Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Highlights from ASIS 2013 – Chicago

October 8, 2013

Chicago_ASISTwo weeks ago, ASIS International Seminar and Exhibits arrived in Chicago, bringing plenty of flash in its opening ceremonies, as well as plenty of possible security solutions on the show floor, as manufacturers seek to help enterprise security leaders get more from their existing investments in analog systems.

But all of the flash of the opening ceremony didn’t overshadow the message: the goal of ASIS, an 38,000-member organization, is to help security leaders and users understand their business and how best to contribute to the bottom line (Strategic); enabling them to seek knowledge, collaborate with partners and pursue additional education while being aware of and participating in the development and adoption of standards (Smart); and  are you working to give the word “secure” a new and higher meaning (Secure).

So how did vendors meet these expectations on the opening day of ASIS International 2013? By building on cooperation between stakeholders, users and technology, the Security editors saw an increase in convenient security, often made possible through biometrics (iris-authenticated access control, for the most part, with some fingerprint verification). SRI Intenational, for example, is enabling clock-in and clock-out functions using iris biometrics, which would significantly mitigate the risk of employees stealing time and clocking in for each other. While weaknesses were certainly acknowledged concerning the iPhone 5S’s fingerprint biometric verification, the consensus was that the application will introduce biometrics and smartphone security to more people, which would be a big step forward.

On the surveillance side, there has been a big push to integrate analog cameras with IP capabilities, either through encoders or software. ComNet introduced a new switch that changes Coax cable to Ethernet and extends distance possibilities to 2,000 feet, reducing the need to rip and replace cable, especially in larger enterprises with established analog infrastructure.

There was also a focus on small and mid-sized businesses, and many programs that are frequently noted for residential deployments are being used for these applications: mobile surveillance, building automation (thermostat, lights), remote alarm arming, equipment alerts and theft detection devices, for example. These solutions would increase a small business-owner’s awareness of what happens in his or her store, enabling them to, hopefully, take a small vacation.

Dropping prices have also led to an increased push on thermal or low-light imaging. FLIR is using thermal imaging for business intelligence and equipment monitoring as well – by using thermal cameras to monitor the temperature of certain industrial or electric sub-station components, security and maintenance personnel can know it’s going to fail before it does, which can speed up repairs and keep down-time to a minimum.

Keep an eye out for more on these trends in 2014 – we heard lots of chatter about new initiatives to be launched at ISC West 2014, and Security will keep striving to bring you the newest and best technology to help your security initiatives. 

KEYWORDS: ASIS International Chicago security security technology Security trends

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Top Technologies from ASIS 2013

    See More
  • ASIS 2013 Chicago Open for Registration

    See More
  • Our ASIS Inside Report: Mantraps, Video, and Tour of Chicago Security from Dallas, Too

    See More

Related Products

See More Products
  • Optimizing Social Media from a B2B Perspective

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing