Natural Resources and Mining

 

 

https://sm.asisonline.org/Pages/Resilience-Trends.aspxResilience TrendsGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652016-09-01T04:00:00Zhttps://adminsm.asisonline.org/pages/mark-tarallo.aspx, Mark Tarallo<p>​<span style="line-height:1.5em;">“Thousands have lived without love, not one without water,” poet W.H. Auden famously said. In many countries, enjoying a safe and secure water supply is something most take for granted. The United States, for example, has had an “unrivalled tradition” of low-cost, universal access to drinking water, says Robert Glennon, a water policy expert at the University of Arizona and author of Unquenchable: America’s Water Crisis and What to Do About It. In actuality, a safe and secure water supply is never a given, and there are signs that the recent water crisis in Flint, Michigan (covered in Security Management’s May issue), may be a canary in the coal mine for the future of America’s water. The U.S. water and wastewater system is in urgent need of repair and replacement; some of the piping dates back to the Civil War era, experts say. But federal and state funding appropriations have been insufficient for keeping water supply infrastructure in good repair.</span></p><p>“For years, there’s been a general inadequacy in funding,” Glennon says.  As recent proof, Glennon cites the American Recovery and Reinvestment Act of 2009, commonly known as President Barack Obama’s $787 billion stimulus package. “A small fraction of that, less than 1 percent, was devoted to water and wastewater,” he explains.</p><p>The American Water Works Association has estimated that repairing the million-plus miles of water mains across the country, and expanding that infrastructure so that it can adequately serve the country’s growing population, could cost up to $1 trillion over the next 25 years. The U.S. Environmental Protection Agency (EPA) has a lower estimate: roughly $330 billion over 20 years.</p><p>Both of these estimates dwarf the existing $1.38 billion that state and local governments are spending annually on drinking water and wastewater infrastructure, according to statistics from the American Society of Civil Engineers (ASCE). (Using a comparable 20-year time frame, the ASCE estimate comes to roughly $28 billion, or only about 8 percent of the EPA’s estimate of needed funding.) </p><p> Besides inadequate funding for repair, demand is growing, not only from an increasing population but from high-tech industries. Large corporations with cloud computing operations occupy enormous industrial facilities that are air conditioned. “This requires a heck of a lot of water,” Glennon says. </p><p>In addition, environmental factors pose challenges to a secure U.S. water supply. In states like Florida, rising sea levels are pushing into coastal aquifers and causing saltwater intrusion, making the aquifers more saline and problematic for human consumption. </p><p>Worldwide, a possible future water crisis is a problem alarming many, in part because of its potentially disastrous cascading effects on the global economy. A survey released by the 2016 Global Economic Forum found that a water crisis is the top concern for business leaders over the next 10 years. Further in the future, the global water situation continues to look grim, by several measures. By 2030, a stable supply of good quality fresh water can no longer be guaranteed in many regions, and a 40 percent global shortfall in supply is expected, according to the Carbon Disclosure Program’s (CDP) Water Program.</p><p>By 2050, an inadequate supply of water could reduce economic growth in some countries by as much as 6 percent of GDP, “sending them into sustained negative growth,” says a recent World Bank report, High and Dry: Climate Change, Water, and the Economy. Regions facing this risk include India, China, the Middle East, and much of Africa. Water insecurity could also ramp up the risk of conflict and instability—droughts can spur a spike in food prices, which can in turn cause civil unrest and increase migration. While 2050 might seem quite far in the future, water-related challenges are happening right now. The World Bank report also found that 1.6 billion people currently live in nations that are subject to water scarcity, and that number could double over the next two decades.</p><p>Moreover, a water crisis can have a devastating effect on the global economy. The CDP’s Water Program estimates that, if current status quo water management policies are sustained worldwide, $63 trillion in assets will be put at risk. Such economic challenges are highlighting the importance of improved water governance, which includes an emphasis on positioning the water supply so that it is more resilient in the face of challenges due to demand, the environment, and other factors, says Hart Brown, who leads the organizational resilience practice at HUB International and is a member of the ASIS International Crisis Management and Business Continuity Council.</p><p>“In light of the case in Flint, as well as droughts, floods, and the potential competition for water resources, improved water governance is being brought to the forefront of many conversations,” Brown says. When resilience enters the conversation, the challenge becomes creating an “adaptive capacity,” or “diversification of the water and sanitation systems.” </p><p>However, there is no one resilience model that can be successfully replicated for all water supply and treatment plants, because each system is a unique combination of human, technological, and environmental factors, Brown explains. In the United States, a wide range of water systems could potentially benefit from resiliency upgrades, he says. Those include conventional utility piped water supply systems; dug wells and tube wells (wells in which a long pipe is bored into an underground aquifer); rainwater harvesting operations; unprotected water sources such as rivers and streams; and cooperative developments in areas that share transboundary water resources.</p><p> Improving the resiliency of any water system takes investment, but just as important, it takes sound science, Brown says. </p><p>“Water managers need access to the best available scientific information and water risk assessments to support these long-term water-related decisions, including the ability to forecast and plan for important capital expenditures,” he explains.  Businesses also have a role to play, especially those that rely on water for production, manufacturing, agriculture, and power generation purposes, he adds. Some businesses are already being strategic in this area; they consider shared responsibility and sustainability of water systems a core function. </p><p>“Partnerships with local communities are important in the ability to overcome shared water risks,” Brown says. </p><p>Globally, improved resiliency and water management practices, if given sufficient investment, have the potential to pay tremendous dividends, the World Bank report argues. It calls for a three-point approach: improving resiliency to extreme weather events by improving storage capacities, reusing facilities, and other tools; optimizing the use of water through better planning and incentives; and expansion of the water supply, where appropriate, through recycling, desalination, and damns.</p><p>“While adopting policy reforms and investments will be demanding, the costs of inaction are far higher. The future will be thirsty and uncertain,” the report says.</p>

Natural Resources and Mining

 

 

https://sm.asisonline.org/Pages/Resilience-Trends.aspx2016-09-01T04:00:00ZResilience Trends
https://sm.asisonline.org/Pages/Required-License-to-Operate.aspx2015-02-01T05:00:00ZRequired: License to Operate
https://sm.asisonline.org/Pages/chemical-facilities-tackle-explosive-problem-0013191.aspx2014-03-01T05:00:00ZChemical Facilities Tackle an Explosive Problem
https://sm.asisonline.org/migration/Pages/opposites-agree-data-minings-importance-and-need-controls-007956.aspx2010-12-09T05:00:00ZOpposites Agree on Data Mining's Importance and the Need for Controls
https://sm.asisonline.org/Pages/The-Golden-Rule.aspx2010-05-01T04:00:00ZThe Golden Rule
https://sm.asisonline.org/Pages/lawmakers-hold-hearing-whistleblower-bill-006893.aspx2010-03-26T04:00:00ZLawmakers Hold Hearing on Whistleblower Bill
https://sm.asisonline.org/Pages/legislation-would-provide-security-fix-006849.aspx2010-03-04T05:00:00ZLegislation Would Provide Security Fix
https://sm.asisonline.org/Pages/Race-for-Iraq-Oil-Stalled-by-Security-Fears.aspx2009-10-01T04:00:00ZRace for Iraq Oil Stalled by Security Fears
https://sm.asisonline.org/migration/Pages/staying-secure-while-saving-worlds-wildlife-005258.aspx2009-03-01T05:00:00ZStaying Secure While Saving the World's Wildlife
https://sm.asisonline.org/Pages/On-the-Waterfront.aspx2008-09-01T04:00:00ZOn the Waterfront
https://sm.asisonline.org/migration/Pages/weathering-severe-climate-and-conflict.aspx2008-02-01T05:00:00ZWeathering Severe Climate and Conflict
https://sm.asisonline.org/migration/Pages/russias-oil-bust.aspx2007-11-01T04:00:00ZRussia's Oil Bust
https://sm.asisonline.org/Pages/beginning-stability-congo.aspx2007-07-01T04:00:00ZIs This the Beginning of Stability in the Congo?
https://sm.asisonline.org/Pages/pipelines.aspx2006-01-01T05:00:00ZAttacks on Colombian Pipelines

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Resilience-Trends.aspxResilience Trends<p>​<span style="line-height:1.5em;">“Thousands have lived without love, not one without water,” poet W.H. Auden famously said. In many countries, enjoying a safe and secure water supply is something most take for granted. The United States, for example, has had an “unrivalled tradition” of low-cost, universal access to drinking water, says Robert Glennon, a water policy expert at the University of Arizona and author of Unquenchable: America’s Water Crisis and What to Do About It. In actuality, a safe and secure water supply is never a given, and there are signs that the recent water crisis in Flint, Michigan (covered in Security Management’s May issue), may be a canary in the coal mine for the future of America’s water. The U.S. water and wastewater system is in urgent need of repair and replacement; some of the piping dates back to the Civil War era, experts say. But federal and state funding appropriations have been insufficient for keeping water supply infrastructure in good repair.</span></p><p>“For years, there’s been a general inadequacy in funding,” Glennon says.  As recent proof, Glennon cites the American Recovery and Reinvestment Act of 2009, commonly known as President Barack Obama’s $787 billion stimulus package. “A small fraction of that, less than 1 percent, was devoted to water and wastewater,” he explains.</p><p>The American Water Works Association has estimated that repairing the million-plus miles of water mains across the country, and expanding that infrastructure so that it can adequately serve the country’s growing population, could cost up to $1 trillion over the next 25 years. The U.S. Environmental Protection Agency (EPA) has a lower estimate: roughly $330 billion over 20 years.</p><p>Both of these estimates dwarf the existing $1.38 billion that state and local governments are spending annually on drinking water and wastewater infrastructure, according to statistics from the American Society of Civil Engineers (ASCE). (Using a comparable 20-year time frame, the ASCE estimate comes to roughly $28 billion, or only about 8 percent of the EPA’s estimate of needed funding.) </p><p> Besides inadequate funding for repair, demand is growing, not only from an increasing population but from high-tech industries. Large corporations with cloud computing operations occupy enormous industrial facilities that are air conditioned. “This requires a heck of a lot of water,” Glennon says. </p><p>In addition, environmental factors pose challenges to a secure U.S. water supply. In states like Florida, rising sea levels are pushing into coastal aquifers and causing saltwater intrusion, making the aquifers more saline and problematic for human consumption. </p><p>Worldwide, a possible future water crisis is a problem alarming many, in part because of its potentially disastrous cascading effects on the global economy. A survey released by the 2016 Global Economic Forum found that a water crisis is the top concern for business leaders over the next 10 years. Further in the future, the global water situation continues to look grim, by several measures. By 2030, a stable supply of good quality fresh water can no longer be guaranteed in many regions, and a 40 percent global shortfall in supply is expected, according to the Carbon Disclosure Program’s (CDP) Water Program.</p><p>By 2050, an inadequate supply of water could reduce economic growth in some countries by as much as 6 percent of GDP, “sending them into sustained negative growth,” says a recent World Bank report, High and Dry: Climate Change, Water, and the Economy. Regions facing this risk include India, China, the Middle East, and much of Africa. Water insecurity could also ramp up the risk of conflict and instability—droughts can spur a spike in food prices, which can in turn cause civil unrest and increase migration. While 2050 might seem quite far in the future, water-related challenges are happening right now. The World Bank report also found that 1.6 billion people currently live in nations that are subject to water scarcity, and that number could double over the next two decades.</p><p>Moreover, a water crisis can have a devastating effect on the global economy. The CDP’s Water Program estimates that, if current status quo water management policies are sustained worldwide, $63 trillion in assets will be put at risk. Such economic challenges are highlighting the importance of improved water governance, which includes an emphasis on positioning the water supply so that it is more resilient in the face of challenges due to demand, the environment, and other factors, says Hart Brown, who leads the organizational resilience practice at HUB International and is a member of the ASIS International Crisis Management and Business Continuity Council.</p><p>“In light of the case in Flint, as well as droughts, floods, and the potential competition for water resources, improved water governance is being brought to the forefront of many conversations,” Brown says. When resilience enters the conversation, the challenge becomes creating an “adaptive capacity,” or “diversification of the water and sanitation systems.” </p><p>However, there is no one resilience model that can be successfully replicated for all water supply and treatment plants, because each system is a unique combination of human, technological, and environmental factors, Brown explains. In the United States, a wide range of water systems could potentially benefit from resiliency upgrades, he says. Those include conventional utility piped water supply systems; dug wells and tube wells (wells in which a long pipe is bored into an underground aquifer); rainwater harvesting operations; unprotected water sources such as rivers and streams; and cooperative developments in areas that share transboundary water resources.</p><p> Improving the resiliency of any water system takes investment, but just as important, it takes sound science, Brown says. </p><p>“Water managers need access to the best available scientific information and water risk assessments to support these long-term water-related decisions, including the ability to forecast and plan for important capital expenditures,” he explains.  Businesses also have a role to play, especially those that rely on water for production, manufacturing, agriculture, and power generation purposes, he adds. Some businesses are already being strategic in this area; they consider shared responsibility and sustainability of water systems a core function. </p><p>“Partnerships with local communities are important in the ability to overcome shared water risks,” Brown says. </p><p>Globally, improved resiliency and water management practices, if given sufficient investment, have the potential to pay tremendous dividends, the World Bank report argues. It calls for a three-point approach: improving resiliency to extreme weather events by improving storage capacities, reusing facilities, and other tools; optimizing the use of water through better planning and incentives; and expansion of the water supply, where appropriate, through recycling, desalination, and damns.</p><p>“While adopting policy reforms and investments will be demanding, the costs of inaction are far higher. The future will be thirsty and uncertain,” the report says.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Liability-and-Insurance-Implications-of-Body-Cameras.aspxLiability and Insurance Implications of Body Cameras<p>​<span style="line-height:1.5em;">In the wake of recent law enforcement controversies, body cameras are becoming widely adopted among police forces. Their use is beginning to trickle down to security officers, albeit slowly. But with this tool’s increasing popularity, security managers should be aware of the potential liabilities and insurance implications of such devices.</span></p><p>Whenever there is a camera in use in a public setting, the first question the public raises is that of privacy. Indeed, concerns about privacy can turn into an insurance issue if a person recorded by a body camera attempts to file an invasion of privacy suit against the guard’s security firm or the business contracting the guard. This adds a new exposure for security firms.</p><p>Body cameras cannot account for poorly trained or otherwise unskilled guards. In these cases, body cameras will increase liability, making it easier for negligent or erroneous acts to be discovered.</p><h4>Limiting Liability</h4><p>Before using body cameras, it is imperative that security managers consult legal counsel and local law enforcement. Use their guidance to determine the legality of body cameras worn by security guards and appropriate protocols and procedures for filming, video storage, and usage. Certain states have laws prohibiting such footage outright. </p><p>Security managers should then set up policies and procedures modeled after law enforcement protocols. Determine when and where guards will be recording. Are they going to keep the camera running their entire shift, or are they going to hit record when there is a security stop or transaction? Also, security managers should determine how long and where the company will store recordings and how the firm will use them. The longer the footage is kept the better, but storage space and the cost of that storage may factor into this decision.</p><p>To address privacy concerns, guards using the cameras must let members of the public know they are being recorded. All stakeholders must be informed of this decision so that they may take appropriate action. For example, a homeowner’s association should send letters out to their members informing them that security guards will be wearing cameras. The association should also change its bylaws to note that residents cannot sue the homeowner’s association or the security force for invasion of privacy.</p><p>When a client requires a contract guard service to use cameras, the contract company should request a hold harmless clause—to insulate the guard company from claims brought due to the use of these cameras. An attorney or legal counsel should assist in drafting this language and they should also consider Third Party Indemnification and Limitation of Liability clauses to further limit liability.</p><h4>Leveraging Cameras </h4><p>From an insurance perspective, body cameras will likely be a net positive for security professionals. Here are a few key reasons why: </p><p>• Guards are less likely to behave badly when their interactions are being recorded.</p><p>• Assuming a guard is well trained and acts appropriately, video footage will help insurers assess claims quickly and accurately, possibly reducing the number of frivolous excessive force claims.</p><p>• On-the-job footage can assist firms in training new guards. Ongoing training is a crucial component of reducing the severity and frequency of insurance claims. With footage captured from body cameras, security firms can demonstrate to guards both good and bad habits and transactions. This also helps identify patterns that can lead to claims before an unfortunate incident occurs.</p><p>As with most advances in security technology, body cameras should be evaluated judiciously before they are implemented. But this technology ultimately has the potential to actually ease some insurance concerns for security firms. </p><p><em><strong>Tory Brownyard</strong> is president of Brownyard Group (www.brownyard.com), a program administrator that pioneered liability insurance for security guard firms more than 60 years ago. He can be reached at tbrownyard@brownyard.com or 800-645-5820.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/ASIS-2016-Product-Showcase.aspxASIS 2016 Product Showcase<div style="background-color:#ffffff;">​<em>Fall 2016 Product Showcase.​</em><h4><em></em>​Detex<img src="/ASIS%20SM%20Article%20Images/0916%20Detex%20Weatherized%20RH%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" /></h4><p> <span style="line-height:15px;"><strong>Booth </strong></span> <span style="line-height:15px;">​</span><span style="line-height:15px;"><strong>#2929</strong><br></span><span style="line-height:15px;">Detex Corporation of New Braunfels, Texas, off​ers weatherized panic hardware that is ideal for outdoor areas or fenced and gated areas that need to be protected from unauthorized entry while still providing emergency exit in panic conditions. The Outdoor Area System offers Advantex quality, so it is dura- ble in outside environments and has a safe, smooth surface that </span><span style="line-height:15px;">comes in a variety of complementary finishes. The optional EasyKit includes components to meet the needs of complex applications. Systems could include weatherized panic devices, access control devices, weatherized door prop alarms, and more. They can be ​</span><span style="line-height:15px;">ba</span><span style="line-height:15px;">ttery powered or hardwired.</span></p><p> <br> </p><hr /><div> ​ <div style="background-color:#ffffff;">​ <div><h4>​Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20ArchiTech%20iLock%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:184px;" /> </h4> <strong>Booth #3500</strong></div><p>ArchiTech Series Networx Locks from Marks USA, a division of Napco Security Technologies of Amityville, New York, create an advanced wireless access control solution with an attractive, infinitely customizable, designer locking form factor, in a choice of trims and finishes. ArchiTech and its iLock App are wirelessly linked together using universally compatible Bluetooth LE technology. The system stores encrypted data to provide secure access without a key, so users can use any smart device to unlock ArchiTech from a customizable range of up to 30 feet away.​</p><div>​</div><div> <br> </div><div> <br> </div><div> <br> </div><div> <br> </div><div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Talkaphone%20VOIP-200%20System%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />​Talkaphone </h4><div> <strong>Booth #1951</strong></div><p>Talkaphone of Niles, Illinois, announced that its VOIP-200 Series Call Station interconnects with the AVM-1 IP video attendant phone from Grandstream to provide a fully integrated access control system. With the ability to connect to up to 30 VOIP-200 call stations, the AVM-1 can monitor and regulate entry points through the call stations using video and voice communications. The AVM-1 unit will receive basic preprogramming to integrate effortlessly with Talkaphone VOIP-200 Series. The call station and <span style="line-height:1.5em;">phone deliver a comprehensive access control solution that can be integrated with existing systems, including Avaya Aura and Cisco Unified Communication Manager.</span></p><div> <br> </div></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;">​<hr />​<br></div></div><div><div><h4>G4S Secure Solutions<img src="/ASIS%20SM%20Article%20Images/0916%20G4s%20showcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:195px;" /> </h4> <strong>Booth #3151</strong></div><div>G4S Secure Solutions of Jupiter, Florida, secures people, property, and assets by understanding and mitigating security risk. The company integrates the full power of its resources and expertise to drive optimal and cost-efficient results. It provides customized security solutions that can include risk consulting and investigations, systems integration, security software and technology, and security officers to help address any challenge that may arise. AMAG Technology, a G4S company, manufactures and deploys the Symmetry access control and video management product line. Altogether, the security personnel, management, and technology offer award-winning security services.</div><div> <br>​</div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Hanwha%20Samsung%20%200916%20Hanwha%20Samsung%20Q-series-bullet%20(2).jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:203px;" />​Hanwha Techwin</h4> <strong>Booth #2641</strong> <p>WiseNet Q Series cameras from Hanwha Techwin America of Ridgefield Park, New Jersey, feature highly efficient H.265 compres- sion technology; users benefit from up to 75 percent reduction in bandwidth and storage requirements compared to the H.264 stan<span style="line-height:1.5em;">dard. The 24 models in the Q Series also include the company’s WiseStream codec, which balances image quality and compression based on motion within a scene. Available in 2MP and 4MP full HD versions, the cameras include true wide dynamic range, hallway view, and lens distortion correction. Infrared illumination is a standard feature to ensure that cameras deliver high-quality images in nearly every situation.</span></p><div> <br> </div> <br> </div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Quantum Secure (part of HID) <img src="/ASIS%20SM%20Article%20Images/0916%20Quantum%20Secure%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:220px;" /></h4><div> <strong>Booth #3901</strong></div><p>SAFE Predictive Security from Quantum Secure of San Jose, California, uses advanced contextual anal- ysis to identify possible threats before they become incidents, enabling preventive measures to avert costly losses and other negative outcomes. SAFE collects and integrates data from multiple security devices and sys- tems to develop behavioral patterns for both staff and visitors, then works in real time to detect indicators of <span style="line-height:1.5em;">compromise that might suggest security risks. Interactive user dashboards and/or alarms alert security staff to developing situations so they can be evaluated and addressed appro- priately. Dashboards provide multiple views at the strategic, tactical, and operational levels, providing a comprehensive understanding of current security conditions.</span></p> <br> </div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Garrett%20PDI_portable%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:104px;" />Garrett Metal Detectors</h4></div></div><div><p> <strong>Booth #2359<br></strong><span style="line-height:1.5em;">The Walkthrough Caster Set from Garrett Metal Detectors of Garland, Texas, is ideal for stadiums, special events, and school use. The casters, which can be permanently attached, allow full mobility of a Garrett PD 6500i walkthrough metal detector by one person. Detectors can be moved to a secure location when they are not in use and pro- vide an unimpeded exit at the close of an event. The caster assembly is constructed of durable, powder-coated steel for use in all types of environmental conditions.</span></p><div> <br>​</div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr />​<br></div></div><div><div><h4>Genetec<img src="/ASIS%20SM%20Article%20Images/0916%20Genetec%20Capture1%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2327</strong></div><p>Genetec of Montreal, Quebec, Canada, introduced the Mission Control Decision Support System, which delivers situational intelligence, visualization, and incident management. Designed to work seamlessly with the company’s Security Center unified IP security platform, Mission Control aims to simplify the operator’s tasks and decision<span style="line-height:1.5em;">making process. Suited for larger, multisite deployments, it intelligently qualifies incoming data from thousands of sensors and security devices. Automated workflows and standard operating procedures guide operator response to ensure effective management of any situation. The system also delivers post-incident capabilities, including reporting and system auditing, to ensure compliance.</span></p><div> <br>​</div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Open%20Options%20DNA%20Fusion%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:215px;" />​Open Options </h4><div> <strong>Booth #2661</strong></div><p>DNA Fusion from Open Options of Addison, Texas, is open platform access control software that is built using the latest in software development technology and contains numerous customer-centric features. <span style="line-height:1.5em;">Users can easily access system data with InfoReady design, assign global access levels, drag and drop data, create custom direct com</span><span style="line-height:1.5em;">mands to control several doors with the push </span> <span style="line-height:1.5em;">of a button, and much more. DNA Fusion offers Fusion Web and Fusion Mobile applications for remote access. The system </span><span style="line-height:1.5em;">seamlessly integrat</span><span style="line-height:1.5em;">es with leading security technologies in the industry, including IP video recording, intercom, and locks and readers. DNA Fusion also interfaces with the Authentic Mercury, AXIS, and ISONAS open hardware platforms.</span></p><div> <br> </div></div></div><div> <br> <div><div style="background-color:#ffffff;"><hr /><h4>​TrackTik<img src="/ASIS%20SM%20Article%20Images/0916%20Tracktik%20ASIS_Product%20Showcase_ASIS%20Newspaper.December%20Issue_22.07.16%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4><p> <strong>Booth #2950</strong><br><span style="line-height:1.5em;">TrackTik of Montreal, Quebec, Canada, launched the Back Office </span><span style="line-height:1.5em;">& Management Suite to make administration more efficient. </span><span style="line-height:1.5em;">This new addition to TrackTik’s integrated security workforce man- agement platform offers a complete line of scheduling, time and attendance, and invoicing/contracting products, as well as robust business intelligence solutions. The suite enables security service com- panies to reduce the number of systems, streamline administration, efficiently schedule, and accurately reduce time from operations to </span><span style="line-height:1.5em;">service invoicing. TrackTik’s intuitive software is a multi-featured platform connecting field personnel to management and clients via a suite of guard management tools, powerful busi- ness intelligence modules, and automated financial management solutions.</span></p></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20STI%20%20Product%20Showcase%207730%206519%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:170px;" />​Safety Technology International, Inc. </h4> <strong>Booth #2533</strong> <p>STI tough polycarbonate covers from Safety Technology International, Inc., of Waterford, Michigan, help prevent theft and vandalism to larger keypads, access controls, volume and lighting controls, and other similar devices. Molded of clear polycarbonate, which is very difficult to break, each protected unit can be clearly seen and quickly identified. Covers increase the life and reliability of units by protecting them from accidental or inten- tional damage. Covers are backed by a three-year guarantee against breakage in normal use.</p></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Brownyard Group<img src="/ASIS%20SM%20Article%20Images/0916%200915%20Showcase%20Brownyard_700x300%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2925</strong> <p>The Brownyard Group of Bay Shore, New York, provides insurance coverage and risk management solutions for the security guard, private investigative, and alarm industries. With more than 60 years of experience covering security concerns, Brownyard offers broad coverage through an admitted insurer. The company handles claims in an expeditious and knowledgeable manner via its in-house claims facility. Brownyard works exclusively through an insurance agent or broker chosen by the client.</p>​</div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​<img src="/ASIS%20SM%20Article%20Images/0916%20Medeco%20XT_DA_Screen_Capture%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />Assa Abloy </h4><div> <strong>Booth #3601</strong></div><p>Medeco Security Locks of Salem, Virginia, an ASSA ABLOY Group brand, simplifies audit trail analysis with Medeco XT Data Analytics built into Medeco’s XT Web Manager software program. The software feature leverages the data collected from Medeco XT intelligent keys and cylinders, eliminating the need to search through hundreds or thousands of audit re- cords to spot trends or to see something out of the ordinary. The graphic dashboard lets users see in three clicks who might be trying to gain access to areas where they do not belong. All data analytics software enhancements are driven by customer feedback.</p><div> <br> </div></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​Boon Edam<img src="/ASIS%20SM%20Article%20Images/0415%20Boon%20Edam%20ISC%20West%20Showcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /></h4><div> <strong>Booth #1401</strong></div><p>The Lifeline optical turnstile series from Boon Edam of Lillington, North Carolina, offers sophistication and innovation. The Lifeline has intuitive features, including unique sensors that detect a visitor’s approach, an energy-saving sleep function, pulsing light strips that guide users, and proven symbols to make it user friendly. The ergonomic design and an ar- ray of customization possibilities, like various glass and finish choices, provide comfort and style for the user. The series contains three models: the Slide, Swing, and Open models.</p><div> <br> </div></div></div><div> <br> <div><div style="background-color:#ffffff;"><hr /><div> <br> </div><h4> <img src="/ASIS%20SM%20Article%20Images/916%20AXIS%20A8105%20pic%20copy.jpg" class="ms-rtePosition-1" alt="" style="line-height:19.5px;margin:5px;width:202px;background-color:#ffffff;" />​​​Axis Communications </h4><div> <strong>Booth #3101</strong></div><p>Axis Communications of Chelmsford, Massachusetts, launched the AXIS A8105-E Net- work Video Door Station, which allows operators to monitor entrances, communicate directly with visitors, and open doors remotely via a mobile app, IP phone, or video management system. The door station is ideal for installations within the retail, education, and healthcare segments, and its small size allows it to be installed where space is limited. It helps users secure the premises and simplify visitor management.</p><div> <br> </div></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​​ASSA ABLOY<img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20Yale%20Yale-Multi-Family-Solution%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:168px;" /></h4><div> <strong>Booth #3601</strong></div><p>Yale Locks & Hardware of Berlin, Connecticut, an ASSA ABLOY Group brand, introduced nexTouch, the next generation of keypad access control. Featuring an advanced, voice-guided system to simplify programming and maintenance, nexTouch is available with an easy-to-use capacitive touchscreen, as well as a pushbutton keypad option for more tactile environments. A truly scalable solution, nexTouch can be used as a standalone keypad lock that uses a PIN code to manage access; can easily be upgraded to use Data-on- Card technology as part of the Yale <span style="line-height:1.5em;">Multi-Family Solution; or can be upgraded for easy expansion of ZigBee or Z-Wave capable alarm systems in small business environments.</span></p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Commport%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:204px;" />​Comm Port Technologies </h4> <strong>Booth #1261</strong> <div>Comm Port Technologies of Cranbury, New Jersey, offers the CPAS series of under-vehicle surveillance systems for inspec tion and analysis of a vehicle’s undercarriage. With unmatched flexibility and performance features, the system provides real-time and delay-free full-color scanning with capture speeds of up to 75 kilometers per hour and frame scans up to 900 frames per second. The flush-mount, in-ground system supports built-in license plate recognition and driver image capture. The heavy-duty system comes complete with all hardware necessary for installation and can be fully operational within 48 hours. Each system includes specialized software for computer vision scanning. Multiple lanes can be monitored from a centralized database.</div><div> <br> </div></div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20SLE-CDMA-Fire%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:90px;" /> </h4> <strong>Booth #3500</strong> <p>StarLink Fire Universal Cellular and IP Fire Alarm Communicators from Napco Security Technologies of Amityville, New York, provide low-cost upgrade, easy installation, and simple activation. They affordably replace up to two standard phone landlines traditionally required per fire panel. StarLink radios offer state-of-the-art CDMA nationwide coverage and code-compliant, full-event alarm reporting from any brand panel or FACP to any central station. The StarLink Fire Communicator, used as a primary or backup communicator, is a field-proven solution—among the most economical and full-featured in its class.</p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Panasonic_AERO_PTZ_Security_Manage_Showcase%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:216px;" />​​Panasonic Systems Communication Company</h4><p> <strong>Booth #3530<br></strong><span style="line-height:1.5em;">The Aero PTZ Camera from Panasonic Systems Communication Company of Newark, New Jersey, is an environmentally </span><span style="line-height:1.5em;">rugged camera built to deliver high-quality Full HD surveillance images in extreme environmental conditions. From hurricane-force winds to water and dust, from icy blasts to Sahara heat, the Aero PTZ delivers sharp video with 360-degree panning and 30x zoom capability, allowing it to see in virtually </span><span style="line-height:1.5em;">any direction, even in complete darkness. It features a lightweight, corrosion-resistant glass fiber body, electronic image stabilization, a built-in wiper and defroster, and an optional infrared LED.</span></p><div> <br> </div></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​​Red Hawk<img src="/ASIS%20SM%20Article%20Images/0915%20Red%20Hawk%20Showcase%20new%20new%20logo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:195px;" /></h4><p>Red Hawk Fire and Security of Boca Raton, Florida, offers advanced systems integration and cutting-edge applications. All electronic security systems and legacy systems can be integrated with Red Hawk’s fire, life safety, and physical security solutions. Experts analyze a customer’s specific requirements, including regulatory compliance, and then develop the best solution for each business. Dedicated local service means that an account manager can take care of everything a customer needs. More than 50,000 companies and institutions across the country rely on the resources, knowledge, and reach of the Red Hawk team.</p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Prosegur%202016_España_Vigilancia%20y%20Tecnologia01%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:112px;" />​​Prosegur </h4> <strong>Booth #2259</strong> <p>Prosegur of Madrid, Spain, is a global company with more than 160,000 employees working from more than 400 offices in Europe, Latin America, Africa, Asia, and Oceania and provid- ing services for more than 24,0000 companies and institutions, 180,000 small and medium enterprises, <span style="line-height:1.5em;">and 200,000 households. It offers integrated and specialized security services combined with the most advanced technologies and the best </span><span style="line-height:1.5em;">professionals to provide maximum efficiency for the business management of companies. Integrated security solutions include: manned guarding, cash in transit, cash management, electronic security systems, cybersecurity, executive protection, fire protection systems, and residential security.</span></p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​​Securitas Electronic Security<img src="/ASIS%20SM%20Article%20Images/0916%20SecuritasESlogo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2901</strong> <p>Securitas Electronic Security (formerly Diebold Security) of Cleveland, Ohio, offers a customizable online dashboard to manage an entire security platform. SecureStat is an online customer management tool that delivers a unified view, control, and measurement of the security system, including disparate intrusion, access, video, and fire systems. Aligning with leading security and technology partners to provide the most advanced solutions on the market, SecureStat brings together locations, security systems, and devices for a comprehensive view of the entire security operation. Users can update information, request service, and generate reports while improving efficiency, en- hancing security, and reducing operational costs.​</p></div></div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Iview%20Product%20Showcase%20ipass-product-image-300dpi%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:171px;" />​​iView Systems<br></h4> <strong>Booth #1821</strong> <p>Users can professionally register, badge, track, and report all visitor activity with the iPass Visitor Management System from iView Systems of Oakville, Ontario, Canada. The system streamlines the check-in and check-out processes for visitors, contractors, <span style="line-height:1.5em;">and employees. It scales from a single workstation to hundreds—local or worldwide—sharing a central da- tabase. The iPass application uses ID scanning, elec</span><span style="line-height:1.5em;">tronic signatures (including DocuSign integration), visitor preregistration, notifications, and custom badging. The system integrates with the iTrak Incident Reporting Platform, provid- ing access to existing personnel, banned/watched subjects, and location synergies, reducing the need for duplicate visitor information or multiple redundant information entry.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><div><div><hr /><div><h4>Commend Inc.<img src="/ASIS%20SM%20Article%20Images/0916%20Commend%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2867</strong></div><p>Commend, Inc., of Mahwah, New Jersey, introduced two new amplifiers that seamlessly integrate public address loudspeaker lines into their intercom systems. They are available in 125-watt and 250-watt models that can connect to the intercom server via IP <span style="line-height:1.5em;">networks or two-wire copper cabling. Both versions provide a high output range with var- ious loudspeaker outputs. State of the art class D amplifiers of this series are universally suitable for any size application. Compact and lightweight, they feature a rugged polycarbonate housing with flexible mounting options. Loudspeaker line-monitoring based on impedance measurement detects short-circuits or disconnection.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20IN220%20PoE%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:156px;" />Assa Abloy </h4> <strong>Booth #3601</strong></div><p>Available from ASSA ABLOY Group brands Corbin Russ- win and SARGENT of New Haven, Connecticut, the IN220 Power-over-Ethernet (PoE) lock combines aesthetics with the energy efficiency and streamlined architecture of PoE access control for a cost-effective, sustainable solution that leverages existing network infrastructure for enhanced security and easier installations. Featuring <span style="line-height:1.5em;">HID multiCLASS SE technology, the IN220 supports a wide range of credential types and HID Mobile Access powered by Seos for use with mobile devices with Bluetooth Smart and/or NFC technology. Built with integrated ANSI/BHMA Grade 1 hardware, the IN220 is available in cylindrical lock, mortise lock, and exit device configurations.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4>Verint ​<img src="/ASIS%20SM%20Article%20Images/0916%20Vering%20tracking%20interface%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /></h4> <strong>Booth #2119</strong></div><p>The Verint Video Tracker from Verint of Melville, New York, is designed to help users identify the most relevant data to elevate the effectiveness of their organizational monitoring, reporting, and response. The solution leverages advanced analytics to automate the tracking of an individual through a large num<span style="line-height:1.5em;">ber of camera views within a location. It can be used in real time or forensically to identify, evaluate, and respond to a variety of security breaches. The solution streamlines proactive video monitoring and allows users to realize increased efficiencies by making it easier and faster to monitor, identify, and take action on suspicious activities.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20SDC%20IP%20Pro%20PLUS_group_with_logo%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:187px;" />Security Door Controls </h4> <strong>Booth #3167</strong></div><p>Security Door Controls of Camarillo, California, is introducing IP Pro IP-based single door access con- trollers with PLUS PC Client Software. They allow expansion from one standalone door to a 100-door grid. Doors can be configured and managed from a single interface. Each controller comes with secure, built-in software to manage up to 32 doors from any standard Web browser. Controllers offer real-time monitoring, user management, and an audit trail <span style="line-height:1.5em;">of up to 5,000 events. Powered by Ethernet cables, they connect to existing network infra- structure and are compatible with standard Weigand readers.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4>All Traffic Solutions<img src="/ASIS%20SM%20Article%20Images/0916%20All%20traffic%20IA24%20SA24%20Slider%20Image%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:169px;" /> </h4> <strong>​Booth #1440</strong></div><p>All Traffic Solutions of State College, Pennsylvania, introduced Con- ditional Messaging. Facility safety managers and those responsible for traffic management around a campus can display dynamic mes- sages on variable message signs based on live conditions. Users can manage their signs online from one place with the secure, Web-based ecosystem, the TraffiCloud. Signs can display items, such as available parking, road surface or air temperatures, wait times, emergency notifications, time-to-destination, wrong-way detection, and more. Data can be incorporated into any position within a message. Sensors can be connected directly to the message sign, or message data can be sourced from the TraffiCloud Web-Based Remote Management System.</p><div> <br> </div><div> <br> <hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Altronix%20Trove%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:193px;" />Altronix ​</h4> <strong>Booth #2011</strong></div><p>Trove enclosures from <span style="line-height:1.5em;">Altronix of Brooklyn, New York, combine Altronix power with access controllers and accessories from lead- ing manufacturers. The unit simplifies board layout and wire management </span><span style="line-height:1.5em;">to reduce installation and labor costs and provide versatility and scalability. New accessories include backplanes for AMAG, CDVI, KABA/KeyScan, and Software House access controllers and accessories. The Trove1 is a compact enclosure that accommodates CDVI, HID/VertX, and Mercury controllers. All </span><span style="line-height:1.5em;">Trove units include a cam lock, tamper switch, and mounting hardware. All Altronix prod- ucts are made in the United States.</span></p><div><div> <br> </div><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><h4>Protection 1<img src="/ASIS%20SM%20Article%20Images/protection%201.JPG" class="ms-rtePosition-2" alt="" style="margin:5px;width:298px;" /></h4><p> <strong>Booth #3113<br></strong><span style="line-height:1.5em;">C</span><span style="line-height:1.5em;">hicago-based Protection 1 provides installation, service, and monitoring of a wide variety of electronic security and network management solutions. Now, it has teamed up with world-class partners to bring an </span><span style="line-height:1.5em;">all-inclusive cybersecurity solution to market. The company employs a team of Cisco-certified and Meraki-certified professionals and integrates brands such as Cisco Network Solutions, Druva Cloud Backup Solutions, and </span><span style="line-height:1.5em;">Bitdefender. From network design, implementation, management, and continuous monitoring to ensuring that all software applications are up to date, Protection 1 is well positioned  to protect physical and virtual assets, especially for small and medium-sized businesses that don’t have the resources to build their own cybersecurity programs.</span></p><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Gai%20tronics%20397-700FS%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:138px;" />GAI-Tronics</h4><div> <strong>Booth #3763</strong></div><p>GAI-Tronics Corporation of Mohnton, Penn- sylvania, designed RED ALERT FS Series Emergency Telephones for installation in areas with restricted space. The flush-mount FS series phones measure 6.5 x 8 inches (compared to 10 by 12 inches for standard phones). The compact phone features are identical to the larger telephone, and they are available in four analog and three VoIP models, with an <span style="line-height:1.5em;">available stainless steel enclosure to provide surface-mounting. RED ALERT Emergency Telephones are designed for maximum environmental sustainability, high audio quality, and excellent monitoring capability to provide hands-free, two-way communications.</span></p><p> <span style="line-height:1.5em;"> <br></span></p></div><div><hr /><h4></h4><div></div><div><div><h4>Honeywell<img src="/ASIS%20SM%20Article%20Images/0916%20Honeywell%20New%20Camera%20Family%20Image%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /> </h4> <strong>Booth #2401</strong></div><p>Honeywell of Northford, Connecticut offers  a new line of IP cameras featuring low light capabilities that provide good images nearly anywhere. The new equIP and HDZ PTZ cameras, offer wide dynamic range for continuous high-resolution video in contrasting levels of light. The HDZ PTZ cameras are ONVIF S com<span style="line-height:1.5em;">pliant and the equIP cameras are ONVIF S and G compliant, so they integrate with most NVR systems including Honeywell’s upgraded MAXPRO NVR. The cameras are part of Honeywell’s complete video portfolio that includes Performance Series, Embedded NVRs, MAXPRO Cloud, and Xtralis analytics.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><h4></h4><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Christie%20CHRI3432%20Phoenix%20LowLeft_Hero%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />Christie </h4> <strong>Booth #2873</strong></div><p>The Christie Phoenix from Christie of Kitchener, Ontario, Canada, enables seamless access and control of audiovisual data from virtually anywhere via a single, robust system. Its comprehensive tools allow thou- sands of users to simultaneously view, listen to, and interact with any source of information found in a control room environment, regardless of their location. Consisting of at least one hardware node and powered by Web-based management software, the Christie Phoenix system allows users in a variety of challenging environments to make faster, more accurate life-critical decisions with confidence.</p><div><hr /><div><h4>dorma+kaba<img src="/ASIS%20SM%20Article%20Images/0916%20Dorma%20+%20Kaba%20ASIS2016_ProductShowcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:128px;" /> </h4> <strong>Booth #2600</strong></div><div>The merger of Dorma and Kaba to make dorma+kaba, headquartered in Winston-Salem, North Carolina, yields a trusted source for security and access controls. Their combined strengths have allowed them to broaden their product offerings to include a full range of architectural hardware and electronic access control solutions. From this position of strength, the company will dedicate more resources to develop innovative solutions that create trust and value for the customer, because trust is its most valuable asset.</div><div> <br>​</div><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Lenel%2014_onguard_logo_cmyk.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />LENEL</h4><p> <strong>Booth #2700<br></strong><span style="line-height:1.5em;">L</span><span style="line-height:1.5em;">enel of Pittsford, New York, part of UTC Building </span><span style="line-height:1.5em;">& Industrial Systems, offers an open security plat- form designed to address the essential needs of enterprise applications. Lenel’s OnGuard security management system sets the standard for intelligent solutions and can be customized to meet specific business demands. The OnGuard system continues to improve, offering new and better ways </span><span style="line-height:1.5em;">to facilitate data optimization and enhance security and business operations. Incorporating responsive technology with advanced analytics, the system delivers improved and expanded functionality, while accommodating future enhancements.</span></p><div><hr /><h4>iJet<img src="/ASIS%20SM%20Article%20Images/0916%20iJET_GIOC_HandPhoneApp%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /></h4><div> <strong>Booth #1563</strong></div><p>Using tailored solutions from iJET International of Annap- olis, Maryland, allows multinational organizations to operate globally with confidence. The solutions integrate operational threat intelligence, innovative technology, and response services to help organizations avoid threats, mitigate risk, and protect people, assets, and reputations. The Global Integrated <span style="line-height:1.5em;">Operations Center enables clients to prepare for, monitor, and quickly respond to a variety of potential or realized threats in the most effective way possible. The Response Operations Center proactively monitors threats around the clock, ensuring that the best information is always available for critical decision making.</span></p><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><div><h4>ComNet<img src="/ASIS%20SM%20Article%20Images/0916%20ComNetCNGE24FX12TX12MS%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:261px;" /></h4> <strong>Booth #3561</strong></div><p>ComNet, Communication Networks of Danbury, Connecticut, is introducing a new series of high port count managed switches that are designed and manufactured at its Danbury, Connecticut, facility. The first of these new switches is the all Gigabit CNGE24FX12TX12MS(POE) <span style="line-height:1.5em;">(HO) managed switch with 12 SFP ports and 12 TX power </span><span style="line-height:1.5em;">over Ethernet (PoE) ports. The </span><span style="line-height:1.5em;">switch is designed to protect the network it is being used on, offering multiple redundancy protocols to keep the network free from points of interruption. The standard PoE model delivers 30 watts of power to all 12 TX ports.</span></p><div><hr /><div><h4>Ameristar Perimeter Security<img src="/ASIS%20SM%20Article%20Images/0916%20Ameristar%20Product%20Showcase_ASIS%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:216px;" /> </h4> <strong>Booth #3813</strong></div><p>Ameristar Perimeter Security of Tulsa, Oklahoma, offers a full line of perimeter security products, including gate systems, anti-ram fences, active vehicle barriers, bollards, and guard booths. Its team of architectural specialists and market developers works closely with design firms to ensure that each project meets the customer’s ex- pectation for security, safety, and success. Ameristar’s security experts help companies find the best solution for each project, dealing with unique challenges that require a balance of active security components and physical security systems.</p><p> <br> </p><div><div style="background-color:#ffffff;"><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/sgm%20logo%20-%20paul%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:140px;" />Security Guard Management </h4> <strong>Booth #3172</strong></div><p>SGM of Dunkirk, Maryland, offers programs designed to train an entire staff of security offi- cers and supervisors. Training programs come in video, hardcover manuals, or a combination of both. Drawing on 22 successful years in the security guard industry, the company writes and develops original training programs. The newest program, Video on Demand, allows security of- ficers to view any or all of the 31 training videos using a smartphone, tablet, or computer. After <span style="line-height:1.5em;">watching the video, they take a test. A score of 80 percent or better entitles them to a cer- tificate that they can print out and/or email to the training director.</span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div><div><div><p>​<br></p></div><div><hr /><div><h4>Research Electronics International<img src="/ASIS%20SM%20Article%20Images/0916%20REI_ASIS_PROD_SHWCSE_%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:202px;" /> </h4> <strong>Booth #1431</strong></div><p>Research Electronics International (REI) of Algood, Tennessee, manufactures products that protect against intellectual property theft. New products include the ANDRE Near-Field Detection Receiver and the ORION 900 Non-Linear Junction Detector. The ANDRE is a broadband RF detector for quickly locating RF transmissions such as audio and video devices. The ORION <span style="line-height:1.5em;">900 detects less-sophisticated circuitry and provides better signal penetration through certain construction materials. REI also manufactures the OSCOR Green Spectrum Analyzer for RF detection and analysis, the TALAN Telephone and Line Analyzer, and more. The REI Training Center provides year-round courses as well as custom remote training.</span><span style="line-height:1.5em;">​</span></p><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20DL2700LD%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:188px;" />Napco Security Technologies (Alarm Lock)</h4><p> <strong>Booth #3500</strong><br><span style="line-height:1.5em;">Alarm Lock, a division of Napco Security Technolo</span><span style="line-height:1.5em;">gies of Amityville, New York, offers Trilogy Networx Wireless Access Locks that eliminate door-to-door programming and audit trail retrieval by communicating wirelessly via Ethernet or 802.11B/G. With all the functionality of the original Trilogy standalone lock, these wireless locks provide a quick, easy, eco</span><span style="line-height:1.5em;">nomical access system with advanced features and functions, like automatic schedules, event logs, and support, for 2,000 doors and 5,000 existing proximity ID cards and badges, but with no wires to run and no access panels or power supplies to buy or install.​</span></p><div><hr /><div><h4>IDV Solutions ​<img src="/ASIS%20SM%20Article%20Images/0916%20IDV%20Solutions%20visual-command-center-asis-16%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:260px;" /></h4> <strong>Booth #1557</strong></div><p>Visual Command Center software from IDV Solutions of Lansing, Michigan, is an enterprise platform for risk intelligence and response that is used by some of the largest organizations in the world. The latest version introduces a new information architecture de<span style="line-height:1.5em;">signed to support stakeholders inside and outside of the command center and to make more effective use of the command center video wall.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Allied%20Universal%20Tagline%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:273px;" />Allied Universal</h4><p> <strong>Booths #2412 and 2350<br></strong><span style="line-height:1.5em;">Allied Universal of Sant</span><span style="line-height:1.5em;">a Ana, California, is offering clients autonomous robot “Machine as  a Service” using Knightscope K5 and K3 robots— called autonomous data machines. The robots operate within a geo-fenced area and provide alerts generated by video, themal imaging, peo- ple detection, license plate recognition, parking </span><span style="line-height:1.5em;">monitoring, audio recording, two-way intercom, and audio broadcast. All data is accessible through the Knightscope Security Operations Center (KSOC), a highly intuitive, brows</span><span style="line-height:1.5em;">er-based user interface. Customers can recall, review, and save data for forensic purposes and use the new iOS mobile app (Android coming soon) for remote access.</span></p><div><hr /><div><h4>DSX Access Systems<img src="/ASIS%20SM%20Article%20Images/0915%20DSX%20ISC%20West%20Showcase%20picked%20up%20from%20ISC%20West%202013%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:157px;" /> </h4> <strong>Booth #1551</strong></div><p>DSX-AES256 software from Dallas-based DSX Access Systems, Inc., contains government-approved AES-256 bit encryption technology that can be implemented systemwide. Communications to each location can be encrypted with a unique encryption key assigned by the customer for communicating with that location’s field controllers. The software encrypts communications to all panels in <span style="line-height:1.5em;">that location without using add-on devices. Because encryption technology is inherent in the software and controllers, implementation is easy. All 1040 Series and 1022 controllers can be flash-upgraded to the AES-256 bit version.</span><span style="line-height:1.5em;">​</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Capindex%20CRIMECAST%20Premium%20Report%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:198px;" />CAP Index ​</h4> <strong>Booth #1851</strong></div><p>CRIMECAST Reports from CAP Index of Exton, Pennsylvania, provide critical crime risk intelligence and help businesses meet ASIS/RIMS guidelines for facility risk assessments with competent evaluation of location risk and impartial, independent, and objective risk data. Reports provide the objective data that can help direct security resource allocation, tier security packages, <span style="line-height:1.5em;">and improve site selection while mitigating risk and exposure. CAP Reports are also a key component in demonstrating legal due diligence. The team at CAP also builds custom risk models and custom CAP Scores specific to brand objectives and challenges.</span><span style="line-height:1.5em;">​</span></p><div><hr /><div><h4>Designed Security, Inc.<img src="/ASIS%20SM%20Article%20Images/0916%20DSI%20ES8900%20Slimline%20150%20x%20133%20300dpi%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:160px;" /> </h4> <strong>Booth #3031</strong></div><p>The new Slimline Series from Designed Security, Inc., (DSI) of Bastrop, Texas, provides a refined visual and physical turnstile with barrier. Its smaller footprint enables customization to fit in smaller areas. Each unit can monitor passage of up to 60 people per minute per lane. It integrates with any access control system. Made of acrylic, it offers a sense of openness. It also features a <span style="line-height:1.5em;">programmable LCD display with audio wavefile capabilities, plus next-generation optical sensing technology for increased accuracy.</span></p><p> <span style="line-height:1.5em;"></span> <span style="line-height:1.5em;">​</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Twist%20and%20Go%20HID%20Global%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:273px;" />HID Global </h4> <strong>​Booth #3901</strong></div><p>HID Global of Austin, Texas, launches new HID Mobile Access, which adds support for wearables, including Apple Watch (iOS 8+) and Android Wear (4.4+) in companion mode, as well as support for tablets to expand mobile options for opening doors and gates. New HID Mobile Access Portal and App software developer kits enable end users and partners to create customized mobile access solutions that can be fully integrated into their back-end systems. The new capabilities extend HID <span style="line-height:1.5em;">Global’s mobile access solution, which also includes Mobile IDs, Mobile Apps downloadable from The App Store and Google Play, iCLASS SE readers, and the HID Mobile Access Portal for provisioning and revoking Mobile IDs.</span><span style="line-height:1.5em;">​</span></p><div><hr /><div><h4>MBM Corporation ​<img src="/ASIS%20SM%20Article%20Images/0916%20MBM%20Destroyit%20Shredders%20by%20MBM%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:149px;" /></h4> <strong>Booth #2073</strong></div><p>Industrial-quality Destroyit paper shredders from MBM Corporation of Charleston, South Caro- lina, allow customers to securely shred sensitive documents without using an outside shredding service. They provide the peace of mind that comes from knowing confidential data won’t fall into the wrong hands. MBM offers more than 40 models to meet any security need, and all are equipped with industry-leading safety features. Precision-engineered in Germany for years of reli- ability, the cutting heads are warranted for life.<span style="line-height:1.5em;">​<br><br></span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Morse%20Watchmans%20KeyWatcher%20Touch%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:164px;" />Morse Watchmans ​<br></h4> <strong>Booth #3651</strong></div><p>Morse Watchmans of Oxford, Connecticut, is improving its KeyWatcher Touch to make it more se- cure and more useful. For improved cybersecurity, the data between the KeyWatcher Touch and the KeyWatcher server can be encrypted with AES256 technology with a pre-shared key that is definable on a site-by-site basis. The server service can run under a domain user account, and Windows au<span style="line-height:1.5em;">thentication is now supported for SQL. The KeyPro III software import utility was revamped to make it easier to use. Other enhancements include easier replacement of keys from the TrueTouch key tracking software, new notifications, and better control of reports.</span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div> <br> <div><div> <br> </div><div><hr /><div><div><h4>Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20POE%20Controller_%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:210px;" /> </h4> <strong>Booth #3500</strong></div><p>Continental Access, a division of Napco Security Technologies of Amityville, New York, introduced the CICP2100 uniVerse Single Door Controller, which supports two readers on one door using power over <span style="line-height:1.5em;">Ethernet. In a CA3000 or CA4K access control software environment, the tamper-supervised controller accommodates two readers and/or one low-current strike, fits in a standard double gang electrical box, and can be net- worked with Accelaterm or Supertwo Controllers and/or Networx Wireless Access Control Locks.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20Yale%20Yale-Multi-Family-Solution%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:180px;" />ASSA ABLOY</h4><div> <strong>Booth #3601</strong></div><p>The Multi-Family Lock Management Solution from Yale Locks & Hardware of Berlin, Con- necticut, an ASSA ABLOY Group brand, is a single system for securing multifamily facilities easily and affordably. It works using Yale Accentra Multi-Family Software, a user-friendly, cloud-based solution that manages access for residents, guests, and staff. Combined with locking hardware and innovative technology, the smart solution helps users increase security, convenience, and peace of mind.</p><div> <br> </div><div><hr /><div><div><h4>Altronix<img src="/ASIS%20SM%20Article%20Images/0916%20Altronix%20NetWay4EWP%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:145px;" /> ​</h4> <strong>Booth #2011</strong></div><p>Altronix of Brooklyn, New York, introduced NetWay4EWP Outdoor Managed PoE+ Switches with Fiber. They feature four PoE/PoE+ ports at 30 watts or two ports at 60 watts (Hi-PoE), and a 1Gb SFP uplink <span style="line-height:1.5em;">f</span><span style="line-height:1.5em;">or IP over fiber applications at 10/100Mbps. The switch is housed in an IP66, NEMA4/4X rated enclosure for use in harsh environments. It includes battery charging for appli- cations requiring back-up power and Altronix’s innovative LINQ Network Communications Technology that allows users to monitor, control, and report power from anywhere.</span></p><div> <br> </div><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Amico%20AMICO%20VANGUARD%20SYSTEM%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:270px;" />Alabama Metal Industries Corporation (AMICO) </h4> <strong>Booth #1242</strong></div><p>AMICO Security of Birmingham, Ala- bama, launched the Vanguard Perimeter System, a unitized perimeter security framework that incorporates proprietary engineered components to create a unified perimeter barrier. Continuous longitudinal rails tie the entire system together to create a full-length curtainwall, while eliminating many of the cuts, clamps, and connections needed to install most fences. The system can accommodate many different types of <span style="line-height:1.5em;">panels made from virtually any material, and the system has been tested to withstand wind loads up to a category 5 hurricane. The design allows for simple integration of fiber optic and impact cables, in addition to cameras, lights, radar, and other accessories.</span></p><div> <br> </div><div><hr /><div><div><h4>Illinois Engineered Products ​<img src="/ASIS%20SM%20Article%20Images/0916%20Illinois%20Engineer%20Products%20Saf-T-Gas%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:270px;" /></h4> <strong>Booth #1062</strong></div><p>The Saf-T-Gas Cabinet from Chicago-based Illinois Engineered Products features an open mesh design that allows for visual inspection <span style="line-height:1.5em;">of stored tanks. Five designs accommodate ver- tical and/or horizontal gas tanks and prevent dangerous buildup of flammable gases. A hasp for a padlock secures the cabinet, which is powder coated in a safety yellow finish and features welded construction. The company’s VUE </span><span style="line-height:1.5em;">Locker is also made with an open mesh design and a welded-on hardened steel hasp that resists cutting and hammering. The welded construction and powder-coated finish makes these products hold up in the harshest industrial settings.</span></p><div> <br> </div><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/Unitek%20K500_pred_model_GA16.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:121px;" />Unitex Direct </h4> <strong>Booth #3272</strong></div><p>Unitex Direct of Walled Lake, Michigan, offers comfort- able classic polo shirts with superior wrinkle and shrink resistance, a silky feel, and a range of styles, sizes, and colors. Ideal for uniforms, Port Authority Silk Touch Polos K500 are available in long- and short-sleeved versions for men and women. Made from 5-ounce poly- ester-cotton pique with flat-knit collar and cuffs, the shirts feature double-needle armhole seams and hems, metal buttons with dyed-to-match plastic rims, and side vents. They are available in sizes from XS to 10XL. The company provides a large array of clothing, footwear, <span style="line-height:1.5em;">and accessories for public safety and private security personnel.</span></p><div><div> <br> </div><div> <br> <hr /><div><div><h4>RS2 Technologies ​<img src="/ASIS%20SM%20Article%20Images/0916%20RS2%20Universal.NET_1%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:204px;" /></h4> <strong>Booth #3361</strong></div><p>Access It! Universal.NET access control software from RS2 Technologies of Munster, Indiana, features a browser thin client for easy installation and updating on multiple workstations, multiple monitor support, and integration with wireless/IP and PoE locksets and other third-party devices. It features an optional data exchange utility that supports Microsoft Active Directory integra- tion, along with scheduled data imports from various <span style="line-height:1.5em;">data sources. It also includes a mobile client that allows users to manage their access con- trol system from any mobile device. Suitable for business of any size, the software allows users to select the feature sets they need to build a scalable, cost-effective system.</span></p><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/0915%20Showcase%20ABLOY%20SECURITY%20SM_Showcase%20Img%20option%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:149px;" />Abloy Security ​</h4> <strong>Booth #3601</strong></div><p>Abloy Security of Irving, Texas, offers a range of tough locks that can withstand severe weather conditions and environmental extremes. ABLOY PROTEC2 CLIQ LED key and interface make it easy to retrofit mechanical locks with electrome- chanical models. There are no batteries in the locks, because the power comes from the key. <span style="line-height:1.5em;">CLIQ technology provides audit trails in both the </span><span style="line-height:1.5em;">lock and the key, flexible time functions, and immediate removal of lost keys. All padlocks feature case-hardened boron-steel shackles and hardened steel UL-listed cylinders. Patent-protected keys can also open ABLOY door locks, and the keys cannot be duplicated.</span></p><div> <br> </div><div> <br> </div><div> <br> </div><div><hr /><div><div><h4>John Jay College of Criminal Justice<img src="/ASIS%20SM%20Article%20Images/John%20Jay%20Online%20Logo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:149px;" /> </h4> <strong>Booth #2678</strong></div><p>John Jay College of Criminal Justice, part of the City University of New York system, now offers 100 percent online master’s level courses in Security Management; Inspection, and Oversight, with a new healthcare special- ization; Public Policy Administration; and now Criminal Justice. Professionals who are interested in earning a master’s degree, but d<span style="line-height:1.5em;">o not have the time to attend traditional classes, will be able to learn on their own sched- ule. Contact John Jay Online toll free at 844/552-9665, or visit http://online.jjay.cuny.edu to learn more about current and coming programs and services.</span></p><div> <br> </div><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20%20IN100%20Aperio%20Wireless%20Lock%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:140px;" />ASSA ABLOY</h4><div> <strong>Booth #3601</strong></div><p>ASSA ABLOY of New Haven, Connecticut, announced that its brands Corbin Russwin and SARGENT introduced a new IN100 Aperio wireless lock, which offers the convenience and flexibility of Aperio wireless technology with the real-time communication of online access control. Remote locking or unlocking can be accomplished in less than 10 seconds. The IN100 also provides simul<span style="line-height:1.5em;">taneous support for multiple credential types and HID Mobile Access powered by Seos. The lock is available in cylindrical and mortise lock configurations, with a choice of black or white reader and a broad range of finishes and levers.</span></p><p> <span style="line-height:1.5em;">​<br></span></p><div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><p>​</p></div></div>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465