ASIS 2012 Seminar Showcase
PANIC LOCK
Detex
Circle #1214
Detex Corporation of New Braunfels, Texas, has introduced a maximum-security, multipoint lock with three-bolt construction. The ECL-230X-TDB is designed with a larger deadbolt that goes deeper into the frame than other locks in the category. Connecting rods are solid steel. Life safety- and code-compliant, the lock serves as both panic hardware and a maximum-strength locking device. It includes a photoluminescent sign, 100-decibel alarm, and three locking points per door; a model with six locking points and 10,000 pounds of holding force is also available.
THERMAL CAMERA
DRS Technologies
Circle #1215
DRS Technologies of Parsippany, New Jersey, has expanded its line of WatchMaster IP thermal imaging cameras with the WatchMaster IP Ultra. This ONVIF-conformant networked camera combines the company’s uncooled 320x240 VOx technology with pan-and-tilt capability for exceptional coverage in challenging lighting and environmental conditions. The power-saving unit can be configured and installed easily into existing security infrastructure. It is available with a choice of three fixed-focus lenses. It also features a continuous 360-degree pan range and the ability to move up and down by 120 degrees.
SECURITY SOFTWARE
Software House/Tyco
Circle #1218
C•CURE 9000 from Software House of Westford, Massachusetts, lets users control access to secure areas and manageemergencies with the area muster and de-muster feature. Users can tighten access control between restricted and hazardous areas using the cross-cluster anti-passback and area lockout capabilities. If a breach occurs, security personnel can respond quickly to alarms from any location in the facility. The software integrates with other security applications, such as fire, intercom, and real-time locations systems.
ACCESS CONTROL PLATFORM
HID Global
Circle #1221
HID Global of Irvine, California, has released its next generation of EDGE EVO and VertX EVO controller platform, which is open and scalable for deployment of a wide range of access control functionality, including remote management, real-time monitoring, report generation, and a custom rules engine that allows the use of system hardware for complimentary applications. The platform’s scalability enables a comprehensive range of future access control functions that are interoperable with wireless locks, such as keypad door commands and large-scale anti-passback.
GUARD SERVICES
AlliedBarton
Circle #1217
AlliedBarton Security Services of Conshohocken, Pennsylvania, provides highly-trained, responsive security personnel tomany industries and approximately 200 Fortune 500 companies nationwide. Local, client-focused security officers and managers are supported by national resources developed from more than 50 years of security experience. The company’s focus on leadership and human capital management fosters a culture of quality and continuous customer satisfaction.
RECEIVER
Altronix
Circle #1216
Implementing IP cameras and devices over analog infrastructure is easy using the eBridge 16CR IP Over Coax Receiver from Altronix of Brooklyn, New York. Legacy cabling systems can be easily upgraded to provide the benefits of IP technology without the expense of installing new cabling. The unit allows fast 10/100Base-T Ethernet digital communication over coaxial cable for more than 2,000 feet without repeaters. The 1U rack-mount receiver offer 16 channels and is designed to work with eBridge 1CT transceivers and hybrid cameras with Intersil’s SLOC technology.
SECURITY SOLUTIONS
Diebold
Circle #1219
Diebold, Incorporated, of Canton, Ohio, offers physical, electronic, and enterprise security systems, as well as managed services solutions that integrate security, software, and service. Solutions include intrusion detection and surveillance, barrier security solutions, and ATM security, as well as fire and life safety, monitoring, and logical security services. The company believes that being BOLD makes a difference in leadership and helps organizations address their most complex security needs.
SECURITY INSURANCE
Brownyard Group
Circle #1220
The Brownyard Group of Bay Shore, New York, provides insurance and risk management for the security industry. Brownyard features a preferred “admitted” market for security firms, complete coverage, and in-house claim services. The Brownyard Educational Center offers training and education for security professionals, including premium reduction through risk management credits.
MOBILE APP
Genetec
Circle #1224
The new Security Center Mobile App from Genetec of Montreal, Quebec, Canada, delivers real-time monitoring and emergency information to a user’s Apple iPhone, Apple iPad, BlackBerry, or Android device. Security personnel can monitor and control video, access control, and license plate recognition systems. The app offers up to six video feeds on an Apple iPad and the ability to save video snapshots into a photo library. The application is simple to deploy and maintain. Circle 1224.
ACCESS CONTROL
RedCloud
Circle #1214
RedCloud Enterprise is a Web-based access control solution that enables organizations of all sizes to secure their facilities, people, and assets across multiple offices, buildings or locations from any Web browser. Made by RedCloud, Inc., of Sterling, Virginia, the network appliance leverages an open architecture and integrates identity management and video surveillance to achieve scalability with low cost of ownership. It supports hardware from leading manufacturers, allowing organizations to leverage investments in hardware and retrofit industry-standard door hardware and readers. Circle 1225.
CRIME SCENE METAL DETECTOR
Garrett Metal Detectors
Circle #1214
New from Garrett Metal Detectors of Garland, Texas, is the CSI Pro metal detector. The crime-scene detector is designed for recovering ferrous, nonferrous, and stainless steel metallic crime scene evidence such as bullets, shell casings, weapons, and metallic arson evidence. Waterproof to 10 feet in fresh and saltwater environments, the detector offers multiple features to help identify and separate desired targets from trash targets. It includes headphones, a soft case, and a Garrett CSI Pro-Pointer, a hand-held pinpointer for recovering small metallic evidence. Circle 1222.
PERIMETER LIGHTING
CAST Lighting
Circle #1214
Long perimeter fences are especially vulnerable in darkness, and the CAST LED Perimeter Light can reduce this vulnerability and enhance security. Made by CAST Lighting, LLC, of Hawthorne, New Jersey, the durable, energy-efficient luminaire mounts on chain-link fence posts and delivers targeted illumination along extensive perimeters. The easy-to-install light was named “The Most Innovative Product of the Year” at LightFair International 2012. Circle 1226.
INFRARED CAMERA
Samsung Techwin America
Circle #1223
The SNO-1080R is a weatherproof infrared network camera from Samsung Techwin America of Ridgefield, New Jersey. It provides 30 frames per second in VGA resolution and dual H.264 and M-JPEG video streams. The WiseNetS DSP chipset delivers advanced features such as face detection, noise reduction, and super dynamic range. It includes a 2.3 – 7.9 millimeter varifocal lens, 15 infrared LEDs, power over Ethernet, and wall, ceiling, or surface mounting options.
INCIDENT MANAGEMENT
G4S
Circle #1227
RISK 360 from G4S Secure Solutions (USA) Inc. of Jupiter, Florida, is an incident and case management solution that helps expose and mitigate risk. Featuring powerful tools to manage and investigate incidents, it is accessible via the Internet and adapts to each environment. The mobile application is a smartphone app that gives security officers the ability to report events as they occur, providing management with the data needed to make informed decisions.
VISITOR MANAGEMENT
EasyLobby/HID Global
Circle #1228
EasyLobby of Needham, Massachusetts, an HID Global business, automates the entire process of registering a visitor and printing a badge. Users capture detailed visitor information in seconds without typing. They can create watch lists for unwanted visitors. Other options include Web-based preregistration, access control integration, and iPad or kiosk visitor self-registration. The affordable software is feature-rich, customizable, and easy to use and install.
Trace Detection
Rapiscan
Circle #1230
Rapiscan Systems of Hawthorne, California, has launched the HE50 hand-held explosives detector. The unit puts trace-level explosive-detection sensitivity in a lightweight, hand-held device for high-throughput security situations. It uses noncontact inhalation sampling to detect minute explosive residues without damaging the interrogated surface. The unit offers fast, reliable, and accurate identification of explosives. The intuitive design and user interface makes it easy to use, and it requires no calibration.
ONLINE ACCESS CONTROL
Kaba Access Control
Circle #1231
Kaba Access Control of Winston-Salem, North Carolina, has introduced the E-Plex Enterprise System with Wireless Option to provide the benefits of a wired, online access control system with the flexibility of standalone locks. Features include centralized access control management of both wireless and standalone locks, emergency global lockdown and remote unlock, broad credential support, and real-time events and alarms. It offers fast data transfer, long battery life, and mesh redundancy.
BEHAVIOR RECOGNITION
BRS Labs
Circle #1232
AISight, created by Houston-based BRS Labs, is a behavioral recognition solution for video surveillance. The software learns and memorizes both behavioral patterns and objects in diverse environments. It analyzes visual data by combining behavioral analytics and machine learning. When observed behavior falls outside what is normal for an environment, alerts are generated. The system reports unusual and suspicious behaviors without requiring human intervention.
PERIMETER SECURITY
Concentric Security
Circle #1233
Concentric Security of Sykesville, Maryland, provides a single point of contact for assessments, consulting, construction, maintenance, and training for turnkey security solutions that are unique to a project’s needs. Services support an existing facility or assist in new facility design. Construction includes installation of equipment and controls, upgrades and retrofits, and integration of multiple systems. The company specializes in perimeter security solutions for homeland security and force protection applications that meet the federal guidelines and standards.
INFORMATION SECURITY
Research Electronics International
Circle #1229
Research Electronics International (REI) of Algood, Tennessee, provides equipment and technology to protect against the loss of intangible assets and intellectual property. The OSCOR Blue Spectrum Analyzer detects unknown, illegal, and disruptive rogue transmissions across a wide frequency spectrum. The TALAN Telephone and Line Analyzer inspects, analyzes, and tests digital telephone lines and other wiring for taps and other eavesdropping devices. The ORION Non-Linear Junction Evaluator detects hidden electronic devices. The company’s Center for Technical Security offers technical surveillance countermeasures training.
VIDEO SYSTEM
Axis Communications
Circle #1234
The AXIS Camera Companion from Axis Communications of Chelmsford, Massachusetts, is a complete video surveillance solution for small systems with up to 16 cameras. It consists of cameras, SD cards, software for PC and mobile devices, and network equipment. Video is recorded to the SD card inside the camera, so there’s no need for a separate recording device or computer during operation. It offers HDTV image quality, live viewing from anywhere, and an easy-to-use interface. Circle 1234.
WIRELESS LOCK
Onity
Circle #1235
The Onity Wireless Lock (OWL) from Onity of Duluth, Georgia, offers decision making at the lock. Because it employs standalone power and an intelligent on-board internal database, the system can accommodate up to 5,000 cardholders. It continues to operate, granting or denying access, even when power and network connectivity are lost. Building the controller technology into the lock creates a smart, inexpensive solution to door wiring and network infrastructure. The network and door architecture is economical and reliable.
SECURE CREDENTIALS
Digital Identification Solutions
Circle #1237
Digital Identification Solutions of Stuttgart, Germany, is a worldwide provider of secure credential solutions with sales, marketing, and support centers in Europe, Asia, the Middle East, and the Americas. In North America, reliable modular EDIsecure ID card printers offer unique security features. Advanced Web-based IDExpert SmartACT software helps create and manage secure identity credentials and access cards. Other products include a desktop laser engraving module and passport and visa printing solutions.
PERIMETER PROTECTION
Ameristar Fence Products
Circle #1236
The Stalwart IS (Impasse Secure) integrates design elements of a high-security fence with an antiram barrier. Made by Ameristar Fence Products of Tulsa, Oklahoma, the barrier has multiple antiram ratings to suit any project. Made of high-tensile steel and pregalvanized inside and out, it offers superior corrosion protection. Its framework is a raceway for wiring, conduits, and security cabling required around a perimeter. Each component is crafted to discourage scaling and cutting of the barrier for a high level of delay and a visual deterrent.
WIRELESS LOCKS
ASSA ABLOY
Circle #1238
Aperio wireless lock technology from ASSA ABLOY of Stockholm, Sweden, can be used in most lock applications, including SARGENT IN100 and PR100 commercial and institutional locks, Adams Rite A100 locks for aluminum and glass storefront doors, Medeco M100 eCylinders, and HES K100 cabinet locks. The wireless platform allows users to expand access control using existing platforms. It uses short-distance wireless communication between the lock and an Aperio hub. The system uses AES 128-bit wireless encryption and supports HID 125 kHz proximity and 13.56 MHz iCLASS credentials.
ACCESS CONTROL SOFTWARE
DSX
Circle #1239
DSX-AES256 software from Dallas-based DSX Access Systems, Inc., contains government approved AES-256 bit encryption technology that can be implemented systemwide. Communications to each location can be encrypted with a unique key for that location’s field controllers. The software encrypts communications to all panels in that location without using add-on devices. Because encryption technology is inherent in the software and controllers, implementation is easy. All 1040 Series and 1022 controllers can be flash-upgraded to the AES-256 bit version.
FACE SEARCH
iView Systems
Circle #1240
The iGWatch IP Identify face search solution offers an automated subject database search and instantly narrows down possible matches from thousands to one or more individuals in seconds. The system, from iView Systems of Oakville, Ontario, Canada, uses integrated quality and lighting measures to ensure maximum accuracy of potential matches. With full integration into the iTrak Incident Reporting and Risk Management Platform, the complete identification and reporting platform provides incident reporting, investigation management, and risk analysis.
INTEGRATED SECURITY
Kantech/Tyco
Circle #1241
Intevo from Kantech of Brossard, Quebec, Canada, is an easy-to-deploy integrated security platform that is simple to configure and includes a customized dashboard for easy system management. It is preloaded with the company’s EntraPass Corporate Edition security management software and IP video software from American Dynamics. Intevo also supports DSC PowerSeries and MAXSYS alarm panel integration, as well as EntraPass Web client and Go Mobile client.
EMERGENCY PHONES