Security Blog

Intuition, Business Intelligence Reign at ISC West

Walking the Show Floor at ISC West 2013

April 11, 2013

What do I look forward to at ISC West? Well, besides the annual treat of wearing my most comfortable almost-slippers to walk the show floor, the innovations, of course! But the motivation behind a lot of those innovations can be a much more interesting topic, and many of the booths I visited today shared some common factors, albeit realized in very different products.

Take a gander at some of my favorite trends of the day:

Added Business Intelligence

This was a popular one at many booths, including Axis, Avigilon and Milestone. By using built-in capabilities – typically reserved for security-only uses – for different applications, these companies are engineering additional ways to add to ROI while increasing security’s reputation as a key enterprise player.

Also, Axis has teamed up with the Wentworth Institute of Technology to develop applications that would run on the company’s cameras, much like apps on an iPhone. Two students came with their productions, including a facial-recognition software (called “Project Alibi”) designed to clock people in and out of facilities – managing attendance and alerting officials when an unrecognized figure enters a space. Another student project added 3-D motion tracking into the Axis camera system – setting alarm specifications that alert when a figure moves closer in the depth of field to the camera, but does nothing when the person stays outside a predetermined radius.

Ease of Use

Intuitive or user-focused products also had a strong showing today – I saw gorgeous, Apple-inspired (or so it seems to this iPhone addict) VMS, identity management and mass notification systems from Avigilon, Keyscan and Code Blue (respectively). Bold design with easy-to-understand (and easy-to-install, according to company representatives) features make the systems attractive, quick to learn and easy to teach. I’m looking forward to hearing more down the line about how much time is saved in training, or what resources are reserved by some of the shortcuts provided here.

Another easy, intuitive product comes from Guardian 8. This relatively new company has a niche product that many end users will be looking into – especially after the events of Newtown, Conn., as well as the recent stabbing at a Texas college. The G8 Pro V2 is an “Enhanced Non-Lethal” (ENL) device that features a three-level threat system. The weapon (which almost resembles a bubble gun) opens a direct channel of communication when the safety is unlocked – both with the intruder and the command center – features an alarm and can shoot pepper spray. Meant to serve as an alternative to providing firearms for security officers in lower-risk facilities, the device seems to fit an as-of-yet empty niche. Is it intuitive? Well, if I could fire it and actually hit the target – you bet.

Convergence of Tech and Physical Security

Company leaders have been working at starting this trend for some time now, and the train of thought is starting to pick up some steam. Some of the thought-leaders I talked to today include Olivier Thierry of Pivot3, Jeremy Earles of Ingersoll Rand (now adapting NFC credentialing and access for Android platforms, as well as some incredibly tough encryption) and Kevin Handerson of Middle Atlantic.

While Thierry and I had an in-depth discussion about how the Cloud and security collide, as well as how security and IT can benefit from each other (more on that at a later date), Mr. Handerson had a much different method of combining IT and security – in security-specific racks.

At Middle Atlantic, new server racks are designed to serve as the security version of a data center, with the flexibility and modular system to handle hybrid security programs (analog + IP + etc). The designers worked with end users to find what security professionals want out of their “security centers,” including solid side walls and limited access while still enabling cable to pass through the system as needed – this creates a designated  security space that is manageable and within reach, without being merely stashed in the nearest empty storage closet (not too much by way of cooling systems or cable management in broom cupboards).


As a side note, too, keep an eye out for upcoming company announcements – including the emergence of a household name into the camera market (cough, cough, Polaroid! cough), new capabilities from Lumidigm and more Picture Perfect end-of-life solutions from RS2.


Are you at ISC West 2013? Let us know what you’re most excited about! Tweet us @SecurityMag or follow us on Facebook for the latest and greatest updates from the show floor. Also, keep checking back with us here at for daily blogs, galleries and updates. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.