Wireless Idesco Cardea System - IFSEC Awards Finalist!
Wireless Idesco Cardea System - IFSEC Awards Finalist!

The Cardea System from Idesco was short listed as a finalist in the Access Control Product of the year category at the 2009 IFSEC Security Industry Awards. Award winners are published on May 12 at the Award Gala of IFSEC 2009. Idesco Cardea System is a network of devices that communicate wirelessly. It is a new product family, and it enables building of open and scalable identification systems by wireless communication. The system shows its advantage in the form of fast, flexible and cost-effective installations. The wireless Cardea system frequently takes an estimated 40 minutes per door to install, compared with an average of seven hours for any wired solution. Faster installations mean cost savings for both system installers and end users. Wireless system is an optimal solution for an office environment where a cost effective and secure access control and time & attendance system is needed. A wireless system enables easy and cost-effective expansion of an existing access control system without the need of changing the existing system structure. It also makes it also possible to build solutions with two applications easily. For instance, an identification system with access control in an office environment and parking control on the parking lot outside the building can be easily implemented, using a wireless solution. Parking control outside the building can be connected to the same system with the office access control without the need of installing any - perhaps underground - cablings. A wireless identification system, built without cabling, brings RFID solutions to applications where RFID has not been utilised before. It makes it possible to build an identification system easily in places where it is not reasonable to install cablings. Some new and innovative, interesting application examples of a wireless system installation: Temporary access control systems on construction sites, events etc. Just take the system with you after the event and re-build it in another place. Small and compact solutions with few doors and few readers and a small group of users (an office environment or a shop with workers and carriers, all having access rights within the system). Harbours and other wide areas where there are a number of readers scattered around a large area and a cabling solution is impossible to carry out. Historic buildings and other sites in which cable installations are not the most optimal solution. Installation does not require opening of constructions, and without cabling the system is invisible. The Idesco Cardea system consists of separate devices, which can operate independently or form a network, i.e. an identification system. Cardea solution supports most used RFID technologies and customers don't have to replace their existing software or ID credentials. Connected to Idesco's new innovative Access Touch touch screen terminal with an RFID reader and a computer in the same device, Cardea system builds up a modern and intelligent method of collecting and analyzing identification data.  For more information please visit: www.idesco.fi/ or contact: info@idesco.fi Tel. +358-20-7434175

Add to Compare
Idesco® Innovates Again: Idesco EPC Reader Is Now Wireless And Secure
Idesco® Innovates Again: Idesco EPC Reader Is Now Wireless And Secure

With Idesco's redesigned wireless EPC reader you can create secure, cost-effective and user-friendly identification applications for vehicle identification (AVI), logistics systems, access control and even limited inventory control.  The Idesco® EPC Reader is a passive long-distance UHF RFID reader, compliant with European UHF (ultra-high frequency) standards. In its basic configuration, Idesco's EPC Reader employs an internal, circularly-polarized antenna for interrogating tags presented at any angle. However, this reader may also be configured with either an external antenna or both the internal and external antenna. When the EPC Reader is configured with two antennas, both may transmit and receive data/information simultaneously - or one antenna may be programmed to transmit while the other receives. True to form, Idesco's EPC reader is configurable to a variety of communication interfaces (e.g. Wiegand, RS232-485, Ethernet-IP67, 6LowPan, etc.) and with an enviable array of security options for easier integration into your existing system. The EPC Reader provides four I/O ports for addressing peripherals and is engineered to allow reliable deployment both indoors and outdoors. Additionally, Idesco® EPC tags can be customized with both EPC and MIFARE® enabling a single card to provide both vehicle and personal identification. Easy to install, the EPC Reader initiates polling automatically (by default) upon being powered up; it does not require polling commands to be entered first. However, it is also configurable to await an activating command from an external system. Some ideal deployments for the Idesco® EPC Reader include - but are not limited to - automatic vehicle identification (e.g. parking access control, toll tracking, entry gates, harbour moorings), logistics centers (pallet and case tracking), long distance access control (sequestered reader) and certain inventory control applications.

Add to Compare

Access control systems & kits - Expert commentary

Demand Increases For Specialist IT Skills Among Security System Integrators
Demand Increases For Specialist IT Skills Among Security System Integrators

How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.

Blending Physical Security With Convenience Is No Simple Task
Blending Physical Security With Convenience Is No Simple Task

Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’.  The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.

Home Monitoring At The Edge: Advanced Security In The Hands Of Consumers
Home Monitoring At The Edge: Advanced Security In The Hands Of Consumers

Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.

Latest Idesco news

Idesco, Viakoo Partner To Offer Video Monitoring Service
Idesco, Viakoo Partner To Offer Video Monitoring Service

Idesco partners with Viakoo to help customers eliminate missing video & keep an eye on their facility at all times Idesco Corp., a leading New York-based security systems integrator, recently announced it has partnered with Viakoo, an award-winning video surveillance network management company, to offer its customers reliable video monitoring that eliminates missing video and reduces video downtime. The Viakoo video management system provides the unique ability to automatically detect and diagnose any irregularities within the entire framework of a video surveillance system. The system will send alerts instantly when abnormalities in performance are detected, so immediate action can be taken to eliminate any downtime. In addition, Idesco customers will receive detailed reports with powerful performance indications to help stay informed on all video activity at their facility. “At Idesco, we strive to bring the latest security solutions to our customers to help them keep what mattes to them safe at all times.” says Michael Troiani, Service Manager at Idesco Corp. “We are thrilled to offer extra protection to our valued customers with up-to-the-minute information on any problems that may affect their video surveillance system. With this new partnership, Idesco will be able to provide added value to customers by monitoring their system and anticipating any potential issues.” Monitor Video System From Anywhere At Anytime Viakoo continuously examines an entire video network, from cameras at the edges through complex computing software and networking infrastructure, to the recording of hard disks at the core every 20 minutes. Viakoo then correlates all that diagnostic data and performs predictive analytics to identify problems before they start. While ensuring continuous video surveillance system operation, Viakoo effectively eliminates 100% of informational truck rolls and reduces troubleshooting time by 80%, providing significant cost reductions. Customers now have the option to have Idesco monitor their video system from anywhere at anytime. This add-on solution is not only easy-to-use and effective, but extremely affordable to implement and can be accessed in real-time on a mobile device, tablet, or desktop.

Security Needs Persist Despite Budget Challenges Of K-12 Education Market
Security Needs Persist Despite Budget Challenges Of K-12 Education Market

Beyond the need to install new systems, often overlooked is how schools are going to pay for security upgrades Limited financial resources are a common pain point for K-12 schools looking to implement cutting-edge security technology. But security needs persist despite scarce resources. All school administrators want to do everything in their power to secure their facilities against threats. More schools are recognizing the benefits and, in some cases, requirement of upgrading systems to meet evolving threats. The solution is to find creative, cost-effective ways to support these installations. Aiming Maximum Security Amidst Fund Scarcity Schools need maximum security and yet they have to work with limited budgets, says Andrew Schonzeit, CEO of integrator Idesco. “There certainly is a demand to enhance school safety, but to do so, schools have to look at the bigger picture and think in terms of solutions,” he adds. Integrators like Idesco can help by providing integrated security solutions that cover all their needs from ID cards to access systems and security cameras. “Many schools might think that they cannot afford such a solution, but with the latest technologies, they certainly can,” Schonzeit says. “I believe technology is being underutilised in K-12 schools because many schools feel intimidated by solutions. I think the security industry has come a very long way in development of apps for smart phones and iPad devices that are essentially one or two clicks. It is up to security integrators to provide powerful tools that customers feel very comfortable to use.” Choosing The Right Technology IP access control brings costs down by eliminating panels, excess wiring, and third party electricity at each door The Department of Homeland Security makes grants and funds available to schools for security upgrades and to address school vulnerabilities, Schonzeit says. The K-12 market should be taking advantage more of the technology that is available right now. Schools are starting to have a very strong network infrastructure backbone, which is a resource schools should be looking at to assist them in terms of implementing a solution. Schools should also try to maximize the use of mobile devices to control access to their premises and to intervene quickly in case of an emergency, Schonzeit says. One way to use the network backbone is by adding IP access control, which brings costs down by eliminating panels, excess wiring, and third party electricity at each door. This means that more doors, in existing buildings, can be protected on a tight budget. Isonas, a provider of IP access control, has very close integration with both Video Insight and Milestone video management systems. Isonas feeds access control data to each of these video platforms, allowing them to be the command/control for both access control and video. “As budgets are tight, few districts can afford to put access control across an entire district at one time,” says Rob Mossman, CEO of Isonas. “The integration and the Pure IP structure means that a district can roll in access control school by school without having to manage two separate software packages during the expansion.” Beyond the need to install new systems, often overlooked is how schools are going to pay for security upgrades. At times, it is a matter of school boards making the tough choice to place a higher priority on security measures than other worthwhile programs competing for funding, says John Mosebar, vice president, marketing, Aiphone Corp., a manufacturer of audio and video intercoms. "I believe technology is being underutilised in K-12 schools because many schools feel intimidated by solutions. I think the security industry has come a very long way in development of apps for smart phones and iPad devices that are essentially one or two clicks" Recognizing Government Grants Also, the federal government, most states, and private organizations offer many grants to pay for some portion of school security, Mosebar says. But often these grants are not well publicised, making it difficult especially for smaller districts without dedicated grant personnel to apply. This is an area where the security industry – through one of its organizations – could step up to research the various grant offerings and make them available through one website. “It would be a tremendous public service,” says Mosebar. Prioritizing Security Requirements Partially in response to cost challenges, implementing electronic access control in phases is more common in schools than other environments. Schools and districts decide the most critical openings from a security and traffic flow perspective, and prioritize them first, according to Allegion. Priority lists vary among schools, but most start with the perimeter so they can lock down a facility and keep intruders out. Some schools look at crime statistics and prioritize schools by location, starting first with those in the highest crime areas, adds Minu Youngkin, Allegion vertical marketing manager. Others look at traffic flow and determine which openings are most problematic, or put them at the greatest risk, and add access control to those first, says Youngkin. Greater system functionality is another aspect of costs. A key opportunity for security technology in K-12 schools is creating more automated systems that lessen or eliminate human delay in response and notification, says Bruce Montgomery, Business Development Manager, Honeywell. Creating an automated “If this, then what?” protocol streamlines a school’s approach to violence and improves response time. A one-button approach – where only one action is required to notify teachers, students and police, trigger a lockdown and provide video surveillance and campus access to law enforcement – is ideal for managing the broad range of communication and logistical challenges in the event of an emergency.

Idesco To Exhibit Access Control And Video Surveillance Products At The BuildingsNY Show
Idesco To Exhibit Access Control And Video Surveillance Products At The BuildingsNY Show

Idesco will offer the latest access control, video surveillance and ID card solutions to property managers Idesco Corp., a leading New York-based security systems integrator, today announced it will be exhibiting at the BuildingsNY show at the Javits Convention Center on April 28th and 29th. Idesco will be at booth #106 to offer the latest access control, video surveillance and ID card solutions to property managers and building owners. Video Surveillance And Access Control Solutions: Attendees will have the opportunity to visit Idesco’s booth and find the best security products for any kind of property ranging from commercial, industrial, and institutional. With video surveillance cameras, access control systems and ID card printers set up at the booth, Idesco has all the security needs of building owners covered.  “We are very happy to exhibit at the BuildingsNY show in the heart of NYC where we can make a difference with our savvy security solutions.” says Andrew Schonzeit, President of Idesco. "As a leading provider of integrated security solutions, it is important for us to always be in touch with organizations in need of a true security partner to keep everyone safe and secure.” Attendees can sign up for a free security audit with Idesco at the BuildingsNY show at Booth #106.