Security, Professional, and Business Services 2017 Product ShowcaseGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-04-01T04:00:00ZSM Staff<p></p><p><img src="/ASIS%20SM%20Callout%20Images/Everbridge%20Rd3%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" /></p><h4>EMPLOYEE SAFETY</h4><p>Employers that have a mobile workforce, distributed teams, or large campuses may have difficulty tracking employees' locations, schedules, and travel in case of location-based critical incidents. Everbridge of Burlington, Massachusetts, introduced the Everbridge Safety Connection to help businesses and organizations quickly locate and communicate with their people. The solution aggregates geo-location data from multiple systems so that administrators can reach out to those who are potentially at risk, including employees, contractors, and visitors. Booth 3040, Circle 422.</p><p> </p><h4>MOBILE ACCESS<img src="/ASIS%20SM%20Callout%20Images/DSX%20rd3%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:72px;" /></h4><p>DSX Mobile Command from Dallas-based DSX Access Systems, Inc., brings the power of the DSX workstation program to the convenience of a smartphone. The mobile command feature allows the activation of custom predefined commands, locking and unlocking of doors, control of alarm points, and monitoring of system events from a mobile but secure application. Apple- and Android-compatible, it enables global functions such as building and campus lockdown, incident response reconfiguration, and more. Repetitive chores like momentarily unlocking a door or granting access to a gate can be programmed into command buttons for easy activation. Booth 7103, Circle 423.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Hikvision%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:282px;" />VIDEO MANAGEMENT</h4><p>The Blazer Express from Hikvision of Zhejiang, China, is an intelligent video management station that manages Hikvision IP cameras with three primary functions. It's a Windows-based NVR with a solid-state-drive operating system. It accommodates 16 or 32 cameras with 16 built-in PoE inputs for IP cameras, and up to 24 terabytes of onboard storage. The Blazer Express manages live video and playback from up to 15 remote NVRs. It offers powerful video analytic searches and point-of-sale integration. Booth 18037, Circle 424.</p><p> </p><h4>INTEGRATED SECURITY<img src="/ASIS%20SM%20Callout%20Images/G4S%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:138px;" /></h4><p>G4S Secure Solutions of Jupiter, Florida, has a 100-year legacy of innovation in the security business. New processes assess and thwart security risks, while new technologies help security personnel execute their jobs more efficiently. Integrated Security Solutions address today's security challenges in four steps: ASSESS and evaluate risks; EQUIP personnel with technology for efficient and effective protection; INTEGRATE solutions with the customer's company, technology, and environment; and STAFF the solution with the correct trained personnel in the right roles and numbers. Booth 10053, Circle 425.</p><p> </p><h4><img src="/ASIS%20SM%20Callout%20Images/SDC%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:265px;" />DOOR OPERATOR</h4><div><p>The Auto EntryControl Swinging Door Operator from Security Door Controls of Camarillo, California, provides hands-free, low-power, point-of-entry door control to help meet ADA requirements for door installations in storefronts, office buildings, campuses, and healthcare facilities. With its safe and reliable electro-mechanical drive and slim-line design, the microprocessor-based unit is self-tuning and self-learning. It offers non-handed operation, full mechanical stops, and a variety of interface options for sensors, push-plates, fire alarms, and electrified locks. It meets the ANSI standard for compliance with the Americans with Disabilities Act. Booth 21109, Circle 426.</p><p>​ </p><h4>PORTABLE DETECTOR<img src="/ASIS%20SM%20Callout%20Images/Garrett%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:74px;" /></h4><p>The Walkthrough Caster Set from Garrett Metal Detectors of Garland, Texas, is ideal for stadiums, special events, and school use. The casters, which can be permanently attached, allow full mobility of a Garrett PD 6500i walkthrough metal detector by one person. Detectors can be moved to a secure location when they are not in use and provide an unimpeded exit at the close of an event. The caster assembly is constructed of durable, powder-coated steel for use in all types of environmental conditions. Booth 16127, Circle 427.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Axis%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:139px;" />DOME CAMERA</h4><p>The AXIS Q6155-E PTZ Dome Network Camera from Axis  Communications of Chelmsford, Massachusetts, is a pan-tilt-zoom model with laser focus, offering much faster and more accurate autofocus even in the most challenging lighting conditions. The new laser focus technology combined with high image quality allows people and objects to be identified quickly and precisely. The camera offers HDTV 1080p resolution and 30x optical zoom. The camera also has Axis' Zipstream technology, which lowers bandwidth and storage requirements while keeping necessary forensic details. Booth 14051, Circle 428.</p><p>​ </p><h4>COUNTERSURVEILLANCE<img src="/ASIS%20SM%20Callout%20Images/REI%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:90px;" /></h4><p>Research Electronics International (REI) of Algood, Tennessee, introduced the ANDRE Near-field Detection Receiver, a handheld broadband receiver that detects known, unknown, illegal, disruptive, or interfering transmissions. The ANDRE locates nearby RF, infrared, visible light, carrier current, and other types of transmitters. The ANDRE Advanced Kit includes a wide range of accessories specifically designed to receive transmissions across a 1 kHz to 6 GHz frequency range. It presents signal responses on a touchscreen display in the form of a histogram that shows signal strength over time. The device's frequency counter generates an automatic signal list and detailed frequency band classification. Audio mode accesses analog audio demodulation, playback, and recording. Booth 19124, Circle 429.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/VUE%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:165px;" />SECURE STORAGE</h4><p>The VUE Locker from Chicago-based features an open mesh design and a welded-on hardened steel hasp that resists cutting and hammering, keeping items safe and untouched. The welded construction of expanded metal and the heavy-duty, powder-coated finish hold up in the harshest industrial settings. The company's aesthetically pleasing, custom-designed solutions allow quick visual inspection of stored goods, ventilation, and peace of mind. Booth 22150, Circle 430.</p><p>​ </p><h4>SECURITY MANAGEMENT<img src="/ASIS%20SM%20Callout%20Images/AMAG%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:145px;" /></h4><p>AMAG Technology, Inc., of Torrance, California, offers a security solution that manages access control, video surveillance, intrusion detection, identity management, visitor management, and incident management. Powered by a robust, policy-based platform, it helps security managers reduce risk, reduce cost, and maintain compliance. The Symmetry Security Management System provides intelligent networked solutions scaled to manage security challenges from small, remote facilities to multinational organizations around the world. Booth 11053, Circle 431.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Cognitec%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:143px;" />VIDEO SEARCH</h4><p>FaceVACS-VideoScan video screening and analytics technology from Cognitec Systems Corporation of Dresden, Germany, now allows users to perform complex searches on persons appearing in camera streams and stored media files. Users can upload videos recorded at a specific location and time to track possible participants in a crime. They can find a person enrolled in an image database or search for an unknown person and locate their appearances in multiple videos. Person searches can be filtered by age ranges, gender, ethnicity, and glasses. A special IP video camera with built-in face detection and tracking technology is a component of the system. Booth 17127, Circle 432.</p><p> </p><h4>GLOBAL INTELLIGENCE<img src="/ASIS%20SM%20Callout%20Images/NC4%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:209px;" /></h4><p>NC4 Risk Center provides security professionals with timely, comprehensive global threat and incident information about physical hazards that may have an adverse effect on physical security, personnel, supply chains, and other mission critical infrastructure within the organization. NC4 of El Segundo, California, has a dedicated team of skilled analysts working to create situational awareness by monitoring, gathering, analyzing, reporting, escalating, and responding to incidents and events that threaten an organization's resilience. NC4 Risk Center aggregates and integrates information from public and private sources to bring users a highly configurable presentation of relevant information for operational risk management. Booth 33096, Circle 433.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Gaitronics%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:83px;" />RUGGED PHONES</h4><p>GAI-Tronics of Mohnton, Pennsylvania, announced a new line of Behavioral Health Telephones, which meet the stringent standards set forth by the U.S. Department of Veterans Affairs and the Design Guide for the Built Environment of Behavioral Health Facilities. Designed with the safety of both staff and tenants in mind, the phones come in a variety of styles. They feature stainless steel construction and an armored 12-inch cord for handset models. They can be mounted in robust surface mount enclosures. The phones are available in both analog and VoIP configurations and some models can be used indoors or outdoors. Booth 2037, Circle 434.</p><p>​ </p><h4>TAILGATE DETECTION<img src="/ASIS%20SM%20Callout%20Images/Detex%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:150px;" /></h4><p>Detex Corporation of New Braunfels, Texas, offers dependable panic hardware for restricted secure areas, where unauthorized entry must be controlled and authorized entry must be quick and reliable. The Tailgate Detection System ensures that only one person enters a door for each authorized card read. It is compatible with most access control technologies, is easy to retrofit, and has an integrated door prop alarm for extra security. Booth 19109, Circle 435.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Parkut%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:174px;" />SECURITY BOOTHS</h4><p>Par-Kut International, Inc., of Harrison Township, Michigan, manufactures bullet-resistant security booths for high-security locations. The enclosures meet protective levels UL8, NIJ4, and higher and can be engineered to meet blast load requirements. In addition to HVAC, options include reflective glass, gun ports, anti-fatigue floor mats, dimmable interior lighting, and generators. They can be built on trailers or on top of towers. Bullet-resistant guard booths can have a very basic appearance or incorporate design enhancements to blend with surroundings. Circle 436.</p><p>​ </p><h4>PERSONAL SAFETY<img src="/ASIS%20SM%20Callout%20Images/Verint%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:190px;" /></h4><p>Verint of Melville, New York, introduced the Mobile Reporter phone application, which enables users to immediately alert security to a potential security issue—regardless of their location. The app will send critical updates to the command center in a wide variety of formats, such as a simple SOS alert, text message, detailed report form, photo, and live audio and video. The technology can be leveraged for a wide variety of applications, including executive travel, remote employees, outside contractors, and visitor safety. When alerted, the command center gets a single view of users, their locations, and their current status. The system offers a variety of mechanisms to initiate active or passive tracking of people through their devices and bi-directional communication with the device. Booth 2097, Circle 437.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Quantum%20Secure%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:250px;" />IDENTITY ACCESS</h4><p>The SAFE Sports and Events Access Manager from San Jose–based Quantum Secure—part of HID Global—enables secure and rapid entry to stadiums and other venues, providing security for temporary or limited-engagement events. The mobile app solution removes the need to rely on clipboards and lists to manage contractors, vendors, volunteers, and other nonticketed individuals who need temporary access to a venue. The solution also integrates with IT systems and multiple handheld devices for swift, accurate real-time validation and immediate onboarding and provisioning for a variety of identity types based on access permissions. The solution also records identity access logs to track key operational and security metrics and streamline compliance processes. Booth 11063, Circle 438.</p><p> </p><h4>IP CAMERAS<img src="/ASIS%20SM%20Callout%20Images/Honeywell%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:209px;" /></h4><p>Honeywell of Northford, Connecticut, expanded its Performance Series IP Family to include new, affordable, easy-to-install 1080p and 4MP wide dynamic range IP cameras. The new cameras deliver high-quality video, a superior user experience, easy video integration with other solutions, and improved user account security with enhanced risk reduction, lowering installation, operation, and maintenance costs. The range includes 15 new IP cameras in mini dome, micro dome, ball, and bullet designs. Select cameras include motorized focal zoom technology, which auto-focuses the lens after zooming. Booth 14025, Circle 439.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Comnet%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:181px;" />ETHERNET TRANSPORT</h4><p>ComNet, Communication Networks of Danbury, Connecticut, introduced the ComNet CTS24+2, which offers up to 24 ports of 10/100Mbps Ethernet and two ports of Gigabit uplink using TX or SFP combo ports. Up to three eight-channel modules can be used. These modules are offered in CAT5/6 10/100Mbps Ethernet, optical 100FX SFP, or CopperLine Coax or UTP extending interfaces. Booth 4071, Circle 440.</p><p>​ </p><h4>INTERCOM ACCESS<img src="/ASIS%20SM%20Callout%20Images/Talkaphone%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:234px;" /></h4><p>The Complete IP Door Intercom System from Talkaphone of Niles, Illinois, is a fully integrated access control package with head-end IP video attendant station and two-way IP call station. The VOIP-201C3-SYS package includes the VOIP-201C3 Call Station that connects with the AVM-1 IP video attendant station to provide a one-stop solution. The AVM-1 can monitor and regulate entry points through the call stations using video and voice communications. Easily install it at any access point to intelligently control customer or employee entry or exit. The included VOIP-201C3 surface mounted call station with an ONVIF-compliant wide-angle megapixel IP camera is constructed of IP66-rated, vandal-resistant, marine-grade stainless steel. An additional Ethernet port is provided to support connection to optional Ethernet devices. The call station also allows for remote software upgrades, configuration, and monitoring. Booth 10109, Circle 441.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Avigilon%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:150px;" />VIDEO ANALYTICS</h4><p>Avigilon Appearance Search from Avigilon of Vancouver, British Columbia, Canada, is a sophisticated, deep-learning, artificial intelligence search engine for video data. It easily sorts through hours of footage to quickly locate a specific person of interest across all cameras on an entire site. It can help track a person's route and identify previous and last-known locations to improve incident response time and enhance forensic investigations. Avigilon Appearance Search technology integrates with Avigilon Control Center 6.0 Enterprise edition software, Avigilon cameras with self-learning video analytics, and select NVRs. Booth 22043, Circle 442.</p><p> </p><p>​ </p><h4>SECURITY REVOLVING DOORS<img src="/ASIS%20SM%20Callout%20Images/DormaKaba%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:204px;" /></h4><p>Facilities requiring controlled access of authorized personnel to sensitive areas can rely on security revolving doors from dormakaba of Winston-Salem, North Carolina. The doors combine convenience with performance, providing a practical and secure solution for any interior access point. Doors are designed to harmonize with traditional or modern environments. All models are available in a wide variety of finishes and can be configured to allow essential and safe passage. A sophisticated sensor system in compliance with current safety standards prevents possible injury. Depending on the security requirements, the door may be equipped with a contact mat, scales, or internal monitoring. Booth 8053, Circle 443.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Keyscan%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:201px;" />ACCESS SOFTWARE</h4><p>Keyscan of Whitby, Ontario, Canada, offers Aurora access control management software, which seamlessly integrates with Kaba E-Plex wireless locks to provide a single software platform solution. New features include Microsoft-certified webcam support, plus integrations with video management systems such as Salient Systems, biometric readers from BioConnect and Suprema, and visitor management from EasyLobby. Keyscan networked access control systems are designed for applications in all vertical markets. Booth 8053, Circle 444.</p><p>​ </p><h4>ETHERNET OVER COAX<img src="/ASIS%20SM%20Callout%20Images/Altronix%20Box%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:246px;" /></h4><p>The eBridge800E Managed 8-port EoC Receiver with integral PoE+ switch is the head-end solution for upgrading coax to IP. New from Altronix of Brooklyn, New York, the compact 1U rack unit features two 1GB uplinks, an 8-port PoE+ switch, and CAT-5 to coax media converter. IP devices can be deployed up to 300 meters away, and a built-in battery charger ensures seamless operation. LINQ technology allows users to monitor, control, and report power/diagnostics from anywhere over the network. The unit is made in the United States and has a lifetime warranty. Booth 11073, Circle 445.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Winsted%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:135px;" />CONSOLES</h4><p>Impulse Dual Sit/Stand consoles from Minneapolis-based Winsted Corporation combine ergonomics and operator comfort. Studies show that prolonged sitting can be detrimental to one's health, and that alternating between sitting and standing can increase energy and reduce fatigue. The consoles provide two independently adjustable, ergonomically curved work surfaces. These surfaces can be raised and lowered to meet the needs of individual operators while offering flexibility to sit or stand. Options include electric-lift legs for adjusting the work surface height from 30 to 46 inches at the push of a button, three programmable height settings, and a load capacity of 520 pounds. Booth 14109, Circle 446.</p><p>​ </p><h4>SECURITY MANAGEMENT<img src="/ASIS%20SM%20Callout%20Images/Genetec%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:168px;" /></h4><p>Genetec of Montreal, Quebec, Canada, unveiled the latest version of Security Center, its unified IP security platform. Security Center 5.6 includes an updated HTML5-based Web client, new security hardware integrations to SimonVoss electronic locks and the Mercury Security MS Bridge, and the ability to use license plates as access control credentials with the new AutoVu SharpV camera. As a Mercury Security Platinum-Elite partner, Genetec now officially supports a new integration to the Mercury Security MS Bridge that allows organizations to economically migrate to an open access control platform while protecting their existing investment. Booth 28055, Circle 447.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Abloy%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:125px;" />WEATHERPROOF LOCKS</h4><p>Abloy Security of Irving, Texas, offers a range of tough locks that can withstand severe weather conditions and environmental extremes. ABLOY PROTEC2 CLIQ LED key and interface make it easy to retrofit mechanical locks with electromechanical models. There are no batteries in the locks, because the power comes from the key. CLIQ technology provides audit trails in both the lock and the key, flexible time functions, and immediate removal of lost keys. All padlocks feature case-hardened boron-steel shackles and hardened steel UL-listed cylinders. Patent-protected keys can also open ABLOY door locks, and the keys cannot be duplicated. Booth 8061, Circle 448.</p><p>​ </p><h4>PROTECTIVE COVERS<img src="/ASIS%20SM%20Callout%20Images/STI%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:140px;" /></h4><p>STI tough polycarbonate covers from Safety Technology International, Inc., of Waterford, Michigan, help prevent theft and vandalism to larger keypads, access controls, volume and lighting controls, and other similar devices. Molded of clear polycarbonate, which is the same material used in football helmets, each protected unit can be clearly seen and quickly identified. The cover has a strong piano-style hinge, enclosed back box, gasket, and lock. Other models are available. Booth 30044, Circle 449.</p><p> </p><h4><img src="/ASIS%20SM%20Callout%20Images/Commport%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:201px;" />UNDER-VEHICLE INSPECTION</h4><p>The CPAS enhanced under-vehicle surveillance systems from Comm Port Technologies of Cranbury, New Jersey, has been re-engineered with advanced metal alloys to support up to 78 tons. Security personnel can view the entire length of a vehicle in real time and full color. Full high-definition color is supported even with vehicles moving up to 75 kilometers per hour. As part of the updated package, CPAS now includes a driver image camera, automatic number plate recognition, templates, and automatic comparison software all bundled together. Booth 352, Circle 450.</p><p>​ </p><h4>ANTI-TAILGATING SYSTEM<img src="/ASIS%20SM%20Callout%20Images/DSI%20Final%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:135px;" /></h4><p>Designed Security, Inc., (DSI) of Bastrop, Texas, introduced the Entry Sentry, an optical security device that detects multiple persons entering a doorway on a single valid authorization. It uses proprietary sensing technology to detect direction and tailgating, and it is compatible with all card reader technologies and access control systems. The system mounts easily on standard door frames and hallway walls. Entry Sentry consists of two self-contained, narrow door- or wall-mounted units that provide both local and remote alarm indications. Booth 19109, Circle 451.</p><p>​ </p><h4><img src="/ASIS%20SM%20Callout%20Images/Mercury%20Final%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:168px;" />SECURITY PANELS</h4><p>Mercury Security Products, LLC, of Long Beach, California, released the new MS Bridge series. New MS Bridge multi-device interface panels are designed to fit the specific physical parameters of Software House Pro Series access systems, and they can be easily installed for a changeover to the Authentic Mercury open platform. The award-winning solution provides a cost-effective and streamlined path to move beyond the limitations of proprietary hardware for feature-rich access control. The Authentic Mercury model also allows customers to choose from industry-leading access control software providers, both at time of product selection and in the future as their needs evolve. Circle 452.</p></div>

Security, Professional, and Business Services 2017 Product Showcase Crimes in 2015 2017 Industry News Model 101 News October 2016 To Host First Security Week 2016 Product Showcase Security Triumvirate in Orlando Online January 2016 2015 Product Showcase to Manage a Merger Seminar Product Showcase Persuasion Review: The Handbook of Security Review: Three Sisters Ponds at Sea Trackers Infrastructure West 2015 Product Showcase,-Compensation,-and-Career-Paths.aspx2015-03-30T04:00:00ZBook Review: Security Careers: Skills, Compensation, and Career Paths

 You May Also Like... Casino Makes a Sure Bet<p>​<span style="line-height:1.5em;">Prov</span><span style="line-height:1.5em;">iding security is a game of strategy at Santa Ana Star Casino, located just 20 miles north of Albuquerque, New Mexico. “We approach the </span><span style="line-height:1.5em;">protection of assets in a multitier way,” says Dennis Edeal, director of surveillance at the casino.</span></p><p>This multifaceted approach is key to protecting guests who visit the casino, which houses 1,400 slot machines and more than 20 table games, several restaurants and bars, and a 36-lane bowling center. </p><p>The casino, owned and operated by the city of Santa Ana, falls under tribal gaming rules set by the Santa Ana Gaming Commission. That body takes existing rules from the National Indian Gaming Commission and applies them to local casinos. Security measures dictated by the national commission are considered minimum standards and more stringent security provisions are often applied. Every month, Edeal meets with the Santa Ana commission to stay up to date on these policies and procedures. “It’s basically an ongoing working relationship with them,” he says. </p><p>Because of casino rules, the 15 members of the surveillance team face unusual challenges. “There are a lot of controls when it comes to even just how the dealer pays out a bet. Is it sized in properly? Is the index finger dragged across the top of the bet properly? There are little things like that you get into in the subtlety of casino surveillance that you don’t see in other industries,” Edeal notes. </p><p>The control room at the casino is critical to surveillance operations. It was renovated and moved to the other side of the facility in August 2015. Edeal says that presented a good opportunity to up­grade the hardware and software used for surveillance, much of it from Hikvision products.</p><p>Edeal first came across Hikvision in 2007 when the casino moved from a VCR-based system to a digital recording system. The DVRs he chose were using Hikvision encoders to convert the camera signals from analog to digital. In 2011, he chose Hikvision for all digital recording at the casino, installing 40 DVRs and eight storage servers from the vendor. </p><p>During the recent upgrade, Santa Ana Star Casino replaced the 40 DVRs with 24 hybrid DVRs equipped with several Hikvision products, including iVMS-5200 software, new encoders, and 10 storage servers. The encoders allow the casino to integrate existing analog cameras into the IP video management system. The additional storage capacity provided in the upgraded equipment is necessary, Edeal explains, because video of any incident from the casino that could potentially be needed later is archived indefinitely. All other video is kept for 21 days before being automatically deleted. </p><p>The archived video has saved the casino from lawsuits on several occasions and, Edeal says, the surveillance team conducts numerous risk assessment reviews of the video footage. For example, in the bowling center, bowling lanes are oiled past the foul line. If someone crosses that line, they are likely to trip and fall. “There’s probably at least one of those a week that comes through where we have to determine, did they cross the foul line, is there any potential exposure to us from a liability standpoint?” </p><p>During another incident, a male guest tripped and fell on the casino floor. The casino archived the video, but didn’t hear back from the patron. Many months later, a lawyer called saying the man wanted to sue for pain and suffering.</p><p>“Because we have an archived video, we went back, looked at the situation, and the guest literally tripped over his own feet, and the video clearly showed that and the lawsuit just went away,” Edeal says. </p><p>A login allows operators to go into the system and pull video, as well as view and control the casino’s approximately 650 cameras. Edeal says he has a high level of control when it comes to setting permissions for operators to have access to certain cameras. “That’s one of the things I like about the [Hikvision] software,” he says. </p><p>Most of the cameras are standard definition, Edeal notes, because they are used only for basic surveillance purposes. However, Edeal says the casino is undergoing an upgrade to install more HD cameras. Those locations have been chosen strategically in case an investigation needs a higher-quality image. “I’m usually very targeted about where we’re going to add high-definition cameras as we continue to upgrade specific areas,” he notes. </p><p>For example, HD cameras are posted over table games to protect against cheating and to ensure that dealers are following policies and procedures with players. “We look at areas like cash handling and say, ‘Are they following the proper controls for how money is supposed to be counted in certain areas? Are they clearing hand​s when they’re supposed to? Are they shuffling cards the way they’re supposed to?’ And so we analyze those things on an ongoing basis.”</p><p>The Hikvision software has a feature called E-Map that provides officers with situational awareness in the event of an incident. “Staff can bring up a camera for a particular area and investigate a situation,” Edeal notes. Many of these cameras are pan-tilt-zoom (PTZ), which allow a greater level of control over what the camera is looking at.</p><p>Edeal conducted training with his staff on the upgraded software. He was able to pull a few cameras in for these sessions even though the control room wasn’t fully operational. “It was a learning curve, but they all took it pretty quickly–being familiar with the Hikvision product already on the control client really helped,” he notes.</p><p>Edeal says that because surveillance is viewed as mostly reactive, he tries to keep his staff engaged. He teaches them to take a proactive approach to their jobs–especially with all the controls they have to enforce in the gaming world. “I’m big on metrics, so I’m constantly evaluating how many camera patrols the staff does,” he notes. “What gets measured gets done so…I think the staff responds to that.”    ​</p><p><em></em><em>For more information: Hikvision,;; 909/895-0400</em><br></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 and Security: The Risks of Arming Security Officers<p>​Cinemark was not to blame for the 2012 shooting at its Aurora, Colorado, movie theater where gunman James Holmes killed 12 people and injured 70 more. A jury did not find a <a href="" target="_blank">lawyer’s argument compelling</a> that Cinemark should have provided armed security officers at the premier for <em>The Dark Knight Rises</em> because it was anticipating large crowds.</p><p>But should Cinemark have? Debates about armed security officers have flared up in the media and public discourse over the past few years. With the combination of a uniform and a firearm, armed officers may suggest a sense of security to the greater public, signaling that a business takes security and protection seriously. Others believe the presence of a gun merely stands to escalate dangerous situations.<br></p><p>The debate over the effect of firearms in such settings will not be settled anytime soon. But there are some things we do know about the consequences of arming security officers. Looking at it from an insurance perspective gives us a vantage to examine the risks and real-life consequences of arming security officers.<br></p><p><strong>Demand for Officers</strong><br></p><p>There are more than 1 million private security officers in the United States and about 650,000 police officers, according to the federal <a href="" target="_blank">Bureau of Labor Statistics (BLS)</a>. After several years of steep increases in the number of security officers, the field is expected to grow by a steady 5 percent every year, the BLS estimates. Private security officers, more and more, are the face of security in the United States.</p><p>In some industries, such as healthcare, armed officers are a growing presence. Crime in healthcare facilities is a serious issue, so hospitals are looking to provide stronger security. The percentage of healthcare facilities that reported staffing armed officers in 2014 was almost double the rate four years prior, according to an <a href="" target="_blank"><em>article in The New York Times. </em><br></a></p><p>“To protect their corridors, 52 percent of medical centers reported that their security personnel carried handguns and 47 percent said they used Tasers,” the Times reported, citing a 2014 survey by the International Association for Healthcare Security and Safety.<br></p><p>As discussed in a previous <em></em><a href="/Pages/The-Dangers-of-Protection-What-Makes-a-Guard-Firm-Low--or-High-Risk.aspx" target="_blank"><em>Security Management </em>article,</a> there’s been a pronounced demand for insurance for armed security officers at legal marijuana facilities. We can always expect there to be demand for armed officers at government facilities, though the demand at schools has decreased slightly.<br></p><p><strong>Pros and Cons of Armed Officers</strong><br></p><p>Many people perceive armed security officers favorably as a deterrent against violence and an assurance that a violent incident can be quickly quelled. From a client’s standpoint, it offers a perception of higher protection.</p><p>Armed security officers are widely accepted as warranted in certain locations where the threat level matches the use of force. Government contracts and high-profile corporate executives are protected by highly trained armed officers. At banks, the risk of robbery also justifies an armed officer.<br></p><p>But from an insurance and risk standpoint, it is difficult to craft a convincing argument for armed security officers in many settings. The presence of a gun is not proven to de-escalate a situation in every environment, and it is unlikely to deter violent and determined individuals. The presence of an additional firearm—even in an officer’s hands—only stands to increase the risk of casualties. This is particularly true of public or crowded environments, like stadiums, schools, and restaurants.<br></p><p>By looking at insurance claims, it’s clear that when a security officer discharges his or her gun, the resulting claims are serious. There is a big difference between an officer using mace and an officer using a gun. Claims resulting from the use of firearms are likely to breach insurance policy limits, so firms employing armed security officers are wise to purchase higher limits of liability than firms not employing armed officers.<br></p><p>When someone is shot by a security officer, his—or his estate—will likely sue the business that contracted the officer. And the security firm and officer are going to be brought into the suit as well—no matter how well-trained the officer. If it goes to trial, it is very rare for a judge and jury to believe use of the weapon was justified. It is almost always perceived as excessive force.<br></p><p>The insurance marketplace for security firms is very small, and employing armed officers reduces the market even further. This means firms that provide armed officers will be paying a higher premium for less coverage; they will most likely be relegated to the surplus lines insurance market, which can mean more policy exclusions. Therefore, it’s important for the security firm to weigh the increased costs and policy limitations of taking on an armed contract.<br></p><p><strong>Mitigating Risks of Armed Officers</strong><br></p><p>If a client insists on armed officers, there are steps that can be taken to reduce the risk of an officer discharging his or her weapon. </p><p>All officers should be checked against lists of individuals who are not permitted to carry firearms, in addition to the usual criminal background check. For armed posts, staff them with off-duty or former law enforcement officers; police receive extensive firearms training, as well as other training that helps them de-escalate challenging situations.<br></p><p>Consider local or state licensing requirements for armed security officers—they can vary by municipality. In some states, armed officers are not required to have special firearms training. For those states that do, officers and clients can be protected by ensuring that officers are trained to use firearms. Situational training, which is recommended for all officers, is particularly important for armed security officers as it teaches them to understand a judicious use of force for the environment they serve.<br></p><p>There are no easy, blanket answers to the question of whether to arm security officers. But looking at the risks and financial implications might help security leaders make decisions on a case-by-case basis.<br></p><p><em>Tory Brownyard is the president of Brownyard Group, a program administrator that pioneered liability insurance for security guard firms more than 60 years ago. He can be reached at or 1-800-645-5820.</em><br></p><p><br></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Questions Security Experts Should Ask in a Crisis<p>​<span style="line-height:1.5em;">I was on my way to work in December of 2012 when my cell phone started ringing. On the other end a voice asked: “Chief, where are you?”</span></p><p><span style="line-height:1.5em;">I told the supervisory deputy calling me that I was in my car, on the expressway. The deputy then cut in, saying “I think there was an escape from the Metropolitan Correctional Center. The deputies are over there and are saying the place is on lockdown because the count is off.”</span><br></p><p><span style="line-height:1.5em;">The count is off means a prisoner or prisoners are missing. I was only minutes away and assumed that by the time I got to my office, I would receive word that it was a mistake—all would be well with the world. </span><br></p><p><span style="line-height:1.5em;">I was wrong. Two inmates, held on bank robbery charges and awaiting sentencing, had escaped out of a window on the 17th floor. They’d scaled down the building on bed sheets and a homemade harness crafted from a medical stretcher. It was the first time an inmate had escaped from the center in downtown Chicago since 1983.</span><br></p><p><span style="line-height:1.5em;">During my career as an assistant chief deputy and chief deputy U.S. Marshal in the Northern District of Illinois-Chicago, these types of incidents were not uncommon. I’d often be notified about a crisis that was brewing with a phone call from a familiar voice asking “Where are you?”</span><br></p><p><span style="line-height:1.5em;">I’d answer with my location, the voice on the other end would give me a brief description of the crisis, and my mind would start spinning. I’d go into risk mitigation mode and begin to ask myself questions:</span><br><ol><li>​<span style="line-height:1.5em;">How can I minimize the damage?</span></li><li><span style="line-height:1.5em;"></span><span style="line-height:1.5em;">How fast can I start to prioritize the massive list of things that need to be done? And who can I mobilize to help with the efforts?</span></li><li><span style="line-height:1.5em;"></span><span style="line-height:1.5em;">Is there going to be media interest? And how do I manage to feed the media beast?</span></li><li><span style="line-height:1.5em;"></span><span style="line-height:1.5em;">Is this going to be a negative story? How far out in front can I get?</span></li><li><span style="line-height:1.5em;"></span><span style="line-height:1.5em;">Who has the most factual information, and how can I obtain it quickly?</span></li><li><span style="line-height:1.5em;"></span><span style="line-height:1.5em;">What proactive steps can I take immediately to help minimize the risk to people?</span></li></ol></p><p><span style="line-height:1.5em;">Immediately after learning of the two inmates’ escape in 2012, I used that thought process to begin: </span><br></p><ul><li><span style="line-height:1.5em;">​Getting the command post up and running.</span></li><li><span style="line-height:1.5em;">Notifying the U.S. Marshals Service Communication Center at the national headquarters in Washington, D.C.</span></li><li><span style="line-height:1.5em;">Separating fact from rumo</span><span style="line-height:1.5em;">r.</span></li><li><span style="line-height:1.5em;">Getting the media under control.</span></li><li><span style="line-height:1.5em;">Determining how much the situation had already spun out of control.</span></li><li><span style="line-height:1.5em;">Identifying the danger to the community.</span></li><li><span style="line-height:1.5em;">Controlling the situation as soon as possible.</span></li></ul><p><span style="line-height:1.5em;"><br>Locating the inmates took coordination and cooperation between numerous agencies, including the Federal Bureau of Prisons, the FBI, the Chicago Police Department, and the U.S. Marshals Service Regional Fugitive Task Force.</span><br></p><p><span style="line-height:1.5em;">All of the agencies played a major role in locating and arresting both fugitives in less than two weeks. One was captured within days with the help of an FBI informant. But finding the other fugitive was not as easy. After regrouping and discussing strategy, the agencies developed a plan. </span><br></p><p><span style="line-height:1.5em;">FBI agents, U.S. deputy marshals, and state and local task force officers descended on a possible location and interviewed dozens of people. From these interviews, the fugitive was located and local law enforcement officers were able to make an arrest within a few minutes after a call to 911.</span><br></p><p><span style="line-height:1.5em;">During this scenario, it was imperative to remain as calm as possible so I could collect my thoughts and be proactive. As part of this process, I used the following takeaways to deal with the crisis at hand:</span><br></p><ul><li><span style="line-height:1.5em;">​Gather factual information from sources close to the situation.</span></li><li><span style="line-height:1.5em;">If you are unable to do it yourself, deploy personnel to gather information from a trusted source and have them report back to you with high-level highlights of the incident.</span></li><li><span style="line-height:1.5em;">A</span><span style="line-height:1.5em;">void rumors and verify as much as possible before disseminating information to your chain of command.</span></li><li><span style="line-height:1.5em;">Avoid micromanaging those you have delegated to a specific mission. Trust them to do their jobs while concentrating on the big picture.</span></li><li><span style="line-height:1.5em;">Gather briefing points as the crisis is ongoing so you can summarize events and actions to report to your chain of command.</span></li><li><span style="line-height:1.5em;">Schedule regular briefings if possible so the information flow is accurate and everyone who needs to know is informed at the same time.</span></li><li><span style="line-height:1.5em;">Be prepared to put people back into their swimming lanes when they begin to interfere with responsibilities delegated to others.</span></li><li><span style="line-height:1.5em;"></span><span style="line-height:1.5em;">Don’t be afraid to give bad news when it is the truth.</span></li><li><span style="line-height:1.5em;">Don’t minimize the totality of the situation.</span></li><li><span style="line-height:1.5em;">Use every source available to you to mitigate the risk and maximize your capability in managing the situation.</span></li><li><span style="line-height:1.5em;">Catapult your star players into leadership roles and encourage them to step up to the plate to handle key pieces of the crisis so you can focus on the decision making process.</span></li><li><span style="line-height:1.5em;">Have a spokesperson handle media inquiries at first—if possible. Once you speak, they will want to hear from you each time.</span></li><li><span style="line-height:1.5em;">Try to control sound bites. If you don’t provide them, the media will get them from someone else.</span></li></ul><p><em style="line-height:1.5em;"><br>John O’Malley retired after 25 years of service with the U.S. Marshals Service. He spent his entire career in Chicago and now works in corporate security. During his career, he was involved in more than 1,000 fugitive investigations and participated in more than 600 felony arrests of wanted offenders. He is a member of ASIS International’s Executive Protection Council.</em><br></p><p><br></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465