Security, Professional, and Business Services

 

 

https://sm.asisonline.org/Pages/Hate-Crimes-in-2015.aspxHate Crimes in 2015GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-02-01T05:00:00ZSM Staff<p>Hate crimes increased in the United States from 2014 to 2015.​​</p><p><a href="/ASIS%20SM%20Article%20Images/Asset%203.jpg" target="_blank"><img class="ms-rteImage-0" src="/ASIS%20SM%20Article%20Images/Asset3_small.jpg" alt="" style="margin:5px;" /></a> </p>

Security, Professional, and Business Services

 

 

https://sm.asisonline.org/Pages/Hate-Crimes-in-2015.aspx2017-02-01T05:00:00ZHate Crimes in 2015
https://sm.asisonline.org/Pages/January-2017-Industry-News.aspx2017-01-01T05:00:00ZJanuary 2017 Industry News
https://sm.asisonline.org/Pages/Maturity--Model-101.aspx2016-12-01T05:00:00ZMaturity Model 101
https://sm.asisonline.org/Pages/Industry-News-October-2016.aspx2016-10-01T04:00:00ZIndustry News October 2016
https://sm.asisonline.org/Pages/ASIS-To-Host-First-Security-Week.aspx2016-09-11T04:00:00ZASIS To Host First Security Week
https://sm.asisonline.org/Pages/ASIS-2016-Product-Showcase.aspx2016-09-01T04:00:00ZASIS 2016 Product Showcase
https://sm.asisonline.org/Pages/A-Security-Triumvirate-in-Orlando.aspx2016-06-13T04:00:00ZA Security Triumvirate in Orlando
https://sm.asisonline.org/Pages/SM-Online-January-2016.aspx2016-01-01T05:00:00ZSM Online January 2016
https://sm.asisonline.org/Pages/December-2015-Product-Showcase.aspx2015-12-01T05:00:00ZDecember 2015 Product Showcase
https://sm.asisonline.org/Pages/How-to-Manage-a-Merger.aspx2015-10-06T04:00:00ZHow to Manage a Merger
https://sm.asisonline.org/Pages/2015-Seminar-Product-Showcase.aspx2015-09-17T04:00:00Z2015 Seminar Product Showcase
https://sm.asisonline.org/Pages/Proper-Persuasion.aspx2015-08-03T04:00:00ZProper Persuasion
https://sm.asisonline.org/Pages/Book-Review---The-Handbook-of-Security.aspx2015-08-01T04:00:00ZBook Review: The Handbook of Security
https://sm.asisonline.org/Pages/Book-Review--Three-Sisters-Pond.aspx2015-08-01T04:00:00ZBook Review: Three Sisters Ponds
https://sm.asisonline.org/Pages/Safety-at-Sea.aspx2015-07-20T04:00:00ZSafety at Sea
https://sm.asisonline.org/Pages/Crime-Trackers.aspx2015-04-01T04:00:00ZCrime Trackers
https://sm.asisonline.org/Pages/Intelligent-Infrastructure.aspx2015-04-01T04:00:00ZIntelligent Infrastructure
https://sm.asisonline.org/Pages/ISC-West-2015-Product-Showcase.aspx2015-04-01T04:00:00ZISC West 2015 Product Showcase
https://sm.asisonline.org/Pages/Security-Careers-Skills,-Compensation,-and-Career-Paths.aspx2015-03-30T04:00:00ZBook Review: Security Careers: Skills, Compensation, and Career Paths
https://sm.asisonline.org/Pages/Liability-and-Insurance-Implications-of-Body-Cameras.aspx2015-03-17T04:00:00ZLiability and Insurance Implications of Body Cameras

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/Supply-Chain-Strategies.aspxSupply Chain Strategies<p>​Take almost any product you have purchased in a store or used at home or work in the last week. Chances are, that object moved thousands of miles from where it was originally manufactured to the place where it was ultimately purchased or delivered to you. Organizations have intricate supply chain networks that are constantly moving every day around the world, and having an efficient supply chain security program ensures that movement of goods is not interrupted or compromised. </p><p>Security professionals must take a detailed look at the vendors who supply their assets and understand how those goods will be handled and ultimately implemented into their company’s operations or services. Following is a look at how a children’s hospital in Alabama applied supply chain security best practices to weather an unexpected storm, as well as provide for day-to-day operations. In addition, supply chain experts discuss lessons learned from their own experience of conducting risk assessments, following standards, and vetting suppliers and transporters to better protect company property. ​</p><h4>Alabama Children’s </h4><p>When a snowstorm hit Birmingham, Alabama, on January 28, 2014, the city was caught unawares. The snowfall, which quickly turned to ice, left thousands stranded on highways or in their offices. Children were stuck at school, their parents unable to pick them up. The event became known as “Snowpocalypse,” and news service AL.com called it “the winter storm that brought Birmingham to its knees.” </p><p>Hospitals were affected by the storm as well, including Children’s of Alabama. The pediatric center encountered vulnerabilities in its supply chain during that event it hadn’t previously considered, says Dennis Blass, CPP, PSP, director of safety and security at the hospital. </p><p><strong>Lessons learned. </strong>Every year the hospital conducts a hazards vulnerability assessment for its supply chain to find out where it can improve safety and security. “Once you identify your hazards and your vulnerabilities–the things that are dangerous to you or the things that you’re weak in–then you start peeling those back,” he says. “If we identify hazards that we need to correct, then we probably are going to create a management plan to correct those issues.” </p><p>Many displaced people in the community turned to the hospital for shelter when they had nowhere else to go. “We have a very prominent position in the Birmingham skyline, so if things look bad, the hospital looks like a place to go and get help–as it is,” Blass says. There were also clinic patients who had come to the hospital that morning for a routine checkup, planning to leave; many of them were stuck because of the snowstorm, which began around 10:30 a.m. local time.</p><p>Instead of being filled to the normal capacity of 300 people—the number of beds in the hospital—there were roughly  about 600 people who spent about 48 hours at the facility to ride out the storm.</p><p>The number of people at the hospital exposed one unforeseen vulnerability—obtaining clean linens from its supplier, which is separated from the hospital by a chain of mountains. “The supplier can wash the linens, but they can’t deliver them to us…we ended up making it, but that was a close call,” says Blass.</p><p>“We could handle supplies for patients, but we had a lot of people who just came to the hospital because it was a warm place to be,” according to Blass. “That had impacts on the amount of food that got consumed, and it had impacts on the amount of linens we went through. Just things that people need, supplies like toilet paper, things you don’t think a lot of.” </p><p>For those who weren’t patients, the hospital served smaller meals than normal; “sandwiches and soup, as opposed to meat and potatoes,” Blass says, to stretch resources. </p><p>The main drug supplier for the hospital is located in the same region, so obtaining critical medicine was not a concern during the storm. The hospital also has plenty of diesel fuel tanks, and can go for days without restocking. Only the insufficient linens, which must be sent off to a facility for proper sanitation before being returned to the hospital, turned out to be an issue.</p><p>“We did an after-action report on that experience, so we…put it in our emergency management plans for the future,” he notes.</p><p>The hospital’s emergency plans help ease any supply chain shortages. The institution follows the hospital incident command system (HICS) which assigns temporary duties to leadership during an emergency. For example, during the snowstorm, the chief operating officer of the hospital assumes the role of incident commander; an information officer is assigned to keep the community informed of hospital activities; and the plan also incorporates a medical officer, logistics chief, and planning chief. </p><p>During the incident, this system helped ensure proper patient care and as few gaps in the supply chain as possible. “Food was getting tight,” Blass says, and the food warehouses are not located near the hospital. “Because of the command structure, leadership can say, ‘okay you have a company credit card, we’ll contact the bank and raise your limit from $500 to $5,000 or whatever you need.’”</p><p>The U.S. Joint Commission, which certifies and accredits healthcare bodies, requires that hospitals have a group with representatives from various divisions that evaluates the standard of care they are providing to patients. Alabama Children’s has an environment of care committee that meets once a month to complete this requirement. “Our environment of care committee looks at things like safety, security, and resource management,” says Blass. “We have to meet the Joint Commission’s standard, and it surveys us every three years.” </p><p>Representatives on the team at Alabama Children’s include staff from the pharmacy, medical team, facilities, human resources, dining services, and more. This team ensures that there aren’t any gaps in the supply chain that would interrupt the hospital’s daily operations. As a rule, Blass says that having enough supplies for 96 hours will allow the facility to continue operating smoothly and efficiently. This includes a variety of items that the environment of care team must carefully think through and document. “You’re talking about water, fuel, basic sanitary supplies, and then you start talking about medicine and those things necessary for a hospital to run,” he says. </p><p>And there can be more than one type of each supply, a detail that, if overlooked, could mean life or death. “We have pumps that pump air, we have pumps that pump blood, we have pumps that pump saline, we have pumps that do many different things. You have to have all the things needed to make those supplies work for 96 hours,” he notes. </p><p>Keeping track of inventory is critical to determine whether the hospital has a sufficient supply of each item. Blass says that the hospital is moving toward a perpetual inventory system, where a new item is ordered as soon as one is pulled off the shelf. </p><p>There is a downside to stocking too many items, which is why it’s a delicate balance between having 96 hours’ worth of supplies and more than enough. “Space is expensive. And if you want to have enough water for four days, how much water is that? Where do you put it? How do you keep it fresh?” He adds that the hospital must be thoughtful in its policies and procedures on maintaining its inventory to avoid any issues.  </p><p>Thankfully, Blass notes, t​he 2014 snowstorm only lasted 48 hours. “The size of the surge exceeded our plan, but the length of the surge was shorter than our plans, so it all worked out,” he says. </p><p>And not every element of securing the supply chain is tangible; the information and communication pieces are also critical. “Every day we’re getting blood supplies in, and other kinds of materials that must be treated very carefully,” he says. Special instructions need to be followed in many cases. For example, there may be medicine that must be stored at a precise temperature until 30 minutes before it’s dispensed. That information must be communicated from the pharmacist to the supplier, and sometimes to security, who can give special access to the supplier when it delivers the drugs. </p><p>Blass is a member of the ASIS International Supply Chain and Transportation Security Council. He helped develop an American National Standards Institute (ANSI)/ASIS standard for supply chain security, Supply Chain Risk Management: A Compilation of Best Practices Standard (SCRM), which was released in July 2014. The standard provides supply chain security guidelines for companies, and has illustrations of what exemplary supply chain models look like.</p><p><strong>Best practices.</strong> Marc Siegel, former chair of the ASIS Global Standards Initiative, also participated in the creation of the ANSI/ASIS standard, which provides explanations of how to look at managing risk in the supply chain. “It’s based on the experiences of companies that have very sophisticated supply chain operations,” he tells Security Management. “The companies that put it together were really looking at having a document that they could give to their suppliers, to help them look at themselves and think of things that they should be doing and preparing for.” </p><p>Siegel is now director of security and resilience projects for the homeland security graduate program at San Diego State University. He promotes supply chain mapping, which takes a risk management–based approach to supply chain security. “Traditionally, a lot of security people have looked at supply chain as logistics security,” he says, “whereas companies with major supply chain considerations have been moving more into an enterprise risk management perspective.” These organizations take an across-the-board look at risks that could create a disruption in the supply chain, asking themselves what the specific things are that could interrupt or prevent them from manufacturing or delivering their product. </p><p>Siegel says there is a disproportionate focus on bad actors and intentional acts as threats to the supply chain, when more often it’s a natural disaster or accident that causes the most significant disruptions. “The broader risk management perspective is also looking at, ‘Is there a potential for a storm, is there a potential for political disorder, or instability in a region, that can cause a delay in processing?’” Only then, he says, are companies efficiently mapping out all the factors that could introduce uncertainty.</p><p>Maintaining a broader perspective will keep organizations from fixating on two of the most common hangups in supply chain security. “You have people who fixate on ‘everything is a threat,’ and you have people who fixate on ‘everything is a vulnerability,’ and if you only fixate on those two things you’re going to miss a lot of stuff,” Siegel says.</p><p>Blass agrees. “When we start that annual hazards vulnerability assessment, I’m going to look through the standard and notes I’ve written myself to make sure I’ve got everything covered,” he notes. “You can never rest and say, ‘well, we’re safe and secure and we don’t have to do anything else,’ because the threats keep changing.”   ​</p><p>--</p><h4>Sidebar: assess risk<br></h4><p> </p><div>​For the co​rporation that produces the F-35 fighter jet and other advanced technologies for the U.S. government, supply chain security is of utmost importance. “The threats that we face are universal in nature due to the size and the complexity of our supply chain,” says Vicki Nichols, supply chain security lead for Lockheed Martin’s Aeronautics business. </div><div><br> </div><div>Lockheed Martin Aeronautics assesses the supply chain in a number of categories, but Nichols works most closely with cargo security. “The threats there are cargo disruption, unmanifested cargo, and anti-Western terrorism,” she notes. </div><div><br> </div><div>The division conducts a risk assessment of its international suppliers. “We look at what type of products they provide us and how vulnerable that product is to manipulation or intellectual property theft, and we look at country risk,” she says.  </div><div><br> </div><div>The company sends a questionnaire to its suppliers, and comes up with an overall score for each of them based on 10 criteria, including country risk and transportation mode. In many cases, it also sends field personnel to evaluate the supplier’s facility. “If we know we have eyes and ears going in and out of the facility, and those people are trained to recognize red flags, then we know we have a lower threat because of our presence,” she says. </div><div><br> </div><div>After one such site check at a facility in Italy, Lockheed Martin Aeronautics determined that the use of technology was warranted to further enhance security. “The concern was that the area was known for introduction of unmanifested cargo—weapons, cargo disruption,” she notes. “We began to look at tamper-evident technologies, and track-and-trace devices that would allow us to know if someone had opened or tampered with the freight.”  </div><div><br> </div><div>Lockheed Martin has a corporate supply chain security council that meets at least once a month to provide updates and discuss any issues that arise. Representatives from the company include human resources, personnel security, physical security, and counterintelligence. Stakeholders from major partner organizations are also invited to participate.</div><div><br> </div><div>Lockheed Martin Aeronautics also works closely with law enforcement and federal intelligence sources who disseminate relevant information to the company. “We subscribe to some intelligence data that is cargo-specific, so we issue a spotlight report about three times a week just to keep people engaged and aware of the threats in the supply chain,” she notes. </div><div><br> </div><div>Supplier engagement is also critical, Nichols says, so the company stays in touch with about 120 suppliers internationally. </div><div><br> </div><div>Sometime in 2017, Lockheed Martin Aeronautics plans to purchase a software management tool that will release supplier questionnaires in the native language for countries it does business with. It will tap existing resources such as “Supplier Wire” to offer training to the supply base. “This will be another evolution on how we can engage, rather than just sending them to a website,” Nichols says. “I think it’s important for our supply base to see how seriously we take security, so they will take it seriously as well.”​</div><div><br> </div><h4>sidebar: consult standards<br></h4><p> </p><p>​Laura Hains, CPP, operations manager, supply chain security and consulting at Pinkerton, member of the ASIS International Supply Chain and​ Transportation Security Council, says that companies should research whether their partners and suppliers are following major supply chain security protocols, like those put out by ASIS, and others such as the Transported Asset Protection Association (TAPA) standards for trucking companies. “TAPA is one of the big authorities on trucking, so if a company says they are TAPA certified, that to me says that they follow protocol,” she says. </p><p>Other standards include the National Strategy for Global Supply Chain Security which U.S. President Barack Obama signed in 2012 and was designed to enhance public-private partnerships. Arthur Arway, CPP, author of Supply Chain Security: A Comprehensive Approach, says the framework seeks to combine input from government and industry on protecting the transport of goods to and from the United States. “I think the government is far more willing to seek out subject matter experts and all the different modes and companies that may transport goods into the United States for their help,” he says. Arway adds the document is relatively recent, and that it could take a while before it is widely adopted. </p><p>Though terrorism is an uncommon threat to the supply chain, it must always be a consideration. Hains gives the example of vehicular attacks. In Nice, France, on July 14, 2016, Tunisia native Mohamed Lahouaiej Bouhlel drove a 19-ton cargo truck into a crowd of Bastille Day festival-goers. That attack killed 86 people and injured more than 400. New York police also warned of possible vehicular terrorism against the 2016 Macy’s Thanksgiving Day Parade. “A small company truck—that could be a target,” notes Hains. “So everybody has to think about terrorism because it’s out there.”</p><p>Another standard at the national level seeking to combat terrorism within the supply chain is the U.S. Customs Trade Partnership Against Terrorism (C-TPAT). The program is voluntary for private industry, but Arway says the national standards as a whole are seeing global adoption.​</p><p>“Standards have come a long way in how they’ve been able to incorporate security into the movement of goods,” he notes. “Many countries have accepted these programs into their own supply chain security programs.”​</p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Book-Review---The-Handbook-of-Security.aspxBook Review: The Handbook of Security<p><span style="line-height:1.5em;">Editor Martin Gill has collected essays from more than 50 well-credentialed and respected authors to create a superb holistic catalog of security.  The Handbook of Security, Second Edition, builds upon the first edition with a wider array of subject matter and a greater diversity of topics, resulting in a more exciting study of the field and profession of security.  </span><br></p><p>Beginning with a comprehensive historical look at the security industry, the book goes on to answer fundamental questions about the range of threats facing today’s world. It looks at how current economic conditions—far different from when the previous edition was first published—have affected the profession and agencies responsible for predicting and reacting to crime, and to what degree technological advances have impacted our world. The overall result is that security has become a dominant feature in our lives, whether we know it or not.</p><p>Although, at more than 1,000 pages, The Handbook of Security can appear daunting, this is indeed essential reading for all those involved with the security world. Both the student of security and the security professional will become engaged in the content, from the historical study of security as a discipline to the long-range issues impacting the profession. Among other things, it addresses crimes by offense and by industry, risk management, security processes, research in the field, and ethical issues. One shortcoming of the book is that it does not provide many charts or graphs to illustrate and support the material, though the flow of the text sufficiently covers the information.  </p><p>This book has significant value to security professionals at all levels as well as being a valuable research tool for the academic world of security management. It will soon be dog-eared and filled with bookmarks as are the invaluable resources in any professional’s library.</p><p><em><strong>Reviewer: Terry L. Wettig, CPP</strong>, is director of security risk management for Brink’s Incorporated and is based in Richmond Virginia. A retired U.S. Air Force chief master sergeant, he is studying for a Ph.D. in organizational psychology.  </em></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/ASIS-2016-Product-Showcase.aspxASIS 2016 Product Showcase<div style="background-color:#ffffff;">​<em>Fall 2016 Product Showcase.​</em><h4><em></em>​Detex<img src="/ASIS%20SM%20Article%20Images/0916%20Detex%20Weatherized%20RH%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" /></h4><p> <span style="line-height:15px;"><strong>Booth </strong></span> <span style="line-height:15px;">​</span><span style="line-height:15px;"><strong>#2929</strong><br></span><span style="line-height:15px;">Detex Corporation of New Braunfels, Texas, off​ers weatherized panic hardware that is ideal for outdoor areas or fenced and gated areas that need to be protected from unauthorized entry while still providing emergency exit in panic conditions. The Outdoor Area System offers Advantex quality, so it is dura- ble in outside environments and has a safe, smooth surface that </span><span style="line-height:15px;">comes in a variety of complementary finishes. The optional EasyKit includes components to meet the needs of complex applications. Systems could include weatherized panic devices, access control devices, weatherized door prop alarms, and more. They can be ​</span><span style="line-height:15px;">ba</span><span style="line-height:15px;">ttery powered or hardwired.</span></p><p> <br> </p><hr /><div> ​ <div style="background-color:#ffffff;">​ <div><h4>​Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20ArchiTech%20iLock%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:184px;" /> </h4> <strong>Booth #3500</strong></div><p>ArchiTech Series Networx Locks from Marks USA, a division of Napco Security Technologies of Amityville, New York, create an advanced wireless access control solution with an attractive, infinitely customizable, designer locking form factor, in a choice of trims and finishes. ArchiTech and its iLock App are wirelessly linked together using universally compatible Bluetooth LE technology. The system stores encrypted data to provide secure access without a key, so users can use any smart device to unlock ArchiTech from a customizable range of up to 30 feet away.​</p><div>​</div><div> <br> </div><div> <br> </div><div> <br> </div><div> <br> </div><div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Talkaphone%20VOIP-200%20System%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />​Talkaphone </h4><div> <strong>Booth #1951</strong></div><p>Talkaphone of Niles, Illinois, announced that its VOIP-200 Series Call Station interconnects with the AVM-1 IP video attendant phone from Grandstream to provide a fully integrated access control system. With the ability to connect to up to 30 VOIP-200 call stations, the AVM-1 can monitor and regulate entry points through the call stations using video and voice communications. The AVM-1 unit will receive basic preprogramming to integrate effortlessly with Talkaphone VOIP-200 Series. The call station and <span style="line-height:1.5em;">phone deliver a comprehensive access control solution that can be integrated with existing systems, including Avaya Aura and Cisco Unified Communication Manager.</span></p><div> <br> </div></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;">​<hr />​<br></div></div><div><div><h4>G4S Secure Solutions<img src="/ASIS%20SM%20Article%20Images/0916%20G4s%20showcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:195px;" /> </h4> <strong>Booth #3151</strong></div><div>G4S Secure Solutions of Jupiter, Florida, secures people, property, and assets by understanding and mitigating security risk. The company integrates the full power of its resources and expertise to drive optimal and cost-efficient results. It provides customized security solutions that can include risk consulting and investigations, systems integration, security software and technology, and security officers to help address any challenge that may arise. AMAG Technology, a G4S company, manufactures and deploys the Symmetry access control and video management product line. Altogether, the security personnel, management, and technology offer award-winning security services.</div><div> <br>​</div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Hanwha%20Samsung%20%200916%20Hanwha%20Samsung%20Q-series-bullet%20(2).jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:203px;" />​Hanwha Techwin</h4> <strong>Booth #2641</strong> <p>WiseNet Q Series cameras from Hanwha Techwin America of Ridgefield Park, New Jersey, feature highly efficient H.265 compres- sion technology; users benefit from up to 75 percent reduction in bandwidth and storage requirements compared to the H.264 stan<span style="line-height:1.5em;">dard. The 24 models in the Q Series also include the company’s WiseStream codec, which balances image quality and compression based on motion within a scene. Available in 2MP and 4MP full HD versions, the cameras include true wide dynamic range, hallway view, and lens distortion correction. Infrared illumination is a standard feature to ensure that cameras deliver high-quality images in nearly every situation.</span></p><div> <br> </div> <br> </div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Quantum Secure (part of HID) <img src="/ASIS%20SM%20Article%20Images/0916%20Quantum%20Secure%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:220px;" /></h4><div> <strong>Booth #3901</strong></div><p>SAFE Predictive Security from Quantum Secure of San Jose, California, uses advanced contextual anal- ysis to identify possible threats before they become incidents, enabling preventive measures to avert costly losses and other negative outcomes. SAFE collects and integrates data from multiple security devices and sys- tems to develop behavioral patterns for both staff and visitors, then works in real time to detect indicators of <span style="line-height:1.5em;">compromise that might suggest security risks. Interactive user dashboards and/or alarms alert security staff to developing situations so they can be evaluated and addressed appro- priately. Dashboards provide multiple views at the strategic, tactical, and operational levels, providing a comprehensive understanding of current security conditions.</span></p> <br> </div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Garrett%20PDI_portable%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:104px;" />Garrett Metal Detectors</h4></div></div><div><p> <strong>Booth #2359<br></strong><span style="line-height:1.5em;">The Walkthrough Caster Set from Garrett Metal Detectors of Garland, Texas, is ideal for stadiums, special events, and school use. The casters, which can be permanently attached, allow full mobility of a Garrett PD 6500i walkthrough metal detector by one person. Detectors can be moved to a secure location when they are not in use and pro- vide an unimpeded exit at the close of an event. The caster assembly is constructed of durable, powder-coated steel for use in all types of environmental conditions.</span></p><div> <br>​</div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr />​<br></div></div><div><div><h4>Genetec<img src="/ASIS%20SM%20Article%20Images/0916%20Genetec%20Capture1%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2327</strong></div><p>Genetec of Montreal, Quebec, Canada, introduced the Mission Control Decision Support System, which delivers situational intelligence, visualization, and incident management. Designed to work seamlessly with the company’s Security Center unified IP security platform, Mission Control aims to simplify the operator’s tasks and decision<span style="line-height:1.5em;">making process. Suited for larger, multisite deployments, it intelligently qualifies incoming data from thousands of sensors and security devices. Automated workflows and standard operating procedures guide operator response to ensure effective management of any situation. The system also delivers post-incident capabilities, including reporting and system auditing, to ensure compliance.</span></p><div> <br>​</div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Open%20Options%20DNA%20Fusion%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:215px;" />​Open Options </h4><div> <strong>Booth #2661</strong></div><p>DNA Fusion from Open Options of Addison, Texas, is open platform access control software that is built using the latest in software development technology and contains numerous customer-centric features. <span style="line-height:1.5em;">Users can easily access system data with InfoReady design, assign global access levels, drag and drop data, create custom direct com</span><span style="line-height:1.5em;">mands to control several doors with the push </span> <span style="line-height:1.5em;">of a button, and much more. DNA Fusion offers Fusion Web and Fusion Mobile applications for remote access. The system </span><span style="line-height:1.5em;">seamlessly integrat</span><span style="line-height:1.5em;">es with leading security technologies in the industry, including IP video recording, intercom, and locks and readers. DNA Fusion also interfaces with the Authentic Mercury, AXIS, and ISONAS open hardware platforms.</span></p><div> <br> </div></div></div><div> <br> <div><div style="background-color:#ffffff;"><hr /><h4>​TrackTik<img src="/ASIS%20SM%20Article%20Images/0916%20Tracktik%20ASIS_Product%20Showcase_ASIS%20Newspaper.December%20Issue_22.07.16%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4><p> <strong>Booth #2950</strong><br><span style="line-height:1.5em;">TrackTik of Montreal, Quebec, Canada, launched the Back Office </span><span style="line-height:1.5em;">& Management Suite to make administration more efficient. </span><span style="line-height:1.5em;">This new addition to TrackTik’s integrated security workforce man- agement platform offers a complete line of scheduling, time and attendance, and invoicing/contracting products, as well as robust business intelligence solutions. The suite enables security service com- panies to reduce the number of systems, streamline administration, efficiently schedule, and accurately reduce time from operations to </span><span style="line-height:1.5em;">service invoicing. TrackTik’s intuitive software is a multi-featured platform connecting field personnel to management and clients via a suite of guard management tools, powerful busi- ness intelligence modules, and automated financial management solutions.</span></p></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20STI%20%20Product%20Showcase%207730%206519%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:170px;" />​Safety Technology International, Inc. </h4> <strong>Booth #2533</strong> <p>STI tough polycarbonate covers from Safety Technology International, Inc., of Waterford, Michigan, help prevent theft and vandalism to larger keypads, access controls, volume and lighting controls, and other similar devices. Molded of clear polycarbonate, which is very difficult to break, each protected unit can be clearly seen and quickly identified. Covers increase the life and reliability of units by protecting them from accidental or inten- tional damage. Covers are backed by a three-year guarantee against breakage in normal use.</p></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Brownyard Group<img src="/ASIS%20SM%20Article%20Images/0916%200915%20Showcase%20Brownyard_700x300%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2925</strong> <p>The Brownyard Group of Bay Shore, New York, provides insurance coverage and risk management solutions for the security guard, private investigative, and alarm industries. With more than 60 years of experience covering security concerns, Brownyard offers broad coverage through an admitted insurer. The company handles claims in an expeditious and knowledgeable manner via its in-house claims facility. Brownyard works exclusively through an insurance agent or broker chosen by the client.</p>​</div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​<img src="/ASIS%20SM%20Article%20Images/0916%20Medeco%20XT_DA_Screen_Capture%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />Assa Abloy </h4><div> <strong>Booth #3601</strong></div><p>Medeco Security Locks of Salem, Virginia, an ASSA ABLOY Group brand, simplifies audit trail analysis with Medeco XT Data Analytics built into Medeco’s XT Web Manager software program. The software feature leverages the data collected from Medeco XT intelligent keys and cylinders, eliminating the need to search through hundreds or thousands of audit re- cords to spot trends or to see something out of the ordinary. The graphic dashboard lets users see in three clicks who might be trying to gain access to areas where they do not belong. All data analytics software enhancements are driven by customer feedback.</p><div> <br> </div></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​Boon Edam<img src="/ASIS%20SM%20Article%20Images/0415%20Boon%20Edam%20ISC%20West%20Showcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /></h4><div> <strong>Booth #1401</strong></div><p>The Lifeline optical turnstile series from Boon Edam of Lillington, North Carolina, offers sophistication and innovation. The Lifeline has intuitive features, including unique sensors that detect a visitor’s approach, an energy-saving sleep function, pulsing light strips that guide users, and proven symbols to make it user friendly. The ergonomic design and an ar- ray of customization possibilities, like various glass and finish choices, provide comfort and style for the user. The series contains three models: the Slide, Swing, and Open models.</p><div> <br> </div></div></div><div> <br> <div><div style="background-color:#ffffff;"><hr /><div> <br> </div><h4> <img src="/ASIS%20SM%20Article%20Images/916%20AXIS%20A8105%20pic%20copy.jpg" class="ms-rtePosition-1" alt="" style="line-height:19.5px;margin:5px;width:202px;background-color:#ffffff;" />​​​Axis Communications </h4><div> <strong>Booth #3101</strong></div><p>Axis Communications of Chelmsford, Massachusetts, launched the AXIS A8105-E Net- work Video Door Station, which allows operators to monitor entrances, communicate directly with visitors, and open doors remotely via a mobile app, IP phone, or video management system. The door station is ideal for installations within the retail, education, and healthcare segments, and its small size allows it to be installed where space is limited. It helps users secure the premises and simplify visitor management.</p><div> <br> </div></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​​ASSA ABLOY<img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20Yale%20Yale-Multi-Family-Solution%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:168px;" /></h4><div> <strong>Booth #3601</strong></div><p>Yale Locks & Hardware of Berlin, Connecticut, an ASSA ABLOY Group brand, introduced nexTouch, the next generation of keypad access control. Featuring an advanced, voice-guided system to simplify programming and maintenance, nexTouch is available with an easy-to-use capacitive touchscreen, as well as a pushbutton keypad option for more tactile environments. A truly scalable solution, nexTouch can be used as a standalone keypad lock that uses a PIN code to manage access; can easily be upgraded to use Data-on- Card technology as part of the Yale <span style="line-height:1.5em;">Multi-Family Solution; or can be upgraded for easy expansion of ZigBee or Z-Wave capable alarm systems in small business environments.</span></p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Commport%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:204px;" />​Comm Port Technologies </h4> <strong>Booth #1261</strong> <div>Comm Port Technologies of Cranbury, New Jersey, offers the CPAS series of under-vehicle surveillance systems for inspec tion and analysis of a vehicle’s undercarriage. With unmatched flexibility and performance features, the system provides real-time and delay-free full-color scanning with capture speeds of up to 75 kilometers per hour and frame scans up to 900 frames per second. The flush-mount, in-ground system supports built-in license plate recognition and driver image capture. The heavy-duty system comes complete with all hardware necessary for installation and can be fully operational within 48 hours. Each system includes specialized software for computer vision scanning. Multiple lanes can be monitored from a centralized database.</div><div> <br> </div></div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20SLE-CDMA-Fire%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:90px;" /> </h4> <strong>Booth #3500</strong> <p>StarLink Fire Universal Cellular and IP Fire Alarm Communicators from Napco Security Technologies of Amityville, New York, provide low-cost upgrade, easy installation, and simple activation. They affordably replace up to two standard phone landlines traditionally required per fire panel. StarLink radios offer state-of-the-art CDMA nationwide coverage and code-compliant, full-event alarm reporting from any brand panel or FACP to any central station. The StarLink Fire Communicator, used as a primary or backup communicator, is a field-proven solution—among the most economical and full-featured in its class.</p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Panasonic_AERO_PTZ_Security_Manage_Showcase%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:216px;" />​​Panasonic Systems Communication Company</h4><p> <strong>Booth #3530<br></strong><span style="line-height:1.5em;">The Aero PTZ Camera from Panasonic Systems Communication Company of Newark, New Jersey, is an environmentally </span><span style="line-height:1.5em;">rugged camera built to deliver high-quality Full HD surveillance images in extreme environmental conditions. From hurricane-force winds to water and dust, from icy blasts to Sahara heat, the Aero PTZ delivers sharp video with 360-degree panning and 30x zoom capability, allowing it to see in virtually </span><span style="line-height:1.5em;">any direction, even in complete darkness. It features a lightweight, corrosion-resistant glass fiber body, electronic image stabilization, a built-in wiper and defroster, and an optional infrared LED.</span></p><div> <br> </div></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​​Red Hawk<img src="/ASIS%20SM%20Article%20Images/0915%20Red%20Hawk%20Showcase%20new%20new%20logo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:195px;" /></h4><p>Red Hawk Fire and Security of Boca Raton, Florida, offers advanced systems integration and cutting-edge applications. All electronic security systems and legacy systems can be integrated with Red Hawk’s fire, life safety, and physical security solutions. Experts analyze a customer’s specific requirements, including regulatory compliance, and then develop the best solution for each business. Dedicated local service means that an account manager can take care of everything a customer needs. More than 50,000 companies and institutions across the country rely on the resources, knowledge, and reach of the Red Hawk team.</p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Prosegur%202016_España_Vigilancia%20y%20Tecnologia01%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:112px;" />​​Prosegur </h4> <strong>Booth #2259</strong> <p>Prosegur of Madrid, Spain, is a global company with more than 160,000 employees working from more than 400 offices in Europe, Latin America, Africa, Asia, and Oceania and provid- ing services for more than 24,0000 companies and institutions, 180,000 small and medium enterprises, <span style="line-height:1.5em;">and 200,000 households. It offers integrated and specialized security services combined with the most advanced technologies and the best </span><span style="line-height:1.5em;">professionals to provide maximum efficiency for the business management of companies. Integrated security solutions include: manned guarding, cash in transit, cash management, electronic security systems, cybersecurity, executive protection, fire protection systems, and residential security.</span></p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​​Securitas Electronic Security<img src="/ASIS%20SM%20Article%20Images/0916%20SecuritasESlogo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2901</strong> <p>Securitas Electronic Security (formerly Diebold Security) of Cleveland, Ohio, offers a customizable online dashboard to manage an entire security platform. SecureStat is an online customer management tool that delivers a unified view, control, and measurement of the security system, including disparate intrusion, access, video, and fire systems. Aligning with leading security and technology partners to provide the most advanced solutions on the market, SecureStat brings together locations, security systems, and devices for a comprehensive view of the entire security operation. Users can update information, request service, and generate reports while improving efficiency, en- hancing security, and reducing operational costs.​</p></div></div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Iview%20Product%20Showcase%20ipass-product-image-300dpi%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:171px;" />​​iView Systems<br></h4> <strong>Booth #1821</strong> <p>Users can professionally register, badge, track, and report all visitor activity with the iPass Visitor Management System from iView Systems of Oakville, Ontario, Canada. The system streamlines the check-in and check-out processes for visitors, contractors, <span style="line-height:1.5em;">and employees. It scales from a single workstation to hundreds—local or worldwide—sharing a central da- tabase. The iPass application uses ID scanning, elec</span><span style="line-height:1.5em;">tronic signatures (including DocuSign integration), visitor preregistration, notifications, and custom badging. The system integrates with the iTrak Incident Reporting Platform, provid- ing access to existing personnel, banned/watched subjects, and location synergies, reducing the need for duplicate visitor information or multiple redundant information entry.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><div><div><hr /><div><h4>Commend Inc.<img src="/ASIS%20SM%20Article%20Images/0916%20Commend%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2867</strong></div><p>Commend, Inc., of Mahwah, New Jersey, introduced two new amplifiers that seamlessly integrate public address loudspeaker lines into their intercom systems. They are available in 125-watt and 250-watt models that can connect to the intercom server via IP <span style="line-height:1.5em;">networks or two-wire copper cabling. Both versions provide a high output range with var- ious loudspeaker outputs. State of the art class D amplifiers of this series are universally suitable for any size application. Compact and lightweight, they feature a rugged polycarbonate housing with flexible mounting options. Loudspeaker line-monitoring based on impedance measurement detects short-circuits or disconnection.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20IN220%20PoE%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:156px;" />Assa Abloy </h4> <strong>Booth #3601</strong></div><p>Available from ASSA ABLOY Group brands Corbin Russ- win and SARGENT of New Haven, Connecticut, the IN220 Power-over-Ethernet (PoE) lock combines aesthetics with the energy efficiency and streamlined architecture of PoE access control for a cost-effective, sustainable solution that leverages existing network infrastructure for enhanced security and easier installations. Featuring <span style="line-height:1.5em;">HID multiCLASS SE technology, the IN220 supports a wide range of credential types and HID Mobile Access powered by Seos for use with mobile devices with Bluetooth Smart and/or NFC technology. Built with integrated ANSI/BHMA Grade 1 hardware, the IN220 is available in cylindrical lock, mortise lock, and exit device configurations.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4>Verint ​<img src="/ASIS%20SM%20Article%20Images/0916%20Vering%20tracking%20interface%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /></h4> <strong>Booth #2119</strong></div><p>The Verint Video Tracker from Verint of Melville, New York, is designed to help users identify the most relevant data to elevate the effectiveness of their organizational monitoring, reporting, and response. The solution leverages advanced analytics to automate the tracking of an individual through a large num<span style="line-height:1.5em;">ber of camera views within a location. It can be used in real time or forensically to identify, evaluate, and respond to a variety of security breaches. The solution streamlines proactive video monitoring and allows users to realize increased efficiencies by making it easier and faster to monitor, identify, and take action on suspicious activities.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20SDC%20IP%20Pro%20PLUS_group_with_logo%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:187px;" />Security Door Controls </h4> <strong>Booth #3167</strong></div><p>Security Door Controls of Camarillo, California, is introducing IP Pro IP-based single door access con- trollers with PLUS PC Client Software. They allow expansion from one standalone door to a 100-door grid. Doors can be configured and managed from a single interface. Each controller comes with secure, built-in software to manage up to 32 doors from any standard Web browser. Controllers offer real-time monitoring, user management, and an audit trail <span style="line-height:1.5em;">of up to 5,000 events. Powered by Ethernet cables, they connect to existing network infra- structure and are compatible with standard Weigand readers.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4>All Traffic Solutions<img src="/ASIS%20SM%20Article%20Images/0916%20All%20traffic%20IA24%20SA24%20Slider%20Image%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:169px;" /> </h4> <strong>​Booth #1440</strong></div><p>All Traffic Solutions of State College, Pennsylvania, introduced Con- ditional Messaging. Facility safety managers and those responsible for traffic management around a campus can display dynamic mes- sages on variable message signs based on live conditions. Users can manage their signs online from one place with the secure, Web-based ecosystem, the TraffiCloud. Signs can display items, such as available parking, road surface or air temperatures, wait times, emergency notifications, time-to-destination, wrong-way detection, and more. Data can be incorporated into any position within a message. Sensors can be connected directly to the message sign, or message data can be sourced from the TraffiCloud Web-Based Remote Management System.</p><div> <br> </div><div> <br> <hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Altronix%20Trove%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:193px;" />Altronix ​</h4> <strong>Booth #2011</strong></div><p>Trove enclosures from <span style="line-height:1.5em;">Altronix of Brooklyn, New York, combine Altronix power with access controllers and accessories from lead- ing manufacturers. The unit simplifies board layout and wire management </span><span style="line-height:1.5em;">to reduce installation and labor costs and provide versatility and scalability. New accessories include backplanes for AMAG, CDVI, KABA/KeyScan, and Software House access controllers and accessories. The Trove1 is a compact enclosure that accommodates CDVI, HID/VertX, and Mercury controllers. All </span><span style="line-height:1.5em;">Trove units include a cam lock, tamper switch, and mounting hardware. All Altronix prod- ucts are made in the United States.</span></p><div><div> <br> </div><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><h4>Protection 1<img src="/ASIS%20SM%20Article%20Images/protection%201.JPG" class="ms-rtePosition-2" alt="" style="margin:5px;width:298px;" /></h4><p> <strong>Booth #3113<br></strong><span style="line-height:1.5em;">C</span><span style="line-height:1.5em;">hicago-based Protection 1 provides installation, service, and monitoring of a wide variety of electronic security and network management solutions. Now, it has teamed up with world-class partners to bring an </span><span style="line-height:1.5em;">all-inclusive cybersecurity solution to market. The company employs a team of Cisco-certified and Meraki-certified professionals and integrates brands such as Cisco Network Solutions, Druva Cloud Backup Solutions, and </span><span style="line-height:1.5em;">Bitdefender. From network design, implementation, management, and continuous monitoring to ensuring that all software applications are up to date, Protection 1 is well positioned  to protect physical and virtual assets, especially for small and medium-sized businesses that don’t have the resources to build their own cybersecurity programs.</span></p><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Gai%20tronics%20397-700FS%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:138px;" />GAI-Tronics</h4><div> <strong>Booth #3763</strong></div><p>GAI-Tronics Corporation of Mohnton, Penn- sylvania, designed RED ALERT FS Series Emergency Telephones for installation in areas with restricted space. The flush-mount FS series phones measure 6.5 x 8 inches (compared to 10 by 12 inches for standard phones). The compact phone features are identical to the larger telephone, and they are available in four analog and three VoIP models, with an <span style="line-height:1.5em;">available stainless steel enclosure to provide surface-mounting. RED ALERT Emergency Telephones are designed for maximum environmental sustainability, high audio quality, and excellent monitoring capability to provide hands-free, two-way communications.</span></p><p> <span style="line-height:1.5em;"> <br></span></p></div><div><hr /><h4></h4><div></div><div><div><h4>Honeywell<img src="/ASIS%20SM%20Article%20Images/0916%20Honeywell%20New%20Camera%20Family%20Image%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /> </h4> <strong>Booth #2401</strong></div><p>Honeywell of Northford, Connecticut offers  a new line of IP cameras featuring low light capabilities that provide good images nearly anywhere. The new equIP and HDZ PTZ cameras, offer wide dynamic range for continuous high-resolution video in contrasting levels of light. The HDZ PTZ cameras are ONVIF S com<span style="line-height:1.5em;">pliant and the equIP cameras are ONVIF S and G compliant, so they integrate with most NVR systems including Honeywell’s upgraded MAXPRO NVR. The cameras are part of Honeywell’s complete video portfolio that includes Performance Series, Embedded NVRs, MAXPRO Cloud, and Xtralis analytics.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><h4></h4><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Christie%20CHRI3432%20Phoenix%20LowLeft_Hero%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />Christie </h4> <strong>Booth #2873</strong></div><p>The Christie Phoenix from Christie of Kitchener, Ontario, Canada, enables seamless access and control of audiovisual data from virtually anywhere via a single, robust system. Its comprehensive tools allow thou- sands of users to simultaneously view, listen to, and interact with any source of information found in a control room environment, regardless of their location. Consisting of at least one hardware node and powered by Web-based management software, the Christie Phoenix system allows users in a variety of challenging environments to make faster, more accurate life-critical decisions with confidence.</p><div><hr /><div><h4>dorma+kaba<img src="/ASIS%20SM%20Article%20Images/0916%20Dorma%20+%20Kaba%20ASIS2016_ProductShowcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:128px;" /> </h4> <strong>Booth #2600</strong></div><div>The merger of Dorma and Kaba to make dorma+kaba, headquartered in Winston-Salem, North Carolina, yields a trusted source for security and access controls. Their combined strengths have allowed them to broaden their product offerings to include a full range of architectural hardware and electronic access control solutions. From this position of strength, the company will dedicate more resources to develop innovative solutions that create trust and value for the customer, because trust is its most valuable asset.</div><div> <br>​</div><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Lenel%2014_onguard_logo_cmyk.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />LENEL</h4><p> <strong>Booth #2700<br></strong><span style="line-height:1.5em;">L</span><span style="line-height:1.5em;">enel of Pittsford, New York, part of UTC Building </span><span style="line-height:1.5em;">& Industrial Systems, offers an open security plat- form designed to address the essential needs of enterprise applications. Lenel’s OnGuard security management system sets the standard for intelligent solutions and can be customized to meet specific business demands. The OnGuard system continues to improve, offering new and better ways </span><span style="line-height:1.5em;">to facilitate data optimization and enhance security and business operations. Incorporating responsive technology with advanced analytics, the system delivers improved and expanded functionality, while accommodating future enhancements.</span></p><div><hr /><h4>iJet<img src="/ASIS%20SM%20Article%20Images/0916%20iJET_GIOC_HandPhoneApp%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /></h4><div> <strong>Booth #1563</strong></div><p>Using tailored solutions from iJET International of Annap- olis, Maryland, allows multinational organizations to operate globally with confidence. The solutions integrate operational threat intelligence, innovative technology, and response services to help organizations avoid threats, mitigate risk, and protect people, assets, and reputations. The Global Integrated <span style="line-height:1.5em;">Operations Center enables clients to prepare for, monitor, and quickly respond to a variety of potential or realized threats in the most effective way possible. The Response Operations Center proactively monitors threats around the clock, ensuring that the best information is always available for critical decision making.</span></p><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><div><h4>ComNet<img src="/ASIS%20SM%20Article%20Images/0916%20ComNetCNGE24FX12TX12MS%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:261px;" /></h4> <strong>Booth #3561</strong></div><p>ComNet, Communication Networks of Danbury, Connecticut, is introducing a new series of high port count managed switches that are designed and manufactured at its Danbury, Connecticut, facility. The first of these new switches is the all Gigabit CNGE24FX12TX12MS(POE) <span style="line-height:1.5em;">(HO) managed switch with 12 SFP ports and 12 TX power </span><span style="line-height:1.5em;">over Ethernet (PoE) ports. The </span><span style="line-height:1.5em;">switch is designed to protect the network it is being used on, offering multiple redundancy protocols to keep the network free from points of interruption. The standard PoE model delivers 30 watts of power to all 12 TX ports.</span></p><div><hr /><div><h4>Ameristar Perimeter Security<img src="/ASIS%20SM%20Article%20Images/0916%20Ameristar%20Product%20Showcase_ASIS%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:216px;" /> </h4> <strong>Booth #3813</strong></div><p>Ameristar Perimeter Security of Tulsa, Oklahoma, offers a full line of perimeter security products, including gate systems, anti-ram fences, active vehicle barriers, bollards, and guard booths. Its team of architectural specialists and market developers works closely with design firms to ensure that each project meets the customer’s ex- pectation for security, safety, and success. Ameristar’s security experts help companies find the best solution for each project, dealing with unique challenges that require a balance of active security components and physical security systems.</p><p> <br> </p><div><div style="background-color:#ffffff;"><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/sgm%20logo%20-%20paul%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:140px;" />Security Guard Management </h4> <strong>Booth #3172</strong></div><p>SGM of Dunkirk, Maryland, offers programs designed to train an entire staff of security offi- cers and supervisors. Training programs come in video, hardcover manuals, or a combination of both. Drawing on 22 successful years in the security guard industry, the company writes and develops original training programs. The newest program, Video on Demand, allows security of- ficers to view any or all of the 31 training videos using a smartphone, tablet, or computer. After <span style="line-height:1.5em;">watching the video, they take a test. A score of 80 percent or better entitles them to a cer- tificate that they can print out and/or email to the training director.</span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div><div><div><p>​<br></p></div><div><hr /><div><h4>Research Electronics International<img src="/ASIS%20SM%20Article%20Images/0916%20REI_ASIS_PROD_SHWCSE_%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:202px;" /> </h4> <strong>Booth #1431</strong></div><p>Research Electronics International (REI) of Algood, Tennessee, manufactures products that protect against intellectual property theft. New products include the ANDRE Near-Field Detection Receiver and the ORION 900 Non-Linear Junction Detector. The ANDRE is a broadband RF detector for quickly locating RF transmissions such as audio and video devices. The ORION <span style="line-height:1.5em;">900 detects less-sophisticated circuitry and provides better signal penetration through certain construction materials. REI also manufactures the OSCOR Green Spectrum Analyzer for RF detection and analysis, the TALAN Telephone and Line Analyzer, and more. The REI Training Center provides year-round courses as well as custom remote training.</span><span style="line-height:1.5em;">​</span></p><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20DL2700LD%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:188px;" />Napco Security Technologies (Alarm Lock)</h4><p> <strong>Booth #3500</strong><br><span style="line-height:1.5em;">Alarm Lock, a division of Napco Security Technolo</span><span style="line-height:1.5em;">gies of Amityville, New York, offers Trilogy Networx Wireless Access Locks that eliminate door-to-door programming and audit trail retrieval by communicating wirelessly via Ethernet or 802.11B/G. With all the functionality of the original Trilogy standalone lock, these wireless locks provide a quick, easy, eco</span><span style="line-height:1.5em;">nomical access system with advanced features and functions, like automatic schedules, event logs, and support, for 2,000 doors and 5,000 existing proximity ID cards and badges, but with no wires to run and no access panels or power supplies to buy or install.​</span></p><div><hr /><div><h4>IDV Solutions ​<img src="/ASIS%20SM%20Article%20Images/0916%20IDV%20Solutions%20visual-command-center-asis-16%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:260px;" /></h4> <strong>Booth #1557</strong></div><p>Visual Command Center software from IDV Solutions of Lansing, Michigan, is an enterprise platform for risk intelligence and response that is used by some of the largest organizations in the world. The latest version introduces a new information architecture de<span style="line-height:1.5em;">signed to support stakeholders inside and outside of the command center and to make more effective use of the command center video wall.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Allied%20Universal%20Tagline%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:273px;" />Allied Universal</h4><p> <strong>Booths #2412 and 2350<br></strong><span style="line-height:1.5em;">Allied Universal of Sant</span><span style="line-height:1.5em;">a Ana, California, is offering clients autonomous robot “Machine as  a Service” using Knightscope K5 and K3 robots— called autonomous data machines. The robots operate within a geo-fenced area and provide alerts generated by video, themal imaging, peo- ple detection, license plate recognition, parking </span><span style="line-height:1.5em;">monitoring, audio recording, two-way intercom, and audio broadcast. All data is accessible through the Knightscope Security Operations Center (KSOC), a highly intuitive, brows</span><span style="line-height:1.5em;">er-based user interface. Customers can recall, review, and save data for forensic purposes and use the new iOS mobile app (Android coming soon) for remote access.</span></p><div><hr /><div><h4>DSX Access Systems<img src="/ASIS%20SM%20Article%20Images/0915%20DSX%20ISC%20West%20Showcase%20picked%20up%20from%20ISC%20West%202013%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:157px;" /> </h4> <strong>Booth #1551</strong></div><p>DSX-AES256 software from Dallas-based DSX Access Systems, Inc., contains government-approved AES-256 bit encryption technology that can be implemented systemwide. Communications to each location can be encrypted with a unique encryption key assigned by the customer for communicating with that location’s field controllers. The software encrypts communications to all panels in <span style="line-height:1.5em;">that location without using add-on devices. Because encryption technology is inherent in the software and controllers, implementation is easy. All 1040 Series and 1022 controllers can be flash-upgraded to the AES-256 bit version.</span><span style="line-height:1.5em;">​</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Capindex%20CRIMECAST%20Premium%20Report%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:198px;" />CAP Index ​</h4> <strong>Booth #1851</strong></div><p>CRIMECAST Reports from CAP Index of Exton, Pennsylvania, provide critical crime risk intelligence and help businesses meet ASIS/RIMS guidelines for facility risk assessments with competent evaluation of location risk and impartial, independent, and objective risk data. Reports provide the objective data that can help direct security resource allocation, tier security packages, <span style="line-height:1.5em;">and improve site selection while mitigating risk and exposure. CAP Reports are also a key component in demonstrating legal due diligence. The team at CAP also builds custom risk models and custom CAP Scores specific to brand objectives and challenges.</span><span style="line-height:1.5em;">​</span></p><div><hr /><div><h4>Designed Security, Inc.<img src="/ASIS%20SM%20Article%20Images/0916%20DSI%20ES8900%20Slimline%20150%20x%20133%20300dpi%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:160px;" /> </h4> <strong>Booth #3031</strong></div><p>The new Slimline Series from Designed Security, Inc., (DSI) of Bastrop, Texas, provides a refined visual and physical turnstile with barrier. Its smaller footprint enables customization to fit in smaller areas. Each unit can monitor passage of up to 60 people per minute per lane. It integrates with any access control system. Made of acrylic, it offers a sense of openness. It also features a <span style="line-height:1.5em;">programmable LCD display with audio wavefile capabilities, plus next-generation optical sensing technology for increased accuracy.</span></p><p> <span style="line-height:1.5em;"></span> <span style="line-height:1.5em;">​</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Twist%20and%20Go%20HID%20Global%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:273px;" />HID Global </h4> <strong>​Booth #3901</strong></div><p>HID Global of Austin, Texas, launches new HID Mobile Access, which adds support for wearables, including Apple Watch (iOS 8+) and Android Wear (4.4+) in companion mode, as well as support for tablets to expand mobile options for opening doors and gates. New HID Mobile Access Portal and App software developer kits enable end users and partners to create customized mobile access solutions that can be fully integrated into their back-end systems. The new capabilities extend HID <span style="line-height:1.5em;">Global’s mobile access solution, which also includes Mobile IDs, Mobile Apps downloadable from The App Store and Google Play, iCLASS SE readers, and the HID Mobile Access Portal for provisioning and revoking Mobile IDs.</span><span style="line-height:1.5em;">​</span></p><div><hr /><div><h4>MBM Corporation ​<img src="/ASIS%20SM%20Article%20Images/0916%20MBM%20Destroyit%20Shredders%20by%20MBM%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:149px;" /></h4> <strong>Booth #2073</strong></div><p>Industrial-quality Destroyit paper shredders from MBM Corporation of Charleston, South Caro- lina, allow customers to securely shred sensitive documents without using an outside shredding service. They provide the peace of mind that comes from knowing confidential data won’t fall into the wrong hands. MBM offers more than 40 models to meet any security need, and all are equipped with industry-leading safety features. Precision-engineered in Germany for years of reli- ability, the cutting heads are warranted for life.<span style="line-height:1.5em;">​<br><br></span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Morse%20Watchmans%20KeyWatcher%20Touch%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:164px;" />Morse Watchmans ​<br></h4> <strong>Booth #3651</strong></div><p>Morse Watchmans of Oxford, Connecticut, is improving its KeyWatcher Touch to make it more se- cure and more useful. For improved cybersecurity, the data between the KeyWatcher Touch and the KeyWatcher server can be encrypted with AES256 technology with a pre-shared key that is definable on a site-by-site basis. The server service can run under a domain user account, and Windows au<span style="line-height:1.5em;">thentication is now supported for SQL. The KeyPro III software import utility was revamped to make it easier to use. Other enhancements include easier replacement of keys from the TrueTouch key tracking software, new notifications, and better control of reports.</span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div> <br> <div><div> <br> </div><div><hr /><div><div><h4>Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20POE%20Controller_%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:210px;" /> </h4> <strong>Booth #3500</strong></div><p>Continental Access, a division of Napco Security Technologies of Amityville, New York, introduced the CICP2100 uniVerse Single Door Controller, which supports two readers on one door using power over <span style="line-height:1.5em;">Ethernet. In a CA3000 or CA4K access control software environment, the tamper-supervised controller accommodates two readers and/or one low-current strike, fits in a standard double gang electrical box, and can be net- worked with Accelaterm or Supertwo Controllers and/or Networx Wireless Access Control Locks.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20Yale%20Yale-Multi-Family-Solution%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:180px;" />ASSA ABLOY</h4><div> <strong>Booth #3601</strong></div><p>The Multi-Family Lock Management Solution from Yale Locks & Hardware of Berlin, Con- necticut, an ASSA ABLOY Group brand, is a single system for securing multifamily facilities easily and affordably. It works using Yale Accentra Multi-Family Software, a user-friendly, cloud-based solution that manages access for residents, guests, and staff. Combined with locking hardware and innovative technology, the smart solution helps users increase security, convenience, and peace of mind.</p><div> <br> </div><div><hr /><div><div><h4>Altronix<img src="/ASIS%20SM%20Article%20Images/0916%20Altronix%20NetWay4EWP%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:145px;" /> ​</h4> <strong>Booth #2011</strong></div><p>Altronix of Brooklyn, New York, introduced NetWay4EWP Outdoor Managed PoE+ Switches with Fiber. They feature four PoE/PoE+ ports at 30 watts or two ports at 60 watts (Hi-PoE), and a 1Gb SFP uplink <span style="line-height:1.5em;">f</span><span style="line-height:1.5em;">or IP over fiber applications at 10/100Mbps. The switch is housed in an IP66, NEMA4/4X rated enclosure for use in harsh environments. It includes battery charging for appli- cations requiring back-up power and Altronix’s innovative LINQ Network Communications Technology that allows users to monitor, control, and report power from anywhere.</span></p><div> <br> </div><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Amico%20AMICO%20VANGUARD%20SYSTEM%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:270px;" />Alabama Metal Industries Corporation (AMICO) </h4> <strong>Booth #1242</strong></div><p>AMICO Security of Birmingham, Ala- bama, launched the Vanguard Perimeter System, a unitized perimeter security framework that incorporates proprietary engineered components to create a unified perimeter barrier. Continuous longitudinal rails tie the entire system together to create a full-length curtainwall, while eliminating many of the cuts, clamps, and connections needed to install most fences. The system can accommodate many different types of <span style="line-height:1.5em;">panels made from virtually any material, and the system has been tested to withstand wind loads up to a category 5 hurricane. The design allows for simple integration of fiber optic and impact cables, in addition to cameras, lights, radar, and other accessories.</span></p><div> <br> </div><div><hr /><div><div><h4>Illinois Engineered Products ​<img src="/ASIS%20SM%20Article%20Images/0916%20Illinois%20Engineer%20Products%20Saf-T-Gas%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:270px;" /></h4> <strong>Booth #1062</strong></div><p>The Saf-T-Gas Cabinet from Chicago-based Illinois Engineered Products features an open mesh design that allows for visual inspection <span style="line-height:1.5em;">of stored tanks. Five designs accommodate ver- tical and/or horizontal gas tanks and prevent dangerous buildup of flammable gases. A hasp for a padlock secures the cabinet, which is powder coated in a safety yellow finish and features welded construction. The company’s VUE </span><span style="line-height:1.5em;">Locker is also made with an open mesh design and a welded-on hardened steel hasp that resists cutting and hammering. The welded construction and powder-coated finish makes these products hold up in the harshest industrial settings.</span></p><div> <br> </div><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/Unitek%20K500_pred_model_GA16.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:121px;" />Unitex Direct </h4> <strong>Booth #3272</strong></div><p>Unitex Direct of Walled Lake, Michigan, offers comfort- able classic polo shirts with superior wrinkle and shrink resistance, a silky feel, and a range of styles, sizes, and colors. Ideal for uniforms, Port Authority Silk Touch Polos K500 are available in long- and short-sleeved versions for men and women. Made from 5-ounce poly- ester-cotton pique with flat-knit collar and cuffs, the shirts feature double-needle armhole seams and hems, metal buttons with dyed-to-match plastic rims, and side vents. They are available in sizes from XS to 10XL. The company provides a large array of clothing, footwear, <span style="line-height:1.5em;">and accessories for public safety and private security personnel.</span></p><div><div> <br> </div><div> <br> <hr /><div><div><h4>RS2 Technologies ​<img src="/ASIS%20SM%20Article%20Images/0916%20RS2%20Universal.NET_1%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:204px;" /></h4> <strong>Booth #3361</strong></div><p>Access It! Universal.NET access control software from RS2 Technologies of Munster, Indiana, features a browser thin client for easy installation and updating on multiple workstations, multiple monitor support, and integration with wireless/IP and PoE locksets and other third-party devices. It features an optional data exchange utility that supports Microsoft Active Directory integra- tion, along with scheduled data imports from various <span style="line-height:1.5em;">data sources. It also includes a mobile client that allows users to manage their access con- trol system from any mobile device. Suitable for business of any size, the software allows users to select the feature sets they need to build a scalable, cost-effective system.</span></p><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/0915%20Showcase%20ABLOY%20SECURITY%20SM_Showcase%20Img%20option%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:149px;" />Abloy Security ​</h4> <strong>Booth #3601</strong></div><p>Abloy Security of Irving, Texas, offers a range of tough locks that can withstand severe weather conditions and environmental extremes. ABLOY PROTEC2 CLIQ LED key and interface make it easy to retrofit mechanical locks with electrome- chanical models. There are no batteries in the locks, because the power comes from the key. <span style="line-height:1.5em;">CLIQ technology provides audit trails in both the </span><span style="line-height:1.5em;">lock and the key, flexible time functions, and immediate removal of lost keys. All padlocks feature case-hardened boron-steel shackles and hardened steel UL-listed cylinders. Patent-protected keys can also open ABLOY door locks, and the keys cannot be duplicated.</span></p><div> <br> </div><div> <br> </div><div> <br> </div><div><hr /><div><div><h4>John Jay College of Criminal Justice<img src="/ASIS%20SM%20Article%20Images/John%20Jay%20Online%20Logo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:149px;" /> </h4> <strong>Booth #2678</strong></div><p>John Jay College of Criminal Justice, part of the City University of New York system, now offers 100 percent online master’s level courses in Security Management; Inspection, and Oversight, with a new healthcare special- ization; Public Policy Administration; and now Criminal Justice. Professionals who are interested in earning a master’s degree, but d<span style="line-height:1.5em;">o not have the time to attend traditional classes, will be able to learn on their own sched- ule. Contact John Jay Online toll free at 844/552-9665, or visit http://online.jjay.cuny.edu to learn more about current and coming programs and services.</span></p><div> <br> </div><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20%20IN100%20Aperio%20Wireless%20Lock%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:140px;" />ASSA ABLOY</h4><div> <strong>Booth #3601</strong></div><p>ASSA ABLOY of New Haven, Connecticut, announced that its brands Corbin Russwin and SARGENT introduced a new IN100 Aperio wireless lock, which offers the convenience and flexibility of Aperio wireless technology with the real-time communication of online access control. Remote locking or unlocking can be accomplished in less than 10 seconds. The IN100 also provides simul<span style="line-height:1.5em;">taneous support for multiple credential types and HID Mobile Access powered by Seos. The lock is available in cylindrical and mortise lock configurations, with a choice of black or white reader and a broad range of finishes and levers.</span></p><p> <span style="line-height:1.5em;">​<br></span></p><div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><p>​</p></div></div>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465