... S13 361...... Pelco ...... 44 20...... CNB TECHNOLOGY ...... 25 311...... Jolly Technologies ...... 12 ...... Ingersoll Rand...... S2 369...... Pelco ...... 46 14...... Digital Watchdog...... 35 316...... NUVICO ...... 12 ...... Open Options Inc...... S5 356...... Platinum Tools ...... 43 6...... Door King ...... 50 New Products ...... Panasonic Systems Solutions...... S7 357...... Platinum Tools ...... 43 34...... DSX Access Systems ...... 60 417...... Advanced Technology Video ...... 40 ...... Talk-A-Phone ...... S16 389...... RadiSys Corp...... 51 9...... Easy Lobby ...... 26 418...... Arrow Lock ...... 40 ...... Video Insight ...... S9 391...... Raytheon Co...... 53 22...... Garett Metal Detectors ...... 6 301...... American Dynamics ...... 1 ...... Videx ...... S15 397...... Sargent Manufacturing ...... 54 ...... GovSec ...... 30-31 379...... AvaLAN Wireless Systems Inc...... 48 ...... Zebra Technologies ...... S10 385...... Scallop Imaging ...... 50 19...... GVI Security ...... 18-19 412...... Bosch Security Systems Inc...... 40 ...... Zebra Technologies ...... S11 302...... Schlage ...... 1 ...... HID Global ...... 59 367...... Chloride Systems ...... 46 EDITORIAL 370...... SECO-LARM USA Inc...... 47 24...... ICC ...... 27 411...... CNB Technology Inc...... 40 360...... SFC Energy AG...... 44 8...... IC Realtime Security Solutions ...... 7 Product Solutions: 415...... Codebench Inc...... 40 Biometrics 351...... Shure Manufacturing Corp...... 42 33...... Infi nova ...... 51 373...... ComNet ...... 47 354...... Shure Manufacturing Corp...... 42 10...... International Bar Code ...... 54 326...... Black Box Corp...... 29 376...... ComNet ...... 48 395...... SightLogix ...... 54 28...... KJB Security Products ...... 44 324...... Cogent Inc...... 29 386...... Corbin Russwin ...... 50 375...... Smiths Detection ...... 48 37...... LILIN Americas...... 49 323...... Datastrip Inc...... 28 359...... Dedicated Micros Inc...... 43 348...... Sony ...... 42 13...... Moog Inc...... 3 322...... e-DATA ...... 28 396...... Europ Assistance USA ...... 54 355...... Sony ...... 42 37...... Music Supply Inc...... 56 321...... Fast Access Security Corp...... 28 399...... FieldServer Technologies ...... 54 413...... SpectorSoft Corp...... 40 ...... Network Centric Security ...... 33 320...... Kent Security Services ...... 28 410...... FireEar Corp...... 40 381...... Staco Energy Products Co...... 49 1...... Nisca ...... 29 325...... Napco Security Technologies ...... 29 382...... GeoVision Inc...... 49 345...... System Sensor ...... 42 12...... North American Cable ...... 47 Product Solutions: 363...... HID Global ...... 45 ID Cards/Printers 346...... System Sensor ...... 42 26...... Panasonic Systems Solutions...... 21 372...... HID Global ...... 47 380...... TimeSight Systems ...... 49 27...... Safety Technology ...... 23 420...... Borer Data Systems Ltd...... 39 350...... Honeywell ...... 42 414...... TurnKeyCCTV ...... 40 43...... Salient System...... 55 335...... Data Management Inc...... 38 377...... Honeywell ...... 48 393...... Universal Safety Response Inc...... 53 7...... Secura-Key ...... 22 336...... Data Management Inc...... 38 349...... ICT Inc...... 42 353...... VES LLC ...... 42 ...... Security Products ...... 39 342...... Digital Identifi cation Solutions LLC ...... 39 352...... Infi nova ...... 42 305...... Video Insight ...... 1 ...... Security Products ...... 48 340...... DYMO Industrial ...... 38 390...... Inovonics Wireless Corp...... 53 364...... Video Mount Products ...... 45 ...... Security Products ...... 52 337...... EK Ekcessories ...... 38 347...... Integrated Security Solutions Inc ...... 42 365...... Video Mount Products ...... 45 32...... Sensavideo ...... 50 338...... EK Ekcessories ...... 38 362...... Intelligent Designs Group LLC ...... 44 383...... Videx ...... 49 17...... Speco Technologies ...... 13 343...... Evolis Inc...... 39 371...... Ion Security Products ...... 47 304...... Visionhitech Americas Inc...... 1 42...... System Sensor ...... 41 334...... HID Global ...... 38 374...... Joby Inc...... 48 368...... WAGO Corp...... 46 30...... Tokina Industrial ...... 46 332...... IDentiphoto Co...... 38 358...... KBC Networks ...... 43 409...... XTS Video ...... 40 29...... TOPNOS ...... 43 333...... K-Sun Corp...... 38 384...... Keytroller LLC ...... 49 388...... Yale Locks & Hardware ...... 51 18...... Videofi ed ...... 17 339...... RF Ideas ...... 38 387...... KJB Security Products ...... 51

31...... Videx ...... 28 341...... Team NiSCA ...... 38 366...... Liberty AV Solutions ...... 45

25...... Visionhitech ...... 20 344...... Ultra Electronics Card Systems ...... 39 306...... Lilin Americas ...... 1

WWW.SECPRODONLINE.COM 57

0111sec_057_Adindex_v3.indd 57 12/17/10 3:08 PM INDUSTRYEXCHANGE by Ronnie Rittenberry Once Bitten, 91 Percent Shy Most U.S. adults would not return to a business where their personal information was stolen

s retailers and those in the ser- • 70 percent would switch airline carriers ment-shredding service to its customers Cloudy with a Chance vices sectors know, customer “Secure document management so- who already were receiving the com- Cintas’s latest venture, though, is en- Aloyalty has its limits. One of lutions are essential to protecting pri- pany’s uniform deliveries and other ser- trenched in cloud technology through those limits—apparently for just about vate business, employee and customer vices. With its large fl eet of trucks rou- an emerging service it calls DVX, or everybody—is the mismanagement of information,” says Jamie Samide, di- tinely making stops at clients’ premises, Digital Vault Exchange, an offering personal data security. rector of marketing for emerging busi- Cintas found it could effi ciently fi ll that Samide describes as “almost like put- According to a recent telephone sur- nesses at Cintas, a Cincinnati-based niche, doing the shredding that compa- ting a seatbelt on in a car. You hope vey conducted by Harris Interactive on company best known for its nationwide nies either were not doing well or did you don’t get into an accident, but behalf of Cintas Corp., 91 percent of work uniform programs. “By partner- not want to do at all. when you do, you’re glad you were U.S. adults would not return to a busi- ing with a document management pro- Then, seven years ago, Cintas added wearing your seatbelt. That’s sort of ness if their personal information was vider, companies can implement a cus- document storage to its list of offerings, what this is.” stolen. From hotels to hospitals, the re- tomized, secure solution that will help physically and securely housing fi les The service enables businesses to search provides insight into what types ensure all information continuously businesses did not want shredded. Two schedule the saving of their data at reg- of businesses consumers would most remains safe and confi dential.” years later, the company added the fi - ular intervals—every 30 minutes, every likely stop patronizing if their confi den- day or every 48 hours—on Cintas serv- tial information such as Social Security ers in the cloud. number or credit card number were “God forbid something happens to compromised. your building—whether it’s a fl ood or “Data breaches not only impact earthquake or somebody pulling the customers, but can potentially cost plug out at the wrong time—but if it businesses millions of dollars and take did and you had had that foresight, a signifi cant toll on public trust,” says you’re going to go back to work the Gail Cunningham, spokesperson for next day and still have access to your the National Foundation for Credit fi les,” Samide says. Counseling. “This research confi rms that poor document management prac- Job: Security tices can signifi cantly damage a busi- As Cintas continues to expand its ser- ness’s reputation and discourage once- vices in the document management loyal customers from ever returning. market, the company has an increas- It could also discourage potential cus- ingly vested interest in educating its tomers from ever entering.” customers about the importance of The survey, conducted Sept. 23-26, data protection, which Samide says had 2010, among 1,013 adults ages 18 and Shred of Evidence nal piece of its document-management everything to do with commissioning older, reveals the percentage of the According to the 2010 Identity Fraud triad when it began offering document the telephone survey. population who would take their busi- Survey Report released by Javelin Strat- imaging—a process involving scanning “We really are striving to be the ness elsewhere, according to particular egy and Research, more than 11 million and uploading of documents into a most secure company in the busi- industries. Hotels, retail stores and res- people became victims of identity theft Cintas-created system that keeps them ness,” he says. “Part of the rationale taurants top the list of establishments in 2009 alone, and that number has until needed. behind the survey was to highlight to patrons would most likely avoid. Find- since grown. “Shredding of confi den- Samide says Cintas’s evolution con- our customers all the things that could ings include: tial documents is more important than tinues to involve the security and pro- happen to them if their customers’ • 77 percent would not return to a ho- ever right now,” Samide says. tection of confi dential information. In information got stolen—to have them tel at which they’ve stayed He notes that identity theft can and addition to destroying physical docu- think a little differently about the con- • 76 percent would not return to a re- does happen any number of ways— ments, it now offers hard-drive destruc- sequences. tail store at which they’ve shopped whether from someone hacking into a tion as a service—still a form of shred- “At the end of the day, we want to • 76 percent would not return to a res- system, diving into a dumpster, or steal- ding, but on a much more hardcore view ourselves as a company that our taurant at which they’ve dined ing a computer—but he adds that “one level. “If you think about it, computers, customers trust to do these things for • 74 percent would change banks of the easiest ways to protect against smartphones, scanners, printers, copi- them, to help them become more effi - • 74 percent would switch insurance it is destroying physical paper, because ers—all these devices can have hard cient with their data and more secure companies that still is the highest form of theft.” drives that retain records. So when the with their information.” • 74 percent would go to a different Cintas got into the business of pre- time comes for it, we’ll destroy those, drug store or pharmacy venting such theft only about a decade and we’re just getting into that busi- Ronnie Rittenberry is Print Managing • 73 percent would get a new lawyer ago, when it started offering a docu- ness,” he says. Editor of Security Products.

58 0111 | SECURITY PRODUCTS

0111sec_058_IndEx_v4.indd 58 12/17/10 11:18 AM Printing as easy as 1,2,3.

A breakthrough in easy-to-use, powerful and secure card personalization

The range of FARGO® FARGO® DTC pprinters are ideal for your customers who need a flexible and simple way to color personalize and encode technology cards, while protecting their investment with field-upgradable options whenever their needs ex- pand. Backed by a two year warranty from HID Global, the world leader in secure identity solutions.

To learn how HID can help with your card personalization needs, visithidglobal.com/fargo-dtc-SP

Untitled-1 1 12/14/10 9:15 AM Project1 12/4/09 9:52 AM Page 1

Circle 34 on card