Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ISC WestPhysical Security

ISC West 2015 Product Preview

ISC West 2015 Product preview
March 1, 2015

In the midst of mergers and acquisitions, there is still plenty of innovation and energy within the security industry, and enterprise security executives are in a position to benefit. As more and more end users attend the annual ISC West conference April 15-17 in Las Vegas, more focused solutions find their way to the forefront of booths, as manufacturers outline not only the technical aspects but the integration possibilities, risk mitigation benefits and problem-solving features of their new solutions for active end users.

As you prepare your must-see list for this year’s show, check out a few of our top picks for new and noteworthy solutions on the horizon. What could these products help you achieve? And while you're at the show, don't forget to stop by ISC West booth #23141, where you can meet Securityand SDMmagazine staff, pick up your complimentary copy of either magazine or the ISC West Show Daily.

 

LINQ2 modules from AltronixConnect Power/Supply Chargers to the Network

LINQ2 modules from Altronix

These modules enable Altronix eFlow Power/Supply Chargers to communicate over the network, providing real-time data to facilitate early intervention and response in handling system issues accurately and effectively. This minimizes system downtime, eliminating service call costs and creating RMR opportunities. The module provides email and SNMP trap message notifications to report issues with an event log, and it allows users to control and reset devices remotely.

For more information, visit ISC West booth #18071
or www.Altronix.com

 

Respond to Incidents through Video Calling

Sipelia from Genetec

Sipelia from Genetec

At ISC West, booth visitors can test out the Sipelia communications management module, which allows security personnel to respond to and record calls through live voiceover IP and video. The system is integrated inside the same user interface as Security Center. The newest version of Genetec's video management system Security Center will also be on display at ISC West 2015, and it includes new hardware acceleration capabilities that can help decode more video streams per workstation to manage more ultra-high-resolution video streams.

Find out more at ISC West booth #10053 or visit www.genetec.com

 

 

Honeywell Total Connect Remote Services  with I-View Now

Verify Alarms at the Central Station

Honeywell Total Connect Remote Services with I-View Now

This third-party, cloud-based interface will be integrated into Honeywell’s service offerings this year to help central station operators determine if alarms are caused by legitimate security threats. The capabilities allow an operator to access a Total Connect IP camera to verify whether an intruder triggered an alarm, then, armed with situational insight, the operator can facilitate the appropriate response.

Check out this solution at ISC West booth #14025
or visit www.security.honeywell.com

 

Limit False Alarms with Motion Detecting Thermal CamerasT43 Thermal Security Cameras from FLIR

T43 Thermal Security Cameras from FLIR

These cameras feature built-in Video Motion Detection (VMD) to provide high-performance intrusion detection of humans or vehicles. When combined with a FLIR NVR or DVR, motion detected using the camera is sent as an alert to the FLIR cloud, or, alternatively, the cameras can be used with other third-party analytics. The cameras are available in mini-bullet, bullet or pan-tilt-zoom dome styles.

Learn more at ISC West booth #20053 or www.flirsecurity.com

 

HID Mobile Access from HID GlobalUse Smartphone Gestures as an Access Solution

HID Mobile Access from HID Global

This system enables smartphones and other mobile devices to securely open a door or gate with a close-range tap or longer-range “Twist and Go” method on new iCLASS SE or multiCLASS SE readers. Both Android and iOS operating systems are supported for easier deployment throughout an enterprise, and the mobile solution enhances operational efficiencies with the ability to manage mobile IDs online.

More information is available at ISC West booth #11063 or at www.hidglobal.com

 

Use Surveillance to Support Situational AwarenessSNF-8010 and SNF-8010VM Fisheye Camera from Samsung Techwin

SNF-8010 and SNF-8010VM Fisheye Camera from Samsung Techwin

These cameras offer 5-megapixel definition with pan-tilt-zoom capabilities, intelligent video analytics and on-board storage up to 64GB. The cameras are a good fit for projects with requirements to monitor activity 24/7, such as banks, offices, retail locations and warehouses. Intelligent motion detection allows the cameras to detect motion while ignoring small, repetitive motions that could generate false alarms.

Learn more at ISC West booth #14079 or at samsung-security.com

 

SmartKey Reader from Morse Watchmans, Inc.Manage Keys Faster for Efficient Controls

SmartKey Reader from Morse Watchmans, Inc.

This new addition to the KeyWatcher Touch product line grants users the ability to add or delete information such as key names and locations from the software, removing extraneous data and clutter from the system simply by inserting the SmartKey into the reader. This component is also compatible with the KeyBank Touch Auto, so users can remotely enter vehicle information. It is purpose-built in stainless steel and connects to the computer through a USB port.

Find out more at ISC West booth #17109 or visit www.morsewatchmans.com

 

Eliminate Infrastructure with a Battery-Powered CameraOutdoor MotionViewer from Videofied

Outdoor MotionViewer from Videofied

Designed for easy installation at remote facilities, this wireless outdoor camera/sensor does not run on Wi-Fi, but operates for up to four years on AA batteries and communicates on Videofied’s encrypted spread spectrum 900 MHz wireless radio. The camera delivers instant video alerts of unwanted activity to a command post or central station for immediate response. New features introduced this year include VGA color, 4x IR illuminated night vision, privacy masking capabilities, increased battery life and tamper detection.

Check out the camera at ISC West booth #3109 or visit www.videofied.com

 

FLEXIDOME IP Panoramic 7000 MP from BoschClearly Capture Fast-Moving Objects for Better Video Evidence

FLEXIDOME IP Panoramic 7000 MP from Bosch

This discreet camera delivers 360-degree panoramic surveillance with 12-megapixel resolution at frame rates of up to 30fps. This enables security operators to capture fast-moving objects in high detail that makes the different when collecting video evidence. The 360-degree view provides a wide field of view while eliminating blind spots. The camera features electronic pan-tilt-zoom capabilities to focus in on image details without losing the bigger picture.

Learn more at ISC West booth #14051 or visit www.boschsecurity.com/hdsecurity

 

Transition from 960H Analog to IP SystemsHS DVR from Speco Technologies

HS DVR from Speco Technologies

This hybrid DVR allows users of 960H analog systems to have a cost-effective solution when migrating to IP by enabling recording and playback of high-resolution images, delivering enhanced recording performance and providing greater camera configuration flexibility. The DVR allows all channels to be fully configurable for 960H or IP, supporting real-time 30 frames per second recording per channel. With dual network ports for isolating IP camera network and remote network traffic, bandwidth issues are less challenging.

Find out more at ISC West booth #20031 or visit www.specotech.com

 

Verifact AGC (Automatic Gain Control) Microphone from Louroe ElectronicsIntegrate Sound into your Security Suite

Verifact AGC (Automatic Gain Control) Microphone from Louroe Electronics

This microphone can automatically regulate the volume of the signal, reducing decibel levels if the signal is stong and raising them if the signal is weak. This helps to eliminate overdriving, popping and clipping, resulting in improved audio quality. The microphone is compatible with surveillance cameras and DVRs, allowing security personnel to have a complete security surveillance solution. By integrating audio monitoring, you can gain access to additional evidence, verification and live monitoring.

Learn more at ISC West booth #8038 or at www.louroe.com

 

Arm Lone Workers with Emergency CallingLone Worker Emergency Call Transmitter from Elpas, part of Tyco Security Products

Lone Worker Emergency Call Transmitter from Elpas, part of Tyco Security Products

This emergency call solution ensures that personnel who may be subject to attack or injury when working on their own can send alerts about their situation so responders can be dispatched to the exact location of the incident. The Elpas Real-Time Location System monitors the location of the worker's tag and may be used to manage emergency response efforts, especially in high-risk environments such as correctional facilities, petrochemical plants, or some healthcare facilities that face high workplace violence risks.

Find out more at ISC West booth #20011 or visit www.elpas.com

 

Searchlight4 from March NetworksGain Business Insights through Video

Searchlight4 from March Networks

This video-based business intelligence solution helps retailers elevate store performance and drive profitability by providing the insights they need to improve customer service, marketing and operations, as well as loss prevention and security. This scalable system combines video, alarms, point-of-sale transaction data and business analytics in a browser-based dashboard so retail teams can run customized reports quickly, which allows them to analyze and compare store performance and customer behaviors, identify trends and discover opportunities for improvement. Store owners, managers and loss prevention teams can use the system to detect and investigate potential losses faster.

 See this solution in person at ISC West booth #26041 or visit www.marchnetworks.com

KEYWORDS: security products security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 2016 ISC West Product Preview; security technology, security products, video surveillance, security solutions

    2016 ISC West Product Preview

    See More
  • A Focus on Accuracy and Durability in New Security Technology

    ISC West 2017 Product Preview: New Technology, Strong Services

    See More
  • ISC WEST PRODUCT PREVIEW

    ISC West product preview

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!