Information

 

 

https://sm.asisonline.org/Pages/Accolades-Entries-Spotlight-Innovation.aspxAccolades Entries Spotlight InnovationGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652016-09-11T04:00:00ZSM Staff<p>​<span style="line-height:1.5em;">ASIS Accolades, a highly respected awards competition from ASIS International, recognizes new ventures that are destined to become security mainstays. At today's Networking Luncheon, ASIS President Dave Davis, CPP, will announce the ten winners of the Accolades "Security's Best" awards.</span></p><p>​This summer, exhibitors were invited to submit products and services introduced within the past year. In their submissions, companies were asked to describe a problem with existing security technologies, then tell how their new product or service solved the problem or addressed a void. The entries included an analysis of the innovative features of the product or service to help the judges in their deliberations.</p><p>A team of judges represented end users as well as experts in physical and information security evaluated the entries. The judges will also single out at least one product for a Judge's Choice Award. </p><p><strong>People's Choice.</strong> Remember, you have until 4:30 p.m. on Tuesday to make your selection for the People's Choice Award. Just stop by the booth where your top choice is on display and cast your ballot. After all the votes have been tallied, the winner will be announced at the Wednesday's General Session. </p><p>The following list includes the 25 companies that contributed 35 2015 Accolades entries. Each product or service will be featured at the exhibitor's booth and in the Accolades Showcase, booth 3379.</p><p> </p><h4>ALERTENTERPRISE</h4><p><em style="line-height:1.5em;">Booth 1315<br></em><strong style="line-height:1.5em;"><em>bAlert IoT Security Commander</em></strong></p><p>This product is a comprehensive IoT-based security incident management and response platform in the cloud built for the enterprise. The bAlert Mobile Reporter delivers the perfect "see something, say something" companion mobile app, allowing employees to instantly report security and safety issues from their mobile devices.</p><p> </p><h4>AMIKA MOBILE CORPORATION</h4><p><em>Booth 4055<br></em><strong style="line-height:1.5em;"><em>AMS IoT Platform for Enterprise Security with Hybrid Gunshot Detection & Escalation</em></strong></p><p>The AmikaA® Mobility Server (AMS), an intelligent security platform, addresses IoT device discovery, monitoring, auctioning while monitoring and analyzing tracking massive user alert/response location. AMS processes thousands of simultaneous events from disparate sensors, including gunshot detectors or recipients triggering cascading alert or response in real-time to any communication layer, any device leveraging hybrid on-premise or cloud escalation. </p><p> </p><h4>ASSA ABLOY</h4><p><em>Booth 3601<br></em><strong style="line-height:1.5em;"><em>IN100 AperioA® Wireless Lock</em></strong></p><p>From ASSA ABLOY Group brands Corbin Russwin and SARGENT, this wireless lock offers the convenience and flexibility of AperioA wireless technology with the real-time communication of online access control. The next generation lock also provides simultaneous support for multiple credential types, and HID Mobile AccessA® powered by SeosA®. </p><p> </p><h4>AXIS COMMUNICATION</h4><p><em>Booth 3101<br></em><strong style="line-height:1.5em;"><em>Axis A8105-E</em></strong></p><p>This product is a discreet, yet powerful network video door station. It operates as a communication device and full-fledged security camera at the same time, providing HDTV video, audio identification, two-way communication, and remote entry control as an intrinsic part of video surveillance. </p><p><em> </em></p><h4>AXIS COMMUNICATION</h4><p><em>Booth 3101<br></em><strong style="line-height:1.5em;"><em>Axis Companion Line</em></strong></p><p>The AXIS Companion Line is a complete out-of-the-box IP-based video surveillance solution specifically designed to address the unique security needs of small businesses. It delivers enterprise-level quality hardware and software in a solution built around simplicity and reliability, which are critical features for today's small business owner.</p><p> </p><h4>AXIS COMMUNICATION</h4><p><em>Booth 3101<br></em><strong style="line-height:1.5em;"><em>Axis Perimeter Defender</em></strong></p><p>This product is a scalable and flexible video analytics application for intrusion detection in the enterprise market. It provides maximum accuracy, efficiency, and scalability and is capable of detecting multiple events occurring simultaneously, analyzing those events, weeding out non-threatening ones, and notifying security staff of potentially critical situations.</p><p> </p><h4>CYBERLOCK, INC.</h4><p><em>Booth 2573<br></em><strong style="line-height:1.5em;"><em>CyberKey BLE smart key</em></strong></p><p>This Bluetooth Low Energy (BLE) smart key is the newest addition to the Generation II CyberKey family. New low energy Bluetooth technology enables longer battery life and permits wireless updating of schedules, permissions, and access events when the key is paired to a smartphone or tablet</p><p> </p><p><em>Booth 2573<br></em><strong style="line-height:1.5em;"><em>FlashLock</em></strong></p><p>FlashLock uses serial optical communications technology combined with any hand-held device with a web browser to give and gain access to any lock retrofitted with the FlashLock system. Users can grant one-time or multi-use access. There is no app to download and no Bluetooth to pair.</p><p> </p><p><em>Booth 2573<br></em><strong style="line-height:1.5em;"><em>FlashLock padlock</em></strong></p><p>The keyless FlashLock padlock uses serial optical communication technology combined with any hand-held device with a web browser to give and gain access quickly and easily. Users can grant one-time or repeated access with the ease of sending a text message. No app or Bluetooth is necessary.</p><p> </p><p><em>Booth 2573<br></em><strong style="line-height:1.5em;"><em>ValidiKey 2 vault</em></strong></p><p>The ValidiKey 2 vault offers the benefits of a stand-alone server and communicator with secure CyberKey storage. Access is granted with an RFID card or keypad number entered on its LCD touch display, and can be combined with a PIN to ensure the highest security. CyberKey audits are downloaded when the key returns to the vault. </p><p> </p><h4>DAHUA TECHNOLOGY USA</h4><p><em>Booth 2241<br></em><strong style="line-height:1.5em;"><em>HDCVI 3.0: The Analog-to-HD Industry Game Changer</em></strong></p><p>The HDCVI 3/0 is a technology that breathes new life into aging analog video surveillance systems, bringing HD quality video and IP functionality to long distance transmissions over coax cable. Offering each of installation and economical pricing, HDCVI 3/0 offers exceptional value to the security industry by offering broad compatibility with a range of other technologies, higher resolutions including Ultra HD or 4K, and intelligent functions comparable to those available in IP systems. </p><p> </p><h4>GALLAGHER NORTH AMERICA</h4><p><em>Booth 1974<br></em><strong style="line-height:1.5em;"><em>F4 Fence Controllers</em></strong></p><p>The F4 Fence Controllers are equipped with the latest in reactive defense HV plus. The F41 and F42 are both equipped with the ability to elevate the level of deterrent in response to an attack on the perimeter fence while raising an alarm to ensure immediate response.</p><p> </p><h4>GALLAGHER NORTH AMERICA</h4><p><em>Booth 1974<br></em><strong style="line-height:1.5em;"><em>Gallagher Class 5 End of Line Module (ELM)</em></strong></p><p>This product protects the integrity of alarm sensor communications to an alarm panel for high security applications. In compliance with the AS/NZS 2201 intruder alarm standard, the Class 5 ELM surpasses traditional 3 to 4 state analogue monitoring supporting device authentication, encryption, and heart-beat monitoring.</p><p> </p><h4>GALLAGHER NORTH AMERICA</h4><p><em>Booth 1974<br></em><strong style="line-height:1.5em;"><em>Gallagher Mobile Access</em></strong></p><p>This product provides the ability to implement access control anywhere. It could be at a temporary door that doesn't have fixed access control, a construction site that has no infrastructure in place, or a bus transporting staff and contractors to or from a site. It's flexibility expands to the reach of security operations. </p><p> </p><h4>GIBRALTAR</h4><p><em>Booth 4037<br></em><strong style="line-height:1.5em;"><em>Gibraltar M50 P1 Wedge Barrier (G-2000 Series)</em></strong></p><p>This product is a reliable electro-mechanical wedge barrier. The barrier is currently undergoing 247 cycle testing and have more than 400,000 cycles with no parts replacement. Gibralter performed an underwater submersion test of 1,200+ cycles submerged as well.</p><p> </p><h4>HANWHA TECHWIN AMERICA</h4><p><em>Booth 2641<br></em><strong style="line-height:1.5em;"><em>Hanwha Techwin America Samsung XRN-2011</em></strong></p><p>The XRN-2011 NVR provides ultra-high quality 4K recording performance while minimizing storage and network requirements using H.265, H.264, and MJPEG compression. XRN-2011 supports H.265 recording and allows the simultaneous viewing of 32 cameras on a single UHD monitor or 16 cameras on dual monitors.</p><p> </p><h4>HANWHA TECHWIN AMERICA</h4><p><em>Booth 2641<br></em><strong style="line-height:1.5em;"><em>Hanwha Techwin American's PNO-9080R</em></strong></p><p>This camera delivers 4K performance with 12MP resolution. Its numerous features include the superior combination of H.265/H.264/MJPEG triple codec along with Hanwha's WiseStream technology to reduce bandwidth up to 75 percent. Additional features include 1020dVB WDE, simple focusing, defocus detection, on-board analytics, and SD recording.</p><p> </p><h4>HID GLOBAL</h4><p><em>Booth 3901<br></em><strong style="line-height:1.5em;"><em>HID Trusted Tag Services—Guard Tour</em></strong></p><p>HID Trusted Tag Services combine NFC technology and cloud-based authentication with partner IoT applications, enabling secure "proof of presence" for organizations to accurately record security checkpoints. The solution also enables security guards to instantly respond to and report fraudulent activities inside and outside of a building.</p><p> </p><h4>HIKVISION</h4><p> <em>Booth 1811<br></em><strong style="line-height:1.5em;"><em>DS-2DT2235 Series Dual Sensor, Day/Night Thermal Image Camera with Thermography</em></strong></p><p>This camera represents a new level of protection for the most demanding security application. It delivers crisp, clean images in daytime scenes, excellent low-light performance at night, and zero light thermal images for a 24/7 video security solution.</p><p><strong> </strong></p><h4>HONEYWELL BUILDING SOLUTIONS</h4><p><em>Booth 2401<br></em><strong style="line-height:1.5em;"><em>Honeywell Vector Occupant App</em></strong></p><p>This app combines mobile devices with connected building features to enhance security, increase comfort control, and allow users to interact with the building. The app features digital identification, convenient access control, and one-click hot or cold calls. It helps managers deploy higher security mobile credentials and increase convenience at the same time.  </p><p> </p><h4>IRONYUN</h4><p><em>Booth 2878<br></em><strong style="line-height:1.5em;"><em>CityEyes</em></strong></p><p>CityEyes is a hyper-converged, all-in-one cloud and big data intelligent video surveillance solution. The key benefits are that it is easy to use and deploy, is a high-performance software platform that integrates many real-time video analytics, and has a low cost of ownership.</p><p> </p><h4>IRONYUN, INC.</h4><p><em>Booth 2878<br></em><strong style="line-height:1.5em;"><em>IronYun Video Search</em></strong></p><p>IronYun intelligent video search is based on machine learning technologies. The intelligence video search leverages advanced computer vision engines and emerging advanced deep learning algorithms to deliver a video search engine with unprecedented features and performance. IronYun is the first deep learning video search system for the video surveillance industry. </p><p> </p><h4>LOGIC SUPPLY</h4><p><em>Booth 3869<br></em><strong style="line-height:1.5em;"><em>Modular Compact Rugged NVR</em></strong></p><p>THE DA-1000 is a highly versatile, energy-efficient and economical system that provides application flexibility and reliability in an ultra-compact and durable package that boasts an array of connectivity. A wide temperature rating, vibration resistance, and secure wide-input power capabilities also make the DA-10000 a great candidate for use in mobile or remote installations. </p><p> </p><h4>MEDECO SECURITY LOCKS</h4><p><em>Booth 3601<br></em><strong style="line-height:1.5em;"><em>Medeco XT Data Analytics</em></strong></p><p>A game changer in audit trails analysis, the Medeco XT Data Analytics is a powerful tool build into XT Web Manager software. Easy-to-read graphics allow security administrators to quickly see access trends and spot potential problems within their facility. This time-saving feature eliminates searching through thousands of audit records. </p><p> </p><h4>NVT PHYBRIDGE</h4><p><em>Booth 2522<br></em><strong style="line-height:1.5em;"><em>FLEX Switch</em></strong></p><p>The FLEX24 is an enterprise-grade, long-reach-managed switch that delivers fast Ethernet and PoE++ over 1, 2, or 4 pair UTP with 1,640ft reach. FLEX supports long- and short-reach requirements, making IP migration simple, cost effective, and less disruptive.</p><p> </p><h4>PIVOT3</h4><p><em>Booth 1522<br></em><strong style="line-height:1.5em;"><em>Pivot3 Edge Protect</em></strong></p><p>Edge Protect is a hyper-converged SAN storage solution for mid-sized and remotely distributed surveillance applications. Edge Protect delivers enterprise-class capabilities in off-the-shelf x86 server hardware, enabling users to realize the benefits of highly efficient shared storage and built-in failover without the complexity or cost typically associated with infrastructure based on separate servers and SAN storage. </p><p> </p><h4>RIGHTCROWD SOFTWARE</h4><p><em>Booth 1357<br></em><strong style="line-height:1.5em;"><em>RightCrowd Essentials</em></strong></p><p>RightCrowd Essentials is software that enhances physical access control systems, delivering powerful enterprise-class workflow and compliance features. Designed specifically for SME businesses, Essentials "out-of-the-box" feature means remarkably quick implementation at very low cost. Modeled from RightCrowd's enterprise solutions, Essentials enables real-time continuous workflow assurance for safety, security, and compliance solutions.</p><p> </p><h4>SPILLMAN TECHNOLOGIES</h4><p><em>Booth 1831<br></em><strong style="line-height:1.5em;"><em>Spillman Ally</em></strong></p><p>Spillman Ally draws on the company's more than 30 years of experience as a leading law enforcement software vendor and delivers to the security industry an integrated cloud-based software package with policing dispatch, workflow, and analytics capabilities. </p><p> </p><h4>SPOTTERRF, LLC</h4><p><em>Booth 943<br></em><strong style="line-height:1.5em;"><em>A2000 Counter Drone Radar</em></strong></p><p>Small drones present a new, hard to detect threat to critical infrastructure. The affordable A2000 radar brings to market technology that detects drones and other airborne targets far beyond any other commercially available technology in its class and works reliably during rain, fog, snow, or dust. </p><p> </p><h4>STRATFOR</h4><p><em>Booth 850<br></em><strong style="line-height:1.5em;"><em>Stratfor Threat Lens</em></strong></p><p>Threat Lens is a premium threat intelligence platform offering that cuts through the noise and gives security leaders the ability to identify, anticipate, measure, and mitigate risks to their people, assets, and interests around the world. The multilayered analytical framework evaluates both the immediate significance and future implications of evolving security events so that clients can anticipate threats and implement protective measures. </p><p> </p><h4>SUREID, INC.</h4><p><em>Booth 3719<br></em><strong style="line-height:1.5em;"><em>SureID PIV-1</em></strong></p><p>SureID PIV-1 is an end-to-end identity management solution that helps organizations verify who they can trust. The turnkey solution integrates with multiple business systems such as physical access control systems, logical control systems, and human resources information systems, and is interoperable with Web (SSL), OS (Windows), and enterprise standards.</p><p> </p><h4>VERINT</h4><p><em>Booth 2119<br></em><strong style="line-height:1.5em;"><em>Verint Video Tracker</em></strong></p><p>The Verint Video Tracker streamlines proactive video monitoring and allows users to realize increased efficiencies by making it easier and faster to monitor, identity, and take action against suspicious activities. The intelligent video tool helps users identify the most relevant data to elevate the effectiveness of a facility's organizational monitoring and response. The solution, which leverages advanced analytics to automate the tracking of an individual though a large number of camera views within a location or across sites, can be used in real-time or forensically to identify, evaluate, and respond to a security event. </p><p> </p><h4>VISMO</h4><p><em>Booth 1768<br></em><strong style="line-height:1.5em;"><em>Vismo-Alert</em></strong></p><p>The Vismo-Alert wearable panic button is a personal alarm system that connects to smartphone devices over Bluetooth. The Vismo Alert overcomes that need for the user to unlock their device when activating the panic button, providing companies with a fast way to alert employees in the event of an emergency. </p><p> </p><h4>WIRELESS CCTV, LLC</h4><p><em>Booth 3819<br></em><strong style="line-height:1.5em;"><em>WCCTV Body Worn Camera (Connect)</em></strong></p><p>This camera delivers live transmission of video and audio on the move. The unit uses cellular technology (4G LTE with automatic fallback) to transmit live video and GPS location information from the wearer to control rooms and mobile devices, drastically improving situational awareness and safety. </p><p> </p><h4>YALE LOCKS and HARDWARE</h4><p><em>Booth 3601<br></em><strong style="line-height:1.5em;"><em>Yale Multifamily Solution</em></strong></p><p>This solution is a single system for securing multi-family facilities. Featuring Yale Accentra cloud-based software and industry-leading locking hardware, it offers and easy, affordable solution for managing access for residents, guests, and staff, which helps increase security, convenience, and peace of mind. </p>

Information

 

 

https://sm.asisonline.org/Pages/Accolades-Entries-Spotlight-Innovation.aspx2016-09-11T04:00:00ZAccolades Entries Spotlight Innovation
https://sm.asisonline.org/Pages/SM-Online-February-2016.aspx2016-02-01T05:00:00ZSM Online February 2016
https://sm.asisonline.org/Pages/SM-Online-October-2015.aspx2015-10-01T04:00:00ZSM Online October 2015
https://sm.asisonline.org/Pages/Industry-News-September-2015.aspx2015-09-14T04:00:00ZIndustry News September 2015
https://sm.asisonline.org/Pages/Most-Wanted---Computer-Bugs.aspx2015-08-04T04:00:00ZMost Wanted: Computer Bugs
https://sm.asisonline.org/Pages/SM-Online-May-2015.aspx2015-05-01T04:00:00ZSM Online May 2015
https://sm.asisonline.org/Pages/Service-Denied.aspx2014-10-01T04:00:00ZService Denied
https://sm.asisonline.org/Pages/A-Safer-Frontier.aspx2014-09-01T04:00:00ZA Safer Frontier
https://sm.asisonline.org/Pages/Watching-The-Port.aspx2014-09-01T04:00:00ZIndustry News September 2014
https://sm.asisonline.org/Pages/data-breaches-0013551.aspx2014-08-01T04:00:00ZVerizon's 2014 Data Breach Investigations Report
https://sm.asisonline.org/Pages/data-breach-victims-0013553.aspx2014-08-01T04:00:00ZData Breach Victims
https://sm.asisonline.org/Pages/access-control_E2_80_99s-future-now-0013512.aspx2014-07-01T04:00:00ZAccess Control’s Future Is Now
https://sm.asisonline.org/Pages/cyber-crime-security-and-digital-intelligence-0013546.aspx2014-07-01T04:00:00ZCyber Crime, Security and Digital Intelligence
https://sm.asisonline.org/Pages/cybersecurity-0013484.aspx2014-07-01T04:00:00ZCybersecurity: 2014 Security Threat Report
https://sm.asisonline.org/Pages/industrial-espionage-developing-a-counterespionage-program-0013542.aspx2014-07-01T04:00:00ZIndustrial Espionage: Developing a Counterespionage Program
https://sm.asisonline.org/Pages/windows-xp-goes-dark-0013508.aspx2014-07-01T04:00:00ZWindows XP Goes Dark
https://sm.asisonline.org/Pages/cyber-experts-talk-trends-0013428.aspx2014-06-01T04:00:00ZCyber Experts Talk Trends
https://sm.asisonline.org/Pages/global-cyber-risk-0013414.aspx2014-06-01T04:00:00ZGlobal Cyber Risk
https://sm.asisonline.org/Pages/new-digital-age-reshaping-future-people-nations-and-business-0013442.aspx2014-06-01T04:00:00ZThe New Digital Age: Reshaping the Future of People, Nations and Business
https://sm.asisonline.org/Pages/911-calls-scrutinized-0013323.aspx2014-05-01T04:00:00Z911 Calls Scrutinized

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/effective-physical-security-third-edition.aspxEffective Physical Security, Third Edition<div class="body"> <p> <font face="Arial">Effective Physical Security, Third Edition. <font size="2">By Lawrence J. Fennelly; published by Elsevier Butterworth-Heinemann; available from ASIS, Item #1568, 703/519-6200 (phone), <a> www.asisonline.org</a> (Web); 315 pages; $40 (ASIS members), $44 (nonmembers). </font></font>  </p> <p> <font size="2" face="Arial">Asset protection and management pose unique and ever-shifting challenges, but the foundation principles on which these fields are based remain the same. For those basic components of physical security controls, one need look no further than the third edition of this Lawrence Fennelly work. It's a compilation of informative essays written by security professionals expert in various topics.</font> </p> <p> <font size="2" face="Arial">Fennelly provides readers with a quick, easy-to-understand reference on security controls, design, and management techniques. Numerous checklists, definitions, and drawings capture the reader's attention and ensure that each control will be well understood and implemented correctly.</font> </p> <p> <font size="2" face="Arial">New to the third addition are chapters on risk assessment and management, security lighting, entry control, contraband detection, bomb-incident management, and homeland security. These join stalwarts from earlier editions, including worthy chapters focused on locks, alarms, CCTV, and crime prevention through environmental design. The chapters vary in detail, but any security professional would benefit from the collection of knowledge and useful information assembled in this book, especially those seeking the newly launched ASIS Physical Security Professional designation.</font> </p> <hr size="2" width="100%" /> <p> <font size="2" face="Arial"> <em>Reviewer: Cathal Walsh is a security analyst for the global security department of Prudential Financial, Newark, New Jersey. He is a member of ASIS International.</em> </font> </p> </div>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Book-Review---Info-Risk.aspxBook Review: Info Risk<p>​Butterworth-Heinemann; Elsevier.com; 408 pages; $49.95.</p><p>Factor analysis of information risk (FAIR) is a methodology for understanding and analyzing information risk.<em> Measuring and Managing Information Risk: A FAIR Approach</em> provides extraordinary detail, explaining both the essentials and fine details of the FAIR process.</p><p>This book is informative and insightful—and surprisingly engaging. Using examples, anecdotes, and metaphors, the writers keep this educational work from becoming difficult.</p><p>Comprehensively explaining FAIR ontology in all its layers and complexities, the book includes thorough definitions of the terminology, many examples for applying the concepts, and detailed explanations of each step of the process from preparation through presentation and implementation. It examines challenges and common mistakes and suggests multiple solutions to suit different cultures, leadership, and scope of work. Diagrams and tables provide specific examples and a thorough index allows for quick reference to key words and concepts.</p><p>This is advanced material presented in a style that’s often humorous while still focused. The authors’ expertise is obvious in their detailed explanations of fact and theory, and in their relaxed approach to this complex subject matter. Professionals new to thorough information risk analysis or using more simplified approaches will find this book extremely useful.</p><p><em><strong>Reviewer: Lex Holloway, CPP</strong>, is director of security for Caris Life Sciences. He is a member of ASIS and serves on the ASIS Healthcare Security Council.</em></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465