Security, Professional, and Business Services

 

 

https://sm.asisonline.org/Pages/ASIS-2017-Product-Showcase.aspxASIS 2017 Product ShowcaseGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-09-19T04:00:00ZSM Staff<h4>​<img src="/ASIS%20SM%20Callout%20Images/Abloy%20Security.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:160px;" />ELECTRONIC PADLOCKS</h4><h5>Abloy Security</h5><p><strong>Booth #3203 </strong></p><p>Abloy Security of Irving, Texas, offers a wide range of locks that provide high security and extreme environmental resistance for critical infrastructure applications. Electromechanical models can replace mechanical ones and take advantage of the ABLOY PROTEC2 CLIQ LED key and interface. There are no batteries in the locks because the power comes from the key. CLIQ technology provides audit trails from both lock and key, flexible time functions, and immediate removal of lost keys electronically. All padlocks feature case-hardened boron-steel shackles and hardened steel UL listed cylinders. Patent-protected keys can also open ABLOY door locks, and the keys cannot be duplicated.</p><h4><br></h4><h4>LOCATION ANALYTICS<img src="/ASIS%20SM%20Callout%20Images/ADT.tif" alt="" style="margin:5px;" /><img src="/ASIS%20SM%20Callout%20Images/ADT.tif" alt="" style="margin:5px;" /><img src="/ASIS%20SM%20Callout%20Images/ADT.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:373px;" /></h4><h5>ADT</h5><p><strong>Booth #3533</strong></p><p>Protection 1, a division of ADT, offers fully managed services from its network operations center to help design, implement, manage, and monitor security-only IT networks. Protection 1 Network Managed Services ensure that networks are continually monitored, software is updated, and bandwidth is managed. CMX Location Analytics based on the Cisco Meraki platform provide actionable customer feedback. Location analytics detect visitor presences via their mobile devices from Meraki’s cloud-managed access points. Metrics provide insight into how many clients pass a location, peak business hours, length of time visitors spend within a location, and number of first-time visitors, for example.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Altronix.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:186px;" />HARDENED SWITCH</h4><h5>Altronix </h5><p><strong>Booth #2823</strong></p><p>Altronix of Brooklyn, New York, introduced the NetWaySP8WPX Hardened PoE Switch with Dual SFP (Fiber). Designed for long-distance applications, the switch is a cost-effective, all-in-one solution that includes an 8-port hardened power over Ethernet switch and a 115-watt power supply/charger with an enclosure that accommodates batteries. The unit features two SFP ports, allowing users to connect multiple units and create a fiber ring. Each port is rated at 30 watts (PoE/PoE+). Two ports are configurable for 60 watts (Hi-PoE), and embedded LINQ Network Communications Technology provides remote diagnostic monitoring, control, and reporting. Switches are made in the United States and backed by a lifetime warranty.</p><p><br></p><h4>​PERIMETER SECURITY<img src="/ASIS%20SM%20Callout%20Images/Ameristar.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:250px;" /></h4><h5>Ameristar Perimeter Security</h5><p><strong>Booth #3517</strong></p><p>Ameristar Perimeter Security of Tulsa, Oklahoma, offers a full line of perimeter security products. Its team of security specialists includes experts in data centers, power utilities, government and military installations, stadiums, arenas, and more. Products include patented fence systems, anti-ram barriers, bollards, and perimeter enclosure grids. The company focuses on creating single source solutions that simplify the incorporation of active security components and physical security systems.</p><h4><br></h4><h4><img src="/ASIS%20SM%20Callout%20Images/ASSA%20(iCLASS).png" class="ms-rtePosition-1" alt="" style="margin:5px;width:182px;" />INTEGRATED WIEGAND LOCKS</h4><h5>ASSA ABLOY</h5><p><strong>Booth #3203</strong></p><p>Corbin Russwin and SARGENT brands, part of ASSA ABLOY of New Haven, Connecticut, introduced iCLASS SE technology to Access 600 RNE1 and Harmony Series locks. These online locks combine the ease and convenience of integrated Wiegand system architecture with the heightened security and flexibility of iCLASS SE technology from HID Global. Offering multi-layered security and simultaneous support for multiple high-frequency credentials, the locks are UL Listed to UL294 6th Edition and combine all standard access control components into a single device. This integrated approach reduces installation time and creates a streamlined aesthetic that blends into any environment. </p><p><br></p><h4>WIRELESS LOCKS<img src="/ASIS%20SM%20Callout%20Images/ASSA%20(IN100).png" class="ms-rtePosition-2" alt="" style="margin:5px;width:172px;" /></h4><h5>ASSA ABLOY</h5><p><strong>Booth #3203</strong></p><p>ASSA ABLOY of New Haven, Connecticut, announced that its brands Corbin Russwin and SARGENT introduced a next-generation IN100 Aperio wireless lock, which offers the convenience and flexibility of Aperio wireless technology with the real-time communication of online access control. Remote locking or unlocking can be accomplished in less than 10 seconds. The IN100 also provides simultaneous support for multiple credential types and HID Mobile Access powered by Seos. The lock is available in cylindrical lock, mortise lock, and exit device configurations, with a choice of black or white reader and a broad range of finishes and levers. </p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/ASSA%20(IN220).png" class="ms-rtePosition-1" alt="" style="margin:5px;width:153px;" />ETHERNET LOCKS</h4><h5>ASSA ABLOY</h5><p><strong>Booth #3203</strong></p><p>Available from ASSA ABLOY Group brands Corbin Russwin and SARGENT of New Haven, Connecticut, the IN220 Power-over-Ethernet (PoE) lock combines aesthetics with the energy efficiency and streamlined architecture of PoE access control for a cost-effective, sustainable solution that leverages existing network infrastructure for enhanced security and easier installations. Featuring HID multiCLASS SE technology, the IN220 supports a wide range of credential types and HID Mobile Access powered by Seos for use with mobile devices with Bluetooth Smart and/or NFC technology. Built with integrated ANSI/BHMA Grade 1 hardware, the IN220 is available in cylindrical lock, mortise lock, exit device, and multipoint lock configurations.</p><p><br></p><h4>MOTION DETECTOR<img src="/ASIS%20SM%20Callout%20Images/Axis.png" class="ms-rtePosition-2" alt="" style="margin:5px;width:249px;" /></h4><h5>Axis Communications</h5><p><strong>Booth #4032</strong></p><p>Axis Communications of Chelmsford, Massachusetts, is introducing the AXIS D2050-VE Network Radar Detector. The outdoor motion detector with radar technology can provide cost-efficient perimeter protection, accurate and reliable day and night detection, and fewer false alarms, which can lower costs. The detector can also easily integrate into existing surveillance systems and is a great complement to any security solution in smaller outdoor areas. </p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Brownyard%20Group.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:350px;" />SECURITY INSURANCE</h4><h5>Brownyard Group</h5><p><strong>Booth #2132</strong></p><p>The Brownyard Group of Bay Shore, New York, provides insurance coverage and risk management solutions for the security guard, private investigative, and alarm industries. With more than 60 years of experience covering security concerns, Brownyard offers broad coverage through an admitted insurer. The company handles claims in an expeditious and knowledgeable manner via its in-house claims facility. Brownyard works exclusively through an insurance agent or broker chosen by the client.</p><p><br></p><h4>GUARD COMPANY INSURANCE<img src="/ASIS%20SM%20Callout%20Images/Brownyard%20Programs.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:222px;" /></h4><h5>Brownyard Programs</h5><p><strong>Booth #2041</strong></p><p>Brownyard Programs of Bay Shore, New York, is proud to introduce the BestGuard Plan, a revolutionary insurance program designed exclusively for high-quality, low-risk security guard companies. The plan rewards only the best security guard companies with the broadest coverage, the highest limits, and the lowest pricing commensurate with their lower risk. For too long, insurance companies have treated all security companies the same regardless of their caliber. Consequently, the best security guard companies always end up subsidizing the worst. Why should well-run organizations pay for others’ mistakes?</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/CAP%20Index.png" class="ms-rtePosition-1" alt="" style="margin:5px;width:259px;" />CRIME INTELLIGENCE</h4><h5>CAP Index</h5><p><strong>Booth #3422</strong></p><p>CAP Index of Exton, Pennsylvania, reports that more than 5,000 businesses and government agencies use its CRIMECAST Reports, custom data analytics, and risk-mitigation software tools to help optimize resources, limit exposure, and minimize losses. The company helps security professionals proactively manage locations, assets, and crime risks. Data intelligence enables security teams to allocate resources in response to the needs of locations, establish realistic security goals, apply standards to decision making, determine where a property falls in terms of tiering security packages, and audit a property for compliance with best practices. CAP Reports provide comparable crime data at any location in Canada, Puerto Rico, the United Kingdom, and the United States.</p><p> </p><h4>WALL DISPLAYS<img src="/ASIS%20SM%20Callout%20Images/Christie.tiff" alt="" style="margin:5px;" /><img src="/ASIS%20SM%20Callout%20Images/Christie.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:266px;" /></h4><h5>Christie</h5><p><strong>Booth #1109</strong></p><p>The Christie FHD553-XU LCD panel from Christie of Kitchener, Ontario, Canada, captures viewers’ attention with color-rich visuals and nearly seamless tiled video wall displays. The panel integrates easily into limited spaces while offering easy-to-service flexible mounting options. The LED-backlit LCD display delivers long-lasting and reliable performance with low operating costs. Christie’s Phoenix EP network distributed processor installs directly into compatible Christie displays to offer LAN signal distribution and to manage presentation of audiovisual content in a Phoenix system for video wall array in a control room or AV system.</p><p>​<br></p><h4><img src="/ASIS%20SM%20Callout%20Images/CommPort.JPG" class="ms-rtePosition-1" alt="" style="margin:5px;width:330px;" />UNDER-VEHICLE INSPECTION</h4><h5>Comm Port Technologies</h5><p><strong>Booth #4377</strong></p><p>Comm Port Technologies of Cranbury, New Jersey, offers the CPAS series of under-vehicle surveillance systems for inspection and analysis of a vehicle’s undercarriage. The systems offer high-resolution color composite scanning up to 900 frames per second for vehicles traveling up to 75 kilometers per hour. Security analysts can view, in real time and full color, the entire length of any vehicle. There is no need for an expensive image-processing computer or control unit. With no limit on scanning length, these ruggedized flush mount frames are ideal for secure vehicle entry points at government, military, and corporate facilities.</p><p><br></p><h4>PORT LOCKOUT<img src="/ASIS%20SM%20Callout%20Images/Comnet.png" class="ms-rtePosition-2" alt="" style="margin:5px;width:217px;" /></h4><h5>ComNet</h5><p><strong>Booth #1509</strong></p><p>ComNet, Communication Networks of Danbury, Connecticut, introduced the Port Guardian Physical Port Lockout, a new cybersecurity feature for its latest switches that can physically disconnect a port if unauthorized access is detected. Port Guardian is essential in situations where network access is attempted by disconnecting an IP device to connect to the network. When Port Guardian senses the disconnect, a notification is sent to the head end and the affected port is physically locked out, preventing access. This feature is available on ComNet Switches. </p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Dahua.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:315px;" />PANORAMIC CAMERA</h4><h5>Dahua Technology</h5><p><strong>Booth #4145</strong></p><p>Dahua Technology of Irvine, California, introduced its first HDCVI multi-sensor format camera for coaxial infrastructure. The groundbreaking multi-sensor infrared camera brings wide panoramic views to HD over coax solutions, cutting installation time and increasing operator efficiency. Because fewer cameras are needed, clutter is reduced and aesthetics are improved. The new HDCVI 3.0 panoramic multi-sensor IR bullet camera provides the same coverage that would typically be provided by multiple standard cameras. It has three individual 2MP sensors in an all-in-one IP67 weather-resistant indoor-outdoor housing.</p><p><br></p><h4>PANIC HARDWARE<img src="/ASIS%20SM%20Callout%20Images/Detex.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:212px;" /></h4><h5>Detex </h5><p><strong>Booth #2723</strong></p><p>For critical airport entryways and exits, Detex Corporation of New Braunfels, Texas, offers a full line of hardware options, including exclusive panic hardware that integrates delayed egress and latch retraction in a single patented device. Operation is simple for airport staff; latch retraction allows easy access with card or keypad, without sounding an alarm. But unauthorized attempts to enter secure areas trigger the alarm and keep the door locked for 15 seconds so that staff can respond. Designed specifically for this kind of use, Advantex Delayed Egress/Latch Retraction hardware is engineered for reliable performance, low maintenance, and long life. ​</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/dormakaba%20(EAD).jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:287px;" />MOBILE ACCESS CONTROL</h4><h5>dormakaba</h5><p><strong>Booth #2321 </strong></p><p>Mobile access control highlights a new era for Keyscan systems from dormakaba of Winston-Salem, North Carolina. Users with enabled iOS or Android devices can store mobile credentials in an app and conveniently and efficiently access entrances secured by mobile-enabled readers. Hands-free ingress and egress is easy with the RCI 910TC: a wave of a hand will activate automatic doors, and a built-in mechanical override keeps them operating when power is lost. The new E-Plex 7900 RF wireless lock offers advanced functionality with unique credential reading ability, making it ideal for all Aurora-powered Keyscan environments.</p><p><br></p><h4>FULL-HEIGHT TURNSTILES<img src="/ASIS%20SM%20Callout%20Images/dormakaba%20(PAS).jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:300px;" /></h4><h5>dormakaba</h5><p><strong>Booth #2321 </strong></p><p>Modular full-height turnstiles from dormakaba are suitable for securing the perimeter of buildings and properties. Two-, three-, and four-winged units with straight or U-shaped bars can be grouped together. The same applies for units with bicycle doors, integrated doors, and emergency egress. Additionally, full-height gates in a matching design offer a solution for ADA compliance. Factory-built integrated canopies with lighting options fit any of the single, multiple, or space-saving double units for a unified appearance. The quiet, low-energy drive consumes very little power. The push-assist feature adapts to the speed of the person entering. Turnstiles with integrated end-point locking prevent people from being trapped.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/DSI.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:240px;" />CLEAR TURNSTILES</h4><h5>Designed Security, Inc.</h5><p><strong>Booth #2723</strong></p><p>The new Slimline Series from Designed Security, Inc., (DSI) of Bastrop, Texas, provides a refined visual and physical turnstile with barrier. Its smaller footprint enables customization to fit in smaller areas. Each unit can monitor passage of up to 60 people per minute per lane. It integrates with any access control system. Made of acrylic, it offers a sense of openness. It also features a programmable LCD display with audio wavefile capabilities, plus next-generation optical sensing technology for increased accuracy.</p><p><br></p><h4>ACCESS CONTROL SOFTWARE<img src="/ASIS%20SM%20Callout%20Images/DSX.tif" alt="" style="margin:5px;" /><img src="/ASIS%20SM%20Callout%20Images/DSX.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:203px;" /></h4><h5>DSX Access Systems</h5><p><strong>Booth #3715</strong></p><p>DSX-AES256 software from Dallas-based DSX Access Systems, Inc., contains government-approved AES-256 bit encryption technology that can be implemented systemwide. Communications to each location can be encrypted with a unique encryption key assigned by the customer for communicating with that location’s field controllers. The software encrypts communications to all panels in that location without using add-on devices. Because encryption technology is inherent in the software and controllers, implementation is easy. All 1040 Series and 1022 controllers can be flash-upgraded to the AES-256 bit version.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/GAI-Tronics.png" class="ms-rtePosition-1" alt="" style="margin:5px;width:41px;" />EMERGENCY PHONES</h4><h5>GAI-Tronics</h5><p><strong>Booth #1915</strong></p><p>GAI-Tronics Corporation of Mohnton, Pennsylvania, offers the 234FSP RED ALERT Pedestal as part of a completely integrated emergency communications station. Designed for use where height is a factor, the FS series unit provides solutions to security concerns for building entrances, parking lots, transit platforms, shopping malls, gate entry, and walking paths. At only 56 inches tall, the pedestal has a durable epoxy finish to withstand the harshest environments and is ideal for use in covered areas or where a lower height is more aesthetically appealing. The 234FSP accommodates GAI-Tronics FS Series Compact Telephones.</p><p><br></p><h4>PORTABLE DETECTOR<img src="/ASIS%20SM%20Callout%20Images/Garrett.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:106px;" /></h4><h5>Garrett Metal Detectors</h5><p><strong>Booth #2223</strong></p><p>The Walkthrough Caster Set from Garrett Metal Detectors of Garland, Texas, is ideal for stadiums, special events, and school use. The casters, which can be permanently attached, allow full mobility of a Garrett PD 6500i walkthrough metal detector by one person. Detectors can be moved to a secure location when they are not in use and provide an unimpeded exit at the close of an event. The caster assembly is constructed of durable, powder-coated steel for use in all types of environmental conditions.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Hanwha.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:240px;" />MULTI-DIRECTIONAL CAMERAS</h4><h5>Hanwha Techwin America </h5><p><strong>Booth #3523</strong></p><p>Hanwha Techwin America of Ridgefield Park, New Jersey, is building on its commitment to deliver the industry’s highest-performance video solutions with the introduction of its new Wisenet P series multi-sensor, multi-directional cameras. Available in 8- and 20-megapixel models, they offer unmatched performance. The series includes the PNM-9080VQ with four individual 2-megapixel sensors for a total of 8-megapixel resolution, with 150 dB wide dynamic range and 60 frames per second for each sensor. The series also includes the PNM-9081VQ with four individual 5-megapixel sensors that deliver 20-megapixel resolution (120 dB WDR and 30 fps per sensor).</p><p><br></p><h4>BUILDING TECHNOLOGY<img src="/ASIS%20SM%20Callout%20Images/Honeywell.PNG" class="ms-rtePosition-2" alt="" style="margin:5px;width:361px;" /></h4><h5>Honeywell</h5><p><strong>Booth #2509</strong></p><p>Honeywell Home and Building Technologies of Melville, New York, creates products, software, and technologies that are found in more than 150 million homes and 10 million buildings worldwide. The company helps homeowners stay connected and in control of their comfort, security, and energy use. Commercial building owners and occupants use the technologies to ensure their facilities are safe, energy-efficient, sustainable, and productive. Advanced metering hardware and software solutions help electricity, gas, and water providers supply customers and communities more efficiently.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Horton.JPG" class="ms-rtePosition-1" alt="" style="margin:5px;width:356px;" />EXIT SECURITY</h4><h5>Horton Automatics</h5><p><strong>Booth #1033</strong></p><p>The Secure Exit Lane from Horton Automatics of Corpus Christi, Texas, provides one-way pedestrian traffic flow between the secure and non-secure zone of an airport or other high-security environment. Directional motion detection technology reduces the threat of unauthorized access to a secure environment by sensing and monitoring traffic flow direction. The Secure Exit Lane, which is large enough to accommodate passengers with disabilities, uses an array of sensors to detect unauthorized entry and foreign objects. The system’s sleek design integrates into areas with restricted space, making it a versatile solution for facilities of all sizes.</p><p><br></p><p><br></p><h4>INCIDENT AND RISK MANAGEMENT<img src="/ASIS%20SM%20Callout%20Images/iView.png" class="ms-rtePosition-2" alt="" style="margin:5px;width:207px;" /></h4><h5>iView Systems</h5><p><strong>Booth #1601</strong></p><p>Integrated software from iView Systems of Oakville, Ontario, Canada, provides a platform for incident reporting, risk management, visitor management, and identification solutions, ensuring reporting and compliance that meet a wide range of requirements. The iTrak platform delivers an easy-to-use physical security daily reporting system. Available as both an on-premise or cloud-based solution, iTrak helps businesses consolidate and simplify physical security reporting and aids in tracking, analyzing, and investigating events consistently across multiple departments, including security, surveillance, and risk management. Robust reporting and business intelligence modules manage, document, and identify exceptions in data, reducing manual security processes and driving transparency and accountability </p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/KEYper.png" class="ms-rtePosition-1" alt="" style="margin:5px;width:233px;" />KEY MANAGEMENT</h4><h5>KEYper Systems</h5><p><strong>Booth #4483</strong></p><p>KEYper Systems of Harrisburg, North Carolina, presents the Monarch Plus, an electronic key management system. Each 16-gauge, powder coated steel cabinet holds 40 to 280 keys, and systems can expand to control more than 2,000 total keys. The cabinet is accessed via touchscreen, using either PIN, biometric, proximity card, or smart card. Keys are electro-mechanically locked into place, and only the requested key can be removed. Keys and assets are tracked in real time using Web-based software, and a complete audit trail is available. Administrators can restrict access by user, key, or cabinet, and a digital camera captures a photo of every check-in and checkout attempt.  </p><p><br></p><h4>EMERGENCY NOTIFICATION<img src="/ASIS%20SM%20Callout%20Images/Micro%20Tech.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:345px;height:200px;" /></h4><h5>Micro Technology Services, Inc.</h5><p><strong>Booth #3967</strong></p><p>The Lynx Network Duress and Emergency Notification System is developed, manufactured, and supported by Micro Technology Services, Inc., of Richardson, Texas. The system focuses on encryption, supervision, and testing. Features include the PC-based F9-F11 keyboard alarm, USB duress buttons, and popup alerts that operate even when users are logged off. The LynxIcons are encrypted (not unsecure desktop shortcuts), all of the hardware and software is fully supervised, and any alarm can easily be tested. With a single activation, the system can communicate to thousands of PCs and Macs, HDMI monitors, radios, overhead PAs, Axis IP speakers, mobile devices, and IP phones. </p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/NAPCO.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:200px;" />WIRELESS LOCKS</h4><h5>NAPCO Security Technologies, Inc.</h5><p><strong>Booth #3120</strong></p><p>ArchiTech Designer Wireless Networx Locks from NAPCO Security Technologies, Inc., of Amityville, New York, are infinitely customizable and offer optional enterprise integration, using either Continental Access CA4K or Lenel OnGuard. ArchiTech Locks blend wireless access control convenience in a locking form factor and with a wide choice of trims and finishes to complement any decor. The durable Grade 1 access locks are ideal for every application and offer mobile access and smart device unlocking convenience with universally compatible Bluetooth LE technology and a wirelessly paired iLock App.</p><p><br></p><h4>ACCESS CONTROL<img src="/ASIS%20SM%20Callout%20Images/Open%20Options.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:200px;" /></h4><h5>Open Options</h5><p><strong>Booth #625</strong></p><p>DNA Fusion from Open Options of Addison, Texas, is open platform access control software that has provided innovative solutions through Authentic Mercury hardware for two decades. The software seamlessly connects with leading technologies, including video management systems, critical communications, wireless locks, and more. DNA Fusion contains many features to help customers: users can easily access system data with InfoReady reporting, assign global access levels, drag and drop data, create custom commands to control several doors, and more. System users can also manage security remotely with Fusion Web and Fusion Mobile applications.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Par-Kut.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:266px;" />SECURITY BOOTHS</h4><h5>Par-Kut International</h5><p><strong>Booth #4438</strong></p><p>Par-Kut International, located in Metro Detroit, Michigan, produces a full line of portable steel buildings to be used as guard buildings, smoking and environmental shelters, and entry control booths. With more than 60 years of experience producing portable steel buildings, the company draws upon its industry-leading experience to design and build buildings to customer specifications. Whether bullet resistance (up to NJI-4) is required, or customers want an open and welcoming design, Par-Kut International works with security staff and site designers to build the best security booth possible, meeting or exceeding all expectations for safety, security, and design. </p><p><br></p><h4>SECURITY SERVICES<img src="/ASIS%20SM%20Callout%20Images/Prosegur.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:262px;" /></h4><h5>Prosegur</h5><p><strong>Booth #433</strong></p><p>Prosegur of Madrid, Spain, is a global company with more than 168,000 employees working in 18 countries on five continents. Through its four business lines—Prosegur Security, Prosegur Cash, Prosegur Alarms, and Prosegur Cybersecurity—it offers companies, households, and retail businesses security that they can trust, based on the most advanced solutions in the market. Prosegur Seguridad combines manned guarding with the latest technology to offer a full range of highly specialized security solutions tailored to the needs of each client across all sectors of activity.</p><h4><br></h4><h4><img src="/ASIS%20SM%20Callout%20Images/REI.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:205px;" /><img src="/ASIS%20SM%20Callout%20Images/REI.tif" alt="" style="margin:5px;" />INFORMATION SECURITY</h4><h5>Research Electronics International</h5><p><strong>Booth #2324</strong></p><p>Research Electronics International (REI) of Cookeville, Tennessee, manufactures products that protect against intellectual property theft. The ORION 900 Non-Linear Junction Detector detects less-sophisticated circuitry and provides better signal penetration through certain construction materials. An ORION HX Deluxe has both 2.4 GHz and 900 MHz antennas for multiple applications. The TALAN 3.0 Telephone and Line Analyzer provides VoIP and network analysis. The ANDRE Advanced Near-Field Detection Receiver is a broadband receiver that detects RF, infrared, visible light, carrier current, and other types of transmitters, such as hidden audio and video devices. The REI Training Center provides year-round courses, as well as custom remote training.</p><p><br></p><h4>SECURITY SERVICES<img src="/ASIS%20SM%20Callout%20Images/SecurAmerica.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:587px;" /></h4><h5>SecurAmerica</h5><p><strong>Booth #3903</strong></p><p>SecurAmerica is a privately-held, American-owned contract security services company headquartered in Atlanta, Georgia. The company offers innovative contract security service solutions across the United States, providing uncompromising value, cost effectiveness, and results to clients. Its business model is based on creating and delivering operational excellence to each [and every] customer by selecting the right people, training them to exceed clients’ requirements, and providing them with a culture that is focused on 100 percent customer and employee satisfaction. SecurAmerica strives to deliver legendary service every day to all customers.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Stratfor.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:334px;" />PROTECTIVE INTELLIGENCE</h4><h5>Stratfor</h5><p><strong>Booth #4583</strong></p><p>Stratfor of Austin, Texas, approaches threat assessment and mitigation based on a unique methodology of tactical deconstruction. By leveraging Stratfor’s expertise in geopolitical analysis and local history, culture, and politics, its global intelligence solution Threat Lens provides clarity on an attacker's motivations, objectives, and operations. Threat Lens covers the full spectrum of terrorism, criminal activity, industrial espionage, and business continuity for security professionals to anticipate, measure, and mitigate the risks of emerging threats. Threat Lens also provides access to top security analysts for specific questions pertaining to an organization’s exposures.</p><h4><br></h4><h4>BUSINESS ANALYTICS<img src="/ASIS%20SM%20Callout%20Images/TEAM%20Software.png" class="ms-rtePosition-2" alt="" style="margin:5px;width:296px;" /></h4><h5>Team Software</h5><p><strong>Booth #2023</strong></p><p>TEAM Software of Omaha, Nebraska, offers the insights dashboard, the next generation of analytics that unlocks more value from the data in WinTeam[,]—TEAM’s core financial, operations, and workforce management solution. It provides a virtual report card of key performance indicators, as well as metrics and trends that leaders should track to gauge company performance. It offers near-real-time updates on job financials, overtime information, customer analytics, and quality assurance statistics displayed in handy charts and graphs. The insights dashboard will be available this fall for TEAM Software clients.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Unitex.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:156px;" />UNIFORM TIPS</h4><h5>Unitex Direct</h5><p><strong>Booth #4166</strong></p><p>What does a uniform say about a brand? Unitex Direct of Walled Lake, Michigan, has prepared a white paper with the answers. It includes tips on fabric selection, sizing, and garment care, plus a discussion on how to better manage a uniform program through technology and online tools. Choosing the right uniform helps protect a company's image as well as its bottom line. Visit Booth 4166 at ASIS 2017 to get a copy of the white paper.</p><p><br></p><p><br></p><h4>MOBILE ACCESS<img src="/ASIS%20SM%20Callout%20Images/Access%20Specialties.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:112px;" /></h4><h5>Access Specialties </h5><p><strong>Booth #1943</strong></p><p>Access Specialties of Rosemount, Minnesota, created Focal Point Freedom, a new mobile application for the Focal Point IP-based access control system. Focal Point Freedom gives customers the option to remotely control their doors, see transaction activity, and disable cardholder and operator permissions. Users can also acknowledge alarms and receive alarm notices. The app uses the permissions set for system operators within the desktop application so that they can only manage the zones or areas that they have permission to view. In emergency situations, doors or areas can be instantly locked down and/or disabled.  </p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Allied%20Universal.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />SECURITY SERVICES</h4><h5>Allied Universal</h5><p><strong>Booth #2733</strong></p><p>Allied Universal of Santa Ana, California, provides unparalleled service, systems, and solutions to the people and businesses of its communities. As North America’s leading security services provider with more than 150,000 employees, Allied Universal combines people and technology to deliver tailored offerings that allow clients to focus on their core business. A focus on client success creates partnerships rooted in quality and value, and is supported by experience gained from being in business for more than 60 years. Allied Universal’s divisions include Security Services, Security Systems, Janitorial Services, and Staffing Services.</p><p><br></p><h4>MINI DOME<img src="/ASIS%20SM%20Callout%20Images/Avigilon.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:328px;" /></h4><h5>Avigilon</h5><p><strong>Booth #4056</strong></p><p>Dallas-based Avigilon introduced the H4 Mini Dome to its line of cameras. With a footprint of just 2.8 inches, it offers a modular design that snaps into place, allowing users to switch between surface and in-ceiling mounts. Equipped with Avigilon LightCatcher technology, the camera offers exceptional image quality, even in low light. Content adaptive infrared technology provides consistent illumination in complete darkness across the camera’s field of view. It also uses Avigilon’s patented High Definition Stream Management, as well as Avigilon HDSM SmarCodec and Idle Scene Mode technologies for efficient bandwidth management.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/CEIA.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:38px;" />CONTRABAND DETECTOR</h4><h5>CEIA USA</h5><p><strong>Booth #1433</strong></p><p>The CEIA MSD (Magneto Static Detector) portable cell phone and contraband detector targets concealed cell phones and other ferrous threats with the highest detection capabilities in the industry. Made by CEIA USA of Twinsburg, Ohio, the MSD is portable and, with no assembly required, ready for immediate use. Combining high reliability and lightweight design with advanced detection, the MSD is flexible enough to make surprise checks fast and efficient. The unit quickly and easily detects items concealed on the person or in body cavities (including key fobs, cell phones, smartphones, shanks, and more), and it is fully weatherproof for outdoor use.</p><p><br></p><h4>VERSATILE CAMERAS<img src="/ASIS%20SM%20Callout%20Images/Hikvision.png" class="ms-rtePosition-2" alt="" style="margin:5px;width:128px;" /></h4><h5>Hikvision USA</h5><p><strong>Booth #3703</strong></p><p>New from Hikvision USA of City of Industry, California, are DS-2TD4035 Series Network Bi-Spectrum Thermal/Optical PTZ Camera Systems. The units feature a high-performance 384x288 thermal imaging camera, with 25- and 50-millimeter lens options, combined with a 2MP CMOS true day/night camera with 30x zoom lens and 150-meter infrared illumination to improve the lowlight performance of the CMOS sensor. This system offers more accurate detection, better situational awareness, and cost savings by combining the two sensors, analytics, and tracking into a single camera system. Advanced analytics include smart tracking, line cross, intrusion detection, region entrance/exit, temperature-exception alarms, and fire detection.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/NC4.png" class="ms-rtePosition-1" alt="" style="margin:5px;width:314px;" />RISK INTELLIGENCE</h4><h5>NC4, Inc. </h5><p><strong>Booth #501</strong></p><p>NC4, Inc., of El Segundo, California, evaluates worldwide incidents and events in real time, providing early warning and predictive intelligence of risks that could threaten critical infrastructure, cause business disruption, or affect employee health and safety. NC4 integrates technology and resources around all-hazards information collection and analysis into its proactive risk management application, NC4 Risk Center. Risk Center enhances members’ capabilities in monitoring, analyzing, and responding to risks that pose a threat to their organizations. All-hazards events can create risks that can affect any part of an organization and can quickly impact operations; NC4 monitors and reports on what is happening around the globe.</p><p><br></p><p><br></p><h4>NETWORK SIGNAL<img src="/ASIS%20SM%20Callout%20Images/Patlite.JPG" class="ms-rtePosition-2" alt="" style="margin:5px;width:205px;" /></h4><h5>Patlite</h5><p><strong>Booth #4577</strong></p><p>New from Patlite of Torrance, California, the NHL-FV is designed to maximize productivity and minimize data loss. It notifies administrators of any network abnormalities or security breaches as they develop via LED light notifications, audible alarms, email notifications, and now MP3 voice messaging. New features add functionality through Ethernet and input/output contacts to greatly improve response time. The tower has configurable LED stack colors and alarms. Monitoring is available, and a test switch operates all tower functions directly for self-diagnosis.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/SDC.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:305px;" />ACCESS CONTROLLER</h4><h5>Security Door Controls </h5><p><strong>Not exhibiting—no booth number</strong></p><p>Security Door Controls of Camarillo, California, announced that SDC IP Pro IP-based Single Door Access Controllers are now available with two Ethernet ports for interfacing with an additional IP device. They allow expansion from one standalone door to a 100-door grid. The additional Ethernet port lets the IT department save a port when connecting an extra door at the server. Installers can eliminate a long cable run when connecting an additional IP device. This capability brings safe, secure, and easy-to-implement door access control to the network’s edge without costlier enterprise solutions.</p><p>​<br></p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Talkaphone.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:67px;" />COMMUNICATIONS PEDESTAL</h4><h5>Talkaphone</h5><p><strong>Booth #1123</strong></p><p>The Via access and courtesy communication pedestal from Talkaphone of Niles, Illinois, can be used for building access, parking access, or courtesy communication. When used in an access installation, the included blue LED light band will change to green when the door is activated through the call station. The pedestal is constructed with marine grade stainless steel front panels and a vandal-resistant coating to resist extreme weather conditions. The included VOIP-200 series call station can include an ONVIF-compliant, wide-angle IP camera, and can read CALL or HELP in a variety of languages. When linked with the AVM-1 IP Video Attendant Station, entry points and parking gates can be monitored.</p><p><br></p><h4>ADJUSTABLE MONITORS<img src="/ASIS%20SM%20Callout%20Images/Winsted.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:266px;" /> </h4><h5>Winsted</h5><p><strong>Booth #833</strong></p><p>Winsted of Bloomington, Minnesota, offers the M-View Rize as part of its adjustable workstation products. M-View Rize is the perfect complement to any console system, including all Impulse Sit/Stand consoles. As the operator changes the height of the console, the M-View Rize can adjust the height of the monitors on the wall to maintain proper ergonomics and optimal sight lines. It is available in two standard configurations: a 43-inch-wide configuration for a single monitor and an 83-inch-wide configuration for dual monitors.</p><p><br></p><h4><img src="/ASIS%20SM%20Callout%20Images/Phybridge.JPG" class="ms-rtePosition-2" alt="" style="margin:5px;width:200px;" />IP OVER COAX</h4><h5>NVT Phybridge</h5><p><strong>Booth #2443</strong></p><p>NVT Phybridge of Oakville, Ontario, Canada is making IP over Coax quick, easy, and cost-effective. The award-winning CLEER family of long reach PoE solutions delivers powerful, enterprise-grade, fast Ethernet (100Mbsp) and PoE+ (up to 30W) over Coax with extended reach to 2,000 feet (610 meters). That’s six times the distance of typical switches. The CLEER switches quickly and easily transform coaxial cable infrastructures into a robust, highly secure IP platform that is easy to install and manage. Options include 24-port managed, 10-port unmanaged, and Ethernet over Coax (EoC). </p><p><br></p><h4>ACCESS SOFTWARE<img src="/ASIS%20SM%20Callout%20Images/Quantum%20Secure.png" class="ms-rtePosition-1" alt="" style="margin:5px;width:335px;" /></h4><h5>Quantum Secure (part of HID)</h5><p><strong>Booth #3009</strong></p><p>SAFE Enterprise marks the next generation in physical identity and access management software from Quantum Secure of San Jose, California, part of HID Global. Designed with the needs of the organization in mind, SAFE Enterprise serves the needs of the secur​​​ity team and end user communities by centralizing systems into a single identity management platform. This policy-based solution addresses the common physical identity and access management challenges organizations face, such as onboarding, badging, access management, visitor management, and compliance. It automates and simplifies physical identity and access management of employees, visitors, contractors, and tenants.</p><p><br></p>​

Security, Professional, and Business Services

 

 

https://sm.asisonline.org/Pages/ASIS-2017-Product-Showcase.aspx2017-09-19T04:00:00ZASIS 2017 Product Showcase
https://sm.asisonline.org/Pages/Less-is-More.-A-KISS-Approach-to-ESRM.aspx2017-09-12T04:00:00ZLess is More: A KISS Approach to ESRM
https://sm.asisonline.org/Pages/A-Professional-Path.aspx2017-09-01T04:00:00ZA Professional Path
https://sm.asisonline.org/Pages/Protecting-Executives-at-Home.aspx2017-06-19T04:00:00ZProtecting Executives at Home
https://sm.asisonline.org/Pages/Worse-Than-Hyperbole.aspx2017-06-13T04:00:00ZOverpromising Security: Worse Than Hyperbole
https://sm.asisonline.org/Pages/April-2017-Product-Showcase.aspx2017-04-01T04:00:00ZApril 2017 Product Showcase
https://sm.asisonline.org/Pages/Hate-Crimes-in-2015.aspx2017-02-01T05:00:00ZHate Crimes in 2015
https://sm.asisonline.org/Pages/January-2017-Industry-News.aspx2017-01-01T05:00:00ZJanuary 2017 Industry News
https://sm.asisonline.org/Pages/Maturity--Model-101.aspx2016-12-01T05:00:00ZMaturity Model 101
https://sm.asisonline.org/Pages/Industry-News-October-2016.aspx2016-10-01T04:00:00ZIndustry News October 2016
https://sm.asisonline.org/Pages/ASIS-To-Host-First-Security-Week.aspx2016-09-11T04:00:00ZASIS To Host First Security Week
https://sm.asisonline.org/Pages/ASIS-2016-Product-Showcase.aspx2016-09-01T04:00:00ZASIS 2016 Product Showcase
https://sm.asisonline.org/Pages/A-Security-Triumvirate-in-Orlando.aspx2016-06-13T04:00:00ZA Security Triumvirate in Orlando
https://sm.asisonline.org/Pages/SM-Online-January-2016.aspx2016-01-01T05:00:00ZSM Online January 2016
https://sm.asisonline.org/Pages/December-2015-Product-Showcase.aspx2015-12-01T05:00:00ZDecember 2015 Product Showcase
https://sm.asisonline.org/Pages/How-to-Manage-a-Merger.aspx2015-10-06T04:00:00ZHow to Manage a Merger
https://sm.asisonline.org/Pages/2015-Seminar-Product-Showcase.aspx2015-09-17T04:00:00Z2015 Seminar Product Showcase
https://sm.asisonline.org/Pages/Proper-Persuasion.aspx2015-08-03T04:00:00ZProper Persuasion
https://sm.asisonline.org/Pages/Book-Review---The-Handbook-of-Security.aspx2015-08-01T04:00:00ZBook Review: The Handbook of Security
https://sm.asisonline.org/Pages/Book-Review--Three-Sisters-Pond.aspx2015-08-01T04:00:00ZBook Review: Three Sisters Ponds

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Book-Review---Physical-Security.aspxPhysical Security<p><em>Butterworth-Heinemann; Elsevier.com; 204 pages; $79.95.</em></p><p>​The second edition of <em>Physical Security: 150 Things You Should Know</em> is an excellent reference for security practitioners and managers. Written by Lawrence J. Fennelly and Marianna Perry, CPP, the book covers the most common concepts and concerns in security today; from lighting and CPTED to cyber and drones. To borrow from the book’s opening lines, it is a roadmap to building and enhancing an organization’s security program.</p><p>The authors do a great job of organizing an overwhelming amount of material. The book is likely to serve more as a go-to reference for a particular topic rather than to be read from cover to cover. </p><p>A security practitioner with a fundamental understanding of security will find this book to be an exceptional resource for planning security upgrades, training security staff, and finding justification for best practices with the C-suite. Many sections are nothing more than easy-to-follow checklists, so retrieving the information is remarkably simple and quick.   </p><p>The broad range of topics addressed in the book makes it impossible for the authors to dig too deep on any single issue, so many of the sections do not offer full explanations. This, however, does not take anything away from the quality or usefulness of the book. </p><p>The concepts are outlined in carefully selected paragraphs that provide just enough detail to jog the memory or provide a starting point for further research from more-focused sources. All in all, this book offers great ideas and best practices for a broad range of security topics, not just physical security.</p><p><em><strong>Reviewer: Yan Byalik, CPP,</strong> is the security administrator for the City of Newport News Virginia. He is a graduate of the Virginia Tech Corps of Cadets and has worked in a variety of security roles in higher education, amusement park, and telecommunication security sectors since 2001. He is the assistant regional vice president for ASIS Region 5A in southeast Virginia.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/On-Site-and-Cloud-Access-Control-Systems.aspxOn-Site and Cloud Access Control Systems<p>​Back in the 1970s, electronic access control systems were rudimentary by today’s standards. Those early systems consisted primarily of simple keypads for inputting PIN (personal identification number) codes, or ID cards and readers using magnetic stripe or Wiegand technology to grant or deny access while also maintaining a record of user access. There were few choices when it came to options, integration, and vendors.</p><p>Fast forward to today: now access control systems are frequently the main control platform in a physical security system. These evolved systems allow authorized staff to move freely while keeping a facility or an area secure—and they do much more. Network connectivity allows integration with security subsystems, as well as with business and operational systems such as retail and HR functions. Open architecture designs allow for compatibility with multiple technologies. Smartphones are becoming a mainstream tool in access control systems, and they can sometimes be used in place of an access card. </p><p>Even the most basic access control solution provides some level of tracking, auditing, and reporting. The combination of advanced functionality, flexible features, and integration with other systems allows current systems to provide in-depth information that far exceeds the capabilities of earlier systems.</p><p>Considering these many sophisticated features and functions can be a challenge for the end user, who must not only select an access control system but also determine how and where it will be managed and which solution best meets the organization’s financial and operational needs. Because physical security is vital to the protection of people, premises, and assets, it’s a decision that requires understanding of the technology and the applications. Following are a few examples of the options available for managing an access control system and where they are best suited.</p><h4>Credential Type</h4><p>In addition to incorporating biometrics and other advanced access credentials, today’s solutions can support PIN pads, magnetic stripe and/or Wiegand cards, proximity readers, and other technologies that organizations already use. This provides customers with the flexibility to select the credential type that best suits their needs. </p><p>For example, magnetic stripe and Wiegand access cards offer the convenience of embedding user-specific information in addition to access privileges. Because they incorporate embedded wires as opposed to magnetic material and can be used with contactless sensors, Wiegand technologies are less susceptible to extreme temperatures and other hostile environments. Cards used in systems that require contact with readers suffer from wear and tear and therefore must be replaced on a regular basis.</p><p>Proximity readers offer tremendous ease of use and the ability to quickly deactivate lost cards and issue new credentials. Because no contact is required between card and reader, credentials don’t suffer from the wear and tear common with magnetic stripe and Wiegand systems. </p><p>PIN pads are often employed for single-door applications, and their lower cost makes them attractive to organizations with limited budgets. They are extremely easy to use but also less secure, because users can easily share their codes with others.</p><p>In addition to cost, security level, and system size, organizations must also consider each technology’s ability to work with a range of access control software, as well as the ability to deploy and manage the solution using any or all of the below models.</p><h4>User-Managed on Site</h4><p>In this scenario, the customer purchases or leases equipment from an authorized reseller/integrator, who installs the system and provides training. A service contract may be included in the sale or lease. The customer is responsible for all programming activity on the dedicated PC, including data entry and updating for names, scheduling, reports, backup, and software updates. Depending on the system, badging may also be included. Other than the installation and training and any service agreement, the reseller/integrator has no additional responsibility.</p><p>Systems managed by the user on site are ideal for small to medium-sized businesses, local government offices, sporting facilities, and the like, where one or two individuals are tasked with maintaining the database, software upgrades, and infrastructure maintenance.  </p><h4>User-Managed Cloud </h4><p>Like the on-site user-managed scenario, this version starts with equipment that is purchased or leased from an authorized reseller/integrator, who installs the hardware and provides training. The difference is that the software is in the cloud and is managed, along with the supporting infrastructure, by the integrator or service provider. All backup, software upgrades, system monitoring, programming, scheduled door locking and unlocking, and other vital access control actions are performed remotely by professional monitoring providers. The user may manage only the simple functions of entering, deleting, and modifying names, and possibly badging via a Web portal.</p><p>User-managed cloud systems work well for sites with few or no IT staff—such as franchise locations or property management sites. Each location can handle the day-to-day functions of database maintenance and scheduling via a Web portal, but reports, applying patches and updates, backup, and other group functions are handled in the cloud by the integrator. One useful advantage of this scenario is that the browser application can be accessed at any time and from any device by the user. </p><h4>Remotely Managed Cloud   </h4><p>The user has little or no access to the head end software in this scenario, and all activity is performed by the service provider. Sometimes known as ACaaS (Access Control as a Service), this service is popular with enterprise-level organizations. Hardware can be new or legacy, owned or leased. When modifications are required, the service provider makes the changes. Reports can be run and sent to the end user on a scheduled or as-requested basis. Credentialing is also handled by the service provider.</p><p>Access control systems for several organizations may be hosted in the cloud by the service provider, and the security of the data is ensured with AES encryption. Multilayered filtering and partitioning allows end users to access only their own information (cardholders, access groups, hardware, etc.), while the service provider has full access to all customers’ data.</p><p>By working with a knowledgeable technology partner, such as an integrator or vendor, users will find the help they need to identify which of these solutions best meet their needs. Expertise and experience can help the end user make better and more confident decisions about an access control installation.</p><p><em>Robert Laughlin is president at Galaxy Control Systems. </em></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Threats-to-Health.aspxThreats to Health<p>​<span style="line-height:1.5em;">Joseph Sweeney served as a New York Police Department officer for 21 years and ran his own security company—witnessing the full range of crimes and sticky situations that the Big Apple has to offer—but he never guessed what challenges were in store when he became the director of hospital police at Bellevue Hospital Center in 2010. “You can’t shut the doors and walk away. You have to deal with whatever happens. It’s a 24-7 business, and you can’t turn anybody away,” Sweeney says. “It’s like being in charge of a small city.”</span></p><p>Today, healthcare security directors like Sweeney are in charge of small cities with growing crime rates. According to a 2014 crime survey conducted by the International Association of Healthcare Security and Safety (IAHSS), the rate of violent crime in American healthcare facilities rose by 25 percent from 2012 to 2013, and the rate of disorderly conduct jumped by 40 percent. </p><p>Jim Stankevich, a past president of IAHSS, tells Security Management that the survey results reflect the need for comprehensive physical security in hospitals, especially visitor management systems—a tool that he admits isn’t always conducive to the open environments of traditional hospitals.</p><p>“Every hospital technically should know every person that enters a facility, why they’re there, and where they’re going, whether it be a contractor, vendor, patient, or visitor,” Stankevich says. “The problem is many hospitals are over 50 years old, and they probably have up to 50 entrances on the ground level, which makes it kind of impossible for them during normal business hours to really control that access.”</p><p>Sweeney points out that the hospital industry—even the security aspect—is a customer service business. “There’s an emphasis on the patient experience, and we’re a part of that,” he says. The balance between creating an open, customer-oriented environment and keeping those customers safe is a challenge, Sweeney notes.</p><p>The increase in active shooter scenarios, crime numbers, and the routine threats hospitals face on a day-to-day basis all combine to make physical security at healthcare facili­ties more important than ever. Whether it’s at a metropolitan hospital, a network of nonprofit healthcare facilities, or a research-based medical center, security directors have to employ a combination of training and technology to keep their small cities secure. ​</p><h4>Medicine in Manhattan </h4><p>Bellevue Hospital Center was founded in 1736 and is the oldest continuously operating hospital in the United States. In 2013, it housed 828 beds, and more than 115,000 people visited its emergency room. More than 80 percent of Bellevue’s patients are from New York’s medically underserved population.</p><p>Sweeney, who oversees the peace officers stationed throughout Bellevue, says the hospital’s open atmosphere presents a number of challenges when it comes to securing the facility. Many buildings in New York require identification and screening upon entering, but Bellevue’s open environment during daytime hours allows people to come and go freely, he explains.</p><p>“In a sense, we’re the softest target left, especially in Manhattan,” according to Sweeney. “You go to any other building in Manhattan and it’s difficult to get into, but the hospital is the one place that’s open. That’s the philosophy here, and I don’t disagree with that. But it does make it more challenging for security.”</p><p>Hundreds of patients, visitors, doctors, and staff move in and out of Bellevue every day, and Sweeney says one of the most difficult parts of keeping everyone safe is managing the wide variety of people who come and go. </p><p>“These are folks who are outpatients or they’re presenting themselves to the hospital for some type of service, but they have some sort of psychiatric issue, and it’s very challenging to deal with, but we can’t turn them away.” Sweeney notes. “I’d say the biggest challenge for anybody in the healthcare industry is dealing with somebody who’s emotionally disturbed or even just upset—people are sick and dying, their loved one is sick or in pain or dying, and it’s a very challenging environment.”</p><p>Indeed, the IAHSS report found that 93 percent of assaults in healthcare facilities were directed at employees by patients or visitors. This is why Belle­vue’s security officers are thoroughly trained to de-escalate almost any situation, Sweeney explains.</p><p>“We’re a part of the patient experience, and we’re a part of making sure that these people get the care that they need,” he says. “At the same time, we’ve got to keep the place safe.”</p><p>When Sweeney first came to Bellevue, no identification was required to access any area of the hospital. Over the past five years, he’s helped implement restricted access areas within the hospital with the help of access control technology while still committing to providing a positive experience for visitors, he explains.</p><p>“We couldn’t survive without the technology,” he says. “It’s really allowed us to focus our people where they need to be, and that’s important to have a good balance because this is a people business.”</p><p>For example, areas in the hospital with psychiatric patients are equipped with silent panic buttons that alert security officers of an incident. “When you’re dealing with a psychiatric patient, you don’t want to escalate the situation,” Sweeney notes. “You don’t want to call and say, ‘Hey, police, this guy is getting aggressive, come and help me.’ Just saying that makes the person more aggressive.”</p><p>Access control technology also helps keep vulnerable patients safe. Patients in Bellevue’s brain injury unit who are unable to make informed decisions for themselves are fitted with electronic tags, and security officers are notified if a patient attempts to leave his or her designated area. The hospital also uses the tags on infants in the maternity ward to track where they go and automatically lock the nursery doors should someone attempt to leave with a baby. </p><p>When it comes to preparing for out-of-the-ordinary incidents, Sweeney says he puts more emphasis on training security officers to think outside of the box rather than to follow specific protocols for a certain emergency, whether it’s a natural disaster, active shooter, or bioterrorism incident. </p><p>“We have that ‘what if’ mentality, so that if something happens we’re not totally taken by surprise,” he explains. “Those real-life drills of what we’ve done in those circumstances have trained us for the next one.”</p><p>And Bellevue has certainly seen its fair share of real-life drills. Sweeney recalls closing and evacuating the hospital during Hurricane Sandy in 2012, working around power outages and staffing shortages caused by blizzards, and more recently, housing a patient infected with the Ebola virus. </p><p>“A lot of the different things we had to deal with during Sandy, we had already had little pieces happen before, whether it was a telecommunications failure, or a power failure, or elevators knocked out,” he explains. “We’re trained to take each experience, whether it’s a real experience or a drill, and put it in our toolbox and make it adaptable so that when something similar comes along we know how to handle it.”</p><p>And although staff and security were given additional training on how to deal with potential Ebola patients, Sweeney says a lot of the same protocols—creating clean zones and hot zones and suiting up in personal protective gear—were brought over from previous bioterrorism training.​</p><h4>Pittsburgh’s Provider</h4><p>Jeff Francis jokingly calls the University of Pittsburgh Medical Center (UPMC) “one of the biggest companies that people have never heard of.” UPMC is a nonprofit network of 21 full-service hospitals and hundreds of ancillary facilities throughout western Pennsylvania. The hospitals treat more than 690,000 emergency patients annually and have more than 5,100 beds. </p><p>Francis, the security director of UPMC’s facilities, was a police officer in the Pittsburgh region before he joined UPMC a decade ago. Like Sweeney, he says he was surprised by the wide variety of threats that needed to be managed.</p><p>“Hospitals are the confluence of pretty much every risk factor that can exist as far as the propensity of violence is concerned,” Francis says. “In a hospital, you have a lot of controlled substances, you have a lot of behavioral health issues, and a hospital by its nature is a very high-stress environment in terms of patients, their families, and even the staff.”</p><p>UPMC’s security team is made up of more than 500 security professionals, including 130 armed police officers—the organization’s campuses have their own police departments. Francis is in charge of developing and maintaining the infrastructure needed to keep staff, patients, and visitors safe. </p><p>Security is assessed on a facility- by-facility basis, and Francis says he relies on access control and analytics systems to keep each location secure. Some facilities, like UPMC’s children’s hospital and behavioral health facilities, are 100 percent access controlled and have multiple layers of screening, he explains. </p><p>“Every visitor is screened by metal detectors, as well as assuring that you are registered there ahead of time so you have a reason to be there, so we confirm that there is a patient for you to see and a patient is expecting you,” Francis says. “In those cases, everybody gets a badge, you have to check in, check out, and you’re monitored pretty closely.”</p><p>On top of those precautions, the chil­dren’s hospital screens each visitor against a sexual offender registry upon entry. </p><p>Francis notes that finding a balance between protecting vulnerable patients and allowing visitation can be tricky. “We can’t lock these things down like a prison,” he says. “If someone is coming to visit a sick relative in a hospital, they don’t want to be treated the same way as if they’re going to visit a prisoner. So we have to maintain this balance between this open therapeutic environment [and managing] all these risk factors that make hospitals dangerous.”</p><p>Facilities with fewer at-risk patients are more open, Francis says. During business hours, people can walk in freely, and during off hours visitors must sign in and out. </p><p>With such a wide variety of healthcare facilities to secure, Francis relies on data-driven decision making. UPMC hospitals use D3 Security incident management software that tracks not only security and police activity, but also specific statistics, such as the number of people who enter through metal detectors, the percentage of those people who carry in banned items, and what those items are. This type of data allows Francis and his team to address trends in individual hospitals or throughout the UPMC system. </p><p>“Training topics are determined by the types of issues that we’re seeing in tracking,” Francis explains. “We’ll see spikes in certain incident types through our informational analysis, and we know we need to address that through training or other remediation processes.”</p><p>UPMC also uses risk assessment tools on individuals suspected of being a danger, Francis says. “If we have a reason to suspect that this person is prone to a violent act, technology is at the forefront for our risk assessment of that person,” he explains. “Have they been violent in the past? Do they have a criminal record? How many incidents do we have across the system that might involve that patient?”​</p><h4>Research and Recovery</h4><p>St. Jude Children’s Research Hospital in Memphis, Tennessee, is more than just a healthcare facility. The 27 buildings on its 62-acre campus house cutting-edge medical research teams and equipment, a convention center, 67,000 young patients annually, and extended-stay housing facilities for the families of those patients. </p><p>St. Jude is 100 percent donor funded and it treats children with cancer at no cost to the family. Shawn Young, the security systems coordinator at St. Jude, says he tries to be a good steward with the donor money while keeping the unique campus secure.</p><p>The combination of vulnerable patients, visitors, and researchers coming and going at all hours makes access control and visitor management vital to campus operations, according to Young. The entire campus is fenced in, and guests must check in with a security officer. Visitors are encouraged to preregister, and once they’re approved, their credentials are taken, they receive a badge, and are escorted to the correct building. </p><p>More than 600 doors at St. Jude are fitted with card readers, and Young says a staffed control room monitors entry and exit points at all hours. Guards are also present at the three extended-stay facilities on campus. </p><p>St. Jude uses video cameras for both security and treatment, which can be challenging in hospital environments due to the Health Insurance Portability and Accountability Act (HIPAA) privacy laws. Doctors and technicians use live video feeds to keep an eye on patients who need extra supervision. “We’re not recording any of it, but it’s really the first time in the history of the hospital that we’ve actually used video for any kind of clinical care and monitoring any kind of treatment,” Young says. </p><p>In the six years since Young started working at St. Jude, the campus’s video footprint has doubled—more than 400 cameras are coordinated throughout the campus. “We’re large and it looks like we’re going to get even larger,” he says. </p><p>In fact, a new combination research and treatment building partially opened last year. The first floor serves as a convention and collaboration center, the second floor is a traditional surgery and intensive care facility, and higher floors will house a computation biology department and a proton therapy unit—one of 14 in the United States. Young says the multiuse building presented some unique safety challenges, but he’s been involved in the security design from the start. This collaboration allowed Young to lay out the placement of cameras and card readers, he explains.</p><p>“We have a great relationship with our design and construction department, and we’re lucky to be pulled into these before we have a set plan in place,” Young says. “We were involved almost from the very beginning.”  </p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465