Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Technologies & SolutionsAccess ManagementPhysical SecurityVideo Surveillance

Product Spotlight

GSX 2023 product preview

By Taelor Sutherland
GSX 2023 product spotlight
September 7, 2023

This year, security leaders attending the annual Global Security Exchange (GSX) in Dallas, Texas from September 11-13, 2023 will find the latest security technologies from physical and cybersecurity organizations.

From video management and access control to vulnerability management, Security magazine highlights solutions from organizations at GSX 2023.


ALARM CONTROLS

Delays door opening to control access

1200DE Delayed Egress Maglock from Alarm ControlsThe 1200DE Delayed Egress Maglock from Alarm Controls (at GSX Booth #3033) safely postpones exit while alerting others onsite. This bracket-mounted, single magnetic lock with 1200 pounds of holding force can be installed without special tools. Integrated key reset, digital display, voice message countdown timer, and field configurable settings come standard in a single unit. Code-specific models are also available. Designed for applications that require a locking feature that delays the opening of a door, it can be used in healthcare for patient safety, retail for loss prevention, and more. Image courtesy of Alarm Controls

FIND OUT MORE AT WWW.ALARMCONTROLS.COM


ALTRONIX

Monitors traffic in public spaces

Altronix OA2 occupancy alert systemThe Altronix OA2 occupancy alert system provides notifications when unauthorized activity or loitering occurs in up to two protected areas. The system is designed to help facilities reduce risks and liabilities in public-facing, secured areas such as restrooms — found in convenience stores, retail establishments, restaurants, universities, sports and recreation venues, and more. The OA2 is designed to work with most types of sensors for monitoring doors or restricted areas. Local alert notifications can be customized and may be audible, visual or both. Optional LINQ network communication enables real-time remote alerts and provides system status information. Normal traffic activity can be monitored as well. Image courtesy of Altronix

FIND OUT MORE AT ALTRONIX.COM


BOON EDAM

Detects and prevents turnstile piggybacking

BE Secure from Boon EdamBE Secure from Boon Edam is an overhead detection system for use with full-height turnstiles. BE Secure is built for the detection and prevention of piggybacking. Boon Edam’s Turnlock Full Height Turnstiles with integrated BE Secure utilizes time-of-flight (TOF) measurement principles combined with artificial intelligence (AI) algorithms to detect when two people try to enter the same compartment on a turnstile using one credential. If piggybacking is detected, the turnstile automatically locks and refuses entry. BE Secure is built for internal and external applications. Image courtesy of Boon Edam

FIND OUT MORE AT WWW.BOONEDAM.COM


I-PRO

Visually detects and tracks threats

Rapid PTZ camerasThe Rapid PTZ cameras are the smallest in their category and feature comprehensive edge artificial intelligence (AI) capabilities and a broad range of resolution options. With pan and tilt speeds up to 700°/s, operators can move the camera through multiple preset positions. IR LED capabilities enable the cameras to monitor in complete darkness up to 250 meters (820.2ft) while analytics and AI-based auto-tracking make sure that persons and vehicles of interest stay locked on target and in focus. All models are salt- and ISO 14993 rated to withstand the harshest conditions. The cameras are FIPS 140-2 level 3 certified. Image courtesy of i-PRO

FIND OUT MORE AT I-PRO.COM


HANWHA VISION

Connects cameras for scalable system

Hanwha SolidEDGEHanwha SolidEDGE is a serverless camera system with onboard Solid State Drive (SSD) storage and an embedded WAVE video management system (VMS) server. Each SolidEDGE camera can connect and record up to five additional cameras, bringing the total number of cameras in a system to six. Users can also merge up to 30 SolidEDGE systems through WAVE Sync. A metal-shielded RJ-45 terminal and enhanced grounding frame structures protect the camera from transient voltage from lightning or static electricity. A hard-coated dome bubble enhances resistance to scratches from external elements and minimizes degradation of resolution due to scratches. Image courtesy of Hanwha Vision

FIND OUT MORE AT HANWHAVISIONAMERICA.COM


SALIENT SYSTEMS

Reviews, analyzes and stores video

Salient Systems’ CompleteView v7.3Salient Systems’ CompleteView v7.3 is video management software that includes new features designed to improve the user experience. CompleteView v7.3 has enhanced camera analytic event support. With this feature, users can configure and capture any event delivered over the ONVIF driver, regardless of recording type. The update also ensures the reliable capture and storage of all camera analytic events, the ability to set custom aliases for events and includes a new “Event Search” playback experience. Users can utilize features such as scrubbing, improved playback speeds, reverse playback, customizable skip forward/backwards and jump to next/previous event, and individual trim and export capabilities. Image courtesy of Salient Systems

FIND OUT MORE AT WWW.SALIENTSYS.COM


QUANERGY SOLUTIONS

Tracks people and objects through a space

Q-TrackQ-Track is an integrated end-to-end hardware and software solution comprised of 3D long-range light detection and ranging (LiDAR) sensors and smart perception software. Q-Track provides accurate and continuous tracking of more than 600 individuals simultaneously. Q-Track offers a coverage area of 165,000 square feet per sensor with motion detection, classification and continuous object tracking in large areas with sensor fusion technology. Q-Track allows users to leverage existing security-related investments, such as cameras and VMS, and acts as a force-multiplier by enhancing those systems with actionable intelligence that can be used for a variety of use cases in physical security, occupancy analytics, footfall analysis and space utilization. Image courtesy of Quanergy

FIND OUT MORE AT QUANERGY.COM


VIAKOO

Provides visibility into device vulnerabilities

Viakoo Action PlatformThe Viakoo Action Platform includes comprehensive device lifecycle management capabilities. The platform’s users have visibility into device cybersecurity vulnerabilities through integration with the National Vulnerability Database (NVD) and can perform automated remediation across all impacted devices. The platform also provides comprehensive analysis and reporting on devices reaching their end-of-life, end-of-support and end-of-service dates. Image courtesy of Viakoo

FIND OUT MORE AT WWW.VIAKOO.COM


VECTOR FLOW

Automates identity management

Vector Flow’s Physical Workforce Identity SuiteVector Flow’s Physical Workforce Identity Suite delivers the new science of PIAM automation, providing applications for automating all aspects of an identity lifecycle. Designed to deliver a one-credential, one-identity solution across the enterprise, the solution leverages AI technology to automate identity management tasks, such as on-/off-boarding of an identity into physical security infrastructure, badging and credentialing, physical access management, access audits and compliance. Image courtesy of Vector Flow

FIND OUT MORE AT VECTORFLOW.COM

KEYWORDS: access management GSX piggybacking product security turnstile

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Taelor daugherty 2023

Taelor Sutherland is the Associate Editor at Security magazine. Sutherland covers news affecting enterprise security leaders, from industry events to physical & cybersecurity threats and mitigation tactics. She is also responsible for coordinating and publishing web exclusives, multimedia content, social media posts, and a number of eMagazine departments. Sutherland graduated in 2022 with a BA in English Literature from Agnes Scott College.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • GSX 2024 product preview

    Product spotlight: GSX 2024 product preview

    See More
  • ISC WEST PRODUCT PREVIEW

    ISC West product preview

    See More
  •  2025 ISC West Product Preview

    2025 ISC West product preview

    See More

Events

View AllSubmit An Event
  • September 29, 2025

    Global Security Exchange (GSX)

     
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!