Strategic Security

 

 

https://sm.asisonline.org/Pages/Five-Not-So-Easy-Pieces.aspxFive Not-So-Easy PiecesGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-08-01T04:00:00Z<p>​Alignment is in. Many cities, municipalities, corporations, and school systems are taking steps to align their physical security systems so that security programs across locations will be fully integrated.</p><p>The benefits of such a move are numerous. Uniformity across systems makes it easier for end users, and converged systems are easier to manage from operation centers. Moreover, having only one system makes maintenance and upgrades easier, and this can help provide long-term stability. </p><p>But achieving alignment is no easy feat. Navigating a physical security installation across several facilities can be a difficult undertaking; often, such a project includes wrangling a mish-mash of individual products to get them to function under one cohesive system. Alternatively, some take the approach of completely redesigning the physical security system so that it reflects current best practice design standards. Both paths can be difficult.  </p><p>In addition, the potential pitfalls of attempting a unification project are numerous. What is the installation environment in each facility? Which key players need to be involved at each facility, and at what level of involvement? What type of network infrastructure must be in place to integrate the systems? </p><p>In hopes of avoiding pitfalls, many organizations will hire project managers and consultants to spearhead alignment projects. This type of management, however, is usually complex and unpredictable work. Thus, one of the most useful attributes a security practitioner can have is experience in project management.</p><p>Although there is no one roadmap for successful project completion, and despite all the caveats, most projects can be broken down into five stages. The main purpose of this article is to walk the reader through these stages, which experts sometimes refer to as "process groups." The five process groups are initiating, planning, executing, monitoring and controlling, and closing. For our purposes, the second process, planning, can be considered the design process, and the third process, executing, can be considered the installation process. </p><p>Although these stages will remain consistent, the role and scope of a project manager's responsibilities will change from project to project. And, there may be many project managers on a single project: one for the design team, one representing the owner, one who serves as an installation project manager in the field, and others. Each will have different responsibilities.   </p><p>Primarily, this article is written from the point of view of the project manager who is outside of the org­anization and is hired by an owner to design and manage a project that will be installed by a third-party contractor, either through a public bid or the solicitation of proposals. Typically, this type of manager would be a consultant who works on a project-by-project basis with different teams and organizations, for the procurement and installation of a multi-facility physical security system.</p><p>However, the concepts and best practice guidance offered here could be applied to almost anyone involved with the management or supervision of physical security projects, whether that person is inside or outside the organization.​</p><h4>Initiating</h4><p>As a project kicks off, the act of project management is often the act of discovery. The project may be ill-defined, just a blurry picture of the needs and goals of the project's owner. But an ill-defined project cannot be effectively managed, so it is often the project manager's task to focus the project with the owner into a clear and actionable roadmap.</p><p>For the project manager, one of the main goals of the initiating process is to get up to speed with the requirements, history, and expectations of the project. This includes understanding who the project stakeholders are and determining the project's requirements, constraints, and assumptions.  </p><p>Physical security projects can be sponsored by a range of departments in an organization, including security, facilities, IT, finance, and general management. But these departments may have different levels of familiarity with physical security systems, so the project manager must gain an understanding of how well the owner's team knows physical security. This understanding should then inform the project manager's general approach, including the process of assembling the design team. </p><p>This understanding can be gained during the meetings that take place during the initiating process. For example, the design or project management teams may be akin to experts—they will design and demonstrate how the systems work and function together and explain design best practices. In another project, the design team may merely be documenting the project for an owner who already has a strong grasp and understanding of physical security best practices and the needs of each facility. </p><p>Another key task of the initiating process is to learn the requirements and goals of the project. What is the general scope? What physical protection systems will be affected? Will this be a replacement project, or will it integrate with existing systems? Is there a deadline for installation completion? If grant money is involved, is there a deadline for spending funds? Each answer is part of the roadmap.</p><p>Once the initially hazy picture has come into focus, the project manager may take the next steps. These include developing a rough estimate of how many days will need to be spent in the field documenting existing conditions and systems, and how many designers should be hired to create design documents. Other decisions involve who will sit on the project stakeholder's team, whether the owner will require manufacturer demonstrations, and what a reasonable cost for the project looks like. </p><p>During this stage, the project manager may discover that the existing team of stakeholders is inadequate. In this case, the project manager should try to ensure that all decision makers are included, and that, if applicable, teams not directly associated with security are also represented, or at a minimum made aware of the project. Other stakeholders, for example, could include facility directors, senior management, service providers, IT teams, and grant funding representatives. If the project is for a municipal, city, or public organization, the owner may prefer to involve law enforcement in the early stages and throughout the process.</p><p>By the end of this first stage, all stakeholders should understand their roles within the project, what will be expected of them, and the type of work that will be performed on their systems or the facilities they manage. Accomplishing this early is important. It is never a good idea to inform an IT director of an IP video surveillance project a week before the network electronics are scheduled to be installed.​</p><h4>Design</h4><p>The greatest indicator of a well-executed project is a well-executed design process. The overall objective of this process is to create a complete set of project documents that a third-party contractor or integrator can then use to create a proposal or bid. </p><p>These documents, typically referred to collectively as the project manual, will typically include plan drawings, wiring diagrams, and riser and elevation drawings. They also include specifications explaining the scope, the installation standards, the configurations of various systems, and other pertinent information. Front-end documents in the manual often describe the nature of the project and any general requirements that the bidding contractor must adhere to. </p><p> To create a thorough project manual, it is important for the project manager to assemble a qualified design team. Physical security projects can be derailed by subpar designs that do not consider each facet of each system's requirements. The design team must be able to accurately document the correct configuration requirements among systems; all installation best practices and requirements; the code requirements and testing parameters; and the closeout tasks such as training.</p><p>Once the design team is assembled, the project manager begins the process of creating progressively more detailed designs and reviewing them periodically with the owner. A good guide is to review the design documents at 50 percent completion, 75 percent, 98 percent, and 100 percent. At each review, it should be conveyed to the owner what was refined, changed, omitted, or added from the last review. </p><p>The overall cost and the installation schedule should also be reviewed at those junctures. Most likely, the project will have a specific budget and installation schedule that the design team must adhere to. At each design milestone, the project manager must ensure that the owner understands the budget and schedule. Any major design change should be reviewed with the owner.</p><p>If the project does not have a predetermined budget, the project manager should have a usable estimated cost range after project initiation. At the halfway point, an estimate within a few percentage points of the actual cost should be completed and reviewed with the owner. It is also important the owner understands how any future requests will affect the budget and installation schedule. </p><p>Ideally, the project should leave 10 percent of the total budget in contingency to cover unforeseen costs. For example, for a project with a budget of $1 million, the design team should allocate up to $900,000 and leave $100,000 for contingencies. Aside from this practice, some projects also contain a management contingency designed to cover changes in project scope directed by management. However, this contingency may or may not be shared with the project manager, and it may not be included in the total project budget. </p><p>When it comes time to estimate individual costs, the environment and condition of existing facilities should be kept in mind. Areas likely to add surprise costs to the project should be reviewed. Take ceilings, for example. If the facility has open ceilings, will the low-voltage cabling need to be run in conduit? If so, how much cost will that add? Or, consider data closets. Is there adequate wall space to mount patch panels, switches, and servers? Is there wall space to mount security panels? Other areas that should be reviewed for cost impact include power requirements, configuration fees for integrating systems, and software fees for updating out-of-date systems, among other items.</p><p>Taken together, the overall goal of the planning and design process is to create a project manual that is fair to both the owner's needs for attaining the project goals, as well as the contractor's needs to correctly price the project. </p><p>Many potential headaches that could occur during the installation process can be mitigated by giving the contractor a realistic schedule for procurement and installation of the systems, and by ensuring that the project comes in at or under budget. This is done by informing the owner early and often of the realistic requirements that the scope of the project will require. All cost-saving measures should be considered during the design process when at all possible.</p><p>Throughout the design process, the project manager and design team should constantly ask themselves, "If I were a contractor, would I be able to properly price this project based on the project manual documents without adding change orders in the field?" Many projects are soured by an incomplete project manual that puts the contractor in the disadvantaged position of having to constantly submit change orders to correct their fee. ​</p><h4>Executing</h4><p>If the goals of the planning process were accomplished—including properly and completely documenting the physical security systems, their installation requirements, and all responsibilities required by the installation contractor—then the executing process should run relatively smoothly.</p><p>During the executing process, the contractor who was awarded the project proceeds with installing and testing the systems. Sometimes the project manager and design team stay on to manage the schedule and invoices, review the installation and test results, and generally ensure that that the project is being installed to the quality standards documented in the project manual on behalf of the owner. </p><p>The relationships among designers, consultants, project managers, and contractors should be built on teamwork and based on the shared goal of providing the owner with a well-executed project and physical security system. The best projects are those where a mutual respect and a spirit of genuine collaboration are exhibited by all parties and where the project manager has the best interest of all parties in mind.</p><p> Although, careful initial documentation of exactly what is expected of the installation will help avoid oversights and miscommunications, it is still prudent, and often mandatory, for the project manager to review and approve the work being completed. During this process, the manager's best strategy for ensuring that the project is executed well is to stay vigilant in correcting all possible holdups.</p><p>If the overall budget fails to capture all installation costs, change orders can occur during the installation process, after the project has been awarded to a contractor. A change order is a claim to a change in scope that usually comes with an associated cost. It is used by the contractor to seek fees for the change. Change orders can be owner directed or project directed, and they can be legitimate or illegitimate. </p><p>Here's an example of a legitimate, owner-directed change order. After a project manual went out to bid and the project was awarded to a contractor, the owner requested to add access control hardware to a door. This hardware was not included in the design, so the contractor was not allowed to give a cost associated with it. Seeking a fee to now include that door in the installation was a legitimate change order. </p><p>Here's an example of a legitimate project-directed change order. The contractor discovered that 100 feet of conduit was needed to mount a video surveillance camera in an open-ceiling mechanical space. The project manual did not clearly document that the contractor would need conduit at this location, so the contractor sought to submit a change order for the cost of procuring and installing the conduit.</p><p>Illegitimate change orders occur when a contractor seeks fees for a task or product that was clearly documented in the project manual and, therefore, should have been included in the proposal or bid. It should be noted that legitimate or illegitimate status will not determine if the change order will be accepted by the project. Change order acceptance or rejection is determined by the project manager, owner, and other applicable stakeholders.</p><p>One benchmark of success for the project is the number and scope of change orders. In other words, how close was the executed project to the agreed upon budget and original design?​</p><h4>Monitoring and Controlling</h4><p>If the project manager's responsibility is to review and sign off on the installation, it is best to do so early and often. The goal is to correct minor issues before they grow into major issues. </p><p>For example, let's assume a contractor completes a 200-door access control project across 20 different facilities, but does not properly secure the cabling above the ceiling grid as designed. The longer the project manager waits to get on site and review the work, the more difficult it will be to fix this mistake. If the cabling contractor is a subcontractor of the prime contractor and is finished with the scope of work, by the time the project manager is on site to review the work, it may be impossible to correct these mistakes.</p><p>The project manager should be on site to review, at a minimum, the first few devices that are installed to ensure that the installation is clean and to specification. Indeed, many contractors prefer this method of installation kickoff because it will ensure that the installation is on the right track. </p><p>Common installation mistakes found on physical security projects can include sloppy or exposed cabling to devices; installation of sensors, cameras, and other devices that are not plumb or properly secured; low-voltage cabling strung across the ceiling grid and not on cabling support; failure to firestop applicable penetrations; and poor cable management and cable terminations in the data closets and control panels, among other things.</p><p>All site visits, communications between owner and contractor, issuances of work that need to be fixed, and approvals of work done correctly should always be formally documented and distributed to the entire team in field reports and punch lists. In turn, the contractor must document any corrections or installation requirements that are completed. </p><p>Requests for information from the field, product submittals, invoice submittals, and general project housekeeping should be reviewed and answered by the project manager in a timely matter to ensure that the project is not delayed due to lack of direction for the contractor or owner.  </p><p>Sometimes, the biggest roadblocks to completing a project on schedule are the tasks that must be completed by the owner. It is important that the project manager also manage this side of the project. He or she should inform the owner early and often when tasks will be due and should sometimes advise them on how they can be best completed. These tasks may include providing IP addresses for cameras, printing and issuing badges for new access control systems in time for system cutovers, providing configuration on network electronics if required, and configuring and relaying information related to VLANs, among other things. </p><p>Often, contractors are only allowed to invoice for work completed or for devices that were purchased and delivered to the facility. If the project manager is tasked with reviewing invoices, it should be easy to approve or reject fees based on work completed because the project manager has periodically seen and reviewed the work in person.</p><p>Most projects will require that the project hold a retainer against the contractor's fee until the project is 100 percent complete. This retainer is held until the end of the project, after all the installation and miscellaneous responsibilities of the contractor have been met. Each project may have specific requirements in terms of payment and proof of work for payment that should be reviewed and adhered to by all parties.  ​</p><h4>Closing</h4><p>The closing process can be initiated when 10 percent of the project is left to complete. Common tasks to be completed during the closeout process include administering training, delivering operation and maintenance manuals, final testing of systems, reviewing the system test results, reviewing cabling test results, and handing over the systems to the owner. </p><p>It is a good idea to start closeout tasks when the project is around 75 percent complete. However, getting the owner and relevant stakeholders together for training and close-out meetings can be a difficult task depending on their schedules. If the project is being completed in a school district, for example, training may need to wait for a professional development day, so it is best to book training as soon as the trainer is available. </p><p>Depending on the owner's level of expertise, it may also be beneficial to include additional training in the project manual two to six months after the project is handed over to the owner. This will allow the owner to schedule refresher training if desired. </p><p>Once the project manager and design team accept the final installation; all closeout deliverables are finalized; and all final fees, contingencies, and invoices are paid; the project is handed over to the owner and the project is considered complete. </p><p>Successful project completion requires improvisation, teamwork, thoroughness, and foresight. All are skills that are developed over time and through hands-on experience on projects of different sizes and types. The best project managers are those who learn from their mistakes, document their lessons learned, and share those insights with the project management and security management communities.  </p><p><em><strong>Nicholas D'Agostino, </strong>PSP, PMP, is a senior manager of system design for D'Agostino & Associates, a technology consulting firm. He has spearheaded multiple city-wide physical security upgrade projects throughout the Northeast. He can be reached at NickD@DA-Technology.com. D'Agostino is a member of ASIS International.</em></p>

 

 

https://sm.asisonline.org/Pages/Securing-Complex-Aviation-Environments.aspx2018-12-01T05:00:00ZSecuring Complex Aviation Environments
https://sm.asisonline.org/Pages/How-to-Foster-A-Safety-Culture.aspx2018-10-01T04:00:00ZHow to Foster A Safety Culture
https://sm.asisonline.org/Pages/Attendees-Get-a-Jump-Start-on-GSX.aspx2018-09-25T04:00:00ZAttendees Get a Jump-Start on GSX

 

 

https://sm.asisonline.org/Pages/Dancing-With-Yourself.aspx2018-12-01T05:00:00ZDancing With Yourself
https://sm.asisonline.org/Pages/Book-Review-IT-Policies.aspx2018-12-01T05:00:00ZBook Review: IT Policies
https://sm.asisonline.org/Pages/Certification-Profile-Jeffrey-A-Slotnick-CPP-PSP.aspx2018-12-01T05:00:00ZCertification Profile: Jeffrey A. Slotnick, CPP, PSP

 

 

https://sm.asisonline.org/Pages/Preserving-Precious-Property.aspx2018-07-01T04:00:00ZPreserving Precious Property
https://sm.asisonline.org/Pages/Taking-Off.aspx2018-06-01T04:00:00ZTaking Off
https://sm.asisonline.org/Pages/An-Expert-Partnership.aspx2018-02-01T05:00:00ZAn Expert Partnership

 

 

https://sm.asisonline.org/Pages/A-Shock-to-the-System.aspx2018-12-01T05:00:00ZA Shock to the System
https://sm.asisonline.org/Pages/Dancing-With-Yourself.aspx2018-12-01T05:00:00ZDancing With Yourself
https://sm.asisonline.org/Pages/SM-Online-November-2018.aspx2018-11-01T04:00:00ZSM Online November 2018

 

 

https://sm.asisonline.org/Pages/December-2018-Legal-Report.aspx2018-12-01T05:00:00ZDecember 2018 Legal Report
https://sm.asisonline.org/Pages/Legal-Report-Resources-November-2018.aspx2018-11-01T04:00:00ZLegal Report Resources November 2018
https://sm.asisonline.org/Pages/November-2018-Legal-Report.aspx2018-11-01T04:00:00ZNovember 2018 Legal Report

 You May Also Like...

 

 

https://sm.asisonline.org/Pages/ASIS-2016-Product-Showcase.aspxASIS 2016 Product Showcase<div style="background-color:#ffffff;">​<em>Fall 2016 Product Showcase.​</em><h4><em></em>​Detex<img src="/ASIS%20SM%20Article%20Images/0916%20Detex%20Weatherized%20RH%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" /></h4><p> <span style="line-height:15px;"><strong>Booth </strong></span> <span style="line-height:15px;">​</span><span style="line-height:15px;"><strong>#2929</strong><br></span><span style="line-height:15px;">Detex Corporation of New Braunfels, Texas, off​ers weatherized panic hardware that is ideal for outdoor areas or fenced and gated areas that need to be protected from unauthorized entry while still providing emergency exit in panic conditions. The Outdoor Area System offers Advantex quality, so it is dura- ble in outside environments and has a safe, smooth surface that </span><span style="line-height:15px;">comes in a variety of complementary finishes. The optional EasyKit includes components to meet the needs of complex applications. Systems could include weatherized panic devices, access control devices, weatherized door prop alarms, and more. They can be ​</span><span style="line-height:15px;">ba</span><span style="line-height:15px;">ttery powered or hardwired.</span></p><p> <br> </p><hr /><div> ​ <div style="background-color:#ffffff;">​ <div><h4>​Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20ArchiTech%20iLock%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:184px;" /> </h4> <strong>Booth #3500</strong></div><p>ArchiTech Series Networx Locks from Marks USA, a division of Napco Security Technologies of Amityville, New York, create an advanced wireless access control solution with an attractive, infinitely customizable, designer locking form factor, in a choice of trims and finishes. ArchiTech and its iLock App are wirelessly linked together using universally compatible Bluetooth LE technology. The system stores encrypted data to provide secure access without a key, so users can use any smart device to unlock ArchiTech from a customizable range of up to 30 feet away.​</p><div>​</div><div> <br> </div><div> <br> </div><div> <br> </div><div> <br> </div><div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Talkaphone%20VOIP-200%20System%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />​Talkaphone </h4><div> <strong>Booth #1951</strong></div><p>Talkaphone of Niles, Illinois, announced that its VOIP-200 Series Call Station interconnects with the AVM-1 IP video attendant phone from Grandstream to provide a fully integrated access control system. With the ability to connect to up to 30 VOIP-200 call stations, the AVM-1 can monitor and regulate entry points through the call stations using video and voice communications. The AVM-1 unit will receive basic preprogramming to integrate effortlessly with Talkaphone VOIP-200 Series. The call station and <span style="line-height:1.5em;">phone deliver a comprehensive access control solution that can be integrated with existing systems, including Avaya Aura and Cisco Unified Communication Manager.</span></p><div> <br> </div></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;">​<hr />​<br></div></div><div><div><h4>G4S Secure Solutions<img src="/ASIS%20SM%20Article%20Images/0916%20G4s%20showcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:195px;" /> </h4> <strong>Booth #3151</strong></div><div>G4S Secure Solutions of Jupiter, Florida, secures people, property, and assets by understanding and mitigating security risk. The company integrates the full power of its resources and expertise to drive optimal and cost-efficient results. It provides customized security solutions that can include risk consulting and investigations, systems integration, security software and technology, and security officers to help address any challenge that may arise. AMAG Technology, a G4S company, manufactures and deploys the Symmetry access control and video management product line. Altogether, the security personnel, management, and technology offer award-winning security services.</div><div> <br>​</div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Hanwha%20Samsung%20%200916%20Hanwha%20Samsung%20Q-series-bullet%20(2).jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:203px;" />​Hanwha Techwin</h4> <strong>Booth #2641</strong> <p>WiseNet Q Series cameras from Hanwha Techwin America of Ridgefield Park, New Jersey, feature highly efficient H.265 compres- sion technology; users benefit from up to 75 percent reduction in bandwidth and storage requirements compared to the H.264 stan<span style="line-height:1.5em;">dard. The 24 models in the Q Series also include the company’s WiseStream codec, which balances image quality and compression based on motion within a scene. Available in 2MP and 4MP full HD versions, the cameras include true wide dynamic range, hallway view, and lens distortion correction. Infrared illumination is a standard feature to ensure that cameras deliver high-quality images in nearly every situation.</span></p><div> <br> </div> <br> </div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Quantum Secure (part of HID) <img src="/ASIS%20SM%20Article%20Images/0916%20Quantum%20Secure%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:220px;" /></h4><div> <strong>Booth #3901</strong></div><p>SAFE Predictive Security from Quantum Secure of San Jose, California, uses advanced contextual anal- ysis to identify possible threats before they become incidents, enabling preventive measures to avert costly losses and other negative outcomes. SAFE collects and integrates data from multiple security devices and sys- tems to develop behavioral patterns for both staff and visitors, then works in real time to detect indicators of <span style="line-height:1.5em;">compromise that might suggest security risks. Interactive user dashboards and/or alarms alert security staff to developing situations so they can be evaluated and addressed appro- priately. Dashboards provide multiple views at the strategic, tactical, and operational levels, providing a comprehensive understanding of current security conditions.</span></p> <br> </div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Garrett%20PDI_portable%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:104px;" />Garrett Metal Detectors</h4></div></div><div><p> <strong>Booth #2359<br></strong><span style="line-height:1.5em;">The Walkthrough Caster Set from Garrett Metal Detectors of Garland, Texas, is ideal for stadiums, special events, and school use. The casters, which can be permanently attached, allow full mobility of a Garrett PD 6500i walkthrough metal detector by one person. Detectors can be moved to a secure location when they are not in use and pro- vide an unimpeded exit at the close of an event. The caster assembly is constructed of durable, powder-coated steel for use in all types of environmental conditions.</span></p><div> <br>​</div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr />​<br></div></div><div><div><h4>Genetec<img src="/ASIS%20SM%20Article%20Images/0916%20Genetec%20Capture1%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2327</strong></div><p>Genetec of Montreal, Quebec, Canada, introduced the Mission Control Decision Support System, which delivers situational intelligence, visualization, and incident management. Designed to work seamlessly with the company’s Security Center unified IP security platform, Mission Control aims to simplify the operator’s tasks and decision<span style="line-height:1.5em;">making process. Suited for larger, multisite deployments, it intelligently qualifies incoming data from thousands of sensors and security devices. Automated workflows and standard operating procedures guide operator response to ensure effective management of any situation. The system also delivers post-incident capabilities, including reporting and system auditing, to ensure compliance.</span></p><div> <br>​</div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Open%20Options%20DNA%20Fusion%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:215px;" />​Open Options </h4><div> <strong>Booth #2661</strong></div><p>DNA Fusion from Open Options of Addison, Texas, is open platform access control software that is built using the latest in software development technology and contains numerous customer-centric features. <span style="line-height:1.5em;">Users can easily access system data with InfoReady design, assign global access levels, drag and drop data, create custom direct com</span><span style="line-height:1.5em;">mands to control several doors with the push </span> <span style="line-height:1.5em;">of a button, and much more. DNA Fusion offers Fusion Web and Fusion Mobile applications for remote access. The system </span><span style="line-height:1.5em;">seamlessly integrat</span><span style="line-height:1.5em;">es with leading security technologies in the industry, including IP video recording, intercom, and locks and readers. DNA Fusion also interfaces with the Authentic Mercury, AXIS, and ISONAS open hardware platforms.</span></p><div> <br> </div></div></div><div> <br> <div><div style="background-color:#ffffff;"><hr /><h4>​TrackTik<img src="/ASIS%20SM%20Article%20Images/0916%20Tracktik%20ASIS_Product%20Showcase_ASIS%20Newspaper.December%20Issue_22.07.16%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4><p> <strong>Booth #2950</strong><br><span style="line-height:1.5em;">TrackTik of Montreal, Quebec, Canada, launched the Back Office </span><span style="line-height:1.5em;">& Management Suite to make administration more efficient. </span><span style="line-height:1.5em;">This new addition to TrackTik’s integrated security workforce man- agement platform offers a complete line of scheduling, time and attendance, and invoicing/contracting products, as well as robust business intelligence solutions. The suite enables security service com- panies to reduce the number of systems, streamline administration, efficiently schedule, and accurately reduce time from operations to </span><span style="line-height:1.5em;">service invoicing. TrackTik’s intuitive software is a multi-featured platform connecting field personnel to management and clients via a suite of guard management tools, powerful busi- ness intelligence modules, and automated financial management solutions.</span></p></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20STI%20%20Product%20Showcase%207730%206519%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:170px;" />​Safety Technology International, Inc. </h4> <strong>Booth #2533</strong> <p>STI tough polycarbonate covers from Safety Technology International, Inc., of Waterford, Michigan, help prevent theft and vandalism to larger keypads, access controls, volume and lighting controls, and other similar devices. Molded of clear polycarbonate, which is very difficult to break, each protected unit can be clearly seen and quickly identified. Covers increase the life and reliability of units by protecting them from accidental or inten- tional damage. Covers are backed by a three-year guarantee against breakage in normal use.</p></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Brownyard Group<img src="/ASIS%20SM%20Article%20Images/0916%200915%20Showcase%20Brownyard_700x300%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2925</strong> <p>The Brownyard Group of Bay Shore, New York, provides insurance coverage and risk management solutions for the security guard, private investigative, and alarm industries. With more than 60 years of experience covering security concerns, Brownyard offers broad coverage through an admitted insurer. The company handles claims in an expeditious and knowledgeable manner via its in-house claims facility. Brownyard works exclusively through an insurance agent or broker chosen by the client.</p>​</div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​<img src="/ASIS%20SM%20Article%20Images/0916%20Medeco%20XT_DA_Screen_Capture%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />Assa Abloy </h4><div> <strong>Booth #3601</strong></div><p>Medeco Security Locks of Salem, Virginia, an ASSA ABLOY Group brand, simplifies audit trail analysis with Medeco XT Data Analytics built into Medeco’s XT Web Manager software program. The software feature leverages the data collected from Medeco XT intelligent keys and cylinders, eliminating the need to search through hundreds or thousands of audit re- cords to spot trends or to see something out of the ordinary. The graphic dashboard lets users see in three clicks who might be trying to gain access to areas where they do not belong. All data analytics software enhancements are driven by customer feedback.</p><div> <br> </div></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​Boon Edam<img src="/ASIS%20SM%20Article%20Images/0415%20Boon%20Edam%20ISC%20West%20Showcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /></h4><div> <strong>Booth #1401</strong></div><p>The Lifeline optical turnstile series from Boon Edam of Lillington, North Carolina, offers sophistication and innovation. The Lifeline has intuitive features, including unique sensors that detect a visitor’s approach, an energy-saving sleep function, pulsing light strips that guide users, and proven symbols to make it user friendly. The ergonomic design and an ar- ray of customization possibilities, like various glass and finish choices, provide comfort and style for the user. The series contains three models: the Slide, Swing, and Open models.</p><div> <br> </div></div></div><div> <br> <div><div style="background-color:#ffffff;"><hr /><div> <br> </div><h4> <img src="/ASIS%20SM%20Article%20Images/916%20AXIS%20A8105%20pic%20copy.jpg" class="ms-rtePosition-1" alt="" style="line-height:19.5px;margin:5px;width:202px;background-color:#ffffff;" />​​​Axis Communications </h4><div> <strong>Booth #3101</strong></div><p>Axis Communications of Chelmsford, Massachusetts, launched the AXIS A8105-E Net- work Video Door Station, which allows operators to monitor entrances, communicate directly with visitors, and open doors remotely via a mobile app, IP phone, or video management system. The door station is ideal for installations within the retail, education, and healthcare segments, and its small size allows it to be installed where space is limited. It helps users secure the premises and simplify visitor management.</p><div> <br> </div></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​​ASSA ABLOY<img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20Yale%20Yale-Multi-Family-Solution%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:168px;" /></h4><div> <strong>Booth #3601</strong></div><p>Yale Locks & Hardware of Berlin, Connecticut, an ASSA ABLOY Group brand, introduced nexTouch, the next generation of keypad access control. Featuring an advanced, voice-guided system to simplify programming and maintenance, nexTouch is available with an easy-to-use capacitive touchscreen, as well as a pushbutton keypad option for more tactile environments. A truly scalable solution, nexTouch can be used as a standalone keypad lock that uses a PIN code to manage access; can easily be upgraded to use Data-on- Card technology as part of the Yale <span style="line-height:1.5em;">Multi-Family Solution; or can be upgraded for easy expansion of ZigBee or Z-Wave capable alarm systems in small business environments.</span></p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Commport%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:204px;" />​Comm Port Technologies </h4> <strong>Booth #1261</strong> <div>Comm Port Technologies of Cranbury, New Jersey, offers the CPAS series of under-vehicle surveillance systems for inspec tion and analysis of a vehicle’s undercarriage. With unmatched flexibility and performance features, the system provides real-time and delay-free full-color scanning with capture speeds of up to 75 kilometers per hour and frame scans up to 900 frames per second. The flush-mount, in-ground system supports built-in license plate recognition and driver image capture. The heavy-duty system comes complete with all hardware necessary for installation and can be fully operational within 48 hours. Each system includes specialized software for computer vision scanning. Multiple lanes can be monitored from a centralized database.</div><div> <br> </div></div></div><div> <br> <div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20SLE-CDMA-Fire%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:90px;" /> </h4> <strong>Booth #3500</strong> <p>StarLink Fire Universal Cellular and IP Fire Alarm Communicators from Napco Security Technologies of Amityville, New York, provide low-cost upgrade, easy installation, and simple activation. They affordably replace up to two standard phone landlines traditionally required per fire panel. StarLink radios offer state-of-the-art CDMA nationwide coverage and code-compliant, full-event alarm reporting from any brand panel or FACP to any central station. The StarLink Fire Communicator, used as a primary or backup communicator, is a field-proven solution—among the most economical and full-featured in its class.</p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Panasonic_AERO_PTZ_Security_Manage_Showcase%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:216px;" />​​Panasonic Systems Communication Company</h4><p> <strong>Booth #3530<br></strong><span style="line-height:1.5em;">The Aero PTZ Camera from Panasonic Systems Communication Company of Newark, New Jersey, is an environmentally </span><span style="line-height:1.5em;">rugged camera built to deliver high-quality Full HD surveillance images in extreme environmental conditions. From hurricane-force winds to water and dust, from icy blasts to Sahara heat, the Aero PTZ delivers sharp video with 360-degree panning and 30x zoom capability, allowing it to see in virtually </span><span style="line-height:1.5em;">any direction, even in complete darkness. It features a lightweight, corrosion-resistant glass fiber body, electronic image stabilization, a built-in wiper and defroster, and an optional infrared LED.</span></p><div> <br> </div></div></div><div><div> <br> </div><div><div style="background-color:#ffffff;"><hr /><h4>​​Red Hawk<img src="/ASIS%20SM%20Article%20Images/0915%20Red%20Hawk%20Showcase%20new%20new%20logo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:195px;" /></h4><p>Red Hawk Fire and Security of Boca Raton, Florida, offers advanced systems integration and cutting-edge applications. All electronic security systems and legacy systems can be integrated with Red Hawk’s fire, life safety, and physical security solutions. Experts analyze a customer’s specific requirements, including regulatory compliance, and then develop the best solution for each business. Dedicated local service means that an account manager can take care of everything a customer needs. More than 50,000 companies and institutions across the country rely on the resources, knowledge, and reach of the Red Hawk team.</p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Prosegur%202016_España_Vigilancia%20y%20Tecnologia01%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:112px;" />​​Prosegur </h4> <strong>Booth #2259</strong> <p>Prosegur of Madrid, Spain, is a global company with more than 160,000 employees working from more than 400 offices in Europe, Latin America, Africa, Asia, and Oceania and provid- ing services for more than 24,0000 companies and institutions, 180,000 small and medium enterprises, <span style="line-height:1.5em;">and 200,000 households. It offers integrated and specialized security services combined with the most advanced technologies and the best </span><span style="line-height:1.5em;">professionals to provide maximum efficiency for the business management of companies. Integrated security solutions include: manned guarding, cash in transit, cash management, electronic security systems, cybersecurity, executive protection, fire protection systems, and residential security.</span></p></div></div><div><div><div style="background-color:#ffffff;"><hr /><h4>​​Securitas Electronic Security<img src="/ASIS%20SM%20Article%20Images/0916%20SecuritasESlogo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2901</strong> <p>Securitas Electronic Security (formerly Diebold Security) of Cleveland, Ohio, offers a customizable online dashboard to manage an entire security platform. SecureStat is an online customer management tool that delivers a unified view, control, and measurement of the security system, including disparate intrusion, access, video, and fire systems. Aligning with leading security and technology partners to provide the most advanced solutions on the market, SecureStat brings together locations, security systems, and devices for a comprehensive view of the entire security operation. Users can update information, request service, and generate reports while improving efficiency, en- hancing security, and reducing operational costs.​</p></div></div><div><div style="background-color:#ffffff;"><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Iview%20Product%20Showcase%20ipass-product-image-300dpi%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:171px;" />​​iView Systems<br></h4> <strong>Booth #1821</strong> <p>Users can professionally register, badge, track, and report all visitor activity with the iPass Visitor Management System from iView Systems of Oakville, Ontario, Canada. The system streamlines the check-in and check-out processes for visitors, contractors, <span style="line-height:1.5em;">and employees. It scales from a single workstation to hundreds—local or worldwide—sharing a central da- tabase. The iPass application uses ID scanning, elec</span><span style="line-height:1.5em;">tronic signatures (including DocuSign integration), visitor preregistration, notifications, and custom badging. The system integrates with the iTrak Incident Reporting Platform, provid- ing access to existing personnel, banned/watched subjects, and location synergies, reducing the need for duplicate visitor information or multiple redundant information entry.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><div><div><hr /><div><h4>Commend Inc.<img src="/ASIS%20SM%20Article%20Images/0916%20Commend%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /> </h4> <strong>Booth #2867</strong></div><p>Commend, Inc., of Mahwah, New Jersey, introduced two new amplifiers that seamlessly integrate public address loudspeaker lines into their intercom systems. They are available in 125-watt and 250-watt models that can connect to the intercom server via IP <span style="line-height:1.5em;">networks or two-wire copper cabling. Both versions provide a high output range with var- ious loudspeaker outputs. State of the art class D amplifiers of this series are universally suitable for any size application. Compact and lightweight, they feature a rugged polycarbonate housing with flexible mounting options. Loudspeaker line-monitoring based on impedance measurement detects short-circuits or disconnection.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20IN220%20PoE%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:156px;" />Assa Abloy </h4> <strong>Booth #3601</strong></div><p>Available from ASSA ABLOY Group brands Corbin Russ- win and SARGENT of New Haven, Connecticut, the IN220 Power-over-Ethernet (PoE) lock combines aesthetics with the energy efficiency and streamlined architecture of PoE access control for a cost-effective, sustainable solution that leverages existing network infrastructure for enhanced security and easier installations. Featuring <span style="line-height:1.5em;">HID multiCLASS SE technology, the IN220 supports a wide range of credential types and HID Mobile Access powered by Seos for use with mobile devices with Bluetooth Smart and/or NFC technology. Built with integrated ANSI/BHMA Grade 1 hardware, the IN220 is available in cylindrical lock, mortise lock, and exit device configurations.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4>Verint ​<img src="/ASIS%20SM%20Article%20Images/0916%20Vering%20tracking%20interface%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /></h4> <strong>Booth #2119</strong></div><p>The Verint Video Tracker from Verint of Melville, New York, is designed to help users identify the most relevant data to elevate the effectiveness of their organizational monitoring, reporting, and response. The solution leverages advanced analytics to automate the tracking of an individual through a large num<span style="line-height:1.5em;">ber of camera views within a location. It can be used in real time or forensically to identify, evaluate, and respond to a variety of security breaches. The solution streamlines proactive video monitoring and allows users to realize increased efficiencies by making it easier and faster to monitor, identify, and take action on suspicious activities.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20SDC%20IP%20Pro%20PLUS_group_with_logo%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:187px;" />Security Door Controls </h4> <strong>Booth #3167</strong></div><p>Security Door Controls of Camarillo, California, is introducing IP Pro IP-based single door access con- trollers with PLUS PC Client Software. They allow expansion from one standalone door to a 100-door grid. Doors can be configured and managed from a single interface. Each controller comes with secure, built-in software to manage up to 32 doors from any standard Web browser. Controllers offer real-time monitoring, user management, and an audit trail <span style="line-height:1.5em;">of up to 5,000 events. Powered by Ethernet cables, they connect to existing network infra- structure and are compatible with standard Weigand readers.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4>All Traffic Solutions<img src="/ASIS%20SM%20Article%20Images/0916%20All%20traffic%20IA24%20SA24%20Slider%20Image%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:169px;" /> </h4> <strong>​Booth #1440</strong></div><p>All Traffic Solutions of State College, Pennsylvania, introduced Con- ditional Messaging. Facility safety managers and those responsible for traffic management around a campus can display dynamic mes- sages on variable message signs based on live conditions. Users can manage their signs online from one place with the secure, Web-based ecosystem, the TraffiCloud. Signs can display items, such as available parking, road surface or air temperatures, wait times, emergency notifications, time-to-destination, wrong-way detection, and more. Data can be incorporated into any position within a message. Sensors can be connected directly to the message sign, or message data can be sourced from the TraffiCloud Web-Based Remote Management System.</p><div> <br> </div><div> <br> <hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Altronix%20Trove%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:193px;" />Altronix ​</h4> <strong>Booth #2011</strong></div><p>Trove enclosures from <span style="line-height:1.5em;">Altronix of Brooklyn, New York, combine Altronix power with access controllers and accessories from lead- ing manufacturers. The unit simplifies board layout and wire management </span><span style="line-height:1.5em;">to reduce installation and labor costs and provide versatility and scalability. New accessories include backplanes for AMAG, CDVI, KABA/KeyScan, and Software House access controllers and accessories. The Trove1 is a compact enclosure that accommodates CDVI, HID/VertX, and Mercury controllers. All </span><span style="line-height:1.5em;">Trove units include a cam lock, tamper switch, and mounting hardware. All Altronix prod- ucts are made in the United States.</span></p><div><div> <br> </div><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><h4>Protection 1<img src="/ASIS%20SM%20Article%20Images/protection%201.JPG" class="ms-rtePosition-2" alt="" style="margin:5px;width:298px;" /></h4><p> <strong>Booth #3113<br></strong><span style="line-height:1.5em;">C</span><span style="line-height:1.5em;">hicago-based Protection 1 provides installation, service, and monitoring of a wide variety of electronic security and network management solutions. Now, it has teamed up with world-class partners to bring an </span><span style="line-height:1.5em;">all-inclusive cybersecurity solution to market. The company employs a team of Cisco-certified and Meraki-certified professionals and integrates brands such as Cisco Network Solutions, Druva Cloud Backup Solutions, and </span><span style="line-height:1.5em;">Bitdefender. From network design, implementation, management, and continuous monitoring to ensuring that all software applications are up to date, Protection 1 is well positioned  to protect physical and virtual assets, especially for small and medium-sized businesses that don’t have the resources to build their own cybersecurity programs.</span></p><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Gai%20tronics%20397-700FS%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:138px;" />GAI-Tronics</h4><div> <strong>Booth #3763</strong></div><p>GAI-Tronics Corporation of Mohnton, Penn- sylvania, designed RED ALERT FS Series Emergency Telephones for installation in areas with restricted space. The flush-mount FS series phones measure 6.5 x 8 inches (compared to 10 by 12 inches for standard phones). The compact phone features are identical to the larger telephone, and they are available in four analog and three VoIP models, with an <span style="line-height:1.5em;">available stainless steel enclosure to provide surface-mounting. RED ALERT Emergency Telephones are designed for maximum environmental sustainability, high audio quality, and excellent monitoring capability to provide hands-free, two-way communications.</span></p><p> <span style="line-height:1.5em;"> <br></span></p></div><div><hr /><h4></h4><div></div><div><div><h4>Honeywell<img src="/ASIS%20SM%20Article%20Images/0916%20Honeywell%20New%20Camera%20Family%20Image%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /> </h4> <strong>Booth #2401</strong></div><p>Honeywell of Northford, Connecticut offers  a new line of IP cameras featuring low light capabilities that provide good images nearly anywhere. The new equIP and HDZ PTZ cameras, offer wide dynamic range for continuous high-resolution video in contrasting levels of light. The HDZ PTZ cameras are ONVIF S com<span style="line-height:1.5em;">pliant and the equIP cameras are ONVIF S and G compliant, so they integrate with most NVR systems including Honeywell’s upgraded MAXPRO NVR. The cameras are part of Honeywell’s complete video portfolio that includes Performance Series, Embedded NVRs, MAXPRO Cloud, and Xtralis analytics.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><h4></h4><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Christie%20CHRI3432%20Phoenix%20LowLeft_Hero%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />Christie </h4> <strong>Booth #2873</strong></div><p>The Christie Phoenix from Christie of Kitchener, Ontario, Canada, enables seamless access and control of audiovisual data from virtually anywhere via a single, robust system. Its comprehensive tools allow thou- sands of users to simultaneously view, listen to, and interact with any source of information found in a control room environment, regardless of their location. Consisting of at least one hardware node and powered by Web-based management software, the Christie Phoenix system allows users in a variety of challenging environments to make faster, more accurate life-critical decisions with confidence.</p><div><hr /><div><h4>dorma+kaba<img src="/ASIS%20SM%20Article%20Images/0916%20Dorma%20+%20Kaba%20ASIS2016_ProductShowcase%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:128px;" /> </h4> <strong>Booth #2600</strong></div><div>The merger of Dorma and Kaba to make dorma+kaba, headquartered in Winston-Salem, North Carolina, yields a trusted source for security and access controls. Their combined strengths have allowed them to broaden their product offerings to include a full range of architectural hardware and electronic access control solutions. From this position of strength, the company will dedicate more resources to develop innovative solutions that create trust and value for the customer, because trust is its most valuable asset.</div><div> <br>​</div><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Lenel%2014_onguard_logo_cmyk.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;" />LENEL</h4><p> <strong>Booth #2700<br></strong><span style="line-height:1.5em;">L</span><span style="line-height:1.5em;">enel of Pittsford, New York, part of UTC Building </span><span style="line-height:1.5em;">& Industrial Systems, offers an open security plat- form designed to address the essential needs of enterprise applications. Lenel’s OnGuard security management system sets the standard for intelligent solutions and can be customized to meet specific business demands. The OnGuard system continues to improve, offering new and better ways </span><span style="line-height:1.5em;">to facilitate data optimization and enhance security and business operations. Incorporating responsive technology with advanced analytics, the system delivers improved and expanded functionality, while accommodating future enhancements.</span></p><div><hr /><h4>iJet<img src="/ASIS%20SM%20Article%20Images/0916%20iJET_GIOC_HandPhoneApp%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:244px;" /></h4><div> <strong>Booth #1563</strong></div><p>Using tailored solutions from iJET International of Annap- olis, Maryland, allows multinational organizations to operate globally with confidence. The solutions integrate operational threat intelligence, innovative technology, and response services to help organizations avoid threats, mitigate risk, and protect people, assets, and reputations. The Global Integrated <span style="line-height:1.5em;">Operations Center enables clients to prepare for, monitor, and quickly respond to a variety of potential or realized threats in the most effective way possible. The Response Operations Center proactively monitors threats around the clock, ensuring that the best information is always available for critical decision making.</span></p><div><div><div style="background-color:#ffffff;"><p> <br> </p></div></div><div><hr /><div><h4>ComNet<img src="/ASIS%20SM%20Article%20Images/0916%20ComNetCNGE24FX12TX12MS%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:261px;" /></h4> <strong>Booth #3561</strong></div><p>ComNet, Communication Networks of Danbury, Connecticut, is introducing a new series of high port count managed switches that are designed and manufactured at its Danbury, Connecticut, facility. The first of these new switches is the all Gigabit CNGE24FX12TX12MS(POE) <span style="line-height:1.5em;">(HO) managed switch with 12 SFP ports and 12 TX power </span><span style="line-height:1.5em;">over Ethernet (PoE) ports. The </span><span style="line-height:1.5em;">switch is designed to protect the network it is being used on, offering multiple redundancy protocols to keep the network free from points of interruption. The standard PoE model delivers 30 watts of power to all 12 TX ports.</span></p><div><hr /><div><h4>Ameristar Perimeter Security<img src="/ASIS%20SM%20Article%20Images/0916%20Ameristar%20Product%20Showcase_ASIS%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:216px;" /> </h4> <strong>Booth #3813</strong></div><p>Ameristar Perimeter Security of Tulsa, Oklahoma, offers a full line of perimeter security products, including gate systems, anti-ram fences, active vehicle barriers, bollards, and guard booths. Its team of architectural specialists and market developers works closely with design firms to ensure that each project meets the customer’s ex- pectation for security, safety, and success. Ameristar’s security experts help companies find the best solution for each project, dealing with unique challenges that require a balance of active security components and physical security systems.</p><p> <br> </p><div><div style="background-color:#ffffff;"><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/sgm%20logo%20-%20paul%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:140px;" />Security Guard Management </h4> <strong>Booth #3172</strong></div><p>SGM of Dunkirk, Maryland, offers programs designed to train an entire staff of security offi- cers and supervisors. Training programs come in video, hardcover manuals, or a combination of both. Drawing on 22 successful years in the security guard industry, the company writes and develops original training programs. The newest program, Video on Demand, allows security of- ficers to view any or all of the 31 training videos using a smartphone, tablet, or computer. After <span style="line-height:1.5em;">watching the video, they take a test. A score of 80 percent or better entitles them to a cer- tificate that they can print out and/or email to the training director.</span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div><div><div><p>​<br></p></div><div><hr /><div><h4>Research Electronics International<img src="/ASIS%20SM%20Article%20Images/0916%20REI_ASIS_PROD_SHWCSE_%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:202px;" /> </h4> <strong>Booth #1431</strong></div><p>Research Electronics International (REI) of Algood, Tennessee, manufactures products that protect against intellectual property theft. New products include the ANDRE Near-Field Detection Receiver and the ORION 900 Non-Linear Junction Detector. The ANDRE is a broadband RF detector for quickly locating RF transmissions such as audio and video devices. The ORION <span style="line-height:1.5em;">900 detects less-sophisticated circuitry and provides better signal penetration through certain construction materials. REI also manufactures the OSCOR Green Spectrum Analyzer for RF detection and analysis, the TALAN Telephone and Line Analyzer, and more. The REI Training Center provides year-round courses as well as custom remote training.</span><span style="line-height:1.5em;">​</span></p><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20DL2700LD%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:188px;" />Napco Security Technologies (Alarm Lock)</h4><p> <strong>Booth #3500</strong><br><span style="line-height:1.5em;">Alarm Lock, a division of Napco Security Technolo</span><span style="line-height:1.5em;">gies of Amityville, New York, offers Trilogy Networx Wireless Access Locks that eliminate door-to-door programming and audit trail retrieval by communicating wirelessly via Ethernet or 802.11B/G. With all the functionality of the original Trilogy standalone lock, these wireless locks provide a quick, easy, eco</span><span style="line-height:1.5em;">nomical access system with advanced features and functions, like automatic schedules, event logs, and support, for 2,000 doors and 5,000 existing proximity ID cards and badges, but with no wires to run and no access panels or power supplies to buy or install.​</span></p><div><hr /><div><h4>IDV Solutions ​<img src="/ASIS%20SM%20Article%20Images/0916%20IDV%20Solutions%20visual-command-center-asis-16%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:260px;" /></h4> <strong>Booth #1557</strong></div><p>Visual Command Center software from IDV Solutions of Lansing, Michigan, is an enterprise platform for risk intelligence and response that is used by some of the largest organizations in the world. The latest version introduces a new information architecture de<span style="line-height:1.5em;">signed to support stakeholders inside and outside of the command center and to make more effective use of the command center video wall.</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Allied%20Universal%20Tagline%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:273px;" />Allied Universal</h4><p> <strong>Booths #2412 and 2350<br></strong><span style="line-height:1.5em;">Allied Universal of Sant</span><span style="line-height:1.5em;">a Ana, California, is offering clients autonomous robot “Machine as  a Service” using Knightscope K5 and K3 robots— called autonomous data machines. The robots operate within a geo-fenced area and provide alerts generated by video, themal imaging, peo- ple detection, license plate recognition, parking </span><span style="line-height:1.5em;">monitoring, audio recording, two-way intercom, and audio broadcast. All data is accessible through the Knightscope Security Operations Center (KSOC), a highly intuitive, brows</span><span style="line-height:1.5em;">er-based user interface. Customers can recall, review, and save data for forensic purposes and use the new iOS mobile app (Android coming soon) for remote access.</span></p><div><hr /><div><h4>DSX Access Systems<img src="/ASIS%20SM%20Article%20Images/0915%20DSX%20ISC%20West%20Showcase%20picked%20up%20from%20ISC%20West%202013%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:157px;" /> </h4> <strong>Booth #1551</strong></div><p>DSX-AES256 software from Dallas-based DSX Access Systems, Inc., contains government-approved AES-256 bit encryption technology that can be implemented systemwide. Communications to each location can be encrypted with a unique encryption key assigned by the customer for communicating with that location’s field controllers. The software encrypts communications to all panels in <span style="line-height:1.5em;">that location without using add-on devices. Because encryption technology is inherent in the software and controllers, implementation is easy. All 1040 Series and 1022 controllers can be flash-upgraded to the AES-256 bit version.</span><span style="line-height:1.5em;">​</span></p><p> <span style="line-height:1.5em;"> <br></span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Capindex%20CRIMECAST%20Premium%20Report%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:198px;" />CAP Index ​</h4> <strong>Booth #1851</strong></div><p>CRIMECAST Reports from CAP Index of Exton, Pennsylvania, provide critical crime risk intelligence and help businesses meet ASIS/RIMS guidelines for facility risk assessments with competent evaluation of location risk and impartial, independent, and objective risk data. Reports provide the objective data that can help direct security resource allocation, tier security packages, <span style="line-height:1.5em;">and improve site selection while mitigating risk and exposure. CAP Reports are also a key component in demonstrating legal due diligence. The team at CAP also builds custom risk models and custom CAP Scores specific to brand objectives and challenges.</span><span style="line-height:1.5em;">​</span></p><div><hr /><div><h4>Designed Security, Inc.<img src="/ASIS%20SM%20Article%20Images/0916%20DSI%20ES8900%20Slimline%20150%20x%20133%20300dpi%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:160px;" /> </h4> <strong>Booth #3031</strong></div><p>The new Slimline Series from Designed Security, Inc., (DSI) of Bastrop, Texas, provides a refined visual and physical turnstile with barrier. Its smaller footprint enables customization to fit in smaller areas. Each unit can monitor passage of up to 60 people per minute per lane. It integrates with any access control system. Made of acrylic, it offers a sense of openness. It also features a <span style="line-height:1.5em;">programmable LCD display with audio wavefile capabilities, plus next-generation optical sensing technology for increased accuracy.</span></p><p> <span style="line-height:1.5em;"></span> <span style="line-height:1.5em;">​</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Twist%20and%20Go%20HID%20Global%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:273px;" />HID Global </h4> <strong>​Booth #3901</strong></div><p>HID Global of Austin, Texas, launches new HID Mobile Access, which adds support for wearables, including Apple Watch (iOS 8+) and Android Wear (4.4+) in companion mode, as well as support for tablets to expand mobile options for opening doors and gates. New HID Mobile Access Portal and App software developer kits enable end users and partners to create customized mobile access solutions that can be fully integrated into their back-end systems. The new capabilities extend HID <span style="line-height:1.5em;">Global’s mobile access solution, which also includes Mobile IDs, Mobile Apps downloadable from The App Store and Google Play, iCLASS SE readers, and the HID Mobile Access Portal for provisioning and revoking Mobile IDs.</span><span style="line-height:1.5em;">​</span></p><div><hr /><div><h4>MBM Corporation ​<img src="/ASIS%20SM%20Article%20Images/0916%20MBM%20Destroyit%20Shredders%20by%20MBM%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:149px;" /></h4> <strong>Booth #2073</strong></div><p>Industrial-quality Destroyit paper shredders from MBM Corporation of Charleston, South Caro- lina, allow customers to securely shred sensitive documents without using an outside shredding service. They provide the peace of mind that comes from knowing confidential data won’t fall into the wrong hands. MBM offers more than 40 models to meet any security need, and all are equipped with industry-leading safety features. Precision-engineered in Germany for years of reli- ability, the cutting heads are warranted for life.<span style="line-height:1.5em;">​<br><br></span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Morse%20Watchmans%20KeyWatcher%20Touch%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:164px;" />Morse Watchmans ​<br></h4> <strong>Booth #3651</strong></div><p>Morse Watchmans of Oxford, Connecticut, is improving its KeyWatcher Touch to make it more se- cure and more useful. For improved cybersecurity, the data between the KeyWatcher Touch and the KeyWatcher server can be encrypted with AES256 technology with a pre-shared key that is definable on a site-by-site basis. The server service can run under a domain user account, and Windows au<span style="line-height:1.5em;">thentication is now supported for SQL. The KeyPro III software import utility was revamped to make it easier to use. Other enhancements include easier replacement of keys from the TrueTouch key tracking software, new notifications, and better control of reports.</span></p></div></div></div></div></div></div></div></div></div></div></div></div></div></div><div> <br> <div><div> <br> </div><div><hr /><div><div><h4>Napco Security Technologies<img src="/ASIS%20SM%20Article%20Images/0916%20Napco%20POE%20Controller_%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:210px;" /> </h4> <strong>Booth #3500</strong></div><p>Continental Access, a division of Napco Security Technologies of Amityville, New York, introduced the CICP2100 uniVerse Single Door Controller, which supports two readers on one door using power over <span style="line-height:1.5em;">Ethernet. In a CA3000 or CA4K access control software environment, the tamper-supervised controller accommodates two readers and/or one low-current strike, fits in a standard double gang electrical box, and can be net- worked with Accelaterm or Supertwo Controllers and/or Networx Wireless Access Control Locks.</span></p><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20Yale%20Yale-Multi-Family-Solution%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:180px;" />ASSA ABLOY</h4><div> <strong>Booth #3601</strong></div><p>The Multi-Family Lock Management Solution from Yale Locks & Hardware of Berlin, Con- necticut, an ASSA ABLOY Group brand, is a single system for securing multifamily facilities easily and affordably. It works using Yale Accentra Multi-Family Software, a user-friendly, cloud-based solution that manages access for residents, guests, and staff. Combined with locking hardware and innovative technology, the smart solution helps users increase security, convenience, and peace of mind.</p><div> <br> </div><div><hr /><div><div><h4>Altronix<img src="/ASIS%20SM%20Article%20Images/0916%20Altronix%20NetWay4EWP%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:145px;" /> ​</h4> <strong>Booth #2011</strong></div><p>Altronix of Brooklyn, New York, introduced NetWay4EWP Outdoor Managed PoE+ Switches with Fiber. They feature four PoE/PoE+ ports at 30 watts or two ports at 60 watts (Hi-PoE), and a 1Gb SFP uplink <span style="line-height:1.5em;">f</span><span style="line-height:1.5em;">or IP over fiber applications at 10/100Mbps. The switch is housed in an IP66, NEMA4/4X rated enclosure for use in harsh environments. It includes battery charging for appli- cations requiring back-up power and Altronix’s innovative LINQ Network Communications Technology that allows users to monitor, control, and report power from anywhere.</span></p><div> <br> </div><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Amico%20AMICO%20VANGUARD%20SYSTEM%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:270px;" />Alabama Metal Industries Corporation (AMICO) </h4> <strong>Booth #1242</strong></div><p>AMICO Security of Birmingham, Ala- bama, launched the Vanguard Perimeter System, a unitized perimeter security framework that incorporates proprietary engineered components to create a unified perimeter barrier. Continuous longitudinal rails tie the entire system together to create a full-length curtainwall, while eliminating many of the cuts, clamps, and connections needed to install most fences. The system can accommodate many different types of <span style="line-height:1.5em;">panels made from virtually any material, and the system has been tested to withstand wind loads up to a category 5 hurricane. The design allows for simple integration of fiber optic and impact cables, in addition to cameras, lights, radar, and other accessories.</span></p><div> <br> </div><div><hr /><div><div><h4>Illinois Engineered Products ​<img src="/ASIS%20SM%20Article%20Images/0916%20Illinois%20Engineer%20Products%20Saf-T-Gas%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:270px;" /></h4> <strong>Booth #1062</strong></div><p>The Saf-T-Gas Cabinet from Chicago-based Illinois Engineered Products features an open mesh design that allows for visual inspection <span style="line-height:1.5em;">of stored tanks. Five designs accommodate ver- tical and/or horizontal gas tanks and prevent dangerous buildup of flammable gases. A hasp for a padlock secures the cabinet, which is powder coated in a safety yellow finish and features welded construction. The company’s VUE </span><span style="line-height:1.5em;">Locker is also made with an open mesh design and a welded-on hardened steel hasp that resists cutting and hammering. The welded construction and powder-coated finish makes these products hold up in the harshest industrial settings.</span></p><div> <br> </div><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/Unitek%20K500_pred_model_GA16.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:121px;" />Unitex Direct </h4> <strong>Booth #3272</strong></div><p>Unitex Direct of Walled Lake, Michigan, offers comfort- able classic polo shirts with superior wrinkle and shrink resistance, a silky feel, and a range of styles, sizes, and colors. Ideal for uniforms, Port Authority Silk Touch Polos K500 are available in long- and short-sleeved versions for men and women. Made from 5-ounce poly- ester-cotton pique with flat-knit collar and cuffs, the shirts feature double-needle armhole seams and hems, metal buttons with dyed-to-match plastic rims, and side vents. They are available in sizes from XS to 10XL. The company provides a large array of clothing, footwear, <span style="line-height:1.5em;">and accessories for public safety and private security personnel.</span></p><div><div> <br> </div><div> <br> <hr /><div><div><h4>RS2 Technologies ​<img src="/ASIS%20SM%20Article%20Images/0916%20RS2%20Universal.NET_1%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:204px;" /></h4> <strong>Booth #3361</strong></div><p>Access It! Universal.NET access control software from RS2 Technologies of Munster, Indiana, features a browser thin client for easy installation and updating on multiple workstations, multiple monitor support, and integration with wireless/IP and PoE locksets and other third-party devices. It features an optional data exchange utility that supports Microsoft Active Directory integra- tion, along with scheduled data imports from various <span style="line-height:1.5em;">data sources. It also includes a mobile client that allows users to manage their access con- trol system from any mobile device. Suitable for business of any size, the software allows users to select the feature sets they need to build a scalable, cost-effective system.</span></p><div><hr /><div><div><h4> <img src="/ASIS%20SM%20Article%20Images/0915%20Showcase%20ABLOY%20SECURITY%20SM_Showcase%20Img%20option%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:149px;" />Abloy Security ​</h4> <strong>Booth #3601</strong></div><p>Abloy Security of Irving, Texas, offers a range of tough locks that can withstand severe weather conditions and environmental extremes. ABLOY PROTEC2 CLIQ LED key and interface make it easy to retrofit mechanical locks with electrome- chanical models. There are no batteries in the locks, because the power comes from the key. <span style="line-height:1.5em;">CLIQ technology provides audit trails in both the </span><span style="line-height:1.5em;">lock and the key, flexible time functions, and immediate removal of lost keys. All padlocks feature case-hardened boron-steel shackles and hardened steel UL-listed cylinders. Patent-protected keys can also open ABLOY door locks, and the keys cannot be duplicated.</span></p><div> <br> </div><div> <br> </div><div> <br> </div><div><hr /><div><div><h4>John Jay College of Criminal Justice<img src="/ASIS%20SM%20Article%20Images/John%20Jay%20Online%20Logo%20copy.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:149px;" /> </h4> <strong>Booth #2678</strong></div><p>John Jay College of Criminal Justice, part of the City University of New York system, now offers 100 percent online master’s level courses in Security Management; Inspection, and Oversight, with a new healthcare special- ization; Public Policy Administration; and now Criminal Justice. Professionals who are interested in earning a master’s degree, but d<span style="line-height:1.5em;">o not have the time to attend traditional classes, will be able to learn on their own sched- ule. Contact John Jay Online toll free at 844/552-9665, or visit http://online.jjay.cuny.edu to learn more about current and coming programs and services.</span></p><div> <br> </div><div><hr /><div><h4> <img src="/ASIS%20SM%20Article%20Images/0916%20Assa%20Abloy%20%20IN100%20Aperio%20Wireless%20Lock%20copy.jpg" class="ms-rtePosition-1" alt="" style="margin:5px;width:140px;" />ASSA ABLOY</h4><div> <strong>Booth #3601</strong></div><p>ASSA ABLOY of New Haven, Connecticut, announced that its brands Corbin Russwin and SARGENT introduced a new IN100 Aperio wireless lock, which offers the convenience and flexibility of Aperio wireless technology with the real-time communication of online access control. Remote locking or unlocking can be accomplished in less than 10 seconds. The IN100 also provides simul<span style="line-height:1.5em;">taneous support for multiple credential types and HID Mobile Access powered by Seos. The lock is available in cylindrical and mortise lock configurations, with a choice of black or white reader and a broad range of finishes and levers.</span></p><p> <span style="line-height:1.5em;">​<br></span></p><div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><p>​</p></div></div>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/a-manual-private-investigation-techniques-0013117.aspxA Manual of Private Investigation Techniques<div class="body"> <p> <em> <strong> <span style="color:red;">*****</span> A Manual of Private Investigation Techniques. Edited by William F. Blake. Charles C. Thomas Publishers, Ltd.; ccthomas.com; 326 pages; $39.95; also available as e-book. </strong> </em> </p> <p>The editor of this volume was able to amass an amazing number of beneficial articles for both aspiring and experienced investigators. Although clearly developed for private investigators, its breadth of topics pertaining to various types of investigations gives it significance for investigators working in the public sector as well.</p> <p>The book presents the reader with an array of interesting essays on useful topics such as premises liability, undercover operations, integrity investigations, protecting assets, mortgage fraud, arson investigations, and homicide investigations. Many other investigative topics are explored in this tome as well.</p> <p>The authors of these articles often incorporate information on how the various types of investigations should be conducted. There is worthwhile information in these articles that will enable private investigators to educate their respective clients on potential issues in their businesses that could create vulnerabilities for criminal exploitation. Collectively, the contributing authors adequately spell out the applicable best investigative practices as they survey the various types of investigations.</p> <p>In short, this work is a valuable contribution to the field of investigation, especially in the private sector. The editor did a superb job of collecting meaningful articles pertaining to the study of investigation as well as the investigative process.<br></p> <hr /> <span style="color:#800000;"> <strong>Reviewer: </strong> </span>Hugh J. Martin is a retired police chief from Wisconsin. He is a graduate of the FBI National Academy and a member of ASIS. <p></p></div>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://sm.asisonline.org/Pages/Cyber-Travel-Tips.aspxCyber Travel Tips<p>​Security managers must be aware of their physical surroundings when they travel, but electronic devices frequently place employees and their companies at risk. To help keep devices and corporate data secure while traveling, Security Management reached out to several security experts to learn about their own travel best practices.​</p><h4>Do a Cleanse</h4><p>Before packing your laptop, Bruce McIndoe, CEO of integrated risk management company iJET, recommends doing some device cleansing. </p><p>“That’s the first level of defense when you are getting ready to leave on a trip—slim down and remove as much data as you can,” he says.</p><p>This means assessing whether you actually need to take a laptop with you and, if so, removing all the sensitive data from it that you can. “That way if the laptop is stolen or infiltrated or lost, you’re not going to have all that data exposed,” McIndoe says.</p><p>Take the same approach with your smartphone, and pare down your USB devices to the essentials. Then make sure that all your devices are encrypted in case they are lost or stolen.​</p><h4>Talk to IT</h4><p>After you’ve assessed what you need to take with you, it’s a good rule of thumb to check with your IT department to see if they have travel devices for you to take with you, such as travel laptops, phones, and even routers.</p><p>IT can also review with you any policies or procedures in case your devices are lost, stolen, or breached while you’re away from the office.​</p><h4>Take the Right Bag</h4><p>When traveling, sometimes your devices are out of your sight—whether they’re tucked in your checked bag or stowed in the hotel while you’re out at dinner. This is when a zippered bank bag comes in handy, says former U.S. Secret Service Agent John Toney. He and other agents used zippered bank bags, such as an A. Rifkin bag, to store guns, electronic equipment, and anything else they wanted to keep away from prying eyes.</p><p>“When agents go en masse overseas, everyone throws their bag into the same Pelican case for customs,” says Toney, who is now senior manager of forensic technology and discovery services at Ernst & Young LLP. “That way, customs agents can scan the outer carrier but don’t get inside the bags.” ​</p><h4>Avoid Free Wi-Fi</h4><p>While a wonderful invention, Wi-Fi does come with risks, which is why McIndoe says he doesn’t connect to airport Wi-Fi or pub­lic Wi-Fi. </p><p>“What I try to do is use Gogo and AT&T hotspots,” McIndoe explains. “I can use Gogo on flights and get onto Wi-Fi only from access points that I know about.”</p><p>He also says travelers should be cautious about connecting to hotel Wi-Fi. As a precaution, consider using a VPN to access systems at work and ensure that you have an HTTPS connection. If you do access a website without an HTTPS connection, McIndoe says you should not consider that information private.​</p><h4>Talk to IT, Again</h4><p>After you’ve returned from your trip and before you connect any of your devices to your company’s network, go talk to IT. They can scan the devices to make sure you didn’t pick up any malware while you were abroad. Many companies require employees who have been in designated countries to have their laptops scanned before connecting them to the network.</p><p>“A lot of companies have more sophisticated malware detection on the company network than on your laptop and will detect a virus that your local virus scan did not detect,” McIndoe says.  ​</p>GP0|#91bd5d60-260d-42ec-a815-5fd358f1796d;L0|#091bd5d60-260d-42ec-a815-5fd358f1796d|Cybersecurity;GTSet|#8accba12-4830-47cd-9299-2b34a4344465