Skip to content
Menu
menu

ASIS 2012 Seminar Showcase

PANIC LOCK

Detex

Circle #1214

Detex Corporation of New Braunfels, Texas, has introduced a maximum-security, multipoint lock with three-bolt construction. The ECL-230X-TDB is designed with a larger deadbolt that goes deeper into the frame than other locks in the category. Connecting rods are solid steel. Life safety- and code-compliant, the lock serves as both panic hardware and a maximum-strength locking device. It includes a photoluminescent sign, 100-decibel alarm, and three locking points per door; a model with six locking points and 10,000 pounds of holding force is also available. 

THERMAL CAMERA

DRS Technologies

Circle #1215

DRS Technologies of Parsippany, New Jersey, has expanded its line of WatchMaster IP thermal imaging cameras with the WatchMaster IP Ultra. This ONVIF-conformant networked camera combines the company’s uncooled 320x240 VOx technology with pan-and-tilt capability for exceptional coverage in challenging lighting and environmental conditions. The power-saving unit can be configured and installed easily into existing security infrastructure. It is available with a choice of three fixed-focus lenses. It also features a continuous 360-degree pan range and the ability to move up and down by 120 degrees.

SECURITY SOFTWARE

Software House/Tyco

Circle #1218

C•CURE 9000 from Software House of Westford, Massachusetts, lets users control access to secure areas and manageemergencies with the area muster and de-muster feature. Users can tighten access control between restricted and hazardous areas using the cross-cluster anti-passback and area lockout capabilities. If a breach occurs, security personnel can respond quickly to alarms from any location in the facility. The software integrates with other security applications, such as fire, intercom, and real-time locations systems.

ACCESS CONTROL PLATFORM

HID Global

Circle #1221

HID Global of Irvine, California, has released its next generation of EDGE EVO and VertX EVO controller platform, which is open and scalable for deployment of a wide range of access control functionality, including remote management, real-time monitoring, report generation, and a custom rules engine that allows the use of system hardware for complimentary applications. The platform’s scalability enables a comprehensive range of future access control functions that are interoperable with wireless locks, such as keypad door commands and large-scale anti-passback.

GUARD SERVICES

AlliedBarton

Circle #1217

AlliedBarton Security Services of Conshohocken, Pennsylvania, provides highly-trained, responsive security personnel tomany industries and approximately 200 Fortune 500 companies nationwide. Local, client-focused security officers and managers are supported by national resources developed from more than 50 years of security experience. The company’s focus on leadership and human capital management fosters a culture of quality and continuous customer satisfaction.

RECEIVER

Altronix

Circle #1216

Implementing IP cameras and devices over analog infrastructure is easy using the eBridge 16CR IP Over Coax Receiver from Altronix of Brooklyn, New York. Legacy cabling systems can be easily upgraded to provide the benefits of IP technology without the expense of installing new cabling. The unit allows fast 10/100Base-T Ethernet digital communication over coaxial cable for more than 2,000 feet without repeaters. The 1U rack-mount receiver offer 16 channels and is designed to work with eBridge 1CT transceivers and hybrid cameras with Intersil’s SLOC technology.

SECURITY SOLUTIONS

Diebold

Circle #1219

Diebold, Incorporated, of Canton, Ohio, offers physical, electronic, and enterprise security systems, as well as managed services solutions that integrate security, software, and service. Solutions include intrusion detection and surveillance, barrier security solutions, and ATM security, as well as fire and life safety, monitoring, and logical security services. The company believes that being BOLD makes a difference in leadership and helps organizations address their most complex security needs.

SECURITY INSURANCE

Brownyard Group

Circle #1220

The Brownyard Group of Bay Shore, New York, provides insurance and risk management for the security industry. Brownyard features a preferred “admitted” market for security firms, complete coverage, and in-house claim services. The Brownyard Educational Center offers training and education for security professionals, including premium reduction through risk management credits.

MOBILE APP

Genetec

Circle #1224

The new Security Center Mobile App from Genetec of Montreal, Quebec, Canada, delivers real-time monitoring and emergency information to a user’s Apple iPhone, Apple iPad, BlackBerry, or Android device. Security personnel can monitor and control video, access control, and license plate recognition systems. The app offers up to six video feeds on an Apple iPad and the ability to save video snapshots into a photo library. The application is simple to deploy and maintain. Circle 1224.

ACCESS CONTROL

RedCloud

Circle #1214

RedCloud Enterprise is a Web-based access control solution that enables organizations of all sizes to secure their facilities, people, and assets across multiple offices, buildings or locations from any Web browser. Made by RedCloud, Inc., of Sterling, Virginia, the network appliance leverages an open architecture and integrates identity management and video surveillance to achieve scalability with low cost of ownership. It supports hardware from leading manufacturers, allowing organizations to leverage investments in hardware and retrofit industry-standard door hardware and readers. Circle 1225.

CRIME SCENE METAL DETECTOR

Garrett Metal Detectors

Circle #1214

New from Garrett Metal Detectors of Garland, Texas, is the CSI Pro metal detector. The crime-scene detector is designed for recovering ferrous, nonferrous, and stainless steel metallic crime scene evidence such as bullets, shell casings, weapons, and metallic arson evidence. Waterproof to 10 feet in fresh and saltwater environments, the detector offers multiple features to help identify and separate desired targets from trash targets. It includes headphones, a soft case, and a Garrett CSI Pro-Pointer, a hand-held pinpointer for recovering small metallic evidence. Circle 1222.

PERIMETER LIGHTING

CAST Lighting

Circle #1214

Long perimeter fences are especially vulnerable in darkness, and the CAST LED Perimeter Light can reduce this vulnerability and enhance security. Made by CAST Lighting, LLC, of Hawthorne, New Jersey, the durable, energy-efficient luminaire mounts on chain-link fence posts and delivers targeted illumination along extensive perimeters. The easy-to-install light was named “The Most Innovative Product of the Year” at LightFair International 2012. Circle 1226.

INFRARED CAMERA

Samsung Techwin America

Circle #1223

The SNO-1080R is a weatherproof infrared network camera from Samsung Techwin America of Ridgefield, New Jersey. It provides 30 frames per second in VGA resolution and dual H.264 and M-JPEG video streams. The WiseNetS DSP chipset delivers advanced features such as face detection, noise reduction, and super dynamic range. It includes a 2.3 – 7.9 millimeter varifocal lens, 15 infrared LEDs, power over Ethernet, and wall, ceiling, or surface mounting options.

INCIDENT MANAGEMENT

G4S

Circle #1227

RISK 360 from G4S Secure Solutions (USA) Inc. of Jupiter, Florida, is an incident and case management solution that helps expose and mitigate risk. Featuring powerful tools to manage and investigate incidents, it is accessible via the Internet and adapts to each environment. The mobile application is a smartphone app that gives security officers the ability to report events as they occur, providing management with the data needed to make informed decisions.

VISITOR MANAGEMENT

EasyLobby/HID Global

Circle #1228

EasyLobby of Needham, Massachusetts, an HID Global business, automates the entire process of registering a visitor and printing a badge. Users capture detailed visitor information in seconds without typing. They can create watch lists for unwanted visitors. Other options include Web-based preregistration, access control integration, and iPad or kiosk visitor self-registration. The affordable software is feature-rich, customizable, and easy to use and install.

Trace Detection

Rapiscan

Circle #1230

Rapiscan Systems of Hawthorne, California, has launched the HE50 hand-held explosives detector. The unit puts trace-level explosive-detection sensitivity in a lightweight, hand-held device for high-throughput security situations. It uses noncontact inhalation sampling to detect minute explosive residues without damaging the interrogated surface. The unit offers fast, reliable, and accurate identification of explosives. The intuitive design and user interface makes it easy to use, and it requires no calibration.

ONLINE ACCESS CONTROL

Kaba Access Control

Circle #1231

Kaba Access Control of Winston-Salem, North Carolina, has introduced the E-Plex Enterprise System with Wireless Option to provide the benefits of a wired, online access control system with the flexibility of standalone locks. Features include centralized access control management of both wireless and standalone locks, emergency global lockdown and remote unlock, broad credential support, and real-time events and alarms. It offers fast data transfer, long battery life, and mesh redundancy.

BEHAVIOR RECOGNITION

BRS Labs

Circle #1232

AISight, created by Houston-based BRS Labs, is a behavioral recognition solution for video surveillance. The software learns and memorizes both behavioral patterns and objects in diverse environments. It analyzes visual data by combining behavioral analytics and machine learning. When observed behavior falls outside what is normal for an environment, alerts are generated. The system reports unusual and suspicious behaviors without requiring human intervention.

PERIMETER SECURITY

Concentric Security

Circle #1233

Concentric Security of Sykesville, Maryland, provides a single point of contact for assessments, consulting, construction, maintenance, and training for turnkey security solutions that are unique to a project’s needs. Services support an existing facility or assist in new facility design. Construction includes installation of equipment and controls, upgrades and retrofits, and integration of multiple systems. The company specializes in perimeter security solutions for homeland security and force protection applications that meet the federal guidelines and standards.

INFORMATION SECURITY

Research Electronics International

Circle #1229

Research Electronics International (REI) of Algood, Tennessee, provides equipment and technology to protect against the loss of intangible assets and intellectual property. The OSCOR Blue Spectrum Analyzer detects unknown, illegal, and disruptive rogue transmissions across a wide frequency spectrum. The TALAN Telephone and Line Analyzer inspects, analyzes, and tests digital telephone lines and other wiring for taps and other eavesdropping devices. The ORION Non-Linear Junction Evaluator detects hidden electronic devices. The company’s Center for Technical Security offers technical surveillance countermeasures training.

VIDEO SYSTEM

Axis Communications

Circle #1234

The AXIS Camera Companion from Axis Communications of Chelmsford, Massachusetts, is a complete video surveillance solution for small systems with up to 16 cameras. It consists of cameras, SD cards, software for PC and mobile devices, and network equipment. Video is recorded to the SD card inside the camera, so there’s no need for a separate recording device or computer during operation. It offers HDTV image quality, live viewing from anywhere, and an easy-to-use interface. Circle 1234.

WIRELESS LOCK

Onity

Circle #1235

The Onity Wireless Lock (OWL) from Onity of Duluth, Georgia, offers decision making at the lock. Because it employs standalone power and an intelligent on-board internal database, the system can accommodate up to 5,000 cardholders. It continues to operate, granting or denying access, even when power and network connectivity are lost. Building the controller technology into the lock creates a smart, inexpensive solution to door wiring and network infrastructure. The network and door architecture is economical and reliable.

SECURE CREDENTIALS

Digital Identification Solutions

Circle #1237

Digital Identification Solutions of Stuttgart, Germany, is a worldwide provider of secure credential solutions with sales, marketing, and support centers in Europe, Asia, the Middle East, and the Americas. In North America, reliable modular EDIsecure ID card printers offer unique security features. Advanced Web-based IDExpert SmartACT software helps create and manage secure identity credentials and access cards. Other products include a desktop laser engraving module and passport and visa printing solutions.

PERIMETER PROTECTION

Ameristar Fence Products

Circle #1236

The Stalwart IS (Impasse Secure) integrates design elements of a high-security fence with an antiram barrier. Made by Ameristar Fence Products of Tulsa, Oklahoma, the barrier has multiple antiram ratings to suit any project. Made of high-tensile steel and pregalvanized inside and out, it offers superior corrosion protection. Its framework is a raceway for wiring, conduits, and security cabling required around a perimeter. Each component is crafted to discourage scaling and cutting of the barrier for a high level of delay and a visual deterrent.

WIRELESS LOCKS

ASSA ABLOY

Circle #1238

Aperio wireless lock technology from ASSA ABLOY of Stockholm, Sweden, can be used in most lock applications, including SARGENT IN100 and PR100 commercial and institutional locks, Adams Rite A100 locks for aluminum and glass storefront doors, Medeco M100 eCylinders, and HES K100 cabinet locks. The wireless platform allows users to expand access control using existing platforms. It uses short-distance wireless communication between the lock and an Aperio hub. The system uses AES 128-bit wireless encryption and supports HID 125 kHz proximity and 13.56 MHz iCLASS credentials.

ACCESS CONTROL SOFTWARE

DSX

Circle #1239

DSX-AES256 software from Dallas-based DSX Access Systems, Inc., contains government approved AES-256 bit encryption technology that can be implemented systemwide. Communications to each location can be encrypted with a unique key for that location’s field controllers. The software encrypts communications to all panels in that location without using add-on devices. Because encryption technology is inherent in the software and controllers, implementation is easy. All 1040 Series and 1022 controllers can be flash-upgraded to the AES-256 bit version.

FACE SEARCH

iView Systems

Circle #1240

The iGWatch IP Identify face search solution offers an automated subject database search and instantly narrows down possible matches from thousands to one or more individuals in seconds. The system, from iView Systems of Oakville, Ontario, Canada, uses integrated quality and lighting measures to ensure maximum accuracy of potential matches. With full integration into the iTrak Incident Reporting and Risk Management Platform, the complete identification and reporting platform provides incident reporting, investigation management, and risk analysis.

INTEGRATED SECURITY

Kantech/Tyco

Circle #1241

Intevo from Kantech of Brossard, Quebec, Canada, is an easy-to-deploy integrated security platform that is simple to configure and includes a customized dashboard for easy system management. It is preloaded with the company’s EntraPass Corporate Edition security management software and IP video software from American Dynamics. Intevo also supports DSC PowerSeries and MAXSYS alarm panel integration, as well as EntraPass Web client and Go Mobile client.

EMERGENCY PHONES

arrow_upward