ENHANCE YOUR SECURITY!

153
ENHANCE YOUR SECURITY! FEATURING Workshops: May 13, 2013 Conference & Expo: May 14-15, 2013 Walter E. Washington Convention Center Washington, DC GovSecInfo.com FREE Expo Pass Includes: Free Agency Briefings Learn how you can benefit from DOJ, FEMA, DHS & more! Free Live Demos K-9 Explosive Detection Team and Police Cyclist Techniques. Free Featured Presentations Homeland Security Grants, Security Clearance Workshop & more! Free Certification Sessions CISSP Prep, BCP, CHPP & CHPA & more! Free Keynotes & Special Presentations Hear from General Stan McChrystal, Lt. Colonel Dave Grossman and Joe Theismann! Exhibit Hall Access Featuring hundreds of cutting-edge products, services and solutions showcased by leading security companies. *There is a $50 expo fee for contractors/suppliers. REGISTER FOR THE FREE EXPO TODAY! USE CODE: PAG09 PRODUCED BY GovSec is the only event that brings together everything you need to be READY when it counts. GovSecInfo.com Want More Education? Register for GovSec’s 2-day conference with 45+ advanced level sessions. Early bird prices end April 5! www.security-today.com Integrated New Product and Technology Solutions for Security Professionals March 2013 Vol. 17, No. 3

Transcript of ENHANCE YOUR SECURITY!

ENHANCE YOUR SECURITY!

FEATURINGWorkshops: May 13, 2013Conference & Expo: May 14-15, 2013Walter E. Washington Convention Center

Washington, DC GovSecInfo.comFREE Expo Pass Includes:

Free Agency Briefings Learn how you can benefit from DOJ, FEMA, DHS

& more!

Free Live Demos K-9 Explosive Detection Team and Police Cyclist

Techniques.

Free Featured Presentations Homeland Security Grants, Security Clearance

Workshop & more!

Free Certification Sessions CISSP Prep, BCP, CHPP & CHPA & more!

Free Keynotes & Special Presentations Hear from General Stan McChrystal, Lt. Colonel

Dave Grossman and Joe Theismann!

Exhibit Hall AccessFeaturing hundreds of cutting-edge products,

services and solutions showcased by leading

security companies.

*There is a $50 expo fee for contractors/suppliers.

REGISTER

FOR THE

FREE EXPO

TODAY!

USE CODE: PAG09

PRODUCED BY

GovSec is the only event that brings together everything you need to be READY when it counts.

GovSecInfo.com

Want More Education?Register for GovSec’s 2-day conference with 45+ advanced level sessions. Early bird prices end April 5!

www.security-today.com

Integrated New Product and Technology Solutions for Security Professionals March 2013 Vol. 17, No. 3

Untitled-2 1 2/7/13 10:19 AM

www.security-today.com

Integrated New Product and Technology Solutions for Security Professionals March 2013 Vol. 17, No. 3

HD Network PTZ CamerasHigh-defi nition videoLG’s new HD network PTZ camera features 28x optical zoom and delivers 720p high defi nition video at 30 fps. This high-performance camera offers H.264 high

profi le and MJPEG dual codec compression, as well as region of interest streaming with up to seven different streaming profi les. The LNP2810T is loaded with features

including auto tracking, wide dynamic range, and 2-D and 3-D DNR. The network PTZ is vandal-resistant, has an IP66 weather rated housing, and is ONVIF compliant. LG Electronics.Go to sp.hotims.com and enter 310 for product information.

The Simplicity of True Plug and PlayWith 1080p real-time recordingEasily make the transition from analog to IP with the Ganz PixelMaster embedded NVRs. PixelMaster provides 1080p real-time recording with triplex operation and effi cient H.264 compression. Simply Plug and Play PixeIPro IP cameras with no confi guration required. All professional surveillance functions are embedded in this stand-alone NVR without any extra software required. Compact 4- and 8-channel models available with up to 4TB HDD. And, the PixelMaster PRO 8- and 16-channel models are coming soon. The PixelMaster Series is ready to go—right out of the box. There’s no better time than now to go HD. CBC America.Go to sp.hotims.com and enter 311 for product information.

Extend Your ReachFull-feature video surveillanceAmerican Dynamics is pleased to help you extend your security reach with VideoEdge Go. VideoEdge Go is a full-featured video surveillance app for mobile devices for VideoEdge NVR. The app is compatible with all iOS devices, including the iPhone, iPad, and iPod Touch. Quickly and

easily investigate live and recorded video on the go, and much more. Your security information can be accessed anytime and anywhere using VideoEdge Go, which also provides the ability to save snapshots and video clips to a library on the device. American Dynamics.Go to sp.hotims.com and enter 312 for product information.

2 Megapixel Speed DomeBest of both worldsBy combining a 20x optical zoom lens with a 2 megapixel Sony WDR sensor, the D-Link DCS-6915 offers unprecedented video quality. The camera supports full HD resolution at 30 fps, endless 360 degree panning and preset speeds up to 400°/second, making the DCS-6915 a top-of-the-line speed dome IP camera. Applications include city surveillance, transportation, homeland security and campus monitoring. With an IP66 rating, minus 40 degrees F operation and ONVIF compliance, this is the ultimate IP camera. D-Link.Go to sp.hotims.com and enter 313 for product information.

Mobile Access ControlAids in emergency evacuations Telaeris XPressEntry extends any physical access control system to use mobile de-vices for verifi cation and emergency evacuations. The latest version of XPressEntry is now certifi ed with Lenel’s OnGuard 6.5, using its DataConduIT technology. XPressEntry authenticates users using OnGuard’s access privileges, reading existing Prox, iClass, Mifare or PIV badges on the mobile devices. Handheld decisions are made locally and activity is uploaded when a data connection is available. All badge activity can be viewed directly from OnGuard’s management tools. Additionally, XPressEntry keeps live track of OnGuard area occupancy for managing events and improving employee safety during emergency evacuations. TELAERIS Inc.Go to sp.hotims.com and enter 314 for product information.

Cloud-hosted VMSRemote server-level upgradesDIGIOP’s powerful VMS platform features a cloud-hosted administra-tion portal that enables easy remote confi guration and management of users and permissions across single or multi-site installations. Cli-ent and server level updates can be pushed remotely across multiple

locations, without rolling trucks. Settings stored on a cloud-hosted server provide failover protection and enterprise consistency. The scalable DIGIOP ELEMENT VMS software allows you to expand your video and data management capabilities as business needs grow. DIGIOP, Inc.Go to sp.hotims.com and enter 315 for product information.

High Performance Hybrid RecorderDesigned for maximum reliabilityPowerProtect is the new high performance Hybrid Video Recorder platform from Salient Systems. The PowerProtect HVR line is de-signed for maximum reliability; 24/7 operation takes advantage of CompleteView’s native 64-bit architecture. Superior power for high performance video processing demands, the PowerProtect platform combines optimized memory, IO and CPU performance for improved video processing. The Power-Protect recorders are hybrid-capable and can simultaneously manage IP, HD, Megapixel and up to 32 directly-connected analog cameras without a third-party. Salient Systems.Go to sp.hotims.com and enter 316 for product information.

VISIT DSX ACCESS SYSTEMSISC-West BOOTH 19079

www.axxonnext .com

0313sec_c1_v3.indd 1 2/14/13 4:14 PM

What are your customers looking for?Help them see it — even in low light.

Image quality is always important, but the benefits

are really determined by how your customers will

use the images. We make their and your job easier,

by focusing on image usability first. Help your

customers utilize our joint competence and our

comprehensive range of image features such as HDTV,

Wide Dynamic Range and Lightfinder.

As the world leader in network video, we help you

ensure that your customers always get video they

can use – no matter what the conditions are.

Get the Axis picture. Stay one step ahead. Visit www.axis.com/imageusability

Axis´s award-winning Lightfinder technology enables color, detailed video even

in very poor lighting conditions.

All images are conceptual. For product information and actual footage from Axis cameras, visit www.axis.com

Read more with your

smartphone

Visit Axis at ISC West:www.axis.com/iscwest

Booth #14057

April 10-12

Las Vegas

Go to http://sp.hotims.com and enter 11 for product information.

Untitled-4 1 2/5/13 11:15 AM

XProtect® Smart Client

Easily manage security installations • Respond to alarms• Advanced export options

Connect instantly from any computer• Works with OS X®, Linux and Windows®

• Share or export video

Keeping you close to what’s important• For Android™ and iOS®

• Push live video from device’s camera

Milestone XProtect® is the world’s leading IP video surveillance management software and is reliable, future proof and easy to use. It supports the widest choice in cameras and seamlessly integrates with business and security solutions such as video analytics. Which means your possibilities are unlimited and you can keep your security

Smart Client, XProtect Mobile and the new XProtect Web Client. Designed by Milestone, XProtect clients work with all XProtect video management software. With the ability to access video from various locations as well as computers and mobile devices, there is an XProtect client to suit all your needs.

www.milestonesys.com

XProtect® Web Client

XProtect® Mobile

Milestone Systems U.S.

See us at ISC West, Booth #20053

Go to http://sp.hotims.com and enter 35 for product information

Untitled-6 1 2/4/13 2:39 PM

4 0 3 1 3 | S E C U R I T Y P R O D U C T S

www.security-today.com CONTENTS MARCH 2013

Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offi ces. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualifi ed subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.

© Copyright 2013 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission.Mail requests to “Permissions Editor,” c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254

The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the reader’s sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

FEATURES

Transportation Security 14All AboardOne of the world’s busiest train stations is fully protectedBy Peter Ebersold

Transportation Security 16IP LiftoffAirports seeing major shift of IP video surveil-lance; three trends that are piloting the changeBy E. Anthony Incorvati

Access Control 42Automate Your Access ControlIt all comes down to managing effi ciently and effectivelyBy Ajay Jain

Remote Monitoring 46Technology AdvancementAdministrator has capability to monitor, analyze and troubleshootBy Joseph Goudlock

Best-of-Breed 55Promoting the PartnershipsUsing the best security equipment availableBy Ralph C. Jensen

Building Security 60Streamline Traffi c FlowLarge building chooses security systems and elevator controls that work togetherBy Kim Rahfaldt

Security Innovation 66Customers are Our Experts for InnovationPeople fi nd new ways to integrate software with other solutionsBy Christian Bohn

IP Video Surveillance 74Security System AdvantagesInternet links everything from commerce to courtingBy Chuck Westfall

Alternate Power Supplies 78Fully PoweredPoE boosts effi ciency while cutting costsBy Ronnie Pennington

Video Surveillance 80Prospecting the HD MarketIP camera-based system is leading the industryBy G.S. Hong

Access Control 82Upgrading Your Entrance LanesTaking a layered approach to security in your buildingBy Mike McGovern

Emerging Technologies 84Smart Thermal CamerasPrices are falling, capabilities increase with technologyBy John Romanowich

Biometrics 106Gaining IntelligenceAs biometrics authentication technology proliferates, it leaves fi ngerprints on many sectors of societyBy Milind Borkar

SPECIAL SECTIONS

Network-Centric Security S1 -S20

Dealer Strategies DS1-DS24

PRODUCT SOLUTIONS

ISC West Product Preview 23

Access Control 50

DVRs/NVRs 68

DEPARTMENTS

Industry Focus 8I’m Glad You Are HereBy Ralph C. Jensen

Industry Vertical 10Restoring a Lagoon By Ian Johnston

Top Picks – March 2013 12

New Products 86

Advertisers’ Index 104

0313sec_004b_TOC_v3.indd 4 2/15/13 2:31 PM

Untitled-6 1 12/13/12 1:36 PM

See us at ISC West, Booth #27089 • Go to http://sp.hotims.com and enter 18 for product information

6 0 3 1 3 | S E C U R I T Y P R O D U C T SGo to sp.hotims.com and enter 23 for product information.

A Little Spring in Our StepAround this time of year, I think we’re all beginning to recover from the wintery weather conditions and are ready for spring. I also think that’s the reason why March is one of our largest issues, and our entire team has worked hard to achieve a

great read for this month. There are many different articles with a vast array of topics for anyone to enjoy. Since I’m fairly new to the industry, joining Security Products in October of last year, I fi nd every article enjoyable and educational. I have a feeling that trend will continue for years to come.

I will be responsible for the eTOC from now on, so you’ll get to read a little more from me each month. I’ll try to keep things entertaining. I’ve also been awarded with the task of fi nding online contributors for our new “Online Exclusive” section on our website. I have listed two of our most recent exclusives, and I hope you’ll enjoy reading them.

If you’d like to be an online contributor or have any questions about our website or products, please feel free to contact me at [email protected] or 972-687-6784. I’m more than happy to discuss upcom-ing topics, events or suggestions from our readers.

Best Regards,

Lindsay Page

Online Exclusives

Calculating the Relative Performance of a PIDS SystemBy Alec Owen

This article offers one method to calculate a sys-tems comparative performance taking this relation-ship and trade-off between detection and nuisance alarms into account. Although we are only covering perimeter intrusion detection systems in this article, these same techniques could potentially be applied to other detection areas and technologies such as Ground Based Radar, Microwave, VMD, etc.

Wrightstyle and Fire Safety in Olympic and Major StadiumsBy Lee Coates

It’s been called “codifying by catastrophe”—how fi re and other safety regulations have often resulted in tragedy. In stadium design, the most awful example

remains the UK’s worst football disaster, which claimed the lives of 96 Liverpool fans in 1989. The Hillsborough disaster, back in the news again amid evidence of offi cial cover-up, is testament to how poor crowd management and police control can so easily turn tragic. The subsequent Taylor Report led to radical change, and the much safer stadiums we see today.

http://security-today.com/01131

Recent Headlines

How Video Verified Alarms and Priority Response Works

Dallas ISD Proposed Security Upgrades After Sandy Hook Incident

Community Makes a First Choice in the Northwest

http://security-today.com/news

Upcoming Webinars

960H Technology – the New Analog!960H is the new analog technology that allows cameras and DVRs to capture up to 700TVL, the highest TVL available to date.

Retrofi t Design Options: Lowering Risk and Cost When Migrating from Analog to IPWe will review the three main design options, detail their advantages, disadvantages, their cost differences and the many potential caveats of the design, prod-uct selection and implementation of an IP solution.

View these Webinars any time at http://security-today.com/webinars.

REACTION Blog

Members of our staff and guest bloggers take advantage of REACTION to add their own per-spectives on a broad range of security topics and issues. If you’d like to contribute to our, feel free to contact Associate Content Editor, Ginger Hill at [email protected].

Online Communities

Follow us on Twitter: www.twitter.com/SecProds

Become a fan on Facebook:http://www.facebook.com/secprodonline

0313sec_006_eTOC_v3.indd 6 2/15/13 2:34 PM

Go to http://sp.hotims.com and enter 48 for product information.

Untitled-3 1 2/11/13 10:59 AM

INDUSTRYFOCUS by Ralph C. Jensen, Editor-in-Chief

8

www.security-today.com

Volume 17, No. 3

EDITORIAL STAFF

Editor-in-Chief/Associate Publisher Ralph C. Jensen

Web Manager Scott Newhouse

E-news Editor Brent Dirks

Print Managing Editor Rebecca Overton

Content Development Team Cindy Horbrook

Jessica Acklen

Lindsay Page

ART STAFF

Art Director Dale Chinn

PRODUCTION STAFF

Director, Print Production Jenny Hernandez-Asandas

Production Coordinator Teresa Antonio

EDITORIAL ADVISORY BOARD

Frank Defi na, Samsung Techwin America, Ridgefi eld Park, N.J.

William Crews, CPP, CHS I, INVISTA, Houston

Charles Chamberlain, Missouri Lottery, Jefferson City, Mo.

Kimberly Kuhn, Tyco, Lexington, Mass.

Merlin Guilbeau, Electronic Security Association, Irving, Texas

Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston

SALES

Randy Easton 678-401-5543

Brian Rendine 972-687-6761

Benjamin Skidmore 972-587-9064

Sam Baird +44 1883 715 697

Jane Dai +86-755-26289889

Peter Kao +886-2-2949-6412

SECURITY, SAFETY AND ENVIRONMENTAL PROTECTION GROUP

President & Group Publisher Kevin O’Grady

Group Circulation Director Margaret Perry

Online Sales Director Rick Neigher

Marketing Manager Susan May

President & Chief Executive Offi cer Neal Vitale

Senior Vice President & Chief Financial Offi cer Richard Vitale

Executive Vice President Michael J. Valenti

Vice President, Finance & Administration Christopher M. Coates

Vice President, Erik A. LindgrenInformation Technology & Application Development

Vice President, Event Operations David F. Myers

Chairman of the Board Jeffrey S. Klein

REACHING THE STAFF

Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.

E-mail: To e-mail any member of the staff, please use thefollowing form: [email protected]

Dallas Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254

Corporate Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. PT)Telephone (818) 814-5200; Fax (818) 734-15229201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

I’m Glad You Are HereOur March issue of Security Products is the

traditional ISC West tradeshow magazine. Even with the event the fi rst week of April,

we gear our work in March for this gathering. Thank you for taking time from your busy schedules to at-tend this important security industry event, to show your products and technologies. Thank you, too, for relying on Security Products magazine as your infor-mation engine.

Las Vegas LifeI’ve said it before, but I like this tradeshow as much as any that we attend. The crowd in Las Vegas is ready to get down to business, yet, still full of life. It is Las Vegas, of course.

Typically, our editorial team books time at various booths to explore and examine all types of security products. I try to make it to as many vendors as pos-sible to see what is new, and what might be “one-of-a-kind.” I can’t tell you how many one-of-a-kind prod-ucts I’ve seen over the years.

What I like is the enthusiasm that ISC West brings.My staff and I make a lot of appointments, and

we provide a daily update through electronic newslet-ters, which we send out twice daily. One focuses on the network side of security; the other looks at the gritty physical security applications.

Also a tradition, for me, at least, is a dinner before the tradeshow kicks off. I’m not sure how I became so fortunate, but Alan Forman, president and founder of Altronix, hosts a dinner for a few friends and most of the media.

Doing the Right ThingsAltronix does a lot of things right. For instance, they manufacture low-voltage electronics and power solu-tions. Best of all, their products are manufactured in the United States. There is something to be said for that. Founded in 1983, they are based in Brooklyn and are proud supporters of The Gift of Life, Inc. and Mission 500.

In addition to producing a wide range of compo-nents, Altronix offers OEM design and manufactur-ing services to create custom electronics for commer-cial and industrial applications.

Another reason I enjoy ISC West is because our sales representative from the United Kingdom, Sam Baird, joins us. Sam is a one-of-a-kind rep, and if you’d like to meet him, just call or email me, and we will drop by your booth.

A World of Different ColoursOur guy from the U.K. is actually Irish, and tells a lot of jokes that I don’t understand. Sam and I have traveled together, attending IFSEC on a number of occasions, and late last year we attended ESSEN in Germany. It is nice to have him on our soil to see how

the security industry works in the colonies.Of course, we are all attending because it is ISC

West. As usual, there are more than 1,000 exhibitors with products only the mind can imagine. Event or-ganizers offer three days of intense education, includ-ing new tracks of education in near-fi eld communi-cations, mobile access control, intelligent video and physical identity risk management. Numerous educa-tional courses will be available to attendees, including courses that are ranked as introductory, intermediate and advanced. Many of these courses may be used for continuing education credit.

Best of all, ISC West offers continuous networking and events. When you are tired of all the fun during the day, you can enjoy the Las Vegas nightlife.

Three days at ISC West is non-stop work. I love it. I hope to visit with people I’ve never met before. Look at their solutions and become acquainted with prod-ucts from start-up companies and meet people who spend their lives thinking about the future of security.

Inside this IssueFive times a year we are proud to print our Dealer

Strategies section in the magazine. The editorial sub-missions are exclusive to the dealer and integrator. We’re pleased to be recognized as a leader in editorial coverage for this vertical market in the industry.

Our cover story is written by staff member Lindsay Page. New to our industry, Lindsay got her fi rst look at a command center in Dallas. THRIVE Intelligence offers a lineup of services new to monitoring, but not to the security industry. The company offers turnkey solutions for integrators and end users. I think you’ll enjoy what CEO Dean Wilson has to say about sur-veillance services.

We also feature an article by Marek Robinson from Honeywell, who writes about three advancements that make connected homes more of a reality. In the past, mostly high-end homes were outfi tted with such controls. If anything good came from the recent reces-sion, less-fl ashy, but more affordable systems are part of the new normal.

Rob Phillips of Monitronics addresses the topic of taking a proactive approach to alarms to reduce false alarms and saving emergency responders time. Phillips specifi cally fi elds questions about adding two-way voice to a customer’s security system, as well as two-way voice verifi cation. Monitoring center staff do yeoman’s work with a desire to get in, out and on the way to the next emergency. These people truly are the lifeline to the security industry.

Hope to see you soon in Las Vegas. If you have an idea for a cover story for Dealer Strategies, just grab me and let’s talk about it.

0313sec_008_IndFocus_v3.indd 8 2/14/13 4:02 PM

FOR PENNIES

VP-16 Encoder

VP-16 & VP-16-L Video Encoders

Dramatically Lower Cost16-port encoder with Video Insight softwareSimple, per camera pricing without other feesNo software maintenance fees

Bundled Video Insight SoftwareEasy to usePowerful Web ClientFacility MapsiPad, iPhone & Android-ready clientsEnterprise readyIntegrated Active Directory, LDAP & Novell eDirectory1,300 different IP cameras from 70 manufacturersCentralized managementIntegrated failoverU.S.- based Tech Support with a 1-Hour Call Back Guarantee2012 Security Products Magazine

2012 New Product of the Year 2012 Govies Winner - VMS & Mobile App

Arecont Vision VMS of the Year

Model VP16 VPL16MSRP $1,995 $1,295

BNC inputs 16 16

Resolution D1 D1

Compression H.264 H.264

Max FPS per channel 30 6

Dual Stream Yes Yes

Loopouts 16 0

Encoder motion detection Yes Yes

De-interlaced image Yes Yes

Audio Inputs 1 1

Audio Outputs 1 1

Digital Inputs 16 0

Digital Outputs 4 1

PTZ protocols supported 60 60

RS485 Yes No

RS232 Yes No

Rackmount 1U No

Integrated power supply Yes No

ONVIF compatible Yes Yes

3 Year Warranty Yes Yes

Bundled with Video Insight Yes Yes

No Software Maintance Yes Yes

Analog licenses included 16 16

IP licenses included 0 0

VP-16-L

TO

Go to http://sp.hotims.com and enter 46 for product information

Untitled-3 1 1/15/13 11:26 AM

See us at ISC West, Booth #7115

1 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

On June 1, 2012, the Cali-fornia Department of Parks and Recreation (CDPR), in connection with various partner

agencies, began a six-month construc-tion project to restore wetland function within Malibu Lagoon State Park. The project, on the coastline north of Santa Monica, culminates nearly 20 years of sci-entifi c studies and planning that engaged multiple government agencies, scientifi c experts, local property owners and envi-ronmental organizations. Excess sediment from decades of misuse was removed, and the lagoon’s water channels were re-contoured to improve water fl ow and circulation. Considering the signifi cant in-vestment in the project, CDPR wanted to ensure the protection of the site during its critical restoration phases.

“In reviewing the issues to manage the overall project and ensure the securi-ty of the construction site and the safety of workers and visitors to the park, we determined that we would greatly benefi t from installing a security system,” said Barbara Fosbrink, project support coor-dinator, CDPR.

Around-the-Clock SurveillanceFosbrink began the process to identify a solution that could provide 24-hour surveillance coverage. Key to develop-ing the scope for the installation was an approach that would address the unique location of the site and the construction zones, and changes to beach access. En-vironmentally, the site presented chal-lenges arising from intense glare com-ing from the ocean, extreme morning fog and its accompanying dampness, and low-light conditions—once the sun set, the site had no dedicated light-

ing, rendering 24-hour surveillance cov-erage a signifi cant challenge. Further,

project offi cials also needed to fi nd a way to combat limited Wi-Fi access.

In addition, CDPR required a solution that would be easy to dis-assemble upon the project’s com-pletion, and offer the option to re-deploy at another site in the future.

Even with these roadblocks, CDPR understood the risks of

not installing a security system.

The project could quickly become more expensive if just one incident occurred and there was no system in place to provide evidentiary support. Therefore, CDPR moved forward with a competi-tive bid process to secure the most cost-effective, reliable solution possible. It se-lected SOV Security, Agoura Hill, Calif., as its systems integrator for the project.

Low-Light ConditionsCDPR developed the project scope be-lieving a thermal camera solution would be the best option. During this process, Bryan Merjan, president and CEO, SOV Security, the security systems integra-tor selected for the project, introduced state coordinators to alternative options, including the cost-effective, edge-based surveillance technologies from Innova-tive Security Designs.

“California State Parks originally wanted thermal cameras because of the night-time features, but they were quick-ly taken off the table because of the high cost associated with such devices,” Mer-jan said. “We informed them we knew of a megapixel solution that was drastically less expensive and worked superbly in low-light conditions.”

Founded by a team of seasoned se-curity and imaging professionals, ISD provides edge-based IP surveillance solutions that deliver ease of manage-ment and confi guration. The company’s award-winning Jaguar cameras provide customers with unmatched video qual-ity and edge-based processing. The ISD devices also deliver fl exibility when it

comes to video storage by allowing cus-tomers to leverage long-term storage through on-board SD cards or external integration with NAS devices.

Merjan deployed four ISD Jaguar se-ries cameras mounted in pairs to moni-tor the construction site and visitor traf-fi c from the beach. The cameras deliver HD 1080p resolution to capture every detail, ensuring full protection of the state’s equipment. It features wide dy-namic range to combat the ocean’s glare and the site’s varying light conditions, and boasts day/night mechanical infra-red cut fi lters to provide unparalleled low-light performance.

“Wide Dynamic Range was a big fea-ture for the lagoon,” Merjan said. “A lot of cameras do well in standard lighting conditions, but as soon as the landscape changes from very bright to very shad-owy, traditional cameras cannot provide the same quality image. ISD solutions made perfect sense for this application, especially from a WDR perspective.”

During the night, the lagoon is ex-posed to residual light from homes sev-eral hundred feet away. Jaguar’s day/night fi lter worked fl awlessly to deliver exceptional low-light coverage.

To manage video, SOV Security in-tegrated Exacq Technologies exacqVi-sion Edge, video management software designed to operate directly on an edge device without the need for a separate server. exacqVision Edge software inte-grated seamlessly with the ISD Jaguar camera series.

One camera monitored the entrance

Restoring a LagoonProject calls for high-defi nition surveillance on the edgeBy Ian Johnston

0313sec_010_011_IndVert_v3.indd 10 2/14/13 4:03 PM

W W W . S E C U R I T Y - T O D A Y. C O M 1 1

gate to a temporary water treatment facility, and another camera moni-tored access to and from the beach. The two additional cameras mounted in the construction trailer area pro-vided wide views of the entire site. All four cameras streamed video to HauteSpot Networks’ Hautespot mi-croNVR stationed in an entrance ki-osk at the park’s entrance. Hautespot, an ISD partner, is a provider of high-performance wireless routing plat-forms that can be easily confi gured to meet the demands of HD-quality sur-veillance monitoring.

“Our wireless networks are designed for IP surveillance and allow cameras to communicate seamlessly, providing remote access and troubleshooting,” said Bob Ehlers, CEO, HauteSpot Net-works. “Our low-jitter, highly secure network technology synergizes well with the megapixel, edge-based ap-proach to surveillance.”

On the EdgeCDPR found additional value and cost-effectiveness in ISD’s edge capabil-ities. Each camera features edge-based recording and storage to minimize is-sues with bandwidth consumption. The approach also allowed the cameras to store video data on board, reducing the need for external storage. Coupled with HauteSpot’s microNVR, the edge technology creates redundancy in video storage, providing additional peace of mind that video is being captured at all times. For example, if a camera were stolen, captured footage could be ac-cessed on the NVR; if the NVR were stolen, footage would still be available on the camera.

Successful deployment of the cam-eras reduced the opportunity for inci-dents, and the cameras delivered on the promise of producing superb images, even in low light, extreme glare, fog and other challenging environmental condi-tions. In addition, Fosbrink found the Exacq VMS easy to manage and con-fi gure, and routinely monitored the live video feeds on her mobile devices to keep watch over operations when she was not physically on-site.

“We investigated many different camera technologies from a variety of manufacturers, and they all worked great in ideal conditions,” Fosbrink said. “But, nothing compared to the performance of the ISD cameras in the variable light conditions of the lagoon. These cameras have performed very well in this harsh environment.”

Merjan took the success a step fur-ther, rendering the ISD cameras one of the few megapixel cameras on the market capable of succeeding in such dynamic applications.

“Sometimes companies will boast that they have a megapixel solution, but that doesn’t always lead to great images,” he said. “If the color contrast

isn’t good enough, you’re not going to capture a good picture.”

Construction at the Malibu Lagoon State Park location will be completed in 2013, and the cameras will be taken down. Because of the system’s fl exibil-ity, CDPR will be able to re-deploy the system at a new site. The proven perfor-mance and reliability will allow for the

equipment to be installed in any variety of diverse environments and settings. Fosbrink noted that overall, the security solution “was a solid investment, and will come in handy for future projects and activities of the department.”

Ian Johnston is the founder and CEO of Innovative Security Designs.

SOLUTIONS FOR SECURITY

360° full HD imaging just went mainstream. Panasonic’s 360° network cameras set new benchmarks in performance and cost-efficiency. With multiple stream output and image correction done in-camera, they can be configured to meet any viewing requirement in wall panorama, double panorama, quad PTZ, and single PTZ modes. Innovating advanced imaging solutions for mainstream surveillance applications is how we’re engineering a better world.

panasonic.com/security-360camera 855.333.4035

© 2013 Panasonic Corporation of North America. All rights reserved.

WV-SW458

Go to sp.hotims.com and enter 4 for product information. See us at ISC West Booth 14035.

0313sec_010_011_IndVert_v3.indd 11 2/14/13 4:03 PM

0313 TOP PICKS Compiled by Security Products’ Staff

1 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

iCLASS SeosAward-winning platform

• HID Global’s award-winning iCLASS SE plat-form is state-of-the-art iCLASS Seos creden-tialed and offers a high-frequency solution for increased security, privacy and portability.

• iCLASS Seos delivers maximum interoperabil-ity by supporting emerging technologies, such as NFC-enabled smartphones, and allowing for support of future technologies.

• It is a secure, standards-based technology to manage and authenticate identities.

• The credential can be securely embedded on NFC smartphones for physical access control, PC logon, biometrics and a wide range of ad-ditional applications. HID GlobalGo to sp.hotims.com and enter number

300 for product information.

Blending Video SurveillanceAll on a single, unifi ed platform

• Genetec is unveiling the latest version of Se-curity Center, which blends video surveillance (Omnicast), access control (Synergis) and li-cense plate recognition (Auto Vu) on a single, unifi ed platform.

• New threat-level management functionality allows users to respond to changing security conditions in real time.

• Remote workstation control and software video wall functionalities to facilitate collabo-ration.

• Advanced camera blocking to further strength-en the protection of privacy.

• Integration of HID’s next-generation Edge and VertX EVO access control product lines.GenetecGo to sp.hotims.com and enter number

301 for product information.

Superior ForensicsSecure card printing solution

• The CP500 from GET Group combines the su-perior forensics of 600dpi pigment ink with user-upgradeable encoding features for per-sonalization to deliver the most secure card printing solution on the market.

• It can produce secure contactless, contact and magnetic stripe identifi cation, and its retrans-fer print process enables edge-to-edge print-ing. It allows use of programmed primers over specifi c areas to allow for chip technology and encoded data anywhere on the card.

• The CP500 is specially designed for access control, personalization and other high-se-curity identifi cation challenges in corporate environments, pharmaceuticals, government, healthcare, transportation, travel and leisure, higher education and campus security.  GET GroupGo to sp.hotims.com and enter number

302 for product information.

Get an AppSmartphone access control

• Open Options introduces the all new DNA Fu-sion iPhone app that allows users to monitor and control their access control system right from their smartphone.

• The DNA Fusion app will allow operators to securely login.

• Users can view and control doors, access points and time schedules.

• Users can view and control cameras.• You will be able to view and edit staff and

credentials.• Users can view built-in reports on system

activity.Open OptionsGo to sp.hotims.com and enter number

303 for product information.

Long-range Passive UHF Tag Reader

Perfect for perimeter security and gates entries

• The tres900 is a long range, passive UHF tag reader specifi cally designed for the gated entry, vehicle ID and perimeter security industries.

• It will read EPC G2 tags in multiple form fac-tors—Windshield Stickers, ISO cards, Hang Tags, Metal Mount tags)—from 15 to 30 feet away.

• The unique programming methodology allows users to program Wiegand data to any EPC G2 inlay.

• Wiegand, Serial and TCP/IP output formats are available. Inventory of generic tags al-lows most tag orders to be fi lled in days, not months.TRES RF SolutionsGo to sp.hotims.com and enter number

304 for product information.

Touchscreen ControllerBuilt-in Z-Wave used to control

• Honeywell’s Tuxedo Touch is a touchscreen controller that centrally controls security, four IP cameras that can be viewed directly on the screen and Z-Wave enabled automa-tion functions.

• Tuxedo Touch uses built-in Z-Wave to control more than 230 devices including thermostats, lighting, locks and shades, which are espe-cially important for energy savings and safety more than ever before.

• A built-in web server gives users the ability to control the entire system using Wi-Fi-enabled devices, including smartphones, tablets and PCs, making it a simple, convenient solution for users to control from their preferred mobile device.  Honeywell SecurityGo to sp.hotims.com and enter number

305 for product information.

Real-Time DVRNew hardware and H.264 high profi le

• Topnos Inc. introduces CTRing 960H real-time, CK1300 and CK3300 series.

• It has adapted new hardware and H.264 high profi le, offering faster and more stable perfor-mance with less data consumption.

• The main feature is the RS485 communication over coax cable, offering a useful time/cost feature when you install Pelco-C compatible PTZ cameras.TopnosGo to sp.hotims.com and enter number

306 for product information.

Universal Stopper without Horn Housing, Flush MountIndoor/Outdoor Cover built to your

specifi cations

• The STI-13000NC polycarbonate cover helps protect devices such as keypads, audio vol-ume controls, dual action pull stations, and emergency buttons without restricting legiti-mate operation.

• Includes a high-strength continuous hinge.• Universal Stopper is low-profi le and accom-

modates most dual-action pull stations.• Cover, with or without horn, is available in fl ush

mount, surface mount or waterproof backbox and red, blue, green, yellow, white or black color option for the horn/label hood, spacer and backbox.

• The horn/label hood is available with stan-dard fi re text for red, custom label—at no extra charge—or no label for all colors. UL/cUL, ADA.Safety Technology International Inc.Go to sp.hotims.com and enter number

307 for product information.

0313sec_012_Toppicks_v3.indd 12 2/14/13 4:04 PM

What is 960H?

Provides a 30% INCREASE IN RESOLUTION,

a step above D1

960H is the highest resolution available for analog CCTV andprovides a 30% increase in resolution in comparison to D1. The greater the resolution, the higher the

must complement the 960H camera to capture this high resolution video.

Advantages of 960H

Stop crime before it happens™

prevent crime, not just record it. Digital Deterrent™ solutions include

HT7246H2.8-12mm auto iris varifocal lens

HTINTD8H2.8-12mm auto iris varifocal lens

HTINTB8H2.8-12mm auto iris varifocal lens

Wireless Access Point

Get More

Info

®

S.M.A.R.T.

EZSearch

See us at ISC West, Booth #20041

Go to http://sp.hotims.com and enter 42 for product information

Untitled-4 1 2/5/13 4:43 PM

1 4 0 3 1 3 | S E C U R I T Y P R O D U C T S

TRANSPORTATION SECURITY

ALL ABOARD One of the world’s busiest train stations is fully protected

By Peter Ebersold

It took a full two years to commission a massive network of three fi re alarm control panels, 53 subpanels and more than 2,600 devices throughout 550 rooms, tunnels and platforms within one of the world’s busiest commuter hubs. In additional to sprinkler monitoring, the system integrates with a number of ancillary building systems to perform code-required controls of

escalators and elevators, plus fans for smoke control. Thanks to some savvy en-gineering and state-of-the-art technology, this 50-year-old, New York City train station is now outfi tted with a single, integrated fi re alarm and emergency com-munications system.

INSTALLATION AND CONTROLA major challenge was the execution of this momentous installation without disruption to the station’s daily 20-hour train service and the more than 250,000 people that pass through each day.

“Basically, we only had four-hour windows in the middle of the night where we could work trackside when the trains were not present,” said Bob Farm, sales engineer, United Fire Protection Corp. (UFP), the Kenilworth, N.J.,-based NOTI-FIER distributor that provided and installed the major systems on the project.

Incorporating the owner’s requirements for a proven system, offering multiple layers of fl exibility and an easy means of monitoring and control, Code Consul-tants designed the system as an open specifi cation, which was put out to bid.

“The electrical contractor and United Fire’s team, along with their plan to complete the project, was what really sold the job,” said William J. Aaron, Jr., the system designer and senior project manager with Code Consultants in St. Louis. “In addition, the company had the support system to get the equipment to the distributor (UFP) on time, and to provide help in the fi eld when it was needed.”

Using a combination of fi ber optic and copper wire for networking, UFP went with Class A, Style 7 circuitry, which provided a high level of survivability.

0313sec_014_022_Ebersold_v3.indd 14 2/14/13 4:05 PM

Secure your Advantage

Now I have more options for HD and megapixel video with new MicroDomes and infrared cameras for Advantage Line. Like the rest of the portfolio, these cameras are priced to satisfy and have all the features I need to put together high-quality, affordable video solutions. Plus, the online tools and apps make it simple to choose and install entire systems, giving me an edge on the competition.The Advantage is Bosch.

See the entire Advantage Line at www.boschsecurity.us/advantageline

Secure your Advantage

Now I have more options for HD and megapixel video with new MicroDomes and infrared cameras for Advantage Line. Like the rest of the portfolio, these cameras are priced to satisfy and have all the features I need to put together high-quality, affordable video solutions. Plus, the online tools and apps make it simple to choose and install entire systems, giving me an edge on the competition.The Advantage is Bosch.

See the entire Advantage Line at www.boschsecurity.us/advantageline

Untitled-2 1 7/27/12 3:33 PM

See us at ISC West, Booth #14047Go to http://sp.hotims.com and enter 14 for product information.

1 6 0 3 1 3 | S E C U R I T Y P R O D U C T S

TRANSPORTATION SECURITY

“Because we were able to install subsystems and amplifi ers throughout the facility, we were able to keep home run wiring to a minimum,” Farm said.

According to the station’s engineering fi re and life safety project manager, the system’s ability to network multiple panels that distribute the power and control capabilities throughout the station, enable protection for a large facility, with a myriad of conditions, to op-erate as one overall system.

The entire fi re alarm and emergency communica-tions system is monitored and controlled from three different command centers—two onsite and one in another state. Staffed 24/7, each command center comprises a digital voice command panel (DVC), used to monitor the entire fi re alarm network. The DVCs are equipped with a microphone and enable live voice announcements and temporal evacuation tones through the facility’s hundreds of speakers or to any of its fi ve notifi cation zones.

To heighten monitoring and control of the net-work, the primary onsite fi re command station also is equipped with a NOTIFIER ONYXWorks graphic workstation, providing fl oor-by-fl oor views of the en-tire facility and its major fi re alarm and emergency communications system components. Through simple virtual switches programmed to perform a number of functions, ONYXWorks can control fans and other major network components. For example, specifi c smoke detector zones can be temporarily shut down for maintenance or when welding is taking place with-in a particular area.

Given the variety of environments and ambient noise commonly present throughout the station, the audio quality of announcements had to be highly in-telligible. Farm refers to this system’s audio as being “of CD quality.” Similarly, the visual notifi cation had to be ADA-compliant.

Whether signaling a possible fi re or highlighting the importance of emergency notifi cations, the sys-tem’s strobes can be used for both fi re alarm and mass notifi cation events.

“The day we turned that system on, which re-quired synchronizing more than 1,000 strobes, and saw the synchronized strobes fl ashing across all of the train platforms—that was quite an amazing sight,” Aaron said.

In terms of going with one unifi ed fi re alarm and emergency communications system, the station’s engineering fi re and life safety project manager ex-plains that it was really a no-brainer due to cost sav-ings, reduced power requirements and more effective operations.

With so many components and such complexity built into the system, the technology’s modular fl ex-ibility enabled the team to bring parts of the system on-line as they were completed.

“We had to build this thing in pieces and do the fi nal hook-up in the end, because we could pre-test each component as we went along,” Farm said.

CREATIVE ENGINEERINGConventional smoke and heat detection devices were

installed in most of the terminal areas. However, ar-eas presenting a challenge for detector installations included space comprising ceilings with too many obstructions, in high-voltage substations and on the train tracks themselves where overhead high-voltage catenary power lines could not be shut down. Linear heat detection cable offered a great solu-tion for utility rooms and substations were fi tted with beam detectors, serving to keep transmitters and re-ceivers away from high-voltage equipment. As for the train platforms, engineers had to get a little more creative. Considering the trains travel through environmental extremes without any means of separation, the facility had to be prepared for any emergency situation brought about by an incoming train. “For that application, we used a technology used in Europe, but new to the United States that is fi ber-optic linear heat detection,” Aaron said. “To keep the electricians away from those overhead power lines on the tracks, we used fi berglass conduit because it’s not conductive, as opposed to steel.” To integrate the train platforms’ heat detection with the NOTIFIER system, the engineers estab-lished output contacts from the subpanels, and using monitoring modules, they sub-divided the outputs to be monitored through the central fi re alarm panel. Another important aspect of this fi re alarm and emergency communications system was the ability to adapt easily to future changes and expansions. “We were looking for a system that would not only cover the building now, but give the owners the fl exibility that whatever happens in the future, we could incorporate more functionality into the sys-tem,” Aaron said. Refl ecting back on the project that dominated two years of his life, Aaron recalls the thrill of turn-ing on the entire system. “It was quite humbling to see a project of this scale perform exactly as it was designed.”

Peter Ebersold is the director of marketing at NOTIFIER.

Go to sp.hotims.com and enter 24 for product information.

0313sec_014_022_Ebersold_v3.indd 16 2/14/13 4:05 PM

Simply Powerful, Powerfully Simple

CUBE

BLADE Up to 16 2.1MP Cameras (1080P True HD Resolution)

Up to 64 2.1MP Cameras (1080P True HD Resolution)

Up to 128 2.1MP Cameras (1080P True HD Resolution)

What is DW Spectrum?

Toll Free: 866.446.3595 Fax: 813.888.9262 www.digital-watchdog.com [email protected]

Powerful and user-friendly video management solution, highly optimized to provide

unlimited scalability, unmatched bandwidth savings, and simplified system setup and management.

Automatic Device Discovery

Simple Enterprise Scalability

Instant Motion-Based Smart Search

Easy Drag-n-Drop Camera Management

Dual Stream Recording

Cross-Platform: Windows and Linux

Graphical HDD Health Monitoring

Seamless Transition from Live to Recorded

* no* not shown

E-RACK

VISIT OUR WEBSITE

COMPATIBLEFOR A COMPLETE LIST OF

INTEGRATION WITH

LINE OF RECORDERS

CAMERA MODELS

COMP L E T E

See us at ISC West, Booth #6075 • Go to http://sp.hotims.com and enter 21 for product information

Untitled-3 1 1/31/13 2:54 PM

TRANSPORTATION SECURITY

1 8 0 3 1 3 | S E C U R I T Y P R O D U C T S

Airports have broken the analog barrier. No longer are airport di-rectors and security executives arguing the merits of analog vs. IP. While the latest research reports indicate that the airport market is around 50 percent converged (IMS Research), the market segment is moving forward with major IP projects at breakneck speeds

across all sizes of airports.At the project planning table for many of these new surveillance initiatives,

there seems to be three major trends emerging that wouldn’t have been possible two or three years ago.

First, the sheer size of new camera installations are staggering. Airports that had a couple hundred cameras to cover the entire property in the mid- to late-2000s are now growing their systems to thousands of IP cameras. What’s causing such a dramatic trajectory?

Second, security and TSA are no longer the sole drivers behind camera in-stalls. Different departments are showing an interest in leveraging the systems for improved operations. Even airlines are getting into the act. What types of non-security uses are driving this interest?

Third, the interest in using the system for more than just security has brought many new stakeholders to the planning table with their own needs and ideas. Who are they? What are they asking for?

Here is what airport leaders have been saying and, more importantly, doing.

SKY ROCKETING BUILDS: FROM HUNDREDS TO THOUSANDSThe upsurge of number of cameras per airport is exploding—and this trend isn’t reserved just for the major hubs.

In the United States, TSA classifi es the nation’s airports into one of fi ve catego-ries: X, I, II, III and IV. These classifi cations are based on factors such as takeoffs and landings annually, the extent of passenger screening and overall threat level considerations. In general, Category X (“ex,” not “ten”) airports have the larg-est number of passenger boardings and security threat considerations. Category I (“one”) is the next highest ranking and Category IV (“four”) is the smallest.

Since Category X airports are considered the most appealing targets for terror-ism and criminal activity, this is naturally where the largest surveillance upgrades are taking place from a pure numbers perspective. Los Angeles (LAX), for ex-ample, recently tripled the size of its video surveillance system from less than 1,000 cameras to more than 3,000.

Category I and II airports also are building bigger systems with more network-connected cameras. An international airport on the east coast that had less than 100 analog cameras just eight years ago has a long-term plan in place for more than 2,000 IP cameras. In the near future, expect even the smallest regional air-ports to increase their camera counts, as well as the cost of IP technology and network storage continues to decrease.

What’s causing the surge? Looking from the outside in, it’s easy to assume that the threat of terrorism is the driving force. Major security threats and the resulting increase of government grants are the main catalysts for the change, but the tech-nology shift from antiquated analog CCTV to IP video is the enabler.

Scalability benefi ts of IP over analog are obvious and allow airports to grow their systems as needed. But that doesn’t answer the question of accelerated growth in network video infrastructure. The real answer is because airports are tapping into the value of technology due to three improvements:

Bandwidth build-outs. Bandwidth is becoming cheaper and less limited.

IP LIFTOFF Airports seeing major shift of IP video surveillance;

three trends that are piloting the changeBy E. Anthony Incorvati

Go to sp.hotims.com and enter 50 for product information. See us at ISC West Booth 21123.

0313sec_014_022_Ebersold_v3.indd 18 2/14/13 4:05 PM

See us at ISC West, Booth #17087

Go to http://sp.hotims.com and enter 83 for product information

Untitled-3 1 2/11/13 11:04 AM

TRANSPORTATION SECURITY

2 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

Travelers today expect Wi-Fi in every terminal. Tenants with properties in-side the airports—namely retailers and restaurants—need a network infra-structure to run business operations. In fact, some airports are building carrier class networks and acting as a service provider for their tenants piggybacking

on 10-plus Gigabit backbones. With terminal-to-terminal wiring, it’s much easier today to fi nd a network drop and add IP cameras when a need arises.

Image quality. Frankly, the poor image quality of analog video meant that it was only ever reviewed when absolutely necessary. Video coverage

was added only at critical checkpoints to monitor who went where and when, and even then the pictures were diffi cult to see. With today’s HDTV and multi-megapixel cameras, other airport stake-holders are taking note of the quality and realizing what this means for their jobs, leading to the request for an in-

creased number of IP cameras.Sophisticated software. Managing

hundreds or thousands of cameras is impossible for any human, so the video management software selection is para-mount. Operators can easily access the video they need through smart search features and mobile access. If airport security must track a subject, properly confi gured software solutions can help reconstruct the sequence of events from camera to camera by stitching together footage. Lastly, with today’s IP image quality providing the necessary pixel data, the top software vendors are de-veloping effective analytics to improve security and operational intelligence.

NEW USES: OPERATIONS AND MAINTENANCE WANT IN

With such high quality IP cameras and software programs today, some might ask, “If the resolution and intel-ligence are so much better, shouldn’t airports be able to do more with less? Wouldn’t that mean a decrease in cam-era counts?” Here, we’re seeing the rare trend of doing more with more.

Because image quality and usability of analog systems is so poor and cum-bersome, maintaining the system often becomes a burden on an airport’s re-sources. Airport security and TSA lever-age the video for high-risk areas, but us-ing the system was not exactly a coveted task. That perception is changing with IP, and it’s resulting in multi-dimension-al uses in adjacent departments.

In addition to the historical power users of IP video surveillance, such as the TSA, airport security and Customs and Border Protection, emerging us-ers, like operations and maintenance have entered the room. The main pur-pose for surveillance is still security, but these additional departments are using video more proactively and in unique ways. Surveillance of baggage handling systems is being used to help detect a downtime issue and bring the system back to operational effectiveness, and airports can keep an extra eye on work performed by external contractors.

Major U.S. airlines also are purchas-ing and installing their own cameras at gates and ramps to better manage the operational effectiveness needed for on-time departures with analytics like peo-ple counting and traffi c fl ow manage-ment. Flight delays can be caused by any number of players, from the airline to food vendors to the airline refueling

Interested in becoming aDM Network Video Cert i f ied Partner?

Cal l 1-877-367-8778 or v is i twww.dm-networkvideo.com

Installation benefi ts:

• Fast to install: built in 16 port Layer 3 POE(Closed IPTV) switch

• Easy to expand: up to 32 cameras

• Auto detection and self confi guration: of DM’s CamVu IP cameras and PTZ domes

• Starts recording with no further configuration

• Same local and remote configuration and user interface

• Secure lock down of IP cameras with unique key applied, to avoid network vulnerability

End user and operator benefi ts:

• Corporate network segregation and security through dual IP addressing scheme

• High defi nition HDMI local display output and local joystick PTZ keyboard

• Internal storage capacity up to 6TB, expandable via USB

• Built in DVD writer and USB ports for evidence retrieval

• Control this and unlimited NetVu Connected systems through NetVu ObserVer video management software

High definition, secure, plug and play IP network video recorder for smaller IP video installations.

Introducing the NVR MEDIA SERVER

The product is exclusively

available through the

DM Network Video

Certifi ed Partner Programm

e

©Copyright AD Group 1st November 2012

Go to sp.hotims.com and enter 26 for product information.

0313sec_014_022_Ebersold_v3.indd 20 2/14/13 4:05 PM

Go to http://sp.hotims.com and enter 72 for product information. See us at ISC West, Booth #21101

Untitled-3 1 2/13/13 4:34 PM

TRANSPORTATION SECURITY

2 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

staff. If a fl ight is delayed, the video can be valuable data to clear the airliner of any wrong doing.

In fact, airport use of IP video mir-rors the retail industry in many ways. While loss prevention was the main driver of years past, retail sales, mar-keting and operations departments

are fi nding new ways to leverage video data and analytics. And, since major airports have a mall-like atmosphere, actual retail uses of video abound. Individual tenants can leverage the airport’s network to add their own cameras and use analytic software to improve their own sales operations

with heat mapping, customer fl ow and queue-counter analytics.

THE DEAL: FROM SOLO PILOTS TO A WHOLE CREWWith so many stakeholders now tak-ing an interest in growing surveillance systems in airports throughout North

America, the number of seats at the planning table has increased. In the past, integrators and their vendor part-ners typically dealt with only the securi-ty department. This group was driving much of the decisions for developing the surveillance system. Today, how-ever, there’s a very infl uential co-pilot involved: IT.

We talk about airports installing thousands of cameras. In today’s IP world, it’s not 4,000 cameras they’re installing. It’s 4,000 computers being added to the network. More often the chief security offi cer (CSO) or direc-tor of IT is involved in the surveillance purchasing decision, and even becom-ing the main driver in the larger air-ports for the products they choose.

While IT is playing a major role across all categories of airports, the most sophisticated projects will include an entire crew in the buying process. The airport director, along with main-tenance and operations staff, should be participating in the discussion—that is, if they understand the potential of cross-functional IP video surveillance. If they aren’t involved, the full poten-tial of an IP system could be lost.

Each department will have their own needs, pain points and lofty goals. So, the surveillance system must be de-signed with everyone’s input in mind. New best practices dictate that pro-posals and plans are segmented out by department need so that nothing is missed in the design phase. If done in a comprehensive manner, many surveil-lance synergies will arise that allow the installation team to simultaneously ac-complish multiple goals.

FLYING HIGH WITH IP VIDEOAirport security is one of the hot-test issues of our lifetime. Passengers want to be assured that everything possible is being done for their pro-tection, but they want it done in a way that doesn’t disrupt their travel plans. It’s a fi ne line to walk, but with high-quality, intelligent IP video systems, airports are now using their systems to do both.

E. Anthony Incorvati is the business devel-opment manager for the transportation in-dustry at Axis Com-munications.

SIA WITH ISC SUPPORTING THE SECURITY INDUSTRY

SETTINGDIRECTION

F O R T H E G L O B A L S E C U R I T Y I N D U S T R Y

S A N D SCONVENTIONC E N T E RL A S V E G A S10-12

A P R I L

20

13

REGISTER NOW AT ISCWEST.COM/SP

S I A E D U C AT I O N @ I SC | A P R I L 9 -1 1

R E G I S T E R N O W A T I S C W E S T . C O M / S PFOR THE FUTURE-FORWARD SECURITY SHOW IN VEGAS

Go to sp.hotims.com and enter 2 for product information.

0313sec_014_022_Ebersold_v3.indd 22 2/14/13 4:05 PM

www.security-today.com

February 2013

A Special Section to Security Products

GET SMARTWITH POE

10 reasons smart switches are the wise upgrade for IP surveillance networks

S8

VIDEO SURVEILLANCEON THE GOThe necessity of a fully functional Web Client and Mobile VMS

S12

REPLENISHING A SHORELINESan Diego County hits the beach to monitor waves

S14

0213secNCS_c1_v4.indd 2 2/11/13 2:43 PM

10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

www.dsxinc.com

CREATING THE FUTUREOF SECURITY . . . TODAY

Go to http://sp.hotims.com and enter 201 for product information.

Untitled-10 1 1/2/13 4:21 PM

Get a FREE 30 Day Evaluation:

WWW.SMARTVUE.COM

HD VIDEO SURVEILLANCE YOUR IT GUY CAN INSTALL

#1 Cloud Video Surveillance Solution -Inside Mobile and Wireless

#1 Reader’s Choice for Cloud Video Surveillance - Security Products Magazine

Top 50 Business App -iBusiness Magazine

Go to http://sp.hotims.com and enter 205 for product information.

Untitled-6 1 1/11/13 12:24 PM

S4

February 2013, Volume 7, No. 1

EDITORIAL STAFFEditor-in-Chief/Associate Publisher Ralph C. JensenWeb Manager Scott NewhouseE-news Editor Brent Dirks

ART STAFFArt Director Dale Chinn

PRODUCTION STAFFDirector, Print Production Jenny Hernandez-AsandasProduction Coordinator Teresa Antonio

EDITORIAL ADVISORY BOARDSteve Collen, Cisco Physical Security, San Jose, Calif.Charlie Howell, Security Concepts and Planning, Sacramento, Calif.Jeff Lemoine, General Mills, Minneapolis, Minn.Fredrik Nilsson, Axis Communications, Chelmsford, Mass.Dick O’Leary, EMC, Hopkinton, Mass.

SALESSam Baird +44 1883 715 697Randy Easton 678-401-5543Brian Rendine 972-687-6761Benjamin Skidmore 972-587-9064

SECURITY, SAFETY AND ENVIRONMENTAL PROTECTION GROUPPresident & Group Publisher Kevin O’Grady Group Circulation Director Margaret Perry

President & Chief Executive Offi cer Neal Vitale

Senior Vice President & Chief Financial Offi cer Richard Vitale

Executive Vice President Michael J. Valenti

Senior Vice President, Audience Development & Digital Media Abraham M. Langer

Vice President, Finance & Administration Christopher M. Coates

Vice President, Information Technology & Application Development Erik A. Lindgren

Vice President, Attendee Marketing Carmel McDonagh

Vice President, Event Operations David F. Myers

Chairman of the Board Jeffrey S. Klein

REACHING THE STAFF Staff may be reached via email, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.E-mail: To e-mail any member of the staff, please use the following form: [email protected]

Dallas Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254

Corporate Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. PT) Telephone (818) 814-5200; Fax (818) 734-1522 9201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

NETWORK-CENTRIC SECURITYVolume 7, No. 1

Features

© Copyright 2013, all rights reserved. Network-Centric Security is a supplement to Security Products, an 1105 Media Inc. publication, and is published four times a year: February, May, August, and November.

The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

Network-Centric Security welcomes vendor information and briefi ngs. To arrange a briefi ng, please contact our editor-in-chief, Ralph C. Jensen, via email at [email protected]. Our agreement to accept or review product material or backgrounders is not a guarantee of publication.

Departments

S6EnterThe analog market still accounts for the majority percent of all security cameras sold. While that number seems a little ambitious, many, if not most of current installs are asking for IP video surveillance. Just take a look at installs in China and Southeast Asia. IP video surveillance is booming, and emerging markets are all about what is trending.

S17Don Shin Sr.

At the EdgeNew technologies are bringing new challenges. Here are six steps to choosing the next genera-tion intrusion prevention system. IT departments must rapidly adjust to the latest technologies while keeping an alrea dy stressed network infrastructure stable and secure.

GET SMART WITH POE10 reasons smart switches are the wise upgrade for IP surveillance networksBy Steven Olen

S8

VIDEO SURVEILLANCE ON THE GO

The necessity of a fully functional Web client and mobile VMS

By James Whitcomb

S12

REPLENISHING A SHORELINESan Diego County hits the beach to monitor wavesBy Courtney Dillon Pedersen

S14

ASSESSING THE RISKNew Jersey hospital ramps up security program

By Mary Wilbur

S18

0213secNCS_s04_TOC_v4.indd 4 2/11/13 2:44 PM

What is 960H?

Provides a 30% INCREASE IN RESOLUTION,

a step above D1

960H is the highest resolution available for analog CCTV and provides a 30% increase in

image. 960H enables the CCTV camera to obtain high resolutions of up to 700 TVL. A 960H DVR must complement the 960H camera to capture this high resolution video.

Advantages of 960H

Stop crime before it happens™

prevent crime, not just record it. Digital Deterrent™ solutions include

HT7246H 2.8-12mm auto iris varifocal lens

HTINTD8H2.8-12mm auto iris varifocal lens

HTINTB8H2.8-12mm auto iris varifocal lens

Wireless Access Point

Get More

Info

®

S.M.A.R.T.

EZSearch

Go to http://sp.hotims.com and enter 210 for product information

Untitled-8 1 1/11/13 3:09 PM

ENTERBy Ralph C. Jensen

WHAT’S ALL THE FUSSReports from security analysts indicate that the analog market still accounts for about 87 percent of all security cameras. That number seems a little ambitious, and I would set the number lower. Here’s why.

I am afforded the opportunity to view a lot of installs around the country, and every one of them is about the installation of networked

cameras. I’ve never been invited to a place where someone has in-stalled 100 or more analog cameras, which makes me believe that IP video surveillance is on the rise. Here’s another reason why.

Price plays a key role in buying equipment. The cost of ana-log versus IP network equipment is as close as it ever has been. IP cameras offer so much more in terms of clarity, coverage and replay. The cost to install and maintain a networked IP system is far more benefi cial to the end user. Thus, new markets are open-ing their doors to the video surveillance market. See what I mean?

The Chinese video surveillance market estimated its worth at

$2.6 billion in 2011, an increase of more than 30 percent over 2010. That market has continued to grow into 2013. Southeast Asia, primarily Vietnam, will be the fastest growing market be-tween 2010 and 2015. The expected growth is 22.3 percent. Viet-nam accounts for only 10 percent of this fi gure, but that is a sig-nifi cant growth for an emerging market.

“Due to the increasing demand for high-resolution images, network security products, especially network cameras, gained market share in 2011,” said Cheryl Li, research analyst at IMS Research. “In fact, network camera revenue increased 130 per-cent in 2011. In addition, the growth also benefi ted from the in-creasing number of participants in the market.”

Growth in the industry stems from high defi nition and mega-pixel cameras. In Vietnam, for instance, high priorities are trans-portation, energy, irrigation and urban development projects.

I believe that emerging markets can teach developed markets a thing or two about security installations, beginning with the power of the networked camera, and its viability to vertically grow markets.

Go to sp.hotims.com and enter 204 for product information.S6

0213secNCS_s06_Enter_v5.indd 6 2/11/13 2:44 PM

Go to http://sp.hotims.com and enter 211 for product information.

Untitled-2 1 1/24/13 10:32 AM

S8 0 2 1 3 | N E T W O R K - C E N T R I C S E C U R I T Y

P O W E R O V E R E T H E R N E T

GET SMART WITH POE10 reasons smart switches are the wise upgrade for IP surveillance networksBy Steven Olen

When developing IP surveillance instal-

lations, many security system integrators

and IP-Surveillance network designers have

turned to PoE technology, and for good rea-

son. Using PoE cameras and switches elimi-

nates the need for separate power and data

cables, thus simplifying installation, increasing fl exibility for

camera locations and saving money. This strategy enables in-

tegrators to use more cameras, helping ensure a more com-

prehensive solution for customers and extending the overall

profi t margin for integrators.

PoE Switches: The BasicsWith PoE technology, IP cameras can be powered using the same LAN cable—typically a UTP Cat-5e or better—that also carries the IP video data. A PoE switch is a traditional Ethernet switch with the additional capability of “injecting” PoE power (48VDC) on the LAN cable. A PoE switch commonly has 4, 8, 16, 24 or 48 ports, although other variants also are available. This switch provides power and data to the IP camera on each port—using a single LAN cable—up to 330 feet away.

0213secNCS_s08_s10_Olen_v5.indd 8 2/11/13 2:45 PM

W W W . S E C U R I T Y - T O D A Y . C O M S9

PoE switches fall into three basic categories: unmanaged, smart and managed.

Unmanaged switches provide basic connectivity between net-worked devices at a low cost. However, they aren’t capable of changing settings or functions. They tend to be easy to use, but only for simple connectivity.

Smart, managed switches have graphical user interface (GUI) with easy-to-understand controls and are managed via Web browser. They provide intuitive guidance to users, which is ideal for those who have no advanced network training.

Fully managed switches have a GUI and a more technical com-mand line interface (CLI), which allows network administrators to create scripts to program and manage multiple switches. Fully managed switches have a full suite of capabilities that are often beyond the needs of a basic IP surveillance network.

Why Choose PoE Smart Switches over Unmanaged Switches? When designing an IP surveillance network, here are 10 reasons it makes sense to “step up” from a basic (unmanaged) PoE switch to a smart PoE switch.

More Bang for the BuckWhen working with budget-conscious customers, many system in-tegrators and network designers normally specify unmanaged PoE switches, due to simplicity and low cost. However, taking a step up to a smart PoE switch can net big value. The cost increase is minimal, and yet the added capabilities, tools and benefi ts for the surveillance network—and its administrators—can be compelling.

Easier AdministrationSmart PoE switches feature an easy-to-use, browser-based user interface and straightforward communication. An administrator simply browses to the IP address of the switch, and can then use an intuitive GUI that becomes a simple vehicle for confi guring and monitoring important elements and features in the network.

Remote Reboots and Power ControlWith smart switches, an administrator can remotely turn on and off the PoE to each camera via the GUI. This comes in handy when a camera needs to be rebooted. This action can be manu-ally controlled from anywhere, at any time on the network, in-cluding over the Internet. The administrator does not need to be at the camera’s location, nor be in the same room as the PoE switch, which helps avoid truck rolls, saving time and money. PoE ports can be powered up/down one by one, several at a time or all ports together.

Some smart PoE switches, such as business-class solutions, support time-based PoE, an option that allows administrators to set a time window that determines when each camera is pow-ered on and off. This can be useful for networks that need to be shut down during certain times of the day, or for automatically scheduling IP camera reboots on a periodic (daily) basis with no manual intervention.

Real-time Power Statistics and Power-saving FeaturesUnder certain conditions, network administrators need to know the real-time power consumption for each switch port, including

the overall PoE budget use. Capturing this data isn’t possible with an unmanaged switch. A smart PoE switch, however, can provide the following power consumption statistics in real time:• Power use per port, including power (Watts), current draw

(mA) and voltage levels (VDC)• Overall system power, including the total system power bud-

get, amount of power currently being used and the remaining power availableAlso, smart PoE switches will often support power-saving fea-

tures that are not found in unmanaged PoE switches. For exam-ple, when a smart switch senses that an RJ-45 port is link down, or the connected device (camera) is idle, has been disconnected or turned off, the signal power to that port will be reduced. By re-ducing signal power consumption, less heat is produced, resulting in extended product life and lower operating costs.

Auto Surveillance VLANA VLAN uses an Ethernet switch to partition a physical network, thereby creating distinct broadcast domains. VLANs are especially useful when a network shares the same infrastructure with other functions or applications, such as a corporate data network. By assigning the IP surveillance traffi c to a separate, distinct, high-priority VLAN, the traffi c is assured to pass through the network swiftly and securely, even during times of high network traffi c.

While the task of manually provisioning VLANs can sound daunting and complicated, some smart PoE switches support a feature called auto surveillance VLAN, which enables the smart PoE switch to automatically detect any IP camera on the net-work. With no manual intervention, traffi c from each camera is automatically assigned to a high-priority VLAN, which guaran-tees the quality and security of the surveillance information, in-cluding at periods of high network congestion.

Smarter Management of the PoE Power BudgetSmart PoE switches also have a distinct advantage when it comes to managing the PoE power budget. As the network grows and ad-ditional cameras are added, a PoE switch will be asked to supply more power. When an unmanaged switch reaches its power budget maximum, it will prohibit turn up of any additional ports. On the other hand, a smart PoE switch allows an administrator to man-age increased power demands in a much more controlled manner, through user-defi ned port-priority assignments and policies.

Ability to Set PoE Power Thresholds per PortUnder some conditions, a network administrator may need to set a limit to the amount of power applied to any particular switch port for an IP camera. This is especially useful for IP cameras that don’t “self-report” their power classifi cation to the switch automatically.

Setting power limits cannot be done with unmanaged PoE switches, but it’s simple to do with a smart PoE switch. Most smart PoE switches allow administrators to confi gure a power threshold per port based on pre-defi ned IEEE 802.3 at Classifi ca-tions (4.0W, 7.0W, 15.4W or 30.0W). Other switches allow ad-ministrators to defi ne a custom power limit (from 1 to 30 watts)

0213secNCS_s08_s10_Olen_v5.indd 9 2/11/13 2:45 PM

S10 0 2 1 3 | N E T W O R K - C E N T R I C S E C U R I T Y

for any designated port.

Better Cable DiagnosticsSmart PoE switches enable administra-tors to examine the quality of the copper cables connected to each switch port. Tests can be initiated from anywhere on the net-work and run on each port during instal-lation or troubleshooting to determine any potential cable errors. This is a distinct ad-

vantage over unmanaged switches, which don’t have this functionality. Diagnostics data includes:• Cable connection: OK / Short Circuit /

Open Circuit• Cable fault distance: If a cable fault is

found, the test results will show the dis-tance of the fault from the switch port.

• Cable length: If test results show OK, they also will show the total length of

the cable.

Automatic Loop DetectionSmart PoE switches also feature a loop detection function, which can locate un-intentional loops in a network. If a loop is detected, the switch automatically shuts down the port and alerts the administra-tor. Loop detection can be enabled on a single port, a range of ports or all ports simultaneously. Without such protection, undetected loops can wreak major havoc and cause serious traffi c fl ow disruptions.

PoE Traps and Alerts for AdministratorsUnmanaged PoE switches have no ability to alert the network administrator after a change or disruption to the network has occurred, such as an IP camera becoming compromised in the fi eld. Smart switches can send “traps” or alerts to a network management system—typically SNMP-based—when such challenges arise. For example, a smart PoE switch can send a trap/alert to administrators when:• An Ethernet link goes up or down• PoE power turns on/off for any port• A short circuit occurs on any port• A “Power Deny” action occurs on any

port

The Bottom LineUnmanaged PoE switches are regarded as low-cost, easy-to-use and good for simple connectivity, which is why they’re a mainstay of IP surveillance networks. Yet today’s system integrators and network designers are quickly realizing the benefi ts gained by upgrading to smart or managed PoE switches.

Not only do they represent minimal cost increases, but they also provide net-work administrators with a simple, easy-to-use interface through which the IP sur-veillance network can be confi gured and monitored from anywhere, anytime. Addi-tional tools enable administrators to enjoy faster network installation, easier network maintenance, upgrades and better visibili-ty into network health—all of which helps save time and money. It’s all about getting smart, and working smarter.

Steven Olen is the director of product market-ing, business networking solutions, at D-Link.

In today’s world of enhanced threats, you don’t have time to wait for situations to escalate. You need to know what’s happening. And you need to know now. Verint can help. As a global leader in networked video security solutions,

our expertise is built on over 100,000 successful deployments. From single sites

to enterprise-wide operations, organizations in over 150 countries, including banks,

retailers, airports, mass transit systems, ports, campuses and 80% of Fortune 100

companies, trust their systems — and their safety — to us. Our scalable, open,

IT-friendly architecture and robust portfolio of video security solutions give your

security operations the confidence you need to make the right call, every time.

For more information on how Verint can help you know now, visit us online at Verint.com/know-now or call 866-NEXTIVA.

© 2013 Verint Systems, Inc. All Rights Reserved Worldwide.

With Nextiva, You’ll Know Now.

VIDEO MANAGEMENT & ANALYTICS | BUSINESS INTELLIGENCE | PSIM | INTELLIGENT NVRS IP CAMERAS | ENCODERS & DECODERS | WIRELESS VIDEO DEVICES

KNOW LATER? OR KNOW NOW?

Go to sp.hotims.com and enter 212 for product information.

0213secNCS_s08_s10_Olen_v5.indd 10 2/11/13 2:45 PM

Configuration Instructions:

1. Plug2. Play

PixelMaster Series NVRs provide uncompromisedfeatures and operation with minimal setup time. No more connecting multiple devices, PC-basedsoftware or complicated configuration. It’s now integrated in one neat little package!

With the PixelMaster Series, there’s no sacrificewhen it comes to performance— a full suite of professional surveillance tools are included in itsembedded Linux® architecture. The PixelMasterSeries is ready to go—right out of the box. There’sno better time than now to “go HD”— and now thePixelMaster Series makes it even easier.

www.computarganz.com

NY: 1-800-422-6707 CA: 1-877-407-9555 ©2013, CBC. All Rights Reserved. www.computarganz.com

P I X E L M A S T E R S E R I E S E M B E D D E D N V R s

THE SIMPLICITY OF TRUE PLUG AND PLAY OPERATION WITH 1080p REAL-TIME RECORDING.

Features:> 1080p real-time

recording

> Triplex operation

> H.264 compression

> Built-in PoE

switching HUB

> Automatic router

port forwarding

> Remote viewing

via web,

PC software

or smartphone

Plug and Play with

IP Cameras with NO Configuration Required!

Go to http://sp.hotims.com and enter 207 for product information.

Untitled-3 1 1/7/13 10:33 AM

S12 0 2 1 3 | N E T W O R K - C E N T R I C S E C U R I T Y

R E M O T E S U R V E I L L A N C E

VIDEO SURVEILLANCE ON THE GOThe necessity of a fully functional Web Client and Mobile VMSBy James Whitcomb

After investing thousands of dollars in a video management system, it’s important to be able to maintain the level of features you have access to from a monitor station, such as making video clips, zoom and mapping.

When implementing a video surveillance system for your business, it is essential to have a

feature-rich video management software (VMS) application that is robust, yet easy to use. Installing a VMS monitor station at work stations throughout an entire building or campus is key. In many cases, large scale facilities, such as colleges or school cam-puses, have monitor walls and security centers dedicated solely to video surveillance.

Our fast-paced environments, and the need to be in several lo-cations at once, including off campus or out of the offi ce, means a VMS needs to not only be accessible from virtually anywhere, but also reliable. The Video Insight VMS provides virtually the same application for end users who log into the Web Client or use the VI Mobile iTunes iPad and iPhone app on the go, as it does for those who use Video Insight at a computer station.

Web ClientProviding a secure, highly functional Web-client application is es-sential for a VMS, which is often the only application that many will use.

A navigation tree should have easy access to cameras and serv-ers. A benefi t of WebClient 5.0 is that it is easy to use, and has an incredible array of features not often found via Web access including:• Live and recorded video from any server• Video Clipping• Quick search• Mapping• Playback integrated with Live Control• Optional ActiveX Control• Load balancing• Active Directory and LDAP authentication • Can be used with any browser

These capabilities are crucial for those entities that have a great number of remote VMS users, such as the Austin, Texas, Independent School District, which has 124 campuses across 230-square miles, 11,000 employees and 86,000 students. Austin ISD has a 3,000-camera, 50-server video surveillance system and,

after using a different VMS provider, switched to specifi cally use Web Client.

Under their previous VMS system, the district used a Thick Client that had to be physically installed on each PC. With the large number of users in this district, this was an almost full-time job for the VMS administrators.

“We needed something that didn’t require an incredible amount of CPU processor power and that could also serve as a fully-functioning web-client,” said Wayne Russell, Austin ISD Police Department representative.

An organization as large as Austin ISD requires a dependable VMS to provide monitoring of facilities and students, and the abil-ity to review incidents and make clips in an easy and rapid fashion. School districts of this size, move employees from campus to cam-pus, which means the VMS administrators spend a lot of time with user maintenance. A reliable Web client is more economical than

0213secNCS_s12_s13_Whitcomb_v5.indd 12 2/11/13 2:46 PM

W W W . S E C U R I T Y - T O D A Y . C O M S13

installing and uninstalling thick VMS clients on each PC, which also overburdens the already taxed VMS administrators.

Use of the VI Web Client has made the Austin ISD VMS more reliable and effi cient, Russell said.

Mobile AppsThe Web Client will always be a regularly used feature of VMS, but with the rapidly growing number of smartphones and tablets, it has been crucial that video surveillance companies provide qual-ity and dependable applications to access video via these devices.

The VI Mobile App from iTunes—and the ability to use Video Insight from Android devices—allows users an array of features and the ability to use the VMS from anywhere.

The mobile App features live and recorded video from any camera with control PTZ, active directory login, login to inde-pendent systems with unique credentials, alarm logs and motion alarms viewing.

Because the VI VMS is used by more than 25,000 school and college campuses, it’s essential for campus security to have access to live and recorded video at a moment’s notice, from anywhere. Northeastern A&M College in Miami, Okla., has praised the Mobile VI App because security offi cers rely on it so much.

As part of their routine patrol, offi cers drive golf carts around campus. They stop outside of each building and, using an iPad and the VI Mobile App, call up cameras inside of each building.

If they view anything suspicious, only then will they enter the building. This approach increases the offi cers’ safety in the event of a potentially hazardous situation, as the offi cers can access the cameras and see what is happening inside before entering a building unaware.

Ensuring Complete CoverageIf you are in the market for a VMS, or are considering an up-grade, be sure to evaluate the system’s Web Client and Mobile App prior to purchase as more and more endusers rely on the ability to access cameras and important features on the go.

James Whitcomb is the chief technical offi cer at Video Insight.

e-news

Delivered to your inbox twice a month

Join over 30,000* integrators, end users, installers, contractors, and IT professionals who get the most up-to-date network-centric security news delivered to their desktops.

Sign up now at security-today.com

*Publisher’s Own Data

Free subscriptions!

S13

0213secNCS_s12_s13_Whitcomb_v5.indd 13 2/11/13 2:46 PM

S14 0 2 1 3 | N E T W O R K - C E N T R I C S E C U R I T Y

V I D E O M A N A G E M E N T

REPLENISHING A SHORELINE

San Diego County hits the beach to monitor wavesBy Courtney Dillon Pedersen

As San Diego County works to replenish

eroded sand banks on its most beautiful

and iconic beaches, the potential fi nancial

impact of any mistakes or delays on South-

ern California surfi ng resources is a concern.

The Surfrider Foundation San Diego Chapter

partnered with CoastalCOMS to install digital cameras net-

worked with Milestone XProtect Corporate monitoring wave

breaks and sand lines.

“Dealing with such an important aspect of Southern Califor-nia’s economic and environmental ecosystem, it was imperative our technology enabled an accurate assessment of the beach re-plenishment monitoring and its impact on the waves.” said Tom Chandler, president ClickVMS International, CoastalCOMS US distributor. “There has not been another beach-monitoring project

of this scale or sophistication, so we needed a solution that would be reliable, functional and affordable. Our integrated Milestone/CoastalCOMS solution empowers Surfrider volunteer monitoring programs and gathers baseline data necessary for environmental impact assessment and the protection of coastal resources.”

There are ChallengesEvery day, sand from the beaches of the Southern California Coast is washed away and displaced due to natural wave activity and human traffi c. Every 10 years or so, a task force is assigned to dredge sand from the ocean and adjacent beaches to restoring the shoreline.

Changing the underwater topology, however, could adversely change the wave patterns and surf breaks in the water. Multiple parties including surf activists and government agencies, seeking to protect the natural resources and wave patterns, wanted to en-sure their beloved sport and the local economy remained unaf-fected during and after the project.

0213secNCS_s14_s16_Pedersen_v6.indd 14 2/11/13 2:46 PM

JOIN TODAY! 888-447-1689www.ESAweb.org

Since 1948, the Electronic Security Association hasg i v e n s e c u r i t y b u s i n e s s e s a c o m p e t i t i v e e d g eby p r o v i d i n g t r a i n i n g , c e r t i f c a t i o n , g o v e r n m e n t representation, invaluable networking opportunities, professional development tools, discounted products and services, timely industry information and guidance.

Discover ESA MembershipIt’s Where You Belong

Go to http://sp.hotims.com and enter 202 for product information.

Untitled-7 1 1/9/13 2:40 PM

S16 0 2 1 3 | N E T W O R K - C E N T R I C S E C U R I T Y

Providing a SolutionThe Surfrider Foundation informed the California Coastal Com-mission about the potential dangers to surfi ng resources and partnered with ClickVMS/CoastalCOMS to develop a monitor-ing solution. The CoastalCOMS-hosted analytics monitoring system with remote access is based on Milestone VMS and mul-tiple, strategically placed digital cameras, reports on wave breaks and changes in sand lines. Volunteers monitor the beaches daily and relate any changes during the two-year project.

With the need to store a vast amount of video data—waves and sand information from daily monitoring—optimal storage was one of the top priorities. For scientifi c reporting, the ability to archive, replicate and distribute beach condition information was important. The affordability through effi cient handling of these tasks via hosted and managed IP surveillance and the open platform of XProtect, allowed Surfrider and ClickVMS/Coast-alCOMS to operate 100 percent from the cloud using their choice of hardware for each remote site.

Sand Replenishment: A Delicate ProcessThe San Diego Association of Governments developed a strategy to replenish the coastline of Southern California to make up for years of shoreline erosion. With 1.4 million cubic yards of sand brought in from numerous sources, various California beaches will have their sand levels replenished in a three-month window. When fi nished, the $28 million project will have relocated sand in eight locations: Imperial Beach, Oceanside, Moonlight Beach, Cardiff Beach, Batiquitos Beach, Fletcher Cove, South Carlsbad Beach and North Carlsbad Beach.

The non-profi t surfer advocacy group, Surfrider Foundation, approached the California Coastal Commission with information about protecting the surf. Newly laid sand also caused a concern that reefs may be covered or washed out, killing the surf in cer-tain areas and negatively impacting the sport and local economy. With little budget to completely oversee the sand replenishment program, Surfrider Foundation volunteered to develop a strategy that could be put in place to monitor additional sand replenish-ment projects now and in the future.

The Surfrider Foundation teamed with ClickVMS/CoastalC-OMS to develop this civic-minded project, with hopes to continue monitoring the surf to ensure minimal adverse effects. The com-bination of a grant with funds from the Surfrider Foundation allows the group to monitor the current sand fi ll project for two years. The goal is to show the Coastal Commission how monitor-ing surf and sand can benefi t the community and livelihoods of Californians, attempting to convince local agencies to continue monitoring after the initial two years.

Hosted Monitoring ServiceClickVMS International is a provider of CoastalCOMS hosted, managed services for specialized video content analytics and en-vironmental monitoring via public and private cloud systems. They launched the video-based monitoring system with multiple remote networked cameras stationed in strategic locations to overlook the beach fi ll locations. The video is recorded directly to ClickVMS/CoastalCOMS cloud instances of Milestone XPro-tect® VMS to build an archive of daily observations for reporting and analysis.

The CoastalCOMS Digital Asset Management Platform hosted by ClickVMS reports the conditions of the surf in near-

real-time—wave height and fl ow on the beach. The software not only enables rapid training of the volunteers using intuitive navi-gation through the video images, but the easy-to-use software is pivotal to the accuracy of the research. Deploying the Milestone Application Programming Interface (API) for integration with the CoastalCOMS analytics components, qualitative data will be archived and analyzed for reports about the project’s outcome on the surf.

The monitoring system drives cameras to presets, capturing and storing video of the beaches and surf against complex tidal schedules. This allows the volunteers to access their assigned vid-eo in the archives on their own time. Milestone software provides the fl exibility and reliability to give volunteers varied and com-plete control over their Q/A schedules.

“We’re very much dependent on Surfrider volunteers, who range in experience, occupation and association with the beach-es,” Chandler said. “We now have the ability to quickly cull infor-mation, while keeping the cloud infrastructure we’ve built unseen by volunteers. As a managed service provider, we look for fl exibil-ity on the backend with ‘anywhere accessible’ customer solutions that are plug-and-play effi cient for users. A lot of VMS options are not offering such a solution.”

The Benefi ts The data is bound together in weekly intervals and analyzed quarterly to determine the effect of the replenishment program on the surf. Done on their own time, each volunteer can easily access the video and measurements, accessible through a shared document. Rather than relying on forecasting systems to subjec-tively predict the outcome, there is clear, documented, monitored data that gives a real read on the sand replenishment’s program.

“Volunteers have been supplying positive feedback about the user-friendly nature of the CoastalCOMS/Milestone integrated solution,” said Julia Chunn-Heer, campaign coordinator, Sur-frider San Diego. “I’ve worked with CoastalCOMS for years and am familiar with the technology. This is a fantastic way to do something positive to help protect the surf in an extraordinarily accessible way.”

Courtney Dillon Pedersen is the manager of corporate PR for Milestone Systems.

0213secNCS_s14_s16_Pedersen_v6.indd 16 2/11/13 2:47 PM

AT THE EDGE

W W W . S E C U R I T Y - T O D A Y . C O M S17

SIX STEPS TO CHOOSING YOUR NEXT-GEN INTRUSION PREVENTION SYSTEMNew technologies bring new challengesBy Don Shin Sr.

Today’s IT professionals—regardless of industry—are adopting the latest tech-nologies to meet increasing bandwidth de-mands, create higher and faster perform-ing networks, and increase availability as cost-effectively as possible. But new tech-nologies bring new challenges, and orga-

nizations’ IT departments must rapidly adjust to the latest technologies while keeping their already stressed network infrastructures stable and secure. The most common ques-tion when adopting a new technology or device is: How can I be sure the solution I choose will perform as expected in my network?

If the new deployment involves next-generation fi rewalls  or Intrusion Prevention Systems (IPS), this decision can have added challenges. The sophisticated high-performance network and se-curity devices within these infrastructures require a more compre-hensive approach to testing and validation than traditional test-ing tools can provide. Today’s devices use deep packet inspection (DPI) to examine traffi c in ways that legacy testing tools were never designed to validate.

Therefore, it’s imperative that IT buyers follow the six steps outlined below to make informed purchase decisions, eliminating costly post-deployment troubleshooting.

Create and prioritize specifi cations for products to be evalu-ated. As with any project, it is wise to begin with the end goal in mind. Before considering any piece of equipment, defi ne and prioritize the company’s needs for infrastructure build-out. A good way to start is by asking fundamental questions. How should the infrastructure support key objectives? What are the transaction latency requirements? How important is the securi-ty of transactions in comparison to their speed? Which services are most sensitive, requiring the highest levels of security? Is application inspection necessary?

Rethink testing around repeatable, quantitative principles. Cre-ate a plan for stressing each device under test (DUT) with real-world application, attack and malformed traffi c at heavy load. The entire plan should embrace a standardized methodology and scientifi c approach to eliminate guesswork and use repeat-able experiments that yield clear, quantitative results to accurately validate the capabilities of DPI-enabled devices. Today, IT pro-fessionals have access to superior testing products that create au-thentic network traffi c and capture precise measurements of its effects, even for complex environments.

Use standardized scores to separate pretenders from contend-ers. These scores quickly eliminate devices from consideration that clearly do not meet an organization’s needs. The resulting score is presented as a numeric grade from 1 to 100. Devices may receive no score if they fail to pass traffi c at any point or if they degrade to an unacceptable performance level. The Resiliency Score1 takes the guesswork and subjectivity out of validation and allows administrators to quickly understand the degree to which system security will be impacted under load, attack and real-world application traffi c.

Test fi nal contenders with individual test scenarios that mirror the production environment. True validation requires an accurate understanding of the application, network and security land-scape in which devices will be operating. Review the infrastruc-ture’s traffi c mix and the mixes of service providers before design-ing individual tests to ensure that the testing equipment refl ects the latest versions and types of application traffi c that traverse the network. Randomization makes test traffi c behave like real-world traffi c, creating unexpected patterns that force DUTs to work harder. Creating repeatable, random traffi c requires testing equipment that uses a pseudorandom number generator (PRNG) to set a seed value that creates standardized, random traffi c.

Lay the groundwork for successful purchase negotiation, de-ployment and maintenance. Deploying untested network and se-curity devices creates nightmare scenarios. Untested equipment requires weeks of post-deployment troubleshooting that is frus-trating and time-consuming, and often leads to fi nger-pointing and costly remediation steps. This is particularly true when device outages, security breaches or unplanned bottlenecks affect entire infrastructures; such failures can damage an organization’s repu-tation. Testing pre-deployment minimizes the risk of these prob-lems and saves hundreds of hours of staff time by eliminating surprises and guesswork. Selecting the right device is about more than fi nding the right make and model, it also means choosing the right amount of equipment for the infrastructure in order to meet business needs.

If IT leaders follow these technical recommendations and avoid making common mistakes, they can select the right prod-ucts to meet their business objectives, improve infrastructure planning and resiliency by understanding device capabilities and save up to 50 percent on IT investments. This also eliminates hun-dreds of man-hours in post-purchase confi guration and tuning, and gives purchasers advanced insight into device capabilities, en-abling them to confi gure devices appropriately to avoid surprises and delays.

Don Shin Sr. is a product marketing manager at Ixia.

0213secNCS_s17_AtEdge_v6.indd 17 2/11/13 2:47 PM

S18 0 2 1 3 | N E T W O R K - C E N T R I C S E C U R I T Y

R I S K A N A LY S I S

ASSESSING THE RISKNew Jersey hospital ramps up security programBy Mary Wilbur

Back in late 2010, Service Works Inc., in Farmingdale, N.J., was selected to perform a risk assessment of Somerset Healthcare’s existing security services deployed at the hospital. After several meetings with the hospital’s executive team, a risk assessment was completed during the following months.

The risk analysis assessed the video surveillance, exterior lighting, access control, parking gate, emergency phone and in-fant abduction systems. The hospital needed a well-defi ned secu-rity plan to provide scalability and fl exibility as they transitioned from a diverse topology of existing systems that had been in place for years with playback of recorded video captured at seven dif-ferent locations.

“All of these systems had equipment installed in one form or another,” said Stephen Govel, president of Service Works. “Some equipment was older technology, some was in need of repair and some of the systems needed overall enhancements and a different operating procedure to become more effective.

“While all systems were operating at some level, we started

with what was in need of the most repairs, meaning the exist-ing video system. One of the big value-adds for Somerset was that they could use all of their existing analog cameras using the Salient capture cards, and as the analog cameras are re-placed with IP, they can trade in the analog cards at zero cost for IP licenses.”

Video Surveillance SystemsThe existing analog video systems consisted of a variety of re-cording systems spread throughout the hospital. There were two GE recording system matrixes with recorders, one Pelco 8100 DVR and one AD Intellex DVR. Each system was a standalone deployment, with no connectivity between the systems.

The hospital kept its current camera confi guration, and fo-cused on two things right away. According to Steve Dean, manag-er of public safety at Somerset Healthcare, three IP cameras were installed to capture license plates for documentation and funds were approved for a new recording platform that would best use the resources already in place.

“Eventually, we will replace the analog cameras with an IP in-frastructure,” Dean said. “Adding encoders and having one plat-form has improved the quality of the picture, and the quality of

0213secNCS_s18_s19_Wilbur_v6.indd 18 2/11/13 2:48 PM

W W W . S E C U R I T Y - T O D A Y . C O M S19

playback is phenomenal.”The hospital has applied for a Homeland Security grant in

hopes of improving the cameras, but for right now, having all vid-eo surveillance in one location has improved the overall security.

“I have camera views that I’ve never had before,” Dean said. “When we fi nally get everything we feel we need, we’ll be able to track people coming to the hospital from the freeway to the park-ing lot. And once they enter the facility, we will be able to track them from fl oor to fl oor.”

The hospital had more than 100 cameras in the overall system; however, with the seven independent recording and monitoring locations, there was no information sharing between them, mak-ing it diffi cult for anyone to manage the current deployment.

Thus, an analysis on the existing camera locations and the existing camera types began with a thorough outdoor lighting survey to determine camera effectiveness at night and a feasibil-ity study to determine where all cables were routed with so many recording locations. It was determined the best path, both eco-nomically and for future growth, was to use the recently installed fi ber network, and then to locate a hybrid NVR solution in the fi eld at each of the old DVR locations.

The network would be used to transmit all cameras to a single operations center.

Salient Systems was selected as the product of choice due to the versatility of their product selection and their ability to easily migrate the analog cameras to an IP format.

“One of the unique benefi ts Salient provides is the ability to transition from analog to IP cameras without extra hardware or licensing costs,” said Brian Carle, director of product strategy for Salient Systems. “When CompleteView is used with analog cameras, capture card hardware comes included. This avoids the cost of third-party encoders. As the analog cameras are re-placed by IP cameras, the capture cards can be traded in for IP licenses at no extra cost, which provided the lowest cost of ownership for the hospital.”

During Phase One of the project, a full conversion to IP and the addition of license plate cameras in the two parking garages on site went full-speed ahead. There are several additional up-grades with Somerset Medical Center that will be instituted as state and federal grants become available. SWI is monitoring the grant possibilities for the best technology and installation.

“Somerset is one of only a handful of Emergency Homeland Security Centers in New Jersey that is equipped to handle health related emergencies on a statewide level,” Govel said. “They have a full control center already established in the facility. However, it was not being used to manage the video camera systems.

“It was decided that this was where the new video monitor-ing center would be best served since it is a 24-hour-manned center. Our technicians went to work to design the layout for the equipment within the center for the operators and started with the installation.”

Over the next several months, each existing camera was tested and converted into a new Salient head end system.

Upon completion, the hospital was able to manage the system in ways unattainable in the past. With the fl exibility of the Salient solution, monitoring the overall system from multiple locations on site and remotely was easily accomplished.

“Replacing the disparate DVRs with CompleteView was easy because it is compatible with the cameras and technology that were already in place,” Carle said. “Standardizing on a single, centrally managed platform made training, live monitoring and investigations much simpler.”

“It was a perfect example of the technology fi lling a void in security,” Govel said. “Although the systems were, for the most part, installed without the ability to manage the systems through a solid video management system platform, the systems were diffi cult to manage at best. The Salient solution was easy to use.”

Mary Wilbur is the director of marketing at Salient Systems.

Ad Index Advertiser ........................................... Circle # ...........Page .........URL

Axis Communications Inc. ............................. 203 ...................... S20 ..............www.axis.com

CBC Ame rica ................................................. 207 ...................... S11 ..............www.cbcamerica.com

DSX Access Systems .................................... 201 ...................... S2 ................www.dsxinc.com

Electronic Security Association ..................... 202 ...................... S15 ..............www.ESAweb.org

Network-Centric Security .............................. NA ....................... S13 ..............www.security-today.com

Open Options Inc .......................................... 204 ...................... S6 ................www.openoptionsinc.com

Pivot3 ............................................................ 211 ...................... S7 ................www.pivot3.com

Smartvue Corporation ................................... 205 ...................... S3 ................www.smartvue.com

Speco Technologies ...................................... 210 ...................... S5 ................www.specotech.com

Verint ............................................................. 212 ...................... S10 ..............www.verint.com

0213secNCS_s18_s19_Wilbur_v6.indd 19 2/11/13 2:48 PM

Axis Communications’ Academy

Just a click away with Axis’ online courses

See us at ASIS East, Booth #xx. Circle xx on card.

Anytime. Anywhere.The video surveillance market is changing as

older analog systems converge towards network

video technology. New techniques, applications

and integration possibilities are driving the

convergence. Axis off ers a variety of online

courses within product knowledge, services and

system design.

The courses can be attended anywhere, at any

time and are open to the general public. Axis’

online trainings are free of charge - to learn more,

visit www.axis.com/academy/web-based.htm

Get the Axis picture. Stay one step ahead.The global learning center for network video.

Read more with

your smartphone

Untitled-2 1 8/28/12 12:58 PM

Go to http://sp.hotims.com and enter 203 for product information.

W W W . S E C U R I T Y - T O D A Y. C O M 2 3

PRODUCT SOLUTIONS Compiled by Cindy Horbrook, Content Development Editor

ISC WEST PRODUCT PREVIEW

MinutemanPRO-LCD

The compact PRO-LCD UPS protects DVRs and other vital systems from damaging power surges and sags with an automatic voltage regulator. The device features large capacity backup bat-teries for continuous power during blackouts, ef-fi cient hardware and LCD status display. Users also can monitor and manage the UPS via USB connection with included SentryPlus software. Available models range from 500VA to 1, 500VA. www.minutemanups.com.

ISC West Booth 18128Go to sp.hotims.com and enter 318 for product information.

Milestone SystemsXProtect LPR

XProtect LPR is license plate recognition (LPR) software that detects information from vehicles around the world and links the license plate num-ber with video. The system sends a notifi cation when a certain license plate is detected, which enables users to quickly take action. Users also can defi ne positive/negative lists that will initiate certain actions, such as opening a gate, which in-creases work productivity and helps automate tasks. The software is confi gured and managed through supported XProtect video management software. www.milestonesys.com.

ISC West Booth 20053Go to sp.hotims.com and enter 319 for product information.

XTec AuthentX

AuthentX is a cloud-based access control system for HSPD-12, FICAM and OMB M-11-11 compli-ance. The system is FISMA-compliant and avail-

able through GSA IT Schedule 70. It comes com-plete with credential issuance and identity management functionality, which has allowed it to support more than 70 federal agencies to date. The Web-based interface allows end users to up-date card reader functionality remotely, assign and remove permissions, create access groups, and monitor all access requests. www.xtec.com.

ISC West Booth 41013Go to sp.hotims.com and enter 320 for product information.

TOTUS SolutionsTOTUS Security Platforms

TOTUS Security Platforms incorporate optimized LED lighting, megapixel IP surveillance, multi-day media storage, and secure wireless communica-tions in a single unit. The platforms are designed to provide up to 70% energy savings and have a life cycle up to 100,000 hours with less than 5% loss in brightness. The products are suitable for use in parking lots, campuses, public transit systems and walkways, or to protect critical infrastructure, gov-ernment agencies, or any area where outdoor se-curity is necessary. www.totus-solutions.com.

ISC West Booth 4115Go to sp.hotims.com and enter 321 for product information.

SALTO SystemsXS4

The XS4 electronic lock with a keyless entry key-pad is the latest addition to the SALTO 360° Plat-form, the company’s stand-alone range of RFID locks. The keypad is designed to increase secu-rity and control as it offers the choice of various forms of authentication. The user may employ a credential plus PIN code, the keypad code or the credential only. All versions are compatible with the SALTO Virtual Network (SVN) and available in a wireless version for online real-time control. www.saltosystems.com.

ISC West Booth 20065Go to sp.hotims.com and enter 322 for product information.

Alpha Arsenalxpress E3

The xpress E3 PIR motion detector with VGA pho-to camera uses two AA batteries, which allows it to function independent of AC power outlets. When the unit detects motion or an intrusion, it sends an SMS alert to the user’s cell phone and a photo to the user’s email address. Two LED fl ash-es help to take photos in low-light conditions, which enable easy identifi cation of any intruder. www.alpha-safe.com.

ISC West Booth 3050Go to sp.hotims.com and enter 323 for product information.

Louroe ElectronicsIF-PX

The IF-PX audio oriented PoE Extractor provides power to external microphones and/or Louroe AOP-SP speaker/microphones, eliminating the need for a power supply. The +12 volts DC Ethernet power output and local auxiliary In/Out provides ease of integration with IP cameras and external equipment. The unit’s analog and IP technologies provide clear audio quality and versatility in audio and video ap-plications. www.louroe.com.

ISC West Booth 5057Go to sp.hotims.com and enter 324 for product information.

Speco Technologies960H

The 960H product line allows cameras and DVRs to capture up to 700 TVL, which is nearly 30% over D1 resolution resulting in signifi cantly enhanced picture detail. The D16DS DVR also enhances re-cording quality of existing installations and is

backward compatible with D1 cameras and DVRs. 960H Intensifi er cameras are also available. www.specotech.com.

ISC West Booth 20041Go to sp.hotims.com and enter 325 for product information.

AxxonSoft Axxon Next

Axxon Next video surveillance features an interac-tive 3D map that allows users to instantly deter-mine the location of a selected camera without switching between interface windows. With the time compressor feature, users can skim events in video footage without fast-forwarding. The Mo-mentQuest2 search feature is quick to fi nd video based on a wide range of user criteria: object size, color, speed, direction and other parameters. The system’s micromodule architecture allows it to smoothly recover and remain fully operational even if an individual function fails. www.axxonsoft.com.

ISC West Booth 39003Go to sp.hotims.com and enter 326 for product information.

VITEK Industrial Video Products Inc.

VT-PTZ220NP

The VT-PTZ220NP 2-megapixel camera with inte-grated PoE is an IP-based, high-speed network PTZ camera solution that delivers live video up to 30 fps at 1,920x1,080p over a TCP/IP network. Crystal clear images are achieved without tearing using a progressive scan CMOS image sensor while minimal network bandwidth usage and stor-age space is achieved using the H.264 video com-pression algorithm. The camera also supports M-JEPG for maximum fl exibility and integration possibilities. www.vitekcctv.com.

ISC West Booth 4063Go to sp.hotims.com and enter 327 for product information.

0313sec_023_040_ISC_v3.indd 23 2/15/13 9:03 AM

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

2 4

Talk-A-PhoneWireless ECO TOWER

The wireless version of the ECO TOWER emergency phone tower, which supports solar and day-night switching power confi gurations, features light-weight aluminum construction for reduced ecologi-cal footprint and one-person installation. Users can deploy the tower in remote areas with a cellular or VoIP wireless interface. www.talkaphone.com.

ISC West Booth 12107Go to sp.hotims.com and enter 328 for product information.

Aiphone JM Series

The JM Series touchscreen video intercom sys-tem is designed to identify visitors at building en-trances. The intercom features a 7-inch touch-screen for system navigation, door release and viewing visitors on the large display. Hands-free and handset communication is featured on all in-side stations while picture memory records im-ages onto an SD/SDHC card. The system supports up to eight inside stations for internal communi-cation and four door stations. Flexible wiring choices using Cat-5e/6 cables help save on in-stallation costs. www.aiphone.com.

ISC West Booth 22107Go to sp.hotims.com and enter 329 for product information.

DoorKing Inc.DKS Wireless

DKS Wireless expansion boards connect card readers and keypads to DKS 1830 series access controllers without the need to run wiring, which saves time, labor and money. Each board also acts as a repeater for longer distances, or individual repeater units are available when an access con-trol device is not needed. www.doorking.com.

ISC West Booth 23055Go to sp.hotims.com and enter 330 for product information.

CBC (AMERICA) Corp.Ganz DF-37 Series

The Ganz DF-37 Series of doorframe cameras are designed to supplement standard security cam-eras by capturing facial images upon entering/exiting stores. The cameras are sized to fi t stan-dard doorframes and users can mount them low enough to see under a hat or hood. The 700 TVL, high-sensitivity cameras feature a 3.7-millimeter lens housed in a low-profi le enclosure with a discreet 1/8-inch viewing slot. The cameras can be adjusted a full 90 degrees, which is suit-able for double doors requiring an angled view. www.computarganz.com.

ISC West Booth 22087Go to sp.hotims.com and enter 331 for product information.

TEMPERATURE CONTROLLED ENCLOSURES

1-800-473-0213 | www.mierproducts.com

PROTECT FIRE PANELSDVRs, SECURITY AND ELECTRICAL

EQUIPMENT FROM VANDALSAND WEATHER

NEMA 4 Outdoor/Indoor Enclosures with:

or

NEMA 3R Outdoor/Indoor Enclosures with:

Indoor DVR & CPU Lockboxes with:

OVER 50 MODELS AVAILABLE

PROU

DLY MADE IN THE USA

FOR OVER 25 YEARS!

Go to sp.hotims.com and enter 77 for product information.

0313sec_023_040_ISC_v3.indd 24 2/15/13 9:03 AM

Call 888.572.9252 or visit www.observint.com for a list of Distribution Partners, Regional Field Sales coverage, and complete Product Portfolio and Pricing

Video and Data Management Software» Cloud-hosted administration of

single and multi-site installations

» Remote client and server level updates

» Failover protection and enterprise consistency

» Simple licensing, no recurring fees

» Incredible image quality from 2 to 5 Megapixels

» Camera features include 3D noise reduction, H.264 Compression, Motion Detection, integrated IR

» Fully integrated with popular VMS Solutions

» Industry-leading prices

Multi-Megapixel IP Cameras

IP-based Electronic Access Control» Highly-scalable platform supports

single door to multi-site systems

» PoE carries data + power for controller and door hardware

» Manage up to 64,000 credentials

» Supports LDAP + calendar integration (Google/Outlook)

High Performance Imaging Technology» Proprietary XDI ISP chipsets deliver

industry-leading image quality

» IP camera features include advanced 2D+3D Digital Noise Reduction, enhanced imaging with WDR, True Day/Night ICR

» Hybrid recording solutions feature HD Megapixel resolution

Visit us at ISC WESTApril 10-12, 2013

BOOTH #12087 Integrated

Security Solutions

Go to http://sp.hotims.com and enter 36 for product information

Untitled-24 1 2/12/13 4:30 PM

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

2 6

Ingersoll RandaptiQ

The aptiQ multi-technology reader, which reads both proximity and smart credentials, now also reads magnetic stripe cards to provide users with a simple migration path to increased credential secu-rity levels, including various forms of proximity such as MIFARE Classic, the industry standard for con-tactless smart cards, and MIFARE DESFire EV1, which leverages open global standards for both air interface and cryptographic methods. The readers are also Near Field Communications NFC compliant. www.securitytechnologies.ingersollrand.com.

ISC West Booth 20029Go to sp.hotims.com and enter 332 for product information.

Arecont VisionAV12186DN

The AV12186DN 12-megapixel SurroundVideo WDR 180-degree panoramic dome camera deliv-ers clear video in extreme light conditions, reveal-ing both very bright and very dark areas in the same fi eld-of-view. The camera features a dynam-ic range of up to 100 dB. Its dome housing is IP-66 environmentally rated, IK-10 vandal-resistant and is 25 percent smaller than previous panoramic models. The camera is ONVIF- and PSIA-confor-mant. www.arecontvision.com.

ISC West Booth 9043Go to sp.hotims.com and enter 333 for product information.

Reconyx Inc.RECONYX Security Cameras

RECONYX Security Cameras provide covert 24/7 surveillance in areas where no power or commu-nication lines exist, such as construction sites, boat docks, oil and gas wells, utility substations, illegal dumping sites, graffi ti targets, road sides, marijuana grows and remote border areas. The cellular upgrade allows near instant notifi cation by sending photos to as many as four cell phones and/or two email accounts when a RECONYX cam-era is deployed in a security situation. License plate capture and general surveillance models also are available. www.reconyx.com.

ISC West Booth 26140Go to sp.hotims.com and enter 334 for product information.

QNAP SecurityVideo Surveillance System

The stand-alone NVR Video Surveillance System is suitable for retail and SMB segment security. The system features a dual-core 2.6 GHz processor that delivers a high throughput rate up to 330 Mbps to ensure stable recording and smooth play-back of multiple megapixel IP cameras. For envi-ronments where a PC is not needed, the HDMI output and hardware decoder deliver up to 180 fps full HD 1080p video streams for seamless, PC-less operation. www.qnapsecurity.com.

ISC West Booth 3126Go to sp.hotims.com and enter 335 for product information.

541-738-5500 • [email protected] • www.cyberlock.com/lock4

Contact us today to learn more about CyberLock security solutions or see us at ISC West, Booth #21123.

CyberLock®

If Your Lock Could Talk . . .™ by Team CyberLock

Copyright © CyberLock, 2013

Learn how to manage lost and stolen keys with CyberLock electronic locks and programmable keys.

• Electronic cylinders install without power or wiring

• Smart keys cannot be duplicated

• Electronic cylinders have no pick-able keyway

• Lost smart keys can be deactivated

Go to sp.hotims.com and enter 45 for product information. See us at ISC West Booth 21123.

0313sec_023_040_ISC_v3.indd 26 2/15/13 9:03 AM

All-Inclusive Warranty IQinVision’s 5-year warranty covers all moving parts, sensors, cut filters and fans. (3-years on auto-focus models).

The Alliance-pro is a full featured, H.264 Main Profile vandal dome camera with support for up to 5 MP resolutions. Designed with the installer in mind, installation is quick-and-easy thanks to the remote motorized zoom and focus (with A2 or A3 lenses), a hinged pivoting shroud, and 3-axis gimbal. This and other IQeye cameras allow for seamless integration with current and future technologies such as exacqVision® Edge which utilizes the on-camera SDHC storage to create a low-cost, low-power system solution.

Continuing ourimage of excellence

Remote Zoom/FocusThe remote, motorized zoom and focus features eliminate the need for manual focus adjustments at the camera, allowing for quick and easy installation.

On-Board StorageCombine on-board storage with IQrecorder or Direct-to-Storage recording to create a flexible, stand-alone platform ideal for motion based recording or remote monitoring.

33122 Valle Road San Juan Capistrano, California 92675 USA | 1 949 369 8100 | www.iqeye.com

te Zoom/Focus usive Warranty

ISC West Booth #3087Go to http://sp.hotims.com and enter 84 for product information

Untitled-2 1 2/15/13 11:04 AM

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

2 8

Garrett Metal DetectorsCSI Pro

The CSI Pro metal detector is designed for use in the recovery of ferrous, non-ferrous and stainless steel metallic crime scene evidence such as bul-lets, shell casings, stashed weapons and metallic arson evidence. The all-terrain detector is fully waterproof to 10 feet and includes a tactical trans-port case, land-use headphones and a Garrett CSI Pro-Pointer to speed recovery of small evidence items. www.garrett.com.

ISC West Booth 16125Go to sp.hotims.com and enter 336 for product information.

Delta Scientifi cPneumatic Bollards

Considering power requirements as well as instal-lation, operating and maintenance costs, Delta’s pneumatic bollards are 60 percent more effi cient and cost-effective than electro-mechanical units. The bollards are aesthetic, durable, fl ood-resis-tant and green; use low voltage and current draw; and provide up to 300 cycles per hour. The prod-ucts are in use by federal buildings, corporate headquarters, courthouses, military bases, facili-ties and other complexes, from airports to sea-ports. www.deltascientifi c.com.

ISC West Booth 17143Go to sp.hotims.com and enter 337 for product information.

infi nias/Observint Technologies

IP-based Access Control

IP-based access control is a fully-integrated, high-ly scalable system. Leveraging existing network infrastructure, the edge-based controller connects to the closest network switch via a single Cat-5 cable. PoE carries data and power for the control-ler and peripheral door hardware. Intelli-M Access browser-based software supports unlimited door licensing, and centralized management and ad-ministrative maintenance. The system is suitable for both new and replacement installations, and for virtually any application—from single-door to multi-door, multi-site systems. www.infi nias.com.

ISC West Booth 12087Go to sp.hotims.com and enter 338 for product information.

VIVOTEK USA Inc.FD8151V

The FD8151V is a 1.3-megapixel network dome camera designed for indoor applications. The camera features an ultra-compact vandal-proof housing and removable IR cut-fi lter/IR illumina-tors, making it suitable for most indoor day/night applications. The unique design also allows users to install the camera in less than 120 seconds. Other standard features include PoE, H.264 com-pression, a built-in microphone and SD card slot for local storage. www.vivotek.com.

ISC West Booth 26087Go to sp.hotims.com and enter 339 for product information.

I WANT YOUTO BUY AMERICAN!

Our Steel Gooseneck Pedestals areMade in America from American SteelOur Steel Gooseneck Pedestals areMade in America from American Steel

Our Lexan Polycarbonate Housings areMade in America from American Plastic ResinOur Lexan Polycarbonate Housings areMade in America from American Plastic Resin

[email protected](770) 529-1040

h h i

Stop Feeding the Foreign Beast To Save a Buck!

Go to sp.hotims.com and enter 56 for product information. See us at ISC West Booth 23141.

0313sec_023_040_ISC_v3.indd 28 2/15/13 9:03 AM

(866) 533-6216

www.avalanwireless.com

AVALAN WIRELESS RELIABILITY

Leaders in Wireless IP Video Connectivity

NEW 100 Mbps Wireless Solutions

NOW 100 MEGABITS/SECOND

BRIDGE or STAR

Come see us at

ISC West

Booth 1053

AW58100HTAAccess point

(Master)

AW58100HTSSubscriber Unit

(Client)

ThreeCameras

PTZCamera

MonitoringComputer

AW58100HTSSubscriber Unit

(Client)

AW58103HTSSubscriber Unitwith integrated3 Port 802.3af

Switch

FixedCamera

Go to http://sp.hotims.com and enter 8 for product information

Untitled-2 1 2/14/13 12:03 PM

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

3 0

3M CogentMiY-Touch

The MiY-Touch indoor biometric touchscreen access control offers a fi ngerprint scanner and a touchscreen interface. Designed with the needs of the user in mind, the compact reader includes built-in time and attendance functions, an external USB for add-on devices, Sandbox API framework support, an optional detachable con-tact/contactless smart card reader that meets current PACS standards for PIV, CAC, TWIC and others, and PIV-approved matchers and scan-ners. www.cogentsystems.com.

ISC West Booth 16107Go to sp.hotims.com and enter 340 for product information.

Safety Technology International Inc.

STI-V34104

The STI-V34104 four-channel voice receiver for the STI Alert Series sounds English or Spanish voice messages when alerted. When the sensor trips, the receiver sounds a programmable voice message, which a user chooses from ten tones/tunes and 53 selectable words (the unit speaks up to four words for each transmitter). Word combina-tion examples include “emergency exit side door,” “medicine cabinet,” “front door open,” and “drive-way alert.” The receiver monitors up to four differ-ent STI transmitting devices at a single location. www.sti-usa.com.

ISC West Booth 19069Go to sp.hotims.com and enter 341 for product information.

Digital Management SolutionsSOLR2130

Maximizing solar performance, the high-capacity SOLR2130 trailer features four 150-watt solar panels, making a 600-watt array. Designed to run year-round, the battery and solar combination al-lows for autonomous run time, even harsh envi-ronments. It also reduces its carbon footprint, tak-ing an eco-friendly approach to mobile video surveillance. With increased solar capacity, the Netvision trailer is designed to handle high power consumption, including cameras and recording devices that draw large amounts of current. www.netvisionmobile.com.

ISC West Booth 11119Go to sp.hotims.com and enter 342 for product information.

Stanley Security SolutionsEyeLock Nano TS

The EyeLock Nano TS iris biometric turnstile iden-tity authentication offers real-time iris capture at a distance and in motion. The device features a broad capture range for enhanced ease-of-use at high speeds, an integrated card reader to support legacy users, the ability to store 50,000 records in memory with larger databases supported remotely over a network and HID Prox or MiFare support. The unit offers connection via Wiegand, F/2/F, Re-lay and Ethernet for simple integration with exist-ing platforms. www.stanleysecuritysolutions.com.

ISC West Booth 39011Go to sp.hotims.com and enter 343 for product information.

Go to sp.hotims.com and enter 69 for product information. See us at ISC West Booth 3126.

0313sec_023_040_ISC_v3.indd 30 2/15/13 9:03 AM

Convenient Attractive Easy-to-install

JM Series

7” Touchscreen LCD Clearly identify visitors Unlock doors quickly Navigate features easily

Flexible System Size Install up to 8 inside stations to identify

visitors and unlock doors from one location to the next

Multiple entrances? Install up to 4 door stations to secure the building

Record Visitor Images Record pictures to internal

memory or to an SD/SDHC media card (not included)

JM Series

Touchscreen lntercom

C

www.aiphone.com

Stop by our booth or call 1-800-692-0200 to arrange for a live demo at your facility.

International Security Conference & ExpositionApril 10-12, 2013 | Las Vegas, NV

Booth #21107WEST

Go to http://sp.hotims.com and enter 52 for product information

Untitled-8 1 2/4/13 2:49 PM

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

3 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

Next Level Security SystemsNLSS Gateway 4000

The NLSS Gateway 4000 is a unifi ed security ap-

pliance that integrates security management functionalities into one compact, space-saving system, delivering a solution for environments of up to 64 HD cameras and thousands of doors. The product features video management, access control, intrusion and 10 built-in video analytics, including forensic analytics, facial recognition and audio analytics. The intuitive and Web-based

user interface allows users to centrally manage and control all system features anytime from anywhere in the world. www.nlss.com.

ISC West Booth 10107Go to sp.hotims.com and enter 344 for product information.

RS2 TechnologiesNExT Step System

The NExT Step System provides users with an eco-nomical, reliable and highly secure two-reader (ex-pandable up to 64 readers) access control solution that requires no computer or software installation. To operate, users can assign an IP address, and then manage the system via any Web browser or mobile device. The system uses open-platform hardware from Mercury Security. www.rs2tech.com.

ISC West Booth 7095Go to sp.hotims.com and enter 345 for product information.

Video InsightIP Video Encoders

Video Encoders allow users to convert analog cameras to IP. The encoders capture the image at a higher quality than most DVRs, which results in superior image quality from an existing camera. Each IP Video Encoder comes bundled with licens-es for enterprise-class Video Insight IP Video Sur-veillance software. www.video-insight.com.

ISC West Booth 25067Go to sp.hotims.com and enter 346 for product information.

DatacardSD360

The SD360 card printer issues two-sided ID cards at fast speeds. TruePick anti-jam card handling ac-curately picks cards and helps reduce the stress of a busy workday. Smart card encoding and double-sided printing produce more secure solutions for a range of applications including education, health-care and corporate needs. www.datacard.com/id.

ISC West Booth 2069Go to sp.hotims.com and enter 347 for product information.

Go to sp.hotims.com and enter 13 for product information. See us at ISC West Booth 3050.

0313sec_023_040_ISC_v3.indd 32 2/15/13 9:03 AM

Configuration Instructions:

1. Plug2. Play

PixelMaster Series NVRs provide uncompromisedfeatures and operation with minimal setup time.

The PixelMaster Series is ready to go—right out of the box. There’s no better time than now to “go HD”—and now the PixelMaster Series makes iteven easier.

www.computarganz.com

NY: 1-800-422-6707 CA: 1-877-407-9555 ©2013, CBC. All Rights Reserved. www.computarganz.com

P I X E L M A S T E R S E R I E S E M B E D D E D N V R s

THE SIMPLICITY OF TRUE PLUG AND PLAY OPERATION WITH 1080p REAL-TIME RECORDING.

Features:> 1080p real-time

recording

> Triplex operation

> H.264 compression

> Built-in PoE

switching HUB

> Automatic router

port forwarding

> Remote viewing

via web,

PC software

or smartphone

CBC (AMERICA) Corp.

Plug and Play with

IP Cameras with NO Configuration Required!

Coming SoonPixelMaster Pro Series8 and 16 Channelwith up to15TB HDD

Go to http://sp.hotims.com and enter 19 for product information See us at ISC West, Booth #22087

Untitled-3 1 2/13/13 3:13 PM

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

3 4

CIAS Elettronica SrlMurena PLUS

Murena PLUS is a remotely controlled digital mi-crowave transceiver, based on “fuzzy logic” analy-sis for outdoor protection such as facades, balco-nies, terraces and entrances. The transceiver generates two different Doppler frequencies. This allows the sensor to detect changes in the phase of the signals, which vary dependent on the posi-tion of the target and can therefore determine the distance, size and direction of the intruder related to the sensor itself. www.cias.it.

ISC West Booth 21091Go to sp.hotims.com and enter 348 for product information.

AvigilonHD Bullet

The 1-, 2-, 3- and 5-megapixel HD Bullet cameras offer illumination with adaptive infrared (IR) tech-nology. Delivering two times further vision, the camera enables users to capture details in com-plete darkness without a visible light source. The camera’s fully motorized lens adapts to changing conditions within a scene so images are never saturated and always sharp. Designed for all out-door environments, the easy-to-install camera provides discreet surveillance. www.avigilon.com.

ISC West Booth 9071Go to sp.hotims.com and enter 349 for product information.

Sentry360IS-IP14K

The IS-IP14K 14-megapixel camera measures 35x46x57 millimeters with an active resolution of 4,376x3,280. The camera can fi t into most enclo-sures, dome or fi xed housings, and is ONVIF-com-

pliant, making it accepted across an eco-system of video management systems. The unit features a low power consumption of 3 watts maximum. www.sentry360.com.

ISC West Booth 23139Go to sp.hotims.com and enter 350 for product information.

Pivot3vSTAC Watch

The vSTAC Watch is designed to deliver more ac-cessible, affordable and manageable IT functional-ity to video surveillance environments. The device adds support for 64-bit operating systems such as Windows Server products, introduces VMware

Go to sp.hotims.com and enter 32 for product information. See us at ISC West Booth 23101.

0313sec_023_040_ISC_v3.indd 34 2/15/13 9:03 AM

3 5

Fault Tolerant and Pivot3 VM Failover options for high-availability, and standardizes hardware man-agement on the Dell iDRAC management suite. www.pivot3.com.

ISC West Booth 25101Go to sp.hotims.com and enter 351 for product information.

Digital ID ViewIV-16CHNVR-1080p

The IV-16CHNVR-1080p is an NVR appliance built

on a virus-proof Linux platform. The NVR offers recording of 480 fps at 1080p (2-megapixel) reso-lution. With dual NIC ports and six SATA connec-tions, users can deploy the unit individually or display multiple units together using the free CMS software for distributed recording or combined with the IV-960H analog DVR. HDMI and VGA out-puts provide dual 1080p display. Four- and eight-

channel units are also available. www.idview.com.ISC West Booth 1122

Go to sp.hotims.com and enter 352 for product information.

Dakota AlertUT-2500

The UT-2500 is a universal transmitter with a magnetic door window contact. The transmitter works with any sensor or switch that provides an N/O or N/C contact. The devices can be used on a door or window or as a mailbox alert. The push button allows the transmitter to operate as a wire-less doorbell. The unit has a wireless range up to a half-mile to the DCR-2500 receiver. The receiver includes a 12-volts DC output as well as four form C relays to connect to nearly any control panel. www.dakotaalert.com.

ISC West Booth 19119Go to sp.hotims.com and enter 353 for product information.

The Housing CompanyPS042-BSS

The PS042-BSS brushed stainless-steel goose-neck pedestal is fabricated from 2-inch square stainless steel, not round tubing. Like all products from The Housing Company, the pedestal is 100 percent made in the USA, including source materi-als. www.thehousingcompany.com.

ISC West Booth 23143Go to sp.hotims.com and enter 354 for product information.

Topnos Inc./CTRINGCK5300 series

The HD-SDI DVR CK5300 series adopts the ad-vanced H.264 high-profi le codec for fast and reli-able performance. The DVR delivers full HD live monitoring and records up to 240 fps at 1080p for up to 16 channels. Features include four/

Go to sp.hotims.com and enter 32 for product information. See us at ISC West Booth 23101.

Store, manage and control keys, cards and small assets more

securely and efficiently with KeyWatcher Touch. Access is limited

to authorized users, and all transactions are recorded with

detailed reports available. The system will even automatically

email transactional information to any user – at any time. And

KeyWatcher’s convenient touchscreen makes removing and

returning keys easier than ever. With our modular design and full

scalability, it’s easy to see how we keep making key management

better. That’s Morse Watchmans’ outside the box thinking – right

inside the box.

morsewatchmans.com • 800.423.8256

0313sec_023_040_ISC_v3.indd 35 2/15/13 9:03 AM

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

3 6 0 3 1 3 | S E C U R I T Y P R O D U C T S

eight/16 HD-SDI video input (1080p, 1080i or 720p), full HD real-time live viewing, a maximum of 60/120/240 fps recording and HDMI and VGA outputs. www.ctring.com.

ISC West Booth 7056Go to sp.hotims.com and enter 355 for product information.

Fire-Lite AlarmsEmergency Command Center (ECC)

Emergency Command Center (ECC) is designed specifi cally for cost-effective single-building ap-plications, such as schools, churches, malls, healthcare facilities, military facilities, theaters, restaurants, factories and warehouses. The modu-

lar and fl exible system helps property managers get maximum functionality to get the message out. ECC helps installers too as they only need to learn one system and quickly apply that knowledge to a wide range of applications. www.fi relite.com.

ISC West Booth 11031Go to sp.hotims.com and enter 356 for product information.

DSIInvisigate

Invisigate Glass Barrier Turnstile delivers tight se-curity and high-speed throughput while comple-menting today’s lobby aesthetics, allowing organi-zations to fl exibly meet their unique access control needs. The barrier height spans 4 inches to 6 feet. The “hard lock” option simplifi es after-hours op-eration and reduces personnel requirements. The ADA-compliant turnstile meets ANSI/BMHA stan-dards and accommodates up to 30 to 45 people per minute. www.dsigo.com.

ISC West Booth 9129Go to sp.hotims.com and enter 357 for product information.

HoneywellMAXPRO Cloud 3.0

MAXPRO Cloud 3.0 offers users the option to store video in the cloud or locally. Instant email alerts using direct clip link notifi es users if there is an event or system problem, which means no more searching through hours of video. The MAXPRO Cloud Dashboard enables users to monitor facili-ties in real time to ensure the safety and security of all assets. www.maxprocloud.com.

ISC West Booth 14023Go to sp.hotims.com and enter 358 for product information.

LILINNVR Touch

NVR Touch series of standalone network video

THE FUTURE IS IP THE FUTURE IS IP

ALL CORTEX CYBORG & T4 G620 ARE DESIGNED & DEVELOPED IN HOUSE BY QVIS R&D

Remote viewing via 'Qvis Viewer App'

MIGRATE TO FULL 32 CHN IP WITH NO ADDITIONAL HARDWARE

CALL TOLL FREE - 877-557-7847www.qv i s secur i t y. com | sa les@qv issecur i t y. com

®

SCAN TO VIEW OUR WEBSITEAUSTIN, TX, USA

®

3.6mm, 2MPFIXED LENS

FROM $159CCEYE-2801

FROM $159CCINT-2802

FROM $239CCP400-2801

3-12mm, 2MPVARIFOCAL LENS

FROM $319CCVAN-2801

FROM $239CCINT-2801

FROM $399CCP400-2802

R E C O M M E N D E D I P C A M E R A S

CYBORG G620 HYBRID32 CHANNEL HYBRIDCYBORG G620 HYBRID32 CHANNEL HYBRID

16CHNS D1,16CHN 2MP IP (ALL AT REAL TIME)16CHNS D1,16CHN 2MP IP (ALL AT REAL TIME)

T4 G620 1080P16/32 CHANNEL NVR2MP Real T ime EVERY CHANNEL2MP Real T ime EVERY CHANNEL

T4 G620 1080P16/32 CHANNEL NVR

- ALL CAMERAS UTILIZE THE LATEST ‘IMX136 SONY EXMOR CCTV-SPECIFIC SENSORS’, INCLUDING TRUE WDR

SCAN FOR MORE DETAILS

IMX136 SONY EXMOR SENSORS

Multi Mode technology

CYBORG-RACKH-32-4TB $1,345 CYBORG-RACKH-32-8TB $1,469CYBORG-RACKH-32-12TB $1,699CYBORG-RACKH4U-32-4TB $1,519 CYBORG-RACKH4U-32-8TB $1,649CYBORG-RACKH4U-32-12TB $1,899

(4U)

T4-16G620-4TB $899T4-16G620-8TB $1,199T4-16G620-12TB $1,449T4-32G620-4TB $1,099 T4-32G620-8TB $1,359T4-32G620-12TB $1,599

(2U)

(2U)

(2U)

Go to sp.hotims.com and enter 10 for product information.

0313sec_023_040_ISC_v3.indd 36 2/15/13 9:03 AM

avigilon.com

See more with one camera.

The Avigilon HD PTZ camera with 20x optical zoom delivers 360° of unprecedented image detail.

Combined with our Avigilon Control Center 5.0 software featuring HDSM™ technology, you can

now accurately track moving objects with near-zero latency to help monitor your valuable assets,

and recognize facial details over 900 feet away. Learn more about the HD PTZ camera at

avigilon.com/PTZ or speak to one of our product experts at 1.888.281.5182.

See us at ISC West, Booth #9071 • Go to http://sp.hotims.com and enter 51 for product information.

Untitled-3 1 1/31/13 2:18 PM

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

3 8 0 3 1 3 | S E C U R I T Y P R O D U C T S

recorders provides an HD IP surveillance solution for virtually any application. The NVRs come em-bedded with LILIN’s license-free software, which features an easy-to-use touch screen interface similar to that of a smartphone. Available in four-, nine and 16-channel options, the NVR can re-

cord up to 16 channels of 1080p at 30 fps, while offering the storage capacity of up to 24 TB. www.meritlilin.com.

ISC West Booth 26041Go to sp.hotims.com and enter 359 for product information.

HoneywellequIP Series

The equIP Series now includes 720p and 1080p high-defi nition cameras. The cameras comply with open-integration standards, such as ONVIF and

PSIA, and integrate seamlessly with existing ana-log cameras. This reduces the cost of upgrading from analog to IP cameras by enabling the cam-eras to integrate with industry-compliant video surveillance systems. The cameras are available in a variety of housing options such as PTZ domes and fi xed mini-domes for both indoor and outdoor applications. www.honeywell.com/security.

ISC West Booth 14023Go to sp.hotims.com and enter 360 for product information.

THRIVE IntelligenceVideo Security as a Service

THRIVE Intelligence provides video security as a service by delivering a complete end-to-end solu-tion—from the camera to the Central Command Center located in Dallas, Texas. The service uses a combination of technologies, analytics, and real-time, event–based monitoring by experienced se-curity intervention specialists.  Integrators with THRIVE have access to a complete suite of re-sources and training and enjoy recurring monthly revenue. www.thriveintelligence.com.

ISC West Booth 10133Go to sp.hotims.com and enter 361 for product information.

LineareMerge E3 Series

The eMerge E3 Series offers embedded, browser-based access control. The system features one-door/two-reader capability and is upgradeable to four doors/eight readers in software. Additional features include a 100% solid-state design for ex-

TOTUS Solutions is the leading provider of Outdoor Lighting Based Security Platforms. Unlike traditional surveillance systems, TOTUS Security Platforms™ incorporates optimized LED lighting, complete megapixel IP video surveillance, multi-day media storage, and secure wireless communications with event action processing to provide unparalleled Active Deterrence.™

TOTUS Security Platforms™ also provide up to 70% energy savings versus the legacy streetlights through the use of improved LED technology.

WORLD’S FIRST OUTDOOR LED LIGHTING BASED SECURITY PLATFORM

L I G H T I N G S U R V E I L L A N C E C O M M U N I C A T I O N

1 - 8 7 7 - 2 6 1 - 3 4 3 2 W W W . T O T U S - S O L U T I O N S . C O M

Totus Applications:

Parking Lots Campus Pedestrian Walk Way Critical Infrastructure Public Transit

LIGHTING

SURVEILLANCE

COMMUNICATION

Go to sp.hotims.com and enter 1 for product information. See us at ISC West Booth 4115.

0313sec_023_040_ISC_v3.indd 38 2/15/13 9:03 AM

WHAT SECURITY DEMANDS, DATACARD

®

ID SYSTEMS DELIVER.

Whatever you need for a secure ID card program, you can get it from a Datacard® system.

Datacard offers ID card printers, software and supplies — plus 40 years of experience and

the support of authorized Datacard providers worldwide. To contact a provider near you,

call +1.800.621.6972 or visit datacard.com/id.

Datacard is a registered trademark and/or service mark of DataCard Corporation in the United States and/or other countries. ©2012 DataCard Corporation. All rights reserved.

Untitled-11 1 1/18/12 4:32 PM

See us at ISC West, Booth #2069Go to http://sp.hotims.com and enter 76 for product information.

PRODUCT SOLUTIONSISC WEST PRODUCT PREVIEW

4 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

tended service life, an embedded Linux operating system, an easy-to-use set up wizard and inte-grated inputs/outputs for enhanced functionality. www.linearcorp.com.

ISC West Booth 11097Go to sp.hotims.com and enter 362 for product information.

Transponder and Reader Engineered Systems

tres SmartLoopThe tres SmartLoop wireless vehicle detector is de-signed to eliminate the need for inductance loops to detect the presence of vehicles. Users can install

loops in 30 minutes, which saves money on labor and materials and reduces the amount of time that lanes are closed. The sensors contain battery(ies), three axis magnetometers and an RF transmitter. The control board contains an RF transceiver and N/O or N/C relays. www.tresrfsolutions.com.

ISC West Booth 23141Go to sp.hotims.com and enter 363 for product information.

CyberLock Inc.Flex System Door Controller

The Flex System Door and I/O module enables communication with Flex System and third party Wiegand compatible inputs and outputs. The modular mix-and-match confi guration of the sys-tem is designed to increase security and control as it offers the choice of various forms of authen-tication. The user may employ a credential plus PIN code, the keypad code or the credential only. The system furthers the capabilities of the CyberLock access control system of electronic lock cylinders and programmable smart keys. www.cyberlock.com.

ISC West Booth 21123Go to sp.hotims.com and enter 364 for product information.

Mier Products Inc.Temperature Controlled Enclosures

Temperature Controlled Enclosures are used to pro-tect fi re-panels, DVRs, camera and gate systems, fi ber-optic cable and other electronics mounted in-doors, outdoors and in extreme environments. The line of more than 60 products features new items such as seven non-metallic models for wireless ap-plications and highly corrosive environments, and six rack-enclosure models which include an internal 12-RU rack. www.mierproducts.com.

Go to sp.hotims.com and enter 365 for product information.

Samsung provides customers with a comprehensive line of IP security products that include

network cameras, NVRs, monitors, license-free viewing and recording software, mobile viewing

solutions, layer 2 switches, controllers encoders and much more. To see the full line of Samsung

Security products visit samsung-security.com.

Total IP Security Products

877-213-2333

www.samsung-security.com

Go to sp.hotims.com and enter 60 for product information. See us at ISC West Booth 1071.

0313sec_023_040_ISC_v3.indd 40 2/15/13 9:03 AM

Crank up your document destruction program with Destroyit business shredders.

HIGH VOLUMEis what we do.

HIGH VOLUMEis what we do.

Destroyit business shredders are specially designed for high volumeshredding in fast-paced corporate environments. Unlike cheaper brands,

they are engineered to stand up to years of heavy office use. The hardenedsteel cutting shafts tear through paper clips and staples, and most modelswill shred CD’s. It’s unlikely that you’ll ever wear out the cutting shafts on aDestroyit, but if you should, they’re covered by a lifetime warranty.

Fast, quiet, and efficient, Destroyit business shredders are the first line ofdefense against data theft and the smart alternative to using a mobile

shredding service—strangers are not handling your documents, and nothingleaves the building intact. What’s more, the cost won’t shred your bottom line.

The Destroyit line has over 40 models, from compact deskside machinesto high capacity models with 600+ sheet capacities. Six security levels areavailable, and each machine is equipped with industry-leading safety features.Whatever the requirements, Destroyit has the right business shredder forevery application. Contact MBM today for more information on Destroyit—the shredders that do high volume.

Untitled-2 1 1/12/12 4:52 PM

Go to http://sp.hotims.com and enter 3 for product information.

4 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

The effectiveness of access control really comes down to local de-cisions made at each door. However, enterprise systems are de-ployed and managed on a global scale, which presents a chal-lenge of how to manage all those local access control decisions effi ciently and effectively.

Access control has mastered automation at the local level when decisions are automated to ensure effi ciency at the individual door. It’s quite simple. If a person wishing to enter a building possesses a credential, knows a keypad number or can demonstrate who he or she is based on a biometric such as a fi ngerprint scan, the door opens automatically without human intervention. Without that automation, a security offi cer is needed in order to grant access.

Automating access control on a global scale is a different endeavor. Typically, identity data must be entered manually into a system to produce a credential. If there are multiple access control systems, as there often are in large organizations, the data has to be entered several times, necessitating signifi cant staff involvement to manage access control.

Information must be programmed into each system about where each user is authorized to go within a building or location. There are rules about when and where someone has access, and those rules have to be inputted manually as data in each different access control system for each location. Without global automation, the rules may be inconsistent, written down and fi led away in a paper document, or simply remembered by a longtime employee. All of these manual functions weaken the effectiveness of the access control utility.

Software drives access control automation. There are solutions for additional automation at all levels of access control and identity management, specifi cally at the enterprise level. Unifying the elements of identity and access control systems can be achieved using software. Software can store and update the rules of access control and the identities of the users and can interface with each system to pro-vide information to enable every localized access control decision.

Most important, software can build a layer across many disparate systems to

create a single identity for each individual in the organization. Integrating physi-cal with logical security systems, software can ensure synchronized and policy-based on- and off-boarding of identities and their physical access levels across multiple systems.

This transformation of an enterprise’s identity and access control operation involves two types of automation.

Process automation. By automating more processes, software can minimize human involvement, human error and the costs associated with both. Manual processes are a weak link in any organization’s identity management system. In-accuracy is one issue; another is neglect. The multiple tasks competing for an em-ployee’s time and attention might lead even a good employee to neglect or delay a manual task related to identity management. In either case, the result is an unac-ceptable level of risk to the organization.

An identity might not be properly on-boarded, off-boarded or vetted. Manual processes also create a separate data silo of information that doesn’t interface with any other system within the organization and is not part of a unifi ed system of identity management. Automating manual processes ensures effi ciency and accu-racy while eliminating multiple big—and unacceptable—factors that can under-mine an enterprise’s security.

Rules automation. Rules-based software can bridge the gap between technology and operations by integrating adherence to security policies as part of a unifi ed identity management program. A company’s rules of operation—who has access where and when, as well as any regulatory requirements—can be incorporated into the software. Software can automate and enforce global physical security poli-cies and help to ensure both governance and compliance using an organization’s existing physical security and IT infrastructure. Unifying hardware solutions with security policies using rules-based software that is custom-confi gured to a site’s specifi c needs is a cost-effi cient and effective route to managing risk. Automation adds value both by ensuring compliance with enterprise rules and regulatory re-quirements and by doing so at a lower cost.

ACCESS CONTROL

AUTOMATE YOUR

ACCESS CONTROL

It all comes down to managing effi ciently and effectively

By Ajay Jain

0313sec_042_044_Jain_v3.indd 42 2/14/13 4:06 PM

See us at ISC West, Booth #26041Go to http://sp.hotims.com and enter 31 for product information

Untitled-3 1 2/11/13 11:13 AM

ACCESS CONTROL

4 4 0 3 1 3 | S E C U R I T Y P R O D U C T S

Benefits of more automation. There is a signifi cant need for more automa-tion at the management level of ac-cess control systems. Administering multiple systems and keeping up with identities throughout the organization takes time and energy from the secu-

rity department—time and energy that could be better spent on other security contributions. Existing systems may be inconsistent or poorly enforced, which also compromises security.

Software-based automation can benefi t today’s companies in a wide

range of ways.Compliance. Software enables or-

ganizations to automate compliance initiatives in real time and to create a transparent, traceable and repeatable global process to manage governance and compliance. Strict governance of

security controls across both physical and IT infrastructures and managing risk on a holistic level enable compli-ance to regulations such as Sarbanes-Oxley, ISO 27000, NERC/FERC and CFATS. Software features include real-time monitoring and remediation, built-in risk analysis and compilation of key data across the physical security infrastructure.

A closed-loop approach automates assessment and auto-remediation based on user-defi ned controls. Integrated in-fraction management automatically triggers notifi cations and/or changes access privileges. Software defi nes, au-dits and enforces segregation of duty (SOD) policies across the physical in-frastructure.

Cost reduction. Most physical se-curity operational costs are tied into management of identities, events and compliance across multiple physical security systems. Automating these systems lowers costs and contributes to greater effi ciencies, while streamlin-ing operation lowers operational costs. Unifying hardware solutions with secu-rity policies using rules-based software that is custom-confi gured to a site’s specifi c needs is a cost-effi cient and ef-fective route to managing risk.

Better security. Manual processes can lead to weakness in security, such as if an identity is not off-boarded in a timely manner. Access control systems that operate effi ciently and interoper-ably contribute to more consistent and stronger security.

Managing information corporate-wide. Software that addresses identity and access issues enterprise-wide also represents the point of convergence of physical and logical security systems. Identity management is that point of convergence, control of identity re-lated to physical systems and logical systems, which equates to a new level of security for all systems. Software both automates management of physi-cal access control systems and enables incorporation of these systems into an overarching identity management sys-tem that includes all facets of an opera-tion, providing associated cost, opera-tional and regulatory benefi ts at every level of operation.

Ajay Jain is the presi-dent and CEO of Quantum Secure.

Go to sp.hotims.com and enter 20 for product information. See us at ISC West Booth 1122.

0313sec_042_044_Jain_v3.indd 44 2/14/13 4:06 PM

ONLY TALK-A-PHONE PROVIDES THE

DEDICATED SUPPORT YOU NEED FOR

VIRTUALLY ANY SITUATION — STANDARD.

“ I like that Talk-A-Phones are always changing.

The company looks at the environments to

see if there are any special needs within the

community and then adapts to those needs.”

– Mike Belcher, Director of Public Safety,

University of the Pacifi c

Discover the Talk-A-Phone difference.Get the full story at www.talkaphone.com/pacifi c or call 773-539-1100.

OUR SUPPORT EXCEEDS HIGH EXPECTATIONS.

TALK-A-PHONE CO. EMERGENCY COMMUNICATION | MASS NOTIFICATION | AREA OF RESCUE

TALK-A-PHONE’S VOIP-500 SERIES PHONE has tested compatible with Cisco UCM 7.1 and UCM 8.6. Go to www.cisco.com/go/compatibledisclaimer for complete disclaimer.

TALK-A-PHONE PROUDLY PARTNERS WITH:

FLUIDMESHNETWORKS

A Carrick Bend Company

SEE US AT ISC WEST BOOTH 12107

Go to http://sp.hotims.com and enter 49 for product information.

Untitled-5 1 2/1/13 11:02 AM

4 6 0 3 1 3 | S E C U R I T Y P R O D U C T S

REMOTE MONITORING

TECHNOLOGY ADVANCEMENT Administrator has capability to monitor, analyze and troubleshootBy Joseph Goudlock

Although many current security systems rely on personnel monitor-ing video, physical alarm activation and manual response relays, a budding interoperable suite of technologies has stepped into the arena of security products—a system is sometimes known as re-mote network monitoring (RMON).

RMON provides its administrator the capability to monitor, analyze and trou-bleshoot a multitude of security threats from a distance. Keywords: from a dis-tance—what’s the point of security if you have to put yourself in harm’s way?

Fortunately, security product manufacturers have worked to address this co-nundrum by developing a remote solution. As the name implies, remote monitor-ing systems allow the operator to operate safely when confronting an intruder. A large amount of commercialization surrounding these systems started with do-mestic disturbance response teams, but remote monitoring systems have increased their popularity through commercialized vendors that couple cable, Internet and phone bundles as an aggregated set-up. They are full-service security design and integrators, if you will.

Specifi cally addressing the security industry in this feature, remote monitoring technology is what we believe to be a star product—a budding invention that is increasing in market share and at the same time holds a wealth of potential for market growth. Simply put, if you are a manufacturer of security products or a representative thereof, you will want to be on the lookout for remote monitoring as a common integration in future security systems.

The relevance of this continued development created a major focus in the se-curity products and integrated technologies industries. One solution to come from this is the connection of multi-tiered video monitoring systems with sound-ac-tivated alarming RMONs. For example, a fi ve-story parking garage, eight valet parkers assigned a set section of operation, one cashier, a central command center with 23 video monitoring screens for two security offi cials to watch, and possibly, a patrol unit for all parking levels.

Given today’s economy, that type of staffi ng is quite common-place, but may not be suffi cient. This is why security professionals are called in to support physi-cal security systems. Even with a multi-zone video monitoring system, it’s quite hard to diligently monitor multiple security zones without obvious notifi cations. A car alarm though, picked up by the strategically valued placement of an audio monitoring device linked to a RMON, would provide an integrated security solu-tion and the opportunity for a safe response. In alarm mode, an audio monitoring device would activate an IP network system and the zone it’s linked to, drawing proper attention to an area of alarm or distressful situation. Additionally, net-work-based, audio remote monitoring systems act as a second-response device, which satisfi es local law enforcement requirements to investigate a location with-out the need for physical confi rmation.

Intrusion, SHRINK (inventory loss prevention), and most of all endangered security staff are just a few of the reductions you will notice when integrating and

upgrading a customer’s security system to value a remote monitoring facility.Before getting started, it is important to recognize that a remote monitoring

system connects to a management information base (MIB), is the source of most network security systems and links to asset protection and retrieval. The manage-ment of this security system, whether commercial or residential, can become quite complicated with the introduction of multi-zone monitoring. Subsequently, the actual monitoring of a security network may not be so simple; this makes the cost-analysis of an asset protection system a multi-tiered practice. A fi nal point to take into account is that there are two types of remote monitoring systems, referred to as RMON1 and RMON2.

RMON1 MIB, a remote monitoring system for a security system’s manage-ment information base, consists of 10 groups. RMON1’s focuses is on alarms set to defi ned thresholds, real-time LAN statistics, and even alerts simple network management protocol (SNMP) for the aforementioned alarm focuses. We’re talk-ing perimeter security. A RMON2 MIB system adds 10 more groups to remote monitoring security technologies that generally consist of protocol directories and network hosts. In fact, you may be interested in further researching “RMON2 MIB Probe Specifi cations.”

Remote monitoring system software agents technically, and most specifi cally, gather visual information to present a security administrator. But, they can be implemented in a variety of ways to make situations, such as perimeter security and access control, more effi cient. IP network video security systems, easily com-plimented by compatible audio monitoring microphones, are excellent for intru-sion detection, and subsequently fi nds RMONs commonplace in requests for com-ments amongst the Internet Engineering Task Force (IETF).

Let’s address the legality of that audio integration with a remote monitoring system. Although states hold their own individual laws, they are compatible with the federal statutes that require the removal of the expectation of privacy. Just as there are signage notifi cations of “Video Monitoring on These Premises,” a simply visible signage of “Audio Monitoring on These Premises,” gives a security opera-tor the legality to manage the safety and security of the assets and activities in the vicinity of audio monitoring deployment.

The reasoning behind doing this is simple—the quicker you can respond to a problem, the quicker it can be solved. We have observed a recent increase in the use of remote monitoring systems and have drawn the conclusion that it can be attributed to the specifi city remote monitoring provides for un-manned security networks, multi-zone security management, and safety protocols.

There are a vast array of security product suppliers you’ll fi nd moving into this market, and as technology advances, so does safety. What retains remote monitor-ing as a market driver in the world of security products is the need for that safety—a need for protection that doesn’t sacrifi ce the safety of a single individual. You can even link your RMON with a two-way audio monitoring system to speak to a potential violator of safety and securities, making it known that they are being

0313sec_046_048_Goudlock_v3.indd 46 2/14/13 4:07 PM

Revolutionary Iris Identity Management

The Eyes Have It.

STANLEY – YOUR PARTNER IN INNOVATION

Stanley introduces one of the most advanced, cost-effective and efficient biometric identity management

systems available. Until now, generations of iris, retina, fingerprint and hand geometry readers required

users to stand in place until their identity could be verified. Stanley’s EyeLock readers capture user’s iris

code data at a distance and in motion while the individual is approaching. Second only to an individual’s

DNA, the iris remains a proven biological constant, well beyond that of fingerprints—providing the utmost

in security. Additionally, access control users can rest assured that the only information being collected

from them is a high definition photograph of their iris. Whether the security entry point be a high throughput

turn-style, office door or parking gate, Stanley’s EyeLock biometric readers ensure maximum convenience

with unprecedented accuracy.

THAT’S THE NEW GENERATION OF IRIS IDENTITY MANAGEMENT. THAT’S STANLEY SECURITY SOLUTIONS.

0 1 0 . 0 1 1 1 . 0 1 0 0

A C C E S S : G R A N T E D

A B

1 0 0 . 8 5

6 . 2 8

Stanley breaks through the traditional barriers of biometric access control with its EyeLock in-motion iris identi-fication line of readers.

1-855-285-0006 www.stanleycss.com/eyelock

EYELOCK NANO

EYELOCK NANO TS

See us at ISC West, Booth #39011 • Go to http://sp.hotims.com and enter 53 for product information.

Untitled-24 1 2/12/13 4:51 PM

REMOTE MONITORING

4 8

caught visually and audibly on camera. Also, an operator can take comfort in knowing that the “secondary verifi cation” from their remote monitoring device just notifi ed the authorities of their whereabouts.

Plus, you don’t have to sacrifi ce fi nancial resources. Instead of elaborating on the impact a decrease in security staff requirements and a non-recurring capital investment in the integration of a remote monitoring security camera with an au-tomated audio alarming response system would deliver in a commercial environ-ment, focus on a unique benefi t provided by integrating remote monitoring with your MIB. Connecting a RMON via a PoE, connection. A PoE connection passes electrical power, safely, along with the data transfer from your remote monitoring system, to your MIB. The connection works between power-requiring devices and the security management system (SMS). The power transfer of a PoE system is modest, delivering12 watts to support the VMS and AMS of your remote moni-toring system.

While a PoE system has a reach of 100 meters (330 feet), the distance won’t be much of a factor. Now that the security product manufacturer’s market has caught wind of the popularity and deployment potential behind remote monitoring sys-tems, the technological advances have begun.

Wireless integration, connected and inter-operating with both commercial and residential remote monitoring devices, offers placements where cables are not even feasible. Connecting security monitoring devices where best positioned, you can now take advantage of how Wi-Fi data acquisition (DAQ) benefi ts your security strategy. The implementation of Wi-Fi DAQ with remote monitoring systems al-lows the operator to access data and/or be informed of situations via most Web-enabled devices. This works hand-in-hand with issues such as perimeter security. Using remote monitoring systems, security or managerial staff can implement an access control system by linking a wireless remote monitoring system to unmanned entrances, or areas that require more sensitive approaches like power transmission and distribution facilities. Today, real-time control of your environment can mean

the difference between an incidental loss and a conviction. If you prefer a more di-rect connection to your security network, Ethernet cables connecting your RMON to your control center can allow for the control of data, for example, over a secure IP network.

A remote monitoring device is designed for enhancing integrated security sys-tems; the RMON’s typically operate in a client/server model relation, and can be linked to device-based management. An advantage of these systems is that remote devices can shoulder the management of your information acquisition, and can be paired with audio devices, network cameras and home secu-rity systems. Contact a local vendor today to see the cost-analysis of your asset protection by implementing a multi-tiered remote monitoring security system.

Joseph Goudlock is a marketing communications specialist for Louroe Electronics.

Go to sp.hotims.com and enter 37 for product information. See us at ISC West Booth 10107.

0313sec_046_048_Goudlock_v3.indd 48 2/14/13 4:07 PM

See us at ISC West – Booth 2063

THE SINGLE-SOURCE SOLUTION FOR ALL YOUR TRANSMISSION PRODUCTS

Only One Company Can Put All The Pieces Together

No Matter What You Need to Transmit, ComNet has Your Solution with the Industry’s Most Complete Line of Transmission Equipment

Fiber Optic, Wireless or COAX/UTP› Fiber Optic Audio, Video & Data

› Fiber Optic EthernetManaged Ethernet Switches and Media Converters with or without PoE+

› CopperLine® Extenders Ethernet over UTP/COAX Distance Extenders

› NetWave™ Wireless EthernetPoint-to-Point and Point-to-Multipoint

› Free Design Center Application Support

› Pre & Post Sale Technical Support – USA Based

Visit: www.comnet.net Email: [email protected]: 1-203-796-5300 Toll Free: 1-888-678-9427

Go to http://sp.hotims.com and enter 15 for product information.

Untitled-7 1 2/7/13 11:20 AM

PRODUCT SOLUTIONS Compiled by Lindsay Page, Associate Content Editor

ACCESS CONTROL

5 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

Dortronics 7201 Series LEDs

Dortronics Systems Inc. 7201 Series hi-intensity LEDs are highly visible in virtually any lighting con-dition, including bright sunlight. Door security sta-tus can be immediately conveyed to system users and security personnel. The weather-resistant units are ideal perimeter access control gates ex-posed to the weather. If mounted near card read-ers, the LEDs can be used to clearly indicate when individual doors and/or gates can be accessed. Perfect for industrial applications, these LEDs are easily seen when viewed from a truck cab or fork-lift. Dortronics.

Go to sp.hotims.com and enter 368 for product information.

Open Options, Schlage, Mercury Security

PIM400-150

Open Options offers wireless control of up to 16 Schlage AD-Series devices with the new PIM400-1501 when combined with their DNA Fusion access control solution. The PIM400-1501 combines the strength of the AD-Series wireless PIM400 with a custom intelligent controller from Mercury Security to provide a complete and cost effective IP address-able access control solution for up to 16 wireless AD Series devices. The PIM400-1501 is pre-wired with

external RJ-45 and USB connections and can be Powered over Ethernet (PoE) or external 12VDC sup-ply to provide a compact solution that simplifi es in-stallation. Open Options, Schlage, Mercury Security.

Go to sp.hotims.com and enter 369 for product information.

Altronixe-Bridge

The Altronix eBridge Plus IP over Coax Ethernet adapters support IP video and access control data while providing power over conventional coax ca-bles. The adapters allow users to easily and cost-effectively upgrade coax infrastructure to accom-modate a wide variety of PoE and PoE+ compliant IP cameras and devices, while also eliminating the need to purchase and install local power supplies. Designed for plug-and-play installation, eBridgeP-lus transmits video / data and power up to 1500 feet without the need for repeaters. The eBridgeP-lus 1PCRT kit includes the eBridge1PCR receiver and the eBridge1PCT transceiver. Altronix.

Go to sp.hotims.com and enter 370 for product information.

Secura Key SK-ACPE-LE

Secura Key’s new SK-ACPE-LE 2-door access control panel, based on the powerful ARM Cortex

M3, 32-bit RISC processor, provides a major tech-nology upgrade to the legacy SK-ACP panel. The panel features onboard Ethernet and RS485 com-munications lines hardened with gas discharge tube surge suppression. The SK-ACPE-LE boasts a 3-Amp heavy-duty power supply with power line noise immunity, and it continually monitors backup battery status. The SK-ACPE-LE is a drop-in re-placement for the SK-ACP, with identical fi eld wire connections and compatible functionality. The ARM platform will enable future enhancements and system upgrades. Secura Key.

Go to sp.hotims.com and enter 371 for product information.

Camden Door ControlsCM-120 Series Keypads

The CM-120 Series Keypads (CM-120i and the CM-120wV2) by Camden feature a Wiegand out-put, fully independent relays and an optional plug-in Lazerpoint 2-channel wireless transmitter. The keypads also include the “Camden Tough” fl ush mount for sturdy installation. The CM-120i has an indoor digital keypad, and the CM-120wV2 is weather and vandal resistant with a backlit, metal keypad.The keypads utilize Lazerpoint RF 2-chan-nel spread spectrum communications to provide reliable wireless operation. Camden Door Controls.

Go to sp.hotims.com and enter 372 for product information.

Sielox AnyWare Web-browser Solution

The AnyWare Web-browser solution from Sielox offers access control from anywhere, at anytime. This plug & play web-browser solution utilizes an IT-Friendly network appliance, and is ready to con-fi gure in minutes. Coupled with IP-ready 1700 controllers, the solutions provides a cost-effective, easy to use access control feature set. Control and manage your small to mid-size business from desktop, tablet or mobile device through any web browser. Sielox.

Go to sp.hotims.com and enter 373 for product information.

Delta Scientifi cPneumatic Bollards

Federal buildings, corporate headquarters, court-houses, military bases, facilities and other com-plexes, from airports to seaports, which need to protect people and property, are all proponents and users of Delta pneumatic bollards. Consider-ing power requirements as well as installation, operating and maintenance costs, Delta’s pneu-matic bollards are 60 percent (60%) more effi cient and cost-effective than electro-mechanical units. They are aesthetic, durable, fl ood-resistant and provide up to 300 cycles per hour. Customers needing all-weather, crash-resistant bollards are turning to pneumatic designs. Delta Scientifi c.

Go to sp.hotims.com and enter 374 for product information.

DoorKing RF Receiver 8040

DoorKing has added a new multi-purpose receiver to its line of RF access control products, providing longer range operation, easy programming and a low power draw feature that makes it an ideal ac-cessory for solar powered applications. The model 8040 is a multi-purpose RF receiver that can be used in a variety of access control applications. For stand-alone applications, a dry contact relay is provided for door or gate operator activation, or for magnetic or electric door strike release. The re-ceiver can also be programmed for 26, 30 or 31-bit Weigand output, making it compatible with most access control systems. DoorKing.

Go to sp.hotims.com and enter 375 for product information.

Onity Inc.O.W.L.

The Onity Wireless Lock (O.W.L.) offers decision

Access control is the system used in order to authorize the entry of only approved employees, visitors and others into a specifi c area. For physical security, ac-

cess control devices may be enforced by personnel, such as a guard, or with a device, such as a turnstile or reader. Access control can also be achieved by mechanical means, such as locks, keys and systems. Essentially, access control is used to

allow authorized personnel into a specifi c building or perimeter, allowing busi-nesses, schools and other facilities the ability to deny access to those that are not on approved lists or to deny those who may potentially pose a threat to others.

0313sec_050_053_PS_access_v3.indd 50 2/15/13 9:04 AM

Over 15,000 Systems InstalledTransportation hubs, ports, public water supply & control districts, military bases, courthouses and other facilities around the world are protected by

Go to www.deltascientific.com for full details & specifications.

40355 Delta Lane, Palmdale, CA 93551 1-661-575-1100 [email protected]

U.S. CAPITOLDelta TT210 Bollards

UK EMBASSY, BUDAPESTDelta DSC1100 Barricade

BERTH LIMA—SAN DIEGODelta TT280 Linear Crash Gate

REAGAN LIBRARYDelta DSC8000 Bollards

CITIFIELD STADIUM— NEW YORK METSDSC1200 Barricade

U.S. FEDERAL COURTHOUSE— LOS ANGELES

Delta Fixed Bollards

SINGAPORE PARLIAMENTDelta DSC720 Bollards

U.S. DEPARTMENT OF STATEDelta TT210 Bollards

SOCIAL SECURITY BUILDING, DCDelta IP5000 Portable Barrier

LOS ANGELES INTL. AIRPORTDelta SC3000 Sliding Gate

U.S. EMBASSY, YEMENDelta DSC501 Barricade

UNIVERSAL STUDIOSDelta Booth

PENN STATEDelta MP5000 Mobile System

BUCKINGHAM PALACEDelta DSC720 Bollards

Stop By & See Us atISC West Booth

17143

Go to http://sp.hotims.com and enter 63 for product information.

Untitled-24 1 2/12/13 4:27 PM

PRODUCT SOLUTIONSACCESS CONTROL

5 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

making at the lock. Because it employs stand-alone power and an intelligent on-board internal database, the system allows facilities to continue operation and secure rooms - for up to 5,000 cardholders. O.W.L. continues to operate, grant or deny access, and perform even when power and/or network connectivity are lost. Having the con-

troller technology built into the lock offers a smart inexpensive solution to door wiring and network infrastructure. Onity Inc.

Go to sp.hotims.com and enter 376 for product information.

Monitor DynamiciTRUST

Monitor Dynamics’ iTRUST door security sys-tem delivers the simplicity of traditional access control combined with the power, fl exibility and remote management capacity of the Internet. The

system uses dual-path IP connectivity, PoE and Internet-based confi guration, management and reporting to give businesses an easy-to-install, turn-key access control package for up to 32 doors. The product’s IP infrastructure allows se-curity dealers to professionally manage, monitor and host a client’s access control system remote-ly. Monitor Dynamics.

Go to sp.hotims.com and enter 377 for product information.

CyberLockeCylinders

The CyberLock eCylinders offer an access control system of electronic locks and smart keys that provide users with a fl exible, affordable, and com-prehensive security solution. The eCylinders incor-porate existing mechanical lock hardware and are installed without power or wiring, dramatically re-ducing installation time and ensures a clean, streamlined appearance, maintaining the architec-tural integrity around the door. CyberLock.

Go to sp.hotims.com and enter 378 for product information.

Flex System Keyport

The Flex System Keyport is a rugged, weatherized multifunction access control module that is rich in both features and fl exibility. The Keyport can serve as both a CyberLock communication device and a Flex System input device. The Keyport downloads activity reports from CyberKey smart keys to the management software and updates the keys with new access schedules and permissions. As a Flex System input device, the Keyport can release any

Arecont Vision combines Wide Dynamic Range with 3 megapixel and 1080p HD image resolution. With the

perfect balance of bright and dark, now you can capture even greater detail in scenes with highly contrasted

lighting conditions. Our WDR technology makes it

possible by increasing dynamic range up to an incredible

100db while maintaining crystal clear images. It’s the

next generation of megapixel imaging solutions you’ve

come to expect from Arecont Vision – the industry leader

in megapixel imaging.1-877-CAMERA8 • 1-818-937-0700

[email protected] • arecontvision.comMADE IN THE USA

Now Wide Dynamic Range Comes with 3 Megapixel Resolution.

Conventional 3MP Image

3MP Image with WDR

Go to sp.hotims.com and enter 61 for product information. See us at ISC West Booth 9043.

0313sec_050_053_PS_access_v3.indd 52 2/15/13 9:04 AM

W W W . S E C U R I T Y - T O D A Y. C O M 5 3

Wiegand-compatible electric strike to unlock a door upon presentation of an authorized CyberKey, and can also trigger other security-related relay devices. CyberLock.

Go to sp.hotims.com and enter 379 for product information.

GenetecSynergis IP Access Control Software

Synergis by Genetec is an IP access control sys-tem that provides real-time monitoring of access events and alarms, as well as cardholder manage-ment and reporting. Its open architecture enables customers to reduce deployment time and cost by providing unmatched hardware freedom, allowing customers to use their existing access control in-frastructure. Genetec.

Go to sp.hotims.com and enter 380 for product information.

Ingersoll RandQuiet Suite Door Hardware

For areas that are used for sleeping, healing, study, concentration or the overall reduction of auditory disturbances, Ingersoll Rand Security Technologies has brought together a suite of products that pro-vide customers with whisper quiet latches and sound reducing exit devices. The suite includes a collection of Von Duprin products comprising push pads, latches and exit devices. The quiet suite eliminates the sounds of door hardware not no-ticed in standard locations. The motor-driven latch retraction provides a much quieter solution with fewer disturbances. Ingersoll Rand.

Go to sp.hotims.com and enter 381 for product information.

Tyco Security ProductsEntraPass Web

EntraPass Web by Tyco Security Products is a web user interface that provides remote access to En-traPass security management software. EntraPass Web features an interface that is simple to use and

easy to navigate. Using any workstation connect-ed to the internet, the product provides access to common security tasks including managing users, creating cards, setting access levels and request-ing reports. It supports video and intrusion integra-tion managed from the common interface. Able to scale up from small 4-door installations to enter-

prise scale applications, EntraPass Web grows as needs change and integrates with EntraPass Go mobile app, providing greater portability and inter-action. Tyco Security Products.

Go to sp.hotims.com and enter 382 for product information.

SALTO SYSTEMSElectronic Locking System

insp i redaccess

FOR MORE INFORMATION PLEASE CONTACT USSALTO Systems Inc.3073 McCall Drive - Suite 1 · Atlanta, GA 30340Phone: 770-452-6091

THE KEYLESS SOLUTION TO MECHANICAL KEY CONTROLThe SALTO Virtual Network - System Description

Visit usBooth

# 20065 #

Go to sp.hotims.com and enter 70 for product information. See us at ISC West Booth 20065.

0313sec_050_053_PS_access_v3.indd 53 2/15/13 9:04 AM

ENHANCE YOUR SECURITY!

FEATURING

HELD JOINTLY WITH

PRODUCED BY

Workshops: May 13, 2013Conference & Expo: May 14-15, 2013Walter E. Washington Convention Center

Washington, DC GovSecInfo.com

REGISTER

FOR THE

FREE EXPO

TODAY!

USE CODE:

PAG08

GovSecInfo.com

Free Agency Briefings Defense Logistics Agency, FBI, Industrial Control Systems Cyber

Emergency Response Team, DOS, and more!

Free Live Demos K-9 Explosive Detection Team and Police Cyclist Techniques.

Free Featured Presentations “Federal Grants for Homeland Security”, “Why Cybercrime Has

Become the Perfect Crime?” and many more!

Free Certification Sessions Homeland Protection Certification (CHPP & CHPA) and BCP Certification.

Free Keynotes & Special Presentations Including General Stan McChyrstal, Joe Theismann, and Lt. Colonel Dave

Grossman.

Exhibit Hall AccessFeaturing hundreds of cutting-edge products, services and solutions

showcased by leading security companies.

FREE EXPO INCLUDES:

*There is a $50 expo fee for industry contractors/suppliers.

Want more education?

Register for GovSec’s 2-day

conference with 45+ advanced level sessions.

Early bird prices end April 5!

Go to http://sp.hotims.com and enter 71 for product information.

See us at ISC West, Booth #5153

Untitled-24 1 2/12/13 4:59 PM

W W W. S E C U R I T Y - T O D A Y . C O M DS1

RESPONSE DIFFERENTIALSMonitored video alarms vs. self-surveillance DQ12

PROACTIVE APPROACH TO ALARMSReducing false alarms, saving emergency responders time DQ18

FAMILIARITY YIELDS GREATER VALUELong-term relationships offer multiple bottom-line benefi ts DQ22

DealerStrategiesBrought to you by

Q18 bottom line benefi ts DQ

Volume 3 | Issue 2 | March 2013

MORE THANSURVEILLANCE

SERVICES DQ4

TAKE A SMARTER PATHDQ6

IP VIDEO TECH TIPS DS10

0313sec_ds01_Cover_v2.indd 1 2/15/13 9:07 AM

DS2 0 3 1 3 | D E A L E R S T R A T E G I E S

ED

ITO

R’S

FO

CU

S

EDITORIAL STAFF

Editor-in-Chief/Associate Publisher Ralph C. Jensen

Print Managing Editor Rebecca Overton

E-News Editor Brent Dirks

Content Development Team Cindy Horbrook

Lindsay Page

Jessica Acklen

ART STAFF

Art Director Dale Chinn

PRODUCTION STAFF

Director, Print Production Jenny Hernandez-Asandas

Production Coordinator Teresa Antonio

SALES

Randy Easton 678-401-5543

Brian Rendine 972-687-6761

Benjamin Skidmore 972-587-9064

Sam Baird +44 1883 715 697

Jane Dai +86-755-26289889

Peter Kao +886-2-2949-6412

SECURITY, SAFETY AND

ENVIRONMENTAL PROTECTION GROUP

President & Group Publisher Kevin O’Grady

Group Circulation Director Margaret Perry

Online Sales Director Rick Neigher

Marketing Manager Susan May

President & Chief Executive Offi cer Neal Vitale

Senior Vice President & Chief Financial Offi cer Richard Vitale

Executive Vice President Michael J. Valenti

Vice President, Finance & Administration Christopher M. Coates

Vice President, Erik A. LindgrenInformation Technology & Application Development

Vice President, Event Operations David F. Myers

Chairman of the Board Jeff rey S. Klein

REACHING THE STAFF

Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.

E-mail: To e-mail any member of the staff , please use thefollowing form: [email protected]

Dallas Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. CT)Telephone (972) 687-6700; Fax (972) 687-679914901 Quorum Dr., Suite 425, Dallas, TX 75254

Corporate Offi ce (weekdays, 8:30 a.m. – 5:30 p.m. PT)Telephone (818) 814-5200; Fax (818) 734-15229201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

www.security-today.com

Volume 3, No. 2

DealerStrategiesBy Ralph C. Jensen

There is no time in the year quite like getting ready for ISC West—the industry’s most extensive U.S. tradeshow. I love attending this tradeshow and plan on visiting as many booths as pos-sible, partly due to the long trek from media booths, like ours, to the others.

I look forward to joining thousands of other security professionals to check out new technology, and what matters most for dealers and integrators.

Th is issue of Dealer Strategies features a great story from staff writer Lindsay Page, who inter-viewed and toured the new THRIVE Intelligence facility in Dallas. Typical of many call centers, this is a 24/7 operation, doing far more than just recording.

Company CEO Dean Wilson says his employees are trained to analyze every second of video to fi nd suspicious activity or unidentifi ed objects and then follow the established protocols set up by the business owner. Like many of our cover stories, you will fi nd more with the turn of each page.

Another interesting read is by Marek Robinson from Honeywell, who writes about the advance-ment of making connected homes a reality.

Robinson points out what we all have been hoping for: a stronger national economy and a housing marketing that can sustain those beliefs. What does that have to do with security? Well, as homebuyers begin infl uencing the market, they are wisely considering what they are pur-chasing in a home. For starters, they want the ability to control security, light-ing and heating, ventilation and air conditioning remotely. Home automation is now part of the trend for cost-conscious homebuyers.

When you fl ip through a couple of pages in this issue of Dealer Strategies, Robinson will explain how Tuxedo Touch wireless controller has been employed by Pennsylvania-based Mignatti Cos., making the life of homeowners more comfortable and aff ordable.

Th ese are only two of the several stories inside this issue that I think you will very much enjoy. Take a good look at what our editorial contributors have to say in the entire issue.

Ralph C. Jensen is the editor-in-chief of Security Products magazine.

Forward to ISC West

TABLE OF CONTENTS

DS4 MORE THAN SURVEILLANCE SERVICES By Lindsay Page

DS6 TAKE A SMARTER PATH By Marek Robinson

DS10 IP VIDEO TECH TIPS By Michael Leary

DS12 RESPONSE DIFFERENTIALS By Keith Jentoff

DS18 PROACTIVE APPROACH TO ALARMS By Rob Phillips

DS22 FAMILIARITY YIELDS GREATER VALUE By Jason Oakley

ON THE COVERMeet the executive team at THRIVE Intelligence. Dean Wilson, CEO (seated). (L to R) Matt Antokowiak, chief intelligence offi cer; Will Dowell, COO; and Rick Cook, vice president of sales. Th e company is located in Dallas, Texas.

0313sec_ds02_edNote_v3.indd 2 2/15/13 2:33 PM

touch of brilliance

For more information, please call 1-800-467-5875 or visit www.honeywell.com/security/hscTuxedo Touch is available in white (TUXWIFIW) or silver (TUXWIFIS) and is compatible with

Honeywellʼs VISTA systems or as a standalone automation controller. Available at ADI. Call 1-800-233-6261.© 2013 Honeywell International Inc. All rights reserved.

Bring more homes to life with Honeywell’s Tuxedo Touch™ Automation Controller

Bold. Brilliant. Beautiful. When it comes to home control for everyone, Honeywell’sexciting new Tuxedo Touch is anything but basic. Ideal for both new homes and retrofits,it’s simply the easiest, most affordable way to tie all of the technology in your customers’homes together—helping you win new business and create recurring monthly revenue.Security, cameras and Z-Wave® enabled lights, shades, locks and thermostats—all linkedand controlled from one stunning, high-resolution 7" touchscreen that’s also a digitalpicture frame and video viewer. And, its web server with built-in Ethernet turns everysmartphone and tablet into a mobile controller. Wi-Fi versions (TUXWIFIS and TUXWIFIW)are also available.

For a fraction of the price of other solutions, Honeywell’s Tuxedo Touch lets you maketheir homes more enjoyable and your business more profitable than ever before. Whatcould be more brilliant than that?

Use your smartphone toscan for more information.

See us at ISC West, Booth #14023 .

Go to http://sp.hotims.com and enter 510 for product information

Untitled-2 1 2/14/13 12:35 PM

DE

AL

ER

ST

RA

TE

GIE

S

DS4 0 3 1 3 | D E A L E R S T R A T E G I E S

MORE THAN SURVEILLANCE SERVICESA command center at THRIVE Intelligence off ers 24/7 surveillance, utilizing video analytics and trained professionals to deal with any situation.

For most business owners, having a dependable and accurate surveil-lance system is at the top of the priority list. With so many products and service plans available, it can be a bit overwhelming to choose what would be the best solution for their specifi c needs, especially if

they aren’t exactly security savvy. Business owners also want a security system that does more than just record.

On the market today, there are surveillance systems available with video analyt-ics, which do far more than just record live footage; systems with video analytics not only record video, but also automatically analyze the video footage in order to assess live situations, detect security issues and act accordingly.

At THRIVE Intelligence, they have created a command center that can prove to be the answer for businesses that need to deal with one or several sur-veillance issues. Th e command center monitors video intelligently assessed by video analytics in order to provide a 24/7 surveillance system for businesses

across the U.S., enabling business owners to have their properties protected constantly, and in the event that suspicious or dangerous activity should hap-pen, those working at the command center can alert local law enforcement agencies.

“We have created a single platform that combines islands of technology into a simple, intuitive interface for event management, providing quicker no-tifi cation to fi rst responders, reducing false alarms, and ultimately, increasing safety and security. Th at we can off er this as a cost-eff ective, turnkey solution enhances the value for both integrators and end users,” said Dean Wilson, CEO of THRIVE.

THE COMMAND CENTER’S ABILITIESAn important feature of the video monitored by the command center is the use of analytics, which allows the employees to view only relevant video in

By Lindsay Page

0313sec_ds04_ds05_Page_v3.indd 4 2/15/13 9:09 AM

DE

AL

ER

ST

RA

TE

GIE

S

W W W. S E C U R I T Y - T O D A Y . C O M DS5

order to fi nd any suspicious activity or unidentifi ed objects that could be po-tential threats to businesses. If anything out of the ordinary is detected at any of the sites, the THRIVE employees follow the protocol that has been set by the business owner who is paying for the services. Selected protocols may be to wait ten seconds for more activity, call the owner, or alert local authorities. Depend-ing on the severity of the threat, actions may include alerting law enforcement agencies fi rst.

Two sample scenarios of how THRIVE uses analytics to monitor video are restricted zones (virtual fences) and appear/disappear object detection. With restricted zones/virtual fences, business owners can work with the installation team to determine areas they do not want to be entered; this acts like an invis-ible fence and once the perimeter is trespassed, an alarm will be sent to those monitoring at THRIVE, where the situation can be assessed and appropriate actions can then be taken.

Th e appear/disappear object detection can be used in parking lots, hallways, waiting rooms and airports. If an object, such as a briefcase, is left in a parking lot with no one around, the video analytics will hone in on the object while also looking around the perimeter for any other suspicious activity. If the object is left unattended for 10-15 seconds, an alarm will be sent to the command center for professional response.

SERVICES PROVIDEDTh e command center off ers these surveillance services to businesses across the nation. Business owners can choose what type of security system they want to use, how many cameras are needed, the areas they need to be cov-ered, and the “triggers” the video analytics will pick up to best protect their business. Once the system has been installed, 24/7 surveillance monitoring by THRIVE can begin.

Business owners can also select what type of suspicious activity caught on live footage is worthy of a phone call to them or police, and they can choose to have the THRIVE employees wait for a certain amount of time (usually 10-15 seconds) to assess the situation before they make any phone calls.

If an alarm is tripped, such as a virtual fence being trespassed, the trained Security Intervention Specialists at THRIVE are trained to handle the situation properly. Each employee is trained by THRIVE, and supervisors are retired law enforcement and/or military agents. Th e level of expertise these employees pos-sess is critical for any type of potential emergency situation, when a cool head is needed. Employees will continue to monitor the situation, in case a more dan-gerous circumstance should happen, until police arrive on the scene. During the event of any suspicious activity, live footage can immediately be streamed to the business owners and to law enforcement offi cers on the way to the scene.

AN OPPORTUNITY FOR INTEGRATORSIntegrators can partner with THRIVE to off er their customers the surveillance services from the command center; this not only provides integrators with the opportunity to off er their customers 24/7 surveillance, but also allows them to learn more about the products that THRIVE provides. Integrators can sign up for specialized online training in order to learn all the technical details about THRIVE products, gaining certifi cation essential to being a THRIVE integrator.

By partnering with THRIVE, integrators can gain recurring monthly rev-enue (RMR). For example, for each $60 of cost to the end user, an integrator can earn up to $15 in revenue. Another example of how an integrator would gain revenue is by having a THRIVE surveillance system installed with command center services. Th e integrator would receive a large installment payment in ad-dition to monthly revenue. For example, for an integrator’s customer who is having several cameras and surveillance systems installed at several apartment complexes, the integrator could earn about $27,400 for that fi rst installation; RMR would then be around $1,370 each month for fi ve years, putting the total return for the integrator at $109,600.

SURVEILLANCE SERVICES WILL CONTINUE TO RISEWith all of the services that THRIVE has to off er, and the conveniences that come along with it, surveillance systems will continue to rise in popularity. By providing, constant surveillance with alarms and law enforcement contact, business owners will begin relying on these services for all their surveillance needs.

And with all the opportunities for integrators, demand for customers will also be on the rise. Within the next few years, surveillance services will soon become the norm for businesses not only in the U.S., but for business owners around the globe as well.

Lindsay Page is an associate content editor for Security Products Magazine.

Go to sp.hotims.com and enter 509 for product information. See us at ISC West Booth 1122.

0313sec_ds04_ds05_Page_v3.indd 5 2/15/13 9:09 AM

DE

AL

ER

ST

RA

TE

GIE

S

DS6 0 3 1 3 | D E A L E R S T R A T E G I E S

TAKE A SMARTER PATHTh ree advancements making connected homes a bigger reality

To characterize the state of the U.S. econ-omy as a rollercoaster would be a severe understatement. Over the past year, the news cycle has constantly rocked back

and forth and every which way possible detailing swings of good and bad news.

Amid a backdrop of wildly unpredictable eco-nomic indicators, however, most experts can agree on one thing: the housing market has slowly but steadily rebounded. In August 2012, for example, global analytics fi rm CoreLogic released a report showing housing may actually be poised to make a signifi cant contribution to the U.S. economy in 2013, despite the overall economy’s struggles.

It’s important to note, though, that while home-buyers are coming back, the overall attitude is one of carefully wading back into the water instead of diving headfi rst. Even people who are buying up-scale homes are weighing their options carefully, and the market for home automation technology is one of the best examples of this trend. High-end packages that enable whole-home entertain-ment and are priced at tens of thousands of dollars still draw looks. But more aff ordable options that provide basic functionalities, such as the ability to control security, lighting and heating, ventilation and air conditioning (HVAC) are steadily crop-ping up and increasingly garnering attention.

Catering to these cost-conscious homebuyers presents security professions an opportunity to help builders fi nd new ways to aff ordably diff eren-tiate their off erings.

CONNECTED HOMES“It’s two fold: fi rst is the lifestyle aspect, they want technology that will help make their lives easier; and secondly, the green aspect of controlling ther-mostats remotely, saving energy and money,” said Stephen McKenna, president of Pennsylvania-based Mignatti Cos.

In the past, such “connected-home” systems could generally only be aff orded by higher-end homeowners. Th e recession, however, added a dose of realism for everybody. Today, less fl ashy, but more aff ordable systems that provide just as much homeowner benefi ts are becoming the

norm. Th is spells opportunity for builders and in-tegrators alike.

In 2012, for example, Mignatti sold its fi rst home using such a technology, Honeywell’s Tux-edo Touch wireless controller. Tuxedo Touch is a touchscreen device that uses the Z-Wave protocol to wirelessly integrate lighting, locking, HVAC systems, and of course, security. Th e result is that homeowners can control all of these functions from a single device. A built-in Web server takes it a step further by allowing the homeowner to ac-cess all of these systems from any Web-enabled de-vice such as a smartphone or mobile tablet.

“It’s been very well received mostly because of how easy it is to use,” said Andy Soloski of JM Re-sources, a local integrator working to provide the Tuxedo Touch at Mignatti’s Golf Club Estates in Bucks County, Penn. “Even a technological nov-ice can easily use the Tuxedo system. It works well, looks great and is easy to use. We’re thrilled to be able to off er a great system.”

Generally speaking, three key factors have greatly helped bring these types of automation capabilities closer to home: the emergence of Z-Wave wireless devices; Wi-Fi technologies that have signifi cantly simplifi ed installation; and more sophisticated security technologies that increas-ingly are forming the cores of these systems.

HERE COMES THE (Z)WAVETh e emergence of the Z-Wave wireless protocol for home automation over the last few years brought an intriguing alternative to the more traditional and far more intrusive structured cabling cabinets

that can serve as a central nervous system of high-end connected homes. While there is still a large market for those cabinets, another one for Z-Wave is establishing itself. According to the Z-Wave Al-liance, for example, more than 12 million Z-Wave products have been sold worldwide.

In particular, the technology has carved out a niche with its ability to off er energy-saving home automation features. Some of the more popular Z-Wave features include:

Precise temperature control. Z-Wave thermo-stats can automatically adjust every time a home-owner arms or disarms the security systems, for ex-ample, letting them enjoy convenient comfort and energy savings thanks to fewer temperature swings.

Thermostat. Lockouts can keep temperature limited to a minimum or maximum setting, which is ideal for families with small children who can tamper with the thermostats.

Fan circulation. Th is feature engages ceiling fans to move air when heating or cooling is not required, which of course saves energy by helping to eliminate hot or cold spots. Additionally, ceil-ing fans can be automated to run on or off when homeowners arm or disarm security and be pro-grammed for specifi c times and work with lighting.

Automated shades. Th ese can be automated for privacy, security and energy savings by raising and lowering them at specifi ed times.

Th e ability to automatically set back thermostats, for example, can shave up to 15 to 20 percent off a monthly energy bill. Th ose are the types of fi gures that truly start to peak a prospective buyer’s interest.

“Buying a home translates into monthly utility bills,” McKenna said. “Energy effi ciency is impor-tant to today’s homebuyers, so it needs to become part of what we sell. It’s a new reality for any home builder that wants to be known as eco-friendly.”

WHY NOT WI-FI?Much like Z-Wave simplifi ed the process of inter-connecting subsystems such as locking, lighting and HVAC, the use of Wi-Fi also has opened an easier route to installation. Th is is especially true with the security element of newer home automa-tion systems.

By Marek Robinson

0313sec_ds06_ds08_Robinson_v3.indd 6 2/15/13 9:11 AM

iBridge® Connected Home ServicesControl Alarms, Video, Temperature, Lighting & Locking via Z-Wave using iBridge App for iPhone/iPad /Droid or optional award-winning iBridge Touchscreen/Tablet, a 7” portable WiFi full-color tablet with magnetic, on/off wall-mount/charger dock. Cost-effectively add automated Z-Wave Devices with iBridge’s affordable bus-mount Z-Wave Module (no touchscreen necessary). Add More with Napco No-Roll™

Customer Service Calls & Service Enhancements, dealers add/edit Z-Wave devices easily, remotely from their own smart devices. Back up all Z-Wave info to the Cloud, too.

iRemote™ Virtual Keypad Alarm Control Works and looks like their real keypad on iPhone/iPad™, Droid™, and smart devices.

Anything you can do on a real keypad you can do with Napco App: Arm, Disarm, Bypass, Temp. Control....even service calls from the road. Keypad-bus module for all Gemini, includes 12-mos. subscriber access. No special central station. Retain more accounts enhancing customer experience.

iSee Video™ Remote WiFi Video - The easiest, the first, the bestHi-Res Streaming Video from easiest 10-minute install WiFi cameras on any smartphone, tablet or PC. Archive and auto-email video of events. All-Inclusive kits with plug-n-play cameras, wireless access point & 12-mos. subscriber service on dealer-customized site.. No account activation fee. Exclusive 24/7 Recording option.

StarLink GSM Series Universal Future-Proof Radios & AppStarting under $100, two advanced primary/backup radio works on any panel* anywhere for full reporting to any Central. No activation fee. Two Future-Proof Field-Upgradable Models: Original SLE-GSM Radio and SLE-GSM-3/4G, New 3G/4G Network-Ready Version. Includes Takeover-Feature, SMS text option; 1-Step Enrol-lment; GEM-Panel up/downloads & Customer Remote Arm/Disarm App for iPhone, iPad & Droid. *Panel must report Contact ID/4/2

Mobilize more RMR with Napco.Billable Account Services, Bundle or Standalone

Remote Interactive Serviceswww.napcosecurity.com 1.800.645.9445

Take a Free New Technology Seminar at www.napcosecurity.com/seminars.asp online or at your distributor.

iPhone/iPad™, Droid™, Blackberry™ are trademarks of Apple, Google, RIM. iBridge, iSee Video, StarLink & Gemini are trademarks of NAPCO Security Technologies. Pats. & Pats. Pending.

02-LIVING RMWINDOWS

BYPASS

Parking Lot Camera A Parking Lot Camera B

Parking Lot Camera C Parking Lot Camera D

STATUS: DISARMED

PRESS TO

ARM

My Home

SECURITY VIDEO CLIMATE LIGHTING LOCKING

See us at ISC West, Booth #12041 • Go to http://sp.hotims.com and enter 511 for product information.

Untitled-24 1 2/12/13 4:36 PM

DE

AL

ER

ST

RA

TE

GIE

S

DS8 0 3 1 3 | D E A L E R S T R A T E G I E S

Th e use of Wi-Fi means installers no longer require the traditional Cat-6 cables needed to connect alarm panels to the Internet. Establishing that Internet link is critical because connectivity has become a standard feature. Homeowners today have the ability to control their security systems from Internet-enabled devices such as smartphones and tablets.

In fact, any solution that doesn’t involve the capability to control and man-age the system using a mobile device is considered outdated. For all practical purposes, this makes home-automation features, such as a built-in Web serv-er, a necessity for builders looking to cater to the modern consumer lifestyle. Th at is making Wi-Fi-enabled devices such as Tuxedo an attractive feature.

“In the past, our technicians would need to drill holes and fi sh wires, some-times taking days to complete an installation in an older home,” Soloski said.

Simplifying installation this way, however, also means retrofi ts have be-come easier. With so many consumers electing to remodel existing homes rather than build new construction, this Wi-Fi-enabled ability is a crucial one.

“Wi-Fi and quality wireless devices have changed the entire retrofi t mar-ket,” Soloski said. “We can off er all sorts of quality protection and convenience devices to our clients with little concern about the uncertainty of fi shing walls/ceilings during the installation.”

SECURITY AS THE NEW LIFESTYLE TECHNOLOGYSecurity technology was once largely considered an aft erthought in the realm of home automation. Flashier features such as whole-home audio and au-tomated appliances were always sought, but security—for lack of a better term—was dubbed the “boring” part of the system.

Th at mentality began to shift greatly, however, as security system man-agement began using Internet-enabled devices. Today, leading with security as opposed to other home automation, subsystems has become the most-ef-fective strategy for tying everything else together. Th at’s because the security system is the only device in the home that knows when someone is there. It supplies that critical piece of information to the automation system, letting the thermostat know when to go to energy-saving setback mode, when to lower the shades, control the lights or even shut off the ceiling fan.

For example, simply arming or disarming a security system can serve as the trigger point for the system to engage indoor and outdoor lights, create locking schedules and receive emailed alerts when a person enters the home, such as a child returning from school. All of this is in addition to the around-the-clock surveillance that can be accessed through mobile devices when products such as wireless security cameras are incorporated into the system. Systems such as Tuxedo Touch allow live video of up to four local cameras per screen, which can be viewed on the touchscreen interface, smartphones, tablets or televisions.

Th is type of functionality can help builders off er their buyers the ability to keep a watchful eye over valuables, pets and more from any location.

DOES SMART HOME EQUAL SMART INVESTMENT?Since 2012, McKenna said Mignatti has been increasingly enthusiastic about the number of prospective buyers it has seen come through its doors. Even more encouraging than the numbers, though, is the seriousness of the buyers.

“Customers buy new homes so that they are current with advancements in technology,” Soloski said. “From exterior/interior surfaces, insulation, HVAC, plumbing and perhaps the most oft en changing—electronic devices—build-ers can off er outstanding value in a brand new home.”

Now, the challenge for builders is to convince homebuyers that their in-vestments are best.

“We have to answer the question, ‘What are you going to give me that the competition isn’t?” McKenna said.

Buying a home may well be easier today than it has been in a long time. Aff ordable home automation technology, though, may be the key to selling an easier, and safer, lifestyle to go along with it.

Marek Robinson is president of the Authorized Dealer Program of Honeywell Security.

We’re meeting the growingdemand for video in the cloudwith MAXPRO® Cloud 3.0.

No wonder the cloud services

market is growing — using hosted

video systems can save businesses an average of $1,500

a year versus a traditional DVR. Now there’s more reasons

to get into the cloud with Honeywell’s award-winning

MAXPRO® Cloud 3.0. Store video in the cloud or locally,

get instant email alerts using direct clip link to notify you

if there’s an event or system problem. Plus, the new

MAXPRO Cloud Dashboard lets you monitor facilities in

real time, ensuring the protection of your assets. Take

your security to new heights with MAXPRO Cloud—

anytime, anywhere.

Get the facts with a Free MAXPRO Cloud Infographic

at www.maxprocloud.com.

get into the cloud

MAXPRO Cloud 3.0 is now available. Request a live demo at www.maxprocloud.com or call 1-800-323-4576 today.

© 2013 Honeywell International Inc. All rights reserved.

Watch the videoto learn more

Go to sp.hotims.com and enter 517 for product information.

0313sec_ds06_ds08_Robinson_v3.indd 8 2/15/13 9:11 AM

Security productsfor your peace of mind.

Dakota Alert has sensors for yourbackyard, driveway, porch, outbuildings and more...

Dakota Alert is a leading manufacturer of wireless alert products. Whether you’re trying to keep an eye on outbuildings or just want to know if someone is coming up your driveway, our wireless alerts and accessories allow you to be completely aware of any presence on your property.

PO Box 130 | 32556 East Main Street | Elk Point, SD 57025 | PH: 605.356.2772 | FAX: 605.356.3662

Dakota Alert, Inc. WIRELESS SECURITY EQUIPMENT Visit www.DakotaAlert.com for more information.

Wireless Breakbeam

You’ve secured the inside of the home,but what about the outside?

Visit us at ISC West booth #19119

Go to http://sp.hotims.com and enter 515 for product information.

Untitled-4 1 2/8/13 4:48 PM

DE

AL

ER

ST

RA

TE

GIE

S

DS10 0 3 1 3 | D E A L E R S T R A T E G I E S

IP VIDEO TECH TIPSTh e OSI model and physical security

When the IP camera was introduced to the physical security industry in the mid-1990s, the movement from analog to digital was set in motion. Adoption of the new technology began slowly but has steadily gained momentum. Security

manufacturers with products other than video also have recognized the value of IP networks as a platform to allow for control of, and communication with, their systems. IP networking is a great choice because it is extremely fl exible while also being standards based, which makes it highly reliable.

Th e Open Systems Interconnection Reference Model (OSI Model) is oft en mentioned in IP-related discussions. Th ere are seven layers in the OSI stack, each relating to a diff erent part of the network communication.

Layer 7, or the Application Layer, is at the top of the stack. Th is is where network aware applications allow users to interface with other network-based resources. Th ere are many protocols at work in this layer that security systems rely on to operate properly or off er valuable features. Many network video recorders leverage the protocols listed below.

Dynamic host confi guration protocol (DHCP)—Automatically confi gures the IP address, subnet mask, gateway and DNS information for enabled de-vices. Manufacturers may off er this feature in an eff ort to make their network devices easier to deploy. (I don’t recommend using DHCP for IP video sys-tems. I prefer using a static addressing scheme.)

Hyper text transfer protocol (HTTP)—Browser-based clients have long been popular for viewing and/or controlling networked video products.

File transfer protocol (FTP)—Supports the transfer of data to and from a server. It is common for video recorders to deliver snapshots or video clips to an FTP server for storage and retrieval.

Simple message transport protocol (SMTP)—Th is protocol provides support for systems that are capable of sending alerts and video attachments via email.

Simple network management protocol (SNMP)—are used for monitoring and reporting on SNMP traps, and are sent to a management system for re-view the condition of a supported network device. Trap information will vary depending on the device and could include system reboot, hard drive health, link down, link up and system temperature.

Michael Leary is a network product specialist at Tri-Ed Distribution.

By Michael Leary

0313sec_ds10_Leary_v2.indd 10 2/14/13 4:21 PM

SWITCH GEARS. JOIN A HIGH-PERFORMANCE

DEALER PROGRAM.

WHERE YOUR DRIVE IS REWARDED

Your name belongs on the VIP list. Come by our booth #10059 at ISC West. Relax in our lounge and see the work-hard-play-hard lifestyle in action. We’ll

limited to 50 seats. Premium prizes will be rewarded along with a poker chipto all who attend.

Talk to us to learn how to get your name on the list.

Brand your company the way you want, with no competition from corporate. Keep your accounts or sell them to us; it’s an alliance that moves far beyond the traditional dealer program. We provide ongoing support, training, and portfolio management that will drive your business.

F150 Harley Street Glide Breitling

877.289.0899 monidealerprogram.com

See us at ISC West, Booth #10059

Go to http://sp.hotims.com and enter 504 for product information

Untitled-3 1 2/11/13 3:01 PM

DE

AL

ER

ST

RA

TE

GIE

S

DS12 0 3 1 3 | D E A L E R S T R A T E G I E S

RESPONSE DIFFERENTIALSMonitored video alarms vs. self-surveillance

What compelling value does combining video with monitored burglar alarms provide dealers and commercial property owners? Faster police response, more arrests and greater se-curity. It may pay to take a look at upgrading burglar alarms

to capture the value of “response diff erentials” and arrests.Chula Vista, Calif., is a good example of what response diff erentials mean.

In 2011, the average response to a traditional alarm was more than 19 min-utes, while the average response time to a video verifi ed alarm was 5 minutes, 5 seconds—more than 14 minutes faster.

Commercial customers have no problem imagining what a criminal could do with nearly 15 minutes inside their business. Faster response means more arrests, and upgrading existing burglar alarms is a new source of recurring revenue. Typical commercial systems already include both an alarm and sur-veillance cameras that, possibly sold and installed together, remain separate systems with diff erent business models. Th e central station monitored burglar alarm continues to generate revenue for the dealer while the surveillance sys-tem is a one-shot sale.

BOOSTING REVENUETypical recurring revenue on the camera or DVR is only a maintenance con-tract. Upgrading traditional burglar alarms to a video verifi cation system com-bats property crime with priority police response and boosts dealer RMR.

For law enforcement, video verifi cation means fewer false alarms and more arrests. Th e entire video verifi ed alarm paradigm has enormous impact when it comes to combatting property crime.

Two diff erent studies conducted by law enforcement, in Los Angeles and San Bernardino County, Calif., documented arrest rates from traditional alarms at 0.08 percent. Additional studies, done in San Jose, Calif. and Las Cruces, N.M., put the fi gure even lower at 0.02 percent. In contrast, studies on video verifi ed alarms from Detroit and Texas give arrest rates of more than 50 percent—thousands of times better.

More arrests and greater security impact all the stakeholders in the battle against property crime, including the consumer. Proponents of video alarms have even formed a new association, the PPVAR (Partnership for Priority Vid-eo Alarm Response) that promotes the value of video alarms and faster police response. Reaching out beyond alarm companies, the PPVAR also includes both the insurance industry and law enforcement. Response diff erentials and more arrests mean reduced risk and lower losses for the commercial property underwriters. Insurers are crucial stakeholders and support the PPVAR’s mis-sion. Th e board of directors includes both the National Insurance Crime Bu-reau (NICH) and Verisk Crime Analytics. NICB represents more than 1,100 property/casualty insurers to law enforcement across the United States.

Beyond providing tools, such as bait cars to local law enforcement, the NICB annually trains tens of thousands of police offi cers and sheriff s in an eff ort to reduce insurance losses. Th rough its ISO division, Verisk already pro-

vides underwriters risk data on nearly every commercial property and com-munity in the United States.

CRIME DATAPPVAR partner Verisk Crime Analytics collects and analyses crime data from police departments, sheriff ’s offi ces and PSAPs—911 dispatch centers—to help insurers determine if property crime risk and video verifi cation is part of this. Th e insurance industry is promoting the value of response diff erentials and arrests to their commercial customers.

Conceptually, commercial burglar alarms and video surveillance cameras remain separate systems. Central stations monitor alarm signals but only con-sumers view the videos. Simply having cameras at the business does noth-ing for faster police response or improving central station monitoring. While there are an amazing variety of surveillance solutions, they isolate the video from the central station. As the cost of CCTV cameras has declined, burglar alarm manufacturers developed video solutions that dealers sell along with the burglar alarm, but the video is still isolated from the central station and only consumers view the video through some portal or mobile app.

Th ese video solutions are not monitored video alarms and do not deliver faster police response. Th e Website of a leading alarm manufacturer lists the following reasons to include their video services with the alarm system:

By Keith Jentoft

0313sec_ds12_ds16_Jentoft_v3.indd 12 2/15/13 9:12 AM

www.linearcorp.com | 800.421.1587

eMerge E3 Essential and Essential Plus with battery backup

Intuitive start-up software allows for ultra-fast setup

Access Control made easy as child’s play!

Browser-based management enables easy scalability

A c c e s s C o n t r o l | A u d i o -V i d e o - D a t a | C C T V-V i d e o S e c u r i t y | C e n t r a l Va c u u m s | C o m m e r c i a l D o o r O p e r a t o r s

I n t e r c o m s | G a r a g e D o o r O p e n e r s | G a t e O p e r a t o r s | P e r s o n a l E m e r g e n c y | R a d i o C o n t r o l s | S e c u r i t y S y s t e m s | Tu r n s t i l e s

Introducing the E3-Series eMerge Essential™

Give your customers a simpler choice. The new browser-based E3-Series eMerge Essential™ and Essential Plus™

network appliances make access control easy — in a feature-filled package that won’t break the bank.

Easy Commercial Sales: Robust access control for 1 door / 2 readers; out-of-the-box software-only expansion

to 4 doors / 8 readers

Easy Investment: More capabilities vs. competitive systems at a fraction of the cost

Easy, Web-Based Management and User Interface: Any browser, any operating system

Easy and Fast Deployment: Ultra-fast setup with Linear’s revolutionary wizard; saves hours of time and cost

of traditional system setup

Easy Scalability: Add doors and readers via software upgrade to higher capacity E3 systems

Like Easy? See eMerge E3 today at www.linearcorp.com/e3emerge, call 800.421.1587 or contact your sales rep.

Come by Linear’s exhibit booth # 11097 at ISC West 2013, April 10-12, 2013 and take a test drive of the ground-breaking eMerge Essential embedded browser-based access control system!

Untitled-3 1 1/17/13 10:54 AM

Go to http://sp.hotims.com and enter 503 for product information

DE

AL

ER

ST

RA

TE

GIE

S

DS14 0 3 1 3 | D E A L E R S T R A T E G I E S

• Observe employee performance and behavior

• Observe consumer shopping hab-its and activity

• Look in on your business without leaving homeNone of these reasons enhance

real security or excite insurers. Bur-glar alarms that isolate the video

from the central station entirely miss the point. In fact, all burglar alarm manufacturers have done is to pack-age self-surveillance for their dealers, something already provided free by CCTV manufacturers that include free viewing soft ware with their IP cameras in a one-shot sale.

Surveillance is good, but it is some-

thing diff erent. Video alarms with central station monitoring mean faster police response, not remote look-in on employee behavior or consumer shopping habits. We un-derstand that response diff erentials enhance security, but what about the millions of existing alarm systems?

MONITORED ALARMSAff ordable technology has fi nally arrived to upgrade the installed base of monitored burglar alarms and combine the video event with the alarm signal at the central station for priority police response. Th e two technology options include battery powered detector/cameras or wired cameras/soft ware.

Both options can enable a tradi-tional alarm to deliver monitored video verifi cation for priority re-sponse. Th e simple approach for an alarm installer is battery-powered wireless detector/cameras that em-brace the installation philosophy that initially made wireless alarm systems so popular: ease of installation, inex-pensive cost and convenience.

One example is Videofi ed’s Mo-tionViewer. Th ese central-station-friendly devices send the alarm/video directly to the central station without the need for other soft -ware. Declining prices mean that the battery powered cameras now cost about the same as a traditional wireless PIR. Wireless devices make alarm upgrades easy due to simple wall mounting, such as a normal sensor, but deliver an instant video clip of the intruder whenever the in-tegrated PIR detects motion.

Because the camera/sensor is a single device with a single fi eld of view, the camera always covers the detection area without any manual adjustments or aiming. It is crucial to understand that a MotionViewer is not just an IP camera in a diff erent housing. Th e radio frequency sending the video is not Wi-Fi (2.4 gigahertz). Instead, the battery-powered Motion-Viewers use a robust 900 MHz to de-liver the video clip from the camera to the panel which communicates the alarm/video to the central station for review and dispatch.

Wireless IP cameras are not re-ally wireless: power cords prevent the convenient burglar alarm installation concept. Th e power demands of Wi-Fi cannot deliver the four-year battery life demanded by a wireless burglar alarm. Installing battery-powered MotionViewers on an existing alarm system is the easiest way to upgrade a traditional alarm for priority response.

Seneca Data Distributors. Inc. | 7401 Round Pond Road | N. Syracuse, NY 13212 | p: 877.814.0348 | www.xvaultsecurity.comIntel, the Intel Logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation in the U.S. and/or other countries.

Announcing a new line of IP technology! xVault Hybrid NVRs are purpose built appliances that support both IP and analog cameras to provide simplicity and increased network flexibility.

• Featuring the 3rd generation Intel® Core™ Processor Family

• Enables encoding, storage, management, and service of video all in a single device

• Protects our customer investment in analog equipment while providing IP capabilities

OPTIMIZEDCERTIFIED

GUARANTEED

LEADING IP VIDEO SURVEILLANCE SOLUTIONS

For IP-based surveillance networks the choice is simple…

Seneca has over 18 years of experience in designing and implementing IP-based systems. With a complete line of IP solutions, Seneca is the ONLY digital security and surveillance manufacturer that will guarantee system performance for digital security and surveillance deployments.

xVault xNVR xVault xVIEW xVault MOBILE

USING IP EXPERTISE TO BRIDGE THE ANALOG GAP

Visit Seneca at ISC West, Booth #5043

Go to sp.hotims.com and enter 505 for product information. See us at ISC West Booth 5043.

0313sec_ds12_ds16_Jentoft_v3.indd 14 2/15/13 9:12 AM

scansourcesecurity.com

THIS IS A FACE YOU CAN TRUST.

You’ve worked hard to turn an

opportunity into a profitable deal.

With ScanSource Security you can

rest assured that 100% of project

pricing granted from the manufacturer

will go directly into your pocket.

We consider it good business.

Call me today and enjoy the peace

of mind that comes with ScanSource

Security, your value-added distributor.

RUSSELL HOUGH | SALES REP

800.964.8994

AND IT COMES WITH A 100% GUARANTEE.

See us at ISC West, Booth #23001

Untitled-4 1 2/8/13 1:41 PM

DE

AL

ER

ST

RA

TE

GIE

S

DS16 0 3 1 3 | D E A L E R S T R A T E G I E S

Th ese central-station-friendly de-vices send the alarm/video directly to the central station without the need for other soft ware. Declining prices mean that the battery-powered cam-eras now cost about the same as a traditional wireless PIR. Wireless de-vices make alarm upgrades easy be-cause they are simply mounted to the wall like a normal sensor but deliver an instant video clip of the intruder

whenever the integrated PIR detects motion. Because the camera/sensor is a single device with a single fi eld of view, the camera always covers the detection area without any manual adjustments or aiming.

A second approach to upgrading existing alarm systems is to link stan-dard CCTV cameras/DVRs with the alarm signal at the central station. Th is requires a soft ware solution that

integrates the enterprise monitor-ing soft ware platform of the central station to the specifi c camera/DVR used at the commercial site. While a soft ware approach has been cum-bersome and diffi cult to scale, this is changing. Perhaps the most prom-ising development is a cloud-based solution from I-View Now, based in Las Vegas. I-View Now combines the burglar alarm monitoring system

with a video delivery process that sends a URL of the video event to the central station and links it as a single alarm event. Th e central station op-erator interacts with the alarm sys-tem through their existing central station soft ware using normal screen prompts and keyboard commands but now also has a second monitor to view the video clip associated with the intrusion.

From an upgrade perspective, one limitation to this approach is that the existing cameras are oft en not located to view the area covered by the alarm sensor and may need to be moved. In addition, many existing cameras are not equipped with analytics to do their own detection. Th is means that an alarm sensor may detect an intrud-er but, unless it is repositioned, the camera will not capture a video of the intrusion. MotionViewers can also be added to this type of I-View Now in-stallation to provide the initial video verifi cation and then allow live views by the operator and end user from the other CCTV cameras installed on site. I-View Now technology upgrades tra-ditional alarm systems, combining existing video cameras and traditional alarm systems in the central station to create a single seamless video alarm—video verifi cation that delivers faster police response. I-View Now is a sig-nifi cant step forward to making video verifi cation available to the millions of alarm systems and cameras already installed.

Obviously, new installations are easier with both technology solu-tions. Technicians installing a new alarm system can simply mount bat-tery-powered wireless detector/cam-era on the wall instead of the wireless PIR detectors they have worked with for years. I-View Now and new IP cameras, with analytics for detection, are a great solution for video verifi -cation. Th e camera sees whatever the analytic detects as they both work through the same lens with the same pixels. Th e I-View Now platform in-tegrates these new cameras, DVRs and even wireless systems into alarm monitoring of the central station for video verifi cation and priority police response—and more RMR.

Keith Jentoft is the president of Videofied.

What are yourcustomers looking for?Help them see it — even in low light.

Image quality is always important, but the benefits

are really determined by how your customers will

use the images. We make their and your job easier,

by focusing on image usability first. Help your

customers utilize our joint competence and our

comprehensive range of image features such as

HDTV, Wide Dynamic Range and Lightfinder.

As the world leader in network video, we help

you ensure that your customers always get video

they can use – no matter what the conditions are.

Get the Axis picture. Stay one step ahead. Visit www.axis.com/imageusability

Axis´s award-winning Lightfinder technology enables color, detailed video

even in very poor lighting conditions.

All images are conceptual. For product information and actual footage from Axis cameras, visit www.axis.com

Read more with your

smartphone

Visit Axis at ISC West:www.axis.com/iscwest

Booth #14057

April 10-12

Las Vegas

Go to sp.hotims.com and enter 501 for product information. See us at ISC West Booth 14057.

0313sec_ds12_ds16_Jentoft_v3.indd 16 2/15/13 1:28 PM

See us at ISC West, Booth #12132

Go to http://sp.hotims.com and enter 502 for product information

Untitled-3 1 2/11/13 2:57 PM

DE

AL

ER

ST

RA

TE

GIE

S

DS18 0 3 1 3 | D E A L E R S T R A T E G I E S

PROACTIVE APPROACH TO ALARMSReducing false alarms, saving emergency responders time

All companies want “win-win” solutions. In the security industry, false alarms are a “lose-lose-lose” for providers, their customers and the areas in which they live and serve.

False alarms aren’t just an annoyance for homeowners. Th ey can cost local authorities millions of dollars and valuable man-hours each year, tak-ing emergency responders away from people with actual emergencies.

Many jurisdictions have taken a proactive approach to reducing taxpayer dollars and wasted emergency resources. Cities in Georgia, for instance, re-cently passed ordinances that fi ne homeowners for false alarms.

Expensive fi nes lead to customer dissatisfaction, particularly among new users who might second-guess whether enhanced home safety is worth the aggravation of a howling alarm.

Security companies must get proactive, too, or potentially face growing at-trition. However, there are ways to combat false alarms and expand business at the same time.

TWO-WAY VOICEBy adding two-way voice to a customer’s security system, dealers can simulta-neously address false alarms and increase their RMR.

Two-way interactive voice verifi cation—the ability for central station op-erators to directly communicate with customers during an alarm event—is a key technological advancement in false alarm prevention. Th e hands-free, two-way speaker system acts as an intercom so someone at home, maybe mom, can verify an emergency with an operator from anywhere in the home, if she’s carrying two grocery bags or chasing restless kids around.

Two-way voice also increases the number of actual emergencies that a monitoring center handles. Although the presence of a security yard sign doesn’t completely deter burglars from protected homes, the majority of emergencies in the industry are medical-related. A customer could be any-where in the house and unable to use the phone during a medical situation. Meanwhile, an operator might be wasting precious time by leaving a message on the answering machine, then calling and dispatching an ambulance or fi re department.

A monitoring center’s job is life safety; they want to get in, get out and get on to the next emergency. Two-way voice off ers a faster and more effi cient process. Even if an operator doesn’t announce themselves over the intercom, they can hear inside basically every room in the house, as long as the doors aren’t shut.

INTERACTIVE SERVICESTh e majority of new alarm panels are two-way voice compatible. In the last

two years, two-way voice over cellular capability also has become an attractive option for the growing number of smartphones—165 million active in the United States—and wireless-only households—34 percent of U.S. homes now have wireless-only service, according to a 2012 report by the National Center for Health Statistics. For dealers, it’s a logical bundle with mobile monitoring services that enable customers to remotely manage and arm/disarm their sys-tem from anywhere on a compatible smartphone or tablet.

Th e remote feature alone helps reduce false alarms; homeowners can dis-arm their system at their convenience before they even walk through the front door. Platforms also exist that enable the monitoring center to send an auto-matic alarm notifi cation to a customer via text message, and the customer can reply to the station with their code word and nullify the alarm.

Remote video monitoring is becoming another attractive upsell for deal-ers. With respect to false alarms, this feature also aligns with jurisdictions that ask stations to confi rm emergencies either through customer verifi cation or an actual video clip of the home.

What does the future hold for digital false alarm prevention? Perhaps when a customer’s alarm goes off they’ll receive a video clip of their house with a button that says, “Dispatch or No Dispatch,” essentially putting the decision in the homeowner’s hands.

For now, the current features link nicely with the general convenience of in-teractive services: arming reminders via text or email; no-show alerts if a fam-ily member did not return home to disarm at a certain time; specifi c codes for users with panel access; severe weather alerts; system’s event history; automatic notifi cations to traveling customers who enter or exit a specifi ed geo-fence

By Rob Phillips

0313sec_ds18_ds20_Phillips_v2.indd 18 2/14/13 4:28 PM

sdcsecurity.com

Security Door Controls

SECURITYLOCK DISTRIBUTORS

SECURITY

SDC Products are sold through the following distributors

ALL THE PIECES TO YOUR PUZZLE

918 Entry Check®

Let SDC help you solve you Entry and Egress Puzzle with these solutions:

SDC 600 SeriesPower Supply

IN STOCK!®

ISC WestBooth 20107

Go to http://sp.hotims.com and enter 514 for product information

Untitled-1 1 2/7/13 5:10 PM

DE

AL

ER

ST

RA

TE

GIE

S

DS20 0 3 1 3 | D E A L E R S T R A T E G I E S

without arming their security system; and much more.

KNOWING IS HALF THE BATTLEBecause user error is a major factor in false alarms, se-curity companies must emphasize prevention eff orts to their subscriber base. Customers must adhere to a few general tips:• Know their code word• Keep their emergency contact list up to date• Don’t relocate motion detectors near vents or in the

path of pets• Replace their system’s batteries• Test their system regularly• Cover their smoke detectors during construction,

building repairs and major cleaningDuring the holidays, they should ensure that trusted

visitors know how to disarm the system. Once the visit ends, they should cancel any special alarm codes for houseguests.

In the event of inclement weather, they should secure all doors and windows before arming their system. Th e evolution toward wireless systems is eliminating false alarms that are caused by power outages to landlines.

Th e list is seemingly endless. All these precautions won’t wipe out false alarms, but customer knowledge is the fi rst—likely the most critical—step toward curbing the issue.

PARTNERING UPFalse alarm prevention is an industry-wide eff ort, and leading dealer-based companies like Monitronics, are at the forefront.Monitronics started an internal False Alarm Control Team (FACT) that specialized in customer education for those suff ering from false alarms. Th ose types of outreach eff orts continue today through its customer relationship management team.

Th e company was one of three security companies to originally participate in the ASAP (Automated Se-cure Alarm Protocol) program that instituted digital dispatch communication between its Five Diamond Certifi ed Alarm Response Center and public safety an-swering point (PSAP) operators. Coordinated by the Central Station Alarm Association (CSAA), the pro-gram removes potential human error and reduces the dispatch process from approximately three minutes to 15 seconds through a digital ticket to authorities. In 2011, Monitronics was honored by the False Alarm Re-duction Association (FARA) in 2011 for reducing false alarms from 0.67 percent to 0.5 percent with the aid of law enforcement.

While false alarm penalties have increased in many areas, preventative technology and awareness also have improved. It’s a fi ght that all parties must continue to wage. Otherwise, the foundational purpose of an alarm system—protecting people’s lives and property—is di-minished.

Rob Phillips is a marketing communications specialist with Monitronics.

vvvv

Complete security for your customers. Recurring monthly video monitoring revenue for you.

Only THRIVE Intelligence provides integrators with an end-to-end video surveillance solution that detects, alerts and intervenes – and a revenue stream you can count on.

© 2013 THRIVE Intelligence. All rights reserved worldwide.

THRIVEintelligence.com/beyond

The Smarter VideoSurveillance Solution.

Contact us today: 972-331-6903.

Camera-to-the-Command Center.And Beyond.

Visit us at ISC WestBooth #10133

Go to sp.hotims.com and enter 507 for product information. See us at ISC West Booth 10133.

0313sec_ds18_ds20_Phillips_v2.indd 20 2/14/13 4:28 PM

Internet Protocol is redefining our industryTri-Ed is redefining IP.

introduces our innovative

IP-EZ PROGRAMMING SERVICE

a true plug-n-play solution to simplify the installation process:

• IP cameras pre- programmed to your specifications!

• Shipped directly to you, ready-to-go!

• Labor-savings & cost-effective!

Contact us today to learn more about the IP-EZ Programming Service

888.874.3336 (Branch Sales) | 800.366.4472 (Technical Sales) | www.tri-ed.com

Let TRI-ED preconfigure your IP cameras for a trouble-free installation.

net ProtocTri-Ed

366.4472 (Te

We’ve Got You Covered...

Connectivity • Security • Solutions

See us at ISC West, Booth #18041 | Go to http://sp.hotims.com and enter 512 for product information

Untitled-2 1 2/14/13 2:33 PM

DE

AL

ER

ST

RA

TE

GIE

S

DS22 0 3 1 3 | D E A L E R S T R A T E G I E S

FAMILIARITY YIELDS GREATER VALUELong-term relationships off er multiple bottom-line benefi ts for customers and integrators

The strongest business relationships are defi ned by their effi ciency, cost-eff ectiveness and the value they create for the customer and the supplier. Th e establishment of a long-term relationship be-tween system integrator and customer can help deliver these ben-

efi ts, and more, to both.Greater knowledge and understanding of the customer. Developing long-

term relationships with customers allows time for the relationship to grow and develop into a true partnership. Regular communication, honesty, account-ability and adaptability contribute to productive long-term relationships. A longer-term contract enables the integrator to better understand the custom-er’s complete needs and ultimately to provide better solutions. Th e system’s integrator can gain in-depth knowledge of the customer’s system components and takes continuing responsibility for the system’s operation. Troubleshoot-ing, diagnosing and problem resolution can be accomplished much more ef-fi ciently. Th e goals of many customers’ security departments are expanding into diff erent areas of a location’s operations and a higher level of integration capability is needed to tailor a solution to meet each customer’s broad-based needs. Complete knowledge of the customer’s operations, developed over time, ensures the highest and best level of service, and thus greater value.

Direction for the integrator’s resource and staff strategies. Serving the needs of long-term customers can help to shape the services and products an in-tegrator off ers and direct their resources to deliver maximum added value. Systems integrators are increasingly changing from conventional sales orga-nizations to technology partners with an expanded scope of services. Long-term relationships can justify greater ongoing investment by the integrator in resources to serve the customer’s needs.

Effi cient systems are built on the technical expertise, experience, reliability and effi ciency of the system integrator. Long-term relationships allow integra-tors to aff ord greater levels of investment in resources and personnel with IT expertise above and beyond existing capabilities. Such investments are critical as the industry continues to transition from analog to IP systems. Investment in training is a cost of doing business for integrators, and it’s an investment benefi tting both parties. Technologies change quickly and a good integrator will stay on top of new developments so long-term customers don’t have to.

Ability to plan ahead to address future opportunities and challenges. Today’s technology enables separate systems to be integrated into a unifi ed business solution. Th e system can be tailored to specifi c customer needs, but it also adds a level of complexity when compared to traditional proprietary single manufacturer off erings. Ensuring that all the individual components continue to operate seamlessly throughout the product upgrade cycle is no small task. Th e integrator can remove this burden from the customer and ensure maxi-mum system productivity.

When a system is professionally designed, the integrator can customize the deployment to address specifi c operations and requirements with greater effi ciencies, all while planning ahead for the next wave of innovation.

Beyond design and implementation, integrators can off er expert guidance on decisions about repair or replacement, assist security and IT staff with budgeting, provide predictable costs for support and maintenance through

a single contract, and work toward the lowest total cost of ownership (TCO) and best return on investment (ROI). Long-term systems integrator partners can oft en help customers respond to—or stay ahead of—changing business conditions or compliance/regulatory issues.

Benefi t of ongoing product knowledge. As new equipment suppliers bring new products to the market, the experienced system integrator can better de-termine the benefi ts of newer technologies, directed largely by the needs of long-term customers. When hardware upgrades or replacements to the sys-tem are indicated, the system integrator can recommend designs or upgrades that best meet the organization’s fi nancial and technical needs.

Integrators can be a good resource of product knowledge for long-term customers and can help direct the customer’s eff orts to embrace new tech-nologies over time. Integrators view technology developments through the prism of their customers’ needs. Th ey are oft en the fi rst to evaluate the latest innovations, and long-time customers get the value of that knowledge and experience. Integrators serve a variety of customers and applications, so if a longtime customer has a problem, integrators don’t have to reinvent the wheel.

Keeping up with technology equips integrators to serve customer needs, and keeping up with longtime customer needs directs integrators to choose the best technologies available, now and in the future.

Continuity. Long-term contracts can save the costs associated with transi-tioning back and forth among multiple integrators. Th ere is a learning curve with every new systems integrator, and with it comes potential additional costs. Upgrade cycles can be better managed and potential catastrophes can be avert-ed when systems are under the umbrella of managed services by a system in-tegrator. Th is approach can maximize the system’s capabilities and effi ciency.

Successful service programs off ered by system integrators also can track product life cycles across an installed base, providing intelligence and leading to the savings of non-budgeted expenditures. Continuity of customer relationships equates to better use of resources both for the customer and for the integrator.

Lower costs. Th e predictability of an ongoing contract and workfl ow en-ables a systems integrator to provide optimum pricing. For the end-user, new economic drivers have shift ed the budgeting focus from capital expenditures to operating expenses, opening the door for organizations to leverage the ben-efi ts of managed services provided by system integrators.

Unlike traditional maintenance or service agreements, managed servic-es for physical security systems can be more fl exible to address customers’ changing needs and specifi cally tailored to a customer’s requirements. Th is allows operating budgets to remain stable and predictable, and create poten-tially sustainable operational savings. Continuous support and additional or new services on demand are available at fractional in-house costs.

Managed services from system integrators can smooth out the expenses of maintaining a video surveillance system, reduce risk, eliminate the expense of carrying spare inventory or parts, align with budgets and put the customer back in control. Optimum pricing enables customers to maximize their re-sources in a time when corporate budgets are tight.

Jason Oakley is the CEO of North American Video.

By Jason Oakley

0313sec_ds22_Oakley_v3.indd 22 2/14/13 4:29 PM

Minuteman’s PRO Series UPSs set the standard for value in a UPS at their introduction more than a decade ago. The latest iterations of these user favorites, the LCD and RT, have become a favorite of both installers and users thanks to their combination of extreme runtime, versa-tile features, and excellent price. With models ranging from 500 to 1500VA, and standard features including an informative LCD display, the PRO will surely become a favorite of yours, too.

When your business’ image rests on a DVR or access control system, you can trust Minuteman to keep the cameras rolling and the doors secure.

USB (LCD), or RS-232, USB & SNMP (RT)Communications for Monitoring & Management

Phone / Fax / Network Surge Protection

8 total outlets (6 battery, 2 surge) ensure a connection for every part of the system

• Automatic Voltage Regulation hardware• 4 models from 500-1100VA• Industry-leading runtimes• 8 Outlets (6 batt., 2 surge)• 3-year warranty w/ battery coverage

• Automatic Voltage Regulation• 2 models: 1000 & 1500VA• Rack/Tower/Wall Convertible• 8 Outlets (6 batt., 2 surge)• 3-year warranty w/ battery coverage

UPS StatusLoad CapacityBattery StatusVoltage/Freq./RuntimePower On/OffDisplay Scroll

Scan

now

!

See us at ISC West, Booth #18128Go to http://sp.hotims.com and enter 508 for product information.

Untitled-4 1 2/8/13 2:01 PM

WHEN THE SUN RISES IN VEGAS ON APRIL 10th

KEYSCAN WILL INTRODUCE AURORA,THE FUTURE OF ACCESS CONTROL

With the launch of Aurora, Keyscan innovation will signal the dawn of a new age

of Access Control. Fuelled by 25 years of research and development, Aurora’s new features,

enhanced capabilities and expanded capacity, eclipse industry standards. Aurora is the

software platform that anticipates the evolving needs of our industry.

The innovation continues…

If you are not attending the show, contact us for more information on Aurora.Toll Free Canada or USA 1.888 KEYSCAN (539-7226)www.keyscan.ca

Receive your trial version at ISC West, Booth #14087

Go to http://sp.hotims.com and enter 516 for product information.

Untitled-3 1 2/12/13 10:28 AM

PROMOTING THE PARTNERSHIPS Using the best security equipment availableBy Ralph C. Jensen

If you are an integrator, you want the best solu-tion available. An end user certainly wants the best product serving their needs, and the con-sultant wants to have the pulse of the manufac-turing and technology industry.

Selecting an enterprise security system is a little bit like buying a car. When buying a car, you choose the make and model of the vehicle, you choose tires made by a well-known manufacturer and recommended for the vehicle, and an audio system probably by a manu-facturer outside the automotive industry. This way, you can get the best-of-breed approach.

The same is true when planning a security system.If you’re looking for the optimal solution in each

area, the best-of-breed option usually offers the end user richer functionality—satisfying more users. Yes, it may cost a little more money, but in the long haul your new system is getting the best the market has to offer, and you may save costs overall.

Single-source providers offer commonality and consistency so that all parts of the system have a fa-miliar look and feel. There can be a downside, includ-ing anemic functionality, due to a lack of features, causing users to become somewhat disgruntled.

Best-of-breed systems are designed to excel in their chosen area. The camera you install will be manufac-tured by a company that specializes in cameras. The access control function comes from an expert in that fi eld, while the video management solution is coming from a software specialty company.

“Best-of-breed systems are an important part of the emerging market,” said Jason Schimpf, director of partner relations at Arecont Vision. “Globally, securi-ty professionals are seeing security emerging the same way the IP market grew several years ago. One of the

key advantages of a best-of-breed solution is having an expert point of contact for each specifi c component, rather than a generalist for all components of the system.”

Best-of-breed systems ex-cel but that also may mean increased training and sup-port, and perhaps complex interfaces with other systems. However, companies that fo-cus on best of breed usually offer increased training and support, classes and reviews. With a best-of-breed system, the specialized features can create a competitive advan-tage, serving to cut costs and increase revenue.

“Generally speaking, you will fi nd that it is the smaller companies that offer best-of-breed products,” said Brian Carle, director of product strategy at Sa-lient Systems. “The entire effort of our company is fo-cused on one thing: video management software. We have to make sure we’re offering the best VMS to our customers because this is the glue that integrates the entire security system.”

A case in point would be the Miami International Airport, which recently overhauled its entire security system, executing a layered approach to its best-of-breed installation.

“MIA is the largest U.S. gateway for Latin Ameri-ca and the Caribbean, and is one of the leading inter-national passenger and freight airports in the world,”

said Ray Davalos, airport building system manager. “Passenger and employee safety is our number-one concern and this is a one-of-a-kind integration. Most facilities try to make someone’s project offering fi t and modify their operations to make it work.

“MIA engineering and GTSI have taken the best of today’s cutting-edge technologies and truly inte-grated them for a solution that enhances MIA’s op-erational and security needs. As history repeats itself, many will likely want to copy this approach in the fu-ture. A standard is being set here.”

Integrator GTSI, based in Herndon, Va., installed new surveillance cameras on the interior and exterior, and also integrated its existing surveillance infrastruc-ture into NICE Systems’ NiceVision VMS. Despite several challenges, the integrator addressed video retention during the upgrade and tested the product prior to installation.

“If you buy one manufacturer’s out-of-the box so-lution, the tendency is that it may overlook a layered approach,” said Mark Storek, a client executive with GTSI. “The key at Miami International was to bring in best of breed in every category, vet those technolo-gies and integrate them so that they played well to-gether and could do things like eliminate false posi-tives. If you get a lot of false positives, the tendency is for an operator to either lessen sensitivity or shut it off altogether. If you’re getting quality data and it’s being vetted by more than one technology in a layered approach, I think you eliminate a lot of that.”

Best of breed means support for the consultant and the integrator.

“As a best-of-breed manufacturer, we work well together with other best-of-breed manufacturers; we actually depend upon each other, all of us becoming

BEST OF BREED

W W W . S E C U R I T Y - T O D A Y. C O M 5 5

0313sec_055_056_Jensen_v4.indd 55 2/14/13 4:07 PM

5 6 0 3 1 3 | S E C U R I T Y P R O D U C T S

BEST OF BREED

strong partners,” Schimpf said. “That’s why we developed our MegaLab, to test interoperability before it goes to the installer. We build strong relationships and our products complement other best-of-breed products.”

The same goes for the software side of the best-of-breed world, said Carle, who also said that because best of breed is so interdependent upon other facets of the security world, integrators, consultants and other manufacturers have access to software, cameras and access control systems.

“Our goals are the same for either the large or small integrator,” Carle said. “Best of breed comes back to the needs of the customer; and, we believe customers require and want a rich feature set of tools for their security needs.”

According to Carle, some of the best-of-breed benefi ts may include:• Focused manufactures are more likely to have better quality products with

more features because the entire research and development effort and company is focused on one product category.

• Pricing is likely to be more competitive across the board because a focused manufacturer only competes in one space. A total-solution provider may have one or more components of a total security solution overpriced compared to similar products from a focused vendor because of the perceived value of being able to obtain a total solution from a single source.

• A best-of-breed solution goes further to avoid vendor lock-in. A VMS devel-oped by a camera manufacturer may only support that vendor’s camera line. Having products that support complimentary technologies from multiple ven-dors allows for greater selection of cameras, VMS and access control. As an organization’s needs change, a single component of the security solution can more easily be replaced using best-of-breed products with broad integrations.

• A greater product selection is available to consumers when using best-of-breed vendors. By mixing and matching compatible products from multiple vendors, it is more likely that each component of the security system will closely match the customer’s needs and budget.A total security solution does have its benefi ts, which include a simplifi ed sys-

tem design where there is one point of contact for designing a system and sourcing components, and a single point of support for the entire system. However, con-sumers may assume the products are developed in-house by the same engineering team; and, therefore, integrate well, but that is not always the case as some com-ponents come from acquisitions of other companies or are OEM’d from a third-party company and rebranded.

It is critical that all products have a consistent interface, integrate well and that the company can provide competent support on all products in a lineup.

“What end users want it the best total solution for the best price,” Schimpf said. “We believe that happens when integrators implement best-of-breed technology.

“You also will see that the sales teams from best-of-breed innovators are ex-perts in what they are selling and how it will operate with other parts of the solu-tion. We actively work with other best-of-breed companies, developing business solutions together.”

The question is asked, then, can best-of-breed components integrate with total so-lutions products? Yes, and it is a fairly new development, thanks to physical security information management (PSIM), a software that provides a platform and applica-tions created by middle ware developers. It is designed to integrate multiple uncon-nected security applications and devices, controlling them through one user interface.

PSIM collects and correlates events from existing disparate security devices and information systems to empower staff to identity and proactively resolve situa-tions. PSIM integration enables numerous organizational benefi ts, including in-creased control, improved situational awareness and management reporting.

Best of breed has been working well for years in the IT space and among other industries. When you connect the best products in the industry together, every-thing seems to run pretty smoothly. If you shred the right front tire during your commute, you call the tire dealer, not the auto manufacturer, and viola, it’s all about best of breed.

Ralph C. Jensen is the editor-in-chief of Security Products magazine.

MADE IN THE USA

800.234.6151 (U.S. and Canada)

Tel: 1.972.494.6151 [email protected]

SUPER SCANNER® VHand-Held Metal Detector

Rugged, high-impact ABS case Exceeds Mil-Std-810F (drop test) Method 516.5, procedures II and IV.

Large 8" scan surface for quick, thorough scanning.

Bright red LED indicates the detection

of metal.

Momentary push button helps temporarily eliminate detection

of nearby ambient metal such as rebar, metal walls.

Ultimate sensitivitywith extended battery life

Audible and Vibrating Alarms Detects ferrous, non-ferrous and stainless steel

weapons, contraband, and other metallic objects.

Self-calibratingDigital microprocessor technology eliminates the need for periodic sensitivity adjustments.

Weatherproof rubber handle

Walk-Through, Hand-Held and Evidence Recovery Metal Detectors

The latest generation of Garrett’s security hand wand—with improved features.

Garrett security products, originally designed for use at the 1984 Olympic Games, are the most recognized hand-held metal detectors in the world.

Go to sp.hotims.com and enter 28 for product information. See us at ISC West Booth 16125.

0313sec_055_056_Jensen_v4.indd 56 2/14/13 4:07 PM

For over 20 years, Mercury Security has perfected the hardware platform of choice for some of the best names in the industry. Reliable, fl exible, and open, Mercury allows for a wide range of confi guration options and deployment of almost any software solution. With our open access control hardware solutions, future demands can be readily met, and your reputation easily assured. Open-up the possibilities. Give your solution wings. Make sure it’s Merc.

Give your access control solution wings.

©2013 Mercury Security Corporation

Birds of an open feather.

Mercury Platinum Partners... your valued source for Authentic Mercury .

• Go to http://sp.hotims.com and enter 33 for product information.

Untitled-2 1 2/14/13 11:15 AM

See us at ISC West, Booth #5057 • Go to http://sp.hotims.com and enter 29 for product information.

Untitled-4 2 2/13/13 11:27 AM

Untitled-4 3 2/13/13 11:27 AM

6 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

BUILDING SECURITY

STREAMLINE TRAFFIC FLOW Large building chooses security systems and elevator control that work togetherBy Kim Rahfaldt

Elevator destination control systems offer an effi cient solution for high-rise buildings looking to streamline traffi c fl ow. The benefi ts include less elevator congestion, increased effi ciency and happier tenants.

Building owners have found that integrating an elevator destina-tion control system with its security management system enhances

these benefi ts for tenants because they can use their credential for both access con-trol and elevator access, but careful planning is a must to ensure cost effectiveness.

MAKE WISE CHOICESChoosing the wrong elevator company could limit a building owner’s choices when it comes time to choose a security management system. Traditionally, building owners choose their elevator company early in the building design stage. A security system is typically researched, reviewed and selected much later in the design process.

Surprisingly, very few access control systems provide off-the-shelf integration with elevator destination dispatch systems, and a lack of early planning could later

prove an expensive mistake. Building owners are fi nding they need to make their security system decision early in the design process if they want the elevator solu-tion to affordably integrate with their chosen security solution.

Historically, building owners have paid security companies to write a one-of-a-kind software interface to their chosen security management system. The instal-lation project needed to be large enough for the security company to dedicate its engineering resources to write the software. A typical software integration could cost a building owner as much as $50,000 and could take four months to install, which is an expensive and ineffi cient process.

“When we started educating building owners and developers about the impor-tance and potential fi nancial impact of their decisions, we advised they plan their security choices at the same time they were selecting their destination control ele-vator system,” said Jeff Smith, associate principal at TEECOM. “What we learned on multiple projects is that the building owner and design team did not understand the importance of identifying both system requirements early in the design pro-cess. Our projects were more successful when this integration was clearly addressed

0313sec_060_064_Rahfaldt_v3.indd 60 2/14/13 4:08 PM

Napco GEMC Security Systems Save Costs Providing Advanced Protection for People & Property from Intrusion, Vandalism & FireNapco Gemini Commercial Systems offer educational institutions smart, scalable integrated commercial intrusion, fi re & access control, using addressable, conventional and wireless technology devices to suit any building construction or mix across campus. And, choose popular options like an economical add-on access and badging module or full integration with enterprise class platform security, video and/or wireless locking, featuring a special snow-day feature used by schools nationwide.

Very cost-effective to retrofi t existing intrusion or life-safety systems, Napco GEMC-Series saves existing equipment & wiring, supporting both 12V or 24V conventional and addressable intrusion and fi re devices. Or, save all the wiring using dependable Napco UL-Commercial Grade Wireless PIR & Dual Tech motion sensors, glassbreaks and wireless Smoke & Heat Detectors. Hallmarks of the leading-edge system include more value on-board for reduced equipment and installation costs: More NAC/bell/fi re circuits each with built in horn/strobe

synchronization; pre-isolated fi re & burglary circuits (service either without interrupting the other); extra power (saving external power supplies), & integral dual-line digital communicator. The TCP/IP reporting option delivers dramatic phone line cost savings and can speed local emergency response, ideal for schools and campus security staffs. Go to school on it, long-lived integrated equipment, the lowest maintenance & longest warranties in security, all from Napco the name you know.

Robust security always at your easy command.

The Educated Choice:

• Integrated Security/Life-Safety/Access & Video Solutions for – Vandalism – Break-ins – Property Loss – Private Records Protection

• Burglary, Fire or Combination Fire/Burglary Systems: Addressable, Conventional &/or Wireless

• Centralized Control of Security/Access Systems through IP or smart devices or web client

• System Control Cost Savings• Major Cost Savings and Speed of Response through Local

IP Reporting

1-800-645-9445www.napcosecurity.com

NAPCO Security • Alarm Lock • Continental Access • Marks USA Compliances - NFPA 72, UL Commercial Fire, UL864 9th Ed., SIA CP01, UL985.UL household & commercial burg.: UL1610, UL609, UL365, UL1023. NYC FD; CSFM (fi re).

Ask About

Our Scalable School

Lockdown Solutions!

See us at ISC West, Booth #12041 • Go to http://sp.hotims.com and enter 78 for product information.

Untitled-3 1 2/13/13 11:20 AM

BUILDING SECURITY

6 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

in specifi cations prior to the work being issued for bid.”

Building owners would select a desti-nation control dispatch elevator system, such as ThyssenKrupp, Otis, Schindler or others, request a specifi c access con-

trol company’s system to protect their building. In many cases, an existing off-the-shelf software interface was not available and an unbudgeted project cost was required.

Building owners care about oper-

ating their buildings as effi ciently and inexpensively as possible, in addition to attractive, energy-effi cient buildings that will draw tenants. One advantage is fast, profi cient elevators. Building own-ers generally do not require complex

security systems to provide the required level of safety and security for the base building. Therefore, if a mainstream security management system offers an off-the-shelf—not customized for the individual project—software integra-tion with a building owner’s new des-tination control system, it’s a big cost advantage and timesaver.

“Overall, many security system manufacturers follow the traditional model of requiring a new project, time and money to prior developing an interface for a project,” Smith said. “Others are investing in development of software integrations to the leading destination elevator control systems to-day. I believe this proactive approach will allow those industry leaders to re-spond quicker to the customer’s needs, for a lower cost and increase their com-petitiveness on projects using destina-tion control elevators.”

A few access control companies have developed integrations with one of the major elevator companies. If a building owner selects the right com-bination, it works. But if a building owner has invested in its elevator sys-tem and then desires a particular secu-rity management system, research will be required to determine if the two systems will integrate.

Access control companies need to follow the new software business model of investing the money upfront and writing the integrations so they are readily available. The access con-

For more information please visit: www.fi relite.com

Fire Evacuation and Mass Noti cationJust Got A Lot Easier

Introducing Fire-Lite Alarms’ NEW Emergency Command Center (ECC)The most modular and fl exible system in the market! • Versatile, powerful and full of the features you need – ready out-of-the-box! • Supports up to 8 of our operator consoles in any combination. • Customizable voice messaging (up to 14 at 1 minute each) provides space for detailed instructions and bi-lingual messages. • Seamless integration with Fire-Lite’s addressable panels and a perfect retrofi t to virtually any fi re panel • The perfect fi t for Schools, Theatres, Places of Worship, Offi ces, Military Facilities, Restaurants, Auditoriums, Factories, and Dormitories

Go to sp.hotims.com and enter 67 for product information.

0313sec_060_064_Rahfaldt_v3.indd 62 2/14/13 4:08 PM

We’re looking for bold performance.

As the nation’s most trusted security company for more than 150 years, Diebold delivers the next generation of security solutions and world-class alarm monitoring.

Our technical specialists and sales professionals are empowered to turn their boldest ideas into innovative solutions for our customers. Diebold offers rewarding compensation, comprehensive benefits and a work environment where talent rises

to the top. As Diebold grows and solidifies our industry leading position, we are seeking high talent individuals looking to enhance their career horizons and industry

recognition by joining the Diebold team. Tell us about your abilities.

For more information visit Diebold.com/careers

Go to http://sp.hotims.com and enter 22 for product information

Untitled-7 1 2/7/13 11:24 AM

BUILDING SECURITY

6 4

trol company can then resell its integration and better market itself to property management companies and building owners.

“AMAG Technology recognized an opportunity to provide property manage-ment companies with a solution that integrates with four of the six major elevator companies’ destination dispatch systems,” Smith said. “They took the gamble and are now in a strong position in the marketplace.”

HOW IT WORKSThe traditional method of interfacing access control systems with elevator control systems limits access for authorized users to designated fl oors in a building. The interface uses relay-based logic where relay outputs are hardwired to elevator sys-tem inputs. When a valid card is presented to the card reader located inside the elevator cab on the car operating panel, selected relay outputs would then become active for fl oors to which the card holder has access.

Using a destination dispatch system integrated with a security system, there is a keypad with an integrated card reader, instead of a hall call station. It is located outside of the elevator. Passengers enter the information and they keypad indi-cates what cab to get in, allowing the person to transport through the building. Passengers must swipe their card and punch in their destination fl oor before enter-ing the elevator cab.

Passengers are grouped together by destination and directed to the same elevator. This reduces waiting and travel times when compared to traditional elevator operation.

BENEFITS FOR THE BUILDING OWNERDestination Dispatch moves people faster through a building and creates less con-

gestion and fast throughput of building tenants and guests. Lobbies are cleaner, sleeker and appear more open and attractive.

A building will use fewer elevators, lowering operation costs and energy con-sumption. This saves money and increases profi ts.

Integrated destination dispatch and security system raises competition in the marketplace. Buildings that move people faster and more effi ciently throughout the building attract long-term tenants. High-rise buildings want every amenity and advantage they can afford in order to obtain long-term tenants.

Another advantage is that a solid elevator dispatch solution helps buildings meet LEED requirements. High rise buildings must often demonstrate a building as “green.” LEED certifi cation provides proof a building has met its environmen-tal goals and allows building owners to take advantage of state and local govern-ment incentives. Buildings can achieve a Certifi ed, Silver, Gold or Platinum level rating that can be accrued in fi ve categories: sustainable sites, water effi ciency, en-ergy and atmosphere, material and resources and indoor and environmental qual-ity. Having an integrated elevator control and security management system saves on energy consumption.

Overall, it is in the best interest of the building owner to consider which security management system they would like to install in conjunction with which elevator control system to use. Choosing the two systems together will allow proper analy-sis of important features for both systems and provide a clear un-derstanding of which elevator system integrations are available. Although it’s more upfront work, it will save time, money and headaches in the long run.

Kim Rahfaldt is the public relations manager at AMAG Technology.

For 30 years, DSI has been making quality security products you can depend on right here in the U.S.A. Our commitment to security includes our fully-customizable optical turnstiles, which we support with superior customer service and excellent warranties. That’s security worth talking about.

To learn more, visit dsigo.com or call 1-800-272-3555.

The DSI Invisigate™ glass barrier optical turnstile

Visit us at ISC West!

Booth #9129

Go to sp.hotims.com and enter 64 for product information. See us at ISC West Booth 9129.

0313sec_060_064_Rahfaldt_v3.indd 64 2/14/13 4:08 PM

See us at ISC West, Booth #11107 Go to http://sp.hotims.com and enter 73 for product information

Untitled-3 1 2/11/13 11:17 AM

6 6 0 3 1 3 | S E C U R I T Y P R O D U C T S

SECURITY INNOVATION

CUSTOMERS ARE OUR EXPERTS FOR INNOVATIONPeople fi nd new ways to integrate software with other solutionsBy Christian Bohn

Video surveillance software can help to count people traffi c, register scratches on cars or show which customers need help in the store. End users fi nd new, clever and creative ways to use open-platform software and integrate it with other solutions.

USER DRIVEN SOLUTIONSThis is the foundation for the concept of user-driven innovation. User-driven in-novation happens when a company examines their users’ needs and develops a solution for them, granting peace of mind. For example, an infrared camera moni-toring in the dark can provide worry-free sleep.

With open-platform surveillance, it is often end users, with their resourceful-ness and expertise, who meet needs when they integrate software into their own unique solutions. In addition to solving the original needs the company had when they initially purchased the software, they can progress software use to solve many other challenges faced by organizations, including reducing production costs and increasing the quality of the products or services they offer. This could be called user-driven innovation, version 2.0.

CARS UNSCATHEDThe following examples of customer innovation lead to inevitable advances in the surveillance fi eld in the future.

A customer purchased a solution to monitor a car showroom at night to pre-vent thefts. But soon they found other ways to use the video surveillance software and cameras. The company is now taking pictures of all the cars that customers test drive. By getting video before and after the cars leave the area, they can docu-ment whether any scratches on a car were infl icted during the trip or whether they were there before the car left the showroom.

The company also uses cameras in the reception area. When a customer calls to speak with an employee, the receptionist can use Milestone’s XProtect software to see whether the employee is present or not. In addition, the cameras identify customers who need attention in the expansive showroom.

This end user has obtained both a tool that can help to prevent thefts at night and a solution to meet other business challenges they contend with.

OPTIMUM STORE DESIGNAnother example of user-driven innovation was the installation of intelligent moni-toring equipment in a Danish retail chain. This could link transactions from cash registers with video surveillance to further support loss prevention management.

The integrated system’s quick resolution of payment disputes with customers and employee errors. Besides helping to reduce shrinkage, the video surveillance solution also is used to count the number of customers in the store. Each store can then com-pare this with their turnover and adjust work schedules to ensure proper staffi ng.

The entire solution works both as an analytical and managing tool to improve operations. In addition, fl oor planners use live video that can be seen from the main offi ce to ensure that a store’s layout is implemented as planned, whether goods are placed correctly, and so on. Plus, the remote access saves them both time and travel expenses. Stores can use video surveillance to monitor customer move-ment patterns and optimize store layout and location of commodity groups and special offer products for optimal customer fl ow and increased revenue.

So, should Milestone have not thought of this? In both the above cases, it is the customer who uses the software in its specifi c environment in creative ways that add value to the individual business. The customer is an expert in his own business and, with the open-platform software, we provide them with extensive opportuni-ties for integration with other systems that create value for them individually.

FUTURE VIDEO SURVEILLANCEWe think a lot about where video surveillance will go in the future. We see how the confi dence of residents in disadvantaged neighborhoods increases when installing video surveillance, and we believe that video surveillance will become more com-mon as a tool for positive changes both in public and private areas.

Video surveillance will be increasingly pushed from mobile phones. For ex-ample, the police will begin streaming video from responders’ mobile phones at accident scenes so emergency centers can provide even better service, just as police are already using citizen’s own phone-captured photos and video to help identify perpetrators.

Privately, people will be able to use their phone cameras for mobile video sur-veillance and live streaming to YouTube, for example. There is now a trend that more devices are equipped with computing pow-er and network access. In the future, video surveillance will be-come part of the standard equipment in portable devices.

Christian Bohn is the vice president of alliances and corporate marketing at Milestone Systems.

0313sec_066_Bohn_v3.indd 66 2/14/13 4:09 PM

Order now. We’re ready to deliver.Download our FREE IP comparison guide todayfor a chance to win a Google Nexus 10!Visit www.SEreply.com Key Code y480v

©2013 Schneider Electric. All Rights Reserved. Schneider Electric and Pelco are trademarks owned by Schneider Electric Industries SAS or its affi liated companies.

Terms and conditions apply. Visit www.pelco.com/logistics or call your local representative today for complete details about 24-hour out-the-door shipping and 90-day, no questions asked returns, only from Pelco by Schneider Electric.

24-hour shipping. 90-day returns. Order with confidence.At Pelco by Schneider Electric™, we understand the challenges that today’s security professionals face. From tight

project deadlines to last-minute requirement changes, we know that projects don’t always go as planned. That’s why

assume it.

We’re committed to your satisfaction.

See us at ISC West, Booth #18031 • Go to http://sp.hotims.com and enter 80 for product information.

Untitled-24 1 2/12/13 4:43 PM

PRODUCT SOLUTIONS Compiled by Lindsay Page, Associate Content Editor

DVRS / NVRS

6 8

DVTELMeridian

DVTEL’s Meridian NVR eases installation and man-agement while reducing the cost of megapixel video deployments for integrators and end users. Available in four and 16-port models, Meridian combines a high-powered Ethernet switch, auto-matic setup features and video management soft-ware into a single appliance. The NVR automati-cally discovers IP addresses, confi gures cameras for motion detection and starts recording without user intervention. A standalone unit is ideal for sur-

veillance environments with up to 24 cameras, and users may leverage multiple units to build a larger system. DVTEL.

Go to sp.hotims.com and enter 450 for product information.

Channel Vision3G Series DVR

Channel Vision’s 3G compatible 4, 8 and 16-Chan-nel DVRs utilize the latest H.264E digital compres-

sion technology to improve video streaming capa-bilities and reduce the storage space needed to archive extended days of recorded video. Penta-plex operation allows users to simultaneously view live images, record, playback, backup data and access streaming video via the network. Monitor-ing can now be anywhere, anytime in the world from the convenience of your iPhone, Blackberry, Android or Windows Mobile phone. The DVR-43G, DVR-83G and DVR-163G can also provide control of PTZ cameras, making it a perfect match for Channel Vision’s PTZ cameras. Channel Vision.

Go to sp.hotims.com and enter 451 for product information.

Fortinet Inc.FortiCam-200D

The FortiCam-200D NVR is the core of the Forti-Camera surveillance solution and includes every-thing a user might need, except the cameras. Us-ers can capture continuous or motion-based recording. Alarms and notifi cations keep you aware of what’s going on. An event timeline lets you fi nd and review motion events quickly and

easily. Plus, FortiCamera can send snapshot notifi -cation e-mails to your smartphone or other device, enabling you to immediately see what’s going on in your facility. Fortinet Inc.

Go to sp.hotims.com and enter 452 for product information.

WavestoreUSAE-Series

Wavestore’s Enterprise Series (E-Series) server can be outfi tted with up to 50 hard drive bays and optimized for any storage capacity. Easy to operate and install, the product can simultaneously record video images from a combination of analog and network cameras. Built-in RAID technology and hot-swappable hard drives make the server robust and reliable. The eco-friendly E-Series has found success in a variety of environments such as ports, airports, casinos, manufacturing facilities, data centers, schools and retail. WavestoreUSA.

Go to sp.hotims.com and enter 453 for product information.

DVRs and NVRs are both essential pieces of secu-rity equipment because they record video and audio from security cameras. With both of these products,

users can take advantage of having real-time and recorded video for both businesses and residences. DVRs typically use analog cabling in order to bring the analog signal from the camera to the device. For IP-based NVRs, the IP network

transfers the information from its LAN port. Both the DVR and the NVR are critical additions to any surveillance system.

• Motion activated trigger as fast as 1/10th of a second.• 1080P High Definition color images by day, NoGlowTM CovertInfrared illumination by night.

• Compact size (5.5” x 4.5” x 3”) aids in concealment.• On-board memory and power with a battery life of up to oneyear or 40,000 images.

• Completely weatherproof housing designed forextreme duty usage.

• General surveillance and license plate capturemodels available.

• Made in the U.S.A.

Reconyx HyperFire security series cameras are designed for quick and easy deployment in areaswhere no power or communication lines exist.

Visit www.reconyx.com for more information.

CovertInfrared

CovertInfrared

NoGlow

Go to sp.hotims.com and enter 41 for product information. See us at ISC West Booth 26140.

0313sec_068_073_PS_dvrs_v4.indd 68 2/15/13 1:31 PM

W W W . S E C U R I T Y - T O D A Y. C O M 6 9

GenetecSV-16

The SV-16 is an energy-effi cient NVR powered by Security Center, Genetec’s unifi ed security plat-form. Designed to support up to 16 edge devices, the SV-16 provides an ideal solution to enable cus-tomers to consolidate multiple remote sites within a single security environment, or for use in instal-lations that require an easily deployable IP video surveillance solution. Integrations with industry leading technology partners ensures that the NVR is compatible with a wide range of IP cameras, encoders, allowing customers to choose the hard-ware that will best suit their requirement. Genetec.

Go to sp.hotims.com and enter 454 for product information.

Bosch Security DVR 670 Series

Bosch Security’s DVR 670 is a complete video management solution for up to 16 cameras and offers real-time recording in 4CIF resolution simul-taneously on all channels. Live viewing is possible in multiple display aspect ratios, from smart-phones right up to wide screen monitors. The DVR allows operators to control video and recording anywhere via LAN, WAN or the Internet using the bundled Bosch Control Center software, a zero-in-stall web client or the Bosch DVR Viewer app. This video management solution is ideal for schools, shops, banks or hotels, as well as larger enter-prises with several locations. Bosch Security.

Go to sp.hotims.com and enter 455 for product information.

Digital WatchdogVMAXHD

The VMAXHD is an advanced H.264 digital video recorder that offers real-time, true High Defi nition recording. The VMAXHD uses existing coaxial ca-ble infrastructure while providing an unparalleled HD image quality. Combined with Digital Watch-dog’s HD-SDI camera line, the VMAXHD is uniquely designed to offer remote camera controlling via

Coax cable for complete camera confi guration from the DVR. The VMAXHD offers features such as free DDNS, DVR health check, E-mail notifi cations, 4 sensor/audio inputs and digital zoom-in in live. The VMAXHD is equipped with up to 12 Terabytes of memory. Digital Watchdog.

Go to sp.hotims.com and enter 456 for product information.

CBC (America) Corp.Ganz PixelMaster NVRs

Transition from analog to IP with the Ganz Pixel-Master 4 and 8 channel embedded NVR series. It

provides 1080p real-time recording with triplex operation and effi cient H.264 compression. Sim-ply plug and play PixeIPro IP cameras with no confi guration required. All professional surveil-lance functions are embedded in this compact, stand-alone NVR without any extra software re-quired. CBC (America) Corp.

Go to sp.hotims.com and enter 457 for product information.

See uus aat

ISC WWEESTTbooth ##40042

See us at

ISC WESTbooth #4042

Cut Strip Terminate Test

Electrical Datacom Telecom Residential

Since 1997, we have provided the finest wire and cable installation tools, connectors and testers. Including cutters, strippers, crimpers, EZ RJ45® CAT5&6 & coax connectors and accessories. Today, we are the first choice for low-voltage network installers that cut, strip, terminate and test. 800.749.5789 www.platinumtools.com

New!The Recon™ Test Set has features not found in any other ‘butt’ set.

EZ-RJ45®

“The world’s easiest twistedpair termination system.”

New!VDV 2.0 MapMaster™ KitCombines continuity, mapping, tone generation and length measurement for CAT-6/5e/5/4/3, shielded cables & coax. Includes the tester and accessories for VDV testing in a super rugged case. P/N T129K1 Made in USA

Cat5/5e/6 Simplify terminations by inserting wires/wire through the connector to verify the proper wiring order. Solid or stranded shielded versions! Terminate with the patented EZ-RJPRO HD Crimp Tool P/N 100054C. P/N 100003 Made in USA

& identification

P/N T62

Go to sp.hotims.com and enter 59 for product information. See us at ISC West Booth 4042.

0313sec_068_073_PS_dvrs_v4.indd 69 2/15/13 1:31 PM

PRODUCT SOLUTIONSDVRS / NVRS

7 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

SamsungSRN-1000

Samsung’s fl exibility meets form and function with

intuitive SRN-1000 NVR. The product is compatible with today’s multiple recording formats, and it can record up to 64 cameras and 100 MBps of video bandwidth. The NVR is also is scalable to meet growing storage needs, including up to eight inter-nal HDDs and two external, 48 TB. Samsung.

Go to sp.hotims.com and enter 458 for product information.

Speco TechnologiesD16DS

Speco Technologies’ new D16DS DVR is ideal for a

wide range of applications and offers a simple and cost effective solution to high resolution challeng-es. Optimized with 960H technology, the DS pro-vides a 30% increase in resolution—the highest available for analog CCTV compared to D1. The DVR supports real-time 30FPS per channel 960H recording, and utilizes Speco’s Digital Deterrent technology to help assist in preventing crime. The DS has a complete suite of EZ Wizards to facilitate an easy and seamless networking and installation. The EZ Setup Wizards allow an installer to open a “Wizard” to walk through simple point and click steps for a successful connection to the internet. The one click wizard guides the set up essentials of the system in a logical and easy to understand sequence. The DVR will get an IP address, DDNS name and even use UPnP to port forward the rout-er. Speco Technologies.

Go to sp.hotims.com and enter 459 for product information.

Promise TechnologyVess A2000

The Vess A2000 series NVR appliances are high performance and reliable IP video surveillance so-lutions that are designed for easy maintenance and serviceability. The Vess A2000 reduces sup-port and equipment costs because there is no separate RAID storage unit to manage, eliminating the need for a server, controller cards, external cables, and a separate storage enclosure. The Vess A2000 is perfect for midsize to large scale IP video surveillance deployments. Tailor made with the user’s choice of OS, video management software, and hard disk drives, the Vess A2000 is easy and affordable to grow with the user’s video surveil-lance needs. Promise Technology.

Go to sp.hotims.com and enter 460 for product information.

GeutebruckG-Scope/1000 Series

The new Geutebruck G-Scope/1000 series of com-pact NVRs deliver high performance in confi ned spaces. Ideal for building into ATMs, these com-pact units (302 x 250 mm x 2HU) with enhanced temperature stability and 1TB databases are ideal for retail branches and other operations with just a few video cameras. The G-Scope/1044 processes up to 4 analog and 2 IP video sources at once, while its pure IP equivalent, the G-Scope/1006 supports up to 6 IP inputs. Geutebruck.

Go to sp.hotims.com and enter 461 for product information.

• High-performance and cost-effective solution to transmit IP video, data and power over coax cable up to 1500 ft.

• Supports PoE and PoE+ cameras and access control devices

• Eliminates labor and costs of deploying new cable

• Auto detection and protection of legacy non-PoE cameras/devices

with eBridgePlus... only from Altronix

eBridgePlus Ethernet over Coax/PoE Adapters

IP and PoEover Coax!

[email protected]

More than just power.™

MADE IN THE U.S.A. • LIFETIME WARRANTY

Go to sp.hotims.com and enter 12 for product information. See us at ISC West Booth 14077.

0313sec_068_073_PS_dvrs_v4.indd 70 2/15/13 1:31 PM

W W W . S E C U R I T Y - T O D A Y. C O M 7 1

3VRP Series

P-Series 3VR’s P-Series NVRs provide a bridge to IP video to seamlessly support a wide variety of cameras and video environments. The NVRs fea-ture superior video management and increased storage capacity for situations where RAID storage is not required. The products include 1 - 4TB RAID internal storage, 2 Video Analytics core features included, and has support for up to 16 channels of Core or Premium 3VR analytics. Users can mix and match analog, IP, megapixel and PTZ cameras for maximum fl exibility. The NVRS can also be inte-grated with POS, Access Control, ATM and other third-party systems. 3VR.

Go to sp.hotims.com and enter 462 for product information.

Promise Technology Vess R2000

The Vess R2000 3U16-bay series are dual active-active high availability 8Gbps FC and 1Gbps iSCSI IP SAN solutions for SMBs that are engineered to deliver total component redundancy, impressive performance and proven reliability for mission critical applications. The Vess R2000 streamlines administration, adds simplicity, fl exibility and effi -ciency. The Vess R2000 supports the high capacity 4TB hard disk drives, allowing each single storage node to scale up to an impressive 448TB of raw capacity through cascading expansion JBOD units. Promise Technology.

Go to sp.hotims.com and enter 463 for product information.

SenecaxVault xNVR100 USFF

Designed to deliver reliability and performance, the xVault xNVR Ultra Small Form Factor (USFF) rounds out a complete line of xVault xNVRs for small, large and mobile deployments. The USFF xNVR supports the 2nd generation Intel Core i3 Processor, equipped with an integrated graphics processor and is designed for real time high defi ni-tion video decoding. This digital security and sur-

veillance solution is built in Seneca’s exclusive ul-tra small form factor chassis with 750GB of maximum raw storage. This solution is ideal for small installations that demand proven throughput performance. Seneca.

Go to sp.hotims.com and enter 464 for product information.

InterlogixTruVision DVR 11

The TruVision DVR 11 (TVR 11) is a cost-effective,

digital video recorder with 4-, 8- or 16-channel capabilities utilizing H.264 video compression technology to deliver real-time recording per channel at a CIF resolution. A built-in Web browser and access via mobile apps allow you to stay con-nected remotely via any Web-enabled device. Compatible with TruVision Navigator, the DVR 11 integrates easily with existing systems and fea-

Go to sp.hotims.com and enter 86 for product information.

0313sec_068_073_PS_dvrs_v4.indd 71 2/15/13 1:31 PM

PRODUCT SOLUTIONSDVRS / NVRS

7 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

tures a familiar, user-friendly interface with inter-nal storage from 500GB up to 4TB. Featuring re-mote management and reliable recording, the DVR 11 represents a comprehensive solution to fi t your needs and budget. Interlogix.

Go to sp.hotims.com and enter 465 for product information.

Digital WatchdogDw-NEXUS

The DW-NEXUS is a Network Video Recording device that is capable of supporting most major brands IP cameras, including DW’s IP MegaPIX camera series, Our unique Digital Signature Veri-

fi cation (DSV) and the exported videos and images can be reviewed for tampering. Additional features include: HDD fi eld upgradable hardware, network bandwidth control for each camera, PTZ camera control and up to 20 Terabytes of internal storage. The Nexus Software is a cost effective solution, al-lowing users to build your own computer and load the software to record and manage up to 32 IP cameras. Digital Watchdog.

Go to sp.hotims.com and enter 466 for product information.

Nice VisionNet 2.5

NiceVision’s Net 2.5 is an enterprise-class IP video surveillance solution that maximizes video by enabling users to extract the most possible value from their video management system tech-nology. Providing continuous surveillance cover-age and control for any size environment, its open platform design provides real fl exibility to-gether with backwards and forwards compatible to protect past and future investments. With its hybrid technology, this surveillance solution en-ables existing analog infrastructures with today’s advanced IP functionality. Nice Vision.

Go to sp.hotims.com and enter 467 for product information.

Channel VisionNVR-4

Channel Vision’s NVR-4 is ideal for any megapixel IP camera security system network. With the new NVR-4, up to four online clients can simultane-ously view real-time 1080p streams from any browser or mobile device. The NVR has built-in time and event search functions and H.264 com-pression, and are available in three options 1-Tera-byte (NVR-4-1000), 4-Terabytes (NVR-4-4000) and the stand alone option with no hard drive in-cluded. Each separate model is expandable up to 6-Terabytes. Channel Vision.

Go to sp.hotims.com and enter 468 for product information.

Secure access and control threats from inside and outside your facility.

quantumsecure.com

SAFE Gives Control to Security Managers. SAFE is ideal for:

Control and manage physical access to all your restricted areas.

Ensure compliance is easily accomplished with SAFE Solutions

from Quantum Secure.

Our SAFE Software Suite is a Physical Identity & Access

Management System that enables global security managers

to automate and streamline badging operations with on/off

boarding of all identities. SAFE delivers attestation reports,

compliance to regulations, performs Insider risk assessment with

facility access analytics, and will interoperate disparate access

and HR systems.

Government HSPD – 12 / FICAM Compliant PIV Visitor Identity Management

Aviation & Ports

Telecom, Energy, Utilities

HealthCare, Pharmaceutical

Oil, Gas, Petrochem

Go to sp.hotims.com and enter 40 for product information. See us at ISC West Booth 41013.

0313sec_068_073_PS_dvrs_v4.indd 72 2/15/13 1:31 PM

W W W . S E C U R I T Y - T O D A Y. C O M 7 3

ToshibaESV4

The Toshiba ESV4 is a four-channel embedded NVR that combines high-defi nition output with ex-ceptionally low cost-of-ownership. The NVR is loaded with new features and technologies like HDMI output in 1080p high-defi nition video, simul-taneous recording of four megapixel IP cameras, mobile app support (iPhone, iPad, Android) and free Video Management Software to make it the perfect solution for those businesses hesitant to migrate from legacy analog systems to IP video surveillance. It is compatible with Toshiba IP cam-eras and more than 500 other OnVIF compliant IP cameras up to fi ve megapixels. Toshiba.

Go to sp.hotims.com and enter 469 for product information.

SenecaModular NVR

The Modular NVR is ideal for security and surveil-lance solutions that require video management applications to run on multiple servers. Built on Multi-Flex Technology, this system integrates stor-age, computing, and networking to simplify IT en-vironments. The Modular NVR is able to meet re-quirements for multiple environments including video management, client management, perimeter control and analytics all in a single chassis. The Modular NVR provides a scalable and fl exible serv-er solution to meet the needs of complex physical security deployments. Seneca.

Go to sp.hotims.com and enter 470 for product information.

ATV NVR16

This NVR is part of the ATV IP Solutions product line. The OnVif-compliant NVR16 offers 16 video channels, H.264 compression, 480-ips at D1

resolution, FHD1920 x 1080 record resolution, multiple recording modes and multiple search modes. The remote system operation is sup-ported by the extremely powerful and intelligent video surveillance management software, ATVi-sion IP, with ten simultaneous connections. The system supports network time sync, alarm as-

sociation, 16-channel audio recording and self-diagnostics with automatic notifi cation for HDD SMART Protocol. The unit provides two internal and four external (eSata) hard disk drives and four USB2.0 ports. ATV.

Go to sp.hotims.com and enter 471 for product information.

IP StandardsGot You Thinking?

Relax. Install IP over Coax!Now, you can upgrade any legacy CCTV system without the expense of re-cabling.

Use existing coax cable for transmission of IPvideo and PoE. NVT Ethernet over Coax(EoC) transceivers enable analog cameras tobe easily upgraded to IP/Megapixel models.

Call us about our $100 EoC Test Drive Rebate offer, +1.650.462.8100.

www.nvt.com

• Transmit IP video & PoE+ over the 328’ limit

• Keep costs reasonable

• Phase the migration, swapping analog for IP

• Minimize disruption to the business

• Avoid lead and asbestos abatement issues

I need to...

Go to sp.hotims.com and enter 38 for product information. See us at ISC West Booth 15107.

0313sec_068_073_PS_dvrs_v4.indd 73 2/15/13 1:31 PM

7 4 0 3 1 3 | S E C U R I T Y P R O D U C T S

IP VIDEO SURVEILLANCE

The Internet has revolutionized everything from commerce to court-ship for billions of people around the world. It is no surprise, then, that the growth of high-speed IP networking also has impacted the video security industry, making surveillance systems more fl exible and effi cient than ever before.

System design and equipment choices designed to protect key assets—person-nel, physical plants and merchandise—have never been more diverse. Although analog video systems may still seem appealing for smaller installations because of their comparatively lower cost, IP-based systems offer many advantages for capturing and transmitting high-quality HD images via the Internet or a LAN connection for remote monitoring. IP video cameras tend to be simple to install, thanks to such features as PoE and the widespread nature of IP networks, which make additional cabling unnecessary.

Compact digital IP cameras can zoom-in on surrounding environments to pro-vide comprehensive observation of sensitive areas. Some cameras even provide remote-controlled robotic pan and tilt. Industry standards, such as the Open Net-work Video Interface Forum (ONVIF) Profi le S, provide compatibility among dif-ferent security products used in IP video security networks.

The ability to view, save and transfer video digitally via an Ethernet network that can provide a full megapixel feed for viewing and/or recording at a central monitoring location—or a more compressed stream of the same video on a pass-word-accessed smart phone or iPad—leads to unprecedented convenience and ef-fi ciency. Video can be recorded, shared and transmitted over long distances, elimi-nating the barriers of physical distance. Rather than debate the relative merits of analog and digital, let’s concentrate on the benefi ts of networked digital IP-based video security systems. This market is growing substantially, thanks in no small part to the IP security camera manufacturers that have worked tirelessly to fi nd ways of improving performance while controlling costs.

NETWORK IMAGINGDigital computer technologies have revolutionized every form of imaging, wheth-er it’s at the local movie theater or on the surface of Mars. In IP security cameras, the benefi ts of computer technology start with the lens, which must be precision-designed and manufactured to produce crystal-clear, low-distortion images from corner to corner in conditions ranging from extremely low light to extremely high-contrast lighting. This is especially true if the lens is designed to be integral to the

SECURITY SYSTEM ADVANTAGES Internet links everything from commerce to courtingBy Chuck Westfall

0313sec_074_077_Westfall_v3.indd 74 2/14/13 4:10 PM

7 5

camera and provide special features, such as a wide angle of view or a 20x or 40x zoom to capture crucial visual details at a distance.

These performance capabilities require supercomputer optical design, and those IP security camera manufacturers with the in-house expertise to achieve them are a step ahead of competitors who must purchase lenses from outside suppliers. In-house design and manufacturing ensures better performance because lenses can be built to work in total synergy with other key camera components, such as image sensors, digital network video processors and image processors.

Recent advances in CMOS image sensor technology have made them more eco-nomical than ever to offer megapixel IP security cameras, which provide approxi-mately four times the pixel count and twice the linear resolution of conventional VGA cameras. Today’s quality HD megapixel IP security cameras also include a digital network video processor—a powerful, highly effi cient compression, en-cryption and transmission engine. Advances in the digital compression algorithms employed by these processors have resulted in more effi cient data storage with minimal loss of image quality. These new algorithms enable users to manage the increased volume of image data produced by HD megapixel IP security cameras more effectively.

A good-quality megapixel IP security camera offers multiple resolution and data compression options to suit the needs of diverse users, who may wish to view security images on any number of contemporary digital display devices. In addition to megapixel resolution for detailed image analysis on a large monitor, many users require VGA resolution for low-cost monitor display, and QVGA (320 x 240) or even QQVGA (160 x 120) resolution for use on mobile devices such as smartphones.

The two dominant forms of data compression in modern IP security cameras are Motion JPEG and MPEG-4 or its subset, H.264. Motion JPEG is best for

applications where there is a need to extract individual video frames for de-tailed analysis, while MPEG-4 offers superior data compression for video data storage. The better megapixel IP security cameras on the market today provide simultaneous output of Motion JPEG at a variety of resolutions and MPEG-4 or H.264 video.

Additional digital image processors in today’s megapixel IP security cameras can be designed to optimize picture quality in a variety of ways, ranging from the preservation of detail with a simultaneous reduction of noise—even in low-light—to the accurate rendering of colors and tones. Megapixel IP security cameras can achieve excellent quality in color at light levels as low as .03 lux. For black-and-

APPLICATIONS- Parking Lots- Perimeters

- Campus- Temporary Events

MicroPower Technologies Solar Wireless Surveillance System

www.micropower.com

Delivering perimeter surveillance where it’s needed while

No trenching requiredCompletely wire-free

Coexists with Wi-FiOne-half mile rangeInteroperable with most video management systems

Call MicroPower at 877-536-0128 for a FREE site assessment

Go to sp.hotims.com and enter 34 for product information. See us at ISC West Booth 7141.

0313sec_074_077_Westfall_v3.indd 75 2/14/13 4:10 PM

IP VIDEO SURVEILLANCE

7 6 0 3 1 3 | S E C U R I T Y P R O D U C T S

white images, good quality has been achieved at light levels as low as .001 lux, and for high-contrast lighting con-ditions, new algorithms can allow se-lective brightening of shadow areas in the image without the loss of detail in

brightly lit areas.This capability is invaluable for

many environments that combine out-door/indoor illumination in a single scene. Added together, digital process-ing for low-light/low-noise imaging and

color accuracy combined with preci-sion optics, and HD megapixel resolu-tion video that can be viewed and/or recorded via any Internet connection amounts to a formidable security tool. But the advantages of an IP video se-

curity camera systems don’t end there.

VIDEO ANALYTICSThe large amount of monitored video from IP cameras observing sensitive locations is a challenge for today’s se-curity professionals at all levels. For-tunately, automated video analysis, using computer intelligence to detect crucial details that might elude human observers, is now a built-in feature in many megapixel IP security cameras. Known as video analytics, this innova-tion increases the information value of security video and can benefi t the ROI in monitoring staff and equipment, and improve the effi ciency and overall bot-tom line of security organizations.

Video analytics can be as basic as the capability of some PTZ IP video cam-eras to automatically identify and track motion within a scene—based on user-adjustable settings—to more advanced features that make the camera, in ef-fect, a “partner” in detecting anoma-lous events. These intelligent features can include the detection of abandoned, moving or removed objects in an image, combined with the triggering of an alert signal when such events occur.

Examples of situations where video analytics in action include detecting abandoned briefcases or backpacks in public areas (airports or other transportation centers), move-ment in areas where there shouldn’t be any (a retail store), the absence of an object that should ordinarily be in a picture (artwork in a museum), or “tripwire” intrusion past a user-preset line or object and into restricted ar-eas (a doorway, window, driveway or other boundary).

Video analytics can be user-adjust-able in terms of detection area—au-tomatically highlighted for instant visual identifi cation—sensitivity and duration. Video analytics also gives us-ers the option to economize on video archiving, since they differentiate be-tween important video segments from those that are not.

Reinforcing video analytics are cam-era analytics, which can include the de-tection of abnormal noises in the cam-era’s immediate vicinity, ranging from the sound of gunshots to someone tampering with the camera or physi-cally abusing it. Physical disturbances to the camera and its protective dome also can trigger alerts. Additional video

Digital Management Solutions manufactures customized video surveillance products for companies worldwide. From oil refineries to police departments, DMS makes turnkey solutions that are designed to run autonomously and integrate easily with existing infrastructures. Equipped to tailor sites vulnerable to theft and vandalism, DMS is known for its resourceful technology and dependability. Often referred to as a cost effective approach for security, Netvision surveillance is simple to manage, eco-friendly and reliable for years to come.

Visit www.netvisionmobile.com or call 1-800-380-9365 to learn more about the Netvision product line and dealer program. Stop by booth #11119 at ISC WEST.

You Decide. We Customize.

Go to sp.hotims.com and enter 65 for product information. See us at ISC West Booth 11119.

0313sec_074_077_Westfall_v3.indd 76 2/14/13 4:10 PM

W W W . S E C U R I T Y - T O D A Y. C O M 7 7

analytics can be provided by computer-based recording hardware programmed to recognize faces, shapes, objects and other user-determined details.

Mindful of privacy concerns, some manufacturers of IP video cameras offer users the ability to create a priva-cy mask to block the view of sensitive locations, such as residential doors and windows, ATM keypads or com-puter monitors. User-settable, privacy masks are especially convenient for large installations of IP video security cameras in urban areas, where there may be a mix of commercial proper-ties needing scrutiny and private resi-dences that do not. Advanced digital control of IP video security cameras can provide major benefi ts to install-ers, especially where large numbers of cameras are involved.

REMOTE ADJUSTMENTBecause each IP video security camera has its own IP address, it can be viewed individually. Users can even set-up fi rewall access to secure and encrypt the data fl ow to and from the camera. Better-quality cameras further lever-age this authorized-user addressability with remote-adjustment features that can save installers and end-users major expense in adjusting or re-setting the image-capture area and focus settings of large numbers of stationary camer-as, and/or cameras that are particularly inaccessible.

Using a software application run-ning on any Internet-connected PC, the best IP security cameras let you remotely disconnect the camera from its VMS and then adjust its PTZ, rota-tion and focus settings. Doing this from your desktop is less costly and easier than having a technician climb a ladder or use a bucket truck to access multiple

cameras, remove each camera’s dome cover and then putting it all back to-gether again.

When choosing an IP video camera, it’s important to make sure it provides four-axis remote control of PTZ, ro-

tation and focus settings. That fourth axis makes a critical difference because it enables you to adjust the horizon of the camera once you’ve achieved a new fi eld of view.

Chuck Westfall is the technical advisor for the professional engineering and solutions division of Canon U.S.A. Inc.

Intelli-Site™ Compass™ MASC™I t lli Sit ™ C

The World Leader In Security Integration

PSIM SolutionsINTERCOMACCESS CONTROL

CCTV / VMS

PERIMETER FENCE

INTRUSION

FIRE ALARM

SNMP, Smart PLC, Patient Wandering, Infant Security, Lighting Control, Modbus, Telephony, and Contact ID

PLC

RFID

SEE WHY MORE SECURITY DIRECTORS ARE SWITCHING TO OSSI’S PSIM TECHNOLOGY

RF

www.ossi-usa.com

1 [email protected]

Developed and Manufactured in the USAd i th USA

FIDRF

Go to sp.hotims.com and enter 39 for product information.

0313sec_074_077_Westfall_v3.indd 77 2/14/13 4:10 PM

FULLY POWERED PoE boosts effi ciency while cutting costsBy Ronnie Pennington

The term “alternative power” carries different meanings for security professionals. As the use of alternative wind and solar power in-creasingly fi nds its way into professional security applications for re-mote locations, new means of delivering power to core security and video surveillance devices continue to rapidly gain traction. More

specifi cally, the ability to deliver video, data and power over Cat-5 Ethernet and coaxial cabling provides security professionals with an attractive solution for de-ploying highly-functional, networked systems with extreme cost-effi ciency.

POE ADVANTAGESMore and more system designers and installers are realizing the advantages of PoE. First used for VoIP telephones, PoE technology has gained popularity as a means of safely introducing power to other network devices via the same Cat-5 (or higher) cable that transmits Ethernet data. In security and surveillance systems, up to 15.4 watts can be supplied to network cameras and other devices using the original IEEE 802.3af standard. The newer IEEE 802.3af standard, also known as PoE+, can supply up to 25.5 watts of power to operate heaters and blowers for outdoor cameras, among other devices. A higher-power PoE standard on the ho-rizon will provide even more power.

PoE is redefi ning how security professionals design and deploy systems. Rather than using the standard-type of power supplies, integrators are increasingly em-

ploying PoE network switches or incorporating PoE midspan devices that inject power into an Ethernet cable after it leaves the switch and before it reaches the network device.

Many integrators are already deploying PoE solutions. However, one common problem is that some existing PoE switches do not provide suffi cient power for the end-point devices. Even non-security devices, such as newer, feature-packed, IP telephones, may draw more power than a PoE switch may supply. In such cases, a PoE midspan can provide the solution while simplifying power management and ensuring system functionality. Other advantages include scalability and fl exibility, such as cascading for longer distances, and the ability to easily match the power requirements for an edge device.

PoE also ensures that power remains intact, even if a network connection is lost. For example, many IP cameras now can record images on an SD card, as a backup, if a lost network connection occurs, but the feature doesn’t work if the camera’s power supply is interrupted. With PoE midspans, cameras will still operate.

In addition, deploying managed midspans, with remote access via an IP address provides integrators and dealers with numerous advantages and benefi ts when in-stalling, troubleshooting and servicing systems. This allows technicians to determine the current draw of each end-point device, the maximum current draw and how much power remains available from the midspan to connect additional devices.

Managed midspans also provide diagnostics to detect possible system prob-

ALTERNATIVE POWER SUPPLIES

7 8 0 3 1 3 | S E C U R I T Y P R O D U C T S

0313sec_078_079_Pennington_v3.indd 78 2/14/13 4:11 PM

lems and offer the ability to shut down power to individual ports for mainte-nance or when connecting devices. If a device needs a simple reboot, remote access allows installers to perform re-boot functions without sending a tech-nician to the job site. These features make system setup, service and main-tenance much more effi cient relative to the deployment of manpower into the fi eld—a critical issue for applications in remote locations.

IP-OVER-COAX TRANSFORMS LEGACY COAX CABLE INTO NETWORK INFRASTRUCTUREThere are millions of existing analog systems that use RG59 with separate power cabling for video surveillance applications. By employing IP-over-coax, Ethernet adapters, it is possible to upgrade systems from analog to IP, without having to rewire a facility with structured cabling. In addition to substantial cost savings, IP-over-coax also extends transmission distances over 1,500 feet without repeaters—Al-tronix eBridgePlus Ethernet Adapt-ers, which is well beyond the Cat-5E/6 cable maximum of 328 feet. And when you add in the ability to simultane-ously deliver PoE and PoE+ power over coaxial-cable infrastructure, the cost savings continue to add up by eliminating the equipment and labor expenses associated with installing lo-calized power supplies.

IP-over-coax Ethernet adaptors al-low video from multiple cameras to be transmitted on a single coax cable, by adding a switch at the camera end. When using IP cameras with composite video outputs, some Ethernet adapt-ers can transmit both IP and compos-ite video simultaneously, ensuring that video is always present on the coax for monitoring and recording purposes.

All of these advantages mean signif-icant savings when migrating systems from analog to IP networked function-ality, with virtually no sacrifi ce in sys-tem performance.

Considering alternative power sources from the perspective of both power generation and power delivery solutions, there are numerous possibili-ties to examine when implementing in-frastructure upgrades and new installs. Combining power generation sources, like wind and/or solar, can provide the means to deploy advanced security solutions in remote locations, where

power is not easily delivered. The ben-efi ts also apply to facilities looking to take advantage of installing their own power generation capabilities to reduce long-term, recurring, overhead, power expenses. In either case, these power generation technologies can easily be

complemented with traditional, local-ized power supplies, PoE, or IP-over-coax technology. The combination of various, alternative energy solutions opens up new realms of possibilities for system designers. The key is getting past the semantics fi rst, and approach-

ing old challenges with a new mindset.

Ronnie Penningtonis the national accounts manager at Altronix Corp.

1/3” 2.8-8mm F/1.2Mega-Pixel IR Vari-Focal

1/3” 8-50mm F/1.6Mega-Pixel IR Vari-Focal

The Double Vari-Focal solution. Cover all focal lengths from wide to tele with 3-Mega-Pixel resolution using just 2 lenses.The new IR-corrected Mega-Pixel lens series from Tamron features a focal length range of 2.8 to 50mm in just two lenses that cover a 126.1° to 6.8° horizontal angle view using a 1/2.7" camera. With Tamron’s Double Vari-Focal lens solution, you can monitor extreme wide and tele scenes in Mega-Pixel resolution during both day and night without making compromises in resolution. A new optical design uses glass mold aspherical lens elements and a special optical coating that ensures 3MP high resolution even under IR light. The addition of a P-Iris model to this series allows an even more precise adjustment of the Iris to gain the optimal depth of field and light exposure. Tamron’s Double Vari-Focal solution. The simple choice for better security imaging.

www.tamron-usa.com

Security Simplified.Full coverage in just 2 lenses.

Go to sp.hotims.com and enter 43 for product information. See us at ISC West Booth 17099.

W W W . S E C U R I T Y - T O D A Y. C O M 7 9

0313sec_078_079_Pennington_v3.indd 79 2/14/13 4:11 PM

8 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

VIDEO SURVEILLANCE

When we refl ect on the history of CCTV, this we can see from NTSC/ PAL standard classifi -cation, that the development of the technology is closely

related to broadcasting standards and technologies. The recent trend of increasing demands for high-defi nition, video surveillance also is connected to the acceleration of HDTV’s popularity all over the world.

At present, the most widely used method to get high-defi nition video into the CCTV market is through an IP-based, camera system that compresses video and transmits it through a network using the TCP/UDP protocol.

Even though the product release of HD-CCTV is based on HD-SDI transmission technology, it has been rapidly increasing since the beginning of 2012. There has not been enough marketing about HD-CCTV and its technology and products, so only the future will tell the tale.

WHAT IS HD-SDI, HD-CCTV?HD-CCTV is an acronym for “high-defi nition CCTV” products that use HD-SDI transmission technology. Completely distinct from conventional analog TV, HD-CCTV is the generic term derived from conven-tional CCTV.

High-defi nition, serial digital interface (HD-SDI) is an advanced technology for video transmission de-veloped to ensure transmission among HD cameras, recording equipment and monitors used in the broad-casting world.

One of the most defi ning features about HD-SDI is that it can transmit full-HD video through the coaxial cable without video compression. With the release of low-cost, main, chipset solutions, HD-SDI technol-ogy was introduced to the CCTV market in 2009, and the technology began appearing in products in 2011.

With HD-SDI, full-HD video is converted to a 1.5 GBps serial digital signal at the camera. This signal is transmitted to the DVR through the coaxial cable and fi nally displayed to the monitor as a recorded video onto hard disk after video compression. Although the HD-SDI transmission of HD-CCTV products provides high-defi nition video throughout the process of recording, displaying and playing back in cameras and transmission media, it keeps a similar system de-sign and the same operation methods as conventional analog CCTV.

THE MERIT OF HD-CCTV COMPARED TO IP CAMERANon-compressed video transmission. What is the primary goal of a customer who wants to get high-defi nition video surveillance? The answer is probably the best video resolution and quality that cannot be touched by an analog video system. Because HD-CCTV uses a non-compressed video source, it pro-vides the highest video quality.

Of course, IP cameras can provide full-HD (1920x1080) or higher resolution, but IP camera-based systems share the same network for multiple cameras, so the camera side should perform video compression to reduce video size despite the video quality degradation.

Low video delay. Because a HD-CCTV system’s HD-SDI transmission uses one-to-one cable between a camera and DVR, there is no interference among video channels, and it does not raise lack-of-trans-mission bandwidth. Besides, HD-CCTV does not need the encoding process for video compression at the camera side nor the video decoding process at the DVR side. Video delay does not occur through the whole path. When monitoring through an HD-SDI DVR, HD-CCTV shows a similar, video-delay level to an analog CCTV system, considering the overlay process for the DVR’s multi-channel display.

When an operator controls the zoom and focus features of an IP PTZ camera from the remote, video delay between the front-end product and back-end product is diffi cult to control. Many users who turn to IP camera installation do so because they have a lack of network bandwidth and unstable network traffi c, resulting in a loss of video frame rate, which makes it diffi cult to get a stable video stream. In the case of HD-SDI transmission, there could be some inconvenience to build a one-to-one transmission channel, but doing so can provide a highly-reliable video stream.

Compatibility between equipment. HD-CCTV products conform to several standards of the Society of Motion Picture & Television Engineers (SMPTE). The HD-SDI transmission method is one of the SMPTE standards used for broadcasting equipment. The HDcctv Alliance updated some of SMPTE’s standards, especially those involving transmission dis-tance, making it suitable for actual the CCTV market, based on HD-SDI standards. This resulted in the best compatibility among HD-CCTV products. If cus-tomers use an HD-SDI repeater and a converter be-

tween a HD-SDI and HDMI or a converter between HD and SD, the fi ber-optic equipment conforming to the standard will offer no resistence to expanding the existing HD-CCTV system.

In the case of IP cameras, protocol standardiza-tion by PSIA and ONVIF has been progressing in recent years and is currently a new integration trend. But, this also shows how much trial and error users undergo, if there is no standard when new technology is introduced. It is important to guarantee the com-patibility among equipment through defi nite stan-dards, when new technology is ready for the market.

Easy system design and intuitive installation by plug and play. HD-CCTV has almost the same system design and installation method as the analog CCTV system. This similarly provides an opportunity for ex-perts of analog CCTV to easily adapt to HD-CCTV, and it means existing analog CCTV systems can eas-ily be upgraded to HD-CCTV systems without deep knowledge of the latest technology. This feature is an important factor for a new technology to rapidly settle down into the market and grow.

HD-CCTV provides easy installation and opera-tion through real plug and play. Even though IP cam-era installation methods have improved, if a customer cannot get video, it may take a tremendous amount of time and effort to clear the problem. Moreover, when designing a system, it is important to consider the network load and countermeasure for network trouble and security.

The leader of this fast-growing, high-defi nition, surveillance market is the megapixel IP camera, but this result comes from having no alternative in the market. The recent introduction of HD-CCTV sys-tems is providing intuitive system design, installation, operation and maintenance, all of which are similar to analog CCTV systems. It provides the benefi t of non-compressed, video transmission through 1.5 GBps of reliable video transmission, and it is spreading fast in major world markets.

IP cameras received 30 percent of the market share over the past 15 years. Nobody can predict how long it will take for HD-CCTV to reach that market share, but everyone expects it to be soon.

G.S. Hong is president and professor at Webgate Korea.

PROSPECTING THE HD MARKETIP camera-based system is leading the industryBy G.S. Hong

0313sec_080_Hong_v3.indd 80 2/14/13 4:12 PM

Passive infrared detectors (PIR) can’t see what’s going on, and that means your security customers don’t know what is happening on their premises. Videofied® is changing all of that with a new Video Verified indoor MotionViewer® that is priced about the same price as leading wireless PIRs!

CALL 651.855.7819 TODAY!

Our new wireless indoor MotionViewer® has a 5-year battery life for easy install.

It delivers videos of who/what caused the alarm to your central station for immediate review/dispatch.

Smartphone k-in™L with full color VGA video

CAMERA

PIR DETECTOR

ILLUMINATORS

Full VGA color for remote k-in™L via smartphone app

No charge smartphone management app Arm/disarm

k-in™L remote color photo viewing

k-in™L remote color video viewingAlarm status (system armed/disarmed)No monthly fee like Alarm.com® or Honeywell Total Connect™

6x faster video transmission to central station Color/day, Monochrome/night Integrated camera/detector with illuminators for night vision Programmable PIR sensitivity Programmable video resolution

COMING SOON

INDOOR MOTION VIEWER

k-in™L

A PRICE THAT WILL OPEN YOUR

EYES TO VIDEO

Videofied products are scalable, reliable and proven performers—no matter how tough it gets. Call Kyle today at 651.855.7819 for more information.

©2012 RSI Video Technologies. All rights reserved.

®

Proud member of:

Untitled-13 1 12/6/12 4:35 PM

Go to http://sp.hotims.com and enter 85 for product information. See us at ISC West, Booth #3081

8 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

ACCESS CONTROL

UPGRADING YOUR ENTRANCE LANES Taking a layered approach to security in your buildingBy Mike McGovern

Is it time to replace or upgrade your pedestrian entrance control (PEC) sys-tem? Are your security entrance lanes or turnstiles at end-of-life and are you starting to consider with what or how to best replace them? If so, then it’s probably time to look at the wide range of competing security entrance lanes/optical turnstiles/portals and examine what features are new, impor-

tant or critical for compatibility with your available lobby space, your new card/biometric readers and access control systems.

Every day, we are seeing an ever-increasing number of requests for new en-trance control systems to replace/upgrade/retrofi t an older, existing set of turn-stiles with new security entrance lanes. End-user clients, along with their security consultants, architects and security integrators are interested in fi nding the best solution—considering the latest features and technology available.

PEDESTRIAN ENTRANCE CONTROL SYSTEMSThe term PECs includes all security entrance lanes, turnstiles/speedgates, barrier-type optical lanes, sliding glass optical portals, high-security portals and security revolvers used as part of an integrated security strategy for an access-controlled building or area within a building. Most entrance control systems are specifi cally designed to increase security and also enhance the effectiveness of lobby staff, which would otherwise have to check the credentials of every pedestrian passing the secure point.

The PEC works by singling out any pedestrians attempting access without proper credentials. Normally, a card reader or biometric authentication device is built into or integrated with the PEC. The system will usually include technol-ogy—infrared or other optical sensors—to detect tailgating and prevent piggy-backing, hence the common industry term “security entrance lanes,” also known as optical turnstiles.

MANY SYSTEMS REACHING END-OF-LIFEMany commercial and government buildings are now ready to replace pedestrian entrance control and security entrance lane systems purchased 10 to 15 years ago. From 2002 through 2004 there was a sharp increase in the numbers of systems installed, which was greatly impacted by the events of Sept. 11, 2001. Meanwhile, multi-tenant buildings and high-rises in larger cities took advantage of new multi-technology card readers that made front lobby entrance control more realistic. The same factors that make optical lanes and portals attractive for Class A buildings accelerate the products wearing over time, making them appear worn out.

Meanwhile, internal mechanical devices and motors that move the sliding and

swinging barriers have long surpassed their life expectancy, even if well maintained. Replacement parts are now becoming harder to fi nd for some models. Downtime is expensive and detrimental to operation and traffi c fl ow, let alone the perceived corporate image associated with non-functional security equipment.

Meanwhile, new state-of-the-art security entrance lanes have been developed, the benefi ts of which would—fi nancially and practically—support the upgrade or replacement of these old, dated systems.

PRODUCT SELECTION DECISIONS ARE IMPORTANTClients have concerns about how to make the right decisions because access control security products like PECs are usually a long-term capital investment. Sometimes there are several levels of decision makers/infl uencers—end users, consultants, in-tegrators—all of whom have various needs or concerns for the features. Often-times on the client’s side, the decision for such systems is a long-term strategic one that requires careful analysis, committee review and upper management action. Another important consideration concerns the existing infrastructure work that was already done onsite.

Clients may want to limit further investments in new conduits, product foot-print locations, and the product selection decision can impact the need for such additional costs. Further complicating such decisions is the variety of new physical features, available certifi cations and software packages that are available.

THERE ARE IMPORTANT PHYSICAL FEATURE CONSIDERATIONSPhysical characteristics, features and overall esthetics of PECs can vary quite a bit when considering dimensional requirements, architectural fi nishes and lobby design criteria.

The specifi c client needs and installation site dimensional limitations will play an important role. In the case of replacing and upgrading existing security entrance lanes and turnstiles, the existing footprint versus proposed footprint must be consid-ered. Take into consideration whether you can cover the old fl oor cuts with the new proposed product, or if you are prepared to renew and re-cut the fi nished fl oor. For example, if you are changing from purely optical turnstiles to security entrance lane optical turnstiles with retractable or swing glass barriers, you will need to accom-modate new wider/longer cabinet footprint over the existing smaller cabinet/pedestal footprint. Conversely, if the new products will be swinging glass type optical lanes, you will need to ensure that the new slim or shorter cabinet/pedestal fi t correctly on the existing wider cabinet spaces. Depending on the circumstances, you may want to consider fi tting more lanes than before in the given area. These will be important

0313sec_082_083_McGovern_v3.indd 82 2/15/13 9:05 AM

W W W . S E C U R I T Y - T O D A Y. C O M 8 3

factors when selecting the new replace-ment system.

Architectural fi nishes will be of con-cern for architects and lobby designers. Many PEC products come in a standard grained stainless fi nish. But custom col-ors, solid surfacing, natural wood and stone fi nishes are usually available as options. Architects like to have choices of custom and natural materials.

Some of the new changes in evolu-tion of the new PECs are that they have sophisticated tailgate and piggyback detection systems, although linear hori-zontal beams are still most common. The algorithms and fi rmware today has advanced greatly over the simple PLC systems of 15 years ago, allowing clients to even tailor the sensitivity of their tailgate/piggyback security de-tection system. Enhanced tailgate/pig-gyback detection technology improves accuracy, thereby increasing security while reducing cost of false alarms. Of course, today’s PEC security entrance lanes use long life LED lights which years ago replaced incandescent bulbs which had been standard in older turn-stiles.

One advancement is network ready, IP addressable security entrance lanes and server-based lane control panels. These advancements open up a wide realm of communication, lane control and maintenance possibilities not avail-able in the legacy analog, dry contacts systems of the past.

SAFETY AND RELIABILITY ARE IMPROVEDClients should look at product reliabil-ity and MTBF or MCBF data, when available. Some products boast lifetimes exceeding 10,000,000 cycles. This data should be published or readily available with stated testing parameters.

UL-listed PEC and security entrance lanes are more common than ever be-fore. PEC products have been certifi ed in various classifi cations, and all are very good, with UL 2593 being the new in-dustry standard. Look for PEC systems that carry the UL2593 or UL325—or another certifi cation lab using UL stan-dards—label. Some PECs will only have UL-certifi ed components, but this is not the same as having a UL listed product system with the factory apposed UL sticker, especially in the eyes of many city building inspectors.

Potential buyers will involve oth-ers in the research process. It helps to

have expert opinions to give support to product decisions when presenting to upper management for budgeting and purchase approval.

We strongly recommend including security consultant/engineers in the process. Their expertise in such deci-sions is invaluable. There are many ex-

cellent fi rms providing such services. In addition to product selection decisions, they will also provide critical local code knowledge and engineering and prod-uct integration design assistance.

Most security integrators have se-lected, installed, integrated and sup-ported many such PEC systems—they

will be able to make recommenda-tions for your specifi c needs.

Mike McGovern is the southern regional sales manager at Automatic Systems.

Go to sp.hotims.com and enter 7 for product information. See us at ISC West Booth 21133.

0313sec_082_083_McGovern_v3.indd 83 2/15/13 9:05 AM

8 4 0 3 1 3 | S E C U R I T Y P R O D U C T S

EMERGING TECHNOLOGIES

SMART THERMAL CAMERAS Prices are falling, capabilities increase with technologyBy John Romanowich

There are more reasons than ever to choose thermal cameras for mainstream, outdoor security applications. As prices fall and ca-pabilities increase, new applications are emerging that leverage the advantages offered by thermal technology for securing outdoor as-sets. The result is a market tipping point for thermal cameras and an

opportunity to use the best detection technology available for costs that meet or beat less-effective approaches.

A TECHNOLOGICAL BREAKTHROUGHThermal cameras have always been a good choice for security applications used during the night because they are able to “see in the dark,” protecting areas where lighting is unavailable or too costly to deploy. When combined with video analyt-ics, thermal cameras offer real-time, pre-emptive security with instant notifi cation of security violations. Recent advancements in the sensitivity of thermal imagers, combined with sophisticated image processing, make thermal cameras an accurate, 24-hour solution. Thermal cameras now present clear thermal images regardless

of rain, humidity, fog or sun, delivering detail instead of blurrier images once as-sociated with black-and-white technology. Cameras use a high degree of on-board video processing to emphasize small temperature variations between objects and the background to exaggerate the fi ne details in contrast to other image features.

Better images reveal critical security information; image processing provides more accurate intrusion detection. When combined with lower prices, the result is an incomparable continuous security solution.

NEW OPTION FOR THEFT PREVENTIONIn the past, thermal cameras were typically deployed to protect large, critical infra-structure applications in which a disruption in operations would have serious eco-nomic impact. However, as smart, thermal cameras with on-board video analytics fall below the $5,000 price barrier, the technology now makes sense in less mission-critical environments. In fact, one of the most fundamentally security function, theft prevention, can now be addressed economically using the same sophisticated thermal camera solutions. Applications range from copper theft at electric sub-

0313sec_084_085_Romanowich_v3.indd 84 2/14/13 4:12 PM

W W W . S E C U R I T Y - T O D A Y. C O M 8 5

stations, securing equipment at maintenance yards, protecting car parking lots, securing the millions of oil and gas well heads in use and other areas where theft prevention remains a key objective.

The prior approach for these applications has been to use a “blind” sensor, such as coax on the fence that acts as an intrusion detector, which required augmentation by a camera to determine the cause of the alert. These systems were not fully effec-tive due to the sensors generating many nuisance alerts, and they were costly because they involved the use of two separate systems: a sensor system and a video system. Thermal detection cameras offer a functional advantage over these traditional so-lutions because thermal cameras simultaneously detect and “see” an alarm event 24-hours per day, providing instantaneous validation for prompt action.

The result is a viable, single-technology solution that reduces costs for securing and monitoring assets and facilities around the clock.

COST-SAVING CAMERA PLACEMENT ADVANTAGESNew capabilities made possible through GPS analytics allow cameras to be mounted onto buildings and existing infrastructure in order for the cameras to look through fencing without nuisance alerts from objects on the other side. The cameras only alert when intruders enter a secure area. Mounting the cameras brings the total cost of the solution on par with, or even less than, other modali-ties for outdoor intrusion protection, which reduces the cost and complexity of bringing power and communications to the perimeter.

Waterside applications pose larger obstacles for mounting cameras because poles cannot be placed in the middle of a waterway. In cases such as protecting ports or dams, longer-range cameras allow security objectives to be archieved in a practical, less-costly manner, as infrastructure is often more expensive than the cost of the camera itself.

MORE ACTIONABLE INFORMATIONSmart, cost-effective thermal cameras open up a new world of understanding about what is happening outdoors beyond security, from early detection scenarios to looking at behavior that increases a company’s operational effi ciency. For in-stance, a company could use a thermal camera to determine if there is a leak at a refi nery, if transformers are overheating at a power station or to monitor storage tank levels.

The possibilities for thermal cameras extend to highway safety, measuring park-ing area occupancy or the volume of road traffi c to automatically determining if a car is driving the wrong way on an on-ramp or road. New return on investments (ROI) scenarios and greater functionality now make smart, thermal cameras a perfect technology tool for such applications.

HIGH-TECH WITHOUT HIGH-COSTSmart, thermal cameras may seem like a high-tech solution, but the economics of these systems are becoming very cost-competitive with alternatives. The economic advantages of newer, outdoor, thermal imaging become clear by examining “per-foot” costs of securing a perimeter. While many manufacturers do not present their pricing in this way, the costs can be calculated, and the results are motivating a wider range of customers to adapt to or adopt this security approach. Thermal analytic camera systems are now available for as low as $10 per foot, making the most accurate perimeter security technology comparable in price to traditional, visible cameras with analytics, fence sensors or buried cable systems.

With the innovation of lower-cost, smart, thermal cameras with substantially more on-board image processing, video systems are available to accurately detect the presence of unauthorized persons and for a range of other applications, even in cost-sensitive markets where this technology was previously considered to be too expensive. These smart cameras are designed to fi lter the affects of environmental elements and provide accurate detection regardless of wind, weather or the move-ment of small animals, trees or blowing trash. When security and business operations receive accurate information, an appropriate response to the nature of the alert can be devised. Smart thermal video systems are providing a new, cost-effective tool for more uses in an expanding number of mainstream applications.

John Romanowich is the CEO of SightLogix.

Safety TechnologyInternational, Inc.

www.sti-usa.com/sp39800-888-4784

2013 STI

Wireless 4-ChannelVoice Receiver· Sounds prerecorded programmable voice messages when alerted.· Ten tones/tunes, 53 selectable words (English or Spanish).· Easy programming voice prompt.· Select up to four words to create a custom message.· Monitors up to four STI transmitting devices at a single, convenient location.· 1000’ range line of sight· Supervised for low battery and connection.· Monitor: exit doors, driveways, mailboxes, garage doors, gates,

windows, extinguishers, pools, sheds, cabinets, push buttons, etc.

Wireless 4-Channel

Voice Receiver

“Medicine

Cabinet DoorOpen”

“Customer Service Alert”

“ClienteSevicio Alerta”

“Front DoorOpen”

“MailboxAlert”

“Rear DoorMotion Alert”

STI-V34104

Go to sp.hotims.com and enter 75 for product information. See us at ISC West Booth 19069.

0313sec_084_085_Romanowich_v3.indd 85 2/14/13 4:12 PM

0313 NEW PRODUCTSCompiled by Jessica Acklen, Associate Content Editor

8 6

Wireless LockStand-alone power

The Onity wireless lock offers decision making at the lock. Because it employs stand-alone power and an intelligent on-board internal database, the system allows facilities to continue operation and secure rooms - for up to 5,000 cardholders. O.W.L. continues to operate, grant or deny access, and perform even when power and/or network con-nectivity are lost. Having the controller technology built into the lock offers a smart inexpensive solu-tion to door wiring and network infrastructure. The Onity network and door architecture is less expen-sive and more reliable than any other solution on the market. Onity.

Go to sp.hotims.com and enter 385 for product information.

Door KeypadWeather and vandal reistant

With the addition of a Wiegand output, fully inde-pendent relays and an optional plug-in Lazerpoint 2-channel wireless transmitter, Camden Door Controls’ CM-120 Series take keypads to a new level, by offering more features and at a lower cost than competitive keypads in the market. Built to the highest standards of quality and boosting performance, ‘Camden Tough’ fl ush mount CM-120 series keypads includes CM-120i, an indoor digital keypad, and the CM-120wV2, a weather and vandal resistant, back lit, metal keypad. The new CM-120TX Series wire-less keypads utilize Lazerpoint RF™ 2-channel spread spectrum communications to provide the most reliable wireless operation. Camden.

Go to sp.hotims.com and enter 386 for product information.

Pneumatic BollardsFlood-resistant

Delta’s pneumatic bollards are 60 percent more effi cient and cost-effective than electro-mechani-cal units. They are aesthetic, durable, fl ood-resis-tant and green; use low voltage and current draw; and provide up to 300 cycles per hour. Customers needing crash-resistant bollards are turning to pneumatic designs versus more expensive elec-tro-mechanical devices. Crash rated and tested with a 15,000 lb vehicle going 50 mph, Delta’s pneumatic bollard systems operate individually or in groups up to ten and are used for intermediate level security applications. Delta Scientifi c.

Go to sp.hotims.com and enter 387 for product information.

Identity Management System

Web-based

Mobile Authentication and Authorization Control (MAAC) is an all encompassed, web-based identity management system that offers PACS, access control, personnel scheduling, time and atten-dance, background checks, and visitor manage-ment. Designed to streamline operations and minimize overhead, the elements of the MAAC so-lution make businesses more profi table by making their personnel access and management process effi cient. Telos Identity Management Solutions.

Go to sp.hotims.com and enter 388 for product information.

Night and Day

HyperGraphic is the one!Beneath the moon or under the sun, HyperGraphic Impressions

custom manufactured, reflective security yard signs work to generate sales leads for your company.

Toll Free: 1-800-437-4973Fax: 1-800-536-4467E-mail: [email protected] or

[email protected]@hypergraphicimpressions.com

Go to sp.hotims.com and enter 68 for product information.

NiSCA’s New PR-C201 Retransfer Plastic Card Printer

www.teamnisca.com/[email protected]

Learn more at ISC WestBooth 11125

11125

BOOTH

EXHIBIT HALL

APRIL10-12 2

013

Go to sp.hotims.com and enter 54 for product information. See us at ISC West Booth 11125.

0313sec_086_103_NP_v3.indd 86 2/15/13 1:32 PM

W W W . S E C U R I T Y - T O D A Y. C O M 8 7

Intrusion Detection SolutionUse for barbwire, mesh or

chainlink fences

The Azco LightFence Perimiter Intrusion Detection uses a plastic optical fi ber (AzcoWire) to detect in-trusions on mesh, chainlink and barbwire fences. You fasten the plastic optical fi ber (AzcoWire) to a fence either with special bolts based on type; then, you run the AzcoWire across the fence and fasten them with a bend in between the poles. Zero false alarms due to vibrations or winds: unlike micro-phone cables, plastic optical fi ber (AzcoWire) only detects distortions caused by the intruder. The controller offers 4 easy-to-adjust sensitivity levels and is in a IP66 rated enclosure. One single con-troller device protects up to 820ft of linear fence, several controllers can be placed in line for larger projects. Azco Technologies Inc.

Go to sp.hotims.com and enter 389 for product information.

Rack-mount Communication Applicance

Supports dual processors up to 16 cores

American Portwell’s CAR-5020 is a highly func-tional and modular 2U rack-mount communication appliance that offers a comprehensive solution for customers in the Network Security, Communica-tions and Infrastructure market. The platform fea-tures Intel QuickAssist Technology, supports dual processors up to 16 cores with CPU support for Level 3 Cache (up to 40MB) and 16 DIMMs DDR3 240-pin memory slots. The CAR-5020 is ideal for network security applications such as fi rewall, VPN, IDS/IPS, anti-spam, anti-virus and UTM, and network management applications such as rout-ers. American Portwell.

Go to sp.hotims.com and enter 390 for product information.

Long Distance IlluminatorReaches more than 800 ft.

Azco Technologies Inc.’s IR Illuminators are capa-ble of reaching distances over 800 ft. The Azco IR

Illuminators are perfect for Analog CCTV and IP Camera installations. The standard 850nm Wave-lengths with the visible red glow IR’s & the Covert 940nm Wavelengths Non-Visible versions are available. The AZIR3000, AZIR2000 & AZIR1000 models offer djustable illumination intensity, ad-justable built-in photocell and an IP67 Rating. The AZIR3000 has an optional bracket to mount 2 or 3 units. Azco Technologies Inc.

Go to sp.hotims.com and enter 391 for product information.

Suite of Security AppliancesMany devices in one

The Gateway 4000 is the latest development in NLSS’s Gateway suite, a line of unifi ed security ap-pliances that integrate all security management functions into a single appliance. The device scales

from a standalone unit to an enterprise-class secu-rity management solution. Capable of handling up to 64 HD cameras and thousands of doors, the Gate-way 4000 combines video management, access control, analytics and intrusion into a single net-worked platform. The Gateway 4000 features 10 built-in analytics and a Web-based interface that allows users to centrally manage all system fea-tures from anywhere in the world. NLSS.

Go to sp.hotims.com and enter 392 for product information.

Go to sp.hotims.com and enter 84 for product information. See us at ISC West Booth 6133.

0313sec_086_103_NP_v3.indd 87 2/15/13 1:32 PM

0313 NEW PRODUCTS

8 8 0 3 1 3 | S E C U R I T Y P R O D U C T S

HD DVR HD image quality

The VMAXHD is an advanced H.264 digital video

recorder that offers real-time, true High Defi nition recording. The VMAXHD uses existing coaxial ca-ble infrastructure while providing a HD image quality. Combined with Digital Watchdog’s HD-SDI camera line, the VMAXHD is uniquely de-signed to offer remote camera controlling via Coax cable for complete camera confi guration from the DVR. The VMAXHD also offer features

such as free DDNS, DVR health check, e-mail no-tifi cations, 4 sensor and audio inputs and digital zoom-in in live. The VMAXHD is available in 4 channels and is equipped with up to 12 Terabytes of memory. Digital Watchdog.

Go to sp.hotims.com and enter 393 for product information.

POE ExtenderReaches long distances

AZIPPOE300 is a “PoE extender over coax” solu-tion. By using RF technology, it can extend the transmission distance of power and 100Mbps Eth-ernet data over legacy coaxial cable to save re-cabling costs. Using this newly developed technol-ogy based on coaxial cable to extend the distance for PoE. This is the fi rst “true” PoE extender (not repeater) technology, to achieve greater distances beyond the standards and the fl exibility of using existing cable plant. Azco Technologies Inc.

Go to sp.hotims.com and enter 394 for product information.

3VR Video Surveillance Offers sustainable return

on investment

3VR, a brand of video intelligence solutions, enables organizations to search, mine and leverage video to bolster security, identify and mitigate fraud and gather business intelligence. 3VR’s Video Manage-ment Software, Network Video Recorders, and Video Analytics allow video surveillance systems to reach their true potential and deliver a measurable and sustainable return on investment. 3VR.

Go to sp.hotims.com and enter 395 for product information.

MultiMode™ ReadersDesigned for outdoor operations

Veridt, Inc.’s newest line of MultiMode™ readers, Stealth Series™, offers the functionality and capa-bility of MultiMode™ in a compact stylized hous-ing designed for outdoor operation. Stealth fea-tures three distinct hardware platforms: the biometric reader with dual card read interface and keypad measuring 7x3 inches, the non-biometric version and contactless version measure only 5x3 inches. The readers are confi gured for PIV, PIV I, CAC, TWIC, ISO 7816 & ISO 14443A/B and are eas-ily confi gured for NIST’s high assurance security level requirements. Veridt, Inc.

Go to sp.hotims.com and enter 396 for product information.

Go to sp.hotims.com and enter 47 for product information. See us at ISC West Booth 24139.

0313sec_086_103_NP_v3.indd 88 2/15/13 1:32 PM

W W W . S E C U R I T Y - T O D A Y. C O M 8 9

Web-based Access ControlAvailable iPad app for assistance

Developed by Lenel Systems International, goEn-try™ 3.0 is a web-based access control solution with free iPad® app and video integration. goEn-try 3.0 is ideal for small- to medium-sized busi-nesses and provides customers an entry-point solution that offers a future growth path to On-Guard®. goEntry requires no server or additional software, and features installer and end-user wiz-ards, device discovery, tool tips and help functions that enable customers to get up-and-running quickly and easily. An iPad app is available to help installers remotely administer or diagnose the system, while delivering on-the-go information to end users. Lenel.

Go to sp.hotims.com and enter 397 for product information.

Video Surveillance SystemConcealed in a traffi c cone

Covert Traffi c Cone™ Video Surveillance System appears to be an ordinary traffi c cone. It provides rapidly deployed, outdoor, battery-powered and fully wireless, covert digital video surveillance and detects patterns in the use of smartphones. It is a system-level solution that uses cellular communi-cations for remote access to live and internally recorded video online. It records video internally, avoiding a distant network video recorder, and providing sharper and higher frame rate video than could be sent to it. Boundless Security Systems.

Go to sp.hotims.com and enter 398 for product information.

LED LightsHighly visible even in sunlight

Dortronics Systems Inc. 7201 Series hi-intensity LEDs are highly visible in virtually any lighting condition, including bright sunlight. Door security status can be immediately conveyed to system users and security personnel. The weather-re-sistant units are ideal perimeter access control

gates exposed to the weather. If mounted near card readers, the LEDs can be used to clearly indicate when individual doors and/or gates can be accessed. Perfect for industrial applications, these LEDs are easily seen when viewed from a truck cab or forklift. Dortronics.

Go to sp.hotims.com and enter 399 for product information.

Receive and respond to suspicious activity instantly with VideoIQ Mobile.

Never miss another critical event, no matter where you are.

Call VideoIQ today.

A N Y T I M E. A N Y W H E R E.

See it. Verify it. Respond to it.

www2.videoiq.com/instant-alerts

VideoIQ | www.videoiq.com | 888-351-1758

213 Burlington Road, Bedford, Massachusetts Vis i t VideoIQ at ISC WestApril 10-12 | Las Vegas | Booth #6095

Go to sp.hotims.com and enter 55 for product information. See us at ISC West Booth 6095.

0313sec_086_103_NP_v3.indd 89 2/15/13 1:32 PM

0313 NEW PRODUCTS

9 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

Wall Controller BoardsEasily integrated

Matrox Graphics Inc.’s Matrox Mura™ MPX Se-ries video wall controller boards are compatible with NetLinx® Integrated Controller systems from automation solutions provider AMX. With the de-velopment of a free Mura MPX-specifi c module for the NetLinx® user interface programming

language, AV integrators are now able to easily integrate Mura MPX boards with AMX systems and create custom video walls to use in a wide range of industries like retail, government, and process control. Matrox Graphics Inc.

Go to sp.hotims.com and enter 400 for product information.

New NOTIFIER WebsiteEasy access to emergency

communication devices

NOTIFIER by Honeywell’s new Website offers easy accessibility to its fi re alarm and emergen-cy communications product information for sys-tem designers and inspectors, as well as the specifi c, solutions-based information regularly sought by facility managers and fi rst responders. In addition to a more dynamic look, NOTIFIER.com includes a streamlined interface that allows all site content to be easily searched and sorted, equaling fast access to pertinent data with fewer page views. Honeywell.

Go to sp.hotims.com and enter 401 for product information.

Mini-Camera Powered by PoE or DC

As the latest development in ISD’s vision to offer robust IP video with the ease of installation and operation typically associated with analog sys-tems, the new Jaguar Mini camera series delivers edge-based IP surveillance with unmatched fl exi-bility and reliability. The Jaguar Mini features full 1080P HD resolution with 2 megapixel CMOS im-age sensors. Users can leverage up to 512 GB of edge-based storage or enhance reliability by using the two 256 GB SD cards as a mirrored pair. Pow-ered by PoE or DC, the Jaguar Mini also features motion detection and H.264 compression. Jaguar.

Go to sp.hotims.com and enter 402 for product information.

Analog Security SolutionCost-effective solution

The VMAX960H series is an analog, cost-effective security solution offering highest analog resolution in the market with 30 percent higher resolution than D1. An advanced H.264 Linux embedded DVR, the VMAX960H records true 960H resolution on all channels. The VMAX960H offers powerful storage management features, along with ad-

180° of Surrounding EvidenceComprehensive Surveillance for Retail and More

Major Features

VIVOTEK INC.2050 Ringwood Ave. San Jose, CA 95131 |Tel: 408-773-8686| Fax: 408-773-8298| E-mail: [email protected]

CC8130

180° of Surround EvidenceComprehensive Surveillance for Retail and More

FD8151VIP8152 PD8136

Go to sp.hotims.com and enter 87 for product information. See us at ISC West Booth 26087.

0313sec_086_103_NP_v3.indd 90 2/15/13 1:32 PM

W W W . S E C U R I T Y - T O D A Y. C O M 9 1

vanced search options such as single-channel playback in live, panoramic, and frame-by-frame search. To get the maximum image quality, the DVR offers “5x Signal Extender” (up to 4 channels) to eliminate high-frequency detail loss and amplify image quality over UTP or Coax with no repeaters or special installation. Digital Watchdog.

Go to sp.hotims.com and enter 403 for product information.

Subminiature NVRSpots behavior patterns

Subminiature Network Video Recorder and Smart-phone WiFi Monitor solves bandwidth, recording and viewing problems of outdoor IP cameras, and detects patterns in the use of smartphones. Its Stranger Detector™ provides Smartphone WiFi Monitoring, spotting patterns of behavior that hu-mans can’t see. Its small size and open frame are intended for embedding in new or existing outdoor housings for IP cameras. It records video internally, avoiding a distant network video recorder, and provides sharper and higher frame rate video than could be sent to it. It serves as a video base station for up to four IP cameras, enabling a single, wire-less wide-area network connection to be used.Boundless Security Systems.

Go to sp.hotims.com and enter 404 for product information.

Identity Managing SoftwareCentrally manage access

Quantum Secure’s SAFE Physical Identity & Access Manager is a Browser-based software solution en-abling organizations to centrally manage identities for card holders in physical access control sys-tems (PACS) to create a single identity across the organization. Integrated with logical ID systems, the software ensures synchronized and policy-based on/off-boarding of identities and physical access levels across multiple, disparate security systems. Users can manage: biographic and bio-metric information, results of security checks and historical usage, and maintain an audit trail of all transactions. Quantum Secure.

Go to sp.hotims.com and enter 405 for product information.

Hybrid NVRBridges analog/IP gap

Seneca’s new line of Hybrid NVRs to their xVault digital security and surveillance product line. The xVault line of Hybrid NVRs is purpose built appli-ances that support both IP and analog cameras to provide increased simplicity and fl exibility. Help-ing bridge the gap from analog to IP, this line of

Hybrid NVRs enable encoding, storage, manage-ment, and service of video all in a single device. The xVault Hybrid NVR protects our customer’s investment in analog equipment while providing IP capabilities. Seneca.

Go to sp.hotims.com and enter 406 for product information.

Go to sp.hotims.com and enter 16 for product information.

0313sec_086_103_NP_v3.indd 91 2/15/13 1:32 PM

0313 NEW PRODUCTS

9 2 0 3 1 3 | S E C U R I T Y P R O D U C T S

Rapid Deployment UnitIdentifi es targets within 750 feet

The First Responder RDU is a solar-powered, trailer-mounted unit that leverages 3G wireless networks to deliver a temporary crime-preventing solution that is deployable in less than 30 minutes. The device mimics the actions of a security guard to deter criminal behavior, leverages advanced algorithms to automatically identify potentially dangerous targets within 750 feet and tracks objects to deter criminal behavior. Once it detects motion in a user-defi ned area, the system illuminates activity with a high-intensity LED light. FutureSentry.

Go to sp.hotims.com and enter 407 for product information.

MIMO-based Wireless RadioCreate mesh networks

THE FM1200 VOLO is a MIMO-based wireless radio designed for backhauling mission-critical video, voice and data. With a 64Mb RAM and 32MB Flash, it’s a data processing powerhouse that’s intuitive and easy to deploy. VOLO can be used to create point-to-point, point-to-multipoint and mesh networks with a throughput of up to 100 Mbps. VOLO gives a new meaning to fast and low cost servicing, helping you to connect wirelessly via a secure WiFi 802.11n hotspot with an undetectable SSID. Fluidmesh.

Go to sp.hotims.com and enter 408 for product information.

Wall Mount90 degree rotation

The AM500 is an articulating wall mount for displays up to 500 lb. The mount holds fl at-panel displays up to 82 in. The positive and negative tilt adjustment allows the mount to be installed level and plumb. The dual articulating arms allow even the heaviest display to be pulled away from the wall for service or alignment. The mount features a 90 degree rotation which allows the display to be in-stalled in landscape, portrait or any other arbitrary angled orienta-tion. There are three different mounting brackets for displays of various sizes. Premier Mounts.

Go to sp.hotims.com and enter 409 for product information.

Power PanelsSuited for large operations

Power Panels by Terminus are ideally suited for large security sys-tems and tailored to grow along with your intrusion detection sys-tem. The Mounting Plate design makes it easy to choose from a variety of optional transformers to power all access, alarm and CCTV devices. The panels can be confi gured for any alarm panel by adjusting the mounting holes. Servicing and troubleshooting is much easier because all the power and fi eld panels are in the same location. And, each box requires only one circuit, offering signifi -cant savings on installation costs that would typically require mul-tiple power circuits/outlets. Terminus.

Go to sp.hotims.com and enter 410 for product information.

FirewallMilitary-grade network security

The Stonesoft MIL-320 next generation fi rewall/VPN appliance pro-vides military-grade network security in a rugged, go-anywhere unit. Today’s information security is more and more deployed outside con-trolled datacenters and other stable environments and needs to

Securitymeets

+1 (626) 325-9600www.cogentsystems.com/[email protected]

a 3M Company

one readerINFINITE POSSIBILITIES

Booth #16107

Go to sp.hotims.com and enter 6 for product information. See us at ISC West Booth 16107.

0313sec_086_103_NP_v3.indd 92 2/15/13 1:32 PM

W W W . S E C U R I T Y - T O D A Y. C O M 9 3

function also in extreme conditions. The rugged and portable MIL-320 appliance is military level certifi ed for high performance in extreme temper-atures, wet, mud and dust. The MIL-320 utilizes Stonesoft’s thorough data stream-based normal-ization and deep inspection across all protocols and network layers to detect and prevent cyber-attacks, including those delivered by Advanced Evasion Techniques. Contact stonesoft.com for more information. Stonesoft.

Go to sp.hotims.com and enter 411 for product information.

Mobile Mounting CartHeavy-duty

The MVWC-3X3 is a mobile cart with a nine screen video wall confi guration. The cart accommodates displays 46” and 55” and produces a seamless video display with fi ne-tune adjustment brackets. The cart has effortless assembly, set up and ready for displays in 30 minutes or less. The 3x3 array also splits down the middle to easily ship, handle and transport the product. A solid bottom skirt and tray stores and protects A/V or IT equipment. Heavy-duty casters allow for swift maneuvering, providing precise placement even in the most con-gested of areas. Premier Mounts.

Go to sp.hotims.com and enter 412 for product information.

HD NVRHigh image quality

Swann’s state-of-the-art high defi nition 1080p Network Video Recording (NVR) security systems, known as Platinum-HD. The Swann NVRs are ca-pable of full HD video with real-time (30 frames per second) live viewing and video playback. Ini-tially there will be two versions: 4 Channels (NVR4-7200) with 4 x 1080p (NHD-820) Cameras and 8 Channels (NVR8-7200) with 4 x 1080p Cameras. The systems include 4 of the latest NHD-820 surveillance cameras, each capable of producing 1080p HD video or, using security in-dustry terminology, 1000 TV lines (2.1 Megapix-els) lines; image quality far in excess of typical security cameras. Swann.

Go to sp.hotims.com and enter 413 for product information.

X Bracket Display DevicePrevents theft

The new Se-Kure Control’s “X” Bracket locking de-vice is designed to secure all tablets and e-readers in a retail or institutional display environments. It features a fl exible stem that easily adjusts to al-most any position within a 180-degree hemi-sphere. The “X” Bracket presents tablets for easy, convenient customer trial and inspection, while preventing theft and providing a prominent, safe display for electronics. Se-Kure Controls®, Inc.

Go to sp.hotims.com and enter 414 for product information.

Blast Hazard Mitigation Windows

Reliable in demanding conditions

Ideally suited to meet buildings’ high-security and green goals, Wausau Window and Wall Systems combines blast mitigation, energy performance and recycled content in the Blast Hazard Mitigation (BHM) windows the newest to join its INvent™ Se-ries. The BHM INvent Series units are pre-engi-neered, factory-glazed and tested to ensure reli-able performance under demanding conditions. The windows also provide condensation resis-tance and thermal performance, contributing to sustainability. Wausau Window and Wall Systems.

Go to sp.hotims.com and enter 415 for product information.

Transponder and Reader Engineered Systems, Inc.

Experience and Innovation in RFID

EXPERIENCE AND INNOVATION AVAILABLE NOW!

ALL PRODUCTS SHOWN ARE FCC CERTIFIED – PART15 COMPLIANT (888) 574-8737 - [email protected]

www.tresrfsolutions.comTM – the name Smartloop is a registered Trademark of Stallion Systems, Inc

Eliminating the Need for Inductance Loops,

No More Pavement Sawing. Install Loops in 30 Minutes,

Self Calibrating Ideal for Gate Control and Parking

Applications.

Long Range Passive (15 to 28 ft.) for Vehicle ID, Access Control,

Asset Monitoring. Field Program Tags – Custom Graphics

Available. Tags in Inventory for Immediate Delivery.

Super Long Range Active (10 to 2000 ft.)

for Gate Controls, Personnel/Asset Tracking, Theft

Prevention. Wiegand Output, TCP/IP, USB

or Serial. Tags Have Replaceable Batteries!

Go to sp.hotims.com and enter 57 for product information. See us at ISC West Booth 23141.

0313sec_086_103_NP_v3.indd 93 2/15/13 1:32 PM

9 4 0 3 1 3 | S E C U R I T Y P R O D U C T S

0313 NEW PRODUCTS

iBridge AppiPhone/Droid compatible

Control Alarms, Video, Temperature, Lighting & Locking via Z-Wave using iBridge App for iPhone/iPad /Droid or optional award-winning iBridge Touchscreen/Tablet, a 7” portable WiFi full-color tablet with magnetic, on/off wall-mount/charger dock. Cost-effectively add au-tomated Z-Wave Devices with iBridge’s affordable bus-mount Z-Wave Module (no touchscreen necessary). Add More with Napco No-Roll™ Customer Service Calls & Service Enhancements, dealers add/edit Z-Wave devices easily, remotely from their own smart de-vices. Napco Security Technologies.

Go to sp.hotims.com and enter 416 for product information.

IR IlluminatorsReaches more than 800ft.

Azco Technologies’ IR Illuminators are capable of reaching distances of more than 800ft. The Azco IR Illuminators are perfect for Analog CCTV and IP Camera installations. The standard 850nm Wavelengths with the visible red glow IR’s & the Covert 940nm Wavelengths Non-Visible versions are available. The AZIR3000, AZIR2000 & AZIR1000 models offer djustable illumination intensity, adjustable built-in pho-tocell and an IP67 Rating. The AZIR3000 has an optional bracket to mount 2 or 3 units. Azco Technologies.

Go to sp.hotims.com and enter 417 for product information.

HD-SDI Camera LineVandal-resistant

Blue Mango’s new line of HD-SDI cameras support up to Full HD (1920 x 1080 @ 30FPS). HD-SDI is uncompressed digital video over standard coaxial cables making upgrading from an existing analog system virtually plug-n-play. Blue Mango Technology’s HD-SDI vandal and non-vandal resistant cameras include IR, non-IR, and 3x zoom models. Blue Mango.

Go to sp.hotims.com and enter 418 for product information.

PoE ExtenderSaves re-cabling costs

The Azco Power over Ethernet extender (PoE) - AZIPPOE300 is a “PoE extender over coax” solution. By using novel RF technology, it can extend the transmission distance of power and 100Mbps Ethernet data over legacy coaxial cable to save re-cabling costs. This is the fi rst “true” PoE extender (not repeater) technology, to achieve greater distances beyond the standards and the fl exibility of using existing cable plant. Azco Technologies.

Go to sp.hotims.com and enter 419 for product information.

Wall MonitorsEco-friendly, LED monitors

The new 46RNAS and 55RNAS ultra-narrow bezel video wall monitors and the OIC-M802/1604 multi-viewer system from Orion Images Cor-poration are designed for 24/7/365 use in control room and other se-curity applications. The RNAS models in 46” and 55” sizes utilize the narrowest available bezels in the industry (5.5mm). The eco-friendly, L.E.D. backlit monitors are also designed to utilize built-in connectivity to provide up to a 10X10 tiled array with the ability to display one im-age across the entire wall. For multi windowing environments, the low cost, OIC-M802/1604 provide either eight or 16 HD-resolution win-dows that can be scaled and sized across the boundaries of the indi-vidual LCD displays. ORION Images Corporation.

Go to sp.hotims.com and enter 420 for product information.

Security AppProvides remote monitoring

American Dynamics, part of Tyco, has introduced the VideoEdge Go mobile application for use with VideoEdge NVR. The app is compati-ble with iOS devices, including the iPhone, iPad, iPad Mini and iPod Touch. Designed to extend the security reach for VideoEdge users, VideoEdge Go provides remote monitoring and forensic capabilities wherever the location. By using the app, security personnel can re-ceive the latest information as a critical situation unfolds, and quick-ly respond to the event. Tyco Security Products.

Go to sp.hotims.com and enter 421 for product information.

EXTREME SECURITY

CIAS ELETTRONICA SRL VIA DURANDO, 38 | 20158 MILANO | ITALY

T +39 02 3767161 | F +39 02 39311225WWW.CIAS.IT | [email protected]

TECHNOLOGICAL LEADER FOR PERIMETER PROTECTION

UP

TO 5

00m

ERM

O482

XPR

O

FOR A COMPLETE LIST OF EXHIBITIONS AND EVENTS VISIT OUR WEB SITE AT WWW.CIAS.IT

MIC

RO

WAV

E B

ARR

IER

BAS

ED O

N F

UZZ

Y LO

GIC

AN

ALYS

IS

ADJUSTMENTWITH FSTD

WAVE-TEST 2APPLICATION

SPECIAL FEATURES

• DIGITAL ANALYSIS BASED ON FUZZY LOGIC BEHAVIOR MODELS

• DIGITAL DYNAMIC ANTI-MASKING• AVAILABLE FREQUENCIES 9.47GHZ;

9.9 GHZ; 10.52 GHZ; 10.58 GHZ; 24.16 GHZ• EXTREME ENVIRONMENTAL

CONDITIONS SUPPORTED• REMOTE MONITORING AND

MANAGEMENT• 1 FALSE ALARM PER UNIT PER YEAR

NEXT EXHIBITION

APRIL 10-12, 2013SANDS CONVENTION CENTERLAS VEGAS, USA - BOOTH # 21091

6 year

warranty

FUZZY

LOGIC

INSIDE

Go to sp.hotims.com and enter 17 for product information. See us at ISC West Booth 21091.

0313sec_086_103_NP_v3.indd 94 2/15/13 1:32 PM

W W W . S E C U R I T Y - T O D A Y. C O M 9 5

Security AppControl system from phone

Open Options’ DNA Fusion iPhone app allows us-ers to monitor and control their access control system right from their smartphone. The DNA Fu-sion app will allow operators to securely login and the ability to view and control doors, access points, time schedules, cameras and credentials among other features. Open Options.

Go to sp.hotims.com and enter 422 for product information.

Free Projector AppMakes iPhone a projector remote

JVC Professional Products Company, a division of JVC Americas Corp., released the D-ILA Remote, a free app available through the iTunes Store that allows iPhone, iPod, and iPad devices to serve as a remote control for select JVC D-ILA projectors. The intuitive interface provides easy access to picture, lens, and 3D settings, as well as other controls and exclusive features not found on the projectors’ supplied remote controls. Plus, the D-ILA Remote system communicates via wireless LAN, not re-mote sensor, allowing the user to control the pro-jector from virtually any position within the Wi-Fi environment. JVC Professional Products Company.

Go to sp.hotims.com and enter 423 for product information.

ComNet AppFocused on fi ber optic and Ethernet products

The ComNet Fiber Optic and Ethernet Products app is a solution identifi er that allows you to

choose the right transmission product for virtual-ly every application. The ComNet app allows the user to search by application or model number, it also gives the user the opportunity to identify media options and the specifi c benefi ts of each when choosing products for new or retrofi t appli-cations. The ComNet app gives the user access to product datasheets, installation manuals and A&E

Specs for the complete line of fi ber optic video, data and audio products as well as fi ber optic Ethernet and Ethernet over copper extenders. The ComNet app is available at No-Charge on the App StoreSM. Communication Networks.

Go to sp.hotims.com and enter 424 for product information.

The product of 100 years of stored energy expertise, Genesis® NP batteries combine gas recombination technology with a non-spillable, high energy density absorbed glass mat (AGM) design. The result is reliable performance and extended service life for a wide range of security applications which equals less maintenance, reduced service calls and more long term savings.

Think of them as a security system for your security system.

Genesis® NP batteries

To learn more, visit www.enersys.com.

TM

Go to sp.hotims.com and enter 27 for product information. See us at ISC West Booth 1091.

0313sec_086_103_NP_v3.indd 95 2/15/13 1:32 PM

0313 NEW PRODUCTS

9 6 0 3 1 3 | S E C U R I T Y P R O D U C T S

EncoderView video from smartphones

MVS Legacy Link Encoders with PUSH technology allows analog CCTV cameras to stream and record full-time video without client software. You can view pre-recorded video from PC’s, smart phones or tablets. Video is 100 percent managed with

GREENLIGHT on the MVS Stratusphere. The de-vice includes 4-Channel Analog Video Inputs and 1-Channel Analog Video Output and streams Live and Records D1 resolution / 10 FPS per channel, all with ultra low bandwidth consumption / H.264 compression. MVS Managed Video Solutions.

Go to sp.hotims.com and enter 425 for product information.

Control PanelsSeries is ideal for commercial use

Bosch Security Systems, Inc. has launched the B Series intrusion control panels. The panels are modern Internet appliances for security applica-tions designed to simplify installation and increase profi ts for dealers and integrators. A fl exible family of control panels, the B Series includes two models that meet the needs of a wide variety of facility confi gurations. The B5512 supports 48 points of protection and four areas, while the B4512 moni-tors 28 points of protection and two areas. The series is ideal for retail stores, banks, offi ce build-ings, government locations, schools, and many other commercial and residential applications. Bosch Security Systems, Inc.

Go to sp.hotims.com and enter 426 for product information.

Security CredentialManage identities

As part of HID Global’s iCLASS SE platform, the state-of-the-art iCLASS Seos credential is a high frequency solution for increased security, privacy and portability. iCLASS Seos delivers maximum interoperability by supporting emerging technolo-gies such as NFC-enabled smartphones and al-lowing for support of future technologies. As a se-cure, standards-based technology to manage and authenticate identities, the credential can be se-curely embedded on NFC smartphones for physi-cal access control, PC logon, biometrics and a wide range of additional applications. HID Global.

Go to sp.hotims.com and enter 427 for product information.

Today’s smart, strategic solutions mesh together all aspects of logical and physical security. The convergence of technologies and systems needed to make us more secure demand that industry professionals operate at the very top of their game. ASIS 2013, the world’s most

security professionals need to face challenges and mitigate risk.

Ready to cut through the clutter and map out a more secure future? We’ll see you and your most pressing questions in Chicago.

For information visit www.asis2013.org or call +1.703.519.6200.

Go to sp.hotims.com and enter 62 for product information. See us at ISC West Booth 6147.

0313sec_086_103_NP_v3.indd 96 2/15/13 1:32 PM

W W W . S E C U R I T Y - T O D A Y. C O M 9 7

Electronic Rotary LatchMade for outdoor use

Southco’s Outdoor R4-EM Electronic Rotary Latch features corro-sion-resistant plated steel and stainless steel construction and fully-sealed internal actuator, providing reliable electronic locking that is resistant to moisture and dust. The embedded electronic control al-lows for easy integration with an external control system, and fl exi-ble, concealed installation provides vandal-resistance and accom-modates a variety of outdoor applications. With a high working load and ultimate load, the Outdoor R4-EM ensures reliable operation in demanding applications. Additionally, the Outdoor R4-EM accepts control inputs from any access control device. Southco.

Go to sp.hotims.com and enter 428 for product information.

Modular Rackmount Surge ProtectorWarranty-backed

ITW Linx’s SurgeGate™ Modular Rackmount surge protector pro-vides warranty-backed protection and fl exibility and the mix and match 12 module technology offers a wide range of benefi ts over conventional, fi xed wall mount surge protectors. The innovative tech-nology features industry-leading response time and can generate signifi cant cost, labor and space savings. Through the use of solid state technology, The SurgeGate™ Modular Rackmount ensures en-hanced safety and the fastest protection time in the industry with a response time of 1-5 Nanoseconds. Unlike standard pre-assembled surge protectors, the SurgeGate™ Modular Rackmount is the only mix and match surge protector on the market that offers six types of protection: Cat5 E-LAN, Cat5 E-POE, Cat5 E-75, Cat5 E-235, T1 and Telco CO (central offi ce) line on a single 12 module rack. ITW Linx.

Go to sp.hotims.com and enter 429 for product information.

Video Management SystemManage security remotely in real time

EZConnect™ uses video in combination with the other technology add-ons, turning hardware into money making business tools creat-ing a single interface to manage most facets of the business. EZCon-nect™ in the most intelligent productivity and management tool

W RELESS

DKS Wireless expansion boards can connect card readers and keypads to the 1830 Series controller without the need to run wiring. This is a great time, labor

and money saver! Visit the link below or scan the QR code to find the perfect solution to access control wireless needs in even the most remote locations.

RANGE EXTENDER

EXPANSIONBOARD

ACCESS CONTROL

1-800-673-3299 [email protected]

solution to access c

800 673 3299 info@doorking com

Get all the info:doorking.com/wac

Go to sp.hotims.com and enter 25 for product information. See us at ISC West Booth 23055.

proximity act ivated switches

dortronics.com [email protected] 1.800.906.0137

Keith,These switches

are convenient

and economical!

Chris

Our new 5278 Touchless Illuminated Switches open automatic doors with the wave of a hand. There's no need to touch anything. The advanced optical infrared technology picks up motion within a 4 inch range. And for added versatility, you can also use our Touchless Switches with card access systems as a request to exit.

Go to sp.hotims.com and enter 66 for product information. See us at ISC West Booth 1037.

0313sec_086_103_NP_v3.indd 97 2/15/13 1:32 PM

0313 NEW PRODUCTS

9 8 0 3 1 3 | S E C U R I T Y P R O D U C T S

available to the restaurant and retail industries. It enables the owner/operator of the store to manage their business remotely in real time, allowing man-agement to know exactly what is happening throughout entire operation whether it is at store, chain or even enterprise level. EZUniverse Inc.

Go to sp.hotims.com and enter 430 for product information.

Yard Security MonitorClose doors remotely

Control costs by increasing the security of your yard and dock operations. The 4SIGHT™ Yard and Dock Management System utilizes a variety sen-sors, including GPS, RFID and physical sensors to gather real-time data which allows companies to

monitor and manage activity at each dock door and in the yard. 4SIGHT provides an accurate pic-ture of a facility’s overall operations, authorized and unauthorized. With security in mind, 4SIGHT allows you to remotely close all doors from one location. Additionally, it will recognize the differ-ence between a security breach and regular op-erations saving time and money on investigating false alarms. 4SIGHT.

Go to sp.hotims.com and enter 431 for product information.

Forensic Coding LiquidEach bottle has unique forensic

formula

SmartWater is a forensic coding theft deterrent in the form of a clear liquid that can be applied to virtually anything: jewelry, iPad, car, large metal cables, rails and air-conditioning units. Each bottle contains the owner’s unique forensic formula which is logged into a secure database. The solu-tion is non-hazardous and invisible, yet virtually impossible to remove once applied. It can be de-tected under UV light, with only a speck required to identify the property’s owner. Smart Water.

Go to sp.hotims.com and enter 432 for product information.

IP Power Supply UnitsIdeal for large installations

Bosch has launched IP power supply units (PSUs) for the MIC Series 550 and MIC Series 612 rugge-dized pan-tilt-zoom cameras. The new PSUs feature an integrated IP video encoding system, transform-ing these MIC Series models into network surveil-lance cameras. They are ideal for MIC Series instal-lations in city centers, at critical infrastructure sites and in transportation applications. Bosch.

Go to sp.hotims.com and enter 433 for product information.

Go to sp.hotims.com and enter 81 for product information. See us at ISC West Booth 13107.

0313sec_086_103_NP_v3.indd 98 2/15/13 1:32 PM

W W W . S E C U R I T Y - T O D A Y. C O M 9 9

GPS Monitoring AppKnow family members’ locations

ProActiveGPS is a new Smartphone technology developed by Linked24.com. The technology al-lows Linked24 Dealers to protect their customers while away from their monitored property, while adding additional RMR with this fully Dealer Branded solution. Linked24 monitors loved ones for their non-presence or presence at a location, like school, work, a bus stop or train station. What does that mean? The system can automatically notify your customer that their child has not ar-rived as expected. A loved one missed the bus, late for work, missed the train etc. Linked24 monitors the anomalies of life. Linked24.

Go to sp.hotims.com and enter 434 for product information.

Security SignsDeters burglars

Custom Security Signs are an effective way to de-ter home burglars while serving the dual purpose of branding your company’s name and logo.  At SignsofSecurity.com, you can customize your Yard Security Signs by choosing the material that best suits your brand and budget. Upload your custom image, choose a color scheme and receive a quote within 24 hours of inquiry. Home Security Signs are offered in fi ve separate materials with varying degrees of durability. From the Non-Yellowing Poly Plastic to our .020 gage Aluminum with EG Refl ec-tive Sheeting, the signs are backed up with a manufacturer’s warranty. SignsofSecurity.com.

Go to sp.hotims.com and enter 435 for product information.

Cellular IntercomSupports more than 260 apartmentsCinch Systems, Inc. has unveiled its new pow-erful Ce-HS-VR, UL 1610 and UL 1076 virtual receiver. CRZH monitoring agencies will be very interested in this advancement in monitoring. Reporting is scalable from one to thousands of

Cinch control panels. The virtual receiver utilizes standard UL 60950 networking equipment with no proprietary hardware. Cinch Systems, Inc.

Go to sp.hotims.com and enter 436 for product information.

877.773.3547

The Full-Spectrum Video Security Solution

Now FLIR offers a complete video security solution for all of your daylight, low-light, and no light imaging requirements.

FLIR with WDR Thermal

FLIR adds Digimerge to cover the whole spectrum of video security

Visit FLIR.com/SP to learn about FLIR’s full-spectrum imaging and storage solutions.

Go to sp.hotims.com and enter 88 for product information. See us at ISC West Booth 18057.

0313sec_086_103_NP_v3.indd 99 2/15/13 1:32 PM

0313 NEW PRODUCTS

1 0 0 0 3 1 3 | S E C U R I T Y P R O D U C T S

Tube CamerasInfrared capability

The GXV3672_FHD and GXV3672_HD IP Cameras are two outdoor day/night tube cameras, with IP66 weatherproof casing and ONVIF compliance, that feature infrared (IR) capability for advanced nighttime and low-light video surveillance record-

ing. The GXV3672_FHD includes a 3.1 Megapixel CMOS sensor for a 1080p HD resolution, while the GXV3672_HD features a 1.3 Megapixel CMOS sensor for 720p HD resolution. Both models pro-vide users with an invaluable day/night surveil-lance tool for securing premises and delivering solid evidence of events that occur in darkness. In addition to high-resolution black/white images

produced at night, the IR cameras deliver vibrant HD color images during the day, even under dim light conditions. Grandstream Networks.

Go to sp.hotims.com and enter 437 for product information.

Automatic Fire VentOpens automatically in case of fi re

The Bilco Company’s Lumivent®, an automatic fi re vent with multi-wall polycarbonate covers that provide natural daylighting, features a pitched cover design to meet both UL 793 and 2012 IBC 2610.3 Building Code requirements. The sloped design encourages burning embers to roll off the covers rather than burn through per the intent of these fi re protection standards. Compliance to both standards provides a high level of defense and makes the Lumivent one of the safest day-lighting vent options on the market. As with all Bilco fi re vents, the Lumivent is designed to open automatically in the event of a fi re to remove smoke, heat and toxic gases from a burning build-ing. This improves inside air quality and visibility to allow building occupants to escape safely and fi re-fi ghters to get in to do their job. Fire vents are ide-ally suited for buildings with large expanses of unobstructed space such as factories, warehous-es, auditoriums and retail facilities. Bilco.

Go to sp.hotims.com and enter 438 for product information.

Custom Protective GuardsSteel Mesh Guards

Chase Security Systems has a custom line of pro-tective guards that cover embedded windows on doors commonly used in parks, schools K-12, and correctional facilities. This solid steel mesh guards prevent windows from being broken through and allowing an individual from entering the room. The hinged design ensures ease of cleaning of the win-dows. Our guards are available in a variety of cus-tom sizes and fi nishes to compliment any style of décor. Chase Security Systems, Inc.

Go to sp.hotims.com and enter 439 for product information.

Go to sp.hotims.com and enter 44 for product information. See us at ISC West Booth 7056.

0313sec_086_103_NP_v3.indd 100 2/15/13 1:32 PM

Get the tools you need to develop and implement policies and procedures for maintaining and restoring operations in the event of natural or man-made disasters.

Get your FREE Expo Pass Today!FREE AGENCY BRIEFINGS

FREE FEATURED PRESENTATIONS

FREE CERTIFICATIONS

FREE KEYNOTE PRESENTATIONS

EXHIBIT HALL ACCESS

2-Day Conference

Enable your organization’s resiliency through education focusing on: Emergency Preparedness Disaster Management Effective Response &

Recovery

Hurry, prices go up April 5!

CPM-East.com

Master the Disaster Management Cycle! CPM

Workshops: May 13, 2013 Conference & Expo: May 14-15, 2013

Walter E. Washington Convention CenterWashington, DC

PRODUCED BY:Interested in exhibiting or sponsoring?

Kharry Wolinsky – East

Nancy Calabrese – Midwest, West

Register today! USE PROMO CODE:

PAC10

Go to http://sp.hotims.com and enter 58 for product information.

Untitled-5 1 2/1/13 1:26 PM

0313 NEW PRODUCTS

1 0 2

Professional Card PrinterPrint up to 2,000 card per hour

Capable of printing up to 2,400 single-side cards per hour in monochrome, the S5000G is ideal for issuing access control, membership, employee ID, fi nancial and loyalty cards. Being the fastest print-er in its class, the new S5000G guarantees consis-tent and reliable performance with high quality printing. Used with our new Matica SmartSupply ribbons, you can print up to 145 single-side cards per hour in full color, too. Options include dual-side printing, contact, contactless and mag stripe en-coding and a detachable fl oor stand. It also comes standard with our Maticard Pro software and diag-nostic tool. Matica System.

Go to sp.hotims.com and enter 440 for product information.

Custom Security DoorsBullet, blast and force resistant

Electric Power Door manufactures a variety of custom-designed Blast Resistant, Bullet Resistant, and Force Resistant Security Doors and Gates for perimeter security, including horizontal sliding, swinging, vertical lift, vertical drop, and four fold doors and gates. These can be designed to meet all different types of situations and specifi cations, ranging from very low blast and pressure loads to very high blast and pressure loads and high bullet and force resistant ratings. Made in America with American steel, these quality doors are noted for their durability, low maintenance costs, and energy saving sealing systems. Electric Power Door.

Go to sp.hotims.com and enter 441 for product information.

Bulletproof PanelsExternal security layer

C.R. Laurence’s Bullet Resistant Fiberglass Panels that can be embedded in doors and lined in walls to provide an extra layer of security. The densely packed structure of these panels exhibits an ex-cellent capability to absorb multiple impacts from high velocity projectiles, limiting ricochet or shat-tering. This material is also sold in bullet resis-tance levels of 1 to 3 to meet the standards of U.L. 752 Ballistic Performance Requirements, as well as requirements set forth by the National Institute of Justice. C.R. Laurence.

Go to sp.hotims.com and enter 442 for product information.

Protective Security Screen System

High resistance to forced entry

C.R. Laurence’s Guarda™ Protective Security Screen System combines the strength of stainless steel mesh with an engineered multi-point door and window frame system that provides high re-sistance to forced entry. Guarda™ provides pro-tection and ventilation with unobstructed clear views and can be used to replace old style steel bars. Guarda™ includes a Quick Escape Window Screen that is secure from the outside, but can be opened easily from the inside. It is ideal for schools or other types of building with need for rapid evac-uation capabilities. Guarda™ passes dynamic im-pact, knife shear, and jimmy tests (AS 5041-2003), as well as the salt spray test. C.R. Laurence.

Go to sp.hotims.com and enter 443 for product information.

Once again, Security Products will honor outstanding industry products at GovSec. Don’t miss out on the opportunity to have your product designated as one of the best at the industry’s premier government security conference and expo, GovSec.

Enter your outstanding government security product for recognition in 2013!

To be awarded at

GovSec 2013!Sponsored by

Visit GovSecInfo.com for details and entry form.

Winners will receive great publicity, including:

GovSec Security ProductsSecurity Products’

Security ProductsSecurity Products

0313sec_086_103_NP_v3.indd 102 2/15/13 1:32 PM

W W W . S E C U R I T Y - T O D A Y. C O M 1 0 3

Target SystemWireless

Mancom has released the Freedom AWD™ wire-less target system, taking the wireless carrier to a new level. The self-propelled feature of the AWD will eliminate bus bar and cable maintenance along with chronic drive issues. Faster travel speeds, more accurate target distances and im-proved touch screen controls are all things Man-com has integrated into the AWD. Mancom.

Go to sp.hotims.com and enter 444 for product information.

Wireless Lock TechnologySimplifi ed installation

Medeco’s M100 eCylinder with Aperio™ Wireless Lock Technology, with an easy, affordable way to add access control to mechanical mortise locks with the simple change of a cylinder. The Medeco M100 is part of a family of Aperio wireless products available from ASSA ABLOY. Aperio is a global, wire-less platform that uses wireless communication (IEEE 802.15.4) between the locking device and an Aperio hub to provide real-time communication to the access control system. This simplifi es installa-tion, reducing costs and complexity compared to traditional access control, to allow greater fl exibility and accountability on interior facility doors.1st Choice Security Solutions, Inc.

Go to sp.hotims.com and enter 445 for product information.

Emergency Personnel Information Center

Web-based programRTTG’s Emergency Personnel Information Center (EPIC) is a trusted community that provides op-

erational tools for more effi cient training record management, and more effective access control at natural disasters and other critical incident scenes. EPIC delivers a secure, easy-to-use Web-based program that allows law enforcement, fi re/rescue, emergency medical teams, and associated support contractors to improve identity and cer-tifi cation tracking within their organizations, and

allow real-time verifi cation of critical data for im-proved incident management. Using any Internet-enabled device, offi cers can effi ciently and effec-tively limit entry to incident scenes to the essential, trusted personnel who maintain the professional certifi cations required for safe access. RTTG

Go to sp.hotims.com and enter 446 for product information.

Go to sp.hotims.com and enter 79 for product information. See us at ISC West Booth 41013.

0313sec_086_103_NP_v3.indd 103 2/15/13 1:32 PM

AD INDEX

Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page

FREE PRODUCT INFOQuick, Easy and Direct...get the info you need NOW!Search by category or by company • Go online to www.security-today.com/productinfo to request free information from advertisers in this issue.

1 0 4 NOTE: ADVERTISERS WITH AN * ARE REGIONAL ADS AND MAY NOT APPEAR IN THIS ISSUE 0 3 1 3 | S E C U R I T Y P R O D U C T S

ADVERTISERS6............3M Cogent Inc. ........................................92

52..........Aiphone ...................................................31

7............Alert Enterprise ........................................83

13..........Alpha Arsenal LLC ....................................32

12..........Altronix ....................................................70

61..........Arecont Vision ..........................................52

62..........Asis International .....................................96

8............Avalan Wireless .......................................29

51..........Avigilon ...................................................37

11..........Axis Communications ................................2

14..........Bosch ......................................................15

19..........CBC America ...........................................33

17..........CIAS Electronica Srl .................................94

18..........CNB Technology .........................................5

16..........Community Pro ........................................91

15..........ComNet ...................................................49

58..........CPM EAST .............................................101

76..........Datacard Group .......................................39

26..........Dedicated Micros .....................................20

63..........Delta Scientifi c ........................................51

64..........Designed Security Inc ..............................64

22..........Diebold ....................................................63

20..........Digital ID VIEW .........................................44

65..........Digital Management Solutions .................76

21..........Digital Watchdog .....................................17

25..........DoorKing Inc ............................................97

66..........Dortronics ................................................97

23..........Dotworkz ...................................................6

24..........Dotworkz .................................................16

5............DSX Access ...........................................108

..............DSX Access ...............................................1

47..........Dynalock .................................................88

27..........Enersys ...................................................95

67..........Fire Lite/Honeywell ..................................62

88..........Flir Systems.............................................99

28..........Garrett Metal Detectors ............................56

71..........Gov Sec ...................................................54

..............HID Global .............................................107

56..........Housing Company, The ............................28

68..........Hypergraphic Impressions .......................86

48..........IC Realtime ................................................7

83..........IC Realtime ..............................................19

50..........Indigo Vision ............................................18

84..........Iqinvision .................................................27

2............ISC WEST.................................................22

31..........Lillin Corporation .....................................43

29..........Louroe Electronics ............................. 58-59

3............MBM Corporation.....................................41

33..........Mercury Security .....................................57

34..........Micropower .............................................75

77..........Mier Products ..........................................24

35..........Milestone System ......................................3

32..........Morse Watchman ............................... 34-35

78..........Napco Security ........................................61

38..........Network Video Technologies ....................73

37..........Next Level Security ..................................48

36..........Observint Technologies ............................25

39..........OSSI Intellisite .........................................77

4............Panasonic Security System ......................11

80..........Pelco by Schneider Electric ......................67

59..........Platinum Tools .........................................69

69..........Qnap System ...........................................30

40..........Quantum Secure ......................................72

10..........Qvis Security .........................................36

41..........Reconyx Inc .............................................68

75..........Safety Technology International Inc. .........85

72..........Salient Systems .......................................21

70..........Salto Systems ..........................................53

60..........Samsung .................................................40

81..........Seco-Larm Inc. ........................................98

..............Security-Today.......................................102

42..........Speco Technologies .................................13

53..........Stanley Security Solutions .......................47

49..........Talk-A-Phone ...........................................45

43..........Tamron ....................................................79

54..........Team Nisca ..............................................86

44..........Topnos...................................................100

1............Totus Solutions ........................................38

57..........Transponder & Reader Engineered ..............Systems ..................................................93

46..........Video Insight ..............................................9

55..........Video IQ ...................................................89

85..........Videofi ed .................................................81

45..........Videx .......................................................26

84..........ViewZ USA ...............................................87

86..........Vitek ........................................................71

87..........Vivotek ....................................................90

73..........Winsted Corp ...........................................65

79..........Xtec .......................................................103

EDITORIALCover Products

312........American Dynamics ...................................1

311........CBC America .............................................1

315........DIGIOP Inc. ................................................1

313........D-Link .......................................................1

314........LG Electronics............................................1

316........Salient Systems .........................................1

310........TELAERIS Inc. ............................................1

Top Picks

301........Genetec ...................................................12

302........GET Group ...............................................12

300........HID Global ..............................................12

305........Honeywell Security ..................................12

303........Open Options ...........................................12

307........Safety Technology Int’l Inc........................12

306........Topnos.....................................................12

304........TRES RF Solutions ...................................12

ISC West

340........3M Cogent ...............................................30

329........Aiphone ...................................................24

323........Alpha Arsenal ..........................................23

333........Arecont Vision ..........................................26

349........Avigilon ...................................................34

326........AxxonSoft ................................................23

331........CBC America Corp. ..................................24

348........CIAS Electronica Srl .................................34

364........CyberLock Inc. .........................................40

353........Dakota Alert .............................................35

347........Datacard .................................................32

337........Delta Scientifi c ........................................28

352........Digital ID View .........................................35

342........Digital Management Solutions .................30

330........DoorKing Inc. ...........................................24

357........DSI ..........................................................36

356........Fire-Lite Alarms .......................................36

336........Garrett Metal Detectors ............................28

358........Honeywell ................................................36

360........Honeywell ................................................38

338........infi nias/Observint Technologies ................28

332........Ingersoll Rand..........................................26

359........Lilin Corporation ......................................37

362........Linear ......................................................40

324........Louroe Electronics ...................................23

365........Mier Products Inc. ....................................40

319........Milestone Systems ..................................23

318........Minuteman UPS .......................................23

344........Next Level Security Systems ....................32

351........Pivot3 ......................................................35

335........QNAP Security .........................................26

334........Reconyx Inc .............................................26

345........RS2 Technologies ....................................32

341........Safety Technology Int’l Inc .......................30

322........SALTO Systems .......................................23

350........Sentry360 ...............................................34

325........Speco Technologies .................................23

343........Stanley Security Solutions .......................30

328........Talk-A-Phone ...........................................24

354........The Housing Company .............................35

361........THRIVE Intelligence ..................................38

355........Topnos Inc/CTRING ..................................36

321........TOTUS Solutions ......................................23

363........Transponder and Reader Engineered ..............Systems ..................................................40

346........Video Insight ............................................32

327........VITEK .......................................................23

339........VIVOTEK USA Inc ......................................28

320........Xtec .........................................................23

Product Solutions: Access Control

370........Altronix ....................................................50

372........Camden Door Controls .............................50

378........CyberLock ...............................................52

374........Delta Scientifi c ........................................50

375........DoorKing Inc ............................................50

368........Dortronix .................................................50

379........Flex System Keyport ................................53

380........Genetec ...................................................53

0313sec_104_105a_Adindex_v2.indd 104 2/15/13 2:32 PM

Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page Info No. Company Name Page

TAIWAN

CHINA

EUROPE

CANADAHAWAII

ALASKA

Peter Kao,International Sales ManagerTaiwanIdea [email protected]

Jane Dai,International Sales ManagerChinaNew Buddy Limited [email protected]@public.szptt.net.cn

INTERNATIONAL

Randy Easton,Integrated Media ConsultantNortheast, and Southeast U.S.AL, CT, DE, FL, GA, ME, MD, MA, MS, NH, NJ, NY, NC, OH, PA, RI, SC, VT, VA, WV, DC (678) [email protected]

UNITED STATES & CANADA

Rick Neigher, Online Advertising Director (818) 597-9029 [email protected] Rendine,

Integrated Media ConsultantMidwest, Northwest, and CanadaAZ, AR, CO, ID, IL, IN, IA, KS, KY, LA, MI, MN, MO, MT, NE, NM, ND, NV, OK, OR, SD, TN, TX, UT, WA, WI, WY(972) [email protected]

Benjamin Skidmore,Integrated Media ConsultantCA, HI, AK (972) [email protected]

Sam Baird,International Sales ManagerEurope, IsraelWhitehill Media Ltd.+44 1883 715 [email protected]

Kevin O'Grady President & Group Publisher

(972) [email protected]

Reprints: For single article reprints (in minimum quantities of 250-500), e-prints, plaques and posters contact:PARS International, Phone (212) 221-9595, [email protected],www.magreprints.com/QuickQuote.asp

List Rentals: This publication’s subscriber list, as well as other lists from 1105 Media Inc., is available for rental. For more information, please contact our list manager, Merit Direct. Phone: (914) 368-1000;[email protected]; www.meritdirect.com/1105

Media Kits: Download the current media kit atwww.security-today.com/pages/adv/media-kit

W W W . S E C U R I T Y - T O D A Y. C O M NOTE: ADVERTISERS WITH AN * ARE REGIONAL ADS AND MAY NOT APPEAR IN THIS ISSUE 1 0 5

381........Ingersoll Rand..........................................53

377........Monitor Dynamic .....................................52

376........Onity Inc ..................................................52

369........Open Options, Schlage, Mercury Security 50

371........Secura Key ..............................................50

373........Sielox ......................................................50

382........Tyco Security Products ............................53

Product Solutions: DVRs/NVRs

462........3VR .........................................................71

471........ATV ..........................................................73

455........Bosch Security.........................................69

457........CBC America Corp. ..................................69

451........Channel Vision .........................................68

468........Channel Vision .........................................72

456........Digital Watchdog......................................69

466........Digital Watchdog......................................72

450........DVTEL .....................................................68

452........Fortinet Inc ..............................................68

454........Genetec ..................................................69

461........Geutebruck ..............................................70

465........Interlogix .................................................72

467........Nice Vision ...............................................72

460........Promise Technology .................................70

463........Promise Technology .................................71

458........Samsung .................................................70

470........Seneca ....................................................73

464........Seneca ....................................................71

459........Speco Technologies .................................70

469........Toshiba ....................................................73

453........WavestoreUSA .........................................68

New Products

445........1st Choice Security Solutions Inc ...........103

395........3VR .........................................................88

431........4Sight......................................................98

390........American Portwell ...................................87

389........Azco Technologies Inc ..............................87

391........Azco Technologies Inc ..............................87

394........Azco Technologies Inc ..............................88

417........Azco Technologies Inc ..............................94

419........Azco Technologies Inc ..............................94

438........Bilco ......................................................100

418........Blue Mango .............................................94

426........Bosch Security Systems Inc .....................96

433........Bosch Security Systems Inc .....................98

398........Boundless Security Systems ....................89

404........Boundless Security Systems ....................91

442........C.R. Laurence .......................................102

443........C.R. Laurence .......................................102

386........Camden Door Controls .............................86

439........Chase Security Systems Inc ...................100

436........Cinch Systems Inc ...................................99

424........Communication Networks ........................95

387........Delta Scientifi c ........................................86

393........Digital Watchdog......................................88

403........Digital Watchdog......................................91

399........Dortronics ................................................89

441........Electric Power Door ...............................102

430........EZUniverse Inc .........................................98

408........Fluidmesh................................................92

407........FutureSentry ............................................92

437........Grandstream Networks ..........................100

427........HID Global ...............................................96

401........Honeywell ................................................90

429........ITW Linx ..................................................97

402........Jaguar .....................................................90

423........JVC Professional Products Company ........95

397........Lenel .......................................................89

434........Linked24 .................................................99

444........Mancom ................................................103

440........Matica System .......................................102

400........Matrox Graphics Inc .................................90

425........MVS Managed Video Solutions .................96

416........Napco Security Technologies ...................94

392........NLSS .......................................................87

385........Onity........................................................86

422........Open Options ...........................................95

420........ORION Images Corp. ................................94

409........Premier Mounts .......................................92

412........Premier Mounts .......................................93

405........Quantum Secure ......................................91

446........RTTG .....................................................103

414........Se-kure Controls Inc ................................93

406........Seneca ....................................................91

435........SignsofSecurity.com ................................99

432........Smart Water ............................................98

428........Southco ...................................................97

411........Stonesoft .................................................93

413........Swann .....................................................93

388........Telos Identity Management Solutions .......86

410........Terminus .................................................92

421........Tyco Security Products ............................94

396........Veridt Inc .................................................88

415........Wausau Window and Wall Systems ..........93

DEALER STRATEGIES

501........Axis Communications ......................... DS16

502........Camden Door Control ......................... DS17

515........Dakota Alert .......................................... DS9

509........Digital ID View ...................................... DS5

510........Honeywell Security ............................... DS3

517........Honeywell Video ................................... DS8

516........Keyscan.............................................. DS24

503........Linear ................................................. DS13

508........Minuteman UPS .................................. DS23

504........Monitronics ........................................ DS11

511........Napco Security ..................................... DS7

506........Scansource ........................................ DS15

514........Security Door Control .......................... DS19

505........Seneca Data ....................................... DS14

507........THRIVE Intelligence ............................. DS20

512........Tri-Ed Distribution ............................... DS21

0313sec_104_105b_Adindex_v2.indd 105 2/15/13 2:33 PM

1 0 6 0 3 1 3 | S E C U R I T Y P R O D U C T S

BIOMETRICS AUTHENTICATION

Over the past decade, we’ve witnessed a shift from identity au-thentication based on signatures, PINs and identifi cation cards, which can be easily lost or stolen, to biometrics-based identity authentication.

How does this impact the future of identity authentication? Imagine walking through airport security without waiting in line, or being able to quickly and securely get money from an ATM without having to remember a PIN. Imagine accessing your workplace without using an identifi cation or access card. These innovations are quickly becoming realities as our world shifts from using access cards and PINs to the new digital age of secure identifi cation and access control based on biometrics.

Today’s biometrics systems are moving identity authentication toward real-time, accurate and secure individual ID based on unique biometric characteristics, including iris patterns, fi ngerprint minutiae, facial structure or voice. A biometric identifi cation system is able to quickly recognize and analyze these anatomical traits, match them against a database of templates and either grant or deny access to information or a location.

ARCHITECTURE OF BIOMETRICS SYSTEMSWhile biometrics systems range in their performance, power consumption and pe-ripheral integration, the basic architectures of all systems is similar because the functions they must perform are similar. Biometrics systems typically manage sensing, feature extraction, template matching and decision output processes.

Sensing. The sensing component—often a camera, CMOS, CCD or optical sensor—captures the subject’s biometric characteristic, inputs it into the system, and converts the analog data into digital information.

Feature extraction. During this step, the processor takes information from the sensor and extracts data points to construct a template, or model, of the subject’s biometric characteristics. The algorithms that enable the processor to extract the features, such as segmentation, grey stretch, block direction and Gabor fi ltering, can be computationally intense and place high demands on the systems’ processing capabilities. Digital signal processors (DSPs), with their math optimized architec-ture, are ideal for feature extraction in biometrics applications.

Template matching. In this process, the system compares the newly generated biometric template with those stored in a database of people who are allowed access. If the template does not match an approved template in the database, the person is not granted access. To enable quick access, the processor architecture must perform high-speed template matching and quickly pass its decision onto the output device to allow or deny access within seconds.

Distributing a biometric system’s processing load across a computationally powerful DSP and a general purpose processor (GPP) platform can increase the processing effi ciency, allowing for the deployment of less costly processing plat-forms or providing the added processing capabilities needed for more sophisti-cated biometric algorithms. Texas Instruments develops a variety of solutions that can address these needs.

BIOMETRICS TODAYBiometric authentication technology has signifi cantly advanced over the last de-cade as the necessary computational abilities, power consumption and cost effec-

tiveness of digital signal processing have become more sophisticated. Developers are able to integrate faster and more cost-effective processors into their systems and implement more sophisticated algorithms, all while reducing the price of their systems.

Over the next few years, biometrics technology will become even more perva-sive in our everyday lives. Biometric passports have already been adopted by many countries, including the United States, the United Kingdom and other European countries. These systems match the passport owner’s face against a digital template of their face that is stored in the passport.

In addition, the Department of Homeland Security has instituted the Visitor and Immigration Status Indicator Technology (US-VISIT) program to collect dig-ital fi ngerprints and facial images of international visitors to the United States, en-suring proper biometric identifi cation at the border. The database is shared among numerous governmental agencies. The FBI also manages its own Biometric Center of Excellence.

India, one of the most populous countries in the world, is undertaking a Unique Identifi cation Number (UID) program to enroll all of its citizens in a biometric identity database. More than half of India’s 1.2 billion citizens are expected to be enrolled by 2014. With 20,000 enrollment sites across the country, India adds about one million biometric identities every day. The UID program is aimed at improving the government’s distribution of about $60 billion in welfare support to India’s poor and rural areas, where residents do not have proper identity documen-tation and have diffi cultly opening bank accounts.

Biometric systems input and store information on all 10 fi ngerprints and both irises, and take a digital photograph of the face. India’s nationwide program will certainly offer lessons to the rest of the world regarding how to implement a large-scale biometric authentication program that can be trusted by the population.

“Soft biometrics” systems have recently been developed, not to authenticate the exact identity of individuals, but to identify their general demographics, including gender and age. Retail locations are using this information to target their digital advertising toward different demographic groups.

BIOMETRICS IN THE FUTUREIn the coming years, the selection of processing elements on which to base bio-metrics systems and safeguards for biometric databases will become even more sophisticated. Systems also will evolve into smaller form factors, including more battery-powered handheld authentication devices. One place we expect to see biometrics applications grow in the near future is point-of-sale systems. This will be a more conve-nient way to pay for purchases, while making identities more dif-fi cult to steal and keeping fi nancial information safer.

Milind Borkar is the marketing manager of Singlecore DSP at Texas Instruments Inc.

GAINING INTELLIGENCE

As biometrics authentication technology proliferates, it leaves fi ngerprints on many sectors of society

By Milind Borkar

0313sec_106_Borkar_v4.indd 106 2/14/13 4:13 PM

© 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design, iCLASS SE, Secure Identity Object, SIO and Seos are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.

No other company can offer you more ways to create, use and manage secure identities in a trusted environment than HID Global.

From smart cards and printers to smart phones to managing identities in the

cloud, we provide solutions spanning the entire lifecycle of your secure identities.

Learn more about how HID can help you to create, use and manage your secure identities visit: HIDGlobal.com/create-use-manage-sp

Untitled-8 1 12/7/12 12:51 PM

See us at ISC West, Booth #11049 and #11051

10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

www.dsxinc.com

CREATING THE FUTUREOF SECURITY . . . TODAY

10731 Rockwall Road | Dallas, TX USA 75238-1219| | [email protected]

www.dsxinc.comwww dsxinc com

Go to http://sp.hotims.com and enter 5 for product information.

Untitled-5 1 12/13/12 11:53 AM

See us at ISC West, Booth #19079