February 2012
A Partnership Proposal Y can gain You i ffrom sharing h i business values, says Larry McEvoy, security director at CONSOL Energy, of his officer force. PLUS:
Security’s 9th Annual Top Guarding Firms List
www.SecurityMagazine.com
Hook your customers up for the ride of their lives.
4GCFOQTGYKVJ your smartphone
As the global leader in network video, Axis is setting a fast pace for the industry. Now it’s time to bring the whole analog gang along for the ride. Axis video encoders are the ideal way for you to approach the huge analog market — offering customers IP surveillance benefits even if they aren’t ready to eject their analog solution yet. Axis encoders protect your customers’ investments by enabling a mix of analog and network cameras.
And with the broadest range of encoders in the industry, Axis helps you fit any need and price point. When your customers are looking to migrate to IP surveillance, give them (and yourself) a head start. Axis video encoders — the fast lane to growing your video surveillance business. Get the Axis picture. Stay one step ahead. Visit Axis at ISC West: Booth #18051, Las Vegas, NV, March 28-30. www.axis.com/iscwest
#EQORNGVGTCPIGQHXKFGQGPEQFGTUŧ/WNVKRNGXKFGQEQORTGUUKQPHQTOCVUŧ* HQTTGFWEGFDCPFYKFVJŧ2QYGTQXGT'VJGTPGVHQTEQUVUCXKPIUŧ+PVGNNKIGPVXKFGQ ECRCDKNKVKGUŧ4CEMUQNWVKQPUUKORNKH[UECNKPI
Virtual Fence Cloud Archiving
SUPPORTS
Face Finder
MEGA ME M EG EG GA A PIXE ELL PIXEL
Audio/ Visual crime deterrent
RECORDING
Rack Mountable DVRPC16T Model Shown
Intelligent Video Analytics: +55+0)$,'%65 752+%+175$,'%65 $,'%6'6'%6+10 %'0'*#0)'
+&'1 0%4;26+10 #6'4/#4-'4+(+%#6+10 #%' +0&'4
Remote View on o iPhone® or iPad®
email:
[email protected] ph: 1.800.645.5516 www.specotech.com All registered trademarks and logos are property of their respective owners.
TABLE OF February 2012
Q
Vol. 49 / No. 2
SPECIAL FEATURE
20 Guarding Special Report and Security’s 9th Annual Top Guarding Firms List What’s so special about the partnership between Larry McEvoy, CSO at CONSOL Energy and his security service? It reflects the best of breed when it comes to the evolution in the myriad roles of security officers, both proprietary and contract.
20
36
ENTERPRISE SERVICES
30 The Joint Venture and Security’s Role Jill Knesek, Chief Security Officer, BT Global Services, offers suggestions on how to merge people, processes, technologies and security when a company enters into a joint venture.
SURVEILLANCE SOLUTIONS
36 Megapixels Can Business-Dazzle, Too The megapixel approach: learn how it can achieve your security goals, including high-quality images, while saving money in the number of cameras in installation and long-term maintenance costs.
4
February 2012 • SECURITY • SecurityMagazine.com
|
Focus Quality Security What makes a quality security program? For AlliedBarton it starts with employees like Tom who is one of over 50,000 AlliedBarton security officers that embody leadership through service. It also takes strong management and support. We’ve asked many of your peers for their insight and perspective. To see what they said, get our free and informative survey results by visiting AlliedBarton.com/SecurityInsights.
866.825.5433
| AlliedBarton.com/SecurityInsights
TABLE OF
CONTENTS 10
COLUMNS 10 Trends Mark McCourt Look to the Clouds and Ask, “Why?” As cloud computing becomes the new platform for many aspects of our lives, it’s important to examine why the platform will change the security enterprise.
46
34
48
Zalud Report
Leadership & Management
Industry Innovations
Bill Zalud
Marleah Blades Risk at High Velocity Threats and risks will continue to pick up speed, and the next generation of security leaders will need to be quick enough to build security functions that can match them – for nimble, resourceful, and creative response.
As Consumer Electronics Go, So Goes Security Tech Find out how happenings in consumer electronics are becoming more influential with enterprise security solutions.
52 Industry Innovations: Special Focus on New Video Management Systems
62
66
Education & Training
Security Talk
Dean C. Alexander
Diane Ritchey
42 Surveillance Strategies Keven Marier The “16x Growth” Business of Ultra High-Definition Surveillance Keven Marier explains what type of ecosystem growth will need to happen before the industry gets to “Ultra HighDefinition Evidence.”
New Steps in Combating Mexican Drug Trafficking Organizations Learn how Mexican drug trafficking organizations and Mexico’s capacity to combat them will have significant implications for the U.S. and security overall.
Get to know Evan Dabby, senior director of operations for Major League Soccer, where he oversees security, game and medical operations and team travel for all MLS teams and venues.
65
DEPARTMENTS
Ad Index/ Calendar of Industry Events
12
44
Global News & Analysis
Access & ID Joel Jensen Core Security Values: Do You Have Them? Put yourself in the place of someone who uses your company’s ID card to access spaces in your facility and/or one who enters through a staffed ID checkpoint. What would you value? And does it match their values?
Turtles, Birds, Science Projects, Flare Guns and more. What are the top 10 “catches” of 2011 during security checks at US airports?
12
SECURITY ADVISORY BOARD Advising editors on topics and trends. Sean Ahrens, CPP, CSC Project Manager Security Consulting & Design Services Aon Risk Solutions Dean Alexander Professor of Homeland Security Western Illinois University Ted Almay Chief Security Officer Deloitte Services LP Sandi Davies Executive Director International Foundation for Protection Officers 6
Guy Grace Manager, Security and Emergency Planning Littleton (Colo.) Public School District Sandra Jones Co-founder, Securing New Ground Jeff Karpovich Chief/Director Security & Transportation Highpoint University Tom Lozich Executive Director, Corporate Security and Surveillance, MGM Resorts International
February 2012 • SECURITY • SecurityMagazine.com
John S. Martinicky, CPP Director, Corporate Security International Truck and Engine Company
Karl Perman Director of Security, North American Transmission Forum
John McClurg VP, Chief Security Officer Dell Global Security
William Phillips Vice President and Chief Security and Safety Officer CNA Insurance
W. Barry Nixon, SPHR Executive Director National Institute for the Prevention of Workplace Violence
C. Dave Shepherd CEO of Readiness Resource Group
Anthony Patillo AVP Security, NA Sanofi
Dennis Treece Director, Corporate Security Massachusetts Port Authority Bryan Warren Director of Corporate Security Carolinas HealthCare System
®
CBC offers surveillance systems for virtually any application. From entry level to large-scale applications, we provide a comprehensive line of IP, analog, hybrid, mobile and cloud-based monitoring products that are customizable to deploy powerful, trouble-free video surveillance systems. Our Computar Lenses and Ganz line of intelligent Analog and IP Cameras, NVRs, Software, DVRs and Cloud-based products have made us the first choice for businesses and institutions worldwide.
Cameras I Lenses I Housings & Kits I DVR I NVR Servers & Software I Monitors
W W W . C O MP U TA R G ANZ . C O M Scan Me!
NY: 55 Mall Drive, Commack, NY 11725 • Telephone: 1-800-422-6707 CA: 20521 Earl Street, Torrance, CA 90503 • Telephone: 1-877-407-9555 © 2011, CBC All Rights Reserved. www.computarganz.com
www.securitymagazine.com
For subscription information or service, please contact Customer Service at: Tel. (847) 763-9534 or Fax (847) 763-9538 or e-mail
[email protected] SecurityMagazine.com/subscribe SecurityMagazine.com/renew Publisher Mark McCourt 600 Willowbrook Lane, Suite 610 West Chester, PA 19382 (610) 662-5477 • Fax: (248) 244-2042
[email protected] Editor Diane Ritchey • (630) 220-8771
[email protected] Online Media Manager Jackie Seigle • (215) 939-89671
[email protected] Editor Emeritus Bill Zalud • (773) 929-6859
[email protected] Reprint Manager Jill DeVries • (248) 244-1726 Fax: (248) 244-3934
[email protected] Art Director Mike Holmes • (412) 306-4358
[email protected] Directory/Buyers Guide Carolyn Perucca • (248) 244-6474
[email protected] Production Manager Lyn Sopala • (248) 786-1641
[email protected] Trade Show Coordinator Chelsie Taylor • 248-244-6249
[email protected] Yes, It’s all that
Audience Development Lisa DeWitt – Audience Development Manager Alison Illes – Multimedia Specialist Catherine M. Ronan – Corporate Audience Audit Manager Editorial Offices 1050 IL Route 83, Suite 200 Bensenville, IL 60106-1096 (630) 616-0200 • Fax: (630) 227-0214
[email protected] Corporate Directors Publishing: John R. Schrei Corporate Strategy: Rita M. Foumia Marketing: Ariane Claire Production: Vincent M. Miconi Finance: Lisa L. Paulus Creative: Michael T. Powell Directories: Nikki Smith Human Resources: Marlene J. Witthoft Information Technology: Scott Krywko Clear Seas Research: Beth A. Surowiec Sales Team Chris Ward, Associate Publisher/ Regional Sales Manager (770) 205-4779 • Fax: (248) 502-9088
[email protected] & A BAG OF CHIPS
Doug O’Gorden, Regional Sales Manager (847) 548-0680 • Fax: (248) 786-1351
[email protected] Kent Beaver, Regional Sales Manager (310) 474-7158 • Fax: (310) 472-7159
[email protected] Tara Schelling, Regional Sales Manager (610) 613-7576 • Fax: (610) 222-0568
[email protected] Heidi Fusaro, Inside Sales/Classified & Help wanted 1050 IL Route 83, Suite 200, Bensenville, IL 60106-1096 (630) 518-5470 • Fax: (248) 502-1008
[email protected] Spectra™ Class Quiet Elegance. All Exits. 6SHFWUDj&ODVVPHFKDQLFDOH[LWGHYLFHVDUHLGHDO IRUVSHFLILFDWLRQVWKDWUHTXLUHUXJJHGQHVVVRSKLVWLFDWHG ORRNVDQGTXLHWRSHUDWLRQ7ULPVW\OHVHOHFWULFOHYHUVDQG IXQFWLRQVHQDEOHXVHRIRQHEUDQGIRUYLUWXDOO\DOODSSOLFDWLRQV
6SHFWUDj6
Israel Asa Talbar, Talbar Media,
[email protected] 6SHFWUDj1
Spectra™ Electric Access & Egress 450 mA Inrush
HiTower® Frame Controller
Delayed Egress Exit Device
QUIET DUO™ Latch Retraction
1RHOHFWULFKLQJHQRZLUHLQGRRU (Yale 7130 also available)
'LVSOD\YRLFHWRQHDQQXQFLDWLRQ H[LWFRQILUPDVVLJQUHVHW FRQWURO
5HWURILWODWFK SXVKSDGUHWUDFWLRQ 8/OLVWHGIRUPRVWH[LWGHYLFHEUDQGV
Dual Latch Retraction & Dogging
Exit Alarm
Electric Mortise
/RZP$QRFRVWO\SRZHUVXSSO\
:LUHGRUEDWWHU\SRZHU RSWLRQV
)XOOIHDWXUHGORFNVHWRSWLRQDORXWSXWV
)D[ VHUYLFH#VGFVHFXULW\FRP 6&$10()25025(,1)2
SDC Products are sold through the following distributors
Korea, Young-Seoh Chinn, JES Media Inc.,
[email protected] Pacific Rim (except Korea), Arlen Luo, NewSteel Media,
[email protected] BNP Custom Media Group Christopher Wilson (248) 244-8264
[email protected] List Rental Kevin Collopy Sr. Account Manager Phone: 845-731-2684 Toll Free: 800-223-2194, ext. 684 Email:
[email protected] Shawn Miller Account Manager Phone: 845-731-3828 Email:
[email protected] sdcsecurity.com Security Door Controls
India, Shivaji Bhattacharjee, Information and Education Services Pvt. Ltd
[email protected],
[email protected] www.securitymagazine.com For subscription information or service, please contact Customer Service at (847) 763-9534, Fax (847) 763-9538 or e-mail
[email protected]. Helps People Succeed in Business with Superior Information
8
April 20112012 February • SECURITY • SECURITY • SecurityMagazine.com • SecurityMagazine.com
From bones to ballrooms, ProxiPen is making the rounds. Our innovative guard tour verification system provides reliably good reads from tags people won’t see. Museums to hotels, the GCS® ProxiPen is reading tags concealed behind wallpaper, wallboard, plaster, paneling, mirrors or any other nonmetallic surface. That’s a real advantage in areas where aesthetics or vandalism are considerations. With this proximity-based device, you get consistently accurate readings of high-security RFID checkpoints so that you’ll have accurate reports of your officers’ activities. And the checkpoints won’t detract from the decor. The ProxiPen—compact, lightweight, and weatherized— is a high-tech tool that senses and reads tags automatically when they come within its reading range, even in wet or icy environments. No direct contact is required. Powered by a single user-changeable AA battery, it provides visible and audible indications to confirm that the information has been read. Our ProxiPen Kit provides everything you need, including TopGuard Patrol reporting software, RFID tags, and downloader, and is backed with an industry-best three-year warranty. Detex also offers a variety of other guard tour solutions, such as Reliant, to suit your specific needs and budget. Contact us soon to learn more about ProxiPen. Consistently accurate guard tour technology. No bones about it.
800-729-3839 830-629-2900 www.detex.com
Trends
Look to the Clouds and Ask, “Why?”
A
10
s Cloud Computing becomes the new platform for many aspects of our lives, from Google Mail to iTunes to banking and more, the discussion specific to security tends to focus on the What. It may be helpful to look at the Why. Security Cloud Computing (SCC) is changing the very fabric of how security is sold, delivered, used and as a result, valued. While SCC is nothing new to the security monitoring business model, SCC may benefit your security program. You will hear concerns that the cloud is not secure. But that is not our cloud. Securing the cloud is important, and very smart people are working to ensure that happens. Our opportunity is to use the cloud to secure our organizations, not to secure the cloud. By Mark McCourt As a definition, any security related application (video, identity, access, fire, intrusion, life safety) that is traditionally purchased, installed and managed can become a cloud-based service with recurring payments as the model versus capital expenses. What is driving Security Cloud Computing, and is it time for an upgrade to your plan?
The move to virtualization is in full force. Mobilization, especially the 2-4 billion smart phone devices where people want to get their information, video and the latest issue of Security magazine is changing where we work and how we live. This information has to be collected in and distributed from a cloud platform with the latest software in place.
WHAT is Changing?
WHY it is Changing
Three technology trends are combining to enable successful cloud computing models and the layering of applications on the cloud. In our case, security is the application on the cloud platform. 1. The digitalization of all things, including security technologies 2. The delivery of software as a service replacing software purchase and upgrades 3. Mobilization forcing the distribution of information to more than 2 billion and growing smart phone devices. Digitalization has occurred, as the move from analog to IP is in full force with more than 65 percent of all DVRs sold including Ethernet connections. IMS Research identifies that more than 50 percent of all 32 or more camera installations are now IP (with analog dominating the under 16 camera installations). Software as a Service (SaaS) is logical, efficient and now technically practical. The days of buying and installing software that ages quickly and requires upgrades/replacement by users are in the rear view mirror. SaaS changes the way we live our lives and access information from music on iTunes, to customer information on Salesforce.com to books from Amazon to entertainment via on demand video at home. Those failing to meet this call will go the way of Blockbuster and Borders. Having the latest version of software each time you log in and having subject matter experts upgrade and maintain that software is a good thing.
Enterprise goals have moved from event response to risk management. The goal is to achieve situational awareness and event prevention as well as provide an effective response to unforeseen events. Organizations like yours are demanding access to all business information when, where and how you want it, and that includes security-related information. At the same time, organizations are more focused on putting resources into strategic initiatives and outsourcing non-strategic activities. For example, an investment company will outsource payroll to ADP but not the development of algorithms that create a competitive advantage on their trading floor. SaaS for security fits perfectly into that goal. SCC delivers powerful information to achieve a broader array of business goals. Customer metrics, including people counting at stores or crowd control in public venues, are enabling both business and security decisions during fluid situations that benefit all your stakeholders. Even more, SCC is being adopted due to internal corporate responsibilities, legislation, insurance and risk management. For example, drug treatment facilities are required to host video content offsite. The value in the physical security application must transcend security and create broader business value to be justified. For your consideration, these are the WHYs of SCC.
February 2012 • SECURITY • SecurityMagazine.com
Combined, this tsunami of change is impacting every business, including security. “There are some very powerful technologies available today. And those that are not using them are running out of excuses,” notes Bud Broomhead, CEO of Intransa.
Gl bal News&Analysis Counterfeit Seizures Up in 2011 IN FY 2011, U.S. CUSTOMS and Border Protection (CBP) and U.S. Immigration and Customs Enforcement (ICE) seized 24,792 counterfeit and pirated goods, a 24-percent increase over 2010. The value of these seizures increased to more than $60 million due to increases in pharmaceutical and perfume seizures. The domestic value for seizures in fiscal year 2011 decreased by five percent to $178.9 million and the manufacturer's suggested retail price declined slightly to $1.1 billion. ICE says this is primarily due to a shift toward using international mail, express courier and consolidated shipping services to import counterfeit and pirated goods.
1.3 megapixel performance
320X total zoom
supports 16:9 720p HD
PoE
1280x1024 pixel resolution H.264/MPEG-4/MJPEG
it all adds up to Samsung.
China continues to be the number one source country for counterfeit and pirated goods seized, accounting for 62 percent or $124.7 million of the total domestic value of seizures. For the first time since FY 2005, footwear was not the top commodity seized in fiscal year 2011. Consumer electronics were the top commodity seized, and approximately one-third of this category was represented by IPR infringing cellular phones. The top 10 categories of IPR-infringing products seized were pharmaceuticals, health/personal care, eyewear/parts, critical technology components, electronic articles, cigarettes, perfumes/colognes, batteries, exercise equipment and transportation/parts.
iSecurity 2012: Register for the Virtual Event Security magazine is pleased to offer iSecurity 2012, which will take place on Thursday, March 8 from 10:00 a.m. - 4:00 p.m. EST. This unique virtual event will provide solutions and networking opportunities to industry professionals from around the globe.
Since its premier in March 2010, iSecurity has been the leading virtual event in the security industry; bringing together the security community to a shared online environment. Now entering its third year and fourth show, iSecurity is back with all new content and even more ways to make connections. The free virtual event is available from
network PTZ or megapixel camera?
both. We’ve combined the two in our new SNP-5200 1.3 megapixel PTZ. In addition to its outstanding ability to capture high resolution details, now you can track activities over an even greater coverage area with breathtaking precision. Product highlights include: ■ ■ ■ ■ ■
true Day/Night lens with 20X optical zoom 1.3 megapixel resolution low-light sensitivity (0.7 lux) supports 16:9 720p HD imaging dual output IP/analog
■ ■ ■ ■ ■
multi-stream/multi-codec (H.264/MPEG-4/MJPEG) Power over Ethernet (PoE) bi-directional audio support available in indoor and outdoor (IP66) models ONVIF compliant
[email protected] • samsung-security.com • 1.877.213.1222
your computer and provides all the benefits of an in-person event. Previous attendees have said “Can you improve this? I wonder how. This is my first experience and it was fantastic. Thank you for the time and expense savings,” and “The show was really quite good and I received a great deal of information, not only from the vendors/sessions but attendees as well, and I look forward to further shows of the same great caliber.” On March 8 at 10:00 a.m. EST, virtual expo “doors,” including access to the Exhibit Hall, will open to attendees. The line-up of exhibitors includes suppliers of security products, access management/control, monitoring services, cyber security and more.
TSA’s ‘Top Catches of 2011’: Turtles, Birds, Science Projects, Flare Guns and More The Transportation Security Association (TSA) has listed its top 10 "good catches" of 2011 during security checks at US airports. They include:
The Top 10: 10) Snakes, turtles, and birds were found at Miami and Los Angeles. 9) A science project shut down a checkpoint at Omaha. 8) An artfully concealed non-metallic martial arts weapon called a “Tactical Spike” was found in the sock of a passenger at Pensacola after being screened by a body scanner. 7) Inert landmines were found at Salt Lake City. 6) A stun gun disguised as a smart phone was as found at Los Angeles. 5) A flare gun with seven flares was found in a passenger’s carry-on bag at Norfolk. 4) Two throwing knives concealed in hollowedd out book were found at Washington National Airport.
Attendees can chat with product experts, download product brochures and qualify for giveaways. LIVE presentations will include present Security Channel in 2012: Best Opportunities & Greatest Challenges, Preparing a Violence Prevention Plan with New OSHA Approach, and a presentation of the 2011 Security 500. Each webinar will include a live Q&A with presenters, so get your seat and ask away! For the full conference agenda and free registration, visit www.iSecurityTradeshow.com. Get up-to-the-minute details on what’s happening before, during and after the show by following #iSecurity on Twitter.
Latest Virginia Tech Shooting: Did the Warnings Work? Hours after the December 8, 2011 Virginia Tech University situation was resolved -- the on-campus murder of a Virginia Tech University police officer and the suicide of his killer, the media spotlight turned to how and how well the university got the word out as the emergency progressed.
The Virginia Tech mass notification system was effective during a shooting incident in December. Scores of colleges have upgraded to simple, reliable and effective emergency communication. Photo courtesy PRNewsFoto/Omnilert, LLC
3) More than 1,200 firearms were discovered at TSA checkpoints across the nation in 2011. Many guns are found loaded with rounds in the chamber. Most passengers simply state they forgot they had a gun in their bag. 2) A loaded .380 pistol was found strapped to passenger’s ankle with the body scanner at Detroit. 1) Small chunks of C4 explosives were found in a passenger’s checked luggage in Yuma. 14
February 2012 • SECURITY • SecurityMagazine.com
It turns out that mass notification worked well. The warnings this time proved fast and numerous, four of them in the first hour after the officer was reported shot. Virginia Tech, as with many other colleges, now has a system that sends alerts to message boards in classrooms and dorms, and text messages to cellphones and other digital devices that students, staff and faculty members have registered with the system. It also communicates warnings through Twitter, Facebook and online video. No doubt, "the communications sys-
choose open
Security integrator Service Works, Inc. chooses open technology to provide flexibility for its end users. When Jersey Shore University Medical Center turned to Service Works, Inc. for a security system to protect its $300 million expansion, SWI chose an open access control solution that would integrate with the CCTV and infant abduction systems already in place. After examining all the options available from various security providers, they chose Honeywell’s Pro-Watch® security management system because it works seamlessly with third party systems. "Our customer needed a system that was flexible enough to work with their existing security platform and Pro-Watch was the perfect fit." Honeywell’s Open Technology Alliance (HOTA) enables open exchange of technology between manufacturers—making an end user’s investment in existing security infrastructure go a long way. SWI and Jersey Shore choose open – won’t you?
Pictured: Melanie McVeigh, Sales Executive, Service Works, Inc., Farmingdale, NJ. To learn more about Honeywell's integrated security solutions, including Pro-Watch, visit www.honeywell.com/security or call 1-800-323-4576 to schedule an appointment with a Honeywell representative. Get more info!
© 2012 Honeywell International Inc. All rights reserved.
tems we have today did not exist on April 16, 2007,” University President Charles Steger told the media. The school said six alerts went out, all told, including one saying the crisis was over and it was safe to go outside. Ironically, on the same day of the December incident, the university was scheduled to contest $55,000 in Department of Education fines for allegedly not informing everyone quickly in the 2007 episode, saying it acted appropriately in alerting the campus in what became the deadliest mass shooting in modern U.S. history. The government disagreed, contending the school was too slow in notifying students, faculty and staff and in violation of the Clery Act.
Spotty Handling of Healthcare Records Continues
Physical and Cyber Challenges Protecting the Smart Grid
Even in the face of tough federal regulation including HIPPA and HITECH, there continues to be incidents of mishandling of data. For example, a woman in Las Vegas last month found a box full of medical records placed near a dumpster in a parking lot. The records contained information ranging from credit card applications, to patients’ names, addresse, and even Social Security numbers. There were
A report by Pike Research found a lack of security standards, a hodgepodge of products, and increasingly aggressive malicious hackers will make 2012 a challenging year for securing smart grids. “After years of vendors selling point solutions, utilities investing in compliance minimums rather than full security, and attackers having nearly free rein, the attackers clearly have the upper hand. Many attacks simply cannot be defended,” states the Pike report. There is also a danger of overlooking the insider threat. “One of the main reasons for increased spending on smart grid security software and management systems is simply to make sure the correct people have access to the equipment and systems they should have access to.” Among other things, this means protecting systems from disgruntled employees or others who might commit internal sabotage, an ABI Research analyst says. The Pike Research report suggests the lack of enforceable security standards or regulations for power distribution grids “leads to a scene of mass chaos in utility cybersecurity,” and will cause utilities to take a wait-and-see approach to significant security investments.
Illegal Drugs Cause 250,000 Global Deaths Yearly About 200 million people worldwide use illegal drugs each year, according to a new report. The report is the first in a series of papers published in the journal the Lancet that address the burden of disease due to illicit drug use. It reviews information on the prevalence of illegal drug use, as well as its acute and chronic health effects. The report researchers, who used information from the United Nations Office on Drugs and Crime as well as other published literature, estimate that between 149 million and 271 million people worldwide use illegal drugs. Most are cannabis users (125 million to 203 million), followed by amphetamine users (14 million to 56 million), cocaine users (14 million to 21 million) and opioid users (12 million to 21 million). Cannabis use was highest in Oceania (Australia and New Zealand), with up to 15 percent of 15- to 64-year-olds using the drug. Oceania also had the highest use of amphetamines, with 2.8 percent of that age group using drugs such as speed and crystal meth. Opioid use, including heroin use, was highest in the Near and Middle East (up to 1.4 percent of 15- to 64-year-olds). Cocaine use was highest in North America (1.9 percent). Data from the World Health Organization suggests there were 250,000 deaths worldwide due to illicit drug use in 2004, compared with 2.25 million due to alcohol, and 5.1 million due to tobacco. 16
There needs to be more all-encompassing protection of data. For example, Hirsch's Velocity provisions secure ID cards enabled for both building and computer access control.
several doctors’ names in the paperwork found along with the medical records, which are believed to have been produced by Pure Med Spa, a Canadian company that no longer has offices in the United States. The Nevada Board of Medical Examiners said it is investigating the matter. In another incident, a man who worked as a janitor at Ochsner Medical Center in New Orleans and his girlfriend pleaded guilty to charges they used stolen patient information for their personal gain. The suspect stole printouts containing patients’ names, Social Security numbers, dates of birth and other personal information, according to federal prosecutors. He then gave the stolen patient information sheets to his girlfriend who allegedly used the data to open online accounts with retail and financial companies under the patients’ names and ordered a 42-inch television, an $800 ring, gift cards, and other merchandise. Prosecutors said the stolen documents contained the names and information of about 156 patients. The “intended loss” from the scheme was an estimated $82,310, according to a court filing.
February 2012 • SECURITY • SecurityMagazine.com
Copper Crime Can Be Inside Job An ex-AT&T employee who had been allegedly stealing spools of copper wire from his former employer for weeks was arrested after being caught inside a storage site near Covington, La., said a spokesman from the St. Tammany, La. Parish Sheriff ’s Office. He has been charged with breaking into the telecommunication firm’s facilities at least 17 times and pilfering the equipment during 16 of those occasions. Investigators began probing a series of copper thefts from AT&T complexes at the beginning of November, and late last year, the suspect was allegedly spotted in the storage yard. Investigators suspect the man was selling the copper to recycling businesses.
Debate Continues Over Thailand Flood-Caused Disk Drive Shortages A severe monsoon season in Thailand, which triggered massive flooding, has impacted availability and pricing of hard
Intelligent, integrated solutions that improve the safety and security of your campus. www.usa.siemens.com/security
A quality educational experience requires an open environment where students, faculty and staff feel safe and secure. Siemens Security Solutions helps colleges and universities create just such an environment. We address your unique security challenges through proven
solutions that increase prevention, detection and response. The end result is a campus where everyone feels protected and can concentrate on what’s most important — learning.
Answers for infrastructure.
disk drive (HDD) components inside security video storage and retrieval systems. Depending on the country of origin of the devices, the fallout is lack of availability of some product from security manufacturers and price increases. Some suppliers to the security industry have said that the shortage may abate in the first quarter 2012. But, according to analysts attending last month’s Consumer Electronics Show in Las Vegas, there is a chance, some contend, that the shortages and price hikes would impact through 2013. There is limited availability for some hard drives and product prices for some DVRs and NVRs have risen due to Thailand flooding. Industry Analysts are divided when supply will return to normal. Some says this quarter while others contend the shortages and price fluctuations will go through 2013.
Western Digital, a major producer, believes that significant industry supply constraints will continue in the March quarter and beyond, according to a company statement. While no one knows exactly, it’s estimated that about 40 to 55 percent of HHDs are made in Thailand. Today’s interconnected global supply chain, coupled with a challenged U.S. economy and “just in time” inventory strategies by integrators and makers of security-centric digital video recorders (DVR), network video recorders (NVR) and servers, created a perfectly awful storm. And there is no doubt that such situations – weather, earthquakes, revolts, strikes, terrorist attacks, parts shortages – will rain down on enterprise security leaders and their integrators in the future. Mike Painter of Security-Net warns that those wanting to run to Best Buy and grab everything off the shelf, may be mistaken. There are two different types of drives: consumer and professional. Buyer beware: buying the wrong thing can cause more harm than good. “Check the rating of the storage or the server type machine. You may pay a little more but you see the difference,” Painter says.
SCAN TO RENEW It’s time to renew your FREE subscription to Security. Scan this image with the Microsoft Tag Reader on your smartphone or go to www.SecurityMagazine. com/renew 18
February 2012 • SECURITY • SecurityMagazine.com
Now the most accurate analytics and
New SightS
ensor therm
al analytic c
clearest
amera
thermal images
day and night are available at
Leading the
rmal camer
a with analy
tic partner
mainstream pricing! Introducing the
all new
SightSensor See the difference… sightlogix.com/thermal scan here
SPECIAL REPORT
Security Officers: Larry McEvoy really digs his job. His firm, CONSOL Energy, a leading diversified energy company, helps generate two-thirds of the nation’s power supply, responsible for mining more high-quality bituminous coal than any other U.S. producer as well as the largest gas producer in Appalachia. As director of security for the $5.2 billion firm, with help from an associate who handles the technology side, McEvoy focuses on the three core values of the company: safety, compliance and continuous improvement. And he expects his contract security solutions service – G4S – to do the same. The partnership between McEvoy and his security service reflects the best of breed when it comes to the evolution in the myriad roles of security officers, both proprietary and contract. Just as justification of technology is really a business decision, so is the application of officers. And, not surprisingly, annual growth in the numbers of security officers matches and sometimes surpasses, growth of security video and card access controls. According to the U.S. Department of Labor, there will be about 1.3 million people employed in the private security officer arena by 2018, for a healthy growth rate of 14 percent from today to then. A significant portion of that growth will reside in the biggest international, national and big regional guarding services. Elsewhere in this issue is Security magazine’s 9th annual Top Guarding Companies list.
Expanded Duties
Larry McEvoy, director of security for CONSOL Energy, partners with his services provider to jointly focus on the three core values of his company: safety, compliance and continuous improvement.
20
February 2012 • SECURITY • SecurityMagazine.com
More importantly, many enterprises have expanded officer duties, provided them more technology to use and invested in diverse training and certification. Then there is the Homeland Security effort. Just in terms of sheer numbers of security officers on the job, as compared to law enforcement, fire fighters and emergency medical technicians, the private sector’s officers are truly first responders. So it is a given that expectations have grown and have largely been met, thanks in part to the closer relationship of enterprise security leaders with their service providers. McEvoy’s expectations, and G4S’s delivery, are mirrored by some other chief security officers, security directors and facility managers who view
A Matter of Values By Bill Zalud, Editor Emeritus
trust, understanding of their business and culture and a personally professional connection to project leaders, supervisors and individual officers as energizing a longer, closer relationship between client and service. Enterprise security leaders need to see
that partnership from the start. “Being able to view security and safety through the lens of our customer to gain a clear understanding of their unique needs and expectations is vital to building a comprehensive security program that meets customer expectations,” says Drew Levine,
It’s important for Mike Stratton’s security services provider to synch with the culture of Honda of America Mfg. Photo by Leana Woehler.
president of G4S Secure Solutions North America. Specific to CONSOL Energy and Larry McEvoy’s vision, “we focused on safety; communications; training; and realtime technology to deliver a multi-faceted security and safety program that meets their specific needs and requirements,” he says.
There is a close relationship and understanding of the values inherent in CONSOL Energy. Pictured is Ed Reed of the security office and Larry McEvoy, the security director.
The Good and Future of Training hris Hertig, assistant professor at York College of Pennsylvania, has been dedicated to the education of security professionals and certification of officers and supervisors through his long-term involvement with the International Foundation for Protection Officers (IFPO). Here are some thoughts from Hertig on officer training. Within contract security, proprietary security and retail loss prevention, there is more training for entry-level officers than ever before. The ASIS Academic Programs Council has been given training as part of its mission. The council is now known as the Academic and Training Programs Council and has a new mission statement: to promote and assist in the development of security academic education and professional training programs at academic institutions, professional associations, private organizations and governmental entities. Large firms such as Securitas, AlliedBarton and G4S offer a marvelous menu of professional development options. Most of these are online programs that fit nicely into what security officers need to be effective. In some cases, there is a certification given by the employer upon completion of specified coursework.
C
The Brownyard Group has initiated the Brownyard Educational Center (Brownyardu.com). This is a cooperative effort to train and educate protection officers among various entities (Kaplan University, CINet). An interesting approach; costs and marketability will have to be assessed to determine its degree of success. There is the IFPO, which has long provided essential certification programs that include the Certified Protection Officer program, CPO Final Challenge, Certified in Security Supervision and Management program, Officer Basic Training, Basic Protection Officer program, the Security Supervision and Management program and the Certified Protection Officer Instructor program. Security officer training/professional preparation has also moved into college level material. The recent expansion of the ASIS Guideline on Security Officer Selection and Training and The Professional Protection Officer both show the growing responsibilities of entry-level protection officers. Crisis management, terrorism and the complexities of human interaction are areas that were added to both the guideline and the text. What remains to be seen in the training, certification and higher education arenas is if this growth is sustainable. SecurityMagazine.com • SECURITY • February 2012
21
SPECIAL REPORT
9th ANNUAL Top Guarding Firms Listing Collected by Security Magazine, December 2011, and in The Security Letter, June 2011 Company Securitas NA Chicago
Revenue (Millions)
Employees
Offices
Source
3100
85,000**
600
S
That understanding starts with “understanding their business processes and then striving to provide continuous improvement whether it’s in the areas of mitigating risk, finding cost efficiencies, or improving compliance,” adds Levine. Reflecting the security management field more broadly, McEvoy’s background includes formal education and significant assignments before coming to CONSOL Energy.
AlliedBarton Conshohocken, Pa.
1700 #
57,750*
136
S
G4S Palm Beach Gardens, Fla.
1114 #
33,245*
150
S
A Career Commitment
US Security Associates Roswell, Ga.
765
29,000
140
L
Transnation Security Group St. Louis
621
19,907
103
L
“I went to school to major in criminology, looking at the corrections field,” says McEvoy. When Norm Bottom, one of Security magazine’s Most Influential, came to the University, the program shifted to a security orientation. He then earned a master’s degree in industrial safety and hygiene as McEvoy embarked on a career at SAIC, the Department of Defense contractor; Alcoa; the Westinghouse Science and Technology Center; and Nova Chemicals before settling into a position at CONSOL Energy about two years ago. “Our mission,” says McEvoy, “is to be enablers to the operation” in partnership with G4S. “We are there to help with security principals, practices and procedures. We must understand the organization and look at all the processes inside it, as well as the future directions of the organization.” On a regular basis, the security director meets with vice president level executives to share upcoming plans and changes. The shared bottom line: to protect the people, property and assets. “In the gas and coal business, there are always changes
Guardsmark New York City
510
17,118
156
L
Garda Montreal, Q, Canada
481 USD
19,000
45
L
Universal Protection Sv. Santa Ana, Calif.
410##
13,500*
N/A
S
Andrews International Valcencia, Calif.
350
11,000
40
L
ACSS Houston
336
11,300
48
L
Covenant Sv. Worldwide Bolingbrook, Ill.
202
3,410
25
L
FJC Security Sv. Floral Park, NY
181
4,620
14
L
Command Security Lagrangeville, NY
146
5,200
43
L
Whelan Security St. Louis
143
5,000*
39
S
Valor Security (Mydatt) Marietta, Ga.
134
7,507*
N/A
S
Walden Security Chattanooga, Tenn.
130
3,400
10
L
SOS Security Parsippany, NJ
124
4,500*
32
S
Security Forces Charlotte, NC
101##
3,400
31
L
American Security Prog. Dulles, Va.
60
845
6
L
T&M Protection New York City
59
1,241
3
L
A&R Security Sv. Blue Island, Ill.
54
2,000
8
L
St. Moritz Security Pittsburgh
49
1,500
22
L
McRoberts Protective New York City
48
2,200
20
L
Bowles Corporate Sv. Clifton, NJ
48
1,785
8
L
SecurAmerica Atlanta, Ga.
47
2,612
30
L
Per Mar Davenport, Iowa
45
3,246
21
L
Apollo Security Walpole, Mass.
44
1,507
9
L
CPS Security Solutions Gardenia, Calif.
43
1,100
15
L
DSI Security Dothan, Ala.
42
2,700
23
L
APG Security South Amboy, NJ
42
1,630
9
L
ISS Security San Antonio, Tex.
39
2,000
14
L
United American Security Raleigh, NC
31
1,247
8
:L
Diamond Detective Agency Chicago
25
900*
9
S
Titan Security Group Chicago
24
800
3
L
OSS Warren, Ohio
23
1,015
N/A
S
Monument Security McClellan, Calif.
13
500
6
L
Anderson Security Agency Phoenix
11
327
N/A
S
# – Revenue estimated * – Full and part-time officers ** – Full time officers ## Acquisition of Security Forces came after data collection
Employee column – All firm employees including officers unless otherwise noted above Source – S for Security magazine; L for The Security Letter
This unofficial matrix, based in part on voluntary responses to Security magazine, also includes data from other sources. Security magazine does not purport data to be a complete list or one that is up to date relative to 2011 data provided or to reflect correct or changing conditions, actual revenue and employee staffing levels. Security magazine thanks The Security Letter and Robert McCrie for his published data from his June 2011 issue. Subscriptions at The Security Letter, 166 East 96th Street, New York, NY 10128. If your firm wants to be listed or to update this listing, e-mail Security magazine at
[email protected].
22
February 2012 • SECURITY • SecurityMagazine.com
Say Hello to Virtual Security Officers or many, it may make business sense to look at virtual patrols, virtual escorts and virtual interventions as a complement or replacement of security officers. The technology is there. And so is VirSec Virtual Security, which, according to Thomas Hines, the firm’s senior director, is an option to applications ranging from critical infrastructure to vacant real estate. Through remote video monitoring, a virtual security officer can provide the efficiencies and other benefits of security technology while still maintaining human interaction. As more and more systems are integrated into single platforms and installation architecture continues to standardize on IP formats, a virtual security officer becomes a more powerful tool, according to Hines. The firm’s virtual operations center has the “look and feel of a UL listed central station,” adds Hines. “You can move to an electronic solution or a hybrid combo of human and electronics,” which includes high-end live video services. There can be great flexibility. “Take for example, 50 cameras in a facility.” An enterprise security leader “can select hours and circumstances with cameras patrolling certain places with triggers that can include analytics or just policies and procedures,” adds Hines.
F
Securing Your World
manpower. technology. innovation.
G4S HELPS YOU MITIGATE RISK, MANAGE COSTS AND MAINTAIN COMPLIANCE Only G4S integrates manpower and the latest security technologies into a truly comprehensive and cohesive security solution. And that’s not just any manpower – it’s industry-proven core expertise in manned security. Now seamlessly combined with analysis and design capabilities, the latest security technologies and business intelligence that traditional guard services simply don’t offer and technology companies alone can’t provide. That’s G4S innovation. 800.275.8305 • 561.622.5656 www.g4s.com/us •
[email protected] SPECIAL REPORT and moves coming up, extra personnel, contractors coming and going and new property developments,” points out McEvoy, who advises that measuring security and contract security officers in dollars alone doesn’t do justice to close relationships and shared goals. There are complexities to a perfect fit between an enterprise and its contract guarding firm. For example, “the complexity of the logistical needs associated with servicing an industry leader such as CONSOL Energy requires that G4S develop and maintain security solutions designed to complement their unique footprint. CONSOL’s locations are not your typical street addresses; our support teams find their sites using longitude and latitude coordinates,” says Malcolm Burchett, regional vice president, Mid-Atlantic Region, G4S Secure Solutions (USA). He adds, “Contingency planning must always be current to match the weather conditions and safety needs. Our training programs, recruitment methods and infrastructure enable us to meet CONSOL’s needs at any of their locations.” Awhile back, CONSOL Energy had a diversity of firms supplying security guarding service across myriad facilities in at least six states. “Wherever we have a coal mining facility, whether active or closed, security is there,” explains McEvoy. So the secu-
rity director went with a single source. And beyond the decision, one another important one was the choice of a project manager provided by G4S. That person proved one key to success. “We identified the need for a project manager for day to day operations, setting the example, acting as my day to day contact,” adds McEvoy. Security officers are continuously trained to help meet Mine Safety and Health Administration or MSHA compliance needs. MSHA is part of the U.S. Department of Labor. In the gas operations, there is security presence for active drill rigs. And there are also marine, river and dock facilities to keep secure.
Constant Focus on Training So training is a crucial element for both the enterprise and the service provider. “For CONSOL Energy, we customized a specific training program through our North American Training Institute that provides strict compliance regarding certifications and education for the energy industry within each area of safety and security,” says Ray Brock, general manager of G4S Pittsburgh’s area office. The program’s strict guidelines require all security personnel to attend classroom instruction for a predetermined number of hours, receive extensive on-site training and meet all of
Dan Taylor mans the communications center, at the heart of CONSOL Energy’s blending of security technology with security officers.
the necessary certifications such as MSHA, MARSEC and TWIC. To ensure continued compliance, all ongoing training and recertification requirements are tracked and maintained by G4S instructors. There also is training on behavioral-based safety programs that focus on creating safer work environments for all employees. When it comes to safety, compliance and workplace violence issues, certain security officers are trained as responders, thanks to special training, special clothing and gear. And that is reinforced by strong, constant communication. As highlighted by clients, there is a definite need to provide real-time incident management, business intelligence reporting and analytics. So “the constant communication between CONSOL Energy management and G4S ensures the highest levels of proactive security management. Setting benchmarks and measuring results are also keys to maintaining the highest
Unique Officer Challenges at Sports Events hile Super Bowl XLVI this month ends the National Football League season, earlier some NFL venues tested increased security procedures primarily aimed at screening incoming fans in anticipation of the NFL’s evolving security recommendations. Fans entering designated gates were asked to remove all metal from their pockets and hold the items in their hands as they underwent screening. The procedure will eventually replace the pat down process. The program creates a more comprehensive screening process and a safer stadium environment, according to NFL security officials. It’s a goal that Lou Marciani Ed. D, director of the National Center for Spectator Sports Safety and Security (NCS4) at the University of Southern Mississippi, sees as valuable. More involved screening “will take a little longer” but at sports venues, big and little, “it’s safety first,” adds Marciani. He points out that private security firms or the individual stadiums have their own security staff members and “many are part-time people. So it makes sense that the NFL has issued a best practices” set of recommendations that can also evolve and change with threats and concerns. Better fan traffic controls, quicker changes in the traffic patterns, and encouraging fans to enter the stadium earlier all can help the screeners. There also is better collaboration between
W
24
February 2012 • SECURITY • SecurityMagazine.com
There is a balance involving security officers at stadiums: Providing quick and convenient access into the venue and mitigating risk by providing a safe experience.
security and law enforcement at events as well as more effective communications among all of those staffed with security. “It also involves psychological aspects, reading the crowd, individuals and their mood,” he says, adding that technology may also play a greater role in secure stadium access control. One example: Qylur Security Systems has a comprehensive physical security solution including its Qylatron integrated checkpoint to enable venues to transition beyond manual bag checks and pat downs to objective screening methods.
Remote Guarding: Virtual Security in the Cloud Era FREE Webinar Register Now! February 22, 2012 | 2:00 p.m. ET The challenges of intermixing guards and technology has been an issue since…well… technology began. Guards, technology, or both?
Expert Speakers
The introduction of cloud-based services into the security industry has added a new dimension. What should I manage on-site & what should I manage via the cloud? What are my control, management & security issues? How will my IT department react? What are the potential cost savings?
Dan Moceri Co-Founder, Chairman, & Chief Executive Officer Convergint
Cloud-based security services (“Remote Guarding” or “Virtual Security”) include Remote Monitored Video, Remote Managed Access, and Hosted Security Services. Virtual Security provides interaction with on-site security guards, allowing redeployment to human-required tasks. In some applications it provides extensive guard reduction or elimination. The cost reductions can be significant. This presentation will take an informational approach to present these concepts to allow attendees to judge if Remote Guarding/Virtual Security should be part of their security program. Attend this webinar to learn: • How to Reduce your Cost thru Remote Guarding / Virtual Security • How Virtual Security Helps Address your Regulatory & Liability Issues • How to Implement Virtual Security at your Organization • What are the Control, Management & Security Issues • Working with your IT Department to Utilize Virtual Security
Thomas Hines, CPP, PSP Senior Director VirSec
B rou g h t to you by:
Convergint.com
VirSecServices.com
Register for FREE at webinars.securitymagazine.com! Can’t attend live? Register to receive the on-demand version.
SPECIAL REPORT quality program while managing expectations,” comments Burchett. Regarding security technologies, and depending on the location and needs, McEvoy uses security video, in real-time, tied to the Internet and for forensics; door and entrance access controls; motion detection tied to radio dispatch to mitigate theft risks; emergency communications; and other solutions. “Use of security technology and blending it with officers are crucial elements,” observes the security director.
Gene Faiella, G4S security supervisor, helps close the link between CONSOL Energy, Larry McEvoy, security officers and technology.
He also sees value in a mobile incident reporting system called Secure Trax, which officers use out in the field. Real-time information can come back into a Web portal. Officers have policies and procedures in the palm of their hand, according to McEvoy, who uses it for auditing events and identifying trends “so we can continually improve.” Security’s overall aim is for employees and visitors to be met with authority and kindness. When asked to share advice on how to evaluate a contract security officer firm, Larry McEvoy was plain spoken. “Look at values. Does the organization you are evaluating share your company’s beliefs and values?”
Sharing the Mission and Values When it’s a right fit, the mission and work of security officers can be a window into their client’s mission and values, too. “If you spend an hour inside our local Pittsburgh office, you would see the intense level of activity that takes place daily at the vast number of CONSOL Energy gas and mining operations in the Western Pennsylvania region,” says Kara D’Argenzio, 26
manager of business development for Pittsburgh’s area office, which provides CONSOL Energy physical security for an extensive geographic area that stretches from State College in the east, to the Pennsylvania/ Ohio border in the west and from Erie in the north to Clarksburg, W.V., in the south. So it is not surprising that security officers “have the ability to document and alert clients of incidents in real-time then transfer pertinent data into analytical software,” using Secure Trax mobile technology, among other tools, to help with everything the client needs to make strategic decisions about their security programs, according to D’Argenzio. Reflecting a closeness that includes technology, G4S is also working with CONSOL Energy to respond to local issues arising in areas of natural gas operations. “For example, we are deploying new traffic radar systems to help mitigate speeding issues arising from increased truck traffic,” points out D’Argenzio. It’s the new normal. “By expanding the role of security officers beyond conventional patrol duties, we have evolved our service offerings well beyond simply providing a ‘guard at the gate’ to include manpower, technology and innovation,” observes Levine. Across the country, security officers now monitor safety issues while collecting critical data and information specific to clients’ sites. Whether it’s a broken light, a compliance issue or a safety risk, officers are the new front line of safety and security. When it comes down to the bottom line, it comes down to the people themselves. For instance, “when we enter the recruitment phase of a program, we seek career minded individuals versus job minded employees,” says Brock.
Strong Background for Officers For CONSOL Energy, its security service focuses on finding personnel with strong military or law enforcement backgrounds. “Due to the nature of this client’s rural locations, we use several local and state job placement agencies, universities, VFWs and online employment sites. Traveling job fairs are held several times a week allowing us to reach and recruit qualified applicants within these rural areas. Rigorous application, screening and background process enable us to differentiate between good candidates and great recruits,” adds Brock. On the one hand, Mike Stratton, security manager for Honda of America Mfg. (HAM), shares McEvoy’s belief in a strong and deep relationship with his security officer provider and is responsible for a number
February 2012 • SECURITY • SecurityMagazine.com
of facilities. Stratton’s geography in Ohio covers Marysville, the first U.S.-based car assembly plant; Anna; and East Liberty, among other HAM locations. Stratton also expects his officers and provider to share his firm’s values, here expressed in the culture of Honda and shown off, in no small measure, through emphasis on respect, the concept of associates instead of employees and the ubiquitous Honda work uniform, which all associates wear on the job no matter their title. On the other hand, Stratton has differences at Honda as compared to CONSOL Energy. One big one: “About 18,000 to 20,000 people a day come and go from our plants,” he points out. Another: Stratton worked in a number of operations and safety positions during his 28 total years at Honda before his move into security about nine years ago. “Times have changed, the types of people, world events,” the Honda executive says. For example, a visitor when the plant opened in 1982 would be bug-eyed in today’s Marysville Auto Plant because of all the building and equipment changes, thanks in part to each associate’s involvement to use their experience and knowledge to improve their processes and plants. “Where are we and where are we going” is always the challenge, according to Stratton, who shares that with his officers and their firm, Acrux Security. If it’s a matter of values, it is also a matter of strategies. “Consistency is essential, especially when people are authorized onto our properties,” says Stratton, who made it a goal that access from plant to plant was consistent. “We do not deviate” and use cards and badges, cameras. It makes a difference. “We have had about 20 million [access] scans in the last three years.” And there also are thousands of contractors, too. So the close working relationship with Acrux pays off in numerous ways. Stratton has been able to reduce the total number of officers; but, at the same time, the officers have become more a part of the fabric of Honda of America Mfg. “They run our security systems so some had to become more technically able, “more IT savvy,” he comments. “You bring in a good vendor and let that vendor staff up. You share key performance indicators. But, it is understood that we are paying them to manage and execute the security plan. ”It’s a matter of accountability and our culture insists that everyone is treated with respect, which has been part of doing security since the beginning.”
SPECIAL REPORT
Impacting the Entire Enterprise The relationship between Stratton and Acrux, built on mutual trust, can impact in many ways. When it comes to a service providing security officers, “you have to look at cost but it is not the top reason [for choosing or staying with a service].” The vendor must understand all the aspects of a company. This includes “executive protec-
tion, access control, responder responsibilities, investigations for theft, even executive travel,” says Stratton. One example: “With our new business in Mexico, an individual on the security team went to Mexico to determine certain [travel and temporary housing] needs.” Another example: “Manufacturing came to us” to help advise on installation of high-resolution cameras inside some new equipment
IS THIS YOUR LAST ISSUE OF ?
PERIODICALS
FINAL NOTICE! Maybe you’ve been busy and just haven’t found the time.....or perhaps you have simply overlooked our previous reminders. The point is, this will be your last opportunity to retain your valuable (yet still FREE) subscription to SECURITY. Don’t count yourself among the many that will be dropped from our subscription file soon. There’s four easy ways to renew - choose one and make sure you don’t miss a single issue - RENEW TODAY! 3. Complete and return this postage-paid form 1. Go to www.SecurityMagazine.com/febrenew 4. Fax completed form to 847-763-9538 2. Scan the QR code on this page with Microsoft Tag reader on your smartphone and complete the online form.
FREE RENEWAL CARD Signature (required)
Date
Name Title
Do you wish to receive: a FREE subscription to SECURITY magazine? YES R No R the FREE SECURITY eNewsletter?* YES R No R the FREE “Today’s Systems Integrator” eNewsletter?* YES R No R Please check the preferred format for your FREE subscription to SECURITY: *Email address must be provided. Print Version RDigital Version* (via email) R
A Work Phone Work Fax s By providing your fax number, you’re giving SDM/BNP Media permission to fax to you E-Mail Address
What is your title? (check only one) 03 T IT/Network/Network Security Management: including CIO, CISO, IRM, VP, Director, Manager or Senior Staff 04 T Facilities/Operations Management: including VP, Director, Manager or Supervisor 98 T Other (please specify)
01 T Security/Loss Prevention Management: including CSO (Chief Security Officer), Vice President, Director, Manager, or Supervisor of Security 02 T Executive Management: including CEO, CFO, COO, President, Officer, Partner, Owner, Vice President, General Manager
s9OUWILLRECEIVESUBSCRIPTIONANDRENEWALNOTICESFROM".0-EDIAVIAE MAIL
B
What is your company’s primary type of business at this location? (check only one) 09 T Industrial/Manufacturing 10 T Banking/Finance/Insurance 11 T Casino/Hotel/Arenas/Entertainment 12 T Retail/Restaurant/Foodservice 13 T Security Systems Integrator 14 T Security Management/Consulting 15 T Architectural/Engineering/Contract Firm 16 T Security Dealer/Distributor 17 T Security Products Manufacturer 18 T Security Service 98 T Other (please specify)
01 T Utility/Power/Gas/Nuclear/Water 02 T Information Technology/ Communications 03 T Airports 04 T Transportation/Logistics/ Distribution/Warehousing 05 T Construction/Real Estate/Property Management 06 T Education/University/School/ Library/Museum 07 T Health Care/Hospital/Medical Center 19 T Government 20 T Correctional Facilities
C
Which of the following security products, systems and/or services do you recommend, specify or buy? (check all that apply) 08 T Fire/Life Safety 09 T Communications/Monitoring 10 T Business Continuity, Crisis/Disaster Management 11 T Perimeter/Outdoor Detection 12 T Guard/Office Services/Supplies 13 T Consulting (such as integrators, consultants, engineers, architects, specifiers) 14 T Investigation/Screening 99 T None of the Above
01 T Video/CCTV/Surveillance 02 T Hardware/Lock Access Controls 03 T Electronic Access Controls/Biometrics 15 T IP Security Systems 04 T ID Cards, Badge Printers, ID Software 40 T Security Cloud Computing 05 T Computer/Network/Transaction/Intellectual Property Security 06 T Integrated Systems/Convergence 07 T Burglar Alarm/Intrusion Detection
D
What is the approximate value of the security products/services your firm will recommend, specify or buy in the next 12 months? (check only one)
That will be the case if you received a renewal reminder (pictured left) on this issue and don’t respond soon.
26 T More than $25 Million 25 T $10 Million to $25 Million 24 T $5 Million to $10 Million 23 T $1 Million to $5 Million 22 T $250,000 to $1 Million 21 T $100,000 to $250,000 20 T Less than $100,000
Please take a minute to complete and return the form to retain your spot on our circulation file. OR scan the QR code with your smartphone or go to www.SecurityMagazine.com/febrenew to fill out an online form. Renew online at www.SecurityMagazine.com/febrenew, fax to 847/763-9538 or return this postage-paid form via mail.
Whatever works for you. Just act NOW to ensure you keep getting your FREE subscription to Security !
28
February 2012 • SECURITY • SecurityMagazine.com
It takes a partnership to make a success when an enterprise depends on contracted security officers. There is a strong partnership between Mike Stratton, seated, who is Honda of America Mfg.’s security manager, and Christopher Prickett, Acrux’s president and CEO. Photo by Leana Woehler.
for operation and not security needs. Stratton firmly believes that the bottom line key to a successful relationship between his company’s security needs and a provider of officers is “surround yourself with lots of good people.” At Acrux, Christopher Prickett, its president and CEO, says that more of his current and potential clients are seeking a “one stop shop” approach for a diversity of services as well as a source of officers that goes beyond the typical in terms of training and certification. “We also staff receptionists and mail sorting for HAM.” A sister business to Acrux, Surmount Solutions Group “is our technology folks” for dispatch and tech gear. Overall, however, “you have to listen to the client, understand his or her corporate culture,” Prickett adds, and who sees it as a good thing when a client asks for details about how much support they will get and how often he will visit. “We are the face of the client company.” Sanford Siegel, director of loss prevention operations for GameStop, the nationwide retailer of computer and console video games, both used and new, has a unique challenge and solution to physical security at the smaller standalone and in-mall stores. Where security officers may not be costeffective, Siegel uses a remote service that can look in and even talk with sales associates at a given location thanks to the use of a service from iVerify and Honeywell security cameras. “We are dedicated to protecting the well-being of customers and employees and really care about providing the best and safest shopping experience.”
A. B. C. D.
COMPETITOR PARTNER FIRED EMPLOYEE CONTRACTOR
With our Visitor Management System you’ll know who is in your building. And why. f(QWHUSULVHFODVVYLVLWRUUHJLVWUDWLRQWUDFNLQJ UHSRUWLQJDQGEDGJHSULQWLQJ f:HEEDVHGSUHUHJLVWUDWLRQE\HPSOR\HHV f7LJKWLQWHJUDWLRQZLWKRYHUPDMRUDFFHVV FRQWUROV\VWHPV f(PSOR\HHDQGFRQWUDFWRUWLPHDQGDWWHQGDQFH f6FDODEOHIURPDVLQJOHV\VWHPWRKXQGUHGVZLWK FHQWUDOL]HGDGPLQLVWUDWLRQ f$IIRUGDEOHHDV\WRLQVWDOODQGHDV\WRXVH
6FDQHDFKYLVLWRUV,'DXWRPDWLFDOO\DQGSULQWD FXVWRPL]HGEDGJHLQVHFRQGVRUOHVV 7KRXVDQGVRIFXVWRPHUVZRUOGZLGHKDYHUHSODFHG WKHLUSDSHUJXHVWORJZLWK(DV\/REE\WRLPSURYH WKHLUVHFXULW\DQGPDQDJHYLVLWRUVPRUHSURIHVVLRQDOO\
Contact us today for a FREE Web Demo Phone: 781-455-8558 Email:
[email protected] Online: www.easylobby.com
an HID Global business
The Global Leader in Secure Visitor Management Systems
LEADERSHIP & MANAGEMENT
The Joint Venture and Security’s Role By Jill Knesek, Contributing Writer ack in October, I was speaking as part of a panel discussion when someone asked about the role security issues should play when an organization is entering into a joint venture. It’s an interesting question and an area where I’ve had some experience. With economic conditions being what they are today, we’re seeing more Jill Knesek companies wanting to rapidly enhance their portfolio or geographic footprint. And many are looking to joint ventures to expand their businesses to meet the demands of the market. But there is always a cost associated with this type of a business decision. Usually, company executives are more focused on the potential revenue growth associated with joint ventures, rather than the increased risk inherent when joining two or more companies together. So it falls to the CSO to ensure that the security risks are properly measured and articulated to the C-level suite so that a proper and informed decision can be made.
B
Understanding Security Risks, Regulations and Legislation For any joint venture exploration, it’s important that the CSO becomes involved as early as possible in the due diligence process. Risks associated with a data breach or a network compromise can have a severe impact on the company and stockholder value as well as on the level of trust the organization enjoys in the industry. Therefore, it’s prudent to assess the level of security risk associated with any joint venture so that a proper valuation is made and any investment required to bring the JV’s security measures up to the appropriate levels is factored into the decision. 30
Equally important is to thoroughly understand the regulations and legislation associated with the joint venture based on the company’s geographic location or industry. Regulatory and legislative factors can often result in increased security requirements around Data Protection, Data Retention and Lawful Intercept, depending on the business or industry, and may require uplifts and investments to satisfy. But, let’s be honest: in most cases, the JV will go forward, with or without the endorsement of the CSO; so once the formation of the JV is complete, there are important decisions to be made and actions to be taken that can mitigate the security risks identified.
Priority One -- Data Protection Regardless of the industry, data protection should be your first “port-of-call,” as this is usually the most valuable asset of a company and also the one that can cause the most risk if not properly managed. Even though we have seen the erosion of the perimeter, it is still critical to view security from the outside in to ensure a company has layers of defense to protect its key assets, which, in most settings, will be personal and/or customer data. The areas I generally focus on in these situations start with ensuring that security policies regarding laptops and mobile devices are sound and compliance is at appropriate levels, as this is probably the weakest link in the chain. It is also important to understand whether personally-owned devices are allowed within the business environment, and if so, that appropriate security policies are established, well-communicated throughout the organization, and are enforced. Access to company data from such devices can increase risk and exposure since there may not be adequate security tools available or installed on the devices.
Multi-Layered Defense Strategies The next layer to evaluate includes networks and systems. Understanding the
February 2012 • SECURITY • SecurityMagazine.com
security policies in place as well as how compliance is monitored and enforced is necessary to adequately measure the level of security. Any good security department will have a mature process for monitoring and measuring compliance and will be happy to share their metrics. Third-party audits and/ or certifications can be very useful in determining how a company’s security profile measures up against your own, so be sure to review these as well; but keep in mind that not all auditors are equal. Remember the motto of most security organizations – “trust but verify.” The third layer to examine is physical security. I recommend reviewing the physical security policies associated with the company’s offices and data centers as this will provide a more comprehensive view of how seriously the company considers security. It’s fairly easy to take a quick walking tour of a building to look for security video, access controls, intruder detection, protection of windows and doors; and you can readily determine whether there is manned or mobile guarding provided at the company’s key sites. Let’s be honest – if you can get physical access to a network device or system, you can own it, no matter how effective the system’s security controls. The final layer for me is around security awareness and training – a company with a good security culture will have much better success in thwarting an attack than one that relies solely on technology and their security team. I consider a good security awareness and training program to be a force amplifier. Why rely on a small department of security professionals when you can enlist the help of the entire organization to be your eyes and ears across the company? Even if employees aren’t able to stop a data breach or network compromise, they will be much faster to alert the security team if they see or hear about a threat. And we all know how critical early detection can be to minimize the impact of an attack. Once you’ve completed your review of
What can
37,000+ professionals security
do for you?
Join ASIS and SAVE $100
on any classroom program, webinar, or global conference!
Successful security practitioners are ahead of the curve on security management best practices, emerging technologies, innovative solutions, and industry standards and guidelines. As a member of the world’s largest association for security management professionals, you will be too.
Put the power of ASIS to work for you. High-caliber Networking + Actionable Information + Global Insights Impressive Industry Credentials + Unparalleled Education
View the many benefits of membership online: www.asisonline.org/joinnow or call +1.703.519.6200. Don’t Go It Alone. Get Connected Today.
LEADERSHIP & MANAGEMENT the company’s security layers of defense, it is important to determine how they measure up against your own – and then determine what areas need the most attention. But before you can put together and implement a proper remediation plan, there are some key decisions to make with the organizational design to ensure a smooth and amicable relationship is formed between the different security teams.
from each company report into a single CSO. This will at least ensure that both teams’ strategies are aligned as well as their policies and procedures. It will also encourage cross-pollination of knowledge and
The biggest pitfall to avoid is creating an environment where turf battles begin to rage.
Maximize Success In a best-case scenario, the teams will merge to form a single security organization that brings together the expertise from all sides to work together and uplift the security across the JV to the highest standard possible. But for this to truly occur and succeed, a similar merging of the IT departments needs to take place so the infrastructure is merged and any lines of demarcation between the companies are removed. Otherwise, the security team will be hindered by its inability to secure all of the devices across the JV. But let’s face it – a joint venture is not an acquisition, so merging departments or infrastructure is highly unlikely. The second best option is to have the security teams
expertise, resulting in more effective security practices in the long run. The biggest pitfall to avoid is creating an environment where turf battles begin to rage. In my experience, when a department or organization becomes territorial, they can single-handedly introduce delays into any program through protectionism and paranoia. Obviously, this is never a good thing and can completely undermine the good intention of any joint venture. Creating an open and collaborative environment where all ideas and innovations
are entertained will go a long way to foster a cooperative attitude where teamwork is rewarded and territorial battles are quickly diffused and disciplined. And remember, attitude starts at the top – employees will mimic the actions of their leadership, so ensure you set the right example from Day One and encourage your management team to do the same. Merging people, processes and technologies can be challenging, but if done properly with the right focus on risk management and a collaborative team environment – where everyone is given opportunities for knowledge enhancement and career advancement – a joint venture can result in a stronger and more robust security practice. It stands to reason that if two heads are better than one, then two security teams should also be stronger and more effective than one. About the Author: Jill Knesek, Chief Security Officer, BT Global Services, is responsible for all security matters globally for BT, including Strategy, Security Policy & Compliance, Physical Security, Information Security, Travel Security, Regulatory Compliance and Investigations.
IDenticard ® revolutionizes the way Access Control is managed today. Access Management · Lock, unlock, or lock-out any individual or group of doors · Run history reports on system events · Acknowledge and clear system alarms
Visit www.identicard.com/premisysdemo to download a free video demo 121 1211-093ID 12 2 21
800.233.0298 www.IDenticard.com 32
February 2012 • SECURITY • SecurityMagazine.com
ideas for life
The new face of surveillance technology. Introducing i-PRO SmartHD. Panasonic i-PRO SmartHD™ cameras can instantly enhance and detect individuals’ faces the moment they step into your facility. Employing the latest innovations in HD face detection technology, i-PRO SmartHD cameras* seamlessly integrate with our NV200 NVR to match stored faces with real-time video, and alert you when unauthorized individuals come into view. They’re also ideal see more for visitor management applications and to identify frequent with your customers. Any way you view it, Panasonic i-PRO SmartHD smartphone cameras are changing the face of surveillance technology. * WV-SP306 supports face matching
Panasonic System Networks Company of America
Surveillance, Monitoring & Video Imaging panasonic.com/security
Next Generation
Leadership & Management
SECURITY LEADER
Risk at High Velocity
I
n last month’s column, we argued that the next generation of security leaders will be challenged more than previous leaders to run their function as a business; they will be expected to align with the organization and build value through security. As they work toward these goals, they will also be faced with new risks, some of which have the potential to escalate at a stunning pace. For example, communication on the Internet has been a boon to business, but it has created an online environment that can be dangerous to corporate reputations. Consumers, employees and often partners habitually share opinions and information through social media and viral posts to popular sites, which can turn a single person’s comment one day into a media firestorm the next. By Marleah Blades At the time of this writing, news has recently broken that actor Alec Baldwin was kicked off an American Airlines flight for reportedly verbally abusing the flight crew after refusing to turn off his phone when asked. It’s interesting to note that within 30 minutes of Baldwin’s first notorious tweet about the incident, AA had tweeted a response stating they were looking into the incident, and within 24 hours their Facebook page had been updated with a refutation of Baldwin’s version of the events and a defense of AA’s actions. The book is still open on the incident, but at the moment it looks like Baldwin may have come out the worse in this fight. Not all companies are able to deflect socially driven bad press in the same way. The damage that harmful YouTube videos, tweets, or Facebook comments can do to an organization’s stock price can add up to millions of dollars in brand equity, and how these incidents are handled can either minimize or maximize that damage. Of course, it will not do to focus on newer threats like online security while neglecting the basics. Burgeoning security leaders must remember that physical security remains critical in managing risk, and the increased value of information actually makes physical protection even more important than before in many cases. Information – intellectual property as well as private employee and customer data – is a high-dollar asset in itself. When the assets on which information resides are compromised, the damage is therefore compounded. The healthcare industry may serve as a telling example. Privacy Rights Clearinghouse data recently showed that more publicly disclosed data breaches occur in the medical industry than in any other, and most of those are due not to hacking, but to loss or theft of portable data devices. The next generation security leader must be prepared to protect information and brand from cyber threats and physical threats to information assets. 34
February 2012 • SECURITY • SecurityMagazine.com
Protecting not only information but the enterprise at large will also require a solid strategy for preparedness and resilience. “Brand confidence and loyalty are intrinsically tied to responsibility before a crisis,” says Francis D’Addario, emeritus faculty member of the Security Executive Council and former vice president of Partner and Asset Protection for Starbucks Coffee. D’Addario evangelizes for security leaders to build preparedness and crisis management capabilities by, among other things, enhancing the social responsibility initiatives of the organization. A company’s investment in social responsibility in the good times, enabled by strong security and risk
Brand confidence and loyalty are intrinsically tied to responsibility before a crisis. management, allows the CEO to stand in front of the media and the community after a disaster and say with sincerity that the company cares about the community and is truly doing all it can to help. There is significant intangible value to that kind of sincerity, according to D’Addario. Building local alliances and attending to global preparedness guidelines and regulations is also critical. Numerous partnerships and partnership organizations have arisen to assist individual communities in developing preparedness and response plans that leverage the resources and knowledge base of both the public and private sectors to better protect communities and the businesses that reside in them. Threats and risks will continue to pick up speed, and the next generation of security leaders will need to be quick enough to build security functions that can match them – functions that rely on solid protection strategy as a foundation for nimble, resourceful and creative response. About the Author: Marleah Blades is senior editor for the Security Executive Council, a leading problem-solving research and services organization focused on helping businesses effectively manage and mitigate risk. To learn about becoming involved, or to offer comments or questions about Next Generation Security leadership, e-mail
[email protected] or visit https://www.securityexecutivecouncil.com/sm. You can also follow the Council on Facebook and Twitter.
SCAN TO RENEW It’s time to renew your FREE subscription to Security. Scan this image with the Microsoft Tag Reader on your smartphone or go to www.SecurityMagazine.com/renew
If you want to go far,
go together I’ve learned that security is a pretty serious business. Every day, you are challenged by things that, if you faced them alone, would seem insurmountable. But…get a good team working with you and anything’s possible. For an integrator like me, there’s no better team to work with than Software House. They offer me tons of support, and they push me pretty hard to master some pretty complex stuff. New standards, new technologies, new techniques. In the end, I know my customers appreciate that; because of my knowledge and training, they can entrust their critical security to me. Me and Software House. Together, we’re taking security to another level.
go far, together.
w w w.swh o us e.co m © 2012 Tyco International Ltd and its Respective Companies. All Rights Reserved.
INTEGRATED SOLUTIONS: VIDEO SURVEILLANCE
Megapixels Can Business-Dazzle, Too By Bill Zalud, Editor Emeritus o what if Jose Ruano and Steve Weatherly were “blown away,” in Weatherly’s own words, by megapixel cameras. But that wasn’t really justification for a hard-nosed business decision when it came to a next generation of security video tech-
S
majors and programs. While the university had maintained video surveillance for a number of years, Ruano says that, as with decentralized higher education institutions as well as corporations that grow, merge and acquire, “we had so many legacy analog systems” that “we were looking to bring it all together into a unified system that we could manage in a centralized manner.”
ducted extensive research and identified the top technology candidates with whom they wanted to conduct more extensive discussions. “When I first saw a demo of an IQeye megapixel camera, I was blown away at the quality compared to analog,” says Weatherly. But, it turned out that the decision to go megapixel was as much a matter of practical infrastructure and lower cost.
Megapixel cameras should be a business decision and the kind of camera depends on location and the reasons why it is needed there.
The Texas Department of Aging and Disability Services project is one of the largest, all-megapixel camera installations in the world. More than 3,200 cameras were installed in 336 different buildings, on 12 separate campuses, over the span of just one year.
nology at the University of Miami, located in Coral Gables in south Florida. Instead, Ruano, executive director of IT security, like other enterprise security leaders, walked through a series of realizations that lead to installation of more than 350 megapixel cameras throughout his main campus in order to create a safer environment for students, staff and visitors. A private research university with more than 15,000 students, it comprises 12 schools and colleges serving undergraduate and graduate students in more than 180 36
Too Many Myriad Systems It turned out that campus police, responsible for monitoring video and investigating any incidents, had an additional and unwanted challenge when maneuvering among the many disparate systems. In order to move to that single unified design, Ruano and colleague Weatherly, senior security engineer, knew there was need to upgrade to IP. “It was much more economical to upgrade our cameras and run them over the IP network than laying coax,” recalls Weatherly. Both men con-
February 2012 • SECURITY • SecurityMagazine.com
Those factors, on a decidedly larger scale, played a role when the Texas Department of Aging and Disability Services (DADS) elected to deploy 3,200 H.264 megapixel cameras at 336 of its DADS locations. There was also the encouragement that came from the Texas Legislature which, in 2009, required that video surveillance equipment be installed in all DADS facilities to detect and prevent the exploitation or abuse of residents and clients. According to Chris Hugman, vice president at Knight Security, the project’s integrator, the DADS installation, started in January 2010, uses IQinVision HD megapixel cameras, OnSSI video management software, network switches, and off-shelf servers to provide an interactive video monitoring interface. For the 12 separate
avigilon.com
CAPTURE IT WITH CLARITY
Get unprecedented image detail and never miss a thing with Avigilon’s end-to-end surveillance solutions. From shoplifters to potential false liability claims, you can now capture it all in high-definition. The Avigilon Control Center software featuring High-Definition Stream Management (HDSM) technology combined with the broadest range of megapixel cameras (from 1 - 29 MP) provides superior details while requiring minimal bandwidth and storage. Our software allows you to search and view an incident in seconds, along with the ability to link HD surveillance footage with transaction data to help reduce shrinkage and theft. With Avigilon on your side, you will always get the best evidence.
INTEGRATED SOLUTIONS: VIDEO SURVEILLANCE campuses, housing multiple buildings, an end-to-end network infrastructure with 35 miles of fiber optic cable connects all the buildings together on each campus.
Cost Savings and Quality Images The megapixel approach, adds Hugman, achieved the agency’s security goals, including high-quality images, while saving the state money in terms of number of cameras needed and in installation and long-term maintenance costs. The DADS project is one of the largest, all-megapixel camera installations in the world. By going megapixel, DADS installed substantially fewer cameras compared to standard definition cameras, and still covered more area in each building. In so many ways, according to Hugman, “this was not a standard security operation.” A crucial need is “to monitor the quality of care.” When it comes to liability issues, forensics and the ability to zoom in on specific areas, such functionality plays a key role. More generally, when an enterprise security leader works with his or her integrator, “you just have to pick the right camera for the right shot at the right location,” Hugman adds. And select the right video management platform at the start, one that more easily can scale up as the number of megapixel cameras grow. It’s also an ever changing environment at the University of Miami. The university has more than 400 cameras installed and approximately 90 percent of them are megapixels, often placed where image quality is critical for identification purposes such as in parking lots and areas that typically have a high density of students. Campus police conduct regular auditing to identify so-called high crime areas. Cameras are then moved or new ones installed to address these more pressing needs.
Megapixel cameras in Taiwan’s Hsing Tian Kong Temple guard visitor handbags from theft and allow security to better identify perpetrators.
Megapixel cameras are catching on worldwide due to a number of factors, including the need for higher quality images for real-time monitoring and forensics; but the biggest trend spurring the migration from analog to digital video is networking. The evolution impacts numerous applications. Take the transportation industry, for example. That transition is forecast to drive growth of over seven percent for the mobile video surveillance equipment market in trains, streetcars, and light rail over the next five years, according to Great Britain-based IMS Research. Says IMS report author Oliver Philippou, “The train industry is predicted to adopt network video surveillance equipment at a much quicker rate than other transport markets such as police cars and transit buses. In fact, the network camera market
in trains and streetcars is forecast to grow at over 20 percent over the next five years.” Mobility also can play a role in venues that don’t necessarily move.
Remote Viewing of Megapixel Cameras A Dublin, Ireland, McDonald’s restaurant recently deployed megapixel cameras because of the image quality both day and night, ease of use of the smart client user interface, but also the ability of store management to log on remotely via a virtual private network. No doubt, megapixel cameras are becoming more popular for use in retail and restaurant environments as owners realize the quality of images they can attain from IP. With an IP network security solution each camera can be adjusted for best performance including frame rates, motion detec-
1-2-3s of Megapixels megapixel, fixed network camera can be used in one of two ways: It can enable viewers to see greater details in a higher resolution image, which would be helpful in identifying people and objects, or it can be used to cover a larger part of a scene if the image resolution is kept the same as a nonmegapixel camera. Megapixel cameras today are normally less light sensitive than a non-megapixel network camera. The higher resolution video streams generated by a megapixel camera also put higher demands on the network bandwidth and storage space for recordings, although this can be mitigated by using certain
A
38
February 2012 • SECURITY • SecurityMagazine.com
compression standards. According to James Marcella of Axis Communications, HD is an overarching term that basically means greater than 540 TV lines. The HDTV standard is 1080i and p and 720p with frame rate 30 fps, and a 16x9 aspect ratio. He adds that most end users “are more than happy with 720p.” Color rendition also is important. Megapixel is only a number, says Marcella, and more megapixels do not necessarily mean more picture quality. The lens determines quality, too. When a lens cannot resolve down to a single pixel, it can limit resolution. Marcella advises that, for cameras more than five megapixels, it’s best to use photography-grade lenses.
I I Warren B VP Product Management
Listening is an art. Sometimes reading between the lines of a customer’s requirements leads to ground-breaking solutions. That’s my challenge, and it’s my promise. To help customers move forward, and make their systems run better, smarter, faster. That’s the power of American Dynamics. That’s dynamic vision.
G\QDPLFYLVLRQKLSP]LYLK w w w. a m e r i c a n d y n a m i c s . n e t 7\FR,QWHUQDWLRQDO/WGDQGLWV5HVSHFWLYH&RPSDQLHV$OO5LJKWV5HVHUYHG
NATIONAL SPORTS SAFETY AND SECURITY
CONFERENCE 2012 & EXHIBITION JULY 31-AUGUST 2
NEW ORLEANS
BRIDGING THE GAP BETWEEN SAFETY AND SECURITY NCS4 holds the annual National Sports Safety and Security Conference and Exhibition, which focuses solely on the sports safety and security industry. The gathering of top SURIHVVLRQDOVLQWKH¿HOGZLOOSURYLGHDZKROHVRPHHQYLURQPHQWGHGLFDWHGWRVHFXULW\ VDIHW\WHFKQRORJLHVSURGXFWVVHUYLFHVDQGHGXFDWLRQIRUVDIHJXDUGLQJWKHDVVHWVDQG spectators we are charged to protect. W W W.NCS4.COM/CO N FEREN CE | 601.266.6183
AA/EOE/ADAI
65675.5193 10.11
INTEGRATED SOLUTIONS: VIDEO SURVEILLANCE suggested the need to enhance an existing analog video system. Specifically, visitors to the temple tended to leave their handbags under the table as they prayed, and the bags were often stolen.
More Emphasis on Identification For the University of Miami, image quality was a critical selling point, according to Jose Ruano. “We’ve had several instances in which the police get a screen shot or a video clip from the camera from 20, 30, even 40 feet away and you can see the face, you can ID that person.”
tion sensitivity, and privacy masking. While McDonald’s to some is a temple of good fast food, there is another temple, this one in Taipei, Taiwan, which aims more philosophically and religiously at the basic concept of harmony. And the Hsing Tian Kong Temple, uniquely, is devoted to Kuan Yu, the patron of businessmen. The popular Taoist temple is relatively new – it was constructed in 1967 – and is located on a street corner near the center of the country’s capital city, occupying more than 75,000 square feet. The temple’s huge number of visitors
Power-over-Ethernet provides electricity to Arecont Vision five and two megapixel video cameras along the network with-
is not always better, according to Raul Calderon of Arecont Vision. “Look at return on investment. Ask yourself what you are trying to accomplish” with each camera. Calderon and other experts suggest care should be taken concerning lenses when megapixel count goes up over, say, five megapixels. “Security video lens providers are tooling up their optics, getting newer technology coming from the machine vision area,” says Calderon.
Megapixel is only a number, and more megapixels do not necessarily mean more picture quality. out requiring a separate power connection, which simplified installation. The use of digital video encoders enabled the system to preserve the temple’s previous investment in analog cameras, which are now tied into the networked system. Overall, high definition acts as a standards base with megapixel cameras providing more than that baseline. But bigger
Andy Stadler, business development for Security Partners, a remote guarding/integrator company, sees two megapixel as his type of the standard. You have to also consider the right type of storage as well as the ensuring that the network in place can handle the traffic, says Stadler, who advices to avoid the “touch and wow” and concentrate on the business purpose.
A new standard for HD IP cameras.
presenting
The Illustra 600 Series HD IP cameras deliver the four essential qualities of an IP camera: exceptional video quality, easy installation, open platform, and reduced cost. So you see important details clearly, in all lighting conditions. Illustra is the camera you need today and for the future. That’s a promise from American Dynamics, and the power of dynamic vision.
600 resolution refined installability redefined www.ame r ic a n dyn a mic s . n e t
SecurityMagazine.com • SECURITY • February 2012
41
Surveillance Strategies
The “16x Growth” Business of Ultra High-Definition Surveillance
I
n today’s surveillance market we exceedingly judge ourselves by the number of megapixels of a camera. However, when trying to display all of those pixels the reality gets lost. This didn’t stop Avigilon from recently announcing plans for their 29MP camera, and it became apparent that our market is going to continue to run toward megapixel technology regardless of the practical usage. This has some practical business issues. Without hardware technology partners that make Ultra HD displays, workstations, video adapter cards and software, there is no real way to take advantage of these high-end cameras. The industry certainly has figured out the benefits for standard 1080p HD cameras; however, it is still struggling to manage large-scale environments. What is exciting is By Keven Marier that including the ecosystem partners’ with 16x multiplier of pixels equates to a 16x multiplier of the system cost.
cal $2,500 cost today. This is a massive growth multiple that is already starting to impact the surveillance market today. Already, A&E specifications are calling for UHDTV video walls using super high-end LCD/LED displays or projection systems.
GPU Software Integration Detailed In order to make UHDTV a reality the entire video management software industry will need to rewrite their software to include the use of specialized processors, called Graphics Processing Units or GPU’s. These processors, when combined
Ultra High-Definition Defined The Ultra High Definition TV standard (sometimes referred to as UHDTV, Ultra HDTV, Super Hi-Vision, 8K or 4320p) is 7680 (H) x 4320 (V) or 33.1 MP and is roughly the same as IMAX. It is going to land someplace above 30 FPS with some in the TV industry thinking as high as 60 FPS. Where the surveillance industry has typically followed the display industry with resolution, the industry is notorious for not following the other aspects of the specifications such as FPS, color and contrast, to name a few. However, resolution is how we measure ourselves, so we are getting close. Time will tell what technology will be used to make the UHDTV market commercially viable.
WQXGA Workstations Designed Today’s best surveillance displays used in high-end workstations can run at WQXGA, which is 2560 (H) x 1600 (V) and has 4 MP of display power. These 30” displays typically will cost more than $1,500 each and require a special video adapter that cost an additional $500 to take advantage of the full display resolution. To drive more than one display you need to know how to build high-end workstations, as all aspects of the workstation have to be engineered including the motherboard, PCI slots, power, cooling and cable management. A single workstation plus four WQXGA displays can easily run more than $20,000 and have the capability of displaying 16 million pixels of raw video. However, this still displays only half of the 33.1 MP of Ultra High Definition. To achieve that 33.1 MP, the cost would then be at $40,000, and this is 16 times beyond the typi42
February 2012 • SECURITY • SecurityMagazine.com
with CPU’s, can take the computationally intensive part of an application and accelerate it by offloading the work to a GPU, which would reside on a specialized video card adapter. For example, video management client software would have to be rewritten to allow the workstation’s CPU to handle the sequential part of the application and send all of the high-end graphics work to the GPU. Milestone was one of the first to develop a partnership with a GPU manufacturer by the name of Matrox and supported up to 16 channels of 1080p HD. Axxonsoft developed an integration with Nvidia also supporting a similar number of channels. These types of integrations will continue to evolve as the market looks to support Ultra High-Definition surveillance cameras. This will drive massive growth measured in pixels, bits, bytes and more importantly, dollars for the industry. All of this ecosystem growth will need to happen before we get to “Ultra High-Definition Evidence.” About the Columnist: Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.
With thousands of installer ready Intransa appliances already sold, we’re better than ever Simple • Affordable • Reliable • Powerful • Energy Saving • Patented Video and Data Management & Retention™ (VDMR™) software technology in every appliance simplifies installation, reduces equipment, slashes electrical consumption, and improves recording & playback reliability • Modular appliances supporting risk-free integration from choice of hundreds of jointly certified security applications & products, with more than 3 dozen of the best available as preloads for near instant activation • Affordable for small projects, yet scalable enough for the largest and most demanding video surveillance, video analytics, access control & PSIM deployments
Intransa, the VideoAppliance™ Company 10710 N Tantau Avenue, Cupertino, CA 95014 USA www.intransa.com • intransablog.com •
[email protected] 866.446.8726 (toll free) • +1.408.678.8600 (international)
Get Into Access & ID
Core Security Values: Do You Have Them?
I
’ve written previously about the need to embrace our corporate or institutional culture and the language of business into enterprise physical security. All too often, we practical folks engaged in the day-to-day operations of our departments dismiss these concepts as superfluous or mere hoops to jump through to please some higher authority. As I’ve been known to preach about, regularly, is the need to market our services to our customers, both internal and external. One “corporate speak” method of marketing our work with the value added benefit of guiding our decision making is in the form of value statements. By Joel Jensen I won’t attempt to write a primer on writing value statements here. There are numerous sources of information available for doing that. Simply put, a value statement is an expression of your core beliefs. They can be as simple as words to the effect of, customer service is job one. That would be too simple of a statement in our business, in my opinion, but I hope that you get the idea. These are typically expressed along with mission statements and the like. Again, I won’t go into all of that here. What I will go into is this: put yourself in the place of someone who uses their card to access spaces in your facility and/or one who enters through a staffed ID checkpoint. What would you value? If you can’t envision too many examples, just ask a few of your customers who use these services. Here’s something along the lines of what I’ve found: users want convenience, simplicity and virtually invisible access to where they need to go. I’m sure that you know this too. By invisible, I’m referring to something I was told decades ago by a security director, which is “Security should be like oxygen. No one notices it until it’s gone.” This is likely not original, but it is certainly applicable in about a hundred different applications in our day-to-day work. The typical users have no interest in the nuts and bolts of access and ID and likely little concern for your operational challenges to providing those services – so keep it out of your values! Yes, separate operations from values. Values shall guide us operationally and not the other way around – I know, it’s heresy to many of us. Here’s an example or two of where to start some simple values statements where I was advised to start. In access control, it is the security access control department’s responsibility to provide the most convenient form of access to employee workspaces. In ID checkpoints, it is the security department’s responsibility to provide fast and friendly entry through ID checkpoints to our valued customers and visitors. Yes, it’s that simple. Does this seem obvious to you? It did to me; however, I carried a value statement similar to these and visited a few places in my span of
44
February 2012 • SECURITY • SecurityMagazine.com
control. The results were both interesting and valuable. But is it really simple? It’s very simple to establish values based on principles of convenience, courtesy and prompt service. Of course, delivering those services is another matter; you know I get that, but what a great place to start! Get your staff together for an informal meeting about access controls. Write your mission statement on the board, or use something like this, “…to provide a safe and secure environment for our…” business, research, classes,
as appropriate for your operation. Then, proceed to throw out concepts such as providing the most convenient form of access, fast and friendly entrance to areas and see where it leads. Keep the discussions general at first and avoid drilling down to operational needs. Yet, be sure to keep note of operational needs during such conversations for the next steps. What are the next steps? If you’re not sure, keep reading this column. My best wishes to all of my colleagues in the security enterprise for a successful and prosperous 2012! About the Columnist: Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.
SCAN TO RENEW It’s time to renew your FREE subscription to Security. Scan this image with the Microsoft Tag Reader on your smartphone or go to www.SecurityMagazine.com/renew
WHAT SECURITY DEMANDS, DATACARD ID SYSTEMS DELIVER. ®
Whatever you need for a secure ID card program, you can get it from a Datacard® system. Datacard offers ID card printers, software and supplies — plus 40 years of experience and the support of authorized Datacard providers worldwide. To contact a provider near you, call +1.800.621.6972 or visit datacard.com/id. Datacard is a registered trademark and/or service mark of DataCard Corporation in the United States and/or other countries. ©2011 DataCard Corporation. All rights reserved.
Zalud Report
As Consumer Electronics Go, So Goes Security Tech
T
By Bill
he biggest advances in electronic security, in the past, came after World War II and the Vietnam War. No doubt, homeland security efforts and America’s involvement in Iraq and Afghanistan have also spurred technology advances. However, what happens in consumer electronics is more influential to the technology and pricing when it comes to enterprise security solutions. For example, consumer camcorders with their breakthrough CCD chips brought a new level of technology to security video as well as a more reasonable buy-in. Advanced use of near field communication chips in smartphones, more recently, allows people to open secured doors with the wave of their phone. And then there are sensors. Zalud, Editor Emeritus
Sensors Go Everywhere According to Shawn DuBravac, chief economist and director of research for the Consumer Electronics Association (CEA), it’s the “sensorization of things, we are building devices with more sen-
In homes and in corporate security video systems, there is evolution to bring smarter and more multipurpose solutions.
sors” in myriad devices or around them. For example, Kinect is a “plastic box of sensors.” There are ski goggles with built in sensors that can record every ski run you take, he says. But, expect office buildings and plants to also employ more sensors that learn movement and patterns and can alert to abnormal routines, he says. Overall, says DuBravac, the biggest trends at the Consumer Electronics Show 2012 center on the presence of computer power in non-computing devices; interfaces and the evolution of devices back to simplification; and the prevalence of customization and personalization. Sound familiar? Security cameras are becoming more computer savvy with 46
February 2012 • SECURITY • SecurityMagazine.com
analytics, processing power, compression and storage at the edge. Integration, which interfaces subsystems in intelligent ways, works best when an operator can simply get actionable information. And, according to security system integrators, designing solutions that reflect the enterprise, its mission and culture is essential. Then there are portable and pocketable devices. In 2011, there were more than 100 tablets at CES launched, along with a “plethora of smartphones.” DuBravac says this year was even stronger with more phones and tablets than in any prior year. Such consumer advances match what is happening on an enterprise security level as executives and their staff members see value in using smartphones, tablets, and laptops to receive alarms, view video and interact remotely with their systems.
TVs Get Smarter Of course, there are some streets that go the other way. Security, in many applications, has already integrated video into the Internet, the cloud and with various other business needs. In last month’s CES in Las Vegas, among trends, it was apparent that so-called smart TVs will be behaving like computers. Ironically, DuBravac and others believe that today, and into the future, bedazzling technology will start retreating into the background as simplicity makes more business sense. “Technology hidden from the user will provide a more seamless experience,” says DuBravac. Take, for example, the “wireless leash” for mobile phones, introduced at CES 2012, which leverages Bluetooth technology to summon immediate assistance from a personal safety service or corporate security and from a trusted network of people – all with the single touch of a button. When connected, the solution may contact the user’s pre-selected, trusted network of friends, family What was displayed at the Consumer and health professionals, and Electronics Show last month, in varyprovide status updates of the ing degrees, will impact and influence emergency via a phone call, enterprise security applications. SMS or e-mail. What’s happening here and in other tech examples is that there continues to be a shift from employer to employee, from school administrator to student, from healthcare security to patient as technology enables the true end users to provide a level of security and work more closely with others. Everyone has a security role to play and emerging technology makes it so. The times they are a’changing. There is a valuable window to this emerging world as technology from the consumer side impacts enterprise security.
Scan this Microsoft® Tag using your mobile phone. Download the free mobile app at http://gettag.mobi
Access Control Goes Deeper Deeper into your facility, that is. Aperio wireless locks expand the access control footprint in your facility by protecting “medium-security” doors cost-effectively, using the existing platforms you trust. Want to get immersed in the details? Visit us at ISC West Booth #11065, or scan the tag above! Technology Partners:
www.intelligentopenings.com ADAMS RITE | HES | MEDECO | SARGENT
Captures Quality Facial Images Capturing quality facial images is important, particularly in businesses that are monitoring places like cash registers, entrances, and teller lines. The Illustra 600 camera line has the ability to detect a face and increase the bit rate around it, without cropping out important background images. This unique handling of “regions of interest” allows the camera to save on bandwidth and storage costs. The e auto-focus feature allows you to control the image and automatically lly focus on the area required, without ut having to go to the site of the camera, a, stand on a ladder, or open the housing of the he camera. This saves time and money and iss easily done with the click of a mouse. In addition, ion, the outdoor camera has a Theia wide angle gle lens option that provides ultra clear views and d avoids “barreldistortion”, especially at the fartherr angles of an image where events can easily take ke place. Find out more at www.americandynamics.net s.net
Simplifies Retrofits Propping open a door can defeat the whole security system, but some hesitate to install a wired alarm because of the electrical connection requirements. The battery powered door-propped alarm from Detex Corporation is a practical solution that’s especially useful in retrofitting situations because it saves money as well as space. The product can be field-set for door-open times ranging from one second to two minutes, with a 15-second default. A 100-decibel alarm alerts employees, then silences when the door is closed so there is no waiting for a key-holder to arrive. A 9-volt battery with low battery/LED alert powers the alarm. Weatherized models are available for outside doors. Find out more at www.detex.com
48
February 2012 • SECURITY • SecurityMagazine.com
It’s the all-in-one megapixel solution… for all. Our new MegaView™ Series Megapixel Cameras bring mainstream video surveillance applications clearly into view. Arecont Vision’s all-in-one design combines the outstanding resolution of megapixel imaging with the efficiency of H.264 compression, IR LED Array Illumination with Day/Night operation for use in complete darkness, and weatherproof IP66 rated, vandal resistant bullet-style housings. Plus all the performance features you demand like programmable motion detection, privacy masking, unrestricted image cropping and so much more. Available in four sensor types, the MegaView™ Series cameras are made in the USA and include the 1.3-megapixel AV1125, 1080p AV2125, 3-megapixel AV3125 1-877-CAMERA8 • 1-818-937-0700
[email protected] and 5-megapixel AV5125. They’re the all-in-one arecontvision.com megapixel solutions for all. MADE IN THE USA
Industry Innovations Eliminates Need for Separate Intrusion Detection System When used with Symmetry Homeland V7 and the latest generation ation of M2150 hardware, the Javelin family of keypad/display readers delivers access control and intrusion management functionss through one easy-to-use terminal. Authorized users present their eir card at the reader to disarm the area behind the door and unlock ck the door. Access can be controlled based on intrusion status and nd authorized card holder permissions. The combined system provides des simplified administration, enhanced security and eliminates the need for a separate intrusion detection system. The Javelin LCD D graphical display verifies card acceptance or rejection, and can prompt for a user’s PIN to verify command functions. Access conontrol and intrusion messaging such as PIN prompts, door information ation and intrusion area alarm status is displayed using configurable text, icons and user friendly graphical images. The keypad and reader er are backlit for ease of use and provide the power saving option to reduce the lighting levels when the reader is not in use. An onboard Wiegand iegand Interface allows a separate external reader to be connected to support additional card technologies such as barcode, magnetic strip, rip, or HID iCLASS®. This capability allows you to create a custom multiultitechnology portal by combining a legacy reader of your choice with the appropriate state-of-the-art Javelin model, thereby helping to smooth mooth out the process of transitioning a population to a new card technology. hnology. This capability does not require an additional reader port on the e panel, and works with both access control and intrusion functions. Find out more at www.amag.com
Provides Sto Storage Capacity for Critical Business Archives Bu In today’s eco economy, it’s more important than ever for businesses to protect their valuable data and busine be cost efficient. The SentrySafe Guardian Storage Box provides value for the safe storSto age of critical business archives. Two Guardian Storage Stora Boxes are 80-percent lighter than a standard two-drawer fire file due to lightweight stand insulation technology. The Guardian Storage Box insula holds both letter and legal-sized documents; has basic fire f protection that is ETL Verified for 20 minutes minute fire protection at 1200ºF /649ºC; and ETL Ve Verified spray resistant for protection from water. L Latches secure the lid in place to keep valuables valuable safe from environmental damage, and units are stackable up to three units high to provide a convenie convenient storage solution when space is limited. When stacked stacked, the Guardian Storage Box still guards against fire and wa water damage. Find out more at www.Sentr www.SentrySafe.com
50
February 2012 • SECURITY • SecurityMagazine SecurityMagazine.com com
Accommodates the Needs of Smaller Businesses According to statistics from the Small Business Administration (SBA,) there are nearly 27.5 million small businesses in the United States alone. These small businesses face security concerns similar to those of larger companies, but can be constrained by smaller budgets and a lack of dedicated security staff. As a result, small businesses are looking for affordable, easy-to-use HD surveillance systems. The Avigilon Control Center Core addresses the requirements of small businesses
by offering a complete system for reviewing live and recorded HD images that includes one network video recorder, control center core software, and up to 16 HD cameras. The system accommodates conventional and PTZ analog cameras, as well as a broad range of third-party IP cameras and encoders, enabling a budget-conscious migration to HD. It also provides simple and intuitive user interface for full control over surveillance video playback to quickly retrieve evidence. Find out more at www.avigilon.com
SecurityMagazine.com • SECURITY • February 2012
51
Industry Innovations - Video Management Systems
Provides Easy Management of HD Video
Reduces Installation Time and Cost
This recording station appliance from Bosch manages an entire surveillance infrastructure, and is perfect for banks, retail environments, schools, gas stations, and any installation spread over multiple locations. It combines a network video recorder server, storage array, client workstation and video management software — for a cost of ownership that is up to 45-percent lower than traditional PC-based recording solutions. The appliance is simple to install, set-up and operate, requiring no certification or special training. Connect the product and IP cameras to the network, configure using the installation wizard and the system begins recording automatically. The system integrates with fire and access panels, ATM and POS terminals, as well as license plate capture and video content analysis solutions. It is available as both stand-alone, all-in-one tower PCs and as rack-mounted server units, and comes pre-licensed for eight IP cameras. Find out more at www.boschsecurity.us
The Universal Storage Solution or USS from DVTel is a high-reliability server and storage solution that reduces the
52
February 2012 • SECURITY • SecurityMagazine.com
amount of space required and the planning and installation time, all of which result in an improvement in the total cost of ownership. The USS is pre-installed with the Latitude NVMS (Network Video Management System) or the Solus VMS. In addition to the video management software, preinstalled diagnostic tools help with the management of the total system and provide a way to resolve any technical challenges. Find out more at www.dvtel.com
“While the industry continues to position technology as simply a commodity, SecurityXchange reminds us that manufacturing partners play a critical role in the success of systems integrators and the customers they serve. The productivity at SecutiyXchange is unparalleled.” TONY VARCO VICE PRESIDENT CONVERGINT TECHNOLOGIES
SecurityXchange
August 12-15, 2012 The Lodges at Deer Valley Park City, Utah To find out how to get on the invitation list call 952-224-7616 or visit www.verticalxchange.net/security-xchange
Industry Innovations - Video Management Systems
Conducts Quick Analysis of Recorded Events Vicon’s 4-channel H.264 network encoder converts analog camera inputs (both NTSC/EIA and PAL/CCIR) into streamed IP video data. The museum search feature allows you to conduct quick analysis of recorded events, as well as dynamic load balancing and automatic detection, are provided when the device is used as part of a ViconNet Video Management System (VMS). Full PTZ control, alarm reporting, picture quality configuration, external sensors, macros and alarm configurations are supported. Find out more at www.vicon-security.com
Improves Security Processes OnSSI’s Ocularis software based IP video surveillance and security platform seamlessly connects and improves security processes and makes up for the limits of human capacity. The product features combine multiple alarms into meaningful events with filtering and conditioning mechanisms that substantially reduce false alerts. This improves security, requiring fewer operators watching screens. Find out more at www.onssi.com
54
February 2012 • SECURITY • SecurityMagazine.com
FREE
Are you a owner, president, executive or technical management at an installation, dealer, integrator, distributor and monitoring company? Do you work in security, loss prevention, corporate, facilities or IT? Are you interested in learning the latest trends in everything from monitoring, cyber security, identity management and more?
You are invited to attend THE virtual event for the security industry! Thursday, March 8, 2012 10:00 am - 4:00 pm ET Presented by
Event Sponsor
The Security Universe at Your Fingertips
www.iSecurityTradeshow.com Attend these LIVE presentations, includes a Q&A with the presenter! 10:30 – 11:30 am ET Security Channel in 2012: Best Opportunities & Greatest Challenges Laura Stepanek Editor, SDM magazine | smartHOME
12:30- 1:30 pm ET Preparing a Violence Prevention Plan with New OSHA Approach
s Meet contacts from all over the globe: suppliers from monitoring to surveillance and everything in between will be represented s Network via Group or Private chat with peers s Download whitepapers, product videos, brochures s Get show discounts and win prizes s No travel or registration fees so your whole team can attend sNo time spent out of the office s Can’t make it? Register anyway, the archive will be available!
W. Barry Nixon Executive Director, National Institute for Prevention of Workplace Violence
2:30 – 3:30 pm ET SECURITY 500 LIVE: What Are The Top 10 Trends Driving Enterprise Security? Mark McCourt Publisher, Security Magazine
Exhibitors: Association Partners:
Sponsor iSecurity 2012!
Last year’s attendees said: “I could quickly move from booth to booth to look for new technology,” “I liked the ability to ask questions in an open forum or private chat. With quick response,” “The interaction was very cool. I love this setup.”
REGISTER NOW! SARAH GORAJEK Online Events Manager SDM/Security Magazine (248) 786-1671
[email protected] Industry Innovations Software Provides Solutions for Enterprise Functions The OneFacility software suite from G4S Security Solutions can increase site security as well as support audit and compliance mandates for commercial real estate buildings, manufacturing facilities and corporate, healthcare and higher education campuses. OneFacility eliminates manual, paper-based tasks and automates more than two dozen functions – from incident reporting to visitor management and freight reservations – enabling real-time, interactive communication throughout the enterprise. Available as a web-based “hosted” solution, it is a toolkit of software applications to simplify interactions and communications among property management, tenants, security, engineering, leasing agents and vendors. Find out more at www.g4s.com
Operates in Severe Outdoor Conditions Functions within this camera can extend the camera’s operating ranges to -30 degrees Celsius, without the need for supplemental heating, allowing them to function in extreme conditions. In addition, VideoIQ’s iCVR dome cameras store video in up to 500GB of onboard storage for months worth of recording while reducing network traffic and bandwidth consumption by more than 90 percent. Additionally, VideoIQ’s adaptive analytics never need calibrating, eliminating the need to manually tune or adjust the analytics over the life of the device, which reduces installation and maintenance costs. Find out more at www.videoiq.com
Withstands Harsh Environments Through press pressurized dome housing, the Siqura camera line ensure ensures airtight protection aga against excessive moisture, moistu dirt, and pollution. This makes the cameras ideal for cam situations such as situ seaports and highsea way tunnels, where tu corrosive elements in the atmosphere can impede the atmospher performance of a surveillance system. The pressurized PTZ dome cameras have an IP67 Ingress Protection rating and the housing is constructed of materials designed to withstand intense levels of solar heat (945VA UV protected). Pressurizing the housing, particularly with inert nitrogen gas, prevents moisture, pollution and dust from damaging the camera. Find out more at www.siqura.com 56
February 2012 • SECURITY • SecurityMagazine.com
Provides Visitor Management ment Security with Identification on Authentication Here’s a way to eliminate the use of counterfeit documents and false identities to surreptitiously enter facilities. EasyLobby has partnered with AssureTec Technologies to offer AssureTec’s ID authentication system as part of EasyLobby’s suite of visitor solutions, ons, allowing users to scan driver’s licenses for authenticity and accurately capture the information ormation and the photo. The AssureTec ID-150 product is capable of reading both sides of a driver’s license simultaneously and automatically comparing the data on the magnetic strip or 2D barcode on the back of the license and the information on the front. It extracts all available data fields, as well as the photo, and within seconds runs multiple forensic tests specific to that license. All current issue and most previous issue licenses are supported from all U.S. states, Canadian provinces and many licenses from around the world. Find out more at www.easylobby.com
HOW DO YOU PREVENT
TERRORISM? SECURITY…DETECTION…PROTECTION = PREVENTION At Counter Terror Expo US you’ll find technology, tools, solutions, and networking opportunities to secure your facilities, information, and assets from those who intend to do harm. Leaders in security—cyber, physical, facilities, corporate, borders, and more—from both the public and private sectors are coming together to hear keynote speakers such as former director of the National Counterterrorism Center, Michael Leiter. In addition, they’ll learn from topic experts who will be leading probing discussions on securing and managing our borders, critical infrastructure protection, transportation security, cyber counterterrorism, and more. High-end security technology and products from cutting-edge companies will be available to demo and compare side by side so you can see firsthand how they may impact your security initiatives.
Register today at www.counterterrorUS.com. Expo-only registration is FREE. Use this priority code when registering: SM22
Industry Innovations Manages Key Distribution The KeyWatcher Touch is a key control and management system that targets enterprise-level applications as well as smaller applications and KeyWatcher TrueTouch is the accompanying software, designed to run all programming, remote functions and reports. The product is engineered around a new CPU board with a built-in SD card slot, USB connectivity 10/100 Ethernet and audio output jack. Features include a 7” touchscreen on the front panel, access via anoptical fingerprint reader and card reader (complete with alarm and access control integration capability), as well as larger on-screen buttons and an easier to use interface that offers step by step instructions. Keys available for access can be called up on the screen and “My Keys Out” and “Find Key” are additional new operations that provides you with the location of a specified key, which keys have not been returned and when the key will become overdue. KeyWatcher TrueTouch software offers control and manage-
ment of the system including programming, remote functions and reporting with the server as the primary interface for the client software and database maintenance. Find out more at www.morsewatchman.com
Elegant and Low Cost Lobby Security Eleg Ide for hallway entrance control applications, the Mini-Optical optical turnstile from Ideal Smarter Security Systems is an attractive option for buildings looking to automate access Sm control on a smaller budget. The barrier-free turnstile restricts access where security staff co can respond by alarming unauthorized entry attempts. Microprocessor-based intelligence combines with infrared beams to discriminate between human traffic and inanimate object com to m minimize false alarms. At 4 inches wide by 8.4 inches long, the small pedestals can be placed place in hallways to secure passage ahead of sensitive areas such as SCIFs. An available floor p protector simplifies hallway installation, and unlike others, it can be mounted to the walls of a h hallway for a more elegant installation. LED indicator lights at the top and bottom of each pedestal clearly communicate the lane status to users and to security staff to assist in detainpedest ing intr intruders. Find out more at www.smartersecurity.com/entry-security/mini-optical
Improves ID Card Issuance Programs Schools require fast card printing, efficient operation and high print quality from their card printers. The Datacard® SD360™ two-sided card printer can help primary and secondary schools keep registration lines short and ID operations moving smooth-ly through user-friendly, highly productive operation. Key features of the printer include anti-jam card handling for reliable operation and color matching that produces vibrant images and d logos, as well as crisp, bleed-free bar codes and text. The card printer also can help meet environmental commitments through h increased energy efficiency and eco-friendly features, such as biodegradable ribbon supply cores and recyclable packaging. Find out more at www.datacard.com 58
February 2012 • SECURITY • SecurityMagazine.com
TRUST IN RESEARCH
www.clearseasresearch.com
Education & Training
New Steps in Combating Mexican Drug Trafficking Organizations By Dean C. Alexander, Contributing Writer
T
he U.S. government continues to face a momentous, transnational threat: Mexican drug trafficking organizations (MDTOs). Mexico’s capacity to combat MDTOs, coupled with the U.S. adeptness to assist in that vein, will have significant implications for both countries and beyond and security overall. In terms of strategic importance, Mexico is a principal trade and investment partner of the United States, with the nations
sharing a 2,000-mile border. Intra-, interMDTO violence and the MDTO-Mexican government conflict undermine Mexico’s role as a key U.S. economic and regional security partner while, simultaneously, devastating Mexican stability. The nearly 43,000 drug-connected deaths occurring since President Calderon came to power in December 2006 are, at minimum, harbingers of the growing fragility in Mexico. MDTOs have also killed Mexican military, law enforcement, judges, politicians, journalists and civilian targets. In doing so, they appear to have morphed into hybrid criminal-terrorist organizations As MDTOlinked violence has grown increasingly
ferocious – including beheadings, public hangings and torture – fear has been injected into the Mexican populace. MDTOs are heavily armed with arsenals comprising grenades, rocket-launchers and rudimentary, tank-like vehicles. The ramifications of such belligerence include the spurring of legal and illegal migration from the Aztec nation to the U.S. as well as spillover violence along the U.S.-Mexico border and beyond. As Rodney Benson, Chief of Intelligence at the U.S. Drug Enforcement Administration concurred in October 2011, “[T]he violent actions and corruptive influence of DTOs” threaten Mexican security. So much so that Mexico has even been characterized as a failing or failed state, although, this description – at least for now – appears to be overly pessimistic. In 2011, Mexican President Felipe Calderon stated that his country was “facing terrorists.” Likewise, according to various U.S. government officials, including U.S. Secretary of State Hillary Clinton, the MDTO-induced violence plaguing Mexico is akin to insurgent activities. While terrorism and insurgency are not synonymous, with latter signifying higher levels of violence and potency, among other attributes, neither connotes tranquility. By whatever measure, MDTOs have instilled instability in the region. The expansive drug-connected corruption prevalent at all levels of the Mexican government, particularly in Mexican state and municipal law police, further hampers the future of Mexico. For instance, Mexico’s Deputy Attorney General was on the take of MDTOs, at a clip of some $500,000 per month. Too, the economic and political power appended to the multi-billion dollar drug trade cannot be underestimated as it pervades and injects dysfunctional elements throughout Mexican society. Confirming the ubiquity of MDTOs’ reach is the fact that nearly 450,000 Mexicans earn a living through the drug trade. Incidentally, least we forget, U.S. voracious consumption of illegal drugs is partly responsible for the potency of MDTOs.
SecurityMagazine.com • SECURITY • February 2012
61
Education & Training The 2011 National Drug Threat Assessment reported that MDTOs operate in 1,000 U.S. cities despite being headquartered in Mexico. Moreover, MDTOs are in control of the U.S. distribution of most of the heroin, marijuana and methamphetamines trade. Also, Mexico is the principal transport route for cocaine entering the United States. In addition to drug trafficking, MDTOs are involved in other criminal activity, including money laundering, human smuggling, trafficking in persons, weapons trafficking (mostly from the U.S. to Mexico), prostitution, extortion, kidnapping, intellectual property theft and cyber crime. Against this backdrop, in 2011 several U.S. congressmen, led by Rep. Michael McCaul (R-Texas), supported legislation that would designate six Mexican drug trafficking organizations (MDTOs) – Gulf Cartel/New Federation, Sinaloa Cartel, Los Zetas Cartel, Arellano Felix Organization, La Familia Michoacana and the Beltran Leyva Organization – as foreign terrorism organizations (FTOs) under U.S. law. The U.S. State Department’s September 2011 list enumerates 49 FTOs, including several Colombian hybrid terrorist-drug trafficking organizations. For designation as an FTO, the organization must be: foreign; engage in terrorist activity, terrorism, or have the capacity and intent to do so; and threaten U.S. nationals or U.S. national security, including U.S. national defense, foreign relations, or the economic interests. In 2010, the U.S. Department of Justice proffered that nearly half of the key international drug trafficking organizations are associated with terrorist groups. As articulated by former National Security Advisor General James Jones in October 2010, “This lethal nexus of organized crime, narco-trafficking, and terrorism is a threat that… all of us share and should be working together to combat.” By designating MDTOs as FTOs, additional legislative tools could be marshaled against MDTOs, including prohibiting the material support of MDTOs. As such, individuals, companies, or entities that are deemed to attempt, provide, conceal, or undertake material support to a MDTO could be penalized with up to life in prison and fines. Also, individuals receiving military-type training from or on behalf of a FTO can face up to 10 years in prison. In May 2011, Arizona Attorney General Tom Horne supported such designation, stating, “It makes an enhanced crime to supply aid to those organizations and that obviously would 62
be a very powerful tool in fighting them.” The material support statue has been very effective in prosecuting FTO (and nonFTO) connected terrorists. The extraterritorial reach of the material support statute against MDTOs and their abettors would complement existing U.S. laws targeting international drug-trafficking activities. FTO designation of MDTOs will heighten scrutiny of such entities and their facilitators here and abroad. Also, it might stimulate similar designations by North Atlantic Treaty Organization (NATO) and other countries, further impinging on the fortitude of MDTOs worldwide. Presently, some MDTOs are reported to have operations in West Africa.
The violent actions and corruptive influence of drug trafficking organizations threaten Mexican security. MDTOs and their leadership could likewise be classified under U.S. law as specially designated global terrorist entities (SDGTEs) and specially designated global terrorist individuals (SDGTIs). These classifications would expand the U.S. government’s capabilities to block the assets of MDTOs and their networks. Similarly, individuals affiliated with MDTOs could be placed on the terrorist exclusion lists (TEIs), which would prevent individuals affiliated with the organization to legally enter the United States. The application of the FTO framework to MDTOs would supplement the Foreign Narcotics Kingpin Designation Act (FNKDA), which denominates significant foreign narcotics traffickers as international criminals. FNKDA impairs foreign narcotics kingpin’s ability to legally conduct business with U.S. companies and persons. Various MDTO operatives have been classified under FNKDA. Currently, the Mexican government opposes calls for designating MDTOs as FTOs for many reasons, including internal politics, foreign relations, economic factors and public relations. In associating MDTOs with terrorism through their denomination as a FTOs, Mexico could become synonymous with narco-terrorists, at the very least. At worst,
February 2012 • SECURITY • SecurityMagazine.com
Mexico could be perceived as a narco-state. Given U.S. increasingly activist military forays against terrorists globally, Mexico also might fear that FTO designations could be an incipient step to the eventual initiation of U.S. military action against Mexico, in a new version of the “War on Terror”. The October 2011 revelations of a stymied Iranian government plot to assassinate the Saudi ambassador to the United States, that was to be outsourced to Los Zetas, demonstrates that the triggering of military intervention is potentially only one incident away. Clearly, new, serious responses are warranted in light of MDTOs’ determination to penetrate Mexican state institutions, expand corruption, undermine transparency and governance, weaken the rule of law and debilitate civil society. President Calderon has undertaken important steps to fight MDTOs, particularly using the Mexican military and federal law enforcement. To complement such efforts, the U.S. initiated the Merida Initiative in 2008 to aid Mexico (and Central American countries) to combat drug cartels and coordinate regional security. Under this framework, the U.S. is providing Mexican law enforcement, corrections professionals and military with enhanced training, equipment and data sharing in combating MDTOs. The U.S. Navy and Coast Guard are cooperating with Mexico in disparate counter-narcotics operations. Also, the U.S. has intensified U.S.-based law enforcement and intelligence activities at targeting MDTOs. So too, the denomination of MDTOs and their operatives on terrorist-related lists – FTOs, SDGTEs, SDGTIs and TIEs – would compound efforts to eviscerate MDTOs’ baleful activities in Mexico and the United States. These proposed legal initiatives are critical in combating MDTOs. More broadly, Mexico – as the United States – must concurrently undertake expansive, integrative efforts and reforms across political, judicial, economic, educational and social paradigms such that future hybrid terrorist-drug trafficking organizations will have difficulty establishing themselves in communities on either side of the border.
About the Author: Dean C. Alexander is director of the homeland security research program at Western Illinois University. He has published books on terrorism as well as the North American Free Trade Agreement. He trains law enforcement and military personnel on counterterrorism issues.
Be competitive at every stage of your career.
Organizations demand practitioners with proven knowledge and demonstrated skills for positions at all levels of security management—from the front line to the C-suite. As the standard of professional competency in security, ASIS board certification is an objective measurement employers look to and trust to distinguish one candidate from another when hiring or promoting. More than 3,500 organizations in 77 countries employ ASIS board-certified practitioners. As a Certified Protection Professional (CPP), Professional Certified Investigator (PCI), or Physical Security Professional (PSP), you will confidently convey credibility and position yourself to capitalize on expanded career options within the public and private sectors...across the country and around the globe. Apply for your CPP, PCI, or PSP online at www.asisonline.org/certification.
Accepted as the standard. Worldwide.
$
360 a year
$
30 a month
$
50 7. a week
$ 12
1. a day
helps provide a child like her with access to life-changing essentials — clean water, nutritious food, healthcare, education, and more — giving her hope for a better future.
Make a difference today by sponsoring one child. Visit: mission500.org/sponsorachild for details.
Register to participate in the Security 5K/2K at ISC West 2012 and learn how to set up your personalized sponsorship portal by visiting: mission500.org/Security5K
Advertiser
Page#
Website
Phone
AlliedBarton
5
www.AlliedBarton.com/SecurityInsights
866-825-5433
American Dynamics
39, 41
www.americandynamics.net
…
8[m\ik`j\ pfli gif[lZk fi j\im`Z\ Yp ZXcc`e^
Arecont
49
www.arecontvision.com
877-CAMERA8
ASIS International/Certifications
63
www.asisonline.org/certification
703-519-6200
ASIS International/Memberships
31
www.asisonline.org/joinnow
703-519-6200
ASSA ABLOY
47
www.intelligentopenings.com
…
Avigilon
37
www.avigilon.com
…
Axis Communications, Inc.
IFC
www.axis.com/iscwest
…
CBC (America) Corp.
7
www.computarganz.com
800-422-6707
Datacard Group
45
www.datacard.com/id
800-621-6972
Detex Corp.
9
www.detex.com
800-729-3839
Easy Lobby
29
www.easylobby.com
781-455-8558
G4S Security Solutions
23
www.g4s.com/us
800-275-8305
HEIDI FUSARO FU USARO
Gai-Tronics
27
www.gai-tronics.com
800-492-1212
HID Global Corporation
BC
www.hidglobal.com/unleash-Sec
…
Honeywell Security
15
www.honeywell.com/security
800-323-4576
Identicard Systems, Inc.
32
www.IDenticard.com
800-233-0298
Intransa
43
www.intransa.com
866-446-8726
fi ]Xo kf )+/$,')$(''/
Middle Atlantic Products
11
www.middleatlantic.com
800-266-7225
\dX`c1 ]ljXif_7Yegd\[`X%Zfd
NCS4
40
www.NCS4.com/conference
601-266-6183
Panasonic
33
www.panasonic.com/security
…
PCSC
IBC
www.1pcsc.com
800-899-PCSC
RS2 Technologies
18
www.rs2tech.com
877-682-3532
Samsung Techwin
12-13
www.samsung-security.com
877-213-1222
Security Door Controls
8
www.sdcsecurity.com
…
SecurityXchange
53
www.verticalxchange.net/security-xchange
952-224-7616
Siemens
17
www.usa.siemens.com/security
…
SightLogix
19
www.sightlogix.com/thermal
609-951-0008
Software House
35
www.swhouse.com
…
Speco Technologies
3
www.specotech.com/D4RS250
800-645-5516
T3 Motion
59
www.t3motion.com
714-619-3600
Xk -*'$,(/$,+.'
ON THE WEB at the NEW securitymagazine.com Social Media, Mobility and the Future of Security Convergence Twitter, Facebook, LinkedIn, and our always connected world – what opportunities do those mediums provide to security? Overcast but Clearing as the Cloud Comes to Security Hosted, managed, software as a service, video as a service, infrastructure as a service, in the cloud computing; it’s a confusing set of labels, features and potential sources. It’s the cloud, and by all accounts, it’s here to stay. ALL NEW & RedesignedKeep Up Through Security’s eNewsletter Bi-weekly – sign up at securitymagazine.com ALL NEW & RedesignedCheck Out Today’s System Integrator eNewsletter Bi-weekly – sign up at securitymagazine.com
This index is for the convenience of our readers. Every care is taken to make it accurate. Security Magazine assumes no responsibility for errors or omissions.
INDUSTRY CALENDAR March 13, 2012 – March 16, 2012 Governance, Risk & Compliance (GRC) 2012, MGM Grand Hotel & Casino, Las Vegas http://www.grc2012.com/ March 27, 2012 – March 30, 2012 ISC West 2012, Las Vegas, NV http://www.iscwest.com/ April 15-17, 2012 ASIS 11th European Security Conference & Exhibition, London, England https://www.asisonline.org/education/programs/london/default.htm SECURITY Volume 49, Issue 2 (ISSN 0890-8826) is published 12 times annually, monthly, by BNP Media II, L.L.C., 2401 W. Big Beaver Rd., Suite 700, Troy, MI 48084-3333. Telephone: (248) 362-3700, Fax: (248) 362-0317. No charge for subscriptions to qualified individuals. Annual rate for subscriptions to nonqualified individuals in the U.S.A.: $178.00 USD. Annual rate for subscriptions to nonqualified individuals in Canada: $216.00 USD (includes GST & postage); all other countries: $228.00 (int’l mail) payable in U.S. funds. Printed in the U.S.A. Copyright 2012, by BNP Media II, L.L.C. All rights reserved. The contents of this publication may not be reproduced in whole or in part without the consent of the publisher. The publisher is not responsible for product claims and representations. Periodicals Postage Paid at Troy, MI and at additional mailing offices. POSTMASTER: Send address changes to: SECURITY, P.O. Box 2144, Skokie, IL 60076. Canada Post: Publications Mail Agreement #40612608. GST account: 131263923. Send returns (Canada) to Pitney Bowes, P.O. Box 25542, London, ON, N6C 6B2. Change of address: Send old address label along with new address to SECURITY, P.O. Box 2144, Skokie, IL 60076. For single copies or back issues: contact Ann Kalb at (248) 244-6499 or
[email protected].
SecurityMagazine.com • SECURITY • February 2012
65
Security Talk
Keeper of the Security Team
E
van Dabby knows soccer. He also knows security. As Senior Director of Operations for Major League Soccer, he oversees security, game and medical operations and team travel for all MLS teams and venues. He is the stadium operations lead for MLS Special Events, such as the All-Star and Cup games. Here, Dabby shares his love of the sport and the security profession and his thoughts on his leadership skills.
How did your career in security begin? Why did you decide upon this profession? Like many, 9/11 changed my personal and professional life. I began my career as the MLS Operations Coordinator in 1998, when the League was in its infancy. Without a single soccer-specific By Diane Ritchey, Editor venue owned or operated by a club, the League outsourced security entirely. The impressive construction rate of soccer-specific venues (11 over the last 11 years), the recent spike of traveling supporters and the way the world changed after 9/11 provided me the opportunity to lead the League’s effort on safety and security. I am motivated by new challenges, and this certainly has been one of the greatest challenges of my career.
What do you like about your position? MLS’ growth continues to provide new challenges, and MLS leadership has allowed me to take on new responsibilities. In 2001, MLS was comprised of 10 clubs, and I learned to run game operations as a venue manager for nationally televised events such as our annual All-Star Game. In 2008, at the height of MLS stadium expansion, I led a working group of top professionals to create the MLS Venue Design Guide and MLS Training Site Design Guide to ensure that future venues facilitate the optimal game day experience for players, staff and fans. I enjoy overseeing team travel and sports medicine. Most recently, I’ve been exploring and developing supporter group relations, an area I expect will distinguish MLS from other leagues and entertainment products.
Whom in your organization do you respect and take time to interact with and why? I have been lucky to work with two remarkable supervisors. I worked with Ivan Gazidis, the MLS Deputy Commissioner, before he accepted a position as the Arsenal 66
February 2012 • SECURITY • SecurityMagazine.com
FC Chief Executive in 2009. From Ivan, I observed the importance of listening to learn and how to motivate personnel. I currently work with Nelson Rodriguez, MLS Executive Vice President of Competition and Game Operations. Nelson has impressive experience in coaching, broadcasting, human resources, operations, events and more. During each dialogue with him, I challenge myself to learn from his effective problem-solving skills and his ability to look at issues from all conceivable angles to ensure the best outcome.
What qualities do you have that you believe make you a leader? I consider my leadership approach modest and subtle. While I enjoy the spotlight from a job well done, I always share the credit with those around me, knowing that a successful task or event is rarely a solo effort. Showing proper respect to my colleagues is a priority.
What keeps you up at night? I worry about what I don’t know. Although I have great confidence in the individuals leading the security effort at our facilities, we cannot know the background of every person attending our games. Whether is it a patron who doesn’t understand our fan culture or an individual who intends to harm others, we necessarily lack knowledge about the fans coming through our gates. Accordingly, MLS is working to promote DHS’ brilliant “See Something Say Something” campaign at all games. Keeping events safe requires a constant process of evaluation, assessment, adjustment, training and vigilance by all participants…a total team effort. Evan Dabby
What do you like to do in your spare time?
My wife and I are lucky to have a two year old boy who finds a new way to entertain us every day. We spend our spare time chasing him, trying to match his energy and fulfilling his curiosity with the world. When I can, I also love playing basketball and football with friends. After playing competitive soccer for more than 10 years, the smaller courts and fields suit me just fine.
SCAN TO RENEW It’s time to renew your FREE subscription to Security. Scan this image with the Microsoft Tag Reader on your smartphone or go to www.SecurityMagazine.com/renew
Unleash your credential potential.
HID’s Secure Identity Object:
Introducing iCLASS SE™ with the Secure Identity Object (SIO) data model.
❚ Turns any device w/ NFC into a secure credential ❚ Works with all major smart cards ❚ Secure upgrades ease migration, extend life
Packed with security and technology-independent, new iCLASS SE lets you turn phones and virtually any other smart device into an ID card. L Learn about b SIO. hidglobal.com/sio or Scan this with a QR reader
iCLASS SE protects your identities with multiple layers of breach-resistant technology including a secure key management system. It’s also amazingly flexible — supporting MiFARE/DesFIRE, EV1 and Indala technologies as well as iCLASS®, while allowing any device enabled with our SIO data model to be turned into a secure credential. Pick your technology and program the credentials to create your ideal access control solution today — then reprogram your reader as your needs change down the road. Powerful, adaptable and designed to be energy efficient, iCLASS SE is truly the next generation in access control. To compare HID’s iCLASS® platform, visit hidglobal.com/unleash-Sec