Our March issue featured pre-show new product announcements, some seminar recommendations and a brief highlight of other events scheduled for ISC West 2004 in Las Vegas, but this monthÃ¢â‚¬â„¢s issue is all about products.
To browse a compilation of the latest in DVRs, access control products, smoke detectors, and just about anything else you could imagine, all scheduled to make their security industry debut at the show, visit our roundup of ISC West New Product introductions.
While few in the industry will argue that security and IT systems are integrating, the debate continues on whether or how quickly commercial fire systems will become integrated with security, access control and building systems.
The code-driven nature of fire alarm and detection systems, along with the historical separation of fire from other applications, has made integration occur more slowly and cautiously.
While verification has been the mainstay of access control systems, many in the industry say that authentication and validation of documents - be it a card, passport, driverÃ¢â‚¬â„¢s license or other form of identification - is the next frontier to be conquered.
Beyond determining whether a document is real comes the greater questions of is the person who is holding the document who they say they are and if so, what are they allowed to be doing?
Central databases are often used for this validation purpose, noted Phil Libin, president and co-founder of CoreStreet, a validation software provider based in Cambridge, Mass.
More sophisticated access control systems, along with the convergence of physical security with other corporate functions such as building controls and human resources data bases that use the corporate IT network, has sparked continued evolution in access control-related software.
In his view, said Rudy Prokupets, chief technology officer and vice president-research and development for Lenel Systems International, customers are looking for seamless integration, open architecture and integration between electronic, or physical, security and IT security.