Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

ASIS International 2012

Walking the Show Floor: Cloud, Partnerships and Sci-Fi Security

September 10, 2012

The ASIS international 2012 conference started off this morning with a glance back at the past and optimism for the future as conference goers soak up the latest innovations from industry power players.

The Philadelphia show made large display of the city's past, especially as the opening ceremony was peppered with appearances by mummers, jazz musicians, a choir, a Revolutionary War-era militia and "Ben Franklin." But it also made reference to the 132 countries that are members of ASIS International, as well as Philadelphia's own solutions to security problems, including a perpetuation of graffiti around the city some 20 years ago, which was resolved with the creation of the Mural Arts Program.

But while the City of Brotherly Love's history is a good foundation, the theme of this year's conference is "Driving Security's Future."

Today's highlights from the show floor include the buzz about cloud security, how end user partnerships are affecting product development and when security meets science fiction.

Cloud Reading

When I walked the show floor today, I met with a lot of vendors who are really working on educating show-goers about the cloud, even though they are in the constant process of changing it to fit end users' ongoing needs.

According to Herve Fages, senior vice president of global product marketing for Schneider Electric, "Cloud means a lot, yet nothing -- this is the problem in explaining it."

However, several other companies, such as Honeywell, are working to create cloud solutions that have multiple applications, such as for business optimization for loss prevention.

Partnering for Success

Speaking of Honeywell, an independent end user committee has a small table in their booth. Rudy Wolter, Director of Security and Investigative Services for Citigroup, Inc in North America, is one of the leaders of the group, which is here at ASIS to recruit additional end users to their cause. This partnership -- independent of but not adversarial with Honeywell -- gives end use a voice in product development.

"It used to be you'd get a product and plug it in and just hope it doesn't start smoking," Wolter says, laughing. "Now, we can take recommendations from our security practitioners, our officers, and go to Honeywell and tell them exactly what these workers want to make their jobs easier, more efficient."

Formed of a head committee and 14 vertical sectors, this end user group encourages "logistical thinking out-of-the-box," Wolter says. The key, he says, is the continual communication between the two groups -- Honeywell listens to the recommendations and helps to revise and update products to match those requests.

Partnerships are a very popular topic today at ASIS, especially at Samsung and IQinVision.

Sci-Fi Security

I started out the day with a quick press conference from Avigilon, where I was introduced to the "Minority Report"-inspired motion detection video management system "Avigilon's Control Center (ACC) 5.0." The system selects and moves video feeds via audio commands, but integration with the motion sensing technology found in the XBox Kinect allows the video's monitor to select, scroll through and zoom into video by simply gesturing through the air in front of a sensor.

Feel free to compare the two technologies (or Hollywood technology, for the 2002 "Minority Report") in the following videos. Let us know what you think in the comments section! Is this something you would use?

Avigilon's Control Center

"Minority Report" Video Wall

KEYWORDS: ASIS International cloud computing Security News video management

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing