SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Low-key ASIS 2016 reflects changes in the security industry

Low-key ASIS 2016 reflects changes in the security industry
Low-key ASIS 2016 reflects changes in the security industry
Low-key ASIS 2016 reflects changes in the security industry
Low-key ASIS 2016 reflects changes in the security industry
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Related Links
  • Download: Best practices for integrating mobile into the access control architecture

I have been unpacking from last week’s ASIS show in Orlando. It was a good show, except if you compare it to last spring’s ISC West in Las Vegas, which was especially well attended and generated a lot of excitement in the market. ASIS was definitely smaller, lower key and less crowded. And there were no big product announcements.

But there was still plenty of technology on display. In particular, I saw the show reflecting several ongoing trends in the market.

Impact of M&As

Mergers and acquisitions have been big news in the security market for the last year or two, and there was evidence at ASIS of how M&As are changing the market.

For example, Axis Communications, now owned by Japanese giant Canon, is taking over the marketing of Canon’s small (by comparison) selection of video surveillance equipment. Thus ends (quietly) one of the big questions in the market: Why would a company like Canon want to compete against itself? Even more reflective of the changing Canon/Axis world is a new 20-megapixel camera highlighted at ASIS. It was developed through cooperation by the two companies, with Canon providing the lenses and Axis providing the rest of the camera, including image processing. It’s being positioned as an opportunity to combine the best capabilities of both companies.

Mergers and acquisitions have
been big news in the security
market for the last year or two,
and there was evidence at ASIS
M&As changing the market

Vanderbilt is expanding its cloud and video management offerings – in addition to access control – with acquisition of Access Control Technology (ACT) in Dublin. A company built on acquisitions, Vanderbilt will be looking to unify their product offerings in coming months – combining technologies from various acquisitions into a unified whole.

It’s been a big year for FLIR, which has swallowed up DVTEL and now offers a complete range of video surveillance products. Reaching way beyond FLIR’s historic presence as a thermal imaging company, the new FLIR is looking to educate the market about its versatility.

Meeting end user demands

End users demand more integrated systems, and you heard it repeatedly at ASIS. For example, Tyco Security Products says their products are now more connected, reflecting further deterioration of the silos that used to exist.

More effective user interfaces are getting attention. One I saw at ASIS was by Honeywell’s Connected Buildings business. A big screen at their booth showed a map with multiple locations in an enterprise; clicking on a location brings up a schematic showing where cameras are located. If you click on a camera icon, you see video from that camera. They also previewed a smart phone app that runs off the same database, which can be used by guards working in the field.

Bosch also has a neat integration of their access control, intrusion and video systems, all tied together using their intrusion system to provide intuitive controls.

Ameristar, an ASSA ABLOY subsidiary, offers Perimeter InSite software, providing a virtual view of any perimeter security construction project as it is planned and built – stage by stage – with no surprises.

Mobile credentialing, wireless locks

A leader in mobile credentialing, HID Global is emphasising how the technologies are being implemented in the market – more customer references and case studies are paving the way for broader adoption. Other companies are also onboard with mobile credentialing, including Brivo and Lenel.

A leader in mobile credentialing,
HID Global is emphasising how
the technologies are being
implemented in the market

Wireless is continuing to evolve. Stanley Security offers the WiQ wireless product line, emphasising that installation of wireless locks is half the cost of wired, but there are downsides (such as slight access delays) compared to wired. Allegion continues to expand its Engage wireless portfolio, too.

Paxton Access, a British company, has restructured and is investing in the U.S. market. Their Paxton BLU cloud-based access control system uses Amazon web services and is an opportunity for dealer/integrators to earn more recurring monthly revenue (RMR)

Security in the headlines

Violence in the headlines often screams out for security solutions, and there were some at ASIS. Stanley highlighted its Shelter product that enables a wireless lockdown in an active shooter situation in the education environment. It solves a high-profile challenge, but Stanley emphasises that it’s just part of a broader school security programme – that’s what’s really needed.

A different approach on the active shooter scenario is offered by risk assessment and consultancy company Control Risks, which offers active shooter education programmes for enterprises, including an e-learning module to teach employees how to react in an active shooter situation.

New video capabilities

Video grabbed attention at ASIS. As Hikvision and Dahua continue their energetic push into the U.S. markets, they were among the largest (and most crowded) booths. Several companies – including Bosch and Tyco -- are adding video analytics to their cameras at the factory.

Vicon previewed its new Valerus VMS system, based on ONVIF protocols and totally compatible with their legacy ViconNet VMS. They see open systems as a strong selling point, but they will also continue selling hardware and “total systems".

"Suspect search" can search video
to deliver additional examples of
video involving a subject that has
been identified by a single frame

“Suspect search” is a new feature showing up on video surveillance systems. The feature can search captured video from throughout a system to deliver additional examples of video involving a subject that has been identified by a single frame of video – find the girl in the blue dress, or the man wearing a red shirt. Searching a whole system, rather than a single camera feed, expands an operator’s ability to investigate an incident. Avigilon introduced its version, called “Appearance Search” at ASIS, and Qognify also highlighted its version, called “Suspect Search,” which I first saw at IFSEC. I notice Exacq also has a flavour of this, and I am sure there are others.

Perimeter security evolving

Perimeter security is changing. Long considered a “low-tech” wing of the security market, there is a lot going on in the area of perimeter security. Visiting a couple of booths at ASIS opened my eyes. For example, Senstar has every kind of sensor, and their Tungsten product is a security appliance that offers cyber-security at the edge of the network, tying together the sensors and other devices. Protech offers solar-powered wireless sensors that don’t require trenching, another money-saver (more to come about them).

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Video analytics
  • Electronic door locks
  • Electronic access control
  • Security guards
  • Security training
  • School security
  • Wireless security
  • Perimeter protection
  • Cyber security
  • Cloud security
  • Related links
  • ASIS International 2016
  • ACT Access control systems & kits
  • Avigilon CCTV software
  • Avigilon Access control systems & kits
  • Axis Communications CCTV software
  • Brivo Systems Access control systems & kits
  • exacqVision CCTV software
  • IQeye CCTV software
  • Lenel CCTV software
  • Lenel Access control systems & kits
  • Paxton Access Access control systems & kits
  • Qognify CCTV software
  • Vicon CCTV software
  • Vicon Access control systems & kits
  • Avigilon IP cameras
  • Axis Communications IP cameras
  • IQeye IP cameras
  • Paxton Access IP cameras
  • Vicon IP cameras
  • Axis Communications CCTV camera lenses
  • Management Software CCTV software
  • Related categories
  • CCTV software
  • Access control systems & kits
  • IP cameras
  • CCTV camera lenses
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Security beat
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec