You are on page 1of 149

SEPTEMBER 2017

Issue & Beyond

Water Security
Evaluating the role
of wastewater reuse.

Machine Learning
Artificial intelligence may
enhance cybersecurity.

46
PROTESTS

54
GAMING

58
CAMPUS SAFETY

36
ADOPTING
ESRM
0917 Cover C.indd 2 08/23/2017 2:48:20 PM
For product info #2 securitymgmt.hotims.com

Full Page Template.indd 1 08/24/2017 12:07:35 PM


FRANK ARGENBRIGHT, SECURITY GUARD WANNABE

Full Page Template.indd 1 08/23/2017 2:45:53 PM


$1,000,000
CHARITY CHALLENGE:
SECURITY GUARD “TAP OUT”
To: “The Big Four” Man-Guarding Companies in the US

Let’s have some fun, raise $1,000,000 for charity, and show our security
officers how important they are to us!

I believe the most important person at any of our companies is the security
officer who works the toughest post on the night shift.

I challenge the owners (or CEOs if company is owned by private equity) of the
Big Four man-guarding companies to a “Security Guard Tap Out” for charity.
You pick your toughest guard post anywhere in the US. You and I will put on
your uniforms and stand guard until one of us taps out or walks off the post.
Whoever taps out first has to donate $250,000 to the charity of the winner’s
choice.

This security guard tap out will be fun. It will take us back to our roots and
remind us of the core of our business. It will show our security officers that
they truly are the most important people in our companies. It will show our
customers where our priorities truly lie. And lastly, it will raise $1,000,000 for
charity!

In order to commit up to $1,000,000 of my own money, I had to get


permission from the Boss, my wife Kathy. She asked me why I was doing this.
I told her I want to show our security officers how much they really mean to
me and our industry; plus, we can raise $1,000,000 for charity. Then lastly, I
said, “Can you imagine how much I can learn from working side by side with
4 of the smartest, most successful executives on the planet?! It’s priceless.”
She laughed at me and said, “In the old days, you used to work a lot of guard
posts, but lately, you haven’t. This will be good for you and get you back to
your roots. Go for it; just don’t lose!”

Please accept my challenge for fun and a great cause in person by coming to
our ASIS booth 3903 in Dallas. Or you can call me on my cell at 404-536-1140,
and I will come to your booth!

WWW.SECURAMERICALLC.COM

DIRECT LINE: 404-926-4202


For product info #3 securitymgmt.hotims.com

Full Page Template.indd 1 08/23/2017 2:46:35 PM


DETECT VERIFY ACT

A threat can come from anywhere.


How do you protect
your perimeter?

Detect people and objects Alert intruders that you’re Pan, tilt and zoom to areas Scale your perimeter
in difficult lighting or watching. of interest and verify alarms protection solution by detecting
complete darkness. and detection alerts. multiple scenarios at once.

Axis thermal AXIS C3003-E Axis PTZ AXIS Perimeter


network cameras Network Horn Speaker network cameras Defender

Visit www.axis.com/perimeter-protection

See us at ASIS Booth 4032


For product info #4 securitymgmt.hotims.com
SEP 2017

“Our roles are broader than our assigned tasks. Our responsibilities
should be viewed not as standalone tasks, but as related
components within our roles as risk security managers.”
Brian J. Allen, CPP, on enterprise security risk management (ESRM) and why security
practitioners should embrace the concept. PAGE 40

BY THE NUMBERS
“Some gaming regula- “If it is a sensitive crime, and
tors are now requiring if you have a familiar face

1M
or a peer who is part of an
a copy of a licensee’s
organization like ours, we
active shooter plan.”
would hope that would make
The number of people
who work from a cowork space Chuck Barry, vice president reporting that crime just a
globally. One such space, COCO, of security and surveillance at
recently updated its access control Tropicana Entertainment, on little bit easier.”
to accommodate new members. gaming security trends. PAGE 55
University of Iowa Police Captain
PAGE 28
Mark Bullock on the student
security officer program. PAGE 65
“The company

$70B sent all its


ESRM GRAPHIC AND PROTEST PHOTO BY THINKSTOCK

headquarters
The worth of the
artificial intelligence staff home,
market by 2020, according to
PricewaterhouseCoopers. PAGE 33 without warning,
four hours before

800K
the protest was
expected to start.”
The number of deaths, worldwide, Martin Herman, president and CEO of Special
caused by water contamination Response Corporation, on preparing for mass
and poor sanitation. PAGE 16 protests at corporate sites. PAGE 52

Security Management (ISSN 0145-9406) Volume 61, Number 9, is published monthly by the ASIS International, 1625 Prince St., Alexandria, VA 22314; 703/519-6200; fax: 703/519-
6299. Subscriptions: ASIS members—$60 for 1 year (included in dues, non-deductible). Nonmembers in US, Canada, and Mexico—1 year, $60; 3 years, $162. All others—air
delivery—1 year, $120. Bulk subscription rates available. Periodicals postage paid at Alexandria, VA and additional mailing offices. Mailed in Canada under IPM #0743968. Post-
master: Send address changes to ASIS International, Attn: Security Management, 1625 Prince St., Alexandria, VA 22314. Security Management is a registered trademark and its use is prohibited.
Copyright © 2017 ASIS International, Inc. This information is protected by copyright and trade mark laws under U.S. and International law. No part of this work may be reproduced without the
written permission of ASIS International. Statements of fact and opinion are made on the responsibility of the authors and do not imply an opinion on the part of the editors, officers, or members
of ASIS. Advertising in this publication does not imply endorsement or approval by Security Management or ASIS. The editors reserve the right to accept or reject any article or advertisement.
Quantity reprints of 100 or more copies of each article may be requested from Security Management Reprints Dept. at 703/518-1451.

0917 TOC C.indd 7 08/15/2017 5:49:32 PM


FEEL THE THRILL OF WINNING

Partner.Win.
It’s an exciting time to partner with Hikvision. The world’s leading video surveillance
manufacturer, we work hard alongside our team members and our partners so that
we all win together.

#PartnerWin

hikvision.com

For product info #5 securitymgmt.hotims.com


010100101 10101101001011101010100
1010 1010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101 0101010010100101 00101 1010110
010100101 10101101001011101010100
1011 1010110100101110101010010100101 10100101 10101101001 1010110100101110101010010100101 10101101001011101010100101 1010110
10110100101110101010010100101
010 0101010010100101 00101 1010110100101110101010010100101 101011 10111 1010110
11010110100101110101010010100101 101011010010111010101001010
01010010100101 01001011101010100 00 11010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101
1001 110101110 0100 1101010 0101010010100101 011110101101
110 0
010010100101 10101101001011101010100
SEPTEMBER 2017 1010110100101110101010010100101
1010 10100101
01 1010110
1010110100101111010110100101110101010010100101
10 101110 0010100 0101010010100101 010010111
010 1
010010100101
01010 1010110100101110101010010100101
0101 1010110100101110101010010100101
0100101
1010 10101101001011101010100 1010110100101110101010010100101
0010 0101001 10100101
001 101011011
0100101 1010110100101110101010010100101
10100 10101101001011101010100101
0010
011 0101010 01 1010110100101110101010010100101
10 1010110100101110101010010100101
10010 10101101001011101010
10 1
01110101010010100101
01 1010
101011
10 1010110100101110101010010100101 01 11010110100101110101010010100101
0 1010110100101110101010010100101 10101101001011101010100
0101110

36
010100101 10100101 1010110100101111010110100101110101010010100101
010111 0100 0101010010100101 1010110100101110101010010100101 10101101001011101010100101
00101 1010110100101
0100 1
01110101010010100101 0101010010100101 00101
0101 1010110100101110
1 1010 1010110100101110101010010100101 10101101001011101010100101 1010110100101110101010010100101
01 11010110100
01010100101 1010110100101110101010010100101 1010110100101110101010010100101
10 1010110100101110101010010100101 10101101001011101010100 1010110100101110101010010100
0
Peter J. O’Neil
1010110100101110101010010100101 10101101001011101010100 1010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101 0101010010100101
chief executive officer
Peter.ONeil@asisonline.org

Michael Gips
chief global knowledge
and learning officer
Michael.Gips@asisonline.org

Nello Caramat A PROFESSIONAL PATH


publisher
Nello.Caramat@asisonline.org
Enterprise security risk management (ESRM) will raise
the profile of security from a task-bound trade to one
of the key business drivers in the C-suite.
BUSINESS OFFICES By Brian J. Allen, CPP
1625 Prince Street

42
Alexandria, VA 22314
FIVE INSIGHTS ON ESRM
703/519-6200
fax 703/519-6299 Five concepts describe what ESRM
can do for security managers.
By Rachelle Loyear and Brian J. Allen, CPP

SALES REPRESENTATIVES

46
Western/Midwestern
Sales Representatives PREPARING FOR PROTESTS
Jeffrey B. Dembski, Steve Loerch
Proactive assessment and planning by security
847/498-4520
jeff.dembski@asisonline.org professionals can make the difference between a
steve.loerch@asisonline.org peaceful protest and an out-of-control riot.
By Martin Herman
Southern/Mid-Atlantic & Europe

54
Sales Representative
Shawn Register HOUSE RULES
334/270-4060 Chuck Barry of the ASIS International Gaming
shawn.register@asisonline.org and Wagering Protection Council discusses
security trends in gaming.
Northeastern Sales Representative By Holly Gilbert Stowell
Charlotte Lane

58
334/239-2218
charlotte.lane@asisonline.org PEER-TO-PEER PROTECTION
The University of Iowa is using student security
officers to patrol its campus to ensure safety and build
a greater sense of community.
By Megan Gates

60
AN EDUCATION CONNECTION
An educational organization in Long Island, New
York, joins a pilot program that shares its video feeds
with law enforcement in real time.
By Holly Gilbert Stowell

68
CALM IN THE CRUCIBLE
Managers can prepare for crises by learning
On the Cover: the business, making alliances, assessing risk,
Illustration and identifying vulnerabilities.
by Steve McCracken By Clint Hilbert

0917 TOC C.indd 9 08/15/2017 5:49:58 PM


As we celebrate our one year anniversary as
Allied Universal, we thank our clients, colleagues
and friends for their continued support.

Visit us at Booth #2733


to get your cupcake
For product info #6 securitymgmt.hotims.com
SEPTEMBER 2017

EDITORIAL STAFF
Teresa Anderson
editor-in-chief
Teresa.Anderson@asisonline.org

Mark Tarallo
senior editor
Mark.Tarallo@asisonline.org

Megan Gates
16
associate editor
Megan.Gates@asisonline.org NEWS & TRENDS
Holly Gilbert Stowell
Managing global water scarcity,
associate editor and fighting financial crime.
Holly.Stowell@asisonline.org By Mark Tarallo
Lilly Chapa
assistant editor
Lilly.Chapa@asisonline.org

Flora Szatkowski
editorial assistant/staff writer
Flora.Szatkowski@asisonline.org
12
SECURITY MANAGEMENT
124
ASIS NEWS
PRODUCTION & CREATIVE ONLINE CityLab High School wins the ASIS
SERVICES STAFF
New this month: emergency commu- School Security Grant.
Tyler Stone
art director nications, international intelligence
Tyler.Stone@asisonline.org sharing, and the future of AI.
125
14
Keith Schilling
manager, publishing production ASIS BOARD OF DIRECTORS
Keith.Schilling@asisonline.org

Caitlin Donohue
graphic designer
Caitlin.Donohue@asisonline.org
EDITOR’S NOTE
Emotions and risk. 132
LEGAL REPORT

Molly Fu
graphic designer
22
NATIONAL SECURITY
Court cases on labor unions and
medical marijuana, legislation
on encryption, and more.
Molly.Fu@asisonline.org
The intelligence network among By Megan Gates
Matthew Kreider nations can be fragile.
publishing specialist
Matthew.Kreider@asisonline.org By Lilly Chapa
138
28
Jeremy Orloski INDUSTRY NEWS
production specialist
Jeremy.Orloski@asisonline.org By Flora Szatkowski
CASE STUDY

EDITORIAL OFFICES
1625 Prince Street
A coworking space controls access
via the cloud.
By Holly Gilbert Stowell
142
MARKETPLACE
Alexandria, VA 22314
PHOTO BY MARIA HEYENS, ALAMY STOCK PHOTO

703/519-6200
fax 703/519-6299

EDITORIAL
32
CYBERSECURITY
147
ADVERTISER INDEX
MISSION STATEMENT Artificial intelligence could be a

148
Security Management is written boon to cybersecurity.
primarily for security professionals. It
also makes vital security information By Megan Gates
understandable to a general business THE LIST

78
audience, helping ASIS International Why uniform color matters.
advance security worldwide. Readers
receive timely information on emerging By Dan Mendelson
security threats and practical solutions, PRELIMINARY GUIDE TO
which they can use to protect people, THE ASIS INTERNATIONAL
property, and information. CHECK OUT MORE ONLINE at
EXHIBITS www.securitymanagement.com

0917 TOC C.indd 11 08/17/2017 1:16:38 PM


12
SECURITY MANAGEMENT ONLINE

ONLINE HIGHLIGHT

EMER
RGENCY
COMMUNICATIO
ONS
U.K. communications regulator Ofcom fined mobile network operator Three
£1.9 million (approximately $2.4 million) for weaknesses in its emergency call
network. An Ofcom investigation found that Three broke an important rule
designed to ensure that everyone can always contact emergency services, even
when the network experiences technical problems. In this case, Three’s emer-
gency call service was vulnerable to a single point of failure, and did not provide
back-up routes for diverting emergency calls.

NEW ONLINE THIS MONTH at www.securitymanagement.com

WASTEWATER WATER REUSE MARIJUANA


The 2017 edition of the United U.S. Secretary of the Interior Ryan An employer acted illegally when
Nations World Water Development Zinke announced that the U.S. it failed to hire a medical marijuana
Report, Wastewater: The Untapped Bureau of Reclamation awarded user because she disclosed that she
Resource, demonstrates how im- $23 million to communities in seven could not pass a preemployment
proved wastewater management states for planning, designing, and drug test, a Rhode Island state
generates social, environmental, constructing water recycling and court ruled.
and economic benefits essential reuse projects. A list of the projects
for sustainable development and and other resources can be found SHARING INTEL
water security. on the WateReuse website. Terrorism has changed how interna-
tional intelligence is shared, and old
TERRORISM INFORMATON ARTIFICIAL INTELLIGENCE allies face new issues, according to
A disconnect in intelligence sharing The artificial intelligence (AI) mar- a Global Security Studies report.
among the European Union’s mem- ket is projected to reach $70 billion
ber states means countries aren’t by 2020 and will impact consumers,
getting the information they need, enterprises, and governments, ac-
according to an article in European cording to The Future of AI is Here, Go to SM Online for
these and other links
View. For example, some terrorists a PricewaterhouseCoopers initia- mentioned throughout
in the Paris and Brussels attacks tive. Most consumers believe that AI this issue.
were known in other EU states. will help solve complex problems.

0917 SM Online C.indd 12 08/17/2017 1:38:00 PM



#5+5
$QQVJ
ACCOUNTABILITY • ANALYTICS • SECURITY • ASSET CONTROL

Monarch Plus 1. Each key electro-mechanically locked


Lock-In Key in place
Control System 2. Restrict access by user, key, date & time
and cabinet, etc. (segregation of duties)

3. Digital image capture with every transaction

4. Comprehensive reports and custom report builder


is included

5. Networking, integration, API

6. US based 24-hour customer care

and more
GS-07f-0771x

-G[RGT5[UVGOUEQOʥ-G[RGT5VQTGEQO



For product info #7 securitymgmt.hotims.com


14
EDITOR’S NOTE

Editor-in-Chief
TERESA ANDERSON

EMOTIONAL

U
nder the classical view of standpoint, it’s trapped in a dark,
emotional expression, emo- silent box called your skull, and has
tions are things that happen no access to the causes of the sen-
to you. Being angry or sad sations it receives,” Barrett said to
is an unbidden reaction. This school WIRED’s Emma Bryce. “I think the
of thought posits that emotions are way emotions are made is not special:
universal expressions, common to all your brain makes an emotion by using
humans and in all cultures. prior experiences of emotion to predict
Except, maybe they aren’t. When it and explain incoming sensory inputs
comes to feeling emotion and reading and guide action,” Barrett said.
the emotions of others, the latest sci- If applied to security, this activity
ence says that your mileage may vary. is strikingly similar to the process of
In her new book How Emotions are managing risk. Not only does risk vary
Made, Lisa Feldman Barrett claims from company to company, but secu-
that emotions aren’t objective. rity managers must evaluate inputs,
Barrett, a professor of psychology at apply past experiences, and predict
Northeastern University in Boston, future outcomes to protect people,
contends that emotions are learned property, and assets. One organization
behavior and are developed differently may be willing to accept a particular
in each individual’s brain. An emotion, risk that another cannot tolerate.
she says, is not your reaction to the This month’s cover story discusses
world, it’s your brain’s interpretation the industry best practice for man-
of the world. And these interpretations aging risk: enterprise security risk
vary widely from culture to culture. management (ESRM). By adopting
If this theory is correct, emotions ESRM, security managers can develop
can’t be used as a cultural barome- effective security programs to address
ter because they are not universally all potential threats from cybercrime
shared. In an episode of the Invisibilia to theft to reputation management.
podcast, Barrett said, “For every emo- Security professionals can also ensure
tion category that we have in the U.S. that, as strategic corporate leaders,
that we think is biologically basic and they have a seat at the table.
universal, there’s at least one culture Learn more about your inputs at
in the world that doesn’t really possess ASIS 2017 in Dallas, Texas, September
a concept for that emotion and where 25-28. From ESRM education to risk
people don’t really feel that emotion.” mitigation strategies in the exhibit
Barrett says that emotions are just hall, the entire week is dedicated to
the brain’s way of processing inputs helping security professionals process
and predicting what they might mean. timely information and turn it into
“If you think about it from a brain’s action.

0917 Editor's Note .indd 14 08/15/2017 5:52:22 PM


The open platform of Pro-Watch® 4.3.5
integrates seamlessly with third-party systems,
while the latest identity management and
Mobile Access for mobile credential enhancements provide greater

Increased Productivity efficiency, productivity and a superior user


experience. Plus, the new Android mobile app
lets users manage time-sensitive access rights,
control doors and more—anytime, anywhere.

Build on the possibilities at


See us at ASIS Booth 2509
http://hwll.co/pro-watch.
For product info #8 securitymgmt.hotims.com
© 2017 Honeywell International. All rights reserved.
16
NEWS & TRENDS | WATER REUSE

Recycled wastewater
can help relieve water
scarcity problems
in places like India.

PHOTO BY MARIA HEYENS, ALAMY STOCK PHOTO


GLOBAL
WATER RISK
WITH A GLOBAL WATER SHORTAGE NOW A REAL POSSIBILITY, MORE
SCIENTISTS AND OFFICIALS ARE REALIZING THE VARIED BENEFITS OF according to
WASTEWATER REUSE. BY MARK TARALLO some estimates.
This discharge
IF, AS BIBLICAL WISDOM REVEALS, the meek shall inherit the earth, then can contribute to
perhaps it will be the dirty, not the pure, who help build a sustainable global devastating consequences. In 2012, for
future—at least when it comes to water, say scientists. example, more than 800,000 deaths
worldwide were caused by contam-
As an issue of global significance, to a United Nations (UN) estimate. inated drinking water, inadequate
water security has recently vaulted Water scarcity can lead to instability handwashing facilities, and insuffi-
to prominence. Half of the world’s and violence; the crisis in Syria was cient sanitation services.
largest cities now experience water triggered by, among other factors, a In the oceans and larger seas,
scarcity, and roughly two-thirds of historic drought from 2007 to 2010. wastewater discharge sometimes
the world’s populace face seasonal or But water security is a complex causes deoxygenated dead zones
annual water stress. issue, and scarcity is merely one of that harm an estimated 245,000
The future looks even drier. its components. square kilometers of marine ecosys-
Demand for water is expected to Most activities that require water tems, according to UN estimates.
exceed supply by 40 percent within produce wastewater. As water usage But instead of being discharged,
15 years, if current conditions con- grows, so does the production of wastewater can be treated—and
tinue. By 2025, absolute water scar- wastewater. And more than 80 percent reused. And more officials and
city will be a daily reality for an esti- of wastewater worldwide is released experts are realizing the benefits of
mated 1.8 billion people, according into the environment untreated this new approach.

0917 News & Trends C.indd 16 08/15/2017 5:53:22 PM


17
SEP 2017 | SECURITY MANAGEMENT

Wastewater is no designing, and constructing water


reuse projects.
almost doubled since the late 1990s,
so that between 20 and 30 percent of
longer seen as a Often, treating wastewater so that it wastewater collected in all sewer sys-
can be reused for agricultural purposes tems is now treated.
problem in need of a is less expensive than purifying it to the “Treated wastewater could be an
level where it can be used as drinking important source of water supply in
solution, rather it is water. Given this, countries are becom- some cities, particularly those located
ing more aggressive in their water reuse in arid areas (such as Lima), or where
part of the solution. programs, according to the report. long-distance transfers are required to
For example, in 2013, 71 percent of meet growing demands, particularly
the wastewater collected in the Arab during drought (such as São Paulo),”
states was safely treated, and 21 percent the report finds.
“Wastewater is gaining momen- was being reused, mostly for irrigation While progress in reusing wastewater
tum as a reliable alternative and groundwater recharge. has been made in the United States and
source of water,” says the recently Other regions are realizing the poten- around the world, there are still con-
released United Nations World tial benefits of wastewater reuse. In straining factors hindering even more
Water Development Report for 2017: the Asia Pacific region, some countries progress, Glennon says. One is cost;
Wastewater, the Untapped Resource. have discovered that byproducts from some localities in developing countries
“Wastewater is no longer seen as a domestic wastewater, such as nitrogen, struggle to afford construction of waste-
problem in need of a solution, rather phosphorous, and salt, have potential water treatment plants.
it is part of the solution to challenges economic value. Another is that countries like China
that societies are facing today,” the For example, case studies in and India continue to use unsustainable
report finds. “Wastewater can also be a Southeast Asia have shown that rev- practices when it comes to their water
cost-efficient and sustainable source of enues generated from wastewater supply, such as “pumping groundwater
energy, nutrients, organic matter, and byproducts, such as fertilizer, are sig- with impunity.” India, for example, has
other useful by-products.” nificantly higher than the operational yet to truly face up to its water shortage
Given the skyrocketing demand for costs of treating the wastewater. That crisis and change its practices. “The
water, the positive effect that waste- provides an economic incentive for rules of groundwater pumping remain so
water reuse could have on the global water reuse, the report finds. relaxed,” Glennon says.
water crisis is “immense,” says Robert However, “more needs to be done And in places where water scarcity
Glennon, a water policy expert at the across the region to support municipal is currently not a huge issue, some offi-
University of Arizona and author of and local governments in managing cials have the attitude of, “Why should
Unquenchable: America’s Water Crisis urban wastewater and capturing its I bother to reuse water if I can just drill
and What to Do About It. resource benefits,” the report adds. a well?” Glennon says. He compares
“This is a very big deal,” Glennon In Latin America and the Caribbean, this attitude to the mistaken belief that
tells Security Management. He cites the urban wastewater treatment has an unlimited number of straws can be
example of the state of Arizona, which placed in the same glass—eventually,
has been active in reusing water for a few all the liquid will be sucked out.
decades now. Facilities like golf courses In addition, there are some security
and ballparks can consume large issues related to the practice of waste-
amounts of water, he says, so Arizona’s Americans reportedly have broad water reuse, says Yves Duguay, CEO
water reuse practices have been helpful. exposure to guns, whether they and founder of HCIWorld, who has had
Moreover, state officials have formed personally own one or not. on-the-ground experience with audits of
WateReuse Arizona, a group that water works and other infrastructure sys-
U.S. Adults Living in a
assists communities in achieving Household with a Gun tems. For example, systematic controls
sustainable water supplies through in the process are needed to ensure that
reuse. Among other things, the group health, safety, and security requirements
offers scholarships for Arizona college are maintained. “Most of the time, my
students interested in specializing in audits have shown a lack of oversight and
water reuse and reclamation. controls, along with poor contract perfor-
On the U.S. federal level, the U.S. mance management. This can increase
Department of the Interior announced SOURCE: America’s Complex Relationship
the risk for water reuse,” he says.
in May that it awarded $23.6 million to with Guns, Pew Research Center, June 2017 This is doubly important in areas
seven states for researching, planning, where waste management operations,

0917 News & Trends C.indd 17 08/15/2017 5:53:35 PM


18

NEWS & TRENDS | FINANCIAL CRIME

which can include water reuse, are


linked to corruption and even orga-
Neglecting the alternative,” Glennon explains. Duguay
echoes this view: “There is no doubt
nized crime. “How certain are we that opportunities arising that we need to control our utilization
waste, solid or liquid, is being disposed of water; it’s a unique resource that is
as expected and regulated?” he asks. from improved not infinite,” he says.
Still, developed countries like the In the end, the UN report argues
United States and Canada can show wastewater that, in a world where limited water
leadership by developing a systematic resources are increasingly stressed by
approach to the recycle and reuse of management is over-abstraction, pollution, and climate
wastewater, Duguay says. And since it is
not an “in-your-face issue,” wastewater
nothing less than change, it is imperative for officials
around the globe to focus on wastewa-
reuse needs more awareness and advo- unthinkable. ter treatment and reuse.
cacy so it is not crowded out by more “Neglecting the opportunities arising
publicized political concerns. “There is from improved wastewater manage-
little room on our governments’ agenda ment,” the report concludes, “is noth-
for such a topic, unless it is talked about will ultimately become a necessity ing less than unthinkable.”
and frequently communicated to the to reuse treated wastewater, because
general public,” he explains. supply will not hold out, Glennon says.
Nonetheless, in areas of the world “Some places will have to use that for See SM online for a copy
of the UN report, and the
where water scarcity hits hardest, it drinking water—there is simply no
WateReuse Arizona project
descriptions.

BOOK
REVIEW PARTNERS IN
PHYSICAL SECURITY CRIMESTOPPING
A FEW YEARS AGO in Australia, a
BY LAWRENCE J. FENNELLY AND MARIANNA PERRY. Butterworth-Heinemann;
Elsevier.com; 204 pages; $79.95. group of industry representatives and
Australian government officials got
THE SECOND EDITION of Physical upgrades, training security staff, and together to make a plan. They wanted
Security: 150 Things You Should finding justification for best practices
Know is an excellent reference for with the C-suite. Many sections are
to fight financial crime and terrorism in
security practitioners and managers. nothing more than easy-to-follow a way never done before, by designing
Written by Lawrence J. Fennelly checklists, so retrieving the informa- a new system for discovering, interpret-
and Marianna Perry, CPP, the book tion is remarkably simple and quick. ing, and disrupting financial crime.
covers the most common concepts The broad range of topics
and concerns in security today; addressed in the book makes it
In May, the plan came to fruition
from lighting and CPTED to cyber impossible for the authors to dig too with the formal launch of the Fintel
and drones. To borrow from the deep on any single issue, so many of Alliance, an initiative that is being
book’s opening lines, it is a roadmap the sections do not offer full expla- billed as the world’s first private-pub-
to building and enhancing an nations. This, however, does not take
organization’s security program. anything away from the quality or
lic partnership aimed at combatting
The authors do a great job of usefulness of the book. money laundering and terror financ-
organizing an overwhelming amount The concepts are outlined in care- ing. The alliance was established by
of material. The book is likely to serve fully selected paragraphs that provide the Australian Transaction Reports
more as a go-to reference for a partic- just enough detail to jog the memory
ular topic rather than to be read from or provide a starting point for further
and Analysis Centre (AUSTRAC), which
cover to cover. research from more-focused sources. is Australia’s financial intelligence
A security practitioner with a fun- All in all, this book offers great ideas agency with regulatory responsibility
damental understanding of security and best practices for a broad range for anti-money laundering and coun-
will find this book to be an excep- of security topics, not just physical
tional resource for planning security security.
terterrorism financing.
Organizers say that one of the unique
REVIEWER: Yan Byalik, CPP, is the security administrator for the City of aspects of the alliance is that its diverse
Newport News Virginia. He is a graduate of the Virginia Tech Corps of Cadets team members—representatives from the
and has worked in a variety of security roles in higher education, amusement
park, and telecommunication security sectors since 2001. He is the assistant financial sector, nongovernmental orga-
regional vice president for ASIS Region 5A in southeast Virginia. nizations, law enforcement, and national
security agencies—work cheek-by-jowl

0917 News & Trends C.indd 18 08/15/2017 5:53:42 PM


V I S I T U S AT A S I S I N T E R N AT I O N A L · D A L L A S , T X · S E P T E M B E R 2 6 -2 8 · B O O T H 2 7 2 3

DETEX CUSTOMER SERVICE TECHNICIANS live and thrive in the Advantex line of exit devices & electrical functions
urgent world of security door hardware. So getting your Super heavy duty low energy ADA operator
immediate questions answered is priority one. Whether Automatically operated door easykits
you need guidance with a challenging installation, are Weatherized delayed egress easykits
inquiring about training or want help making a hardware Tailgate detection
decision, you can access a team with nearly five decades
of combined experience. You’ll have the answers you
need before you know it. Just call 800-729-3839.

DE TE X.COM/IMABLUR2 LISTEN • DESIGN • BUILD • SUPPORT

For product info #9 securitymgmt.hotims.com


20
NEWS & TRENDS | FINANCIAL CRIME

in AUSTRAC’s operations hubs in Sydney fraudulent facades, and wherever else terrorism financing, and the profits of
and Melbourne. it leads. organized crime.”
This collaboration, they say, means “We aim to make Australia the most The alliance has three operational
agility—intelligence that is drawn from difficult jurisdiction in the world for goals: to help private sector partners
close to real-time information can be organized crime and terrorism finan- identify and report suspicious transac-
exchanged quickly, using the best ciers to operate in,” the group said tions more easily; to help law enforce-
tracking tools. This agility and coop- when it was launched earlier this year. ment partners arrest and prosecute
eration enables the alliance to follow “Fintel Alliance will be relentless criminals more quickly; and to work
the money trail down holes, behind in pursuing serious financial crime, with academia to build knowledge and
gather insight.
Under the alliance umbrella, indus-
try leaders and government agencies
Because crime can occur even with tight security, will attempt to advance these goals by
working together to design initiatives
I CHOOSE BROWNGUARD® INSURANCE . in the fight against crime. It will also
focus on developing a more streamlined
and efficient regulation framework in
the areas of anti-money laundering and
counterterrorism financing.
The alliance is working on three proj-
ects this year: the identification of money
mules, or intermediaries who transport
If my guard is performing an stolen money to fraudsters; the exploita-
interior patrol of an office tion of data from the Australian Cyber
building, and an assault occurs
in the parking lot, then that’s Information can be
a risk I can’t completely exchanged quickly
control. That’s why my choice
for insurance is Brownguard. using the best
BECAUSE I KNOW BETTER, tracking tools.
THERE’S BROWNGUARD.

Online Reporting Network (ACORN); and


Visit Us at
the examination of the Panama Papers,
ASIS Booth
the 11 million documents owned by a
#2132
Panamanian law firm about offshore
entities that were leaked in 2015.
The group is also considering taking
on two new projects: helping police
investigate the financial networks of
an organized crime syndicate, and
developing public-private partnership
capabilities to design strategies for dis-
The leading insurance program for Security Professionals rupting national gangs.
There’s also the possibility of future
Ask your agent for a quote: expansion. The United Kingdom’s
800-645-5820 National Crime Agency has joined as the
Insurance when you know BETTER® first international alliance member, and
brownguard@brownyard.com
brownyard.com alliance officials have said that they hope
to work alongside more international
counterparts in the future.
See us at ASIS Booth 2132 For product info #10 securitymgmt.hotims.com

0917 News & Trends C.indd 20 08/15/2017 5:53:52 PM


WE HAVE ALL
THE REASONS YOU
NEED TO CHOOSE
THE BEST
IN SECURITY FOR
YOUR BUSINESS

It takes all the reasons in the world


to win the confidence of thousands
of clients worldwide.

MORE THAN

SECURITY GUARDS

This is just one reason. We have a thousand more.

Solutions in 5 continents € 3,902 million sales in 2016


168,000 professionals worldwide € 40 million in R&D since 2012

prosegur.com

twitter.com/prosegur

linkedin.com/company/prosegur
youtube.com/prosegur
See us at ASIS Booth 433
For product info #11 securitymgmt.hotims.com
22
NATIONAL SECURITY | INTELLIGENCE SHARING

ILLUSTRATION BY MICHAEL AUSTIN


GO WITH
THE FLOW
THE STREAM OF NATIONAL SECURITY INTELLIGENCE FROM North Carolina at
COUNTRY TO COUNTRY RELIES ON TRUST MORE THAN ON FORMAL Charlotte.
INFORMATION SHARING METHODS. BY LILLY CHAPA “On the one
hand, that would
SOMEWHERE IN SYRIA, an Israeli espionage team was left scrambling after be very troubling to other countries
U.S. President Donald Trump passed along Israeli intelligence to Russian because they are sharing a lot of
officials in May. intelligence with the United States
and it might be passed on in a sim-
During a visit to the White House whomever he sees fit—it could be ilar spontaneous way,” Walsh tells
by the Russian foreign minister seen as a political gaffe, according to Security Management. “Having said
and ambassador, Trump revealed experts. that, these are typically ongoing long-
highly-classified information that In this case, Israel, which is known term relationships, so one episode is
was given to him by Israel about an for its long-ranging espionage tactics, probably not going to be enough to
ISIS plot—including the Syrian city in had explicitly asked that the infor- upset that longer-run cooperation.
which the intelligence was gathered. mation not be passed on without In this case, Israel gets a lot from the
The disclosure raised concerns that permission. United States in terms of intelligence,
Russia—or ISIS—would be able to The impact of Trump’s disclosure as well as a lot of other types of sup-
figure out who was collecting intelli- to the Russians is yet to be seen, but port. Maybe one mistake would not
gence and how. it might manifest itself in ways not lead to a fundamental reassessment
While Trump’s action was not directly related to intelligence shar- of that relationship.”
illegal—the president is allowed to ing, says James Igoe Walsh, professor Walsh says he believes Trump’s
share classified information with of political science at University of decision to share the classified

0917 ks-National Security C.indd 22 08/15/2017 5:54:22 PM


23
SEP 2017 | SECURITY MANAGEMENT

The flow of national security intelligence nontraditional intelligence-sharing


partners. The United States depends
from one country to another can on both traditional and new allies for
be fickle. counterterrorism intelligence sharing,
according to a report in academic jour-
nal Global Security Studies. The global
information was not planned; typically, the United Kingdom, and the United reach of terrorist groups has widened
countries share such information so States, foster structured intelligence the circle of allies the United States
they will receive something concrete sharing between nations. has to rely on for intelligence from the
in return, which was not the case with But there are also countless complex trenches.
Russia. But regardless of the disclo- connections, networks, and alliances For example, “nontraditional rela-
sure’s spontaneity, it almost certainly between countries based on the sharing tionships with Muslim nations like
created headaches for the intelligence of not just intelligence but economic Saudi Arabia and Pakistan have been
agents who initially obtained the infor- and military support. critical to the crackdown on terrorism
mation. “These narrow intelligence-sharing financing and the ongoing operations
The flow of national security intelli- arrangements are embedded in larger against terrorists and insurgents in both
gence from one country to another can arrangements,” Walsh explains. “If Afghanistan and Pakistan’s federally
be fickle, Walsh notes. Alliances such as the U.S. becomes less predictable, that administered tribal areas,” according
the North Atlantic Treaty Organization might be counterbalanced by other to the report Challenges to International
(NATO), the European Union (EU), the commitments, like military cooperation Counterterrorism Intelligence Sharing
United Nations (UN), INTERPOL, and in Afghanistan or cooperation against written by Anna-Katherine Staser
Five Eyes, an intelligence alliance made terrorist threats.” McGill and David H. Gray.
up of Australia, Canada, New Zealand, This is especially important for While these newer relationships

CRITICAL
INFRASTRUCTURE
PROTECTION
ABLOY® - Your High Security Solution...
t1SPUFDUJPOBHBJOTUMJBCJMJUZ UIFGU DSJUJDBMGBJMVSF UFSSPSJTUT
T
BTXFMMBTBSVJOFESFQVUBUJPO
t1BUFOUFESPUBUJOHEJTDDZMJOEFS CJMMJPODPNCJOBUJPOT 
WJSUVBMMZQJDLQSPPG
t1BUFOUFEBOESFHJTUFSFELFZTDBOBMTPPQFO
ABLOY®EPPSMPDLT
t&MFDUSPNFDIBOJDBMMPDLJOHUFDIOPMPHZ
t*OUFMMJHFOUUBTLBOELFZNBOBHFNFOU
t4VQFSJPSNBTUFSLFZJOHGFBUVSFT
t.BYJNVNSFTJTUBODFUPIPTUJMFBOETFWFSFFOWJSPONFOUT
t"TTFNCMFEJOUIF64"
ABLOY® ,,, FOR A MORE SECURE WORLD

$PNFWJTJUVTBU"4*4%BMMBT 1 800-367-4598
In Canada 800-465-5761
4FQUFNCFSt5FYBT
fax 972-753-0792
ABLOY SECURITY #PPUI e-mail info@abloyusa.com
an ASSA ABLOY Group Brand www.abloyusa.com

See us at ASIS Booth 3203 For product info #12 securitymgmt.hotims.com

0917 ks-National Security C.indd 23 08/15/2017 5:54:35 PM


24
NATIONAL SECURITY | INTELLIGENCE SHARING

are bolstered by military support or attacker and photos of bomb fragments advance so that they could disseminate
a dependence on the oil trade, more from the attack. information to partners who may be
traditional alliances are expected to British intelligence officials imme- able to help them with the investiga-
last through thick and thin—although diately announced that they would tion. The assumption would be that the
recent concerns based on leaks, per- no longer share information from the recipient would not be sharing it with
sonal data protection, and the increased investigation with their American the media at all, or especially more or
flow of information can put a strain on counterparts; Manchester Mayor Andy less immediately.”
the sharing relationships. Burnham told newspaper reporters that The EU has its own intelligence-shar-
Just weeks after Trump passed the country couldn’t risk sharing any ing challenges. Although Europol has
on Israeli intelligence to Russia, the more information. established several means of intelli-
attack at an Ariana Grande concert in The change in policy upsets a history gence sharing across Europe, it has
Manchester, United Kingdom, shocked of open information sharing between continued to face problems connecting
the world. While British authorities were the United Kingdom and the United the dots.
scrambling to track down the perpetra- States during crises, Walsh notes. “The recent terrorist attacks in
tors, American news media published “They share this kind of intelligence Belgium and France have once again
details of the ongoing investigation, on autopilot, and maybe with good highlighted the contradiction between
including the name of the suspected reason,” he says. “They planned it in the seemingly free movement of ter-
rorists across Europe and the lack of
EU-wide intelligence sharing,” notes
BOOK Oldrich Bureš in the policy journal
REVIEW European View. “Due to their earlier
criminal activities, most perpetrators of
SOFT TARGETS the attacks in both Paris and Brussels
were known to the various security
BY JENNIFER HESTERMAN AND MICHAEL FAGEL; CRC Press; crcpress.com; 494 agencies in several EU member states.”
pages; $89.95. Indeed, a man who gave logistical sup-
port to the terrorists who carried out the
Once upon a time, security pro- Along with a host of eminent
fessionals did not worry about soft contributors, authors Fagel and November 2015 Paris attacks had been
targets and crisis management. Hesterman walk the reader through investigated by both Belgian and Dutch
The security management function all the different phases of an event police, but neither the EU nor French
was compartmentalized, and the from planning to recovery to business authorities were aware of the man.
discipline of crisis management did continuity, highlighting the steps
not yet exist. Those days are gone that can be taken along the way to While Europol has established
forever. Today, security managers prevent or mitigate the damage from multiple tools for reporting and col-
are expected to be multi-disciplined an attack. lecting national security and terrorism
business partners with the ability to This book is general enough to intelligence, it cannot conduct its own
perform several functions at once: recommend an all-hazards approach
security director, emergency planner, for routine events, yet specialized investigations and instead facilitates the
first responder, analyst, teacher, and enough to include segments on exchange of information. However, given
trainer are just some of the roles they church security, hospital business the cultural and linguistic diversity of
might fill. continuity, sports venues, schools, the 28 EU member states, as well as their
How can one be expected to public health systems, and active
understand so many diverse yet shooter scenarios. It contains differing political and judicial frame-
interconnected roles at the same updates to historically tried-and-true works, sharing intelligence through
time? Reading Soft Targets and concepts such as target hardening, Europol may not be as effective as more
Crisis Management may help. This while articulating the need for less– informal arrangements.
impressive book is the best security conventional–strategies like fusion
and crisis management compendium centers for sharing intelligence and Likewise, the United Nations’
available today. It is an essential tool cybercrime defenses. counterterrorism efforts lack coher-
that should be in the library of every This is a well written must-read ence, according to an issue brief by the
security and emergency manager for security managers, emergency Council on Foreign Relations. The UN
concerned that the evolution of crime planners, and first responders. It
and terrorism has made soft targets is also an excellent textbook for alone runs more than 30 agencies that
fair game. instructors and professors. conduct counterterrorism activity.
“Too often, these various elements
REVIEWER: Jim Murray, CPP, is an adjunct professor at Buena Vista are uncoordinated and even compet-
University. He has extensive experience in the areas of law enforcement, ing,” the report notes. A UN committee
corporate security, and crisis management. created a consolidated list of individuals
subject to sanctions because of terrorist

0917 ks-National Security C.indd 24 08/15/2017 5:55:23 PM


fire, life and security systems | maintenance and inspection | custom solutions

It’s not just about


protecting your
business from
disaster –

©2 17 R
©201
© Ree d Ha
H wk Fiire
irre
e & Se
S cur
uri
ur
rityy | inf
rity info@Re
o@
o
o@R
@Re
@R
@ Re d
dHaw
dHa
dHHaw
H wkUS
kUS.
kU
US
US.
U S com
co
c om
o m

It’s about monitoring those side entries, keeping up with


regulations and replacing that worn wiring by the break room.
When you partner with Red Hawk we don’t just provide the best solution– we provide the best solution for you. Our experienced team takes the
time to understand your business and deliver the latest in technology with good-old-fashioned hands-on customer service. We won’t sell you anything you
don’t need and will always be here when you need us. RedHawkUS.com | 888-991-0117

®
the power of experience
For product info #13 securitymgmt.hotims.com
26
NATIONAL SECURITY | INTELLIGENCE SHARING

activity, but the report finds that the agencies agreed to share secrets more damage an intelligence-sharing rela-
impact was negligible “given the lack freely with each other to prevent tionship—there were no significant
of regular updates and expansion of another large attack. However, the effort changes to the United States–Germany
the list, making it an inflexible mech- backfired when leaks through Edward relationship after it was revealed that
anism,” especially as terrorist groups Snowden and WikiLeaks made agencies the United States had been tapping
become less hierarchical. scale back their sharing to need-to- German Chancellor Angela Merkel’s
Walsh points out that even successful know information. private phone. However, too many leaks
intelligence-sharing relationships face “It’s really hard to know when and faux pas by the new administration
larger philosophical concerns—deter- you actually have ironclad intelli- could eventually take a toll.
mining when to share information, and gence that something bad is going to “It’s troubling that the Manchester
whether the receiving country will treat happen,” Walsh explains. “You have investigation leaks happened so shortly
that information appropriately. so much intelligence that’s collected after the Israel episode,” Walsh says. “It
“Typically, when you cooperate with on individual people, like travel might suggest to foreign governments
another country, say on trade policy records, so the problem is connecting that there’s a pattern, especially if that
or an alliance, you want to be able to the dots. How do we even know that information was shared with the United
observe how they’re behaving to see if we should share that?” States and it was leaked by the White
they’re living up to their commitments,” Trust is essential to intelligence-shar- House, in particular.”
Walsh explains. “That’s exceptionally ing relationships, whether it’s trusting
hard to do in the area of intelligence that the information is accurate or trust-
because it’s information and secrets.” ing that the receiving country will treat To view the Global Studies
Nations also need to know whether it the information appropriately. report and the European View
is necessary to share intelligence they Despite Trump’s gaffe, Walsh points article, visit SM Online.
have collected. After 9/11, intelligence out that it takes a great deal to seriously

TERROR IN
THE EU
The number of suspects arrested
for religiously inspired/jihadist
terrorism in the European Union
continues to rise.

800

700

600

500

400

300

200

100

SOURCE: European Union Terrorism


Situation and Trend Report, June 2017

See us at ASIS Booth 2324 For product info #14 securitymgmt.hotims.com

0917 ks-National Security C.indd 26 08/17/2017 1:41:58 PM


For product info #15 securitymgmt.hotims.com
28
CASE STUDY CLOUD-BASED ACCESS

PHOTO COURTESY OF COCO


SAFETY
IN SHARED SPACES
A COWORKING ORGANIZATION TURNS TO AN ACCESS CONTROL she notes, and a
SOLUTION THAT’S AS FLEXIBLE AS THE WORKSPACES IT PROVIDES. security concern
BY HOLLY GILBERT STOWELL if a key was ever
lost.
COWORKING SPACES are on the rise around the globe. These flexible work Because COCO
settings allow people without a traditional office building to still enjoy many of normally leases its
the amenities that come along with having a dedicated work environment. space in a larger building, it needed
a security solution that was as flex-
ible as the working environment it
The 2017 Global Coworking Survey, need and space they require, says provides. “We usually have to find
conducted by Deskmag, along with Megan Dorn, director of operations ways—when we’re opening a space
SocialWorkplaces.com, found that at COCO. or acquiring a space—to work with
there are an estimated 13,800 active “Our idea in doing that was to be the building to find ways to get our
coworking spaces worldwide, host- with our clients as they grow—from security system installed,” Dorn
ing more than 1 million people. the beginning of their business, to explains.
This represents a major increase hiring employees, to maybe needing When COCO acquired a new space
from five years ago, when just 2,070 private offices—which we also have,” in Chicago last May, the existing se-
coworking spaces were used by she says. “So that’s what makes us curity system was a door locked by a
81,000 people globally. COCO, a a little bit different than your typical PIN code, which the building never
coworking company based in St. coworking space.” changed. The PIN code was distrib-
Paul, Minnesota, offers several When the company started in uted to a large number of people.
different levels of membership and 2010, it had to distribute physical “The space got broken into a week
types of space, so clients are only keys to its members, “which is a before we acquired it. Laptops were
paying for the amount of time they nightmare as you’re trying to grow,” stolen, and people were really on

0917 ks-Case Study C.indd 28 08/15/2017 5:55:59 PM


• Our exclusive canopy options fit single,
multiple or space-saving double units.
• Power assist is activated with a slight
See us at
ASIS 2017 in Dallas, TX
Set your
push and adjusts to the speed of the
individual entering the turnstile.
September 25-28
Booth 2321 boundaries.

dormakaba full height turnstiles offer a smart solution for securing the
perimeter of buildings and property. The modular system presents multiple
design configurations, and electronic access control options allow secure
passage to authorized personnel.

Setting boundaries makes access in life smart and secure.

For information, design consultation, specifications or installation call


844-773-2669 for comprehensive project support.

DORMA and KABA are now dormakaba. Visit go.dormakaba.com/PAS-SMMag


For product info #16 securitymgmt.hotims.com
30
CASE STUDY CLOUD-BASED ACCESS

STATS
What are your main security concerns related to Bring Your Own Device?
Responses from 800 cybersecurity professionals on the LinkedIn Information Security Community

Data leakage/loss Unauthorized access Users download unsafe Malware


to company data apps or content
and systems
SOURCE: Bring Your Own Device and Mobile Security Spotlight, Crowd Research Partners, 2016

edge,” she notes. “So as soon as we COCO turned to Brivo’s OnAir, a boo. Using Brivo, COCO can easily dis-
came in to the Chicago space, one of our cloud-based access control system that tribute keycards to its clients and man-
top priorities was to get a really solid ac- easily integrated into the company’s age membership usage and levels.
cess and security system in place.” membership dashboard, called Bam- To set up the system, Brivo represen-
tatives come to COCO’s space and add
card readers to the appropriate doors.
They also set up schedules and the
different access levels for membership
types.
COCO has one membership accoun-
tant who works out of the company’s
headquarters and oversees assign-
ing new members a keycard number
through Brivo. “It’s all digital, so it can
be done remotely,” she notes.
A community manager at the mem-
ber’s location—the lead COCO employee
for that site—can then log on to Brivo
and see which card number has been
assigned for that client, add the number
to their member profile in Bamboo, and
distribute it.
Changing, granting, and revoking
access levels, as well as keeping track of
when members come and go throughout
the building, are all managed through
the Brivo platform.
“Say you want to upgrade a member
from part-time to full-time. We’re able
to just go into Brivo and quickly change
your access. It’s active the moment
that you do it,” she notes. “That’s ac-
tually been really helpful for us, given
we have all this variability in types of
membership.”
See us at ASIS Booth 4438 For product info #17 securitymgmt.hotims.com

0917 ks-Case Study C.indd 30 08/17/2017 1:49:40 PM


31
SEP 2017 | SECURITY MANAGEMENT

When a member badges in, a wealth amount of delinquent payments that we “The goal is to try to get the member
of information comes up on the Brivo have, and receive that payment.” to come back. So if you have that card
dashboard for the community manager When a member badges in, Brivo also and you come back, you’re already set
to see. “Their picture, their name, their alerts the community manager if that up in our system, all we have to do is
membership level, how many times person hasn’t been in the space very of- reactivate the card and then we’ll also
they’ve checked in already that month, ten that month. waive any setup fees,” Dorn says.
it immediately shows up,” she says. “So “If we can find a member who we She notes the combination of security
it tells you in real time exactly who’s in consider at-risk, who hasn’t been using and business insights from Brivo has
your space and when.” the space, and we’re alerted to that we been tremendous for COCO.
The business value of OnAir is im- can reach out to them, invite them to an “Brivo as a security system has
mense for COCO, Dorn points out, be- event, or try whatever we can to reen- helped us go from being a group of
cause the company can tell how often gage them,” Dorn says. people working out of a space to a full-
members are actually using the space, COCO is also in the initial stages of us- fledged company,” she says. “It really
and whether they have made payments, ing Brivo MobilePass, which lets COCO helps us manage all of the different
as soon as they present their access card staff remotely lock and unlock doors via types of membership and the stages of
to the door reader. a smart device, for members who want business they’re in.”
“Let’s say someone is delinquent to access the space after-hours but for-
on payment. As soon as the member get their keycard.
checks in, there’s going to be big red Because of how easily it can deacti- FOR MORE INFORMATION:
circle with an exclamation point [on the vate and reactivate access, COCO also Nicki Saffell, sales@brivo.com,
www.brivo.com, 301.664.5242
dashboard]–you can’t miss it,” she says. encourages members who leave the
“It’s definitely helped us lower the sheer company to keep their keycards.

www.stratfor.com
See us at ASIS Booth 4583 For product info #18 securitymgmt.hotims.com

0917 ks-Case Study C.indd 31 08/15/2017 5:57:20 PM


32
CYBERSECURITY | ARTIFICIAL INTELLIGENCE

ILLUSTRATION BY MICHAEL GLENWOOD


AI: THE FORCE
MULTIPLIER
ARTIFICIAL INTELLIGENCE COULD CREATE A WORLD WHERE HUMAN players of the past
ABILITIES ARE AMPLIFIED, INCLUDING ANALYSTS’ ABILITY TO DETECT decade, it was an
AND RESPOND TO CYBERTHREATS. BY MEGAN GATES exciting moment
for the future of technology. AlphaGo
GO IS NOT JUST A GAME. It can also serve as an analogy for life, a method bested Lee Sedol, winner of 18 world
of mediation, an exercise in abstract reasoning, or even as insight into a play- titles, in four out of five games in a
er’s personality. The ancient board game from China is played by two players 2016 tournament.
on a 19-by-19 gridded wooden board with black and white stones. The stones “During the games, AlphaGo
are used to surround other stones to capture them or to mark territory, with played a handful of highly inventive
10 to the power of 170 possible board configurations. winning moves, several of which—
including move 37 in game two—were
“There is no simple procedure to A typical game on a normal so surprising they overturned hun-
turn a clear lead into a victory—only board can take 45 minutes to an dreds of years of received wisdom,
continued good play,” according to hour to complete, but profession- and have since been examined exten-
the American Go Association. “The als can make games last for hours. sively by players of all levels,” Deep
game rewards patience and balance Supercomputers are not even capa- Mind said in a press release.
over aggression and greed; the bal- ble of predicting all the moves that And then, AlphaGo won again
ance of influence and territory may could be made in a game. in May 2017, marking the AI’s
shift many times in the course of a This is why when Google’s final match event. “The research
game, and a strong player must be Deep Mind artificial intelligence team behind AlphaGo will now
prepared to be flexible but resolute.” (AI) AlphaGo beat one of the best throw their energy into the next

0917 ks-Cybersecurity C.indd 32 08/15/2017 5:58:47 PM


33
SEP 2017 | SECURITY MANAGEMENT

intelligence. The term was first used in a


FACT 1955 proposal for a Dartmouth summer
BOX research project on AI by J. McCarthy of
Dartmouth, M. L. Minsky of Harvard, N.
QUESTIONS TO ASK WHEN Rochester of IBM, and C.E. Shannon of

CHOOSING AN AI PRODUCT
Bell Telephone Laboratories.
The authors requested a two-month,
10-man study of AI to attempt to find
• DOES IT USE SUPERVISED • WHAT SUCCESS HAS THE out “how to make machines use lan-
OR UNSUPERVISED MACHINE PRODUCT HAD WHILE USING guage, form abstractions and concepts,
LEARNING? THOSE ALGORITHMS?
solve kinds of problems now reserved
• WHAT ALGORITHMS DOES • WHAT’S THE FALSE POSITIVE RATE? for humans, and improve themselves,”
IT USE? according to the proposal.
• WHAT’S THE TRUE POSITIVE RATE? Since then, AI has advanced, and
there are now many broad areas that fit
SOURCE: Ely Kahn, cofounder and vice president of business development of Sqrrl
under the overall umbrella of AI, includ-
ing deep learning, cognitive computing,
set of grand challenges, developing and handle problems that machines are data science, and machine learning,
advanced general algorithms that not yet capable of. says Anand Rao, partner at PwC and
could one day help scientists as they “The goal of AI in cybersecurity is global artificial intelligence lead.
tackle some of our most complex prob- to make people more efficient, to be Machine learning is one of the larg-
lems, such as finding new cures for a force multiplier,” says Ely Kahn, est areas getting attention right now,
diseases, dramatically reducing energy cofounder and vice president of busi- Rao says. Machine learning is what
consumption, or inventing revolution- ness development for threat hunting its name describes—the science and
ary new materials,” Deep Mind said in platform Sqrrl. “There’s a huge labor engineering of making machines learn,
a press release. “If AI systems prove shortage in the cybersecurity industry. according to PwC.
they are able to unearth significant I think AI has the ability to help with This is done by feeding a machine large
new knowledge and strategies in these that by making the existing cybersecu- amounts of data, then having it learn an
domains too, the breakthroughs could rity analysts more productive.” algorithm to figure out what is considered
be truly remarkable. We can’t wait to The basics. AI is defined as the devel- normal and abnormal behavior.
see what comes next.” opment of computer systems to perform “In machine learning, the idea is you
Neither can the rest of the world. tasks that typically require human don’t know exactly what the rules are, so
The AI market is projected to
reach $70 billion by 2020 and will
impact consumers, enterprises, and
governments, according to The Future
of AI is Here, a PricewaterhouseCoopers
(PwC) initiative.
“Some tech optimists believe AI could
create a world where human abilities
are amplified as machines help man-
kind process, analyze, and evaluate the
abundance of data that creates today’s
world, allowing humans to spend more
time engaged in high-level thinking, cre-
ativity, and decision-making,” PwC said
in a recent report, How AI is pushing
man and machine closer together.
And this is where cybersecurity pro-
fessionals and experts have shown the
most interest in AI—in its ability to cre-
ate a workforce of the future where AI
works to amplify the human workforce, 9LVLWXVDWERRWK
freeing it up to look at the bigger picture
See us at ASIS Booth 1943 For product info #19 securitymgmt.hotims.com

1_4_H.indd
Access 1 1_4_H.indd 1
Specialties 2016-07-222:05:00
08/10/2017 14:56:27
PM

0917 ks-Cybersecurity C.indd 33 08/15/2017 5:59:39 PM


34
CYBERSECURITY | ARTIFICIAL INTELLIGENCE

you can’t write a program,” Rao explains.


“Usually we get an input, we write spe- COMPLAINTS TO THE IC3
cific instructions that produce an output; The latest report from the FBI Internet Crime Complaint Center (IC3)
shows a 3 percent increase in complaints from 2012 to 2016, but losses
we can do that if we know what it is that nearly tripled.
we are trying to do. But when we don’t Complaints Losses (in Millions)
know that, it becomes hard.”
289,874 2012 $525.4
This is where the two subcategories of
machine learning come into play: super- 262,813 2013 $781.8

vised and unsupervised learning. 269,422 2014 $800.5


Unsupervised machine learning 288,012 2015 $1,070.7
uses data to train the system to create
298,728 2016 $1,450.7
algorithms and the machine is contin-
uously learning, says Kahn, who is the SOURCE: 2016 Internet Crime Report, FBI Internet Crime Complaint Center, June 2017
former director of cybersecurity for the
White House’s national security staff.
Unsupervised machine learning algo- to provide feedback for algorithms the skeptical that AI can replace humans in
rithms are “continuously resetting, so system is using, “so if analysts see some- cybersecurity roles.
they are learning what’s normal inside thing that our unsupervised machine To make the kind of decisions cyber-
an organization and what’s abnormal learning algorithms detect that is a false security analysts make, machines would
inside the organization, and continu- positive or a true positive, the analysts need to use deep learning—a subcategory
ously learning based on the new data can flag it as such,” Kahn says. “That within supervised machine learning that
that’s fed into it,” he explains. feedback is fed into our algorithms to powers Google’s Deep Mind products
With supervised learning, humans power our supervised machine learning and IBM’s Watson. It uses neural network
train the system using training or loop…you can think of it as two comple- techniques that are designed to mimic the
labeled data to teach the system the mentary loops reinforcing each other.” way the human brain works.
algorithm to look for to identify cer- Deep learning. One of the main “I talked about supervised machine
tain types of patterns or anomalies. fears that many people have about the learning in the sense of using training
However, the two types of learning can increasing role AI will play in society data, to help educate algorithms about
be used in combination—they do not is that it will replace jobs that humans the different types of patterns they
need to be kept separate. now hold. While that might be the case should look like,” Kahn says. “Deep
For instance, supervised machine for some positions, such as receptionists learning is that on steroids, in that
learning can be used to allow analysts or customer service jobs, experts are you’re typically taking huge amounts of
training data and passing them through
neural network algorithms to look for
patterns that a simpler supervised
machine learning algorithm would
never be able to pick up on.”
The problem with deep learning,
however, is that it requires vast amounts
of training data to run through the neu-
ral network algorithms.

One of the main fears


that many people have
about the increasing
role AI will play in
society is that it will
replace jobs that
humans now hold.

For product info #20 securitymgmt.hotims.com

0917 ks-Cybersecurity C.indd 34 08/17/2017 11:49:19 AM


35
SEP 2017 | SECURITY MANAGEMENT

“Google, as you can imagine, has


massive amounts of training data for BOOK
that, so it can feed that training data at REVIEW
huge scale into these neural networks
to power those deep learning algo-
rithms,” Kahn says. “In cybersecurity,
THE WEAKEST LINK
we don’t quite have that benefit. It’s
BY JEREMY SWINFEN GREEN AND PAUL DOREY. Bloomsbury Business;
why deep learning algorithms have Bloomsbury.com; 240 pages; eBook; $21.99.
been a little bit slower in terms of
adoption. There are not pools of labeled CYBERSECURITY is a complex highlights just how easily they can put
cybersecurity data that can be used to issue that spans multiple disciplines an entire organization at risk.
power deep learning algorithms.” and occupational fields, and it’s The authors explain the import-
a topic that can make executives ance of having specific policies,
For cybersecurity, ideally, there would nervous. The Weakest Link: Why Your procedures, and protocols in place
be a huge inventory of labeled cyber- Employees Might Be Your Biggest to prevent internal vulnerabilities
security incidents that could be used Cyber Risk offers an in-depth look from becoming active threats. They
to create deep learning algorithms; the at the cyber vulnerabilities that exist recommend implementing a strong
within organizations. It offers an security culture throughout the
inventory would have information about international perspective on how to BOOK
organization by engaging leaders
how a site was compromised and what implement simple strategies through
situational awareness, observation,
REVIEW
and creating a plan that involves all
of the internal stakeholders. The plan
exploit was used.
“In today’s environment, there is no and other methods. must be purposeful, collaborative,
The authors are seasoned defined, communicated, accountable,
massive clearinghouse of that informa- practitioners with excellent enforced, and—perhaps most
tion,” Kahn adds. “Companies generally credentials. Their real-world importantly—realistic. Other practical
don’t want to share that information experience translates into viable text strategies from the textbook are
with each other; it’s sensitive.” as they articulate their viewpoints based on strict historical and proven
through practical standards, charts, principles.
This is holding back the cybersecurity graphs, diagrams, behavioral The only shortfall of this book
industry in terms of taking the next step explanations, scenario-based is that some of the examples and
with AI, and Kahn says he doesn’t see examples, and other materials. models provided are brief and not
companies’ unwillingness to share data Research indicates that employees fully explained. Additional real-
create one of a company’s biggest world examples and case studies
changing any time soon. vulnerabilities as they connect to the would help the reader see how the
“It’s going to be very hard—less from Internet through internal resources. principles can be applied. That said,
the technical reasons and more from Today nearly all employees complete this interdisciplinary book is a great
the policy and legal reasons,” he says. at least some of their duties on addition to security management
a computer, tablet, machine, or literature and applicable to other
“I don’t know if we’ll ever get to a point other peripheral that is connected organizations in the international
where companies are willing to share that to a computer network. This book community.
level of detail with each other to power
those types of deep learning algorithms.” REVIEWER: Thomas Rzemyk, Ed.D., is a professor of criminal justice at Columbia
Southern University and director of technology and cybersecurity instructor at
However, big companies who have Mount Michael Benedictine School. He is a criminology discipline reviewer in the
vast amounts of data may be able to Fulbright Scholar Program, and he is a member of ASIS.
take advantage of deep learning in the
future, Kahn says.
AI today. Numerous cybersecurity These patterns can help companies identified patterns—is how AI will
products are available today that market identify who is trying to infiltrate their change the future of cybersecurity and
themselves as an AI product, or one that systems because the behavior of hobby- help bolster the workforce, Kahn says.
uses machine learning. These products ist hackers, organized hacking groups, “Optimally, we start seeing a very
tend to be used to understand patterns and nation-states differs. close blending of man and machine in
of threat actors and then look for abnor- “Once you start profiling, you start that we’re reliant on relatively simple
mal behavior within the end users’ looking at how to prevent certain algorithms to detect anomalies. Those
system, Rao says. types of attacks from happening,” algorithms are advancing and getting
For instance, a product could be used according to Rao. “Based on the types more sophisticated using AI-type tech-
to look at denial of service attacks, “how of profiling, you have various types nology to reduce false positives and
that happens, the frequency at which of intervention.” increase true positives,” he explains.
they are coming, and then developing This blending of machines—using “So, analysts are spending more time
patterns that you can start observing AI to identify patterns and humans on the things that matter, as opposed
over a period of time,” he explains. to make decisions based on those to chasing dead ends.”

0917 ks-Cybersecurity C.indd 35 08/15/2017 5:59:58 PM


36
COVER STORY | BY BRIAN J. ALLEN, CPP

Enterprise security risk management will raise


the profile of security from a task-bound trade to one
of the key business drivers in the C-suite.

0917 Allen C.indd 36 08/16/2017 10:21:07 AM


37
SEP 2017 | SECURITY MANAGEMENT

UNTIL RECENTLY,
security has been considered a trade, with
practitioners fighting for proper standing
in the institutions they protect. But the
industry is now at a crossroads.
Before us lie two paths. One is a continu-
ation of the status quo. We may continue to
glide down this road, but it is not a self-de-
termined path. It has been chosen for us
because we have not clearly defined secu-
rity’s role. Given this failure to self-define,
security has traditionally been defined
by others by the task it performs, such as
information security, investigations, phys-
ical security, or executive protection. This
type of definition diminishes the value of
the security function; our role is more than
just our allocated tasks.
The second road is one of self-determina-
tion and opportunity. It offers a chance for
the industry to advance from a trade to a
fully respected profession. On this road, we
can take control of the dialogue, shape the
conversation surrounding our field, and
make our own way forward. As an indus-
try—with ASIS taking the lead—we can
keep advancing until security is considered
a profession.
How can we advance on this second
road? First we need a clear definition of
the role of security in the private sector. We
also need a core base of knowledge that
supports our understanding of that role,
which can be taught—not only to college
students, but to transitioning personnel
coming into our industry and to our hiring
managers. There also needs to be an estab-
lished expectation that practitioners will
ILLUSTRATIONS BY STEVE MCCRACKEN

share this knowledge of security’s role and


the core competencies associated with it.
ASIS International has already started
defining this role through the concept
of enterprise security risk management
(ESRM). With its embrace of ESRM, ASIS
has positioned our industry to travel down
the road of opportunity and self-determi-
nation, with ESRM as the guiding principle
to help chart our course.

0917 Allen C.indd 37 08/16/2017 10:21:52 AM


1010110100101110101010010100101 10101101001011101010100101
0101 1010110100101110101010010100101
01010 10101101001011101010100101001011 10101
101011010010111010101001010
38
10101101001011101010100101001010010 10101101001011101010100101 1010110100101110101010010100101 10100 1010110100101110101010010100101
01010 101011010010111010101001010
101011
101011010
010010
010111 COVER
111010
010101101001STORY
001010
0010 01011| BY
010010 BRIAN
1010
1010110
110100J.101110
100101 ALLEN,
110101 CPP
101010
010010
010100
100101
101 10
10101
101101
101001
001011
011101
101010
010100
100 10
10101
01011
101101
101001
001011
011101
101010
0101010
010100
100101
101001
00101
01 101
101001
00101
01 101
101011
011010
010010
010111
111101
101011
01101
01
1010110100101110101010010100101
101 0101 10101101001011101010100 1010110100101110101010010100101 101001011 101 11010110100101111010110100101110101010010100101
1 010
0 0101010
0101010010100101
00
010
010 00101 1010110100101110101010010100101 101011 1010110100101110101010010100101 1010110100101110101010010100101 1010110100101110101010010
01101 01010
1010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101
01 0101010010100101 101010010100101 101011 0101 10101101001011101010100 0
0010100101 0101010010100101
Not everyone01001011101010100
1010110100101110101010010100101
in the industry100
for this journey, however.
1010110100101110101010010100101
01101001 When pursued, these10100101
is ready
10101101001011101010100
00
For some
questions
1010110100101110101010010100101
001011101
valuable
1010110
information, and they can be
elicit
Business 100101111010
10100101 10
1010110100101110101010010100101 10101101001011101010100
who may have heard 0110
of the concept but 1010110100101110101010010100101
asked of every 0101001 task.
security-related executives in all 10100101 10
0101010010100101still1010110100101110101010010100101
find it vague,010 10101101001011101010100101
fields understand 101011010010
questions remain. For instance, investigations, forensics, 101011010010
0010100101 0101010010100101 00
00101
Primarily: What 1010110100101110
exactly is ESRM and and crisis management are all different
1010110100101110101010010100101
10101101001 1010110100101110101010010100101
why is it 1101
needed? security functions,
10101101001011101010100101 but when they are
1010110100101110101010010100101 risk; they make risk 101011010010
discussed within the ESRM framework
they are simply different types of inci- decisions every day.
dent response.
What is ESRM? Similarly, every function of physi-
At its core, ESRM is the practice of man- cal and information security, such as
aging a security program through the password and access management,
use of risk principles. It’s a philosophy encryption, and CCTV, is simply con- defining the role through risk princi-
of management that can be applied to sidered a mitigation effort within the ples, it better positions the security
any area of security and any task that is ESRM paradigm. These may seem to be function within the business world at
performed by security, such as physical, merely semantic differences, but they large. Business executives in all fields
cyber, information, and investigations. are important nuances. When we define understand risk; they make risk deci-
The practice of ESRM is guided by these functions within the ESRM para- sions every day. Using ESRM principles
long-standing internationally estab- digm, we also start to define the role we to guide our practice solidifies our
lished risk management principles. play in the overall enterprise. place within the language of business
These principles consist of fundamental ESRM elevates the level at which the while also defining the role we play
concepts: What’s the asset? What’s role of security management is defined. within the business.
the risk? How should you mitigate that Instead of defining this role at task For example, consider a company
risk? How should you respond if a risk level, it defines the role at the higher, with a warehouse and a server. In
becomes realized? What is your process overarching level of risk management. the warehouse, security is protecting
for recovering from an event if a breach By raising the level of security’s role, widgets and in the server, security is
happens? Collectively, these principles ESRM brings it closer to the C-suite, protecting data. Under the common risk
form a thoughtful paradigm that guides where executives are considering much principles, we ask: What are the risks to
the risk management thought process. more than individual tasks. And by the widgets and data? How would we
protect against those risks? Who owns
the widgets, and who owns the data?
We may decide to put access con-
trol and alarms on the warehouse or a
password and encryption on the data.
In both instances, we’re protecting
against intrusion. The goal is the same—
protection. For each task, the skill set is
different, just like skill sets differ in any
other aspect of security: investigations,
disaster response, information technol-
ogy. But the risk paradigm is the same
for each.

Why We Need It
We need ESRM to move beyond the
tasks that security managers and their
teams are assigned. For instance, if you
manage physical security, your team
is the physical security team. If you do
investigations, you are an investigator. If
you manage information security, your
team is the information security team.

0917 Allen C.indd 38 08/15/2017 6:01:51 PM


MITIGATE
RISK

MAXIMIZE
R.E.M.

Security silos and disparate systems can keep you up at night. We’re happy to help you rest easier with proven,
enterprise-class security infrastructure. Learn more at wmssi.wm.com.
You call. We answer in person. Every time. 855-WM-SECURE / 855 967 3287

wmssi.wm.com

BUSINESS SOLUTIONS | MONITORING | REMOTE SYSTEMS | ENTERPRISE SOFTWARE

CERTIFICATIONS
© 2017 WM Intellectual Property Holdings, LLC LICENSE # TXDPS C13227

For product info #21 securitymgmt.hotims.com


1010110100101110101010010100101 10101101001011101010100101
0101 1010110100101110101010010100101
01010 10101101001011101010100101001011 10101 101011010010111010101001010
40
1010110100101110101010010100101
0010 10101101001011101010100101 1010110100101110101010010100101 10100 1010110100101110101010010100101
01010 101011010010111010101001010
101011
101011010
010010
010111 COVER
111010
010101 STORY
101001
001010
0010 01011| BY
010010 BRIAN
1010
1010110
110100J.101110
100101 ALLEN,
110101 CPP
101010
010010
010100
100101
101 10
10101
101101
101001
001011
011101
101010
010100
100 10
10101
01011
101101
101001
001011
011101
101010
0101010
010100
100101
101001
00101
01 101
101001
00101
01 101
101011
011010
010010
010111
111101
101011
01101
01
1010110100101110101010010100101
101 0101 10101101001011101010100 1010110100101110101010010100101 101001011 101 11010110100101111010110100101110101010010100101
1 010
0 0101010
0101010010100101
00
010
010 00101 1010110100101110101010010100101 101011 1010110100101110101010010100101 1010110100101110101010010100101 101011010010111010101001001101 01010
1010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101
01 0101010010100101 101010010100101 101011 0101 10101101001011101010100 0
0010100101 0101010010100101 01001011101010100
But these tasks 100the
merely define 1010110100101110101010010100101
01101001
First, it preempts others10100101
from defi1010110100101111010110100101110101010010100101
ning expressed in some 011101
of our own conver- 010101001010010
10101101001011101010100 1010110100101110101010010100101
scope of responsibility. 101roles are
Our 10100101
our role10101101
1010110100101111010110100101110101010010100101
for us in a way that fails to 101 0101010010100101
sations about 0 needing a proverbial00101seat
1010110100101110
1010110100101110101010010100101 10100101
broader than our 001 1010110100101111010110100101110101010010100101
assigned tasks. Our adequately capture 01010010 0101010010100101
and communicate 0101 01001011101010100 101011010010111010101001010
at the table. In one sense, this exclusion
1010110100101110101010010100101
responsibilities 1010110100101110101010010100101
010
should be viewed not our10101101001011101010100
value. 01 may seem justifi
1010110100101110101010010100101
01011110 ed: if 101011010010111101011010010111010
10100101 we can’t define
1010110100101110101010010100101
as standalone01tasks,
10101101001011101010100
but as related 1010110100101110101010010100101
Second, it helps better position our
10100101 10101101001 role beyond describing our tasks,
1010110100101110101010010100101 10101101001011101010
0110100101110101010010100101
010 0101010010100101
components 00101
within our roles as 1010110100101110101010010100101
secu- ourselves in the C-suite.101011
C-level execu- why would upper
1010110100101110101010010100101 management charge
1010110100101110101010010100101 10101
rity risk managers. tives often struggle with what security us with higher-level leadership and
Having a clear, consistent, self-de- managers do, and where to align us. strategy?
fined role provides significant benefits. This is often reflected in the frustrations Third, it provides guidance to our
industry. Greater use of ESRM will pro-
vide an always-maturing common base
of knowledge, with consistent terms of
use and clear expectations for success.
This benefits not only practitioners in
our industry, but also all other exec-
utives who may need to interact with
the security practice or work with the
security manager. This can be especially
valuable during times of change, such

ASIS has started


to lead the effort of
defining security’s
role through ESRM.

as when a security manager switches


companies or industries, or when new
executives come into the security man-
ager’s firm.
In those situations, security managers
often feel that they are continually edu-
cating others on what they do. But this
endless starting over process wouldn’t
be necessary if there were a common
OUTSMART CRIME understanding of what security’s role is,
beyond the scope of its responsibilities.

Building a successful risk assessment


starts with a solid foundation. Why Now?
This industry at large has talked about
ESRM for at least the last 10 years. But
Need to assess risk at one or all of your locations? Visit our
as relevant as the topic was a few years
booth #3422 to discover why CAP Index information is the missing ago, the present moment is the right
piece you need to assess and mitigate your organization’s risk. moment for ESRM because security risks
now have the potential to become more
800.227.7475 | capindex.com disruptive to business than in the past.
LEGO® is a trademark of the LEGO Group of companies, which does not sponsor, authorize, or endorse CAP Index, Inc. There are several reasons for this.
The use of technology in the current
See us at ASIS Booth 3433 For product info #22 securitymgmt.hotims.com

0917 Allen C.indd 40 08/15/2017 6:02:14 PM


ACHIEVE THE HEIGHTS OF SUCCESS

Partner.Win.
It’s an exciting time to partner with Hikvision. The world’s leading video surveillance
manufacturer, we work hard alongside our team members and our partners so that
we all win together.

#PartnerWin

hikvision.com
For product info #23 securitymgmt.hotims.com
1010110100101110101010010100101 10101101001011101010100101
0101 1010110100101110101010010100101
01010 10101101001011101010100101001011 10101
101011010010111010101001010
42
1010110100101110101010010100101
0010 10101101001011101010100101 1010110100101110101010010100101
10100 1010110100101110101010010100101
01010 101011010010111010101001010
COVER STORY | BY
1010110100101110101010010100101
0010 BRIAN J. ALLEN, CPP
1010110100101110101010010100101 10101101001011101010100 1010110100101110101010010100101
01011 0101010 10100101 10101101001011110101101
1010110100101110101010010100101
101 0101 10101101001011101010100 1010110100101110101010010100101 101001011 101 11010110100101111010110100101110101010010100101
1 0100 0101010
0101010010100101
00
010
010 00101 1010110100101110101010010100101 101011 1010110100101110101010010100101 1010110100101110101010010100101 1010110100101110101010010
01101 01010
1010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101
01 0101010010100101 101010010100101 101011 0101 10101101001011101010100 0
0010100101 0101010010100101 01001011101010100
economy has allowed 100 to
businesses 1010110100101110101010010100101
01101001
cen- landscape to the Internet10100101 1010110100101111010110100101110101010010100101
of Things (IoT) engaged, which 011101 010101001010010
means that senior man-
10101101001011101010100 1010110100101110101010010100101
tralize operations 1 1
10
and practices. While 10100101
have the1010110
1010110100101111010110100101110101010010100101
01
potential to cause more harm agement101
10 0101010010100101
0 also become engaged,
must 00101 1010110100101110
1010110100101110101010010100101 10100101
this consolidation 001 1010110100101111010110100101110101010010100101
may have increased to businesses 01010010 0101010010100101
compared with the nega- 0101 01001011101010100
and someone will have to101011010010111010101001010
step in and fill
1010110100101110101010010100101
efficiency, it has1010110100101110101010010100101
010
also made those cen- tive10101101001011101010100 01 that gap. That10100101
effects they suffered in1010110100101110101010010100101
the past01011
due110 could be a chief risk offi-
101011010010111101011010010111010
1010110100101110101010010100101
01 10101101001011101010100
tralized operations to loss of information.
more susceptible to1010110100101110101010010100101 cer,
10100101 10101101001 a board-level committee, an internal
1010110100101110101010010100101 10101101001011101010
0110100101110101010010100101
010When
disruption. 0101010010100101 00101more
operations were Many executives understand
1010110100101110101010010100101 the audit unit…or security.
101011 1010110100101110101010010100101 Hopefully, it will
1010110100101110101010010100101 10101
geographically dispersed, vulnerabil- significance of these risks, and they are be the latter, but to step up and meet
ities were more spread out. Now, the looking for answers beyond the typical this challenge, security professionals
concentrated risks may have a more siloed approach to security, in which must be able to consistently define their
serious negative impact to the business. physical security and information secu- role beyond simply defining their tasks.
We are also moving beyond tradi- rity are separately pursued. They realize
tional information security and the that the rising cyber risks, in tandem
protection of digitalized data. Now, with the increasing centralization of
cybersecurity risks pose threats of business operations, have caused a gap Making the Transition
greater business disruption. For in security that needs to be closed. What we need is a roadmap toward
example, the threats within the cyber Boards are also becoming more professionalization.

1010110100101110101010010100101 10101101001011101010100101 1010110100101110101010010100101 1010110100101110101010010100101 10101101001011101010100101


1010110100101110101010010100101 10101101001011101010100101
010
00
010 1010110100101110101010010100101 1010110100101110101010010100101 10101101001011101010100101
a greater level of success
1010110100101110101010010100101 monitoring, incident
1010110100101110101010010100101 10101101001
101101100
01
Five Insights on ESRM because security leaders response, and post–inci-
1010110100101110101010010100101 1010110100101110101010010100101 010010 10101101001
By Rachelle Loyear and Brian Allen, CPP are delivering only what the 10100101
1010110100101110101010010100101
1010 dent10101101001011110101101001011101010
review, and apply
10010
business
101011
101 011010
010010
0100 needs,
010111
111010 and,
010101
101001
001010more
010010
01011 1010 the
1010110 lessons
110100
010010
100101
101110 learned
110101
101010
010010 to 101 10
010100
100101 10101
101101
101001
001

10100101
01001
T
HERE ARE FIVE overall concepts that provide

management (ESRM). These concepts describe what


important, what the C-suite
1010110100101110101010010100101
11010
understands that
guidance about the nature of enterprise security risk 10101101001011101010100 010it needs.
00 10
01 101 advance the program.
10100101 10101101001011110101101001011101010
1010110100101110101010010100101 10100101
ESRM Aligns
1010110100101111010110100101110101010010100101 with 01010
the
01 1010110100
0101010010100101 10101101001
01011
ESRM is, what it can do for security managers, how ESRM Is a Process
1010110100101110101010010100101 Business 01010
1010110100101110101010010100101 10101101001
001
0010100101 security can gain C-suite approval for it, and how to ESRM is not merely
0101010010100101 00101 an aca- Aligning 0the security 101011
1010110100101110101010010100101
01010 pro- 1010110100101
demic philosophy. A 1010110100101110101010010100101
implement a vibrant ESRM program for the enterprise. 10101101001011101010100 gram with business require-
general 010111 10100101 1010110100
10100101 approach for setting up11101 and ments is the0101010010100101
1010110100101111010110100101110101010010100101
01011010 most critical 101011010010
ESRM Is a Philosophy
1010110100101110101010010100101 what the business
1010110100101110101010010100101
010 deems running a security program
10101101001011101010100 1010110100101110101010010100101
0100100111101 component of the ESRM
10100101 1010110100101111010110100101110
ESRM is not a101
1010110100101110101010010100101 standard, nor critical for risk mitigation,
1010110100101110101010010100101 can be derived
1010110100101110101010010100101 from it. philosophy.
10101101001011101010100 This means that
1010110100101110101010010100101 1010010
101011
101011010
010010
010111 is
111010it
010101a rigid
101001
001010set
010010
010 of rules
01011 11010
010110 to
110100
100101
101110 and
110101
101010 what
010010
010100level
100101 of
101 10 risk
10101
101101 the
101001
001011
011101 Under
101010
010100
100101that
101001
00101approach,
01 101
101011
011010
010010ESRM
010111
111010 the
010101
10100 security
00 101
101011
011010 program
010010
010111
111010 must
010101
101001
001010
010010
01011 1010
1010010
010
follow.
1010110100101110101010010100101
100 philoso- business is willing
ESRM is a1010110100101110101010010100101 to accept in action is a cyclical
1010110100101110101010010100101 pro- receive
10101101001011101010100 governance and
1010110100101110101010010100101 1010010
phy
100of managing security.
10100101 1010110100101111010110100101110101010010100101 in different areas. This 01111010110100101110101010010100101
0101010010100101 gram, and the cycle of risk guidance 00101
0101010010100101 from 101011010010111010101001010
the business.
It is based on standard risk ability also requires that the management is ongoing: We recommend the forma-
management practices, the business fully understand tion of a security council to
same ones that guide most why the security risk mitiga- 1. Identify and prioritize ensure this alignment.
of the other business deci- tion tactics have been put in the assets of an organi- There are several ways
sions made by the enter- place, and what the impact zation that need to be to implement a council. It
prise. It requires partnership of not having those mitiga- protected. could be a loose, informal
with the business leaders in tions might be. 2. Identify and prioritize group that provides input
the organization. The emphasis here is on the security threats that as needed, or it could be a
This philosophy gives the business. ESRM philosophy the enterprise and its board-level initiative that
security leader the ability recognizes that security risk assets face—both exist- has formal roles, meetings,
to manage security risks. does not belong to security. ing and emerging—and charters, and documented
This ability is not based on It is a business risk, like any the risks associated with responsibilities for ensuring
the latest incident or scare other financial, operational, those threats. security compliance. The
in the news, nor is it based or regulatory risk, and final 3. Take the necessary, council can be a venue for
simply on the manager’s decisions on managing appropriate, and realis- discussing security topics
own ideas of what is most that risk must belong to tic steps to protect and and risk management strat-
important to protect. the business leaders. That mitigate the most serious egies, and it can host reso-
Instead, it is based on a shift in understanding sets security threats and risks. lution attempts for conflicts
shared understanding of a security program up for 4. Conduct incident in the process.

0917 Allen C.indd 42 08/15/2017 6:03:37 PM


010100101 10101101001011101010100
1010 1010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101 0101010010100101 00101 1010110
010100101 10101101001011101010100
1011 1010110100101110101010010100101 10100101 10101101001 1010110100101110101010010100101 10101101001011101010100101 43 1010110
10110100101110101010010100101
010 0101010010100101 00101 1010110100101110101010010100101 101011 10111 1010110 SEP 2017 | SECURITY MANAGEMENT
11010110100101110101010010100101 101011010010111010101001010
01010010100101 01001011101010100 00 11010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101
1001 110101110 0100 1101010 0101010010100101 011110101101
110 0
010010100101 10101101001011101010100 1010110100101110101010010100101
1010 10100101
01 1010110
1010110100101111010110100101110101010010100101
10 101110 0010100 0101010010100101 010010111
010 1
010010100101
01010 10101101001011101010100101001010101 1010110100101110101010010100101
0100101
1010 10101101001011101010100 1010110100101110101010010100101
0010 0101001 10100101
001 101011011
0100101 1010110100101110101010010100101
10100
ASIS is leading the effort of10101101001011101010100101
0010
defining 011 0101010 01 1010110100101110101010010100101
10 out this roadmap. Other
step in building in1010110100101110101010010100101
10010is critical.
developing consistency 10101101001011101010
10 1
01110101010010100101
01 1010
security’s 101011
10 1010110100101110101010010100101
role through ESRM. At ASIS 01 11010110100101110101010010100101
steps 0
will be needed; it is essential that 1010110100101110101010010100101
There are some core 10101101001011101010100
0101110
foundational
010100101 10100101 1010110100101111010110100101110101010010100101
2017 in Dallas, 010111
you will hear more 0100 0101010010100101
volunteers, both new to the elements that need
seasoned and 1010110100101110101010010100101 to be in place for 00101 1010110100101
10101101001011101010100101 0100 1
01110101010010100101 0101010010100101
conversation around ESRM00101
0101
as1010110100101110
1well1010
as field, embrace this shift towards profes-
1010110100101110101010010100101 this ESRM transition
10101101001011101010100101 to be successful.
1010110100101110101010010100101
01 11010110100
01010100101 1010110100101110101010010100101
more maturity and consistency1010110100101110101010010100101
10 that
in First,10101101001011101010100
sionalization for it 1010110100101110101010010100101
to gain traction. there needs to be a consistent base
1010110100101110101010010100
0
1010110100101110101010010100101
conversation. As the10101101001011101010100
leading security This transition will not occur
1010110100101110101010010100101 of knowledge for our industry to work 0101010010100101
with 1010110100101111010110100101110101010010100101
10100101
management professional organiza- the flip of a switch. It will take dedica- from: a common lexicon and under-
tion, ASIS is best positioned to guide tion to challenge our own notions of standing of security’s role that is under-
us through the roadmap from a trade to how we perceive what we do, the lan- stood by practitioners and the business
a profession. guage we use to communicate to our representatives we work with.
The ASIS Board of Directors has made business partners, and our approach We also need both a top-down and
ESRM an essential component of its core toward executing our functions. It will bottom-up approach. New security
mission. It has started incorporating take time and comprehensive reflec- practitioners entering the industry from
ESRM principles into its strategic road- tion, and the ability to recognize when business or academia, or transitioning
map, which means that ASIS is starting to we don’t get it right. We may not be from law enforcement or the military,
operationalize this philosophy—a critical totally wrong either, but thoroughness need a comprehensive understanding

0010100101 10101101001011101010100 1010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101 0101010010100101 00101 10101


0010100101 10101101001011101010100 1010110100101110101010010100101 10100101 10101101001 1010110100101110101010010100101 10101101001011101010100101 101011
01100
010 ESRM 1010110100101110101010010100101
01001011101010100 Covers All Security they are not performed
10100101 that allows your security
1010110100101111010110100101110101010010100101 consistently, ESRM
0101010010100101 can
00101 1010110100101110101010 0
There is
0100101110101010010100101
1010 no aspect of in a vacuum by security program
10101101001011101010100 1010110100101110101010010100101 to evolve
10100101 over completely change the
1010110100101111010110100101110101010010100101 0101010010100
security
0101010010100101 that cannot be01111010110100101110101010010100101
0101 0101010010100101 time into a pure
and for security, but in full0101010010100101 00101 risk view of the security101011
1010110100101110101010010100101 func-101011010010111010 0
01001
01 001011
011101 managed
101010
010100
100 10 in
10101
0101 alignment
101101
101001
001011
011101
101010
01010010
010010 partnership
0100101
0100101 with the management approach.
10100101 10101101001011110 tion
010111010
010 in
o0010 any
010111
111010organization.
010101
101001
001010
010010
01011 0
0101
101010
010010
010100
100101
1011
with the
0101010010100101 ESRM philosophy.
0101010010100101
010 10
010
0101 business101011
hy. 100110100101 leaders For the security
e11001011
1010110100101110101010010
101011010010111010
010 0001011
010111 The
010 old101011010010111010101
Th00101 view of security as0010100101 1010 0
Many security profession-
01001011110110110100101110101010010100
0010 0 “the
101“tth01010010100101 of
0
01 department no” will1010100 1010110
01001011101 110
01
010010111010 0als already practice much
1010010100101 h 101shift
10 shi when business leaders
011101001011101010100101
00101110 101011101001011101010
1110 0
of
01001011101010100
001011 the ESRM philosophy Identify understand
101un that security is1 10100
01110100101110101010010100101
0100101110101010010
0100 0100101 00101 1010111
00
0010111010100without
010
10010100101
001 thinking of it thatt & Prioritize 101a partner
011 in
p1010010111010ensuring that011 1101011010010111
1101
1010101001010010
010 0 1
way. For example, perform-
01001011110110110100101110101010010100
101110 0m- Assets the assets and
101 0101010010100101 functions
01001011101010100 1010110
010
0100 01
ing a physical
0100101110101010010100101 security risksk 101of the enterprise most
01101001011101010100101 10
0101101001011101010100
11010
101001011101010
0101 0
assessment on a facility1 0010
101110101010010100101 0101010010100101 00101 101critical
cri to the
0110100101110 business are101010010100101
10101101001011101 0
010 10
0
0100101 101011is equivalent to the ESRM
101001 M protected
p
011o
1010 in accordance01 101011010010111010
010010111010101001010010 0
Root
010010
010 01011 1010 steps
1010110
110100 of111010
100101 identifying
101111010110
110100
100101and
101110
11010
101 Incident Cause 0with
010wit
001
010100exactly
100101
101 01 how
01010
010100 much
100101
101001 risk
00101
01 00
0101
0101 101
101011
011010
010010
010
0
prioritizing assets and
0100101 1010111010010111101011010010111010 risk.
s10
k.10 Response Analysis the business
the0101
th
010
010 is willing 010
0101010010100101 to001011101010100 1010
0
0010100101 10 0And
1011 setting up a crisis man- an- 101tolerate.
tol
011010010
01110101010010100101 101011010010111010
0
agement plan can be con- n
n-
sidered an aspect of ESRM RM
Improve RA
RACHELLE LOYEAR IS
risk mitigation, as well as & Advance ESRM
ES PROGRAM MANAGER
incident response. F
FOR G4S AND CHAIR
The critical difference Mitigate Identify OF THE ASIS CRISIS
between programs MANAGEMENT AND
Prioritized & Prioritize
that do these activities Ongoing BUSINESS CONTINUITY
as part of a traditional
Risks Risks
Risk C
COUNCIL. BRIAN J.
security program versuss Assessment AL
ALLEN, ESQ., CPP, IS A
an ESRM program is the e MEMBER OF THE ASIS ESRM
ME
consistency of approach h COMMISSION. ALLEN AND
CO
in ESRM. In ESRM, these driving
d i i the
h ddeci-i manager, the
h first LOYEAR ARE COAUTHORS
activities are not per- sion making process for all step to fully understanding OF THE MANAGER’S GUIDE
formed on an ad hoc basis risk mitigation. the ESRM philosophy is TO ENTERPRISE SECURITY
but consistently across all to communicate it to the RISK MANAGEMENT AND
areas of security risk. They ESRM Is Possible executives and business THE FORTHCOMING BOOK
are not applied to one area Implementing ESRM leaders in the enterprise. ENTERPRISE SECURITY RISK
of the organization and cannot be done overnight. When implemented MANAGEMENT: CONCEPTS
not to another. And, vitally, It’s an iterative process thoughtfully and practiced AND APPLICATIONS.

0917 Allen C.indd 43 08/15/2017 6:03:55 PM


1010110100101110101010010100101 10101101001011101010100101
0101 1010110100101110101010010100101
01010 10101101001011101010100101001011 10101
101011010010111010101001010
44
1010110100101110101010010100101
0010 10101101001011101010100101 1010110100101110101010010100101 10100 1010110100101110101010010100101
01010 101011010010111010101001010
101011
101011010
010010
010111 COVER
111010
010101 STORY
101001
001010
0010 01011| BY
010010 BRIAN
1010
1010110
110100 J.101110
100101 ALLEN,
110101 CPP
101010
010010
010100
100101
101 10
10101
101101
101001
001011
011101
101010
010100
100 10
10101
01011
101101
101001
001011
011101
101010
0101010
010100
100101
101001
00101
01 101
101001
00101
01 101
101011
011010
010010
010111
111101
101011
01101
01
1010110100101110101010010100101
101 0101 10101101001011101010100 1010110100101110101010010100101 101001011 101 11010110100101111010110100101110101010010100101
1 010
0 0101010
0101010010100101
00
010
010 00101 1010110100101110101010010100101 101011 1010110100101110101010010100101 1010110100101110101010010100101 1010110100101110101010010
01101 01010
1010110100101110101010010100101 10100101 1010110100101111010110100101110101010010100101
01 0101010010100101 101010010100101 101011 0101 10101101001011101010100 0
0010100101 0101010010100101 01001011101010100
of risk management principles100and1010110100101110101010010100101
01101001 10100101 1010110100101111010110100101110101010010100101
through publications coordinated with time when you’ve011101
been frustrated in010101001010010
10101101001011101010100
how a risk1010110100101110101010010100101
paradigm drives 101the security 10100101 10101101
1010110100101111010110100101110101010010100101
organizations 101 0101010010100101
that reach the C-suite, such this industry.” 0 00101 1010110100101110
1010110100101110101010010100101 10100101
management thought 001 1010110100101111010110100101110101010010100101
process. There as the Conference 01010010
Board 0101010010100101
of the National 0101 01001011101010100
Every answer comes down 101011010010111010101001010
to one of
1010110100101110101010010100101
should be an expectation that these Association
1010110100101110101010010100101
010 of Corporate Directors.
10101101001011101010100 1010110100101110101010010100101
01011110
01 two issues. One,
10100101
we do101011010010111101011010010111010
not know and
1010110100101110101010010100101
foundational 01 10101101001011101010100
skill sets are in place Clearly academia needs10100101
1010110100101110101010010100101 to play a10101101001 1010110100101110101010010100101
cannot 10101101001011101010
clearly define our role. Two, our
0110100101110101010010100101
010 0101010010100101
when someone enters the security role as well. College students
00101 1010110100101110101010010100101 inter-
101011 1010110100101110101010010100101
business partners1010110100101110101010010100101
cannot clearly define 10101
field. Working from a common base ested in entering this dynamic industry our role. Both of these frustrations are
of knowledge, these ESRM concepts will come in more prepared to assist manageable, and both are our fault as
should be incorporated into the security security leaders and businesses with a an industry for not establishing clarity.
management curriculum, consistently solid knowledge base of security risk This leads to strained relationships
established in every security certifica- management fundamentals. And once with our business partners in how we
tion, and inherent in job descriptions a rigorous ESRM body of knowledge is are perceived and how likely our expert
and hiring expectations at every level. established, ASIS has the clout, exper- guidance is to be accepted.
We also need to build expectations tise, and standing to provide a certifica- Having a clearly defined security role
regarding what security’s role is, and tion for academic institutions that meet through ESRM helps build a founda-
how it goes beyond its assigned tasks, concepts in their curriculum, which tion for a more satisfying career in the
from the top-down—among executives, would will provide for a more consistent security industry. It would provide
boards, hiring managers, and business understanding of security’s role. us with proper standing in our enter-
partners. A clear and common under- ASIS has established ESRM as a prises, and better positioning for us to
standing of security’s role will make it global strategic priority and has formed have a seat at the table for the right rea-
easier to define success and the skill an ESRM Commission to drive and sons, ones that executives understand
sets that are needed to be successful. implement this strategy. One of the and can support.
Organizations like ASIS will assist in commission’s first steps is developing For the practitioner, a consistent secu-
providing the wherewithal to support a toolkit comprising a primer and a rity program through ESRM provides
these leaders. maturity model. a framework to bring together security
If we truly are security risk manag- mitigation tasks under one proper
ers, then there must be an expectation umbrella: physical, investigations,
of foundational and comprehensive cyber, information, business continuity,
risk skill sets when hiring decisions Benefits brand protection, and more.
are made. There could be educational to ASIS Members The human resources industry
opportunities through ASIS, through There is a question I ask of every can- has professionalized over the last
global partnerships with universities, and didate I interview: “Tell me about a decade or so. We see this through their
standing within business, their seat at
the table, and their upgrades in title
and pay. Now, with the rise in threats
and potential business disrupters, our
industry has an opportunity. Business
leaders and boards are looking for
answers. We have the necessary skill
sets and a dedicated and supportive
Serving the needs of security practitioners in today’s demanding global professional association in ASIS to take
environment, ASIS standards and guidelines: the lead.
We are at a crossroads. It is time to
choose the path of self-determination,
take control of this conversation,
Provide tools and Increase the
and make the transition from trade
Enhance the
processes for effectiveness and professionalism to profession.
implementation productivity of the industry
of security practices BRIAN J. ALLEN, ESQ., CPP, IS THE
and solutions FORMER CHIEF SECURITY OFFICER
ASIS members get one free download of each published standard and FOR TIME WARNER CABLE, A FORMER
guideline. Get involved and learn more at asisonline.org/standards. MEMBER OF THE ASIS BOARD OF
DIRECTORS, AND A CURRENT MEMBER
OF THE ASIS ESRM COMMISSION.

0917 Allen C.indd 44 08/17/2017 1:23:16 PM


For product info #25 securitymgmt.hotims.com
46
PHYSICAL SECURITY | BY MARTIN HERMAN

PREPARING
for
PROTESTS
PROACTIVE ASSESSMENT AND PLANNING BY SECURITY
PROFESSIONALS CAN MAKE THE DIFFERENCE BETWEEN A
PEACEFUL PROTEST AND AN OUT-OF-CONTROL RIOT.

Riots in Ferguson, Baltimore, and Berkeley. Disruptions at airports coast to coast. Pipeline site
blockades and sabotage. Out-of-control town hall meetings and campus speeches.
These stories have been filling headlines and social media company is targeted by protesters or is expected to be in their
feeds at a seemingly constant pace. Less trumpeted, however, path, the security director should focus on traditional security
ILLUSTRATION BY EVA VÁZQUEZ

are the protests that fizzled out or were kept calm thanks to concerns: protecting the company’s people, property, informa-
smart security planning. What makes the difference between tion, and reputation.
a protest that boils over into violence and major disruption In a protest or riot situation, the protective effort takes on
and a protest that is steered, subtly or boldly, toward a peace- special urgency and requires different methods from those
ful outcome? employed during normal operations. Protests and riots are
A security director may not be able to determine in advance unstable, high-tension events that can have outcomes as serious
whether a protest will be peaceful or legal, but it is not his or as loss of life, severe personal injuries, major property damage,
her task to stop people from protesting. Therefore, when a and complete stoppage of legitimate business activities.

0917 Herman C.indd 46 08/15/2017 6:04:55 PM


47
SEP 2017 | SECURITY MANAGEMENT

0917 Herman C.indd 47 08/17/2017 1:26:07 PM


48
PHYSICAL SECURITY | BY MARTIN HERMAN

Some situations call for a high-visibil-


ity security profile designed to discour-
IT’S IN THE DETAILS age protesters from harming the compa-
ny’s employees and property. In other
While it is imperative to write out an overall physical and strategic types of protests, a low-key, low-visibility
security approach, strategic details can help ensure a smooth approach takes the wind out of the pro-
response to a protest. testers’ sails. In all cases, a disciplined,
documented approach leads to the best
outcomes—both on-site and in court.
LEGAL CONCERNS It may be difficult to convince senior
Managers should make sure they understand the management to spend money on plan-
company’s rights as well as legal restrictions. ning and preparation if a protest does
Missteps can lead to legal problems and reputational not seem imminent. However, showing
damage. It is especially important to check local and coverage of recent protests that got out
state ordinances pertaining to photos, video, and of control may clarify the ramifications
audio recording. of being unprepared. Images of burning
buildings, looters, broken windows,
and injured people on stretchers may
provide a reminder of what can happen
ONGOING SURVEILLANCE when inadequate precautions are taken.
The plan should call for continuing the
types of surveillance and countersurveillance ASSESSING CONFLICT
performed in the initial risk assessment. The Security is not law enforcement. The
goal is to be able to anticipate new actions goal is not to arrest protesters but to pre-
and tactics, even during the incident. vent problems. To address an upcoming
protest or riot, it is essential to assess
the threat based on intelligence collec-
COLLABORATION tion. After gaining an understanding
of the threat, the security director can
The plan should assign staff to establish relationships choose a protective approach that best
with law enforcement, fire, medical, and other fits the situation, applying various con-
agencies. It may be useful to engage in joint training cepts designed to calm the event and
with those agencies and to coordinate response prevent harm.
protocols in advance. Intelligence gathering. A large
company with a well-developed security
department may have enough skilled
PROTESTER VIOLENCE personnel to perform its own intelligence
Management must also consider how it wishes gathering, while a smaller security
to respond to protester violence, property department may need outside help
destruction, and threats. In some cases, through a risk assessment firm that spe-
companies opt to focus on collecting evidence cializes in addressing protests and riots.
of illegal behavior instead of acting forcefully Whoever performs the intelligence
to stop it. The idea is that it is easier and better collection should attempt to learn as
to win in the courts instead of on the street. much as possible about the adversary,
including its prior tactics and level of
aggression. Conducting online research,
looking at social media, interviewing
SPECIALIZED HELP law enforcement personnel, and speak-
Many companies look for outside help when a ing with other companies that have
protest or riot is looming. Security needs will be faced the group in the past can increase
high, so extra staff will likely be required. Also, understanding. Viewing videos of past
because such events are rare, the usual proprietary incidents can provide insight into the
or contract security officers are unlikely to have the adversary’s strategies and practices in
necessary skills, knowledge, and experience needed. the hope of countering them.

0917 Herman C.indd 48 08/15/2017 6:05:23 PM


49
SEP 2017 | SECURITY MANAGEMENT

In some cases, invisible counter- are aware of surveillance techniques protesters guessing. That way, they will
surveillance may be appropriate. For and have published guides for detecting not know what types of security mea-
example, before a major international and eluding them. sures to combat. For example, if there
economic summit, the author’s secu- Planning. Intelligence collection is a risk of insider collusion with the
rity firm determined that a famous, should lead to some understanding of protest, the company can send workers
well-organized activist group wanted the adversary, which in turn should home early, without any advance notice,
to embarrass a company that was suggest an overall approach to pro- to reduce opportunities for sabotage.
headquartered in the city. To protect tecting the site. However, finesse is Calm can also be preserved through
that company, the author’s company required. In some cases, a high-visi- disciplined behavior by security staff
put the facility under covert surveil- bility, high-security, high-deterrence during the protest. They should not
lance before the summit. The goal was approach is appropriate. If the pro- engage in arguments with protesters or
to detect odd behavior, such as a car testers are known to be violent or the return any abusive language. Protesters
passing by the site multiple times to site is especially vulnerable, a strong like to goad security officers into inap-
conduct advance work for protesters, approach may be called for. In many propriate responses.
or someone walking past the site and corporate settings, by contrast, a low- Officers should control any urge to
taking pictures or notes, possibly for er-profile, less-provocative approach is confront the protesters and instead
planning a protest. Surveillance was appropriate as a way to set expectations calmly use deflection and redirection,
also designed to covertly determine for peaceful behavior without doing with phrases like, “I hear and under-
the best places for protesters to hang anything to inflame the protesters. stand what you are saying, but...”
banners. The company then took steps Potential conflicts may be quelled Insulting protesters emboldens and
to make those locations unavailable. through unpredictability. The company empowers them, whereas keeping cool
Surveillance and countersurveillance should generally not broadcast its strengthens an officer’s control over the
are not foolproof. Dedicated protesters security plans but should aim to keep situation and increases safety.

For product info #26 securitymgmt.hotims.com

0917 Herman C.indd 49 08/15/2017 6:05:30 PM


50
PHYSICAL SECURITY | BY MARTIN HERMAN

Make the company a less attractive the incident. Issues to address include
target by removing loose items that EMPLOYEE whether the business will continue to
could be used as projectiles from the operate during the incident and whether
property and locking trash receptacles PROTECTION security efforts will be high or low visi-
to decrease locations where protesters DURING PROTESTS bility. Management should also consider
could plant bombs or set fires. Moving how to protect the company from the
company trucks inside the security Companies that are bracing for effects of the protest, including docu-
perimeter prevents vandalism against protests in their vicinity should menting illegal behavior by protesters,
those vehicles, and locking up propane discuss best practices with meeting legal obligations, protecting
and oil tanks on-site keeps protesters employees to keep them safe. the corporate reputation, speaking with
from igniting those items. the media, and designating someone
• Carry a cell phone. to address unexpected issues that arise
TAKING ACTION • Consider carpooling for during the protest or riot.
If the intelligence-based risk assessment moral support and to reduce Put it in writing. Protests and riots
suggests a significant risk, security the number of cars that must can create chaotic conditions, and a
directors should assess the site’s enter the site. variety of support documents are needed
physical security strengths and vulner- • When leaving home for work, to bolster decision making and protect
abilities and develop a well-rounded prepare yourself mentally for against legal ramifications. For example,
security plan—long before a security being stopped or jeered by the security effort may require a list of
response is required. A detailed plan protesters. employees and contractors authorized
is needed regardless of whether the • Try to approach the site to enter the site during the incident;
company itself or an outside security in such a way that you will detailed emergency and contingency
firm will be providing security during enter by making a right turn plans; written rules on access control
the incident. and will not have to block during the incident; a list of on-site haz-
Site assessment. Taking stock of traffic. Watch for directions ardous material and its location; detailed
a site’s strengths and vulnerabilities from security officers. external and internal maps of the facility
makes it possible to identify gaps that • Keep vehicle doors locked for fire and police units; and forms for
may need to be filled before the inci- and windows up. Drive very reporting violence and other crimes that
dent. Site strengths might include a slowly as you approach pro- occur during the incident.
high or isolated position, perimeter bar- testers. Be prepared to stop The plan should specify required
riers, building access control, security quickly if one steps in front security staffing levels, fixed and roving
video cameras and intrusion alarms, of you. security officer posts, task assignments,
fire protection, emergency plans, and • Do not shout taunts or shift schedules, supervision responsi-
a security officer force. Vulnerabilities profanities at protesters, no bilities, command center arrangements,
might include a low position, a lack of matter what they say or do and evidence management procedures.
setback from the street, multiple routes to you. Education. The company needs a
in and out, and a location that is close • If they block you, stay as way to notify employees if an incident is
to a riot’s point of origin. long as it is safe—longer underway or about to begin, as well as
Having completed the assessment, delays are more actionable whether they should report to work and
the company will have a better idea in court. If you have to leave, whom to contact for more information.
of what additional security measures do not go home but proceed It is also essential to establish communi-
are necessary to protect the site during to a place where you can cation channels with local law enforce-
the incident. For example, it might opt safely phone the company’s ment so the company will be informed
to strengthen key controls, establish security team. Tell them what of impending risks. In addition, the
an outer perimeter with a temporary happened and ask for trans- company may choose to contact distrib-
chain link fence, increase protection of portation assistance. utors, customers, and vendors regarding
hazardous material areas, reposition • If your vehicle is damaged whether business will continue during a
security cameras, and trim foliage that while entering the site, report protest or riot.
could provide hiding places or help it to a security officer as soon If the company’s usual security officers
intruders scale fences. as you are safely inside. will be responsible for security during
The security director will likely need • If your vehicle is damaged the incident, they will need training
to work with senior management to while leaving, drive to a safe on how to act during the disturbance.
make important policy decisions that place and report the incident Nonsecurity employees will also need
will shape security operations during to security right away. training on how to conduct themselves

0917 Herman C.indd 50 08/15/2017 6:05:40 PM


What do Andy Frain,
Covenant, DSI, SEI
and Whelan know
that you don’t know?

See us at ASIS Booth 4166 For product info #27 securitymgmt.hotims.com


52
PHYSICAL SECURITY | BY MARTIN HERMAN

and what to do if they show up to work went about the city. Because rioters Sometimes the best approach is
and encounter a demonstration. were all around and the client was a soft to remove protesters’ targets—this
Resources. A large-scale event will target, the author’s company kept a low approach can minimize risk for all con-
require additional equipment, materi- profile, standing only an arm’s length cerned. The author’s firm was asked to
als, and services that address temporary protect a corporate headquarters where
needs. These include visible marking of OFFICERS SHOULD a large-scale labor protest was expected.
property lines and “No Trespassing/No Only 10 to 15 police officers would be
Parking” signs, and additional lighting CONTROL ANY URGE available to help deal with more than
and cameras. To prepare for disaster TO CONFRONT THE 1,000 protesters. To reduce opportuni-
response, procure identification badges PROTESTERS AND INSTEAD ties for trouble, the company sent all
for special service providers during the its headquarters staff home, without
incident, emergency medical supplies, CALMLY USE DEFLECTION warning, four hours before the protest
fire and HAZMAT response equipment, AND REDIRECTION. was expected to start, and removed
and food and sleeping arrangements if trash cans that could be thrown. To
security personnel will be required to reduce protesters’ hope of good photo
stay on-site for long periods. away from reporters, watching the sur- opportunities, the company’s main
The plan should require employees to roundings carefully, and standing ready headquarters sign was covered and
wear identifi
ide cation badges at all times to carry out the evacuation plan. company trucks bearing the firm’s name
and clari
clarify any changes to work access Disruptions at meetings. If pro- were moved out of sight. Photographers
hours and
an locations. It should also spec- testers come to a town hall or annual were posted on the roof to document the
ify how employees should report secu- shareholder meeting, the best approach event. These protection measures kept
rity con
concerns and protester offenses. is to send a positive message that event key assets safe.
hosts expect the meeting to proceed in Airport protests. Sometimes a
THE SPECTRUM an orderly fashion. One approach is to disruptive protest can be prevented or
OF SITUATIONS mount temporary cameras on tripods or dispersed by emphasizing its illegality.
Duri a full-scale riot, a high-level,
During walls around the room. Mounting them In January 2017, protesters opposed
clearly
clear visible deterrent posture to makes them seem less aggressive than to federal immigration policy massed
protect
prote life and property is usually most having a person hold each camera and at numerous U.S. airports, blocking
effeective. If people are moving through point it at attendees. Large video moni- pedestrian and vehicle movement.
a city in large numbers, burning cars tors should be placed around the room, Most airports allowed the protests to
and buildings
bui and looting stores, a clearly showing participants that they continue, but protesters who tried
low-key approach
a to security—such as are on camera, and a single local law to assemble at Denver International
clearly m marked property lines and “No enforcement officer should be visible Airport were turned away by police
Trespassing”
Trespassi signs—will likely fail. on-site. Experience shows that difficult because they did not have a permit
If a company’s
c intelligence effort sug- or disruptive people will not comply as required by airport regulations.
gests that a riot may follow an upcom- the first or second time they are asked Restrictions on speech activity at air-
ing event, such as a controversial court to behave, but if the request is made ports were upheld by the U.S. Supreme
decision or a campus speech, or a recent properly, somewhere around the third Court, which states that an airport
event such as a shooting by police, or fourth time most people will comply. can impose reasonable restrictions on
the company should use high-profile Mass protests at company sites. protest activity.
security measures to set an expectation, Some special techniques for events The goal of security in an era of pro-
namely that rioters should move on such as protests against the Dakota tests is a safe outcome—the avoidance
and not attack the company’s facility. Access Pipeline and the Atlantic Coast of death, injury, destruction of property,
The author’s firm was tasked with Pipeline include using high locations the hindering of legitimate business
protecting industrial facilities during for photography, perhaps capturing activities, and damage to reputation.
the 2015 Baltimore riots following the multiple angles from a roof. Employee
death of Freddie Gray while he was in training on reporting threats and safe MARTIN HERMAN IS PRESIDENT
police
p custody. The firm’s approach was practices for driving to and from the AND CEO OF SPECIAL RESPONSE
to deter attacks—not combat them—by site should be reinforced—especially CORPORATION. HE IS A MEMBER OF
prominently
prom deploying security officers what to do if followed when leaving. ASIS INTERNATIONAL AND A PAST
and cameras.
cameras For legal protection, clearly mark prop- ASIS CHAPTER CHAIRMAN. HE SERVES
A different technique
te was required erty lines and take video of the act of ON THE BOARD OF DIRECTORS FOR
when the author’s firm was tasked with posting “No Trespassing” signs in case THE NATIONAL ASSOCIATION OF
protecting television news crews as they they are torn down. SECURITY COMPANIES.

0917 Herman C.indd 52 08/15/2017 6:05:51 PM


We GUARANTEE
the quality of
eveything we sell.

I’m Dan Mendelson,


President of Unitex Direct.

The Unitex Direct Guarantee maternity alterations. We easily support new uniform
start-ups without delay.
If anything you buy from us does not meet your standard,
we’ll replace it. That’s a promise. Proud of our association with the Security Industry.
We have everything you need from major manufacturers. I’m committed to supporting the security industry, both
We supply all of the uniforms that have become industry through time and resources. For ASIS International,
standards over the years: security shirts, trousers and I serve on the Security Services Council. I’m also
outerwear made in our own factories to keep costs involved in the ASIS NYC and Detroit Chapters. And
low, while maintaining exceptional quality. Our full we contribute to funds for fallen police and security
range of equipment accessories in nylon and leather is officers and their families.
unsurpassed. Diligently searching out and supplying Contact me, Dan Mendelson, at:
your specialty needs is standard. 800-682-1606 x236 or dan@unitexdirect.com.
Once your company has established an account with Visit us at www.unitexdirect.com
us, your uniform department or branch manager can
order at our online portal with supervisory controls in
Visit us at Booth 4166
place. We always ship quickly to meet your ongoing
and start up needs.
Customization at our warehouse and showroom. Quality Uniform & Equipment Solutions
Customization from emblem application to alterations is Guaranteed!
done quickly and accurately. That includes embroidery, 800.682.1606 x236
silk-screening, heat sealing, as well as hemming and www.unitexdirect.com
For product info #28 securitymgmt.hotims.com
54
54
GAM
GA
G
GAMING
AM
MIN
MI NG | B
NG BY
YHHOLLY
HOLL
HO
OL
OLL
O LLY
L
LLLY G
GILB
GI
GILBERT
ILB
BEER
RT S
STOW
ST
STOWELL
TO
TO
OW
WEL
WE
W EL
E LL
L L

House
Rules
Chuck Barry is vice president of security and
surveillance at Tropicana Entertainment in Las Vegas
and a member of the ASIS International Gaming and Wagering
Protection Council. He discusses security trends in gaming
with Security Management. His comments have been edited for clarity.
Q. How are gaming security pro- control solution that is integrated with a actions are compared to what the elec-
fessionals leveraging technology hotel and casino’s surveillance record- tronic data is coming out of that POS–
to protect their assets? ing system, which identifies errors in and hopefully they are going to match.
A. While the protection of gaming procedures and theft. If you see any anomalies in the data,
assets is important, what about the With a point-of-sale (POS) terminal, then you can go back and watch what
nongaming areas of the operation you basically have a cashier device actually happened, which is very help-
such
su as food and beverage outlets, of some type, such as a register. That ful in catching any improper actions,
nightclubs,
n bars, lounges, and transmits data to the server, where the mistakes, or thefts.
retail outlets? Many security
Chuck Barry
professionals believe the • Has 30 years of experience
Q. Some thieves have learned
second most-observed area for in both law enforcement to steal thousands of dollars
surveillance personnel should and corporate security. by hacking and cheating slot
be food and beverage. Data • Worked in corporate secu- machines. How can these inci-
from
fr Moody’s Investors Service rity for Hilton Hotels Cor- dents be avoided?
from September 2016 said that non- poration and Harrah’s En- A. In 2009, virtually all gambling was
tertainment Corporation.
gaming revenue was 55 to 65 percent of outlawed in Russia, so the casinos
the revenue of a gaming property, with there had to sell their slot machines
food and beverage being the largest data is analyzed and stored. Depending to whoever would buy them. A lot of
portion of that. So no matter what on what the food and beverage manage- their machines wound up in organized
city or property patrons visit, of the ment team wants and what their param- crime groups. In 2011 the casinos in
disposable income that people bring to eters are, the POS generates reports. For Europe started noticing certain brands
the gaming industry, it appears that the example, if you’re talking about a bar, of slot machines that were losing large
food and beverage revenue is becoming you have data on who the employee is, amounts of money, but no physical
at least as important to casinos as the the time of day, what drink was ordered, cheating was noticed. That led to
gaming revenue. what drink was served, what food was the theory that maybe the cheaters
To more closely monitor losses and ordered, and what food was served. The had figured out a way to predict slot
possible theft in the food and
p solution takes that data and overlays it machine behavior.
beverage departments, secu-
b with the video of that POS terminal. You It was later discovered that cheaters
rity teams can leverage can go back and see what the employee were uploading footage of slot machines
an effective point-of-sale is actually ringing up, and what their to technical staff in Russia. Someone

0917 Stowell C.indd 54 08/15/2017 6:06:36 PM


55
SEP 2017 | SECURITY MANAGEMENT

limit their winnings You need to look at the scheduling


to less than $1,000 per of your security staff during hours of
incident, but a four-person darkness, and you may want to increase
team working multiple casinos the external patrols during those times.
could earn upwards of a quarter of a If you have winners who have large
million dollars a week. amounts of winnings, you may want to
While some responsibility falls on the encourage them to take a check rather
slot machine manufacturing company, than cash. If they decide to take cash,
the basic protection effort is still on offer them an escort to their mode of
the casino surveillance and security per- transportation. Most of the time it’s
sonnel. It’s up to them to follow up with their own personal vehicle, so offer
surveillance observations and review them a security escort to their vehicle.
that slot machine play to see if there’s If properties don’t already do it, they
anything that does not match up with may want to consider posting a security
the daily slot exception reports, which officer by the cage. A lot of casinos have
highlight unusually large losses. security podiums for public relations
and assistance for guests that are
Q. We’ve seen armed robberies located by the cage and
take place at gaming properties serve as a deterrent. And
over the years, most recently at a finally, you can use plain-
casino in Manila where 36 people clothes officers to be on
died. What is being done to the lookout for any unusual
combat those incidents? activity.
A. Armed robberies in the industry
are a concern; they don’t happen that Q. How has the active shooter
frequently, but they are very troubling trend affected gaming security?
when they do. In June of this year in Are more properties deciding to
Gardena, California, two men followed arm their guards?
a victim who had just won a large sum A. One trend is that some gaming
of money from a casino and rammed regulators are now requiring a copy of
into the back of his vehicle to create an a licensee’s active shooter plan. The
accident as he left the property. When Mississippi Gaming Commission, for
he pulled into a gas station to look at example, recently announced such a
the damage to his car, they robbed him policy. Some casino companies are also
of his cash winnings and shot him four considering arming some of their secu-
times. Fortunately, the victim survived. rity force to be able to quickly react to
would analyze the video, calculate And then you have the shooting in an active shooter situation, if state law
the machine’s spin pattern, somehow Manila. It was an active shooter situation allows it. In many jurisdictions where
interfering with or being able to deter- where 36 people died. The motive for that gaming is a business, the state regula-
mine that slot machine model in their individual? Also robbery. How do we pre- tions do not allow security to be armed.
pseudo-random number generator, vent things like that? It’s very difficult. The approach has some pros and
and send a reply back to the cheater. Most of the robberies occur at night, and cons, and I would not disagree with
This information would set certain most of the casino hotels are so large any of my peers on what their decisions
markers for their play, giving them a they have multiple entrances and exits. might be to protect their company.
better-than-average idea of when the For cage [money-handling area] rob- Most active shooter situations are
machines were going to hit. beries, the training is, give the subjects over in 11 minutes if it’s not a hostage
In the United States, law enforcement the money, don’t cause any problems, situation, and in many cases first
investigations led to the arrest of one and hit the holdup alarm when the responders from law enforcement can’t
Russian national in California in a casino robber leaves your window. And you get there that quickly. Sometimes they
in July 2014 who was engaging in this want him to get away—you want him do, but if you had individuals on site,
sort of cheating. The FBI later indicted all to get out of the property, especially if obviously their response would be
four individuals involved in the ring. he is armed. We don’t want our security much quicker.
To give you an idea of the potential personnel to try to stop them. We notify Now your armed response team
losses, the Russian cheaters tried to law enforcement and let them handle it. could contain and neutralize an

0917 Stowell C.indd 55 08/15/2017 6:07:12 PM


56
GAMING | BY HOLLY GILBERT STOWELL

active shooter, but they also have to


be cognizant of what is lawful for a
citizen’s reaction to such a violent
situation. State laws pretty much
Managing Critical Incidents dictate when deadly force can be used
and Large-Scale Event Security against an armed suspect. So if you’re
going to arm these personnel, you have
2017
2
20
01 Security Book of the Year Award Winner to be sure to operate within whatever
your state law says about using deadly
Eloy Nuñez, Ph.D., and Ernest G. Vendrell, CPP, Ph.D. force on an individual.

Q. What are the pros and cons of


arming plainclothes officers?
A. If your armed security guards are
Available to purchase at the Security Store at ASIS 2017. in uniform, that could be a deterrent to
Meet the authors Monday morning, September 25.
an active shooter in and of itself. But if
Also available online at www.asisonline.org/2017Book. your armed officers are in plainclothes
Previous award winning titles are also available in the store. they can blend in with the customers,
concealing the fact that they’re armed.
One of the disadvantages of such a
policy—and this is strictly my opin-
ion—how are your law enforcement
first responders going to be able to
identify a plainclothes security officer
as a friendly with a gun in his hand? For
law enforcement personnel responding
to an active shooter, their first goal is
A world of vital security to neutralize that shooter. And if they
news delivered to your come into a property and you’ve got one
inbox. of your plainclothes security officers
standing with a weapon, it’s quite pos-
sible they’re going to be neutralized by
Security Management Daily law enforcement, which is not good.
is an exclusive e-newsletter for You also need to take a look at how
ASIS members. It offers the your security personnel with weapons
top 10 security headlines
are trained to respond. This training has
and is e-mailed daily.
to be thorough, the policies and proce-
dures must be able to withstand legal
Security Management Weekly scrutiny. How are security personnel
is a free e-newsletter for trained in the use of firearms? What’s
be.
anyone who would like to subscribe. the selection process for such officers?
Receive the week’s Are they retired or former law enforce-
15 security headlines. ment personnel, are they military per-
sonnel? Finally, what’s your lability if
Check out the Security Management newsletters’ new features one of your security personnel acciden-
and design. To subscribe or ressubscribe, email ASIS International: tally shoots an innocent bystander in a
asis@asisonline.org. situation like that? All these things must
be considered when deciding whether
to arm officers.

CONTACT ASSOCIATE EDITOR HOLLY


GILBERT STOWELL AT HOLLY.STOW-
ELL@ASISONLINE.ORG. FIND HER ON
TWITTER @HOLLYWGILBERT.

1_3 Square.indd 1 08/15/2017 5:03:57 PM

0917 Stowell C.indd 56 08/15/2017 6:07:31 PM


Micro
Micro
Micro
Technology
Technology
Technology Services,
Services,
Services,Inc.
Inc.
Inc.
1819
1819
1819
Firman
Firman
Firman
Drive,
Drive,
Drive,
Suite
Suite
Suite
137,
137,
137,
Richardson,
Richardson,
Richardson,
TX
TXTX
75081
75081
75081

14th
14th
14th
Year
Year
Year V7.17
V7.17
V7.17 ASIS,
ASIS,
ASIS,Dallas,
Dallas,
Dallas,Booth
Booth
Booth3967
3967
3967
D
DDuuurrereessssssaaannndddEEEm
m
meeerrg
rggeeennncccyyyN
NNooottitififificiccaaattitioioonnnSSSyyyssstteteem
m
m
TLS
TLS
TLSEncryption,
Encryption,
Encryption,Fully
Fully
FullySupervision
Supervision
Supervision+++Monthly
Monthly
MonthlyTesting
Testing
Testing
PoE
PoE
PoE

Monthly
Monthly
Monthly
Test
Test
Test
Feature
Feature
Feature

Some
Some
Someof
of
ofthe
the
theUnique
Unique
UniqueFeatures
Features
Featuresof
of
ofthe
the
theLynx
Lynx
LynxSystem
System
System
²
²
²
PC
PC
PC Based
Based
Based F9-F11
F9-F11
F9-F11keyboard
keyboard
keyboard alarm
alarm
alarmand
andandUSB
USB
USB Duress
Duress
Duressbuttons
buttons
buttons operate
operate
operatewhen
when
when logged
logged
logged
off
off
off
ororor
locked.
locked.
locked.
²
²
²
PC
PC
PC Based
Based
Based Popup
Popup
Popupalerts
alerts
alerts
can
can
canoperate
operate
operate when
when
when logged
logged
logged off
off
off
or
oror
locked.
locked.
locked.
²
²
²
The
The
The PC
PCPCand
and
andMac
Mac
Mac
LynxIcons
LynxIcons
LynxIcons are
are
are
encrypted
encrypted
encrypted and
and
andsupervised
supervised
supervised (not
(not
(notunsecure
unsecure
unsecure desktop
desktop
desktop
short
short
short cuts).
cuts).
cuts).
²
²
²
All
All
All
ofofof
the
the
the
hardware
hardware
hardware and
and
and
software
software
software isisis
fully
fully
fully
supervised
supervised
supervised and
and
and can
cancaneasily
easily
easily
bebe
betested.
tested.
tested.
²
²
²
The
The
The Wireless
Wireless
Wireless and
and
andPoE
PoE
PoEHardwired
Hardwired
Hardwired alarms
alarms
alarms or
ororsecure
secure
secureLynxIcons
LynxIcons
LynxIcons can
can
canpopup
popup
popup messages
messages
messages on
onon1000s
1000s
1000sofofof
PC
.PC
PCssand
. sand
.andMacs,
Macs,
Macs,HDMI
HDMI
HDMI Monitors,
Monitors,
Monitors,Radios,
Radios,
Radios, Overhead
Overhead
Overhead PAs,
PAs,
PAs,Axis
Axis
Axis IPIPIP
Speakers,
Speakers,
Speakers, Mobile
Mobile
Mobile
and
and
andIPIPIP
Phones.
Phones.
Phones.
²
²
²
One
One
One Lynx
Lynx
Lynxalarm
alarm
alarmcan
can
can
send
send
send
out
out
out
more
more
more than
than
thanone
one
one message
message
message and
and
and uses
uses
uses text
text
text
tototo
speech.
speech.
speech.
²
²
²
The
The
The popup
popup
popup message
message
message can
can
can
include
include
includelive
live
liveRTSP
RTSP
RTSP IPIPIP
video
video
videoand
and
andinstructions.
instructions.
instructions.
²
²
²
Integrate
Integrate
Integrate with
with
withour
our
our
network
network
networkinput/output
input/output
input/output boxes,
boxes,
boxes, C-CURE
C-CURE
C-CURE 9000
9000
9000 SDK
SDK
SDK or
oror
REST
REST
REST JSON
JSON
JSON
API.
API.
API.

Alarm
Alarm
Alarm
Subject:
Subject:
Subject:
Shelter
Shelter
Shelter
InInPlace
InPlace
Place
Message:
Message:
Message:Tornado
Tornado
Tornado Warning
Warning
Warning

For product info #31 securitymgmt.hotims.com

WWW.LYNXGUIDE.COM
WWW.LYNXGUIDE.COM
WWW.LYNXGUIDE.COM (972)
(972)
(972)231-6874
231-6874
231-6874Ext
Ext
Ext129
129
129
58
CAMPUS SAFETY | BY MEGAN GATES
PHOTO COURTESY OF TIM SCHOON, UNIVERSITY OF IOWA

0917 ks GatesC.indd 58 08/15/2017 6:08:24 PM


59
SEP 2017 | SECURITY MANAGEMENT

The University of Iowa is using student security officers to patrol its


campus to ensure safety and build a greater sense of community.

Daisy Torres wants to pursue a career year of college in 2016 she found
in law enforcement after she gradu- out about another opportunity for
ates from the University of Iowa in undergraduates to work with the
Iowa City, Iowa. So, when she was University’s Department of Public
looking for student employment Safety: becoming a student security
opportunities, she discovered that the officer.
university hired students to work in its Torres filled out an application,
public safety dispatch center. interviewed, passed a background
She applied for a position, but check, and was offered a position as
wasn’t hired. That didn’t deter her, an officer that fall, patrolling the cam-
however, and during her sophomore pus and interacting with students.

0917 ks GatesC.indd 59 08/15/2017 6:08:36 PM


60
CAMPUS SAFETY | BY MEGAN GATES

“At first, the whole thing was intimi- Approximately 33,000 students are security division. The police division is
dating, but the officers have been very enrolled each semester, and most fresh- made up of roughly 45 armed state-
helpful and supportive. They guide man undergraduates live on campus. certified police officers who patrol
you,” Torres says. “They encourage you Protecting the campus community campus around the clock. The security
to ask questions to make sure you don’t is the University of Iowa Public Safety division is made up of nine full-time
mess up.” Department, which has two major security officers.
The experience has also offered her divisions: the police division and the The university also has a dispatch
a chance to see what a career in law
enforcement might look like and gain
a better understanding of how first
responders interact with students and
respond to incidents.
“As a regular person, you just see the
ambulance come or you see the officer
coming to take care of something—but
going through the training you realize
this is hard work,” she explains. “It
definitely humanizes the process, so
An Education
it’s really fun for me. It’s fun getting to
know the people, the officers you are
CONNECTION
working with. You get to see the person An educational organization in Long Island, New
behind the badge.” York, joins a pilot program that shares its video
That’s the goal of the Student feeds with law enforcement in real time.
Security Officer Program at the
University of Iowa, which was created
in the fall of 2016 when Assistant Vice
President and Director of Public Safety ith a staff of more than 2,000 people and an annual operat-
Scott Beckner was hired to lead the ing budget of $360 million, Eastern Suffolk Board of Cooperative
Public Safety Department. Educational Services (Eastern Suffolk BOCES) provides a variety of
Beckner has spent more than 30 support for K-12 schools in Long Island, New York.
years in law enforcement, including “It could be things such as the schools’ IT support; we can host
25 in higher education law enforce- their computers and their servers; we can help out with test grading
ment with roles at Georgia College and professional development for their staff,” says Ryan Ruf, associate
and State University in Milledgeville, superintendent for management services at Eastern Suffolk BOCES.
Georgia; Shepherd University in “And there are dozens and dozens of other services that we provide
Shepherdstown, West Virginia; and to public schools.” There are 51 school districts, called component
Michigan State University in East districts, that the organization serves.
Lansing, Michigan. Located in 37 different buildings that Eastern Suffolk BOCES either
“I believe in a community policing rents or owns, the organization puts a priority on security to protect
philosophy, meaning that our police the wealth of sensitive student and school information that it houses.
and security officers need to go where “Since the safety and security of our students and staff are our
the students are comfortable to build number one priority, we have the responsibility to deploy proven
positive relationships with them, even integrated security technology systems to achieve this goal,” Ruf
if it’s not the environment in which the explains, noting the organization has turned to several vendors to
officers themselves are most comfort- make up a network of cameras, access control, and visitor manage-
able,” Beckner says. “This enables both ment systems to maintain security.
parties to establish meaningful com- “There are hundreds of cameras installed throughout our locations
munication and receive better feedback that are available on a platform where we can view them remotely,”
from both the law enforcement officers Ruf notes. Most cameras are from Axis, and the video management
and the students.” system is by IP Video.
Access control is another priority for the organization, says Ruf,
The Program who notes the growing number of active shooters in educational
The University of Iowa covers 1,880 environments. “Not that many years ago, most school buildings on
acres that straddle the Iowa River. Long Island, in New York state, and throughout the country were

0917 ks GatesC.indd 60 08/15/2017 6:08:45 PM


61
SEP 2017 | SECURITY MANAGEMENT

center, which is the main dispatch cen- of Iowa Art Museum. Based on his approach,” Beckner says. “It gives our
ter for campus 911 calls and the back-up experience at prior institutions, Beckner officers another opportunity to connect
dispatch center for the county. wanted to expand the university’s use of with students to get a pulse of what’s
When Beckner came on board in student employees for campus security happening on campus from the student
2016, the university hired students as positions. perspective.”
dispatchers in the dispatch center and “Hiring student security officers is With this mind-set, Beckner
also as security staff at the University another layer of our community policing instructed the department to create the

open—parents could walk through and monitors their health to per- Ruf notes that many of Eastern
the front door, drop off a lunch for form any repairs that may be Suffolk BOCES’ buildings are large,
their kids, and leave,” he explains. needed. “That way, if an incident and possibly difficult to navigate
But now that the situation has does occur, things are working well for someone who isn’t familiar
changed, Ruf says Eastern Suffolk soon after,” Ruf says. “We don't with the layout. “This way, police
BOCES is staying on top of the necessarily have the people power already have an eye inside of our
security threat, with the ability to to walk around and check every- building that's talking to the [first
lock down buildings remotely and thing out every few hours and make responder], directing them to the
control which staff members have sure everything is operational.” northeast corner of the building,
access to which buildings. While the technologies it has or the south of the campus,” he
“When you’re a big agency such installed greatly improve its secu- explains.
as ourselves, and you have daily rity posture, Eastern Suffolk BOCES Eastern Suffolk BOCES is part
transactions with staff coming took its ability to handle serious of the larger pilot program in
and going….you need to have the threats like active shooter to the Suffolk County facilitated by A+
ability to control that,” he says. This next level when it signed up for a Technology. The technology com-
includes shutting off access for an pilot program with A+ Technology pany has worked with other schools
employee who no longer needs it or and the local police department. and businesses to install “tens of
going through the proper protocols Since December 2016, it has given thousands of cameras” that connect
when someone resigns, he adds. Eastern Suffolk County Police head- to police headquarters, according
Eastern Suffolk BOCES also uses quarters access to its surveillance to David Antar, president of A+
a visitor management platform cameras in an emergency. Technology.
from Raptor Technologies, which To connect its cameras to police “The system leverages something
allows front desk employees to headquarters, Eastern Suffolk called the AVFusion by IP Video
quickly process anyone wishing BOCES built a fiber optic cable Corporation, which takes many
to gain access to the building by network that can be tapped into disparate sources of information
running their state-issued identifi- should other school districts want and brings them back to a common
cation. Eastern Suffolk BOCES also to leverage the same fiber in the operating picture at police head-
built security vestibules in its lob- future. quarters,” says Antar.
bies, holding areas of sorts, where “With this new Ethernet line, we With such a large stakeholder
visitors must wait while their IDs are would be able to just route those community, Ruf says Eastern Suffolk
being processed. individual component districts back BOCES benefits tremendously from
“Raptor does a background to Suffolk County Police,” Ruf says, having a one-stop-shop for law
check, and cross-references the ID “and we view that as the next step enforcement to view its cameras.
with the sex offender list. It also in this program.” “There are 51 component districts.
records certain key information When an emergency call comes We can’t have 51 different systems
for us in case we needed to find in—whether it’s for an active that police are looking at, it has to
out who was in our building at any shooter or another type of threat— be one uniform system,” Ruf notes,
particular time,” Ruf says. If every- police can automatically pull up “We think this A+ solution is the
thing checks out, a temporary ID is the camera feeds from the location one that makes the most sense.”
generated for the visitor. where the incident is occurring.
A+ Technology & Security From there, law enforcement can CONTACT ASSOCIATE EDITOR HOLLY
Solutions, Inc., is the integrator that direct first responders with real- GILBERT STOWELL AT HOLLY.STOW-
installed and manages those secu- time information based on what the ELL@ASISONLINE.ORG. FOLLOW HER
rity platforms for the organization, camera shows. ON TWITTER: @HOLLYWGILBERT.

0917 ks GatesC.indd 61 08/15/2017 6:09:55 PM


62
CAMPUS SAFETY | BY MEGAN GATES

Student Security Officer Program to afraid to fail because of the spotlight


hire students to be the eyes and ears of we’re in, and we have to learn to get
campus public safety. beyond that mind-set.” Hiring student
“I’m not afraid to try new things, and To push the program forward,
I’m not afraid to fail,” Beckner explains. Security Supervisor Beau Hartsock security officers is
“I think it’s just as valuable to know was pulled off his regular assignment
what doesn’t work as what does work, at the time—head of security at the another layer of our
and you don’t always know until you try. University of Iowa Art Museum—and
So many people in law enforcement are brought in to recruit students and community policing.

interview them for officer positions.


To recruit students, Hartsock and
others in the department used the uni-
versity’s Hire a Hawk program that lists
student employment opportunities and
attended the campus job fair. They also
went to Introduction to Criminology
classes—the first core class in the
Criminology, Law, and Justice major—to
contact students who might be inter-
ested in the program.
“The Intro to Criminology is a prereq-
uisite to the program that every student
coming in has to go through,” Hartsock
explains. “We go to those classes and
do a 10-minute pitch of what we have
to offer and tell them about the depart-
ment. If they wish to apply, they can.”
Within one month, the program had
30 students on staff as security offi-
cers, with a peak in the middle of the
academic year of 75 student officers. The
students completed training conducted
by full-time security staff on mandated
issues, including radio operation, the
Jeanne Clery Disclosure of Campus
Security Policy and Campus Crime
Statistics Act, bloodborne pathogens,
and CPR.
The student officers were then trained
for each of their particular assign-
ments. These assignments included
dorm patrol, building checks, the art
museum, athletic events security, the
campus transportation service called
Nite Ride, and the Hawkeye Storage Lot.
“We don’t train everybody on every-
thing; we train on an as-needed basis in
accordance with whatever assignment
they are working,” Hartsock says.
This is because each assignment has
different requirements. For instance,
See us at ASIS Booth 1915 For product info #32 securitymgmt.hotims.com

0917 ks GatesC.indd 62 08/15/2017 6:10:18 PM


We build security booths
as strong as a tornado
In December of 1997, two security booths made by B.I.G. Enterprises stood
in the pathway of Super Typhoon Paka in Guam. Though surrounding structures
were flattened, the booths, including their glass windows, were intact after the
220 mph hurricane passed over.

Your perimeter security must


stand-up to the strongest threats:
bad guys or natural disasters.
At B.I.G., we bring a half-century of perimeter security insight to
you. We know how to fabricate a booth with every modern security
demand on the inside, but one that fiercely protects your people
and facility on the outside. From the U.S. military to Disney, they
come to us for value and unrelenting safety. Come visit the vast
Gallery of Booths on our website. Let us build your image.
For product info #33 securitymgmt.hotims.com
64
CAMPUS SAFETY | BY MEGAN GATES

students assigned to Nite Ride—a trans- because students sit at a desk, greet the dispatch office and a police officer
portation service that provides rides for people who come into the building, or security officer will be sent to their
students between 7:00 p.m. and 6:00 and keep an eye on the building’s video location to respond.
a.m.—act as dispatchers, taking calls camera feeds, making it a relatively low- “First and foremost, students are
and managing the app that sends the key assignment. trained to be the eyes and ears of the
vehicle out to pick students up. The other assignment for
Dorm patrol requires that students students is Hawkeye Storage Lot,
walk the dormitories, using a pipe which is vulnerable to thefts from
check-in system from Guard1Plus to parked cars because it is separated
track their progress throughout the from the main campus, Hartsock Students are trained to
campus. “A student could potentially says.
walk five or six miles a night, especially “We have students that also be the eyes and ears of
on the weekends, looking for any safety sit out there and do patrols every
concerns, damage to property, and half hour in an electric car around the university only.
things like that,” Hartsock says. the lot for about 10 minutes,” he
Student officers have similar respon- explains.
sibilities when they are assigned to Students on patrol wear yellow
the libraries or the Voxman Music polos and black pants and have utility university only,” according to Hartsock.
Building, which is a new building on belts with pipes for the check-in system, “In no way are they to physically or ver-
campus that houses valuable musical masks for CPR, and radios to reach the bally intervene…we train them on what
equipment. dispatch office. If they notice suspicious could potentially get them in danger,
The art museum job is a“sought-af- activity or an incident unfolding, stu- and to use their best judgment.”
ter” assignment, Hartsock says, dent officers are instructed to radio into So far, the university has had no

PINPOINT THE THREAT with the world’s most trusted metal detectors.

Performance. Protection.
Dependability. Since 1964.
®
Booth #2223
garrett.com Toll Free: 800.234.6151 (U.S. & Canada)

See us at ASIS Booth 2223 For product info #34 securitymgmt.hotims.com

0917 ks GatesC.indd 64 08/15/2017 6:11:12 PM


65
SEP 2017 | SECURITY MANAGEMENT

incidents of harm to a student secu- Bullock says. “It’s a well-known thing students are much more likely to bring
rity officer while on duty, according to that sexual assaults are underreported. that up to a student security officer on
Hartsock. We would like to do anything we can to dorm patrol than to a security officer.
“We have the benefit of our student make the occurrences go down—ideally Students are “not going to be as open
security officers carrying radios—the eliminate them completely. But at least to saying that to a police officer as they
same exact radios that our police offi- knowing about them is a step in the would to one of their peers,” he adds.
cers and our full-time security officers right direction.” “General quality of life issues within
carry—so they are literally a key click For less serious offenses, such as our campus have been easier to report
away from our dispatch,” he adds. smoking in a dorm room, Bullock says by having a peer to talk to.”
“And a lot of times our police officers
are scanning our student security offi-
cer channels, and they can start head-
ing that way even before it is actually
dispatched by a dispatcher.”

Campus Impact
When Torres was initially hired, her
friends and fellow students’ first
question was: Do you get to carry a
gun? Student security officers are not
armed, but they are taken seriously by
their peers and this support has helped
them build relationships on campus.
“I’ve been the night dispatcher for
Nite Ride and [my friends] don’t bother
calling the phones because they know
I’m working, so they’ll text me and say,
‘Is there a chance you could send a
Nite Ride my way?’” Torres says. “They
think it’s interesting because they get
to see me in the dorm sometimes and
say, ‘I know the security officer.’”
Building this sense of community
helps give credibility to the campus
police because the student security
officers get to know police officers as
real people, says Police Captain Mark
Bullock.
“Kids, when they talk about these
officers as people rather than as a
profession, it takes away some of those
barriers that may have previously been
there,” he explains.
Another benefit to having the stu-
dent security officers on patrol is that it
can make reporting a sensitive crime,
such as a sexual assault, easier for
students because they are talking to a
peer instead of a police officer.
“If it is a sensitive crime, and if you
have a familiar face or a peer who is
part of an organization like ours, we
would hope that would make report-
ing that crime just a little bit easier,”
See us at ASIS Booth 2041 For product info #35 securitymgmt.hotims.com

0917 ks GatesC.indd 65 08/17/2017 11:54:34 AM


66
CAMPUS SAFETY | BY MEGAN GATES

And in instances like smoking in equipped with a radio, "so it’s a direct
You get to see the a prohibited space, student security line of access to the police so informa-
officers have several options on how tion is coming in in real time,” accord-
person behind the to handle the situation, including ing to Bullock. “There’s nothing lost in
reporting it to the residence assistant translation.”
badge. on duty, the front desk of the building
they are in, or dispatch for a police Future Plans
response, if necessary. The Student Security Officer Program
Student security officers are all has been viewed as a success so far,
and the university plans to expand it
during the fall of 2017 to hire approx-
imately 125 student officers for the
academic year.
“We’re actually getting ready to do
a very large hiring surge of possibly 40
to 50 more students just to cover one
assignment that’s in the works right
now,” says Hartsock, who declined to
provide more detail about what the
assignment was.
The department itself is also making
a push to have student security officers,
police officers, and security staff be
increasingly more involved with campus
life in their off hours. One initiative is
paying for staff to participate in intra-
mural sports on campus.
“So you’re interacting with the univer-
sity community, humanizing us in the
sense that students get to know us per-
sonally, see a familiar face out of uni-
form as well as in uniform,” Hartsock
explains. “Being more approachable
and being looked at in a way that we’re
really genuinely here to help.”
All of this goes back to Beckner’s
focus of creating a community policing
approach to campus security at the
university.
“If University of Iowa officers can
begin to know students on a personal
level—when it’s not in the context of
punitive action—I believe we’ll be able
to solve more problems proactively,”
he says. “One of my early goals was
to begin to break down the barriers
between students and campus police,
and I think this program is helping us
do that.”

CONTACT ASSOCIATE EDITOR MEGAN


GATES AT MEGAN.GATES@ASISONLINE.
ORG. FOLLOW HER ON TWITTER: @
MGNGATES.
See us at ASIS Booth 833 For product info #36 securitymgmt.hotims.com

0917 ks GatesC.indd 66 08/15/2017 6:11:27 PM


ASIS 2017
BOOTH
3523

Performance, Innovation, Reliability


The next generation of multi-sensor/multi-directional camera technology has
arrived, and it’s only available from Hanwha. Capable of 150dB wide dynamic range,
60 frames per second (per sensor) and equipped with advanced video analytics, the
multi-sensor cameras you’ve been waiting for have never looked so good.

See the unrivaled performance of our 8 and 20 megapixel multi-sensor/multi-directional cameras at:
HanwhaSecurity.com/multisensor

For more information visit HanwhaSecurity.com


For product info #37 securitymgmt.hotims.com
68
MANAGING | BY CLINT HILBERT

PHOTO COURTESY OF STEPHANIE DALTON COWEN

0917 ks-Hilbert C.indd 68 08/16/2017 10:22:43 AM


69
SEP 2017 | SECURITY MANAGEMENT

in the

CRISIS LEADERSHIP BEGINS BEFORE EMERGENCIES HAPPEN.


MANAGERS CAN PREPARE BY LEARNING THE BUSINESS, MAKING
ALLIANCES WITH KEY PLAYERS, ASSESSING RISK, AND
IDENTIFYING VULNERABILITIES.

N JULY 12, 2006, fighting between the Israeli

O army and the Lebanese militant group Hezbollah


suddenly erupted and started to spread. Hezbollah
fired rockets and anti-tank missiles; Israel responded
with airstrikes and artillery fire, and later launched a ground
invasion of southern Lebanon. The 2006 Lebanon War raged
on for 34 days before the United Nations brokered a ceasefire.
I received word of the fighting shortly before the news
reports hit. I was GE’s divisional global security director at
the time, based at the corporate headquarters building of
General Electric (GE) Healthcare in Waukesha, Wisconsin. I
was responsible for the security and wellbeing of employees
at more than 600 properties around the world, including
three sites in Israel and one in Lebanon. Calls were coming in
from both sides of the battle; many employees were at risk of
losing their lives.
However, as the war entered its tenth day, we had relo-
cated more than 1,000 employees and family members out of
harm’s way, with the help of our corporate executive team
and several strategic partners. This wasn’t an easy
task. We were able to continue basic opera-
tions with minimal losses in Israel, but all
activity in Lebanon came to an abrupt

0917 ks-Hilbert C.indd 69 08/16/2017 10:24:42 AM


For product info #38 securitymgmt.hotims.com
72
MANAGING | BY CLINT HILBERT

stop. What further complicated matters emotional frailty, and operational igno- management best practices, managers
was the U.S. government’s refusal, or rance during the event. can greatly improve their chances of
inability, to assist with any form of safe But it is also important to realize that being an effective crisis leader. This arti-
passage from Lebanon. Still, we were crisis leadership begins long before the cle explores these practices and prepa-
able to complete relocations
by using several dangerously
remote and unpopulated routes
to reach Jordan through Syria.
An event of this magnitude—
an actual war—is difficult to
navigate, and can be wholly An event of this
draining. While the war crisis
proceeded, the company con- magnitude—an actual
tinued to operate, so long hours
were a requirement. For three
war—is difficult to navigate.
days after that first call, I didn’t
get many chances to sleep.
Managing a serious crisis as a group actual crisis occurs. The right prepara- ration, including building technical
leader can be stressful, both physically tion is essential for being an effective expertise, assessing situations, develop-
and emotionally. It is crucial to recog- crisis leader, and for a security executive ing relationships with key stakeholders,
nize that your effectiveness in success- this groundwork can start from day one and training for emergencies.
fully leading others will diminish if you on the job. By focusing on preparation,
openly demonstrate indecisiveness, and by consistently practicing certain BUILD EXPERTISE
Knowing the business you support is
the most critical factor to your suc-
cess as a crisis management leader.
Thus, if you’re new to an organization,

SECURITY JOBS you should dedicate as much time as


possible in your first three months to
learning all you can about every facet
AND CAREER CENTER of the business—from sales to produc-
tion to market share—and meeting the
people who are the driving forces in
those areas.
In my career, I have had the oppor-
tunity to manage security programs
for several companies in completely
different vertical markets. Each market
change required extended study time.
There’s a huge variance in the opera-
tional methodologies of security pro-
grams at a hospital and a nuclear power
plant, for example. Although the core
principles of security can be applied
to any industry, each line of business
retains its own unique characteristics
and regulatory framework.
Besides operational knowledge, you
must also develop relationships with
most of the key process and resource
https://securityjobs.asisonline.org owners who support the business’s
primary missions. Once those relation-
ships are established, you should then
strive to understand the secondary and

SM0917_CareerCenter_1_3SQ.indd 1 08/14/2017 12:16:08 PM

0917 ks-Hilbert C.indd 72 08/16/2017 10:28:29 AM


®

SPECTRUM

FIBER SOLUTIONS
Altronix’s new NetWay Spectrum series takes fiber and power to a new level.
Indoor and outdoor models include hardened Ethernet PoE switches and multi-port
media converters with or without integral power. Units can be deployed with conventional
single or multi-mode fiber...or composite cable which combines fiber with copper to
simultaneously deliver power and data. Go further – with NetWay Spectrum from Altronix.

MADE IN THE U.S.A. & BACKED BY A LIFETIME WARRANTY

VISIT US AT ASIS - BOOTH #2823

altronix.com – info@altronix.com
74
MANAGING | BY CLINT HILBERT

to complete without the


full cooperation of nearly
everyone in your com-
pany. Instead, consider
Knowing focusing on key revenue
streams, products or
the business you services that define the
support is the most critical factor company, and significant
vulnerabilities that could
to your success as a crisis management leader. interrupt these streams
and services—such as
the sudden loss of a
single-sourced major
component, a labor
tertiary levels of operations, resources, that may exist in business operations, disruption, or a stoppage in distribution
and personnel necessary to keep the the contingency plans themselves, and channels. Even if the assessment seems
business going. the resource base that will be available to have little to do with traditional
In addition, you should also learn when a crisis occurs. security activities, it is a great way to
some basic business continuity plan- However, conducting a business learn about the inner workings of your
ning skills and conduct a few business impact assessment of your company company.
impact assessments. These will allow can be a daunting task if you attempt For example, after the Great Tohoku
¯
you a fuller understanding of the to assess the whole business in a single Earthquake struck Japan on March
potential vulnerabilities and the gaps review. And it can be almost impossible 11, 2011, I was working as a security

Recognize AND Analyze


Is she an When, where
employee? did she enter?

How often Does she


was she appear in
here this videos
month? recorded
last
Is she a week?
known How
suspect? old is she?

Premier face recognition technology for real-time video


security and anonymous people analytics
www.cognitec.com | info@cognitec.com
For product info #41 securitymgmt.hotims.com

0917 ks-Hilbert C.indd 74 08/16/2017 10:29:32 AM


75
SEP 2017 | SECURITY MANAGEMENT

manager at Paramount Pictures. Due to being part of the inner circle at your trouble—what we called “a smoldering
the earthquake, almost all of the film business. For example, as a matter of issue”—the affected business units were
industry’s specialized magnetic record- practice, GE security leaders routinely identified, and key revenue processes
ing and video storage tape became gathered for periodic operational were analyzed for potential impacts and
unavailable. Sony, with its entire tape continuity development sessions. In vulnerabilities.
manufacturing business located in these meetings, we shared intelligence Often, a smoldering issue has the
Japan, was the exclusive maker of such derived from in-country leaders, paid potential to challenge several exposed
tape, and its production stopped cold. global intelligence services, and geo- operational and distribution channels,
This was a supply chain crisis for political analysts. At the first signs of and the material or human resources
sure, and we at Paramount were
scrambling for tapes. Fortunately, our
security team had enough operational
and business continuity knowledge to
know where to look and who to call. By
volunteering to help secure tapes for the
many television productions on the lot,
our team knew where to find hundreds
of new and reusable tapes in dozens
of secure storage locations. It was like
an Easter egg hunt gone wild. Armed
with this knowledge and with very little
effort, the security department was able
to secure dozens of the remaining tapes,
which kept our production teams going
until other recording methods were
found.
Sometimes, it takes great effort to
avoid being constrained into a depart-
mental silo and stuck in the dark when
it comes to internal business workings.
But the effort is worth it. Get out there
and mingle, don’t be afraid to ask
questions and build relationships and
alliances. Learn the business so you can
contribute to its survival.

ASSESS SITUATIONS
Another important component of
crisis leadership preparation is staying
current on domestic and international
events, especially if your company is
a global one. Third-party providers of
intelligence and communications ser-
vices can be useful here. Many of these
providers even offer crisis forecasting by
region and country to keep your team
abreast of problem areas.
This global understanding, combined
with business knowledge, will allow
you to see the big picture and anticipate
which operations might be interrupted
if a crisis starts to unfold.
Moreover, demonstrating this
knowledge improves your chances of
See us at ASIS Booth 2023 For product info #42 securitymgmt.hotims.com

0917 ks-Hilbert C.indd 75 08/16/2017 9:40:37 AM


76
MANAGING | BY CLINT HILBERT

knowledge and current


event understanding
will help a security
leader make better
This was a decisions.
But in the final
supply chain crisis for sure, and we at analysis, leadership is
not about making the
Paramount were scrambling for tapes. best decision possible in
every instance, or about
always being the smart-
est person in the room.
they contain. Thus, effective coordi- of all business functions on a crisis It’s ultimately about
nation and communication is critical management team. By emphasizing your ability to earn the trust of others
during these initial stages. teamwork and relationship building, a to the point where they will willingly
manager can help develop and main- follow you. Here, effective communica-
DEVELOP RELATIONSHIPS tain collaborative channels that will be tion is vital.
With sufficient business knowledge and invaluable during a crisis. Moreover, a In July 2005, four suicide bombers
a global understanding, you will be in a well-structured and collaborative crisis armed with rucksacks full of explo-
position to advise the C-suite on events management team can incorporate the sives detonated bombs on the London
once a crisis starts to unfold and help use of predictive tools, such as event Underground that killed 52 people and
your firm be active rather than reactive. forecasting and analysis, that maximize injured hundreds more. Within four
However, this cannot happen if orga- the chances of avoiding a crisis in the hours of the bombings, our security
nizational leaders reject an inclusionary first place. team at GE Healthcare was able to
approach when it comes to crisis lead- Even so, if a crisis does occur, suc- quickly identify—from a pool of roughly
ership. For example, early in my career, cessful collaboration between many 45,000 employees —that 483 were
the company I worked for decided to stakeholders is usually a prerequisite for confirmed or expected to be traveling
move forward on a major acquisition— formulating an acceptable and viable in or about London that day for work.
the purchase of a competitor’s reman- solution. An effective crisis manage- Using our mass communication system,
ufacturing division. In general, not all ment leader knows where to go to seek we located all but nine employees on
security departments are included in out advice from others when consid- business travel that were in London or
every C-suite function; some do not get ering options to present to company had passed through London within an
much visibility into major corporate leaders. While it is often necessary to eight-hour window of the bombings.
decisions. This held true in our par- quickly provide solution options during By other means, we quickly con-
ticular case because the security team a crisis, it is also advisable for managers firmed that the remaining nine travelers
was not part of the company’s diligence to carefully consider all security-based were safe. Additionally, some of our
support team. Furthermore, the security spending decisions, which can some- employees on personal leave and vaca-
team was not included in the company’s times be driven more by fear than by tion were traveling in London that day.
crisis response team, which consisted reason after a major event Because those employees had included
mostly of legal and financial leadership, Once options have been considered their private cell phone numbers in
supported by communications and and a response plan is approved, a the company’s emergency notification
customer relations staff. manager needs strong interactive lead- system, we were able to receive confir-
As a result, the security team was ership skills to ensure that others buy mations that they, too, were safe.
unable to flag any discrepancies that in and follow the course laid out. As the On the other hand, sometimes crisis
might have shown up in the due dili- example of the shell company purchase pressure can lead to costly communi-
gence process. The division that was shows, a collaborative effort can be cation errors. Take for example, one of
purchased turned out to be a fraudulent quickly derailed by preventing a single the most high-profile crisis situations
shell company. When news of the bad department, which might hold a critical in recent memory, the 9/11 terrorist
purchase reached the press a few days part of the solution, from participating. attacks. After the planes hit the towers,
later, our firm suffered a severe financial one senior security manager of a major
loss and some reputational damage to TRAIN corporation in New York was overheard
its brand. Good leaders make intelligent deci- saying, “We’re being attacked! I don’t
The incident illustrates the importance sions; great leaders do so consistently. think anyone’s gonna make it out of
of maintaining a wide representation The combination of business operations Manhattan!” The comment started

0917 ks-Hilbert C.indd 76 08/16/2017 10:30:15 AM


77
SEP 2017 | SECURITY MANAGEMENT

a panic in the entire office building, middle of a crisis to learn more about HE HAS SERVED AS A SECURITY
which took hours to calm. the business, means you haven’t EXECUTIVE FOR GENERAL ELECTRIC,
The example shows that even learned the business well enough and PACIFIC GAS AND ELECTRIC, AND
accomplished managers can succumb you aren’t prepared to lead. PARAMOUNT PICTURES. EARLIER IN
to pressure. However, specialized crisis HIS CAREER, HE WAS A COMMANDER
management leadership training can CLINT HILBERT IS THE OWNER OF OF PROTECTIVE SERVICES FOR THE
be invaluable in reducing the chances CORPORATE PROTECTION TECH- U.S. DELEGATION TO NATO FOR THE
of this happening. Communication NOLOGIES, A NORTH CAROLINA- U.S. ARMY CRIMINAL INVESTIGATION
is often an important component of BASED PRIVATE INVESTIGATION FIRM. COMMAND.
this type of training; many programs
provide guidance on how bad news can

SANITIZED
be communicated without embellish-
ment, panic, or fear, and how correct
communication can provide stability
and hope by demonstrating a confident

SECURITY
resolve—indicating that something is
being done immediately, or will be in
the near future.
In addition, crisis training helps
managers better understand the anat-
omy of a crisis, which is an essential
element in remaining rational and
functioning calmly. Drills can help build
response memory, which in turn helps a
leader avoid freezing or panicking.
In cases where in-house crisis train-
ing is unavailable, security managers
should consider building their own
training. With a little research online
about crisis management planning,
managers can first assemble the basics: SDC’S EE6200 Magnetic
contact sheets, resource directories,
contingency plans, meeting schedules,
LLockk ffor H
Hospital, Pharma and Cleanrooms
it l Ph
and organizational charts. Then, with
help from both the legal and human SDC’s E6200 ExcelTM Series magnetic locks with architectural
resource departments, the manager stainless steel housing and epoxy sealed electronics are
can coordinate partnerships with local ideally suited for access control in Hospitals, Pharmaceutical
emergency service and communication Facilities and Cleanrooms. When combined with other SDC
providers, and design some crisis train- access control components, compatibility is guaranteed!
ing exercises.
For details and specifications: sdcsecurity.com/E6200-Excel-Magnetic-Lock.htm
Becoming skilled at anything takes
practice, and crisis management lead-
ership is no exception. If you ever find
yourself in a room filled with managers
trying to solve a major problem, don’t be
shy; step up to the plate and share your
knowledge and experience, and contrib- No Touch Universal Relay for Airlock, Power Controller with
ute something. This will build on your Wave-to-Exit Switch Mantrap, Shared Bathroom Universal Relay
experience base, and allow you to 474U, 474DU UR-1 602RFXUR24
practice being in crisis situations.
In the end, the best coaches are
those who prepare, know the rules the lock behind the system
inside and out, and can lead their SDCSecurity.com • 800.413.8783 • service@sdcsecurity.com

players strategically. Stopping in the


For product info #43 securitymgmt.hotims.com

0917 ks-Hilbert lo.indd 77 08/15/2017 6:15:48 PM


78
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

A Preliminary Guide
to the ASIS International
Exhibits
SEPTEMBER 25-28TH, 2017
DALLAS, TEXAS

ATTENDEES AT THE ASIS INTERNATIONAL 63rd Annual Seminar and


Exhibits in Dallas, Texas, will have the opportunity to hear about the latest
issues in the security industry from experts at numerous educational sessions.
In addition, the hottest trends in technologies and services will be on display
in the exhibit hall.
This preliminary guide offers only a fraction of the product categories and
company information available from the ASIS website at asisonline.org. This
listing provides only information submitted by exhibitors as of August 8, 2017.
A final Exhibit Guide, containing comprehensive and timely information on
exhibitors, will be available at the seminar and exhibits in Dallas. Until then,
this preliminary guide can serve as a sample of some of the products you need
the most. For up-to-date information, please download the ASIS app.

EXHIBIT GUIDE Management staff is available daily tised in this issue are highlighted
This guide to the exhibit hall is throughout the convention center. throughout this preliminary guide.
given to each person attending the In addition to an array of articles Please check the advertiser index
seminar and exhibits. It lists all about seminar events, a special on page 147. Booth numbers of
exhibitors alphabetically by booth Product Guide in the center of each those advertisers that will be in
number and by product or service issue introduces selected products the exhibit hall are included at the
category. A detailed floor plan of and services on display in the ex- bottom of their ads.
the convention center exhibit hall hibit hall.
is also provided in this handy di- The following listing of exhibitors
rectory. SECURITY and their booth numbers by prod-
MANAGEMENT uct or service category is current
ASIS SHOW DAILY This issue is filled with advertise- as of August 8, 2017. A list of all
The official ASIS seminar news- ments from numerous exhibitors. the categories used is included on
paper produced by the Security The exhibitors who have adver- pages 80 and 81.

09-17 Exhibit Guide v2 LO.indd 78 08/17/2017 11:23:57 AM


09-17 Exhibit Guide v2 LO.indd 79 08/21/2017 6:01:45 PM
80
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

2017 ASIS Exhibits


The following list is a guide to the categories that companies have used to identify
the products and services they will display in the exhibit hall.

Access Control Signal Transmission ..................................................................... 96


(entry and exit—physical or virtual/computer) Station Dispatch Systems ......................................................... 96
Badges and Badge Printers ......................................................82 Consulting
Biometrics ........................................................................................82 Crisis Management ...................................................................... 96
Bollards ..............................................................................................82 Events.................................................................................................97
Document Control ........................................................................82 Intelligence Analysis.....................................................................97
Fencing and Gates ........................................................................82 Management Consulting ............................................................97
Guard Shelters and Equipment .............................................. 84 Crisis and Emergency Management
Keys and Locks ............................................................................. 84 Fire Prevention and Safety ........................................................97
Readers..............................................................................................85 Mass Notification ...........................................................................97
Safes, Vaults, and Security Containers................................ 86 Travel Safety & Emergency Services.................................... 98
Smart Cards .................................................................................... 86 Workplace Violence .................................................................. 100
Turnstiles ...........................................................................................87 Detection
Wireless .............................................................................................88 Bio-chemical................................................................................. 100
Accessories, Furniture, and Vehicles Bombs and Explosives ..............................................................102
Batteries, Consoles, Rack & Power Sources ......................88 Canines ............................................................................................102
Shredders/Document Destruction Equipment ................88 Forensic Analysis Labs..............................................................102
Surge Protectors............................................................................88 Imaging Technologies ...............................................................102
Vehicles and Uniforms.................................................................88 Metal Detectors............................................................................102
Weapons (Non-Lethal and Firearms) .................................. 90 Motion Detectors.........................................................................102
Alarm Systems Robotics ..........................................................................................104
Control Panels................................................................................ 90 Tamper-Resistant Seals & Labels..........................................104
Annunciators .................................................................................. 90 Technical Surveillance Countermeasures
Central Station Monitoring ....................................................... 90 (TSCM) .............................................................................................104
Door, Window, Hardware, & Electronic Article Information Technology & Systems
Surveillance Sensors .....................................................................91 Access Control and Authentication ....................................104
Blast Mitigation & Bullet Resistance Materials Application Software .................................................................106
Walls.....................................................................................................91 Data Recovery Services ............................................................106
Building Materials ..........................................................................92 Encryption ......................................................................................106
Doors and Hardware ....................................................................92 Hardware Theft Prevention .....................................................106
Framing Systems ...........................................................................92 Intrusion Detection and Prevention ....................................106
Penetration Testing.......................................................................92 Investigations ................................................................................108
Safes, Vaults, and Security Containers.................................92 Privacy .............................................................................................108
Windows (Glazing, Films) ..........................................................92 Risk Management........................................................................108
Communication Secure Communications ..........................................................110
Global Positioning Systems ......................................................92 Wireless Security ..........................................................................110
Intercom Systems......................................................................... 94 Legal, Insurance, and Regulatory
Mass Notification .......................................................................... 94 Compliance and Ethics ..............................................................110

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 80 08/17/2017 11:16:39 AM


81
SEP 2017 | SECURITY MANAGEMENT

Due Diligence .................................................................................110 CCTV (Closed Circuit Television)........................................... 118


Expert Witness ..............................................................................110 Lenses ............................................................................................... 119
Fraud .................................................................................................110 Lighting ...........................................................................................120
Insurance ..........................................................................................110 Night Vision Equipment ...........................................................120
Political/Security Risk ................................................................ 112 Patient/Employee Monitoring................................................120
Personnel Recording Equipment/Systems ............................................120
Certification .................................................................................... 112 Remote Video ...............................................................................120
Contract Security ........................................................................ 112 Tracking/Monitoring
Drug Testing, Substance Abuse Education ....................... 112 Armored Car.................................................................................. 123
Employee/Employment Screening....................................... 112 Canines ............................................................................................ 123
Executive/VIP Protection ........................................................ 112 Global Posi1tioning Systems ................................................... 123
First Aid Training .......................................................................... 112 Handling/Courier Services ...................................................... 123
Travel Safety and Emergency Services............................... 112 Patient/Employee Monitoring................................................ 123
Workforce Management (Staffing) ...................................... 112 Property Marking......................................................................... 123
Workplace Violence ................................................................... 114 Services/Cash ............................................................................... 123
Publishers ....................................................................................... 114 Wireless/Radio/Telemetry/Long Range
Robotics Monitoring ...................................................................................... 123
Unmanned Systems .................................................................... 116 Training
Surveillance Threat Assessment ..................................................................... 123
Cameras ........................................................................................... 116

See us at ASIS Booth 2359 For product info #44 securitymgmt.hotims.com

09-17 Exhibit Guide v2 LO.indd 81 08/17/2017 11:31:38 AM


82
EXHIBIT GUIDE | ASIS INTERNATIONAL 6D ANNUAL SEMINAR AND EXHIBITS

ACCESS CONTROL (ENTRY Visitor Pass Solutions by Data Transmitter Solutions ............................... 1923
AND EXIT—PHYSICAL OR Management, Inc ...................................... 2143 Vanderbilt Industries................................ 4261
VIRTUAL/COMPUTER) Xtec, Inc....................................................3047 VisionLabs ................................................ 2543
BADGES AND BADGE PRINTERS BIOMETRICS Xtec, Inc....................................................3047
Access Specialties International, LLC. ...... 1943 Access Specialties International, LLC. ...... 1943 BOLLARDS
AES Cybersecurity ....................................1048 AES Cybersecurity ....................................1048 Ameristar Security Products ..................... 3517
AlertEnterprise .........................................1009 Alarm Lock ............................................... 3120 Aventura Technologies .............................2947
Allegion .................................................... 2333 AlertEnterprise .........................................1009 B&B Roadway and Security Solutions ......4367
AllStar Industries Inc ................................1448 Allegion .................................................... 2333 Betafence USA ........................................... 540
Alvarado Turnstiles ..................................4433 AllStar Industries Inc.. ..............................1448 Designed Security, Inc .............................. 2723
AMAG Technology, Inc.... ......................... 3823 Alvarado Turnstiles ..................................4433 FAAC International .....................................425
Apollo .......................................................3033 Apollo .......................................................3033 Gibraltar ..................................................... 811
Aventura Technologies .............................2947 ARH, Inc ................................................... 1015 International Road Dynamics, Inc ............ 4191
AWID, Inc ................................................. 2139 Aventura Technologies .............................2947 Nasatka Security ...................................... 1000
B-Id, LLC. ................................................. 4476 B-Id, LLC. ................................................. 4476 PRO Barrier Engineering ........................... 3981
BQT Solutions ........................................... 1423 BQT Solutions ........................................... 1423 Ross Technology Corporation ................... 2133
CodeLynx, LLC. ......................................... 1620 Brivo ......................................................... 4353 Security-Net, Inc ....................................... 4333
ColorID, LLC. ............................................2248 CaptureTech .............................................4370 TagMaster North America, Inc ..................3885
Convergint Technologies, LLC. ................. 1332 CodeLynx, LLC. ......................................... 1620 TCP-Security Solutions ............................. 4552
Deister Electronics USA, Inc ..................... 2033 ColorID, LLC. ............................................2248 Total Automation Group, Inc ......................333
Document Security Alliance .....................4283 Convergint Technologies, LLC. ................. 1332 DOCUMENT CONTROL
ECAMSECURE ........................................... 4197 Document Security Alliance .....................4283 AES Cybersecurity ....................................1048
Fast Pass Visitor Management .................. 4173 ENSCO ...................................................... 4553 AlertEnterprise .........................................1009
FRONTSTEPS ............................................ 3973 EPCOM ...................................................... 4591 AlutelMobility ........................................... 2547
G4S ........................................................... 3733 EyeLock .................................................... 1201 Apollo .......................................................3033
Galaxy Control Systems ............................ 2241 Fast Pass Visitor Management .................. 4173 ARH, Inc ................................................... 1015
Hexicurity, Inc ..........................................4269 FRONTSTEPS ............................................ 3973 AWID, Inc ................................................. 2139
HID Global ............................................... 3009 G4S ........................................................... 3733 CodeLynx, LLC. ......................................... 1620
i3 International, Inc ..................................2843 Galaxy Control Systems ............................ 2241 Cyber Defense Labs...................................1046
ID Connection ........................................... 2110 Gorilla Technology, Inc ........................... 4069 Document Security Alliance .....................4283
IdentiSys, Inc ............................................ 2015 HID Global ............................................... 3009 FRONTSTEPS ............................................ 3973
Identiv ...................................................... 3617 ID Connection ........................................... 2110 Hexicurity, Inc ..........................................4269
IDIS .......................................................... 3846 IdentiSys, Inc ............................................ 2015 IDScan.net ..................................................916
Iris, Ltd., Inc .............................................3966 IDScan.net ..................................................916 Information First ...................................... 1052
Isotec Security ..........................................1648 Innovise Software, Ltd. ...............................414 Iron Mountain Government Services ....... 4398
iView Systems ........................................... 1601 International Road Dynamics, Inc ............ 4191 iView Systems ........................................... 1601
KEY-BAK ................................................... 1643 Invixium .......................................................... KEY-BAK ................................................... 1643
MorphoTrak ..............................................1607 Iris ID Systems, Inc ...................................1309 Kingston Technology ................................ 3791
Open Options, L.P. ......................................625 Isotec Security ..........................................1648 Parabit Systems, Inc .................................3041
Parabit Systems, Inc .................................3041 Marks USA ................................................ 3120 Peripheral Dynamics, Inc .........................2240
Peripheral Dynamics, Inc .........................2240 Matrix ComSec, Pvt., Ltd............................ 740 Trust Farm, LLC. ........................................ 946
PetroCloud, LLC. ....................................... 4163 Modular Security Systems, Inc .................. 909 FENCING AND GATES
Protection 1 ............................................... 3533 MorphoTrak ..............................................1607 ACTi Corporation ......................................4345
PSA Security Network ...............................2548 Napco Security Technologies, Inc............. 3120 AlutelMobility ........................................... 2547
RS2 Technologies, LLC. ............................. 3754 Open Options, L.P. ......................................625 Alvarado Turnstiles...................................4433
Securitag Assembly Group........................3883 Princeton Identity .....................................2847 AMAG Technology, Inc. ............................. 3823
Securitas Electronic Security, Inc .............2708 Protection 1 ............................................... 3533 Ameristar Security Products ..................... 3517
Security-Net, Inc ....................................... 4333 RS2 Technologies, LLC. ............................. 3754 Apollo ....................................................... 3033
Sielox, LLC. ............................................... 1533 Security-Net, Inc ....................................... 4333 AutoGate, Inc. ........................................... 2539
Site-Secure ................................................. 500 Sielox, LLC. ............................................... 1533 Automatic Systems S.A. ............................4461
STOPware, Inc .......................................... 2247 Stanley Security ........................................ 3133 Aventura Technologies .............................2947
Team NiSCA ............................................... 840 Stone Lock Global .....................................4455 AWID, Inc.................................................. 2139
Unipro Uniforms .......................................2026 Tascent .......................................................901 B&B Roadway and Security Solutions.......4367
Vanderbilt Industries ................................ 4261 Telaeris, Inc ..............................................2646 Betafence USA ........................................... 540
Vision Database Systems ............................ 611 Transformational Security, LLC. ...............3867 Boon Edam, Inc. ...................................... 4003

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 82 08/17/2017 11:17:47 AM


Continental CA4K End-to-End Security Management Platform –
Now with Wireless Access Lock & POE Controller Integration.
Easy to Deploy. Easy to Afford. Easy to Use

CA4K enterprise security management solution integrates access control, video, alarms & now advanced
wireless locking. The advanced, easy-to-use one-box solution expands with your needs, covering a small
system of few doors, to multi-global sites and unlimited users – and there’s no annual software licensing.

For dramatic labor-savings, CA4K has more wireless options: Seamless integration with a full line of
Wireless Networx® & ArchiTech™ Custom Designer locks with built-in HID®, iClass® or multi-technology
smart readers; as well as Continental’s new POE uniVerse™ single door controller, plus field-upgradable
conventional hardwired controllers. All with the industry’s longest warranties.

• Enterprise Access Control systems • Conventional, POE & Wireless Lock Controllers
platform scalable from 1 to thousands
of doors & unlimited users • Campus/university/K-12 lockdown solutions

• No yearly license fees; Lowest TCO • Integrated with a wide variety of other
partners for badging, biometrics,
• Fastest processing in the industry building management & video

Test drive it at ASIS Booth 3120 & Enter to


Win a FREE Apple iPad Pro®

www.continentalaccess.com or 1-800-645-9445
Continental Access, CA4K, uniVerse POE & iLock are trademarks of Continental division of Napco. Other marks property of their respective cos.
For product info #45 securitymgmt.hotims.com
84
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Brivo ......................................................... 4353 Modular Security Systems, Inc................... 909 Betafence USA ........................................... 540
Cochrane USA ............................................. 513 Nasatka Security ...................................... 1000 Blast Structures ........................................1054
CodeLynx, LLC .......................................... 1620 NVT Phybridge ..........................................2443 BulletSafe Bulletproof Vests .....................4569
CyberLock, Inc. ......................................... 2214 PetroCloud, LLC ........................................ 4163 CyberLock, Inc. ......................................... 2214
Designed Security, Inc. ............................. 2723 Prime Base, Inc. ........................................ 4391 Deansteel Manufacturing Company, Inc. ...2116
DeTekion Security Systems, Inc. .............. 2008 PRO Barrier Enginering............................. 3981 ECAMSECURE ........................................... 4197
DoorKing, Inc............................................ 2520 Protech/Protection Technologies, Inc. ...... 1100 Fast Pass Visitor Management .................. 4173
Dynetics, Inc. .............................................. 519 Q-SAQ, Inc. ............................................... 1548 IDScan.net ..................................................916
ECAMSECURE ........................................... 4197 Razor Ribbon ............................................ 2109 International Road Dynamics, Inc. ........... 4191
Electric Guard Dog ..................................... 405 Ross Technology Corporation ....................2133 KINETIC CONSULTING ............................... 849
ENSCO ...................................................... 4553 Security-Net, Inc. ...................................... 4333 Modular Connections, LLC........................ 1524
EPCOM ...................................................... 4591 Senstar, Inc. ..............................................4296 Modular Security Systems, Inc................... 909
FAAC International .....................................425 Surelock McGill ......................................... 4177 Par-Kut International, Inc. ....................... 4438
Future Fibre Technologies ..........................825 System Surveyor ........................................ 905 Prime Base, Inc. ........................................ 4391
Galaxy Control Systems ............................ 2241 TagMaster North America, Inc. .................3885 Prosegur .....................................................433
Gibraltar ..................................................... 811 TCP-Security Solutions.............................. 4552 Shield Security Doors ................................1525
HID Global ............................................... 3009 Total Automation Group, Inc. .....................333 Surelock McGill ......................................... 4177
HySecurity Gate Operators ........................ 1733 Transmitter Solutions ............................... 1923 TCP-Security Solutions.............................. 4552
International Road Dynamics, Inc. ........... 4191 Vanderbilt Industries ................................ 4261 KEYS AND LOCKS
Isotec Security ..........................................1648 Wallace Perimeter Security ....................... 1041 Alarm Lock ............................................... 3120
KEY-BAK ................................................... 1643 WireWall by Riverdale Mills ........................502 Allegion .................................................... 2333
Matrix ComSec, Pvt., Ltd.............................740 GUARD SHELTERS AND EQUIPMENT iversal Security Services ........................... 2733
Maxstop by: C.E. Shepherd CO., L.P. .........4077 AmberBox ................................................... 725 BEKEY A/S .................................................1921

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 84 08/17/2017 11:17:55 AM


85
SEP 2017 | SECURITY MANAGEMENT

BQT Solutions ........................................... 1423 Prime Base, Inc ......................................... 4391 AWID, Inc ................................................. 2139
Brivo ......................................................... 4353 Prosegur .....................................................433 BEKEY A/S .................................................1921
BTU Research ...........................................3601 Security Center .........................................4692 Bosch Security Systems ............................ 3333
CaptureTech .............................................4370 Security-Net, Inc ....................................... 4333 BQT Solutions ........................................... 1423
ColorID, LLC. ............................................2248 Shield Security Doors ................................1525 Brivo ......................................................... 4353
CyberLock, Inc .......................................... 2214 Sielox, LLC. ............................................... 1533 CaptureTech .............................................4370
DIRAK .........................................................714 Surelock McGill......................................... 4177 CodeLynx, LLC. ......................................... 1620
DMP .......................................................... 2833 TOUGHDOG SECURITY SYSTEMS ............. 3501 ColorID, LLC. ............................................2248
DoorKing, Inc ........................................... 2520 Townsteel, Inc ........................................... 2111 Convergint Technologies, LLC. ................. 1332
Dortronics Systems, Inc ............................ 1925 Transmitter Solutions ............................... 1923 CyberLock, Inc .......................................... 2214
ELC Security Products............................... 1539 TydenBrooks Security Products Group .....1504 Cypress Integration Solutions ....................2115
Essentra Components .............................. 4084 Vanderbilt Industries................................ 4261 Dahua Technology USA, Inc ..................... 4145
FRONTSTEPS ............................................ 3973 READERS Deister Electronics USA, Inc ..................... 2033
Galaxy Control Systems ............................ 2241 Access Specialties International, LLC. ...... 1943 DIRAK .........................................................714
GeoVision, Inc .......................................... 3547 AES Cybersecurity ....................................1048 Document Security Alliance .....................4283
InstaKey Security Systems ........................ 3142 Aiphone Corporation .................................1321 DoorKing, Inc ........................................... 2520
International Road Dynamics, Inc ............ 4191 Alarm Lock ............................................... 3120 FRONTSTEPS ............................................ 3973
KEY-BAK ................................................... 1643 AlertEnterprise .........................................1009 G4S ........................................................... 3733
Lifesafety Power, Inc ................................ 1341 Allegion .................................................... 2333 Galaxy Control Systems ............................ 2241
Marks USA ................................................ 3120 Allied Universal Security Services ............ 2733 GeoVision, Inc .......................................... 3547
Matrix ComSec, Pvt., Ltd............................ 740 AlutelMobility ........................................... 2547 Handheld .................................................. 1622
McGard, LLC. ........................................... 4440 Alvarado Turnstiles ..................................4433 Hexicurity, Inc ..........................................4269
Morse Watchmans, Inc ............................. 1633 Apollo .......................................................3033 HID Global ............................................... 3009
Napco Security Technologies, Inc............. 3120 ARH, Inc ................................................... 1015 Identiv ...................................................... 3617
Open Options, L.P. ......................................625 Aventura Technologies .............................2947 IDScan.net ..................................................916

See us at ASIS Booth 501 For product info #46 securitymgmt.hotims.com

09-17 Exhibit Guide v2 LO.indd 85 08/21/2017 6:03:48 PM


86
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Integrated Control Technology (USA), TagMaster North America, Inc ..................3885 KeyTrak, Inc.............................................. 2641
LLC./ICT.................................................... 3991 Telaeris, Inc ..............................................2646 Kingston Technoloigy ............................... 3791
International Road Dynamics, Inc ............ 4191 TOUGHDOG SECURITY SYSTEMS ............. 3501 Prime Base, Inc. ........................................ 4391
Iris ID Systems, Inc ...................................1309 Transmitter Solutions ............................... 1923 Security Center .........................................4692
Johnson Controls ...................................... 4119 Vanderbilt Industries................................ 4261 Security-Net, Inc. ...................................... 4333
Monitor Dynamics .................................... 3143 Viking Electronics..................................... 2022 Shield Security Doors ................................1525
NEDAP ........................................................619 Vision Database Systems ............................ 611 Transformational Security, LLC ................3867
NVT Phybridge .........................................2443 Xtec, Inc....................................................3047 WireWall by Riverdale Mills ........................502
Peripheral Dynamics, Inc .........................2240 SAFES, VAULTS, AND SECURITY SMART CARDS
Protection 1 ............................................... 3533 CONTAINERS Access Specialties International, LLC. ...... 1943
Resolver .................................................... 2741 AmberBox ................................................... 725 AlertEnterprise .........................................1009
RS2 Technologies, LLC. ............................. 3754 Crotega .................................................... 4480 AlutelMobility ........................................... 2547
Securitas Electronic Security, Inc .............2708 CyberLock, Inc. ......................................... 2214 AMAG Technology, Inc ............................. 3823
Security Center .........................................4692 Deansteel Manufacturing Company, Inc. ...2116 AmberBox ................................................... 725
Sielox, LLC. ............................................... 1533 Deister Electronics USA, Inc...................... 2033 Apollo .......................................................3033
Smarter Security ....................................... 4253 ELC Security Products ............................... 1539 Aventura Technologies .............................2947
Stanley Security ........................................ 3133 Gunnebo Entrance Control ....................... 2533 AWID, Inc ................................................. 2139
STOPware, Inc .......................................... 2247 Iron Mountain Government Services ....... 4398 B-Id, LLC. ................................................. 4476
System Surveyor ........................................ 905 Key Tracer Systems, Inc. ........................... 3441 BQT Solutions ........................................... 1423

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 86 08/17/2017 11:18:19 AM


87
SEP 2017 | SECURITY MANAGEMENT

CodeLynx, LLC. ......................................... 1620 Monitor Dynamics .................................... 3143 Apollo .......................................................3033
ColorID, LLC. ............................................2248 MorphoTrak ..............................................1607 Automatic Systems S.A. ............................4461
Convergint Technologies, LLC. ................. 1332 NEDAP ........................................................619 Aventura Technologies .............................2947
CyberLock, Inc .......................................... 2214 NVT Phybridge .........................................2443 Betafence USA ........................................... 540
Deister Electronics USA, Inc ..................... 2033 Open Options, L.P. ......................................625 Boon Edam, Inc ....................................... 4003
DIRAK .........................................................714 Peripheral Dynamics, Inc .........................2240 CodeLynx, LLC. ......................................... 1620
Document Security Alliance .....................4283 Prime Base, Inc ......................................... 4391 Convergint Technologies, LLC. ................. 1332
Fast Pass Visitor Management .................. 4173 Protection 1 ............................................... 3533 Delta Turnstiles, LLC. ...............................3869
FRONTSTEPS ............................................ 3973 RS2 Technologies, LLC. ............................. 3754 Designed Security, Inc .............................. 2723
G4S ........................................................... 3733 Securitag Assembly Group........................3883 ECAMSECURE ........................................... 4197
Galaxy Control Systems ............................ 2241 Security Center .........................................4692 EPCOM ...................................................... 4591
Handheld .................................................. 1622 Security-Net, Inc ....................................... 4333 FAAC International .....................................425
Hexicurity, Inc ..........................................4269 Sielox, LLC. ............................................... 1533 Fast Pass Visitor Management .................. 4173
HID Global ............................................... 3009 TagMaster North America, Inc ..................3885 G4S ........................................................... 3733
ID Connection ........................................... 2110 Team NiSCA ............................................... 840 Galaxy Control Systems ............................ 2241
IdentiSys, Inc ............................................ 2015 TOUGHDOG SECURITY SYSTEMS ............. 3501 Gunnebo Entrance Control ....................... 2533
Identiv ...................................................... 3617 Transmitter Solutions ............................... 1923 Hexicurity, Inc ..........................................4269
Integrated Control Technology (USA), TydenBrooks Security Products Group .....1504 Horton Automatics ................................... 1033
LLC./ICT.................................................... 3991 Vanderbilt Industries................................ 4261 International Road Dynamics, Inc ............ 4191
International Road Dynamics, Inc ............ 4191 Vision Database Systems ............................ 611 Isotec Security ..........................................1648
Iris ID Systems, Inc ...................................1309 Xtec, Inc....................................................3047 Modular Security Systems, Inc .................. 909
Iris, Ltd., Inc .............................................3966 TURNSTILES Orion Entrance Control, Inc ......................4381
Johnson Controls ...................................... 4119 Access Specialties International, LLC. ...... 1943 Q-SAQ, Inc ................................................ 1548
KEY-BAK ................................................... 1643 Allied Universal Security Services ............ 2733 Security-Net, Inc ....................................... 4333
Matrix ComSec, Pvt., Ltd............................ 740 Alvarado Turnstiles ..................................4433 Smarter Security ....................................... 4253

See us at ASIS Booth 4577 For product info #47 securitymgmt.hotims.com

09-17 Exhibit Guide v2 LO.indd 87 08/17/2017 11:18:29 AM


88
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

CyberLock, Inc .......................................... 2214


Cypress Integration Solutions ....................2115
Data Comm for Business ........................... 1641
DoorBird ................................................... 2350
DoorKing, Inc ........................................... 2520
ECAMSECURE ........................................... 4197
Epiq Solutions ......................................... 4690
Fast Pass Visitor Management .................. 4173
FRONTSTEPS ............................................ 3973
G4S ........................................................... 3733
Galaxy Control Systems ............................ 2241
HID Global ............................................... 3009
Iris ID Systems, Inc ...................................1309
Johnson Controls ...................................... 4119
Matrix ComSec, Pvt., Ltd............................ 740
NASCOM ..................................................... 821
Parabit Systems, Inc .................................3041
PetroCloud, LLC ........................................ 4163
RS2 Technologies, LLC. ............................. 3754
Security USA Services, LLC. ....................... 504
Sielox, LLC. ............................................... 1533
Stanley Security ........................................ 3133
Telaeris, Inc ..............................................2646
Transmitter Solutions ............................... 1923
UrgentLink................................................ 1053
Vanderbilt Industries................................ 4261
Xtec, Inc....................................................3047
ACCESSORIES, FURNITURE,
AND VEHICLES
BATTERIES, CONSOLES, RACKS, &
POWER SOURCES
Altronix Corporation................................. 2823
Galls..........................................................4672
Lifesafety Power, Inc ................................ 1341
Newmar ................................................... 4097
Prime Base, Inc ......................................... 4391
Security-Net, Inc ....................................... 4333
Sielox, LLC. ............................................... 1533
V5 Systems............................................... 4290
Winsted ......................................................833
SHREDDERS AND OTHER
DOCUMENT DESTRUCTION
EQUIPMENT
Iron Mountain Government Services ....... 4398
Trust Farm, LLC. ........................................ 946
SURGE PROTECTORS
BTU Research ...........................................3601
DITEK Surge Protection ..............................701
TCP-Security Solutions ............................. 4552 AmberBox ................................................... 725 Prime Base, Inc ......................................... 4391
Total Automation Group, Inc ......................333 Apollo .......................................................3033 Security-Net, Inc ....................................... 4333
Vanderbilt Industries................................ 4261 BEKEY A/S .................................................1921 Unipro Uniforms .......................................2026
WIRELESS Brivo ......................................................... 4353 VEHICLES AND UNIFORMS
Access Specialties International, LLC. ...... 1943 BTU Research ...........................................3601 BulletSafe Bulletproof Vests .....................4569
AES Cybersecurity ....................................1048 Convergint Technologies, LLC. ................. 1332 Galls..........................................................4672
Allegion .................................................... 2333 Cyber Defense Labs...................................1046 KINETIC CONSULTING............................... 849

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 88 08/17/2017 11:18:35 AM


Everybody.

Everywhere.

Every day.

Ordinary days require extraordinary protection.

Find out more about the software behind the everyday at


genetec.com genetec.com/protectingeveryday

See us at ASIS Booth 3147 For product info #48 securitymgmt.hotims.com


© 2017 Genetec Inc. GENETEC and the GENETEC LOGO are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.
90
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Liberty Uniform Manufacturing G4S ........................................................... 3733 Telgian Corporation .................................. 1541
Company, Inc ...........................................4366 Galaxy Control Systems ............................ 2241 Transformational Security, LLC. ...............3867
On Guard Apparel .....................................4091 GeoVision, Inc .......................................... 3547 ANNUNCIATORS
Unipro Uniforms .......................................2026 Integrated Control Technology (USA), Alertus Technologies ................................2246
Unitex Direct, Inc......................................4166 LLC./ICT .................................................... 3991 Bosch Security Systems ............................ 3333
WEAPONS (NON-LETHAL AND International Road Dynamics, Inc ............ 4191 Convergint Technologies, LLC. ................. 1332
FIREARMS) Isotec Security ..........................................1648 Designed Security, Inc .............................. 2723
AmberBox ................................................... 725 Johnson Controls ...................................... 4119 DeTekion Security Systems, Inc ............... 2008
Crotega .................................................... 4480 KeyTrak, Inc ............................................. 2641 DMP .......................................................... 2833
KINETIC CONSULTING............................... 849 Lifesafety Power, Inc ................................ 1341 Dortronics Systems, Inc ............................ 1925
On Guard Apparel .....................................4091 Micro Technology Services, Inc................. 3967 ENSCO ...................................................... 4553
ALARM SYSTEMS Napco Security Technologies, Inc............. 3120 Micro Technology Services, Inc................. 3967
CONTROL PANELS NVT Phybridge .........................................2443 Napco Security Technologies, Inc............. 3120
AmberBox ................................................... 725 Open Options, L.P. ......................................625 NVT Phybridge .........................................2443
Apollo .......................................................3033 Prime Base, Inc ......................................... 4391 OPTEX.......................................................1807
Bosch Security Systems ............................ 3333 Prosegur .....................................................433 Patlite (U.S.A.) Corporation ...................... 4577
BrickHouse Security .................................2249 Protection 1 ............................................... 3533 Rath Security .............................................. 917
Convergint Technologies, LLC. ................. 1332 Rath Security .............................................. 917 Securitas Electronic Security, Inc .............2708
Designed Security, Inc .............................. 2723 Resolver .................................................... 2741 Security Center .........................................4692
DMP .......................................................... 2833 Securitas Electronic Security, Inc .............2708 Security-Net, Inc ....................................... 4333
Dortronics Systems, Inc ............................ 1925 Security Center .........................................4692 TAKEX America, Inc ................................ 4666
ECAMSECURE ........................................... 4197 Security-Net, Inc ....................................... 4333 CENTRAL STATION MONITORING
Electric Guard Dog ..................................... 405 System Surveyor ........................................ 905 AccuWeather Enterprise Solutions, Inc..... 2138

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 90 08/17/2017 11:18:51 AM


91
SEP 2017 | SECURITY MANAGEMENT

ACTi Corporation ......................................4345 Security Center .........................................4692 Napco Security Technologies, Inc. ............ 3120
Allied Universal Security Services ............ 2733 Security Information Systems, Inc ............ 1642 NASCOM ..................................................... 821
AmberBox ................................................... 725 Security USA Services, LLC. ....................... 504 NVT Phybridge ..........................................2443
Apollo .......................................................3033 Security-Net, Inc ....................................... 4333 Prime Base, Inc. ........................................ 4391
Axis Communications ...............................4032 SentryNet ...................................................2222 Quanergy .................................................. 3771
Battelle .....................................................4292 Southwest Microwave, Inc ........................ 2232 Resolver .................................................... 2741
Bold Technologies, Ltd. ............................ 1032 Stanley Security ........................................ 3133 Security Center .........................................4692
BrickHouse Security .................................2249 V5 Systems............................................... 4290 Security USA Services, LLC ........................ 504
CNL Software, Inc .....................................3656 ViewZ ........................................................ 3891 Security-Net, Inc. ...................................... 4333
Dynetics, Inc ............................................... 519 Vismo Global Tracking Solutions............. 4469 System Surveyor ........................................ 905
ECAMSECURE ........................................... 4197 Weiser Security Services, Inc ....................2208 Transformational Security, LLC ................3867
Edwards .................................................... 1301 DOOR AND WINDOW, HARDWARE, V5 Systems ............................................... 4290
ENSCO ...................................................... 4553 ELECTRONIC ARTICLE SURVEILLANCE BLAST MITIGATION AND
G4S ........................................................... 3733 SENSORS BULLET RESISTANCE AND
Galaxy Control Systems ............................ 2241 Battelle .....................................................4292 BLAST RESISTANT MATERIALS
GeoVision, Inc .......................................... 3547 B-Id, LLC .................................................. 4476 BLAST RESISTANT WALLS
Gorilla Technology, Inc ........................... 4069 Bosch Security Systems ............................ 3333 AmberBox ................................................... 725
International Road Dynamics, Inc ............ 4191 BrickHouse Security ................................. 2249 ArmorCore by Waco Composites ................ 609
Johnson Controls ...................................... 4119 CodeLynx, LLC .......................................... 1620 Betafence USA ........................................... 540
PetroCloud, LLC. ....................................... 4163 DMP .......................................................... 2833 Blast Structures ........................................1054
Prime Base, Inc ......................................... 4391 GeoVision, Inc. ......................................... 3547 BulletSafe Bulletproof Vests .....................4569
Prosegur .....................................................433 HSI Sensing .............................................. 3877 Deansteel Manufacturing Company, Inc.... 2116
Protection 1 ............................................... 3533 Isotec Security ..........................................1648 Isotec Security ..........................................1648
Securitas Electronic Security, Inc .............2708 Lifesafety Power, Inc..................................1341 Modular Connections, LLC........................ 1524
Securitas Security Services USA, Inc ....... 2809 Magnasphere Corp ................................... 2009 Security Centres International USA, LLC...1843

“We aim to protect property and


provide peace of mind by providing
remarkable perimeter security
products and unrivaled service.”

EMILY SULLIVAN
11 years • Mission Critical Business Development

We know people make the difference for your business and ours.
Our experienced team thrives on providing the products and
service that lead to total perimeter security solutions.
AMERISTARSECURITY.COM | 888-333-3422

See us at ASIS Booth 3517 For product info #49 securitymgmt.hotims.com

09-17 Exhibit Guide v2 LO.indd 91 08/17/2017 11:19:11 AM


92
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

TCP-Security Solutions ............................. 4552 Shield Security Doors ................................1525 KeyTrak, Inc ............................................. 2641
BUILDING MATERIALS Surelock McGill ......................................... 4177 Kingston Technology ................................ 3791
ArmorCore by Waco Composites ................ 609 System Surveyor ........................................ 905 Prime Base, Inc ......................................... 4391
Blast Structures ........................................1054 Townsteel, Inc ........................................... 2111 Security-Net, Inc ....................................... 4333
BulletSafe Bulletproof Vests .....................4569 FRAMING SYSTEMS Shield Security Doors ................................1525
Deansteel Manufacturing Company, Inc.... 2116 Blast Structures ........................................1054 Transformational Security, LLC. ...............3867
Kelly’s 5 Distribution, LLC. ....................... 1647 Deansteel Manufacturing WireWall by Riverdale Mills........................502
Modular Connections, LLC........................ 1524 Company, Inc.... .........................................2116 WINDOWS (GLAZING, FILMS)
Prime Base, Inc ......................................... 4391 Isotec Security ..........................................1648 AmberBox ................................................... 725
Shield Security Doors ................................1525 Security Centres International USA, LLC...1843 Blast Structures ........................................1054
Signals Defense, LLC. .............................. 4076 PENETRATION TESTING Covestro, LLC. .......................................... 4085
TCP-Security Solutions.............................. 4552 AmberBox ................................................... 725 Deansteel Manufacturing
DOORS AND HARDWARE Security Centres International USA, LLC...1843 Company, Inc.... .........................................2116
Allegion .................................................... 2333 Shield Security Doors ................................1525 Isotec Security ..........................................1648
Blast Structures ........................................1054 SAFES, VAULTS, AND SECURITY LTI Group, The ......................................... 4083
Boon Edam, Inc ....................................... 4003 CONTAINERS Madico Window Films .............................. 4193
Deansteel Manufacturing Company, Inc.... 2116 AmberBox ................................................... 725 Ross Technology Corporation ....................2133
Horton Automatics.................................... 1033 Crotega .................................................... 4480 Security Center .........................................4692
Isotec Security ..........................................1648 CyberLock, Inc .......................................... 2214 Security Centres International USA, LLC...1843
Prime Base, Inc ......................................... 4391 Deansteel Manufacturing Company, Inc....2116 Shield Security Doors ................................1525
Ross Technology Corporation ....................2133 Deister Electronics USA, Inc ..................... 2033 Signals Defense, LLC. .............................. 4076
Security Center .........................................4692 Iron Mountain.......................................... 4398 COMMUNICATION
Security Centres International USA, LLC...1843 Key Tracer Systems, Inc ............................3441 GLOBAL POSITIONING SYSTEMS

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 92 08/17/2017 11:19:24 AM


For product info #50 securitymgmt.hotims.com
94
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

3SI Security Systems ................................. 2124 INTERCOM SYSTEMS Viking Electronics ..................................... 2022
Activist Map ..............................................4472 Access Specialties International, LLC. ...... 1943 MASS NOTIFICATION
AlutelMobility ........................................... 2547 ACTi Corporation ......................................4345 AccuWeather Enterprise Solutions, Inc..... 2138
AT-RISK International ............................... 4271 Aiphone Corporation .................................1321 Alertus Technologies ................................2246
BrickHouse Security ................................. 2249 AmberBox ................................................... 725 All Traffic Solutions ..................................4467
ELC Security Products ............................... 1539 Aventura Technologies .............................2947 AmberBox ................................................... 725
FRONTSTEPS ............................................ 3973 Bosch Security Systems ............................ 3333 Battelle .....................................................4292
Guardian Zone .......................................... 4178 Code Blue Corporation ...............................1741 Cambridge Sound Management ............... 4099
Handheld .................................................. 1622 Commend, Inc ..........................................1409 Code Blue Corporation ...............................1741
Hexagon Safety & Infrastructure................1215 Convergint Technologies, LLC....................1332 Convergint Technologies, LLC ....................1332
International Road Dynamics, Inc. ........... 4191 DoorBird ................................................... 2350 DHS Infrastructure Protection .................. 1147
Johnson Controls ...................................... 4119 DoorKing, Inc............................................ 2520 Edwards .................................................... 1301
KINETIC CONSULTING ............................... 849 FRONTSTEPS ............................................ 3973 Emergency Communications Network ...... 4371
Live Earth..................................................4079 GAI-Tronics Corporation ............................1915 ENSCO ...................................................... 4553
NC4, Inc. .....................................................501 International Road Dynamics, Inc ............ 4191 FRONTSTEPS ............................................ 3973
NVT Phybridge ..........................................2443 Louroe Electronics .................................... 3243 G4S ........................................................... 3733
Ontario-Canada Delegation ........................507 Matrix ComSec, Pvt., Ltd.............................740 GAI-Tronics Corporation ............................1915
Qognify ......................................................1515 Micro Technology Services, Inc................. 3967 Galaxy Control Systems ............................ 2241
Resolver .................................................... 2741 NVT Phybridge ..........................................2443 Guardian Zone .......................................... 4178
Safety Vision .............................................. 409 Open Options, L.P. ......................................625 Hedge Tactical Solutions ..........................4299
Security Centres International Prime Base, Inc ......................................... 4391 IJET International ..................................... 3763
USA, LLC ...................................................1843 Rath Security .............................................. 917 International Road Dynamics, Inc. ........... 4191
Sensitech .................................................. 1639 Rave Mobile Safety....................................4676 IPVideo Corporation ..................................1114
Site-Secure ................................................. 500 Security USA Services, LLC. ....................... 504 iView Systems ........................................... 1601
Stratfor .....................................................4583 Security-Net, Inc ....................................... 4333 Johnson Controls ...................................... 4119
The Anvil Group, Ltd. ............................... 1241 Systech Electronics Limited ......................2447 KINETIC CONSULTING ............................... 849
TrackTik ......................................................733 System Surveyor ........................................ 905 Micro Technology Services, Inc................. 3967
Vismo Global Tracking Solutions ............. 4469 Talkaphone ................................................1123 NC4, Inc. .....................................................501

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 94 08/17/2017 11:19:35 AM


CAN YOU SPOT WHO IS A
SECURITY RISK?
CAN.

iTRAK IS AN UNIFIED SOFTWARE


PLATFORM FOR INCIDENT, RISK
MANAGEMENT, VISITOR MANAGEMENT
AND IDENTIFICATION SOLUTIONS
iTrak delivers exceptional reporting capabilities and
compliance against a wide range of requirements
and is available as both an on premise or cloud
based solution helping businesses consolidate and
simplify physical security reporting aiding in
tracking, analyzing and investigating events
consistently across multiple departments, including
security, surveillance and risk management.

Visit us at booth #1601 at this coming


ASIS Annual Seminar and Exhibits
www.iviewsystems.com
For product info #51 securitymgmt.hotims.com
96
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Stratfor .....................................................4583
Talkaphone ................................................1123
TrackTik ......................................................733
Trust Farm, LLC.......................................... 946
UrgentLink ................................................ 1053
V5 Systems ............................................... 4290
Viking Electronics ..................................... 2022
Vismo Global Tracking Solutions ............. 4469
SIGNAL TRANSMISSION
ACTi Corporation ......................................4345
ComNet ..................................................... 1509
Epiq Solutions ......................................... 4690
Guardian Zone .......................................... 4178
Intercoax Company, Ltd. ...........................2648
International Road Dynamics, Inc ............ 4191
Johnson Controls ...................................... 4119
Matrix ComSec, Pvt., Ltd.............................740
NVT Phybridge ..........................................2443
Prime Base, Inc ......................................... 4391
Proxim Wireless ........................................4376
Rath Security .............................................. 917
Security-Net, Inc ....................................... 4333
Surf Communication Solutions ................. 4571
UrgentLink ................................................ 1053
STATION DISPATCH SYSTEM
Battelle .....................................................4292
Crotega .................................................... 4480
Cyrun ........................................................4072
G4S ........................................................... 3733
GAI-Tronics Corporation ............................1915
Guardian Zone .......................................... 4178
International Road Dynamics, Inc ............ 4191
iView Systems ........................................... 1601
Live Earth..................................................4079
Locktek, Inc .............................................. 1801
Motorola Solutions ................................... 2347
NVT Phybridge ..........................................2443
Omnigo Software ........................................518
Resolver .................................................... 2741
Security-Net, Inc ....................................... 4333
Site-Secure ................................................. 500
Trackforce ................................................. 2747
TrackTik ......................................................733
UrgentLink ................................................ 1053
CONSULTING
CRISIS MANAGEMENT
Neighborhood Watch for Corporations ...... 420 Resolver .................................................... 2741 Alpha Recon ............................................. 1707
NVT Phybridge ..........................................2443 RF Technologies........................................ 2147 Diversified................................................. 1746
Omnigo Software ........................................518 SAM, Inc. .................................................. 2142 Emergent Risk International, LLC .............. 390
Patlite (U.S.A.) Corporation ...................... 4577 Security USA Services, LLC ........................ 504 Evans Federal Solutions .............................338
PlanetRisk..................................................1141 Security-Net, Inc. ...................................... 4333 Grupo Securitas Mexico ........................... 2809
Qognify ......................................................1515 Sielox, LLC .................................................1533 Guardian Zone .......................................... 4178
QuickSeries Publishing.............................. 920 Singlewire Software .................................. 4572 HX Global ................................................ 4390
Rath Security .............................................. 917 Site-Secure ................................................. 500 IJET International ..................................... 3763
Rave Mobile Safety....................................4676 STOPware, Inc. ......................................... 2247 KINETIC CONSULTING ............................... 849

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 96 08/17/2017 11:19:45 AM


97
SEP 2017 | SECURITY MANAGEMENT

Kingston Technoloigy ............................... 3791 ODNI’s National Counterintelligence and DHS Infrastructure Protection .................. 1147
Medjet ....................................................... 3971 Security Center .......................................... 643 Edwards .................................................... 1301
On Call International ................................4596 On Call International ................................4596 EVAC+CHAIR North America, LLC. ........... 1326
Pinkerton ................................................. 2809 Security Centres International USA, LLC...1843 G4S ........................................................... 3733
Securitas Canada, Ltd. ............................. 2809 Stratfor .....................................................4583 Johnson Controls ...................................... 4119
Security Centres International USA, LLC.. 2809 The Anvil Group, Ltd. ............................... 1241 Key Tracer Systems, Inc ............................ 3441
Stanley Security .........................................3133 Trust Farm, LLC. ........................................ 946 KINETIC CONSULTING ............................... 849
Telaeris, Inc. .............................................2646 Verint Systems, Inc ................................... 2623 Live Earth..................................................4079
The Anvil Group, Ltd. ............................... 1241 Vismo Global Tracking Solutions ............. 4469 Napco Security Technologies, Inc ............. 3120
Trust Farm, LLC.......................................... 946 MANAGEMENT CONSULTING NVT Phybridge ..........................................2443
UrgentLink ................................................ 1053 Emergent Risk International, LLC. ............3970 Prime Base, Inc ......................................... 4391
Vismo Global Tracking Solutions ............. 4469 Global Security News Wire ....................... 3868 Protection 1 ............................................... 3533
Welund ......................................................4113 International Association of Professional Qognify ......................................................1515
EVENTS Security Consultants (IAPSC)................... 4095 QuickSeries Publishing.............................. 920
ISC Events/Security Industry Iris ID Systems, Inc ................................... 1309 Rath Security .............................................. 917
Association ................................................. 413 KINETIC CONSULTING ............................... 849 Securitas Electronic Security, Inc..............2708
INTELLIGENCE ANALYSIS Security Centres International USA, LLC...1843 Singlewire Software .................................. 4572
CAP Index, Inc .......................................... 3433 Trust Farm, LLC. ........................................ 946 System Surveyor ........................................ 905
Emergent Risk International, LLC. ............3970 CRISIS AND EMERGENCY Telaeris, Inc ..............................................2646
FARO .........................................................2647 MANAGEMENT Telgian Corporation ...................................1541
Global Security News Wire ....................... 3868 FIRE PREVENTION AND SAFETY MASS NOTIFICATION
Gorilla Technology, Inc ............................ 4069 Allied Universal Security Services ............ 2733 AccuWeather Enterprise Solutions, Inc..... 2138
HX Global ................................................ 4390 Apollo ....................................................... 3033 Alertus Technologies ................................2246
IJET International ..................................... 3763 Battelle .....................................................4292 All Traffic Solutions ..................................4467
KINETIC CONSULTING ............................... 849 Convergint Technologies, LLC....................1332 AmberBox ................................................... 725

See us at ASIS Booth 1409 For product info #52 securitymgmt.hotims.com

09-17 Exhibit Guide v2 LO.indd 97 08/17/2017 11:19:58 AM


98
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Arbor Insight, LLC. .................................... 420 Resolver .................................................... 2741 beTravelwise ............................................. 1549
Battelle .....................................................4292 RF Technologies........................................ 2147 CodeLynx, LLC .......................................... 1620
Cambridge Sound Management ............... 4099 SAM Inc .................................................... 2142 Department of Homeland Security/Emergency
Code Blue Corporation ...............................1741 Security USA Services, LLC. ....................... 504 Services Sector .......................................... 1149
Convergint Technologies, LLC....................1332 Security-Net, Inc ....................................... 4333 EAGL Technology ....................................... 504
Emergency Communications Network ...... 4371 Sielox, LLC. ................................................1533 EVAC+CHAIR North America, LLC ............ 1326
ENSCO ...................................................... 4553 Singlewire Software .................................. 4572 Everbridge..................................................1101
G4S ........................................................... 3733 STOPware, Inc .......................................... 2247 FAM International Security .......................4169
GAI-Tronics Corporation ............................1915 Stratfor .....................................................4583 Fast Pass Visitor Management .................. 4173
Galaxy Control Systems ............................ 2241 TrackTik ......................................................733 G4S ........................................................... 3733
Hedge Tactical Solutions ..........................4299 V5 Systems ............................................... 4290 Groundwork .............................................. 1447
IJET International ..................................... 3763 Viking Electronics ..................................... 2022 Grupo Securitas Mexico ........................... 2809
International Road Dynamics, Inc ............ 4191 Vismo Global Tracking HX Global ................................................ 4390
iView Systems ........................................... 1601 Solutions.................................................. 4469 Hypersight ................................................1449
Johnson Controls ...................................... 4119 TRAVEL SAFETY & EMERGENCY IJET International ..................................... 3763
Micro Technology Services, Inc................. 3967 SERVICES International Critical Incident Stress
NC4, Inc ......................................................501 AccuWeather Enterprise Solutions, Inc..... 2138 Foundation ...............................................3997
NVT Phybridge ..........................................2443 AFIMAC.....................................................3856 KINETIC CONSULTING ............................... 849
Omnigo Software ........................................518 All Traffic Solutions ..................................4467 Kingston Technology ................................ 3791
Patlite (U.S.A.) Corporation ...................... 4577 Alpha Recon ............................................. 1707 LiveSafe, Inc. ............................................ 1246
PlanetRisk..................................................1141 AmberBox ................................................... 725 Medjet ....................................................... 3971
Qognify ......................................................1515 Amika Mobile..............................................507 NC4, Inc. .....................................................501
QuickSeries Publishing.............................. 920 ARC Training............................................ 4082 Omnigo Software ........................................518
Rath Security .............................................. 917 AT-RISK International ............................... 4271 On Call International ................................4596
Rave Mobile Safety....................................4676 Babel Street............................................... 1748 Pinkerton ................................................. 2809

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 98 08/17/2017 11:20:05 AM


Multi-Sensor.
Multi-Dimensional.
Only Dahua delivers multi-sensor cameras with multi-dimensional advantages for both IP in 6, 8 and 16MP resolutions and
analog (6MP) infrastructures. Dahua’s multi-sensor cameras feature Starlight ultra-low-light technology and exceptional Wide
Dynamic Range for high performance in even the most challenging lighting conditions. For unparalleled reduction in bandwidth
and storage, the cameras boast Dahua’s exclusive Smart H.265+ compression, which saves up to 80% over standard H.264.

16MP Panoramic 6MP IR Bullet HDCVI 3.0 6MP IR 8MP IR Dome 8MP IR Bullet
with PTZ IP Camera IP Camera Bullet Camera IP Camera IP Camera

PROVEN THE WORLD OVER. DahuaSecurity.com/ProvenSurveillance

See us at ASIS Booth 4145 For product info #53 securitymgmt.hotims.com


100
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Qognify ......................................................1515 Emergency Communications Network ...... 4371 SAM, Inc. .................................................. 2142
SAM, Inc. .................................................. 2142 ENSCO ...................................................... 4553 Security USA Services, LLC ........................ 504
Securitas Canada, Ltd. ............................. 2809 FRONTSTEPS ............................................ 3973 Security-Net, Inc. ...................................... 4333
Securitas Critical Infrastructure Services . 2809 G4S ........................................................... 3733 Sielox, LLC .................................................1533
Securitas Security Services USA, Inc. ....... 2809 GAI-Tronics Corporation ............................1915 Singlewire Software .................................. 4572
Singlewire Software .................................. 4572 Galaxy Control Systems ............................ 2241 Site-Secure ................................................. 500
Stanley Security .........................................3133 Guardian Zone .......................................... 4178 STOPware, Inc. ......................................... 2247
Stratfor .....................................................4583 Hedge Tactical Solutions ..........................4299 Stratfor .....................................................4583
Telaeris, Inc ..............................................2646 IJET International ..................................... 3763 Talkaphone ................................................1123
The Anvil Group, Ltd ................................ 1241 International Road Dynamics, Inc. ........... 4191 TrackTik ......................................................733
topo AI ...................................................... 4567 IPVideo Corporation ..................................1114 Trust Farm, LLC.......................................... 946
Trust Farm, LLC.......................................... 946 iView Systems ........................................... 1601 UrgentLink ................................................ 1053
UrgentLink ................................................ 1053 Johnson Controls ...................................... 4119 V5 Systems ............................................... 4290
Vismo Global Tracking Solutions ............. 4469 KINETIC CONSULTING ............................... 849 Viking Electronics ..................................... 2022
Wanco .......................................................4682 Micro Technology Services, Inc................. 3967 Vismo Global Tracking Solutions ............. 4469
Zenitel Group ..............................................923 NC4, Inc. .....................................................501 DETECTION
WORKPLACE VIOLENCE Neighborhood Watch for Corporations ...... 420 BIO-CHEMICAL
AccuWeather Enterprise Solutions, Inc..... 2138 NVT Phybridge ..........................................2443 AES Cybersecurity.....................................1048
Alertus Technologies ................................2246 Omnigo Software ........................................518 Battelle .....................................................4292
All Traffic Solutions ..................................4467 Patlite (U.S.A.) Corporation ...................... 4577 ChemImage .................................................410
AmberBox ................................................... 725 PlanetRisk..................................................1141 ENSCO ...................................................... 4553
Battelle .....................................................4292 Qognify ......................................................1515 Heuresis ...................................................... 312
Cambridge Sound Management ............... 4099 QuickSeries Publishing.............................. 920 Hexagon Safety & Infrastructure................1215
Code Blue Corporation ...............................1741 Rath Security .............................................. 917 International Road Dynamics, Inc ............ 4191
Convergint Technologies, LLC ....................1332 Rave Mobile Safety....................................4676 Qognify ......................................................1515
DHS Infrastructure Protection .................. 1147 Resolver .................................................... 2741 Smiths Detection........................................1415
Edwards .................................................... 1301 RF Technologies........................................ 2147 SRC, Inc .................................................... 1421

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 100 08/17/2017 11:20:17 AM


Your favorite
football team
has a
defensive line.
Your security
system has
Mercury.

Solid. For 25 years, security-conscious organizations have built their systems on the most
solid access control platform in the business. Utilizing best practices in access control and cyber
security, Mercury’s high-performance, rock-solid hardware is the most trusted in the industry.
Strong, reliable and scalable, it’s the ultimate defensive line for facilities. Ask about Mercury.
At the heart of a robust system, it sets the standard for serious security.
Learn more at www.mercury-security.com

Security on solid ground.

Platinum Premier Partner Platinum Elite Partners Platinum Partners

©2017 Mercury Security Corporation

For product info #54 securitymgmt.hotims.com


102
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Telgian Corporation ...................................1541 AFIMAC.....................................................3856 International Road Dynamics, Inc ............ 4191
VMI ............................................................2215 Allied Universal Security Services ............ 2733 Isotec Security ..........................................1648
BOMBS AND EXPLOSIVES Battelle .....................................................4292 NVT Phybridge ..........................................2443
Adani Systems, Inc .....................................633 BulletSafe Bulletproof Vests .....................4569 On Guard Apparel .....................................4091
AmberBox ................................................... 725 K2 Solutions, Inc .......................................4067 Parabit Systems, Inc ................................. 3041
Asqella Oy................................................. 1403 KINETIC CONSULTING ............................... 849 Smiths Detection........................................1415
Autoclear/Scintrex .................................... 4153 Prosegur......................................................433 System Surveyor ........................................ 905
Battelle .....................................................4292 FORENSIC ANALYSIS LABS Tek 84 Engineering ...................................2549
Bruker Detection Corporation ................... 1014 Adani Systems, Inc .....................................633 VMI ............................................................2215
ChemImage .................................................410 AmberBox ................................................... 725 MOTION DETECTORS
Databuoy Corporation ..............................4268 Battelle .....................................................4292 Access Specialties International, LLC. ...... 1943
ENSCO ...................................................... 4553 ChemImage .................................................410 Allied Universal Security Services ............ 2733
GreyScan Pty. Ltd. .................................... 4098 FARO .........................................................2647 AmberBox ................................................... 725
Heuresis ...................................................... 312 Heuresis ...................................................... 312 ARH, Inc ................................................... 1015
International Road Dynamics, Inc ............ 4191 International Road Dynamics, Inc ............ 4191 Aventura Technologies .............................2947
K2 Solutions, Inc .......................................4067 KINETIC CONSULTING ............................... 849 Axis Communications ...............................4032
Louroe Electronics .................................... 3243 SeeQuestor, Inc .........................................4497 Battelle .....................................................4292
Nuctech Company Limited ..........................941 VMI ............................................................2215 Bosch Security Systems ............................ 3333
Qognify ......................................................1515 IMAGING TECHNOLOGIES CAST Lighting, LLC. ................................. 4384
Security Centres International USA, LLC...1843 Commport .................................................4377 CodeLynx, LLC. ......................................... 1620
Smiths Detection........................................1415 ImmerVision ............................................. 2014 DMP .......................................................... 2833
SRC, Inc .................................................... 1421 METAL DETECTORS DoorBird ................................................... 2350
Tek 84 Engineering ...................................2549 AmberBox ................................................... 725 ECAMSECURE ........................................... 4197
Telgian Corporation ...................................1541 Autoclear/Scintrex .................................... 4153 ENSCO ...................................................... 4553
VMI ............................................................2215 Aventura Technologies .............................2947 Future Fibre Technologies ..........................825
CANINES Fisher Labs ............................................... 2114 G4S ........................................................... 3733
3SI Security Systems ................................. 2124 Galls.......................................................... 4672 GeoVision, Inc .......................................... 3547
Activist Map ..............................................4472 Garrett Metal Detectors ............................. 2223 Hexagon Safety & Infrastructure................1215

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 102 08/17/2017 11:20:43 AM


BEST of
The
BOTH WORLDS
Need the convenience of wireless,
and the real-time communication
of online access control?

Then the new IN100 Aperio® wireless


lock is for you.
• Remote lock/unlock in less than 10 seconds
• Streamlined design with your choice of black
or white reader, 50+ levers and 14 finishes
• Simultaneous support for HID Mobile Access®
and multiple credential types, including smart
cards and Prox
• Seamless integration with a broad range of
access control platforms

Available from ASSA ABLOY Group brands:


CORBIN RUSSWIN | SARGENT

ASIS Booth #3203


IntelligentOpenings.com/IN100

A wide range of Aperio wireless devices is


available from ASSA ABLOY Group brands.

Copyright © 2017, ASSA ABLOY, Inc. All rights reserved.


For product info #55 securitymgmt.hotims.com
104
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Hikvision USA ........................................... 3703 Hexagon Safety & Infrastructure................1215 Heuresis ...................................................... 312
International Road Dynamics, Inc ............ 4191 Hikvision USA ........................................... 3703 InFocus .......................................................801
Isotec Security ..........................................1648 KINETIC CONSULTING ............................... 849 International Road Dynamics, Inc ............ 4191
Magnasphere Corp ................................... 2009 NVT Phybridge ..........................................2443 NVT Phybridge ..........................................2443
NVT Phybridge ..........................................2443 Prime Base, Inc ......................................... 4391 Prime Base, Inc ......................................... 4391
OPTEX.......................................................1807 Quanergy .................................................. 3771 Research Electronics ................................. 2324
Parabit Systems, Inc ................................. 3041 Turing Video .............................................. 649 Security Centres International USA, LLC...1843
PetroCloud, LLC. ....................................... 4163 U.S. Security Associates ............................4205 Security USA Services, LLC. ....................... 504
Prime Base, Inc ......................................... 4391 TAMPER-RESISTANT SEALS & LABELS Sengex ........................................................ 421
Protech/Protection Technologies, Inc ....... 1100 ACTi Corporation ......................................4345 SpearTip ...................................................4441
Protection 1 ............................................... 3533 Cambridge Security Seals .........................2546 Telgian Corporation ...................................1541
PureTech Systems ....................................... 915 ELC Security Products ............................... 1539 Transformational Security, LLC. ...............3867
Qognify ......................................................1515 Essentra Components .............................. 4084 Vismo Global Tracking Solutions ............. 4469
Resolver .................................................... 2741 G4S ........................................................... 3733 INFORMATION TECHNOLOGY
Security Center .........................................4692 International Road Dynamics, Inc ............ 4191 & SYSTEMS
Security Centres International USA, LLC...1843 Securitag Assembly Group ........................3883 ACCESS CONTROL AND
Security-Net, Inc ....................................... 4333 Telgian Corporation ...................................1541 AUTHENTICATION
SightLogix.................................................1005 TydenBrooks Security Products Group ..... 1504 Access Specialties International, LLC. ...... 1943
Southwest Microwave, Inc ........................ 2232 TECHNICAL SURVEILLANCE ACTi Corporation ......................................4345
SRC, Inc .................................................... 1421 COUNTERMEASURES (TSCM) AES Cybersecurity.....................................1048
System Surveyor ........................................ 905 AFIMAC.....................................................3856 AlertEnterprise .........................................1009
TAKEX America, Inc................................. 4666 AmberBox ................................................... 725 AMAG Technology, Inc .............................. 3823
Transformational Security, LLC. ...............3867 ARC Training............................................ 4082 Apollo ....................................................... 3033
V5 Systems ............................................... 4290 AT-RISK International ............................... 4271 Aventura Technologies .............................2947
ROBOTICS Battelle .....................................................4292 Avigilon ................................................... 4056
AES Cybersecurity.....................................1048 BrickHouse Security ................................. 2249 AWID, Inc.................................................. 2139
Allied Universal Security Services ............ 2733 CodeLynx, LLC. ......................................... 1620 BEKEY A/S .................................................1921
Cobalt Robotics ...........................................852 Department 13 .............................................653 Betafence USA ........................................... 540
FARO .........................................................2647 Epiq Solutions ......................................... 4690 B-Id, LLC. ................................................. 4476
G4S ........................................................... 3733 Feather-Light Technologies LLC................4293 BTU Research............................................3601

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 104 08/17/2017 11:21:09 AM


Protect what’s most valuable

Avigilon Appearance Search™ video analytics technology is a sophisticated deep


learning artificial intelligence (AI) search engine for video data. It sorts through
hours of footage with ease, to quickly locate a specific person or vehicle of
interest across an entire site.

Avigilon Appearance Search technology can dramatically improve incident


response time and enhance forensic investigations by allowing operators to
build robust video evidence and create a powerful narrative of events.

• Improves incident response time • Accurately provides search results


• Enhances forensic investigations • Easy to learn and use

Visit Avigilon at ASIS Booth 4056 • September 25 - 28


For product info #56 securitymgmt.hotims.com

© 2016-2017, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON APPEARANCE SEARCH and TRUSTED SECURITY SOLUTIONS are trademarks of Avigilon Corporation.
Other names or logos mentioned herein may be the trademarks of their respective owners.
106
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

CaptureTech..............................................4370 Management, Inc ...................................... 2143 TEAM Software, Inc .................................. 2023
CodeLynx, LLC. ......................................... 1620 Xtec, Inc ....................................................3047 Telaeris, Inc ..............................................2646
ColorID, LLC..............................................2248 APPLICATION SOFTWARE TrackTik ......................................................733
Continental Access ................................... 3120 AES Cybersecurity.....................................1048 Travel Recon ............................................. 1707
Convergint Technologies, LLC....................1332 AlertEnterprise .........................................1009 Verint Systems, Inc ................................... 2623
Cyber Defense Labs ...................................1046 Alertus Technologies ................................2246 Vintra, Inc.................................................3968
CyberLock, Inc .......................................... 2214 AlutelMobility ........................................... 2547 Vision Database Systems ............................ 611
Cypress Integration Solutions ....................2115 Babel Street............................................... 1748 Vismo Global Tracking Solutions ............. 4469
DIRAK .........................................................714 BEKEY A/S .................................................1921 Vistacom .....................................................933
ECAMSECURE ........................................... 4197 BriefCam, Ltd. ...........................................3866 Xtec, Inc ....................................................3047
Echoworx ....................................................507 Celayix Software ...................................... 2640 DATA RECOVERY SERVICES
Focal Point Data Risk, LLC. ......................... 325 CodeLynx, LLC. ......................................... 1620 AES Cybersecurity.....................................1048
FRONTSTEPS ............................................ 3973 ConnectWise ...............................................710 ConnectWise ...............................................710
G4S ........................................................... 3733 Continental Access ................................... 3120 Cyber Defense Labs ...................................1046
Genetec ..................................................... 3147 Convergint Technologies, LLC....................1332 Data Comm for Business ........................... 1641
GeoVision, Inc .......................................... 3547 Cyber Defense Labs ...................................1046 DDN Storage .............................................. 938
Gorilla Technology, Inc ............................ 4069 Cyrun ........................................................4072 FRONTSTEPS ............................................ 3973
Handheld .................................................. 1622 ECAMSECURE ........................................... 4197 Iron Mountain Government Services ....... 4398
Hexagon Safety & Infrastructure................1215 Echosec Systems, Ltd. .................................839 Protiviti ...................................................... 408
Hexicurity, Inc ..........................................4269 ENSCO ...................................................... 4553 SpearTip ...................................................4441
i3 International, Inc ..................................2843 FRONTSTEPS ............................................ 3973 ENCRYPTION
Identiv ...................................................... 3617 G4S ........................................................... 3733 AES Cybersecurity.....................................1048
IDScan.net ..................................................916 Genetec ..................................................... 3147 Cyber Defense Labs ...................................1046
Information First ...................................... 1052 GeoVision, Inc .......................................... 3547 Data Comm for Business ........................... 1641
International Road Dynamics, Inc ............ 4191 Handheld .................................................. 1622 Echoworx ....................................................507
Iris ID Systems, Inc ................................... 1309 Hexagon Safety & Infrastructure................1215 FRONTSTEPS ............................................ 3973
Johnson Controls ...................................... 4119 HTX Labs ..................................................2649 i3 International, Inc ..................................2843
KeyTrak, Inc.............................................. 2641 i3 International, Inc ..................................2843 KBC Networks ...........................................1909
Kingston Technology ................................ 3791 IDScan.net ..................................................916 Kingston Technology ................................ 3791
Matrix ComSec, Pvt., Ltd.............................740 InFocus .......................................................801 Xtec, Inc ....................................................3047
Micro Technology Services, Inc................. 3967 Information First ...................................... 1052 HARDWARE THEFT PREVENTION
Milestone Systems ....................................3945 Innovise Software, Ltd. ...............................414 CodeLynx, LLC. ......................................... 1620
Monitor Dynamics .................................... 3143 InstaKey Security Systems ........................ 3142 Continental Access ................................... 3120
MorphoTrak .............................................. 1607 IronYun .....................................................4168 Cyber Defense Labs ...................................1046
Napco Security Technologies, Inc ............. 3120 iView Systems ........................................... 1601 DIRAK .........................................................714
NEDAP ........................................................619 Kelly’s 5 Distribution, LLC. ....................... 1647 IPVideo Corporation ..................................1114
NVT Phybridge ..........................................2443 Key Tracer Systems, Inc ............................ 3441 Key Tracer Systems, Inc ............................ 3441
Ontario-Canada Delegation ........................507 Matrix ComSec, Pvt., Ltd.............................740 Kingston Technology ................................ 3791
Open Options, L.P. ......................................625 Milestone Systems ....................................3945 McGard, LLC. ........................................... 4440
Parabit Systems, Inc ................................. 3041 Motorola Solutions ................................... 2347 Napco Security Technologies, Inc ............. 3120
Peripheral Dynamics, Inc .........................2240 Napco Security Technologies, Inc ............. 3120 NVT Phybridge ..........................................2443
PetroCloud, LLC. ....................................... 4163 NEDAP ........................................................619 PetroCloud, LLC. ....................................... 4163
Prime Base, Inc ......................................... 4391 Neighborhood Watch for Corporations ...... 420 INTRUSION DETECTION AND
Protiviti ...................................................... 408 Omnigo Software ........................................518 PREVENTION
S2 Security Corporation ............................ 3423 Open Options, L.P. ......................................625 AES Cybersecurity.....................................1048
Sielox, LLC. ................................................1533 Paperless Proposal.................................... 1738 Betafence USA ........................................... 540
Stanley Security .........................................3133 Prime Base, Inc ......................................... 4391 BriefCam, Ltd. ...........................................3866
System Surveyor ........................................ 905 Protiviti ...................................................... 408 CodeLynx, LLC. ......................................... 1620
TagMaster North America, Inc ..................3885 S2 Security Corporation ............................ 3423 ConnectWise ...............................................710
Tascent .......................................................901 SAM, Inc ................................................... 2142 Continental Access ................................... 3120
Telaeris, Inc ..............................................2646 Senstar, Inc ...............................................4296 Convergint Technologies, LLC....................1332
TrackTik ......................................................733 Site-Secure ................................................. 500 Crotega .................................................... 4480
Viking Electronics ..................................... 2022 SpearTip ...................................................4441 Cyber Defense Labs ...................................1046
Vision Database Systems ............................ 611 STOPware, Inc .......................................... 2247 DIRAK .........................................................714
Visitor Pass Solutions by Data SUSE .........................................................4453 Dynetics, Inc ............................................... 519

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 106 08/17/2017 11:21:23 AM


NOW
YOU’LL
KNOW.

Quantum Secure’s SAFE software suite streamlines and automates secure NOW YOU’LL KNOW.
identity management, compliance and operational analytics across multiple quantumsecure.com/know
sites and systems in a single, fully interoperable platform—allowing you real Visit us at ASIS 2017 in the
time visibility into your entire security infrastructure. Already the leader in HID Global booth #3009
physical identity and access management software, we are now partnered
with HID Global, meaning your investment in best-in-class technology can
be made with confidence. Find out how to lower your risk profile and
operational costs by visiting quantumsecure.com/know.

For product info #57 securitymgmt.hotims.com


108
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

ECAMSECURE ........................................... 4197 Micron Optics............................................2010 USA, LLC. ..................................................1843


ENSCO ...................................................... 4553 Napco Security Technologies, Inc ............. 3120 Security Information Systems, Inc ............ 1642
Epiq Solutions ......................................... 4690 NEC Corporation of America ...................... 947 Security USA Services, LLC. ....................... 504
Focal Point Data Risk, LLC. ......................... 325 NVT Phybridge ..........................................2443 Security-Net, Inc ....................................... 4333
Future Fibre Technologies ..........................825 Patlite (U.S.A.) Corporation ...................... 4577 Senstar, Inc ...............................................4296
Genetec ..................................................... 3147 PetroCloud, LLC. ....................................... 4163 SpearTip ...................................................4441
GeoVision, Inc .......................................... 3547 Protiviti ...................................................... 408 Stanley Security .........................................3133
Gorilla Technology, Inc ............................ 4069 PureTech Systems ....................................... 915 System Surveyor ........................................ 905
Hexagon Safety & Infrastructure................1215 Razor Ribbon ............................................ 2109 TagMaster North America, Inc ..................3885
Johnson Controls ...................................... 4119 Security Centres International V5 Systems ............................................... 4290
Verint Systems, Inc ................................... 2623
INVESTIGATIONS
Babel Street............................................... 1748
BriefCam, Ltd. ...........................................3866
Cyber Defense Labs ...................................1046
Studying for the new Physical Cyrun ........................................................4072
Security Professional (PSP®) FRONTSTEPS ............................................ 3973
exam rolling out in November? G4S ........................................................... 3733
Genetec ..................................................... 3147
Guardian Zone .......................................... 4178
IronYun .....................................................4168
iView Systems ........................................... 1601
Motorola Solutions ................................... 2347
Neighborhood Watch for Corporations ...... 420
Omnigo Software ........................................518
Pinkerton ................................................. 2809
Resolver .................................................... 2741
Securitas Canada, Ltd. ............................. 2809
Site-Secure ................................................. 500
SpearTip ...................................................4441
Trust Farm, LLC. ........................................ 946
Vintra, Inc.................................................3968
Join the inaugural ASIS PSP PRIVACY
Virtual Study Group! Babel Street............................................... 1748
Cambridge Sound Management ............... 4099
This eight-week online program launches October Cyber Defense Labs ...................................1046
2017! Read and discuss the Physical Security Echoworx ....................................................507
Principles reference book with PSP leaders and Focal Point Data Risk, LLC. ......................... 325
your peers as you prepare for this important FRONTSTEPS ............................................ 3973
professional milestone. Learn how, as well as what Genetec ..................................................... 3147
to study as you engage in interactive discussions, Hexicurity, Inc ..........................................4269
share tips and tools, and assess your readiness iView Systems ........................................... 1601
for the exam. Kingston Technology ................................ 3791
Learn more at asisonline.org/studygroup Neighborhood Watch for Corporations ...... 420
Protiviti ...................................................... 408
SpearTip ...................................................4441
TagMaster North America, Inc ..................3885
RISK MANAGEMENT
AccuWeather Enterprise Solutions, Inc..... 2138
AES Cybersecurity.....................................1048
AlertEnterprise .........................................1009
AlutelMobility ........................................... 2547
Apollo ....................................................... 3033
Babel Street............................................... 1748
CodeLynx, LLC. ......................................... 1620

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.
0917_SM_psp study_group_ISL.indd 1 08/15/2017 2:40:24 PM

09-17 Exhibit Guide v2 LO.indd 108 08/17/2017 11:21:43 AM


UNPARALLELED
EXPERTISE IN SECURITY.
Ou r c o m m i t m e n t t o d e l i ve r y exc e l l e n c e i s t h e f o u n d a t i on of ou r
r e p u t a t i o n a s t h e i n d u st r y ’s p r e m i e r s e c u r i t y p r ov i d e r.

Providing the highest level of ser vice and support and a full portfolio of
video, access, intrusion, fire and integrated systems has long been our
specialty. Our world-class Engineering Center of Excellence, where
projects are designed, engineered and commissioned to the highest
industr y standards, exemplifies our commitment to unrivaled
operational deliver y and execution.

D i s c ove r u n p a ra l l e l e d s e c u r i t y ex p e r t i s e f o r yo u r b u s i n e s s .

V I S I T U S AT A S I S 2 0 1 7
B O OT H # 2 7 0 8

855. 331. 035 9 Securitas Electronic Security, Inc


SECURITASES.COM Formerly Diebold Security

For product info #59 securitymgmt.hotims.com


110
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Crotega .................................................... 4480 Micro Technology Services, Inc................. 3967 COMPLIANCE AND ETHICS
Cyber Defense Labs ...................................1046 Motorola Solutions ................................... 2347 ARC Training............................................ 4082
DIRAK .........................................................714 Napco Security Technologies, Inc ............. 3120 AT-RISK International ............................... 4271
Echoworx ....................................................507 NEC Corporation of America ...................... 947 Babel Street............................................... 1748
ENSCO ...................................................... 4553 NVT Phybridge ..........................................2443 BriefCam, Ltd. ...........................................3866
Focal Point Data Risk, LLC. ......................... 325 Ontario-Canada Delegation ........................507 CodeLynx, LLC. ......................................... 1620
FRONTSTEPS ............................................ 3973 Open Options, L.P. ......................................625 Focal Point Data Risk, LLC. ......................... 325
G4S ........................................................... 3733 Prime Base, Inc ......................................... 4391 G4S ........................................................... 3733
Garner Products, Inc ................................. 2242 Protection 1 ............................................... 3533 Gavin de Becker and Associates .................1116
Genetec ..................................................... 3147 Protiviti ...................................................... 408 Hexicurity, Inc ..........................................4269
Guardian Zone .......................................... 4178 Security Centres International USA, LLC...1843 Information First ...................................... 1052
Hexicurity, Inc ..........................................4269 SpearTip ...................................................4441 Kingston Technology ................................ 3791
Information First ...................................... 1052 UrgentLink ................................................ 1053 Neighborhood Watch for Corporations ...... 420
International Association of Professional Viking Electronics ..................................... 2022 Open Options, L.P. ......................................625
Security Consultants (IAPSC)................... 4095 Vismo Global Tracking Solutions ............. 4469 Trust Farm, LLC. ........................................ 946
iView Systems ........................................... 1601 Vistacom .....................................................933 DUE DILIGENCE
KBC Networks ...........................................1909 Winncom Technologies.............................4073 AFIMAC.....................................................3856
Key Tracer Systems, Inc ............................ 3441 WIRELESS SECURITY ARC Training............................................ 4082
KeyTrak, Inc.............................................. 2641 3SI Security Systems ................................. 2124 AT-RISK International ............................... 4271
Kingston Technology ................................ 3791 Activist Map ..............................................4472 Babel Street............................................... 1748
Motorola Solutions ................................... 2347 AES Cybersecurity.....................................1048 CAP Index, Inc .......................................... 3433
Neighborhood Watch for Corporations ...... 420 Apollo ....................................................... 3033 Focal Point Data Risk, LLC. ......................... 325
Omnigo Software ........................................518 BEKEY A/S .................................................1921 Gavin de Becker and Associates .................1116
PlanetRisk..................................................1141 BTU Research............................................3601 Hexicurity, Inc ..........................................4269
Protiviti ...................................................... 408 CodeLynx, LLC. ......................................... 1620 Information First ...................................... 1052
SAM, Inc ................................................... 2142 Continental Access ................................... 3120 iView Systems ........................................... 1601
Security USA Services, LLC. ....................... 504 Convergint Technologies, LLC....................1332 Kingston Technology ................................ 3791
Security-Net, Inc ....................................... 4333 Cyber Defense Labs ...................................1046 Neighborhood Watch for
Singlewire Software .................................. 4572 CyberLock, Inc .......................................... 2214 Corporations .............................................. 420
Site-Secure ................................................. 500 Cypress Integration Solutions ....................2115 Site-Secure ................................................. 500
SpearTip ...................................................4441 ECAMSECURE ........................................... 4197 Stratfor .....................................................4583
Stratfor .....................................................4583 Epiq Solutions ......................................... 4690 Trust Farm, LLC. ........................................ 946
Telgian Corporation ...................................1541 FRONTSTEPS ............................................ 3973 EXPERT WITNESS
The Anvil Group, Ltd. ............................... 1241 G4S ........................................................... 3733 AT-RISK International ............................... 4271
topo AI ...................................................... 4567 Guardian Zone .......................................... 4178 CAP Index, Inc .......................................... 3433
Travel Recon ............................................. 1707 IronYun .....................................................4168 Cyber Defense Labs ...................................1046
Trust Farm, LLC. ........................................ 946 KBC Networks ...........................................1909 International Association of Professional
Vismo Global Tracking Solutions ............. 4469 Napco Security Technologies, Inc ............. 3120 Security Consultants (IAPSC)................... 4095
Vistacom .....................................................933 NVT Phybridge ..........................................2443 iView Systems ........................................... 1601
SECURE COMMUNICATIONS Ontario-Canada Delegation ........................507 Trust Farm, LLC. ........................................ 946
AES Cybersecurity.....................................1048 PetroCloud, LLC. ....................................... 4163 FRAUD
Alertus Technologies ................................2246 Prime Base, Inc ......................................... 4391 AFIMAC.....................................................3856
CodeLynx, LLC. ......................................... 1620 Security Centres International AT-RISK International ............................... 4271
Continental Access ................................... 3120 USA, LLC. ..................................................1843 Babel Street............................................... 1748
Cyber Defense Labs ...................................1046 Security-Net, Inc ....................................... 4333 G4S ........................................................... 3733
Echoworx ....................................................507 Sielox, LLC. ................................................1533 Neighborhood Watch for Corporations ...... 420
FRONTSTEPS ............................................ 3973 SpearTip ...................................................4441 Resolver .................................................... 2741
Genetec ..................................................... 3147 Systech Electronics Limited ......................2447 Verint Systems, Inc ................................... 2623
Guardian Zone .......................................... 4178 Truen Co., Ltd. ........................................... 508 INSURANCE
Identiv ...................................................... 3617 V5 Systems ............................................... 4290 AccuWeather Enterprise Solutions, Inc..... 2138
Intercoax Company, Ltd. ...........................2648 Vismo Global Tracking Solutions ............. 4469 AFIMAC.....................................................3856
iView Systems ........................................... 1601 Winncom Technologies.............................4073 AT-RISK International ............................... 4271
KBC Networks ...........................................1909 Xtec, Inc ....................................................3047 Brownyard Group.......................................2132
Kingston Technology ................................ 3791 LEGAL, INSURANCE, AND Brownyard Programs ................................ 2041
McGard, LLC. ........................................... 4440 REGULATORY G4S ........................................................... 3733

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 110 08/17/2017 11:21:50 AM


SEE US AT ASIS
BOOTH
#1123

LOOKING TO CONNECT AND COMMUNICATE


IN STYLE? YOUR WISH IS OUR COMMAND.

Introducing the stylish, new Via Series access and courtesy


communication pedestal. Standing at 55 inches tall, the Via
makes a great fi rst impression for accessing buildings and
parking, as well as providing courtesy communication on
walkways and more. With its built-in VOIP-200 Series IP call
station, blue LED light band, available card reader and push
plate switch options, you can connect and communicate in style.

Call 773-539-1100 or visit talkaphone.com/products/via to start


making a lasting impression today.

For product info #60 securitymgmt.hotims.com


112
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

iView Systems ........................................... 1601 TEAM Software, Inc .................................. 2023 Securitas Security Services USA, Inc ........ 2809
Neighborhood Watch for Corporations ...... 420 TrackTik ......................................................733 Stratfor .....................................................4583
On Call International ................................4596 U.S. Security Associates ............................4205 topo AI ...................................................... 4567
Site-Secure ................................................. 500 Weiser Security Services, Inc ....................2208 U.S. Security Associates ............................4205
POLITICAL/SECURITY RISK Whelan Security ........................................4113 Verint Systems, Inc ................................... 2623
Emergent Risk International, LLC. ............3970 DRUG TESTING, SUBSTANCE ABUSE Vismo Global Tracking Solutions ............. 4469
Kingston Technology ................................ 3791 EDUCATION FIRST AID TRAINING
On Call International ................................4596 Galls.......................................................... 4672 AS Solution A/S ........................................ 4561
Pinkerton ................................................. 2809 EMPLOYEE/EMPLOYMENT SCREENING AT-RISK International ............................... 4271
Securitas Critical Infrastructure Adani Systems, Inc .....................................633 Galls.......................................................... 4672
Services.................................................... 2809 AFIMAC.....................................................3856 KINETIC CONSULTING ............................... 849
Trust Farm, LLC. ........................................ 946 AlutelMobility ........................................... 2547 Omnigo Software ........................................518
PERSONNEL AmberBox ................................................... 725 Security Guard Management ....................4491
CERTIFICATION AS Solution A/S ........................................ 4561 TRAVEL SAFETY & EMERGENCY
AFIMAC.....................................................3856 Asqella Oy................................................. 1403 SERVICES
American Military University .................... 4176 AT-RISK International ............................... 4271 AccuWeather Enterprise Solutions, Inc..... 2148
ARC Training............................................ 4082 Babel Street............................................... 1748 Adani Systems, Inc. ....................................633
AT-RISK International ............................... 4271 Commissionaires ......................................3976 AFIMAC.....................................................3856
Axis Communications ...............................4032 G4S ........................................................... 3733 All Traffic Solutions ..................................4467
CodeLynx, LLC. ......................................... 1620 Innovise Software, Ltd. ...............................414 Alpha Recon ............................................. 1707
G4S ........................................................... 3733 K2 Solutions, Inc .......................................4067 Amika Mobile..............................................507
HTX Labs ..................................................2649 Micro Distributing .......................................419 ARC Training............................................ 4082
International Association of Professional Pinkerton ................................................. 2809 AS Solution A/S ........................................ 4561
Security Consultants (IAPSC)................... 4095 Point 2 Point Global Security .................... 1701 AT-RISK International ............................... 4271
International Foundation for Protection Securitas Critical Infrastructure Babel Street............................................... 1748
Officers......................................................4194 Services.................................................... 2809 beTravelwise ............................................. 1549
Omnigo Software ........................................518 Securitas Security Services USA, Inc ........ 2809 BulletSafe Bulletproof Vests .....................4569
Point 2 Point Global Security .................... 1701 Site-Secure ................................................. 500 EVAC+CHAIR North America, LLC ............ 1326
Site-Secure ................................................. 500 Trust Farm, LLC. ........................................ 946 FAM International Security .......................4169
The Loss Prevention Foundation ..............4295 EXECUTIVE/VIP PROTECTION Fast Pass Visitor Management .................. 4173
TrackTik ......................................................733 Adani Systems, Inc .....................................633 Groundwork .............................................. 1447
Univeristy of Denver ................................. 1638 AFIMAC.....................................................3856 Intelligent Devices, Inc. ............................ 1346
CONTRACT SECURITY AS Solution A/S ........................................ 4561 KINETIC CONSULTING ............................... 849
AFIMAC.....................................................3856 Asqella Oy................................................. 1403 Kingston Technology ................................ 3791
AS Solution A/S ........................................ 4561 AT-RISK International ............................... 4271 Medjet ....................................................... 3971
AT-RISK International ............................... 4271 Babel Street............................................... 1748 Neighborhood Watch for Corporations ...... 420
Commissionaires ......................................3976 BulletSafe Bulletproof Vests .....................4569 Occly ........................................................... 742
DSI Security Services, Inc ......................... 1742 CAP Index, Inc .......................................... 3433 On Call International ................................3596
ECAMSECURE ........................................... 4197 Crotega .................................................... 4480 Qognify ......................................................1515
FAM International Security .......................4169 ENSCO ...................................................... 4553 Securitas Security Services USA, Inc. ....... 2809
G4S ........................................................... 3733 FAM International Security .......................4169 Stanley Security .........................................3133
Grupo Securitas Mexico ........................... 2809 G4S ........................................................... 3733 Stratfor .....................................................4583
Innovise Software, Ltd. ...............................414 Gavin de Becker and Associates .................1116 topo AI ...................................................... 4567
K2 Solutions, Inc .......................................4067 Grupo Securitas Mexico ........................... 2809 Trust Farm, LLC.......................................... 946
KEY-BAK ................................................... 1643 Intelligent Devices, Inc ............................. 1346 UrgentLink ................................................ 1053
KINETIC CONSULTING ............................... 849 KINETIC CONSULTING ............................... 849 Vismo Global Tracking Solutions ..............4461
Kingston Technology ................................ 3791 Kingston Technology ................................ 3791 WORKFORCE MANAGEMENT
Motorola Solutions ................................... 2347 Occly ........................................................... 742 (STAFFING)
Off Duty Services........................................1322 Off Duty Services........................................1322 AccuWeather Enterprise Solutions, Inc..... 2138
Point 2 Point Global Security .................... 1701 Pinkerton ................................................. 2809 AFIMAC.....................................................3856
Securitas Canada, Ltd. ............................. 2809 Point 2 Point Global Security .................... 1701 American Military University .................... 4176
Securitas Critical Infrastructure SAM, Inc ................................................... 2142 AS Solution A/S ........................................ 4561
Services.................................................... 2809 Securitas Canada, Ltd. ............................. 2809 AT-RISK International ............................... 4271
Securitas Security Services USA, Inc ........ 2809 Securitas Critical Infrastructure Babel Street............................................... 1748
Site-Secure ................................................. 500 Services.................................................... 2809 BriefCam, Ltd. ...........................................3866

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 112 08/17/2017 11:21:55 AM


Smart access
begins with
end-to-end
solutions. New E-Plex RFID 7900

RCI Electronic Access Controls

New Keyscan iClass ® SEOS ®


high frequency readers and credentials

New Mobile
Credentials E-Plex Electronic keyless, wireless
access controls

Trust dormakaba for solutions that provide the perfect blend of form,
flexibility and function. Our comprehensive line of networked access
systems, electronic access controls, wireless and stand-alone access
solutions are designed for multihousing, healthcare, financial, retail,
transportation and commercial applications with a single goal
in mind—making access in life smart and secure.

Visit us at ASIS; Dallas, TX, Sept 26-28 Booth 2321 Visit dormakaba.us
For product info #62 securitymgmt.hotims.com
114
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS
Crotega .................................................... 4480 TEAM Software, Inc .................................. 2023 American Military University .................... 4176
Emergent Risk International, LLC. ............3970 Trackforce ................................................. 2747 ARC Training............................................ 4082
FAM International Security .......................4169 TrackTik ......................................................733 AS Solution A/S ........................................ 4561
G4S ........................................................... 3733 Trust Farm, LLC. ........................................ 946 AT-RISK International ............................... 4271
Gorilla Technology, Inc ............................ 4069 U.S. Security Associates ............................4205 Babel Street............................................... 1748
Hexagon Safety & Infrastructure................1215 Vismo Global Tracking Solutions ............. 4469 Battelle .....................................................4292
Innovise Software, Ltd. ...............................414 WORKPLACE VIOLENCE BriefCam, Ltd. ...........................................3866
Kingston Technology ................................ 3791 AFIMAC.....................................................3856 Crotega .................................................... 4480
Occly ........................................................... 742 Alertus Technologies ................................2246 FAM International Security .......................4169
Omnigo Software ........................................518 Allied Universal Security Services ............ 2733 Fast Pass Visitor Management .................. 4173
Resolver .................................................... 2741 AmberBox ................................................... 725 G4S ........................................................... 3733
Gavin de Becker and Associates .................1116
Hexicurity, Inc. .........................................4269
HTX Labs ..................................................2649
International Association of Professional
Security Consultants (IAPSC)................... 4095
International Critical Incident Stress
Foundation ...............................................3997
Johnson Controls ...................................... 4119
KINETIC CONSULTING ............................... 849
Louroe Electronics .................................... 3243
Micro Technology Services, Inc................. 3967
Neighborhood Watch for Corporations ...... 420
Occly ........................................................... 742
Omnigo Software ........................................518
Pinkerton ................................................. 2809
Point 2 Point Global Security .................... 1701
Qognify ......................................................1515
QuickSeries Publishing.............................. 920
Rave Mobile Safety....................................4676
Resolver .................................................... 2741
RF Technologies........................................ 2147
Securitas Canada, Ltd. ............................. 2809
Securitas Critical Infrastructure
Services.................................................... 2809
Securitas Security Services USA, Inc. ....... 2809
Security Guard Management ....................4491
Security USA Services, LLC ........................ 504
Singlewire Software .................................. 4572
Site-Secure ................................................. 500
Stratfor .....................................................4583
Telgian Corporation ...................................1541
The Anvil Group, Ltd. ............................... 1241
topo AI ...................................................... 4567
Trust Farm, LLC.......................................... 946
PUBLISHERS
ASIS International .....................................1613
Campus Security & Life Safety ................. 4078
College Planning & Management ............. 4078
EH Media ..................................................3879
Global Security News Wire ....................... 3868
Hand Media ............................................... 506
International Foundation for Protection
Officers......................................................4194
KINETIC CONSULTING ............................... 849
School Planning & Management .............. 4078

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 114 08/17/2017 11:22:02 AM


ComNet is the Solution to Your Communication Challenge

GUARANTEED
PERFORMANCE
TODAY - AND TOMORROW

When network dependability is critical, the


transmission products you choose today
affect how your network performs tomorrow.

ComNet – Communication Solutions for the Long Term


• Only ComNet Offers a Complete • Exclusive
Fiber Optic, Copper, and Wireless • Experienced ComNet Customer Care
Communication Solution Specialists Who Understand Your Application
• ComNet Products are are Here to Support Your Every Need

www.comnet.net
For product info #63 securitymgmt.hotims.com

See us at ASIS 2017 | Dallas, TX | Booth 1509 | September 25-28

Contact the ComNet Design Center for Free Assistance in Choosing the Correct Fiber Optic, Copper or
Wireless Connectivity Solution – Call 1 888 678-9427 or 1 203 796-5300, or Email designcenter@comnet.net
info@comnet.net Tel: 1 203 796-5300
www.comnet.net/register Toll-Free: 1 888 678-9427
116
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

SDM & Security Magazines .......................... 2320 Drone Nerds ................................................746 Rugged Science, LLC. .................................1227
Security Guard Management ....................4491 ECAMSECURE ........................................... 4197 SCI Technology, Inc .................................. 4157
Security Today ......................................... 4078 FRONTSTEPS ............................................ 3973 Security Centres International
SecurityGuyTV.com.....................................314 Hexagon Safety & Infrastructure................1215 USA, LLC. ..................................................1843
Southcomm.com ........................................2125 Hikvision USA ........................................... 3703 Turing Video .............................................. 649
Stratfor .....................................................4583 Isotec Security ..........................................1648 SURVEILLANCE
ROBOTICS KINETIC CONSULTING ............................... 849 CAMERAS
UNMANNED SYSTEMS NVT Phybridge ..........................................2443 ACTi Corporation ......................................4345
Allied Universal Security Services ............ 2733 Ontario-Canada Delegation ........................507 Allied Universal Security Services ............ 2733
Cobalt Robotics ...........................................852 Quanergy .................................................. 3771 AmberBox ................................................... 725
Apollo ....................................................... 3033
Apollo Video Technology ......................... 4494
Arecont Vision, LLC. ..................................3221
ARH, Inc ................................................... 1015
Asqella Oy................................................. 1403
Aventura Technologies .............................2947
Avigilon ................................................... 4056
Axis Communications ...............................4032
Betafence USA ........................................... 540
Bo Xin Photoelectric Company, Ltd. ......... 4499
Bosch Security Systems ............................ 3333
BrickHouse Security ................................. 2249
Brivo ......................................................... 4353
BTU Research............................................3601
Clinton Electronics Corporation................ 4183
CodeLynx, LLC. ......................................... 1620
Convergint Technologies, LLC....................1332
Costar Video Systems ................................2209
Crotega .................................................... 4480
Dahua Technology USA, Inc ..................... 4145
DMP .......................................................... 2833
DoorBird ................................................... 2350
Dynetics, Inc ............................................... 519
ECAMSECURE ........................................... 4197
Electro Optical Industries, Inc ...................2121
EPCOM ...................................................... 4591
FRONTSTEPS ............................................ 3973
G4S ........................................................... 3733
Galaxy Control Systems ............................ 2241
Galls.......................................................... 4672
GeoVision, Inc .......................................... 3547
Geutebruck USA, Inc .................................3956
Hanwha Techwin ...................................... 3523
Hexagon Safety & Infrastructure................1215
Hikvision USA ........................................... 3703
Hinovision Solutions, LLC. ....................... 4277
i3 International, Inc ..................................2843
ID Connection ........................................... 2110
IdentiSys, Inc ............................................ 2015
IDIS .......................................................... 3846
IndigoVision, Inc ...................................... 1023
Inet Security and Surveillance, Inc ............. 533
InFocus .......................................................801
International Road Dynamics, Inc ............ 4191
IPVideo Corporation ..................................1114

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 116 08/17/2017 11:22:13 AM


118
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

IRCameras, LLC.........................................4184 Security Centres International Wanco .......................................................4682


Johnson Controls ...................................... 4119 USA, LLC. ..................................................1843 Weiser Security Services, Inc ....................2208
Key Tracer Systems, Inc ............................ 3441 Security-Net, Inc ....................................... 4333 Winncom Technologies.............................4073
KINETIC CONSULTING ............................... 849 Sielox, LLC. ................................................1533 Wireless CCTV, LLC. ....................................707
Live Earth..................................................4079 Sierra Olympic Technologies, Inc ............. 4167 CCTV (CLOSED CIRCUIT TELEVISION)
March Networks ........................................ 4522 SightLogix.................................................1005 3SI Security Systems ................................. 2124
Matrix ComSec, Pvt., Ltd.............................740 SPECO Technologies ................................. 3773 ACTi Corporation ......................................4345
Napco Security Technologies, Inc ............. 3120 Stealth Monitoring ................................... 4096 Activist Map ..............................................4472
Newmar ....................................................4097 Sun Surveillance, Inc ................................1004 AFIMAC.....................................................3856
NVT Phybridge ..........................................2443 Systech Electronics Limited ......................2447 Allied Universal Security Services ............ 2733
OpenEye ...................................................2449 System Surveyor ........................................ 905 AMAG Technology, Inc .............................. 3823
ORION Images Corporation........................ 807 TagMaster North America, Inc ..................3885 AmberBox ................................................... 725
Parabit Systems, Inc ................................. 3041 Tattile S.r.l................................................... 615 Apollo ....................................................... 3033
Pelco by Schneider Electric .......................2309 Total Automation Group, Inc ......................333 Aventura Technologies .............................2947
PetroCloud, LLC. ....................................... 4163 TOUGHDOG SECURITY SYSTEMS ............. 3501 Avigilon ................................................... 4056
Prime Base, Inc ......................................... 4391 Transformational Security, LLC. ...............3867 Battelle .....................................................4292
Prosegur......................................................433 Truen Co., Ltd. ........................................... 508 Bo Xin Photoelectric Company, Ltd. ......... 4499
Protection 1 ............................................... 3533 Uniview / All CCTV Supply .......................2943 Bosch Security Systems ............................ 3333
Quanergy .................................................. 3771 V5 Systems ............................................... 4290 BulletSafe Bulletproof Vests .....................4569
Rath Security .............................................. 917 Verint Systems, Inc ................................... 2623 Clinton Electronics Corporation................ 4183
Safety Vision .............................................. 409 Videology Imaging Solutions, Inc ............. 4341 CodeLynx, LLC. ......................................... 1620
SavvyTech ................................................ 3980 Videotec Security, Inc ............................... 1001 ComNet ..................................................... 1509
Securitas Canada, Ltd. ............................. 2809 Viking Electronics ..................................... 2022 Convergint Technologies, LLC....................1332
Securitas Electronic Security, Inc..............2708 Vintra, Inc.................................................3968 Crotega .................................................... 4480
Security Center .........................................4692 VIVOTEK USA, Inc ....................................3863 Dahua Technology USA, Inc ..................... 4145

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 118 08/17/2017 11:22:23 AM


119
SEP 2017 | SECURITY MANAGEMENT

ECAMSECURE ........................................... 4197 Matrix ComSec, Pvt., Ltd.............................740 U.S. Security Associates ............................4205
EPCOM ...................................................... 4591 Milestone Systems ....................................3945 Uniview / All CCTV Supply .......................2943
G4S ........................................................... 3733 Monitor Dynamics .................................... 3143 Vanderbilt Industries ................................ 4261
Galaxy Control Systems ............................ 2241 Nasatka Security ...................................... 1000 Videotec Security, Inc ............................... 1001
Genetec ..................................................... 3147 NVT Phybridge ..........................................2443 Vintra, Inc.................................................3968
Geutebruck USA, Inc .................................3956 OpenEye ...................................................2449 Wanco .......................................................4682
Hanwha Techwin ...................................... 3523 ORION Images Corporation........................ 807 Wireless CCTV, LLC. ....................................707
Hexagon Safety & Infrastructure................1215 Parabit Systems, Inc ................................. 3041 LENSES
Hikvision USA ........................................... 3703 Prosegur......................................................433 Arecont Vision, LLC. ..................................3221
Hinovision Solutions, LLC. ....................... 4277 Protection 1 ............................................... 3533 Aventura Technologies .............................2947
i3 International, Inc ..................................2843 Qognify ......................................................1515 Axis Communications ...............................4032
ID Connection ........................................... 2110 S2 Security Corporation ............................ 3423 Bo Xin Photoelectric Company, Ltd. ......... 4499
IdentiSys, Inc ............................................ 2015 SavvyTech ................................................ 3980 Bosch Security Systems ............................ 3333
IDIS .......................................................... 3846 Securitas Electronic Security, Inc..............2708 Clinton Electronics Corporation................ 4183
IndigoVision, Inc ...................................... 1023 Security Center .........................................4692 Convergint Technologies, LLC....................1332
Inet Security and Surveillance, Inc ............. 533 Security Centres International .................1843 Dahua Technology USA, Inc ..................... 4145
Intercoax Company, Ltd. ...........................2648 Security USA Services, LLC. ....................... 504 Hanwha Techwin ...................................... 3523
International Road Dynamics, Inc ............ 4191 Security-Net, Inc ....................................... 4333 i3 International, Inc ..................................2843
Johnson Controls ...................................... 4119 SightLogix.................................................1005 IDIS .......................................................... 3846
K2 Solutions, Inc .......................................4067 SPECO Technologies ................................. 3773 ImmerVision ............................................. 2014
KBC Networks ...........................................1909 Stealth Monitoring ................................... 4096 International Road Dynamics, Inc.... ........ 4191
KINETIC CONSULTING ............................... 849 Surf Communication Solutions ................. 4571 KINETIC CONSULTING ............................... 849
Live Earth..................................................4079 Total Automation Group, Inc ......................333 Quanergy .................................................. 3771
Louroe Electronics .................................... 3243 TOUGHDOG SECURITY SYSTEMS ............. 3501 SavvyTech ................................................ 3980
March Networks ........................................ 4522 Transformational Security, LLC. ...............3867 Security Center .........................................4692

09-17 Exhibit Guide v2 LO.indd 119 08/17/2017 11:22:36 AM


120
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Security Centres International Stealth Monitoring ................................... 4096 G4S ........................................................... 3733
USA, LLC. ..................................................1843 TOUGHDOG SECURITY SYSTEMS ............. 3501 Galaxy Control Systems ............................ 2241
SPECO Technologies ................................. 3773 Winncom Technologies.............................4073 GeoVision, Inc.... ...................................... 3547
Videology Imaging Solutions, Inc.... ......... 4341 PATIENT/EMPLOYEE MONITORING Geutebruck USA, Inc.... .............................3956
ViewZ ........................................................ 3891 ACTi Corporation ......................................4345 Hanwha Techwin ...................................... 3523
LIGHTING Alpha Recon ............................................. 1707 Hikvision USA ........................................... 3703
Betafence USA ........................................... 540 Apollo ....................................................... 3033 Hinovision Solutions, LLC. ....................... 4277
Bo Xin Photoelectric Company, Ltd. ......... 4499 Babel Street............................................... 1748 i3 International, Inc.... ..............................2843
CAST Lighting, LLC. ................................. 4384 Bo Xin Photoelectric Company, Ltd. ......... 4499 IDIS .......................................................... 3846
Convergint Technologies, LLC....................1332 BriefCam, Ltd. ...........................................3866 IndigoVision, Inc.... .................................. 1023
ECAMSECURE ........................................... 4197 Convergint Technologies, LLC ....................1332 Inet Security and Surveillance, Inc.... ......... 533
IDIS .......................................................... 3846 FRONTSTEPS ............................................ 3973 Intelligent Devices, Inc.... ......................... 1346
International Road Dynamics, Inc.... ........ 4191 G4S ........................................................... 3733 International Road Dynamics, Inc.... ........ 4191
KINETIC CONSULTING ............................... 849 Galaxy Control Systems ............................ 2241 IPVideo Corporation ..................................1114
Nightstick .................................................4266 Ganz Security Solutions ............................ 2748 IronYun .....................................................4168
NVT Phybridge ..........................................2443 Gorilla Technology, Inc. ........................... 4069 Johnson Controls ...................................... 4119
On Guard Apparel .....................................4091 i3 International, Inc. .................................2843 Kelly’s 5 Distribution, LLC. ....................... 1647
Parabit Systems, Inc.... ............................. 3041 IDIS .......................................................... 3846 Key Tracer Systems, Inc.... ........................ 3441
Patlite (U.S.A.) Corporation ...................... 4577 International Road Dynamics, Inc. ........... 4191 KINETIC CONSULTING ............................... 849
Security Centres International Johnson Controls ...................................... 4119 Louroe Electronics .................................... 3243
USA, LLC. ..................................................1843 March Networks ........................................ 4522 March Networks ........................................ 4522
Security USA Services, LLC. ....................... 504 Matrix ComSec, Pvt., Ltd.............................740 Matrix ComSec, Pvt., Ltd.............................740
Senstar, Inc.... ...........................................4296 NVT Phybridge ..........................................2443 NVT Phybridge ..........................................2443
System Surveyor ........................................ 905 PlanetRisk..................................................1141 OnSSI (On-Net Surveillance
Videotec Security, Inc.... ........................... 1001 Qognify ......................................................1515 Systems, Inc.) ...........................................4445
ViewZ ........................................................ 3891 Quanergy ................................................. 4694 OpenEye ...................................................2449
NIGHT VISION EQUIPMENT Security Centres International Parabit Systems, Inc.... ............................. 3041
ACTi Corporation ......................................4345 USA, LLC ...................................................1843 PetroCloud, LLC. ....................................... 4163
Aventura Technologies .............................2947 Security-Net, Inc. ...................................... 4333 Prime Base, Inc.... ..................................... 4391
CAST Lighting, LLC. ................................. 4384 Site-Secure ................................................. 500 PureTech Systems ....................................... 915
Convergint Technologies, LLC....................1332 Stanley Security .........................................3133 Qognify ......................................................1515
DoorBird ................................................... 2350 Trust Farm, LLC.......................................... 946 Quantum Corporation ...............................4170
ECAMSECURE ........................................... 4197 Vismo Global Tracking Solutions ............. 4469 S2 Security Corporation ............................ 3423
Electro Optical Industries, Inc.... ...............2121 Zenitel Group ..............................................923 Safety Vision .............................................. 409
Feather-Light Technologies LLC................4293 RECORDING EQUIPMENT/SYSTEMS Securitas Electronic Security, Inc..............2708
Fisher Labs ............................................... 2114 ACTi Corporation ......................................4345 Security Center .........................................4692
G4S ........................................................... 3733 Aiphone Corporation .................................1321 Security Centres International
Galls.......................................................... 4672 Allied Universal Security Services ............ 2733 USA, LLC. ..................................................1843
Hexagon Safety & Infrastructure................1215 AMAG Technology, Inc.... .......................... 3823 Security-Net, Inc ....................................... 4333
Hikvision USA ........................................... 3703 Apollo Video Technology ......................... 4494 Sielox, LLC. ................................................1533
Hinovision Solutions, LLC. ....................... 4277 Avigilon ................................................... 4056 SPECO Technologies ................................. 3773
ID Connection ........................................... 2110 Axis Communications ...............................4032 Stealth Monitoring ................................... 4096
IdentiSys, Inc.... ........................................ 2015 Betafence USA ........................................... 540 TOUGHDOG SECURITY SYSTEMS ............. 3501
IDIS .......................................................... 3846 Bo Xin Photoelectric Company, Ltd. ......... 4499 V5 Systems ............................................... 4290
International Road Dynamics, Inc.... ........ 4191 Bosch Security Systems ............................ 3333 Vanderbilt Industries ................................ 4261
Kelly’s 5 Distribution, LLC. ....................... 1647 BrickHouse Security ................................. 2249 Verint Systems, Inc.... ............................... 2623
KINETIC CONSULTING ............................... 849 BTU Research............................................3601 ViewZ ........................................................ 3891
Nasatka Security ...................................... 1000 Clinton Electronics Corporation................ 4183 Vintra, Inc.................................................3968
NVT Phybridge ..........................................2443 CodeLynx, LLC. ......................................... 1620 VIVOTEK USA, Inc ....................................3863
On Guard Apparel .....................................4091 Convergint Technologies, LLC....................1332 REMOTE VIDEO
Prime Base, Inc.... ..................................... 4391 Costar Video Systems ................................2209 ACTi Corporation ......................................4345
Qognify ......................................................1515 Crotega .................................................... 4480 Allied Universal Security Services ............ 2733
Quanergy .................................................. 3771 Dahua Technology USA, Inc.... ................. 4145 Apollo ....................................................... 3033
Security Centres International USA, LLC...1843 ECAMSECURE ........................................... 4197 Apollo Video Technology ......................... 4494
SightLogix.................................................1005 FRONTSTEPS ............................................ 3973 Axis Communications ...............................4032

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 120 08/17/2017 11:22:42 AM


122
EXHIBIT GUIDE | ASIS INTERNATIONAL 63RD ANNUAL SEMINAR AND EXHIBITS

Bo Xin Photoelectric Company, Ltd. ......... 4499 Grupo Securitas Mexico ........................... 2809 Matrix ComSec, Pvt., Ltd.............................740
BrickHouse Security ................................. 2249 Hexagon Safety & Infrastructure................1215 Napco Security Technologies, Inc ............. 3120
Brivo ......................................................... 4353 Hikvision USA ........................................... 3703 NVT Phybridge ..........................................2443
BTU Research............................................3601 Hinovision Solutions, LLC. ....................... 4277 Ontario-Canada Delegation ........................507
CodeLynx, LLC. ......................................... 1620 i3 International, Inc ..................................2843 OpenEye ...................................................2449
Convergint Technologies, LLC....................1332 IDIS .......................................................... 3846 PetroCloud, LLC. ....................................... 4163
DoorBird ................................................... 2350 IndigoVision, Inc ...................................... 1023 Prime Base, Inc ......................................... 4391
ECAMSECURE ........................................... 4197 Inet Security and Surveillance, Inc ............. 533 Protection 1 ............................................... 3533
ENSCO ...................................................... 4553 International Road Dynamics, Inc ............ 4191 PureTech Systems ....................................... 915
FRONTSTEPS ............................................ 3973 IronYun .....................................................4168 Qognify ......................................................1515
G4S ........................................................... 3733 Johnson Controls ...................................... 4119 Rugged Science, LLC. .................................1227
Galaxy Control Systems ............................ 2241 KBC Networks ...........................................1909 S2 Security Corporation ............................ 3423
GeoVision, Inc.... ...................................... 3547 KINETIC CONSULTING ............................... 849 Securitas Electronic Security, Inc..............2708
Geutebruck USA, Inc.... .............................3956 March Networks ........................................ 4522 Security Center .........................................4692

Highlighted exhibitors advertised in this issue. Please see the advertiser index on page 147.

09-17 Exhibit Guide v2 LO.indd 122 08/17/2017 11:22:50 AM


123
SEP 2017 | SECURITY MANAGEMENT

Security Centres International USA, LLC...1843 NVT Phybridge ..........................................2443 Omnigo Software ........................................518
Security-Net, Inc.... ................................... 4333 Ontario-Canada Delegation ........................507 STOPware, Inc. ......................................... 2247
SightLogix.................................................1005 Qognify ......................................................1515 SERVICES/CASH
SPECO Technologies ................................. 3773 Resolver .................................................... 2741 3SI Security Systems ................................. 2124
Stealth Monitoring ................................... 4096 Safety Vision Security Centres Activist Map ..............................................4472
Sun Surveillance, Inc.... ............................1004 International ............................................. 409 G4S ........................................................... 3733
Surf Communication Solutions ................. 4571 Sensitech .................................................. 1639 UrgentLink ................................................ 1053
Systech Electronics Limited ......................2447 Site-Secure ................................................. 500 WIRELESS/RADIO/TELEMETRY/LONG
TOUGHDOG SECURITY SYSTEMS ............. 3501 Stratfor .....................................................4583 RANGE MONITORING
TrackTik ......................................................733 The Anvil Group, Ltd. ............................... 1241 AmberBox ................................................... 725
Truen Co., Ltd. ........................................... 508 TrackTik ......................................................733 Aventura Technologies .............................2947
U.S. Security Associates ............................4205 USA, LLC. ..................................................1843 Bo Xin Photoelectric Company, Ltd. ......... 4499
V5 Systems ............................................... 4290 Vismo Global Tracking Solutions ............. 4469 BTU Research............................................3601
Vanderbilt Industries ................................ 4261 HANDLING/COURIER SERVICES Dahua Technology USA, Inc ..................... 4145
Verint Systems, Inc..... .............................. 2623 3SI Security Systems ................................. 2124 Data Comm for Business ........................... 1641
Vintra, Inc.................................................3968 Activist Map ..............................................4472 Department 13 .............................................653
Vismo Global Tracking Solutions ............. 4469 AlutelMobility ........................................... 2547 Electro Optical Industries, Inc.... ...............2121
Wanco .......................................................4682 AT-RISK International ............................... 4271 ENSCO ...................................................... 4553
Weiser Security Services, Inc.... ................2208 FRONTSTEPS ............................................ 3973 EPCOM ...................................................... 4591
Winncom Technologies.............................4073 Kingston Technology ................................ 3791 Epiq Solutions ......................................... 4690
Wireless CCTV, LLC. ....................................707 Milestone Systems ....................................3945 FRONTSTEPS ............................................ 3973
TRACKING/MONITORING Security Guard Management ....................4491 Guardian Zone .......................................... 4178
ARMORED CAR PATIENT/EMPLOYEE MONITORING KBC Networks ...........................................1909
3SI Security Systems ................................. 2124 Alpha Recon ............................................. 1707 Micro Technology Services, Inc................. 3967
Activist Map ..............................................4472 AmberBox ................................................... 725 Newmar ....................................................4097
AFIMAC.....................................................3856 Apollo ....................................................... 3033 NVT Phybridge ..........................................2443
Apollo Video Technology ......................... 4494 AT-RISK International ............................... 4271 Occly ........................................................... 742
AT-RISK International ............................... 4271 Biometric Signature ID............................... 903 Ontario-Canada Delegation ........................507
BulletSafe Bulletproof Vests .....................4569 Bo Xin Photoelectric Company, Ltd. ......... 4499 PetroCloud, LLC. ....................................... 4163
KINETIC CONSULTING ............................... 849 CodeLynx, LLC .......................................... 1620 Prime Base, Inc.... ..................................... 4391
The Anvil Group, Ltd. ............................... 1241 Cyber Defense Labs ...................................1046 Qognify ......................................................1515
CANINES FRONTSTEPS ............................................ 3973 Security Centres International USA, LLC...1843
3SI Security Systems ................................. 2124 G4S ........................................................... 3733 Site-Secure ................................................. 500
Activist Map ..............................................4472 Galaxy Control Systems ............................ 2241 Southwest Microwave, Inc.... .................... 2232
AFIMAC.....................................................3856 Gorilla Technology, Inc. ........................... 4069 Trackforce ................................................. 2747
Allied Universal Security Services ............ 2733 Handheld .................................................. 1622 UrgentLink ................................................ 1053
Battelle .....................................................4292 HX Global ................................................ 4390 V5 Systems ............................................... 4290
BulletSafe Bulletproof Vests .....................4569 IJET International ..................................... 3763 Vismo Global Tracking
K2 Solutions, Inc.... ...................................4067 Iris ID Systems, Inc. .................................. 1309 Solutions.................................................. 4469
GLOBAL POSITIONING SYSTEMS Key Tracer Systems, Inc. ........................... 3441 Winncom Technologies.............................4073
3SI Security Systems ................................. 2124 Milestone Systems ....................................3945 TRAINING
Activist Map ..............................................4472 NVT Phybridge ..........................................2443 THREAT ASSESSMENT
AlutelMobility ........................................... 2547 Occly ........................................................... 742 CAP Index, Inc.... ...................................... 3433
AT-RISK International ............................... 4271 Omnigo Software ........................................518 Emergent Risk International, LLC. ............3970
BrickHouse Security ................................. 2249 On Call International ................................4596 HX Global ................................................ 4390
ELC Security Products ............................... 1539 Ontario-Canada Delegation ........................507 International Association of Professional
FRONTSTEPS ............................................ 3973 Qognify ......................................................1515 Security Consultants (IAPSC)................... 4095
Guardian Zone .......................................... 4178 STANLEY Healthcare..................................3133 KINETIC CONSULTING ............................... 849
Handheld .................................................. 1622 Stanley Security .........................................3133 On Call International ................................4596
Hexagon Safety & Infrastructure................1215 STOPware, Inc. ......................................... 2247 Pinkerton ................................................. 2809
International Road Dynamics, Inc.... ........ 4191 The Anvil Group, Ltd. ............................... 1241 Securitas Canada, Ltd. ............................. 2809
Johnson Controls ...................................... 4119 Trust Farm, LLC.......................................... 946 Securitas Critical Infrastructure
KINETIC CONSULTING ............................... 849 Vismo Global Tracking Solutions ............. 4469 Services.................................................... 2809
Live Earth..................................................4079 PROPERTY MARKING Stratfor .....................................................4583
NC4, Inc.... ..................................................501 CodeLynx, LLC .......................................... 1620 Trust Farm, LLC. ........................................ 946

09-17 Exhibit Guide v2 LO.indd 123 08/17/2017 11:22:58 AM


124
ASIS NEWS

PHOTO COURTESY OF DALLAS INDEPENDENT SCHOOL DISTRICT


CityLab High School is the winner of this year’s
ASIS School Security Grant Competition. Principal
Tammy Underwood displays the new school’s plans
during an orientation.

ASIS AWARDS SCHOOL and a homeless shelter. But with most


of the school’s budget going to new con-

SECURITY GRANT
struction, renovations, and asbestos re-
moval for the 1950s building, there was
little more the school could afford to
THIS MONT TH, THE DA ALLAS INDEP PENDENT SCHOOL DIS STRICT opens the doors improve security. These funds will go a
to its newest transformational school, which is designed specifically for high school long way to provide students and staff a
students interested in architecture, urban planning, environmental science, and safe and secure learning environment.”
community development. CityLab High School will offer students the opportunity The school identified a number of
to leverage the city of Dallas as their own hands-on laboratory. needed security upgrades, including
But this cutting-edge “best-fit-school” concept, part of the city's public school network improvements, new security
choice program, comes with a daunting challenge: ensuring a safe and secure cameras, access control devices, and
environment in an urban city center, and doing so on a limited budget. classroom intercoms covering all five
floors of the building.
That’s where the School Security kind donation of cameras and other “In a large urban school district with
Grant Competition, started by ASIS equipment. limited funds, the responsibility of
International and the ASIS Foundation ASIS 2017 Host Committee Chairman campus safety falls within the school’s
in 2003, plays a critical role. This Martin Cramer, CPP, worked closely with budget,” wrote CityLab High School
year, in conjunction with the ASIS the Dallas Independent School District Principal Tammy Underwood, in her
International 63rd Annual Seminar Police Department to get the word out grant competition application. “This
and Exhibits, ASIS is awarding about the grant and to identify the grant is an amazing opportunity for
CityLab High School a $22,000 grant school with the greatest need. CityLab students and staff to be in a safe
to pay for upgrades to the school’s “CityLab really stood out,” said environment so that they can focus on
camera system, access control system, Cramer. “Parents had voiced concerns their highest educational goals.”
and classroom intercoms. Axis about the school’s proximity to down- The School Security Grant Com-
Communications is making an in- town Dallas, a busy interstate highway, petition is just one of the many ways

0917 ASIS News C .indd 124 08/15/2017 6:28:09 PM


125
SEP 2017 | SECURITY MANAGEMENT

efficient in the classroom, and they also


have fewer symptoms of depression. I
ASIS BOARD
GIVING BACK want parents, students, staff, and visitors OF DIRECTORS
to be comfortable and confident coming
to our building.” PRESIDENT
• Thomas J. Langer, CPP
BAE Systems Inc.
A WORLD OF OPPORTU- Arlington, Virginia
NITY AT THE ASIS 2017 PRESIDENT-ELECT
CAREER CENTER • Richard E. Chase, CPP, PCI, PSP
As the premier education and technol- General Atomics
ogy event for security professionals San Diego, California
ASIS International is dedicated worldwide, ASIS 2017 promises unpar- TREASURER
to giving back to the communi- alleled networking and career develop- • Christina Duffey, CPP
Anderson Security Agency
ties that host its annual seminar. ment options. Phoenix, Arizona
This is reflected in the Security Now in its sixth year, the Career Center
SECRETARY
Cares program taking place on will continue to offer unprecedented pro- • Godfried Hendriks, CPP
Wednesday, September 27, and fessional value. Free to all attendees, the GOING Consultancy B V
Thursday, September 28, at ASIS Career Center offers résumé reviews, ca- Alkmaar, The Netherlands
2017. reer coaching, networking opportunities CHAIRMAN OF THE BOARD
Security Cares is a community with employers and peers, and access to • David C. Davis, CPP
Apple Valley, California
safety and security initiative career development tools and job post-
DIRECTORS
designed to educate leaders of ings—plus free professional headshots in
• Charles E. Andrews, CPP
small and medium-sized busi- the Headshot Studio. Friends of Chuck
nesses, as well as cultural and The excitement starts on Tuesday, Houston, Texas
community institutions—such September 26, with a Coffee and Careers • Howard J. Belfor, CPP
as churches and schools— Networking Event sponsored by the Belfor & Associates
about the fundamentals of Young Professionals Council, a perfect Black Mountain, North Carolina
security and preparedness. place for great networking. Attendees • Michael R. Bouchard, CPP
Janus Global Operations
Through Security Cares, ASIS currently seeking jobs in the security
Reston, Virginia
International will provide easily field will want to return later for an in-
• Darryl R. Branham, CPP
implementable prevention and teractive panel session, “What Security Avnet Inc.
preparedness strategies and Employers Look For and What Makes Phoenix, Arizona
best practices, as well as access Candidates Stand Out,” where senior • Gail Essen, CPP, PSP
to a global pool of security security executives and hiring managers Professional Security Advisors
thought leaders and solutions will share what elements in an appli- Andover, Minnesota
providers. This year's free cant’s history impress employers, de- • Radek Havlis, CPP
program will focus on active scribe what they look for in interviews, PricewaterhouseCoopers
Prague, Czech Republic
shooter, cybersecurity, and safe and provide advice on how to stand out
mail handling best practices. from the crowd. • Jeffrey J. Lee, CPP
Saudi Aramco
View the full program at: The day culminates with a session for Dhahran, Saudi Arabia
securityexpo.org/securitycares. ambitious professionals who have set
• Richard F. Lisko, CPP
their eyes on the top and are looking for Willis Towers Watson
an answer to the question, “How do you Dallas, Texas
become a CSO?” This is their opportu- • Timothy M. McCreight, CPP
ASIS International pursues its mission nity to hear straight from senior execu- Hitachi Systems Security
to advance security management best tives how they reached the top, lessons Calgary, Alberta, Canada
practices and give back to the community learned along the way, and how attend- • Jaime P. Owens, CPP
hosting the Annual Seminar and Exhibits. ees can benefit from their experiences. Panama Canal Authority
Panama City, Panama
“Without a doubt, school safety On Wednesday, the Career Center will
contributes to academic success, and hold another Coffee and Careers Network- • John A. Petruzzi, Jr., CPP
G4S North America
promotes innovation, inquiry, and risk ing Event for those looking to transition New York, New York
taking in high-poverty, high-performing into the security field to help them create
• Malcolm C. Smith, CPP
schools,” wrote Underwood. “Students new professional connections, foster ones Qatar Museums
who feel safe are more attentive and already made, and take part in engaging Doha, Qatar

0917 ASIS News C .indd 125 08/15/2017 6:28:26 PM


126
ASIS NEWS

discussions on career development. Af- vital that security professionals in every advice, and professional development
terwards, attendees will have a chance focus area can collaborate and identify that will be available.”
to further build on those discussions comprehensive solutions for the risks Whether attendees are new to the
when they take part in the “Career De- facing citizens, industry, and govern- security field and looking for those first
velopment in Security” session, which ments around the world. valuable connections, or seasoned vet-
will offer young security professionals Career Coaching and résumé reviews erans of the industry seeking to further
the tools and best practices they need to will take place during exhibit hours. their existing careers, the Career Center
grow their security careers. Stop by to book an appointment. offers a world of opportunity ready to
The Career Center wraps up with “ASIS has been instrumental to be explored.
a bang on Thursday with two of its my professional development and as
most impactful sessions. The first, cochair of the Young Professionals INTERNATIONAL BUYER
“Mentoring: Guiding Tomorrow’s Council, it has PROGRAM HELPS EX-
Leaders” will provide the next been particularly PAND ASIS 2017’S GLOBAL
generation of security industry leaders rewarding to FOOTPRINT
with another avenue to hone their skills help shape the Attendees and exhibitors at ASIS 2017
to achieve their career goals, whether high-caliber will have the chance to expand the
it’s to embark on a new challenge or programming. From scope of their business opportunities
advance within their organization. CSO perspectives to a global level. Thanks to the U.S.
Panelists will examine the importance to employer hiring ANGELA
Department of Commerce International
of mentoring, as well as what to look for needs to mentorship OSBORNE, PCI Buyer Program (IBP), a joint govern-
in a mentor, key factors in building an best practices and leadership skills, ment-industry effort, hundreds of global
effective relationship, and the qualities ASIS 2017 will provide security buyers from multiple delegations will
of a successful mentee. professionals at every stage of their attend ASIS 2017 for business-to-busi-
Attendees will continue examining careers with the tools they need to ness matchmaking with exhibitors and
the future of security with a conver- succeed in today’s job environment,” attendees. The buyers represent security
gence panel that will explore the says Angela Osborne, PCI, regional professionals from around the world.
ever-changing relationship between director for Guidepost Solutions. “I “The International Buyer Program
information technology and physical encourage security professionals across provides an excellent opportunity
security. As threats around the globe every sector to take advantage of the for security professionals globally to
become increasingly sophisticated, it is breadth of career-enhancing education, benefit from the collective wisdom of

INTERNATIONAL BUYER PROGRAM PARTICIPANTS


AMONG THE ESCORTED DELEGATIONS THAT
WILL BE ATTENDING ASIS 2017 ARE:
Algeria  
Brazil  
Canada  
China  
Colombia  
Dominican Republic  
Honduras  
Kenya  
Kuwait  
Latvia  
Morocco  
Nigeria  
Pakistan  
Palestine/ West Bank  
Saudi Arabia  
Taiwan  
Thailand  
Trinidad and Tobago  
Turkey  
UAE  
Ukraine 

0917 ASIS News C .indd 126 08/15/2017 6:28:38 PM


ASIS International and the

40th
Professional Certification Board
proudly recognize the

ANNIVERSARY
of the
ASIS Board Certification Program.

1977-2017

Recognized as a mark of excellence,


the Certified Protection Professional (CPP®) was the
first credential created specifically for security managers.
The CPP remains the gold standard worldwide.

asisonline.org/anniversary
128
ASIS NEWS

ASIS CLASSROOM
PROGRAMS
SEPTEMBER
23-24 CPP, PCI, PSP Certification
Reviews, Dallas, Texas, USA
24 Successful Security Consulting,
Dallas, Texas, USA
24 IT Security for Physical Security
Professionals—In Plain English,
Dallas, Texas, USA
24 Security Risks and Mitigation
Strategies for Financial Institutions,
Dallas, Texas, USA
OCTOBER
The ASIS Diamond Club Security 15-20 ASIS Wharton Program for
Buyers Forum in late July brought Security Executives
together security decision makers
NOVEMBER
and leading solutions providers for
tailored buying opportunities, as 6-7 Security Force Management, New
well as education and networking. Orleans, Louisiana, USA
6-8 Conducting Advanced Internal
Investigations, New Orleans, Louisi-
the 22,000 attendees and exhibitors at the on-site International Trade Center, ana, USA
ASIS 2017,” says Godfried Hendriks, where companies can meet privately 6-8 Risk, Threat, and Vulnerability
CPP, managing consultant at GOING with prospective international buyers, Assessment, New Orleans, Louisiana,
Consultancy BV and secretary of the prospective sales representatives, and USA
ASIS International Board of Directors. other business partners. 9-10 Executive Protection, New
“In today’s threat environment, security To assist in facilitating conversations, Orleans, Louisiana, USA
professionals need a global community international trade specialists will be
9-10 Soft Target Hardening, New
of peers they can turn to year-round for available on-site in the International Orleans, Louisiana, USA
support, best practices, and information Trade Center to provide matching as-
sharing. ASIS 2017 will help facilitate sistance and expert trade counseling to ASIS
these relationships.”
Every year, the IBP generates ap-
global delegates and U.S. exhibitors.
Don’t miss out on the chance to ex-
GLOBAL EVENTS
proximately $1 billion in new business pand your global footprint. Stop by the SEPTEMBER
for U.S. companies, primarily through International Trade Center on the expo 25-28 63rd Annual Seminar and
increased international attendance at floor to learn more. Exhibits, Dallas, Texas, USA
participating U.S. trade shows. NOVEMBER
ASIS 2017’s participation in the IBP ALL THE HUB-BUB 5-7 ASIS Middle East 2017, Manama,
provides attendees with access to a ASIS 2017 promises a show floor filled Bahrain
broad array of security professionals, with fantastic networking opportuni-
ASIS
qualified international buyers, repre- ties, groundbreaking security products
sentatives, and distributors. It also in- and service solutions from indus- WEBINARS
creases the chances of finding the right try-leading exhibitors, and second-to- SEPTEMBER
international business partner. Not only none education opportunities. At the 13 Creating Effective Emergency Man-
will attendees meet more global buyers, center of it all is the ASIS Hub, an enor- agement Tabletop Exercises
representatives, and distributors, but mous 1,600-square-foot presence on the OCTOBER
exhibitors’ products and services can show floor that is serving as the place
11 Negotiating, Drafting, and
be listed in the Export Interest Directory for all things ASIS International.
Enforcing Service Agreements
and distributed to all international visi- The Hub is the primary location for
tors for additional awareness. meeting with ASIS staff and learning View the full education lineup at
asisonline.org/learn
Once a potential partner is identified, more about becoming a member, ob-
attendees have complimentary use of taining one of the three board certifi-

0917 ASIS News C .indd 128 08/15/2017 6:28:51 PM


129
SEPT 2017 | SECURITY MANAGEMENT

the shared goal of advancing global se-


#MYASIS IMAGE OF THE MONTH
curity. Engaged in their local communi-
ties year-round, members are dedicated CHAPTER
to the security mission and making all ANNIVERSARIES
communities safer places to live. Addi-
tionally, ASIS certifications are recog-
Congratulations to the ASIS chapters
nized worldwide as the gold standard celebrating milestone anniversaries
of excellence in security management. in the third quarter of 2017.
Offering Certified Protection Profes-
sional® (CPP), Professional Certified 5 years
Investigator® (PCI), and Physical Secu- • Montevideo, Uruguay
rity Professional® (PSP) accreditations • Cairo, Egypt
that are transferable across all industry
• Pakistan
sectors and geographic borders, ASIS
• Botswana
certifications are valuable investments
in advancing a security career.
Those who stop by the Hub can gain 10 years
insights and tools needed to further • Australian Capital
their careers, get more involved in Territory
the Society, and learn about the un- • Croatia
matched benefits of membership in • Dominican Republic
ASIS International.
By Peggy O’Connor, ASIS director of
cations, and getting involved in one of communications. Contact her at peggy. 20 years
the professional interest councils. It’s oconnor@asisonline.org. Follow her on • Bogota, Colombia
also the place to unwind and recharge— Twitter: @pegoco.
literally—in the lounge with several
charging stations. LIFETIME CERTIFICATION 25 years
The Hub will function as the go-to Congratulations to the following mem- • Lagos, Nigeria
space for everything related to ASIS bers who have been named Lifetime • New Delhi, India
councils, with council members stand- Certificants.
ing by to answer questions and offer
expertise. The 34 ASIS councils explore • Thomas M. Prochaska, CPP 30 years
focus areas like Crime Prevention and • W. David Rabern, CPP • North Carolina Piedmont
Loss Prevention, Healthcare Security, • David O. Best, CPP • South Dakota
Information Technology Security, Inves- • Walter F. Bodner, CPP
tigations, Physical Security, and much
more. There is a council for security pro-


James M. Gill, CPP
Peter Urbach, CPP, PCI, PSP
35 years
• Fredericksburg/Quantico
fessionals in nearly every discipline and • Richard G. Steele, CPP
industry sector. • Samuel E. Manto, CPP • Mississippi Gulf Coast
The staging point for multiple Fire- • Spokane
side Chats, the Hub will provide at- LIFE MEMBER
tendees an opportunity to interact in
small groups with speakers after select
The ASIS Board of Directors has granted
life membership to Bob Battani, CPP.
40 years
education sessions. Members can visit • Fort Lauderdale
the Hub for updates on the certification MEMBER BOOK REVIEW • Baton Rouge
programs and exhibitor press confer- The Key to Keys: 5 Steps to Developing • Maryland Suburban
ences. And this year, the prize booth is an Effective Access Control System. By • Austria
located inside the Hub, where, twice Randy Neely. CreateSpace Publishing;
a day, lucky attendees will walk away available from Amazon.com; 118 pages;
with exciting prizes. $15.95.
45 years
Members of ASIS International are While this book could more aptly be • Greater Charlotte
part of the largest community of secu- titled Keys: A Memoir, author Randy
rity professionals worldwide, all with Neely does a sound job of highlighting

0917 ASIS News C .indd 129 08/15/2017 6:29:02 PM


130
ASIS NEWS

CERTIFICATION
a widespread challenge that every-
one in the security business has
PROFILE
FELIX GIANNINI, CPP
experienced at one time or another—the
effective control and accountability of
key and access systems. Aside from six years for 33 years. He was inspired to become a
Neely employs first-person narrative in the U.S. Navy and Certified Protection Professional® (CPP)
to recount his professional history and a short stint working in the 1980s while working as a consulting
how he invented for a marine elec- engineer for the Pitney Bowes Corporation
key and access tronics company, in Stamford, Connecticut. During that time,
control systems,
“I’ve been self-em- he also designed a video conference system
relying too much
ployed my whole between the Riker’s Island Male House of
on personal de-
life,” says Felix Detention and the Bronx Criminal Court so
scription for a
professional publi- Giannini, CPP, presi- hearings could be conducted over a micro-
cation. dent of Lexco Security Systems in Fairfield, wave link. And he designed the first cam-
Nonetheless, the Connecticut. Intrigued by electronics as a era system for the Statue of Liberty.
author does a su- teenager, he repaired audiovisual equip- Giannini earned a bachelor of science
perb job of bring- ment and maintained a state-of-the-art degree in fire protection systems engi-
ing to life the adage that necessity is the video broadcast system while attending neering and is working on a master’s in
mother of invention. After experiencing
high school in Mamaroneck, New York. The emergency management. He applies edu-
a series of expensive lost key episodes,
two men who managed those operations cational concepts to assessing a company’s
he created a system to more effectively
manage keys. Valuable first-hand sto- had an alarm business on the side. “So in risks and hazards and designing mitigation
ries help round out the problem-im- the 1970s I began installing security sys- strategies. “It’s not about the systems we
pact-solution triad. tems,” Giannini recalls. “I was trained by install,” he says. “It’s about the people, the
Neely chronicles the financial and workmanship fanatics,” he says, “and that programs, and the training.”
legal impacts that inadequate controls has influenced my whole career.” As a CPP, Giannini earns respect from
can bring. For example, a single set of Instilling professional workmanship client companies. “It says that I have an
lost master keys cost a university nearly
practices and standards within the awareness level and that I speak their lan-
$350,000. The impact doesn’t end with
security installer community is extremely guage,” he says. “It’s not just about selling
the bottom line, but it can also adversely
important to Giannini. He believes that cameras and monitors…it’s a much bigger
affect legal documents and court cases,
as well as an organization’s reputation. low standards—a lack of professional picture and a lot more responsibility.”
The Key to Keys has some instructive training among company owners, reduced Giannini has been vice chair of the
value to students of security manage- educational requirements for licensed Southern Connecticut Chapter for five
ment, but it goes too far in promoting the low-voltage electrical contractors, and years. He is proud of his chapter affiliation
author’s products. Further, some of the scant funds for enforcement—lead to and has been instrumental in attracting
photos, tables, and figures lack defining increased false alarms and a profession speakers on such topics as social media
labels or captions, are presented out of
relegated to insignificance. and personal branding. He also helped cre-
focus, or do not adequately line up.
Giannini’s company focuses on large ate the first ASIS “Sister Chapter” relation-
The most valuable lesson from this
book is that motivation and initiative commercial, industrial, and institutional ship between his chapter and ASIS Italy.
can inspire an earnest practitioner to systems in the United States and overseas. Being a member of ASIS has been
not only safeguard people and prop- He works with clients not only as a sys- an “incredible benefit,” says Giannini,
erty, but also to take that next step and tems integrator but also as a consulting but not because he uses it as a vehicle
invent new and effective ways to help engineer and project manager. In those to get work.” I don’t want to ever taint
improve security practices. roles, he is aware of the potential for con- my membership,” he says. “It’s been an
REVIEWER: Terry Lee Wettig, CPP, is flicts of interest. “If I design and manage inspiration to be a professional, especially
an independent security consultant. He
a project, I have no business also install- as a systems integrator.”
was previously director of risk manage-
ing,” he says. “The systems are designed
ment with Brink’s Incorporated and a
U.S. Air Force chief master sergeant. He and implemented in the best interests PROFILE BY MARY ALICE

is a doctoral candidate in organizational of the company, not the local vendors.” DAVIDSON, PRINCIPAL, DAVIDSON
management and a member of ASIS. Giannini has been a member of ASIS COMMUNICATIONS

0917 ASIS News C .indd 130 08/15/2017 6:29:12 PM


ASIS MIDDLE EAST 2017
Securing Economic Diversification
BAHRAIN 5 – 7 November 2017

Early
rates
end er
4 Octob

Senior Large Access


delegates multinationals ASIS
global community

www.asismiddleeast.org
132
LEGAL REPORT | BY MEGAN GATES

ELSEWHERE
IN THE COURTS

SOLICITATION that used victims to cash counterfeit


Robert Doggart, checks and money orders, used stolen
65, of Signal credit card numbers to purchase
Mountain, Ten- electronics, and used stolen personal
nessee, was identification information to take over
sentenced to 235 victims’ bank accounts, causing millions

JUDICIAL months in prison for soliciting another


person to burn down a mosque in New
of dollars in losses. (U.S. v. Ayelotan, U.S.
District Court for the Southern District

DECISIONS York—a violation of U.S. civil rights laws.


In February 2015, a confidential source
of Mississippi, No. 1:14cr33, 2017)

COERCION. In the first decision of its told the FBI that Doggart was recruiting DISCRIMINATION
kind, the U.S. National Labor Relations
people online to carry out an armed at- Rosebud
Board (NLRB) has ruled that an employer
tack on Islamberg, a community in New Restaurants,
committed an unfair labor practice when
a manager texted an employee asking York that is home to a large number of Inc., will pay $1.9
whether the employee’s loyalties lay Muslims. “Doggart specifically targeted million and other
with the company or the labor union. the mosque because it was a religious relief to settle a class race discrimination
RHCG Safety Corp. (Redhook) is a building, and he discussed burning it lawsuit brought by the U.S. Equal
general construction contractor in down or blowing it up with a Molotov Employment Opportunity Commission
New York City. During an organizing cocktail or other explosive device,” ac- (EEOC). According to the EEOC, 13 of
campaign during the summer of 2015,
cording to the U.S. Department of Justice. Rosebud’s restaurants “refused to hire
a construction union attempted to
(U.S. v. Doggart, U.S. District Court for the African-Americans because of their
convince employees to vote in favor
of union representation. During the Eastern District of Tennessee at Chatta- race” and Rosebud’s owner “used racial
campaign, Redhook employee Claudio nooga, No. 1:15-cr-39-CLC-SKL-1, 2017) slurs to refer to blacks” in violation of
Anderson needed to take time off to Title VII of the Civil Rights Act of 1964.
travel to Panama to care for his mother. FRAUD The settlement requires Rosebud to
Anderson’s supervisor, David Three Nigerian nationals were sentenced pay $1.9 million to African-American
Scherrer, allowed Anderson to take for their roles in a large scale international applicants Rosebud did not hire, along
the time off. Before Anderson left for
fraud network. The men were extradited with requiring it to create hiring goals for
Panama, however, he visited the union’s
from South Africa and found guilty qualified black applicants and prohibiting
offices and signed an authorization
card indicating that he supported of mail fraud, wire fraud, identity it from engaging in race discrimination
union representation. His mother’s theft, credit card fraud, and theft of in the future. (EEOC v. Rosebud, U.S.
health also improved at the same time, government property for their role in District Court for the Northern District
so Anderson decided not to take a several Internet-based fraud schemes of Illinois, No. 13-cv-6656, 2017)
leave of absence from work and texted
Scherrer about returning to work.
Scherrer responded, according

ISSUE: Lactation ISSUE: Executive Protection

LEGAL BILL: Lactation in the Workplace Ordinance BILL: H. Res. 411


LEGISLATION

VENUE: San Francisco VENUE: U.S. House of Representatives

HIGH-
STATUS: Enacted STATUS: Enacted
SIGNIFICANCE: Requires employers SIGNIFICANCE: Gives lawmakers an

LIGHTS
to provide reasonable break times to additional $25,000 to cover security costs
accommodate employees and a room—other at their offices or public events, as long as
than a toilet stall—near their work areas to the event is for official business.
express milk privately.

0917_Legal_Report_C.indd 132 08/17/2017 1:53:09 PM


Cyber, Physical
or Insider Threat?
All of the above?

r ly bi r d
Ea
rates er
l 1 5 N ovemb
unti

www.asiseurope.org
134
LEGAL REPORT | BY MEGAN GATES

to NLRB documents, with a text ings; cease and desist in interrogating


message that asked: “What’s go- employees about their union activities;
FOR MORE
ing on with u? U working for Red- and post a notice that the company’s INFORMATION:
hook or u working in the union? U actions violated the NLRA. (RHCG
CAPITOL SWITCHBOARD
got to tell me what’s going on.” Safety Corp. and Construction & General (INFORMATION):
Anderson texted back that he’d been Building Laborers, Local 79, LIUNA, U.S. 202/224-3121
to the Redhook office that day to speak National Labor Relations Board, No.
to Scherrer, but had missed him. He 29-CA-161261 and 29-RC-157827, 2017) LEGISLATIVE STATUS OFFICE
(STATUS OF BILLS):
got no response, and two days later
202/225-1772
Scherrer texted Anderson to tell him MARIJUANA. An employer acted
he’d given his position to someone else. illegally when it failed to hire a To see the full text of selected
regulations, bills, and reports, visit
The union then filed an unfair labor medical marijuana user because
www.securitymanagement.com
practice charge against Redhook, al- she disclosed she could not pass a and click on SM Online.
leging that the company violated the preemployment drug test, a Rhode
National Labor Relations Act (NLRA) Island state court has ruled.
through Scherrer’s text messages. The ruling stems from a case
The NLRB ruled in the union’s fa- brought by Christine Callaghan, who
vor, finding that the texts violated the in June 2014 was a master’s student a positive test would “prevent the
NLRA because they were sent in re- studying textiles at the University of company from hiring her,” the
sponse to an employee’s inquiry about Rhode Island. To meet a graduation lawsuit said. McGrath and her col-
whether he should return to work. requirement, she applied for an in- league then ended the call.
“By juxtaposing working with ternship with Darlington Fabrics—a They called Callaghan later that af-
Redhook with working in the union, division of the Moore Company. ternoon and told her that Darlington
Scherrer’s text strongly suggested Callaghan met with Darlington could not hire her because, according
that the two were incompatible,” Human Resources Coordinator Karen to court documents, “Ms. Callaghan put
the NLRB said in its ruling. McGrath and signed a Fitness for Duty the corporation on notice that she was
Redhook had also argued that text Statement, which said she would currently using marijuana, would not
messages could not be considered have to take a drug test before being stop using marijuana while employed
“unlawful interrogation.” The board, hired as an intern. During this meet- by the company, and could not pass the
however, did not find this argument ing, Callaghan also told McGrath that required preemployment drug test, and
persuasive because previous deci- she had a medical marijuana card in thus could not comply with the corpo-
sions found that interrogations do compliance with Rhode Island’s Haw- ration’s drug-free workplace policy.”
not have to be in-person to violate the kins-Slater Medical Marijuana Act. Callaghan then filed a lawsuit,
NLRA—that violations can stem from A few days after the meeting, McGrath charging that Darling’s decision not
coercive writings or phone calls. and a colleague called Callaghan and to hire her was a violation of the
Applying these same principles, asked if she was currently using medi- Hawkins-Slater Act, a violation of
the NLRB said there was “no rea- cal marijuana. Callaghan said she was, the Rhode Island Civil Rights Act,
son why [there should be] a safe according to court documents, so she and employment discrimination.
harbor for coercive employer in- would test positive on her preemploy- The suit reached the Rhode Island
terrogations via text messages.” ment drug screening. She also said that Superior Court, which ruled in Cal-
The board ordered Redhook to re- she was allergic to many other painkill- laghan’s favor because of the language
instate Anderson to his former job or ers, and that she would not bring mari- in the Hawkins-Slater Act that says
a substantially equivalent position; juana into the workplace or use it there. “no school, employer, or landlord may
compensate him for any loss of earn- McGrath then told Callaghan that refuse to enroll, employ, or lease to,

ISSUE: Cyberattacks ISSUE: Terrorism

LEGAL BILL: Amend. 80 BILL: Antiterrorism Decree


LEGISLATION

VENUE: U.S. House of Representatives VENUE: Qatar

HIGH-
STATUS: Passed STATUS: Enacted
SIGNIFICANCE: Would require the SIGNIFICANCE: Sets rules for defining

LIGHTS
secretary of defense to report to Congress terrorism, acts of terrorism, freezing
any attempt by the Russian government— funding, and financing terrorism in an
or Russian actors—to attack the U.S. effort to counter accusations that Qatar
Department of Defense’s systems. supports terrorism.

0917_Legal_Report_C.indd 134 08/15/2017 6:30:13 PM


REACH
NEW HEIGHTS
Earn an ASIS board certification, recognized
worldwide as the mark of excellence
in security management.

The gold standard, ASIS certifications are transferable


across all industry sectors and geographic borders.
Today, security professionals in 85 countries proudly
maintain their ASIS board certifications.

Distinguish yourself as the best of the best by


earning the CPP, PCI, and PSP! Get started today
at asisonline.org/climb.

“Attaining the CPP, PCI,


and PSP has helped
tremendously in my
leadership roles
with Brink’s.”
Martin Deslauriers, CPP, PCI, PSP
Senior Director
Corporate Security-Canada, Brinks Canada

Full Page Template.indd 1 08/17/2017 3:56:18 PM


136
LEGAL REPORT | BY MEGAN GATES

or otherwise penalize a person solely “This meant that Three’s emer- If adopted, the proposal would be
for his or her status as a cardholder.” gency call service was vulnerable to at odds with the U.K., U.S., Australia,
Callaghan disclosed to Darling that a single point of failure,” Ofcom said and even some European governments’
she was a medical marijuana card in a press release. “Three’s network stances that technology firms should
holder and user; Darling’s refusal to should have been able to automatically create backdoors to help fight terrorism.
hire her after she made the disclosure divert emergency calls via back-up
violated state law, the court said. routes in the event of a local outage. United States
Judge Richard Licht also wrote in But these back-up routes would also UTILITIES. The U.S. House of Rep-
his opinion that Darling’s position have failed because they were all resentatives is considering legisla-
would place medical marijuana users directed through this one point.” tion that aims to reduce the threat
in a worse position than recreational Ofcom issued the penalty to re- of wildfires to electric transmis-
users who might also apply for jobs flect the “seriousness of the breach, sion and distribution facilities.
with the company. For instance, a given the potential impact on pub- The resolution (H.R. 1873) would
recreational marijuana user could lic health and safety,” it said. amend the Federal Land Policy and
stop using for long enough to pass Management Act of 1976 to ensure that
the preemployment drug test and
not be subject to future tests.
LEGISLATION all existing and future rights-of-way
established by grant, special use au-
“The medical user would not be able European Union thorization, and easement for electrical
to cease for long enough to pass the ENCRYPTION. The European Par- transmission and distribution facilities
drug test, even though his or her use liament Committee on Civil Liberties, include provisions for utility vegeta-
is necessary to treat or alleviate pain, Justice, and Home Affairs has endorsed tion management, inspection, and
nausea, and other symptoms associated a new amendment to require end-to-end operation and maintenance activities.
with certain debilitating medical con- encryption on all communications. The resolution would require trans-
ditions,” Licht explained. (Callaghan The committee released a draft pro- mission and distribution facility owners
v. Darlington Fabrics, Rhode Island Su- posal (amendment 16) that recommends and operators to create a plan for vege-
perior Court, No. PC-2014-5680, 2017) introducing regulations to enforce tation management that “provides for
end-to-end encryption on all communi- the long-term, cost-effective, efficient

REGULATIONS cations to protect European Union (EU)


citizens’ fundamental privacy rights.
and timely management of facilities and
vegetation within the width of the right-
COMMUNICATIONS. U.K. communi- “Furthermore, when encryption of of-way and adjacent federal lands to
cations regulator Ofcom fined mobile electronic communications data is enhance electricity reliability, promote
network operator Three £1.8 million used, decryption, reverse engineering, public safety, and avoid fire hazards.”
(approximately U.S. $2.4 million) for or monitoring of such communications The resolution was introduced by U.S.
weaknesses in its emergency call net- shall be prohibited,” the proposal said. Rep. Doug LaMalfa (R-CA) and, as of
work that is required to ensure uninter- “Member states shall not impose any press time, had 20 bipartisan cosponsors.
rupted access to emergency services. obligations on electronic communica- “Under this legislation, rural electric
Three notified Ofcom in October tions service providers that would result co-ops, utilities, and municipal power
2016 of a temporary loss of service in the weakening of the security and en- providers will be able to proactively
in Kent, Hampshire, and parts of cryption of their networks and services.” remove hazardous trees before they be-
London. Ofcom investigated the is- The proposal also calls for a ban come problems, not after they’ve caused
sue, and found that emergency calls on “backdoors” into encrypted a fire,” LaMalfa said in a statement.
from customers in these areas had messaging apps because electronic
This column should not be construed
to pass through a single data cen- communications data should be
as legal or legislative advice.
ter to reach emergency services. treated as confidential data.

ISSUE: Marijuana ISSUE: Discrimination

LEGAL CASE: Barbuto v. Advantage Sales and CASE: EEOC v. Chemtrusion, Inc.
COURT CASES

Marketing VENUE: U.S. Dist. Ct. South. Dist. of IN

HIGH-
VENUE: Massachusetts Supreme Court STATUS: Settled
STATUS: Ruled in favor of Barbuto SIGNIFICANCE: Chemtrusion will pay

LIGHTS
SIGNIFICANCE: Allows Barbuto’s case $145,000 and other relief to settle a disability dis-
against her former employer to move crimination lawsuit alleging it refused to hire job
forward, alleging handicap discrimination applicants based on medical information from
for firing her for using medical marijuana. preemployment examination.

0917_Legal_Report_C.indd 136 08/15/2017 6:30:24 PM


NAVIGATE
REAL-WORLD CHALLENGES
IN NEW ORLEANS
Choose from these dynamic programs addressing the most current
best practices and trends in each topic area. Interactive learning
formats and peer-to-peer networking provide collaborative environ-
ments ideal for sharing insights, examining strategies, and getting
answers to your questions.

Security Force Risk, Threat, and Executive Protection


Management Vulnerability Assessment November 9-10
November 6-7 November 6-8 This comprehensive course
Acquire a comprehensive update Risk assessments are essential provides a detailed introduction
on core management require- for organizational resilience. to the executive protection
ments, then apply what you learn This course offers a comprehen- profession. It will emphasize the
to overcome evolving challenges sive examination of all aspects of risk assessment—the foundation
to effective force management. planning and implementing a of executive protection—and
Identify what it takes to risk assessment program in any includes a critique of real-word
transform a good security size organization, in any industry events and lessons learned.
program into a great one. or setting. ASIS Certificate Course

Conducting Advanced Soft Target Hardening


Internal Investigations November 9-10
November 6-8 Violence against soft targets is
Internal investigations are becoming more frequent and
complex undertakings. more deadly. Identify low-cost, yet
Only a properly conducted highly effective physical measures
investigation can withstand to deal with active threats and
today’s intense scrutiny. emergency situations and put an
Examine the methods, tools, effective threat management
and legal implications of program into place.
modern fact-finding in
the workplace.

Learn more and register at


asisonline.org/nola

Early-bird savings
end September 30.
138
INDUSTRY NEWS | BY FLORA SZATKOWSKI

PROTECTING FINE ART BSE (formerly the Bombay Stock


Exchange Ltd.) selected IBM Security
THOUSANDS OF VISITORS enter El Museo Thyssen-Bornemisza in Madrid to design, build, and manage a cyber-
each day to view the museum’s priceless masterpieces. To safeguard the precious security operations center.
art, the museum recently switched from analog video surveillance to an IP-based IDSecurityOnline entered into an
system. Bosch Security Systems helped the museum create a single integrated exclusive distribution agreement with
security system with a Bosch Video Management System and IP cameras that pro- ScreenCheck for its new line of dura-
vide recording and storage of images, in addition to video analytics. ble ID card printers.
A special “museum mode” enables administrators to predefine a perimeter Lexmark International, Inc., an-
around an artwork, creating a virtual, invisible protective barrier. When the perim- nounced that its Secure Document Mon-
eter is breached by, say, an attempt to touch an artwork, an alarm is sent to the con- itor uses Intelligent ID’s Endpoint ID.
trol center and security’s mobile devices, so personnel can quickly take action. This XProtect IP video management soft-
virtual barrier is a convenient alternative to conventional infrared barriers. ware from Milestone Systems was
For those exhibits displayed in low-light conditions, the museum selected selected to protect a Picasso exhibit at
Bosch IP cameras with starlight technology. These cameras ensure that dimly lit the Tomie Ohtake Institute in São
areas can be properly monitored without additional lighting, and the museum Paulo, Brazil.
need not compromise artistic concepts and ambience for security reasons. Scania AB is using a Morse Watch-
mans key control and management
PARTNERSHIPS Disaster recovery service provider system.
AND DEALS Databarracks has announced that it NAPCO Security Technologies,
BriefCam video analytics embedded in is now a corporate partner of the Busi- Inc., will supply Pepperdine Univer-
Milestone’s video management plat- ness Continuity Institute. sity with its Trilogy Networx Locks for
form are making efficient video inves- EyeLock LLC entered into a partner- use on the Malibu, California, campus.
tigation possible for Massachusetts ship with STANLEY Security to de- OnSSI is integrating its Ocularis 5.3
General Hospital. liver EyeLock’s suite of access control with S2 Security Corporation’s Net-
Bristow U.S. LLC won a contract solutions to North America. Box software.
from Hess Corporation for medevac Hikvision will help secure the iconic Quantum Corp. announced that Zhe-
services in the Gulf of Mexico. Holocaust Memorial Miami Beach. jiang Uniview Technologies Co. Ltd.,
Get the
Virtual Experience
New this year, Global Access LIVE! provides live streaming
of select education sessions and keynotes from ASIS 2017.

GLOBAL ACCESS

LIVE!
Even if you can’t join us in Dallas, you can still get valuable education
and inspiring keynotes delivered directly to your desktop in real
time—no travel required! Plus, receive access to the recorded
virtual sessions and the option to purchase all ASIS 2017
conference recordings and presentations at a discounted rate.

This is a great opportunity to earn CPE credits from the


comfort of your office—or, gather your team to listen
and learn together!

• Live streaming of 8 sessions and 4 keynotes


• Select a 1-, 2- or 3-day package
• Earn up to 12 CPEs

Learn more and register at


securityexpo.org/live
140
INDUSTRY NEWS | BY FLORA SZATKOWSKI

will become a Quantum value-added re- for technology products and related Award for best risk solution.
seller and strategic alliance partner. services from the city of Charlotte, Crowe Horwath has been designated
Razberi Technologies will embed Cy- North Carolina. as a HITRUST CSF Assessor by HITRUST.
lancePROTECT software from Cylance in The STRATTON U.S. Coast Guard At KuppingerCole’s recent Euro-
Razberi ServerSwitchIQ appliances. cutter recently deployed with a small pean Identity & Cloud Conference in
Security Door Controls added unmanned aerial system, the Insitu Munich, Germany, the Danfoss IoT
Ascheman Marketing Group to its ScanEagle, which helped in four interdic- security framework project was rec-
national family of security industry tions—seizing more than 1,676 kilograms ognized with an award in the Best IoT
sales and support centers. of illicit contraband and apprehending Security Project category.
Siklu Inc. signed a distribution 10 suspected drug traffickers. EventTracker announced that SC
agreement with ALLNET, which will Nextdoor social network for neighbor- Magazine awarded EventTracker SIEM-
carry Siklu’s complete line of millime- hoods is partnering with the U.S. Fed- phonic with a perfect five-star rating
ter wave wireless radios. eral Emergency Management Agency in the 2017 UTM/SIEM/NGFW annual
TierPoint, LLC, is partnering with to support its mission to help communi- product Group Test review.
Compass Datacenters to build a new ties prepare for and mitigate all hazards. EyeLock LLC received a U.S. patent
facility in Broken Arrow, Oklahoma. UL received a grant from the U.S. for enabling a single camera to acquire
Defense Advanced Research Proj- iris biometrics, as well as a face image, by
GOVERNMENT ects Agency for cybersecurity testing providing suitable illumination for both.
CONTRACTS of Internet of Things (IoT) gateways for FreeWave Technologies, Inc., an-
American Traffic Solutions won a con- industrial control system applications nounced that its ZumLink 900 Radio
tract from the Houston-Galveston Area to help mitigate security risks. Series and Industrial IoT Programmable
Council for traffic control, enforcement, Radio were named bronze award win-
and signal pre-emption equipment. AWARDS AND ners by the American Business Awards
ASPIDER-NGI and SURFnet, the CERTIFICATIONS and the IT World Awards, respectively.
Dutch National Research and Education Forbes named Allied Universal to its G2’s Payment Laundering Detection
Network, are partnering on eSIM to de- America’s Best Employers list for 2017. was named a 2017 Pay Awards winner in
velop applications with an initial focus on ByteGrid Holdings LLC was the Fraud Fighter category. The selection
identity management and authentication. awarded FedRAMP Ready status by the was made by a panel of payment indus-
Axon announced that the Alameda U.S. Federal Risk and Authorization try experts assembled by Paybefore.
County Sheriff’s Office in California Management Program. The G4S North America Training
purchased Axon Body 2 cameras and a ClearDATA was granted EU-U.S. Pri- Institute was named one of the best
five-year Evidence.com license. vacy Shield Certification. organizations for learning and develop-
An updated Disaster Resilience Concurrent Technologies Corpo- ment by Chief Learning Officer maga-
Scorecard was developed for the ration was recognized as a 2017 Best zine for the fourth consecutive year.
United Nations Office for Disaster for Vets employer by Military Times. Hikvision announced that its DS-
Risk Reduction by AECOM and IBM Conformance Technologies an- 2TD4035D-25 Bi-Spectrum PTZ Camera
with support from USAID and the Eu- nounced that its InConRadar offering System was named the 2017 ESX Inno-
ropean Commission. received the Electronic Transactions vation Award winner in the video
Mosaic451 was awarded a contract Association’s PayPal Tech Innovation surveillance category.

A safety, security, and crowd


control system from DXC
Technology helped keep pilgrims
safe during Hajj 2016 in Mecca,
Saudi Arabia. The Makkah Region
Development Authority partnered
with DXC to reduce the risk of
overcrowding at the stations and
platforms along the Al Mashaaer
Al Mugaddassah Metro Southern
Line. The tool was implemented
following a 2015 stampede that
killed more than 2,000 people in
Mecca during Hajj.
141
SEP 2017 | SECURITY MANAGEMENT

Hillard Heintze announced that it DataPath, Inc., expanded operations USAV, a team of audio-visual integra-
achieved ISO/IEC 27001:2013 information in the Washington, D.C., area to comple- tors, and its affiliate CI Edge.
security certification from the BSI Group. ment its existing Maryland office. The Security Industry Association
NAPCO Security Technologies an- Detection Technology Plc. com- (SIA) established the SIA Public Safety
nounced that its StarLink Connect was pleted the expansion of its Beijing factory, Working Group to develop recommen-
awarded a 2017 ESX Innovation Award with a larger production floor and new in- dations to improve the safety, security,
in the intrusion systems category. vestments in automation and technology. and sustainability of cities.
OpSec Security gained ISO 14298 Frontier Services Group Limited Security On-Demand Inc. acquired
security standard accreditation for its acquired 25 percent of the Interna- Infobright Approximate Query tech-
Washington and Leicester facilities. tional Security and Defense College nology and intellectual property assets
The Protection Bureau announced in Beijing, becoming the largest private from Infobright Corporation.
that The Monitoring Association security training school in China. Software Assurance Forum for
renewed its TMA Five Diamond Moni- F-Secure acquired Digital Excellence in Code released two best
toring Center designation. Assurance, a U.K.-based security practices documents to help combat
Zenitel Group announced that TMC consultancy firm. growing security vulnerabilities. One
named Vingtor Stentofon’s TCIV-6 IP SIP The former Giesecke & Devrient is on threat modeling, and the other is
Video Intercom a 2017 Unified Communi- Banknote business unit is now the about third-party components.
cations Product of the Year Award winner. Giesecke+Devrient Currency Technol- Tyco Security Products is partnering
ogy independent subgroup. with the mayor of Boston and the Bos-
ANNOUNCEMENTS Sheriff ’s agencies will use the Lock- ton Women’s Workforce Council in
Boon Edam Inc. announced that a new heed Martin Indago quadrotor small a program designed to close the gender
production line for its Lifeline Optical unmanned aerial system to perform wage gap for women in the Boston area.
Turnstiles is now operational at the com- search-and-rescue operations as part of In a team-building exercise, Vector
pany’s Lillington, North Carolina, factory. the Project Lifesaver International Security’s managers and senior execu-
Continental Access, a division of program that supports clients with au- tives constructed travel-version wheel-
NAPCO, launched a newly revitalized tism, Down syndrome, and dementia. chairs for donation to the Keystone
website at www.cicaccess.com. The Master Lock Company relo- Chapter of the Paralyzed Veterans
The Cross-Cultural Institute intro- cated its headquarters to a newly reno- of America.
duced Badges2Bridges, a new training vated campus in Oak Creek, Wisconsin. Vision-Box reinforced its support
program that helps police officers and Point Blank Enterprises acquired to border control officials in Portugal,
law enforcement professionals work ef- Gould and Goodrich. sponsoring the Conference “SEF and
fectively with minority communities. PSA Security Network acquired the Economy.”

STRATEGIC MOVES IN THE NEWS


WHO WHAT OF/WITH RESULT

TUV RHEINLAND ACQUISITION 2MC The acquisition strengthens TUV Rheinland’s mission
of addressing challenges at the intersection between
man, technology, and the environment.

IRIS GLOBAL TRUTAG The two parties will develop a portfolio of smartcard
CORPORATION COLLABORATION TECHNOLOGIES, INC. and secure label products for government and private
BHD customers around the world.

ALLIED ACQUISITION ALERT PROTECTIVE Both companies combine technology with manpower
UNIVERSAL SERVICES to provide optimal solutions. Alert brings a portfolio of
residential communities to Allied Universal.

CISCO COLLABORATION IBM SECURITY The companies are working together on products, ser-
vices, and threat intelligence to address the growing
global threat of cybercrime.

0917 Industry News - C.indd 141 08/21/2017 6:12:46 PM


142
MARKETPLACE

BUSINESS ANALYTICS
AlarmNet 360 Insights business management platform from HONEYWELL of Melville, New York, is an interactive dashboard
that helps security dealers and central stations explore customer data and expose problem areas. Using a wide range of filters—
such as communication types, communicator models, services, and remote services—users can learn about their current cus-
tomer base, protect the business, and identify areas for growth. Data is updated daily so dealers can be informed and proactive.
The platform is free to use for all AlarmNet dealers and central stations. 901

VIDEO MANAGEMENT

MIRASYS LTD. of Helsinki, Finland, launched a new generation of open plat-


form video management system, the Mirasys VMS V8. Scalable to many envi-
ronments, the new version offers new applications to improve efficiency, with
centralized maintenance and management to eliminate on-site travel. Ready-
made templates speed up information input and installation. User profiles are
easy to create, manage, and modify. Servers can be preconfigured before deliv-
CLOUD-BASED VIDEO RECORDERS ery, with preinstalled cameras and applications. The user interface can be mod-
ified based on needs and preferences. Video can be linked to other information
TOSHIBA SURVEILLANCE & IP channels for improved situational awareness. 903
VIDEO GROUP of Irvine, California, a
business unit of Toshiba Information
Systems, is making it easy to manage
IP video networks using its Percept
cloud-powered network video record-
ers. Leveraging Toshiba Surveillix Web
Services, the recorders allow most user
rights and system settings to be remotely
managed on the cloud, saving time and
money while improving security opera-
tions. Users can navigate complex IP net-
works and access an entire surveillance
system via an intuitive interface accessi-
ble by a PC or mobile device. It’s easy to
export, share, and download video to the
cloud, as well as to monitor the health of
the recorder remotely. 902

0917 Marketplace C.indd 142 08/15/2017 6:33:14 PM


WHEREVER
YOU ARE
It’s never been easier to access the vital
knowledge you need to stay on the forefront
of the security profession.

Receive timely information on emerging


security threats and practical solutions
through the channels that best fit
your schedule and career.

MAGAZINE
Read the award-winning print publication
SOCIAL
Join the discussion on Facebook and Twitter.
from ASIS International.

WEB PODCAST
Hear what security professionals are talking about.
Enjoy the latest news and a responsive design
that looks great on your smartphone or tablet.

E-MAIL
Subscribe to the SM Daily and Weekly Newsletters.

Untitled-1 1 2016-11-07 13:30:54


144
MARKETPLACE

LAYERED ACCESS CONTROL CYBER PROTECTED CAMERAS

A comprehensive access control portfolio from SIELOX of Password Checker is an automated solution that verifies
Runnemede, New Jersey, addresses complex security challenges that network cameras are not using default or common
with layered access control and lockdown systems for better passwords—which can jeopardize camera cybersecu-
control and response to problem situations. The Crisis Lockdown rity. New from VIAKOO, INC., of Mountain View, Cal-
Alert Status System (CLASS) offers emergency notification and ifornia, Password Checker helps ensure compliance to
lockdown features. The Pinnacle Advanced access control solu- many standards, including PCI, NERC, and NIST, which
tion and the 1700 Intelligent Controller, which fully integrates specify that surveillance networks be protected. The
with Schlage wireless locks, provide management and protec- feature examines HTML authentication points to test
tion. A new Lock Toggle for the 1700 Controller allows users to a variety of common URL entry points and frequently
lock and unlock doors without a second credential to override used passwords. Operators are alerted if they need to
preset schedules. Users can lockdown a building, change alert change passwords. Checks can be run on demand or on
levels, and communicate with law enforcement in real time. 904 a schedule. Beta-testing began in April. 905

INSTALLATION APP

ASSA ABLOY of New Haven, Connecticut, introduced the BILT Applica-


tion that provides fully interactive installation instructions. Available for
Apple and Android devices, the app offers voice narration of step-by-step
directions for trouble-free, efficient installation of ASSA ABLOY products.
It shows exactly what the parts look like and how they will look when
correctly installed. Images can be rotated and enlarged by the installer.
Updates will be seamless for product changes. The company plans to add
augmented reality technology, providing a holographic overlay onto the
actual worksite. 906

HOSTED ACCESS CONTROL CYBER PROTECTION

GALAXY CONTROL SYSTEMS of Walkersville, Maryland, SPYRUS of San Jose, California, is a Microsoft partner that
unveiled the Galaxy Cloud Concierge solution, a turnkey, delivers security solutions to work with the full Microsoft
cloud-based, fully hosted and managed access control and ecosystem. The suite of self-encrypting storage devices
monitoring solution. With round-the-clock management, includes Windows to Go live drives that turn personal com-
the system supports industry standard access technologies. puters into compliant
Three configurations include an onsite, user-managed sys- enterprise Windows 8,
tem; a remote user-managed, integrated system; and a re- 8.1, or 10 desktops, with
mote integrator-managed system. Data is secured via AES en- or without connectivity.
cryption. Multi-layered filtering and partitioning allows end The drive boots the op-
users to access their information, while the service provider erating system directly
can access all customers’ information. 907 from the hardware en-
crypted compartment
and completely bypasses
the host computer’s
hard drive. No footprint
is left behind when the
drive is shut down. The
hardware devices come
in various form factors to
support different devices
and use cases, including
smartphones and tab-
lets. 908

0917 Marketplace C.indd 144 08/15/2017 6:33:34 PM


Stop by the Security Store
at ASIS 2017

This is your once a year opportunity to peruse hundreds


of security publications and certification materials for
on-site purchase.

Managing Critical Physical Protection Security


Incidents and Security of Assets: in 2025
Large-Scale Principles Security Management
Event Security

Attend author signings, including


keynote speakers Scott Klososky
and Carey Lohrenz.

See the latest merchandise,


including ASIS and CPP
shirts and 2017 pins.

Or visit the online store 24/7 at


asisonline.org/store.
146
MARKETPLACE

MULTI-FORMAT ACCESS VIDEO OPTIONS

DIGION24 of Camarillo, California, in- FLIR SYSTEMS, INC., of Wilsonville,


troduced D24Secure NFC Multi-Format Oregon, updated its video manage-
Cards and Readers to provide a solution for ment solution (VMS) and added three
merging multiple card access control sys- high-performance security cameras to
tems with different Wiegand data formats its offerings. FLIR United VMS 8.0 is
and numbering schemes. This system is an enterprise-level video management
particularly useful for companies involved solution for large and multilocation
in mergers and acquisitions. Each card is encoded with multiple card numbers operations. It includes FLIR Latitude
and Wiegand data formats to duplicate the existing card programming. Universal software, as well as FLIR Horizon and
replacement readers are configured to output the proper Wiegand format for each FLIR Meridian network video record-
connected access control panel. Cards are available as composite ISO cards, key ers. The updated system has stronger
fobs, and adhesive discs; readers are available in mullion-style, outdoor keypad, online security credential require-
and indoor wall switch configurations. 909 ments and offers a simplified system
installation process. The platform can
be integrated with third-party tech-
CASINO SURVEILLANCE nologies. Three new cameras include
the FLIR PT-Series HD dual-sensor
SYNECTICS of Sheffield, United camera, the FLIR Quasar 4K fixed box
Kingdom, introduced a suite of solu- multiple-resolution camera, and the
tions that are tailored to casino envi- FLIR Ariel 3MP corner camera with
ronments, enabling users to control built-in microphone. 910
their surveillance as they wish. In
casinos, pan-tilt-zoom cameras are
constantly panning and switching to
track hand movements, cash trans-
actions, and play. Synergy 3 includes
self-learning algorithms, so once the camera learns about priority areas in its field
of view autofocus works more effectively. Synergy 3 can set, save, and roll out us-
er-defined camera settings to other cameras that are similarly situated. The EX300
Advanced Control Suite is a touchscreen tablet with optional jog shuttle, keypad,
and/or joystick that uses gesture-based control for improved incident manage-
ment, alarm processing, and operational efficiency. 911

PREDICTIVE ANALYTICS NETWORK VIDEO RECORDERS

ONEEVENT TECHNOLOGIES of Mount Horeb, Wisconsin, LILIN AMERICAS of Arcadia, California, is including
created the OnePrevent system that can predict disasters before a free license for peer-to-peer (P2P) networking soft-
they occur and alert users to prevent misfortune. A powerful ware with the purchase of its NVR Series network video
cloud-based analytical engine constantly monitors factors such recorders, thus enabling remote viewing on smart-
as temperature, air quality, motion, and moisture to learn what is phones and tablets. This nullifies the need to open a
normal in a space. If the system receives an abnormal reading, it port and log into a router for mobile viewing, making
can determine potential risks and alert property managers of the connections more secure. Mobile devices are connected
possibility of a disaster, such as a fire or flood, before the event directly to the NVR via a QR code. Once the user creates
occurs. In testing, the system and stores a configuration file in a P2P account, it can
anticipated fires up to 20 min- be imported into a mobile device for the simplified
utes before smoke alarms went setup of multiple devices. 913
off. The flexible system can be
installed where buildings are
at risk for events such as fire,
water damage, gas leaks, and
unauthorized access. 912

0917 Marketplace C.indd 146 08/15/2017 6:33:49 PM


147
SEP 2017 | SECURITY MANAGEMENT

REQUEST DETAILED PRODUCT INFORMATION THROUGH OUR MONTHLY E-RESPONSE,


VISIT HTTP://SECURITYMGMT.HOTIMS.COM, OR USE YOUR SMART PHONE TO ACCESS THE QR CODE ON THIS PAGE.
1. Download a free QR code reader from the Android, Blackberry, or iPhone apps store.
2. Open the app, hold your phone camera steadily above the QR code on this page, and your device will connect to our
custom site where you can request product information from any of our advertisers.

CIRCLE # PAGE # CIRCLE # PAGE # CIRCLE # PAGE #

12 Abloy Security, Inc.. . . . . . . . . . . . . . . . . . . 23 44 DSI (Designed Security Inc.) . . . . . . . . . . .81 17 Par-Kut International, Inc. . . . . . . . . . . . . . 30
19 Access Specialties . . . . . . . . . . . . . . . . . . . 33 38 DSX Access Systems, Inc.. . . . . . . . . . . . . .71 47 PATLITE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
02 ADT | Protection 1 . . . . . . . . . . . . . . . . . . . . 03 75 DSX Access Systems, Inc.. . . . . . . . . . . . 150 11 Prosegur . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
06 Allied Universal . . . . . . . . . . . . . . . . . . . . . . 10 32 GAI-Tronics Corporation . . . . . . . . . . . . . . 62 57 Quantum Secure . . . . . . . . . . . . . . . . . . . . 107
-- Altronix Corp.. . . . . . . . . . . . . . . . . . . . . . . . 73 34 Garrett Metal Detectors . . . . . . . . . . . . . . 64 13 Red Hawk Fire & Security. . . . . . . . . . . . . 25
49 Ameristar Security Products . . . . . . . . . . .91 48 Genetec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 14 Research Electronics, Int’l . . . . . . . . . . . . 26
55 ASSA ABLOY . . . . . . . . . . . . . . . . . . . . . . . 103 37 Hanwha Techwin America . . . . . . . . . . . . 67 43 SDC – Security Door Controls. . . . . . . . . 77
56 Avigilon . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 05 Hikvision USA . . . . . . . . . . . . . . . . . . . . . . . 08 03 SecurAmerica . . . . . . . . . . . . . . . . . . . . . . . 05
04 Axis Communications . . . . . . . . . . . . . . . . 06 23 Hikvision USA . . . . . . . . . . . . . . . . . . . . . . . .41 59 Securitas Electronic Security . . . . . . . . 109
33 B.I.G. Enterprises . . . . . . . . . . . . . . . . . . . . . 63 08 Honeywell . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 52 SIERRA-OLYMPIC Technologies Inc. . . . 97
10 Brownyard Group . . . . . . . . . . . . . . . . . . . . 20 50 Horton Automatics. . . . . . . . . . . . . . . . . . . 93 26 Special Response Corporation . . . . . . . . 49
35 Brownyard Programs. . . . . . . . . . . . . . . . . 65 51 iView Systems . . . . . . . . . . . . . . . . . . . . . . . 95 18 Stratfor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
22 CAP Index, Inc. . . . . . . . . . . . . . . . . . . . . . . 40 07 Keyper Systems . . . . . . . . . . . . . . . . . . . . . .13 60 Talkaphone . . . . . . . . . . . . . . . . . . . . . . . . . . 111
41 Cognitec . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 20 LossPreventionSolution.com . . . . . . . . . . 34 42 TEAM Software . . . . . . . . . . . . . . . . . . . . . . 75
25 Commport Technologies . . . . . . . . . . . . . 45 54 Mercury Security. . . . . . . . . . . . . . . . . . . . . 101 27 Unitex Direct . . . . . . . . . . . . . . . . . . . . . . . . .51
63 Comnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 31 Micro Technology Services, Inc. . . . . . . . 57 28 Unitex Direct . . . . . . . . . . . . . . . . . . . . . . . . 53
53 Dahua. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 74 Mission 500 . . . . . . . . . . . . . . . . . . . . . . . . 149 36 Winsted Corporation . . . . . . . . . . . . . . . . . 66
09 Detex Corporation . . . . . . . . . . . . . . . . . . . .19 45 NAPCO Security Services . . . . . . . . . . . . 83 21 WM Security Services, Inc. (WMSSI). . . 39
16 dormakaba . . . . . . . . . . . . . . . . . . . . . . . . . . 29 46 NC4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
62 dormakaba . . . . . . . . . . . . . . . . . . . . . . . . . . 113 15 Open Options . . . . . . . . . . . . . . . . . . . . . . . 27

advertisers online
Abloy Security, Inc. Commport Technologies Horton Automatics Red Hawk Fire & Security
www.abloyusa.com www.comm-port.com www.hortondoors.com www.redhawkus.com

Access Specialties Comnet iView Systems Research Electronics, Int’l


www.access-specialties.com www.comnet.net www.iviewsystems.com www.reiusa.net

ADT | Protection 1 Dahua Keyper Systems SDC – Security Door Controls


protection1.com/na www.dahuasecurity.com www.keypersystems.com www.sdcsecurity.com

Allied Universal Detex Corporation LossPreventionSolution.com SecurAmerica


www.aus.com www.detex.com www.losspreventionsolution.com www.securamericallc.com

Altronix Corp. dormakaba Mercury Security Securitas Electronic Security


www.altronix.com go.dormakaba.com/PAS-SMMag www.mercury-security.com www.securitases.com

Ameristar Security Products dormakaba Micro Technology Services, Inc. SIERRA-OLYMPIC Technologies Inc.
www.ameristarsecurity.com www.dormakaba.us www.lynxguide.com www.sierraolympic.com

ASSA ABLOY DSI (Designed Security Inc.) Mission 500 Special Response Corporation
www.intelligentopenings.com/in100 www.dsigo.com www.mission500.org www.specialresponse.com

Avigilon DSX Access Systems, Inc. NAPCO Security Services Stratfor


www.avigilon.com www.dsxinc.com www.napcosecurity.com www.stratfor.com

Axis Communications GAI-Tronics Corporation NC4 Talkaphone


www.axis.com www.gai-tronics.com www.nc4.com www.talkaphone.com

B.I.G. Enterprises Garrett Metal Detectors Open Options TEAM Software


www.bigbooth.com www.garrett.com www.ooaccess.com www.teamsoftware.com

Brownyard Group Genetec Par-Kut International, Inc. Unitex Direct


www.brownyard.com www.genetec.com www.parkut.com www.unitexdirect.com

Brownyard Programs Hanwha Techwin America PATLITE Winsted Corporation


www.brownyardprograms.com www.hanwhasecurity.com www.patlite.com www.winsted.com

CAP Index, Inc. Hikvision USA Prosegur WM Security Services, Inc. (WMSSI)
www.capindex.com www.hikvision.com www.prosegur.com wmssi.wm.com

Cognitec Honeywell Quantum Secure


www.cognitec.com www.honeywell.com www.quantumsecure.com

0917 Ad Index.indd 147 08/17/2017 4:01:00 PM


148
THE LIST

UNIFORM
1. PERCEPTION. Color theory isn’t an exact science,
but we do know a few things about how colors
change the way people are perceived. Color changes
how people see others and how people see them-

COLOR
selves. In American culture, the darker the color, the
more authoritative a person appears. It is unsurpris-
ing then that the colors most often associated with
security and law enforcement uniforms are blue,

THEORY
gray, and black.

2. EMOTION. Psychological tests have found that in-


dividuals associate colors with specific moods. For
example, people generally associate red with excite-
DAN MENDELSON IS PRESIDENT OF UNITEX DIRECT. HE ment and stimulation, which explains why red is
SERVES ON THE ASIS SECURITY SERVICES COUNCIL. often used for flashing emergency vehicle lights but
not for uniforms. According to a study done at the
University of Georgia, the color blue subconsciously
evokes feelings of comfort and security in most peo-
ple, making it a good choice for people in a position
of authority. Tests also have found that individuals
associate the color black with power and strength.
But black can also elicit anger, hostility, dominance,
and aggression. A dark security uniform may sub-
consciously encourage citizens to see officers as ag-
gressive or corrupt. The color gray is an unemotional
color. It is detached, neutral, impartial, and indeci-
sive. From a color psychology perspective, gray is the
color of compromise—being neither black nor white.
Gray conforms. For a security officer uniform, gray is
conventional, dependable, and practical.

3. AUTHORITY. When combined with a uniform, color


can establish a sense of authority. In 1829, the London
Metropolitan Police developed the first standard police
apparel. These first police officers were issued a dark
blue, paramilitary-style uniform. The color blue was
chosen to distinguish the police from the British mil-
itary officers who wore red and white uniforms at the
time. The first official police force in the United States
was established in the city of New York in 1845. Based
on the London police, the New York City Police De-
partment adopted the dark blue uniform in 1853. Cities
such as Boston, Buffalo, Cincinnati, Cleveland, De-
troit, and Philadelphia quickly followed by establish-
ing police departments based on the London model,
including the adoption of the dark blue, paramili-
tary-style uniform. Most police uniforms in the United
States continue to have a paramilitary appearance and
are generally a dark color. However, dark colors are
preferred not only for the emotions they convey, but
because they keep the officer from being easily spotted
by lawbreakers, especially at night.

0917 Last Page_List - C2.indd 148 08/15/2017 6:34:22 PM


Together we can

Ed ucate Heal

Inspire Nourish
Children and families in crisis across the USA need our help – and yours. And as a 501(c)(3)
organization, Mission 500 now has even greater flexibility to work with local charities to better
support existing and new sponsors and volunteers. But even with over 1000 children sponsored
and many acts of charity performed to date, there’s still a great deal of work to be done.
Get involved today! Visit mission500.org for more information.

Supporting Families Across America

For product info #74 securitymgmt.hotims.com


CREATING THE FUTURE
OF SECURITY . . . TODAY

7KH 6HFXULW\ 3URIHVVLRQDOV· ILUVW FKRLFH IRU WRGD\·V VHFXULW\ LQIUDVWUXFWXUH IURP RQH URRP WR
WR
PXOWLORFDWLRQ FRPSOH[HV DURXQG WKH ZRUOG  2XU UHSXWDWLRQ LV EDVHG RQ D WLPHKRQRUHG
WLPHKRQRUHG
WUDGLWLRQRIURFNVROLGTXDOLW\SUHPLXPUHOLDELOLW\DQGWKHLQWHJULW\RI'6;DQGRXUQHWZRUNRI
IDFWRU\WUDLQHGDXWKRUL]HGGHDOHUVDQGVXSSRUW
IDFWRU\WUDLQHGDXWKRUL]HGGHDOHUVDQGVXSSRUW

:KHQ\RXDUHVWDNLQJ\RXUUHSXWDWLRQRQDVROXWLRQFKRRVHWKHPRVWSRZHUIXO
:KHQ \RXDUHVWDNLQJ \RXUUHSXWDWLRQRQDVROXWLRQFKRRVHWKHPRVW SRZHUIXO
DQGLQWHOOLJHQWDFFHVVFRQWUROV\VWHPVLQWKHZRUOGFKRRVHWKHWRWDOVHFXULW\
UHODWLRQVKLSZLWK'6;

‡1R´3HU6HDWµ/LFHQVLQJ '6; $FFHVV 6\VWHPV ,QF


'6;$FFHVV6\VWHPV,QF ‡%DFNZDUGV&RPSDWLEOH
‡%DFNZDUGV&RPSDWLEOH
,Q6\VWHP3ULFLQJ
,Q6\VWHP3ULFLQJ $UFKLWHFWXUH
$UFKLWHFWXUH

‡/$1:$1&RPSDWLEOH ‡$ODUP7H[W0HVVDJH
(0DLO1RWLILFDWLRQ
(0DLO1RWLILFDWLRQ
‡6PDUW&DUGDQG%LRPHWULF
‡6PDUW&DUG DQG%LRPHWULF
,QWHJUDWLRQ
,QWHJUDWLRQ ‡+RW6ZDS5HGXQGDQW
‡+RW6ZDS5HGXQGDQW
 &RPPXQLFDWLRQ6HUYHU
&RPPXQLFDWLRQ6HUYHU
‡8QOLPLWHG$FFHVV
‡8QOLPLWHG$FFHVV
/HYHOV3HU&DUGKROGHU
/HYHOV3HU&DUGKROGHU ‡+LJK/HYHO(OHYDWRU
&RQWURO,QWHUIDFH
&RQWURO,QWHUIDFH
‡,QWHJUDWHG3KRWR
,'%DGJLQJ
,'%DGJLQJ ‡,QWHJUDWHG:LUHOHVV
/RFNVHWV
/RFNVHWV
‡%DFNXS64/6HUYHU www.dsxinc.com
10731 Rockwall Road | Dallas, TX USA 75238-1219
¬| ¬| sales@dsxinc.com

4XDOLW\5HOLDELOLW\,QWHJULW\7KH6HFXULW\3URIHVVLRQDOV·)LUVW&KRLFH

See us at ASIS Booth 3715 For product info #75 securitymgmt.hotims.com

You might also like