This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Multimedia » Image Galleries » New Products Revealed for ASIS International 2016

New Products Revealed for ASIS International 2016

These 10 new security and risk management products are to be showcased at this year’s ASIS International 62nd Annual Seminar & Exhibits in Orlando, Florida. From security robots that can handle patrols to multi-modal access management solutions to video surveillance tools, these products are designed to enable enterprise security leaders to make the most of their resources and better secure their assets and employees.

Security Robot
Video Over Coax Surveillance Camera
Security Officer Building
Audio Analytic System
High-Resolution Cameras
Power Management
Access Software with Mobile Apps
Video Management Software
Access Management
Access Control Tablet
Security Robot

Security Robot

The G2R RAMSEE robot is a self-driving mobile sensor platform that can perform both autonomous patrols and human guided activities. The robot’s performance and capability is identical in daytime or in complete darkness. The robot is capable of obstacle recognition and avoidance and will not run into walls, humans, animals or other unexpected objects blocking its path. It operates on battery for a maximum of 13-16 hours without recharging, depending upon the number of additional systems added by customers. It can maintain sensor watch while recharging. It can be directed or controlled by an on-premises security team member to respond to specific incidents. Two-way video communications are available to interact with people on site, and a call button on the robot can summon help in a hurry. The robot can also maintain a continuous log of all activities, which can be used to confirm events during and after an incident for case management and investigations and will produce a shift report that recaps all events and conditions encountered during that shift. It will continue self-guided operations in the event of loss of communication with the console, and when communications are restored, the robot will update the console application with current data.


Learn more at www.gamma2robotics.com or Booth #1723 
 

Video Over Coax Surveillance Camera

Video Over Coax Surveillance Camera

March Networks® will introduce its new MegaPX DPoC MicroDome IP camera that is the industry’s first 3MP, video over coax surveillance camera to support the HomePlug AV/IEEE 1901 standard, enabling it to transmit video and audio in daisy-chain or loop configurations over a single analog cable. The camera saves organizations the expense and disruption typically required to replace existing coaxial lines with Ethernet to capture high-resolution video, and can reduce installation times by 75 percent or more. The MegaPX DPoC MicroDome works in conjunction with an NVT transceiver to stream IP video and audio over coaxial cable and convert the data back to digital Ethernet before archiving on a network video recorder or server. In addition to multi-channel configurations, it can also be installed point-to-point to transmit video over as much as 2,000 feet/609 meters via a single coaxial cable.

Learn more at www.marchnetworks.com or Booth #1614

Security Officer Building

Security Officer Building

Built to help control access at an important U.S. government training facility, this 6’ x 8’ Par-Kut International Presidential Series security officer building features a galvanized steel standing seam hip roof, two sliding doors, heating, air conditioning, tinted glass and a custom stone veneer. The welded steel booths and guardhouses are built to order and may include optional bullet resistant construction, platform or trailer mounting, or a restroom. After approval of site specific drawings, the factory assembled buildings are shipped to location complete, including all internal electric.
Learn more at www.parkut.com or Booth #1251
 

Audio Analytic System

Audio Analytic System

Louroe Electronics’ newest audio analytic solution, the LE-802 Intelligent Audio Analytic System, is an all-in-one audio analytics system for Early Threat Detection. The LE-802 is the first audio analytic solution to the market that allows users to run multiple sound analytics simultaneously. As an added benefit to running multiple sound analytics, the system has the capability of triggering separate and specific alerts based on the audible event detected such as aggression or gunshot. The aggression detector identifies fear, anger and duress – all of which typically precede physical aggression, and immediately notifies security staff so that they can intervene before the conflict escalates. The gunshot detector recognizes a firearm discharge, and upon detection can automatically notify security personnel.

Learn more at www.louroe.com or Booth #2431
 

High-Resolution Cameras

High-Resolution Cameras

Hikvision’s newest line of TurboHDTM products includes a wide range of DVRs and cameras that move from standard 1080p imaging to a higher 3MP resolution. In addition, the optimized H.264+ video compression provides greater efficiency and reduced storage requirements. And, with the 3MP technology, transmission distances nearly double to over 4,000 feet. Images are displayed with 3D Noise Reduction and 120dB Wide Dynamic Range (WDR). Several models include motorized varifocal lenses. All cameras now include integrated EXIR technology for improved night-vision scene illumination.

Learn more at www.hikvision.com or Booth #1811 

Power Management

Power Management

Trove enclosures combine Altronix power with access controllers and accessories from leading manufacturers. Trove simplifies board layout and wire management, greatly reducing installation and labor costs, and provide the versatility and scalability installers need to easily configure their products. Altronix has also introduced Trove1, a compact enclosure that accommodates CDVI, HID/VertX and Mercury controllers. Trove accommodates a wide range of boards with or without Altronix power supplies and accessories. An optional TMV2 door backplane is also offered for maximum installation capacity and flexibility. Systems can be wired and pre-tested prior to on-site installation for added cost and performance benefits. All Trove units include a cam lock, tamper switch and mounting hardware.

Learn more at www.altronix.com or Booth #2011

Access Software with Mobile Apps

Access Software with Mobile Apps

Galaxy Control Systems’ System Galaxy Access Control Software provides traditional thick client, mobile device applications, and web-based thin client user interfaces on a SQL-based, virtual/host or client/server architecture. It provides active directory support for real-time identity management, individualized identity-based door access, and audit reports for each screen view or credential holder. The software supports third party video integration, PoE and wireless lock support, intelligent elevator control. The system offers client- or mobile-driven system lockdown capability by specified door or entire facility. Two mobile apps, PersonPoint and DoorPoint, enhance the capabilities of the powerful access control software solution. PersonPoint allows authorized users to activate and de-activate cardholders remotely, with the added benefit of viewing e-mail activity reports provided by System Galaxy. Users can search for cardholders by name, department or other data fields, further enhancing the efficiency and effectiveness of access control software. The DoorPoint app provides authorized security personnel with the ability to manage a facility’s doors to enhance security. Through the app, users can remotely lock, unlock and pulse doors, view door status and activity report data from System Galaxy.

Learn more at www.galaxysys.com or Booth #2527

Video Management Software

Video Management Software

OnSSI enhances its powerful Ocularis Video Management Software (VMS) platform with the release of Ocularis 5.2. New features and capabilities include increased support for panoramic and 4K surveillance cameras, powerful migration tools for legacy users, administration enhancements and robust system security features. To ensure a smooth and simple upgrade to the latest Ocularis Recorder, Ocularis 5.2 includes migration tools that make it easy to import camera lists from Ocularis legacy Recorders and from CSV files. A new Camera Replacement Tool lets users easily replace individual or large groups of cameras with drag-and-drop simplicity.

Learn more at www.onssi.com or Booth #2151

Access Management

Access Management

Detex puts dependable in restricted secure areas - at gym and dorm entrances, pharmacies, office buildings and any other area where unauthorized entry must be controlled, and authorized entry must be easy, quick and reliable.
The Detex Restricted Access System is easy to retrofit, and can be customized for the enterprise's needs.

Learn more at www.detex.com or Booth #2929

Access Control Tablet

Access Control Tablet

The Princeton Identity IOM Access Control Tablet is the first multi-modal capable, multi-factor biometric access control reader designed specifically for mainstream security applications and budgets. Moreover, it provides additional capabilities including both standard and scrambled keypads, intercoms, QR-readers, cameras, message displays and more, combined in a single, easy-to-install device to establish a new benchmark for cost-effective value and functionality. For authentication, the tablet uses the gold standard of biometric identification – iris recognition – to provide advantages over traditional access control readers.

Learn more at princetonidentity.com or Booth #3829

More Image Galleries
Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe. Organizations need to be prepared through a unified and rapid response to these events.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing