Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

Sneak Peek: ASIS 2014 Security Technology

Take a look at the product preview for ASIS 2014.

By Claire Meyer
ASIS 2014
August 1, 2014

Q1615/-E Camera from AXIS Communications

Captures Steady Images in Tough Environments

axis
 

This camera offers exceptional image quality with HDTV 1080p resolution at 60 frames per second for indoor and outdoor surveillance, day and night. The cameras feature the ability to automatically switch settings, ensuring all details are captured in both bright and dark areas. It also offers several image processing features to enhance image usability, such as barrel distortion correction and electronic image stabilization for steady images in an environment with tough vibrations such as train stations.

Learn more at www.axis.com or visit ASIS booth #1023

 

MegaBall 2 from Arecont Vision

Uses Dewarping Technology to Quadruple Angular Resolution

arecont
 

This camera series features an ImmerVision Panomorph lens, enabling it to capture 180- and 360-degree fields of view with dewarping to provide up to four times more angular resolution in peripheral areas of a scene than conventional fisheye lenses. This 5-megapixel camera is in a tamper-resistant housing, and it features day/night operation, privacy masking, flexible cropping and H.264/MJPEG dual encoders.

Learn more at www.arecontvision.com or visit ASIS booth #337

 

Pro-Watch 4.2 from Honeywell

Enables Access Control in Difficult Locations

honeywell
 

This security management system offers numerous reader options to meet specific security needs. The lower cost of wireless locks and readers lets users expand access control systems to more doors throughout a building, particularly doors that were previously hard to reach with a wired system. The system technology also includes a software refresh to better support Microsoft Windows operating systems. 

Learn more at www.security.honeywell.com or visit ASIS booth #2511

 

iCLASS SE Encoder from HID Global

Encodes Multiple Credentials on One Device

HID global
 

This encoder enables organizations to encode several credential technologies from a single device. The solution enables organizations to encode and instantly issue credentials whenever needed, and it is ideal for migrating current systems over time. The encoder also provides the ultimate versatility in key management, providing customers the option to securely define and manage keys locally.

Learn more at www.hidglobal.com or visit ASIS booth #3510

 

SNV-6013 Vandal-Resistant Network Micro-Dome 2 from Samsung

Delivers 1080p Images Despite Challenging Lighting

Samsung
 

This surveillance camera features advanced imaging technology to deliver high-definition images in as little as 0.3lux illumination. The camera produces a wide dynamic range of 120dB, and 50dB signal-to-noise ratio. It also includes intelligent video analytics, such as tampering, virtual line, enter/exit, appear/disappear and face detection, which can be programmed to trigger an alarm event.

Learn more at www.samsung-security.com or visit ASIS booth #1927

 

Rändivoo – Visitor Experience System from Brivo

Adds Elegance and Convenience to Visitor Management

Brivo
 

Built on the Salesforce platform, Rändivoo allows you to email meeting invitations (with QR codes), have guests check in at an iPad kiosk upon their arrival (using the QR code or an email address), and then have an automated email notification sent to the host when their guest arrives. It also allows the meeting “host” to input any information about the guest, which will be presented to the receptionist upon guest check-in.

Learn more at www.brivo.com or visit ASIS booth #2205

KEYWORDS: ASIS International security products security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ASIS 2014 Product Review

    ASIS 2014: Technology to Equip Enterprises for Success

    See More
  • ISC West Technology Showcase

    ISC West 2014: New Technology Showcase

    See More
  • New Newswire Feature Image 3/8/2012

    Senior Security Leaders Discuss Top Threats at ASIS 2014

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing