HID EH400-K Single Door Networked Access Controller
HID EH400-K Single Door Networked Access Controller

HID Global®, trusted leader in solutions for the delivery of secure identity, recently announced the production release of its next generation EDGE EVO and VertX EVO™ controller platform that brings intelligence and decision-making to the door for advanced and highly customisable networked access control solutions.  EDGE EVO and VertX EVO offer an open and scalable development platform for the deployment of a wide range of access control functionality, including remote management options, real-time monitoring, report generation and a powerful custom rules engine that enables the use of the system hardware for complimentary applications.  Protecting the hardware investments of end user organizations, the new platform builds on the success of the company’s EDGE and VertX solutions and provides the most extensive access control architecture that delivers enhanced security features and superior performance with versatile installation and future upgrade options.  According to ARC Advisory Group, the physical security and access control market is experiencing a major shift toward IP-based solutions. “End users want ease of operation,” said Joseph Gillespie, principal author of ARC Advisory’s December 2011 study, “Physical Security and Access Control Systems for Industry Worldwide Outlook. They also want security solutions that are easier to expand, customize, and integrate with other solutions.  They want each part of the system to be optimized to work together, and to avoid integration and compatibility issues.  With its latest EDGE EVO and VertX EVO solutions, HID Global has shown its commitment to this approach and as the result can now offer more intelligent and valuable solutions to end users.” The scalability of the EDGE EVO and VertX EVO controller platform enables a comprehensive range of future access control functions that are interoperable with wireless locks and deliver enhanced security, such as implementations of highly advanced access rules, keypad door commands and large-scale anti-passback.  Additionally, VertX EVO controllers operate within the company’s Trusted Identity Platform® (TIP™).  These components will enable this version and future revisions of the controller platform to operate with fully trusted connections from host to controller to reader, substantially increasing security options for access control systems of the future. “HID Global’s EDGE EVO and VertX EVO controller platform, including a Developer Tool Kit with OPIN application programming interface (API), offers expanded capacity and higher performance, demonstrating our commitment to providing open solutions based on direct feedback from our partners,” said John Fenske, vice president of product marketing with HID Global. “The state-of-the-art features in our next generation IP-enabled platform emphasize HID Global’s dedication to driving market innovation to efficiently manage identities for access control while also ensuring our customers optimize their Genuine HID investment.” EDGE EVO and VertX EVO platform components include:  EDGE EVO Controllers, Reader/Controllers and IO Modules that enable higher security with an on-board encrypted Hi-O communication bus. EDGE EVO also broadens its worldwide usability of networked access control solutions with the addition of 12/24VDC lock support, mounting options and plug-and-play IO modules that extend IO at and behind the door. VertX EVO V1000 Controller and the V2000 Controller/Reader Interface solutions that expand cardholder capacity, decrease door transaction time and increase door uptime, while offering 100% plug-in compatibility with existing HID Global access control systems and associated V100, V200 and V300 downstream devices.  A comprehensive Developer Tool Kit (DTK) for developing to OPIN API when migrating from first generation EDGE and VertX or for new development using the latest platform.  The DTK is equipped pre-wired EDGE EVO Controller, VertX EVO V1000 and VertX interface boards and IO switchboard, as well as a full set of documentation.

Add to Compare
HID's Edge Solo Brings Network Intelligence To The Door
HID's Edge Solo Brings Network Intelligence To The Door

Edge Solo is HID Global's new cost-effective, stand-alone, single-door IP-based access control solution.  Its innovative product design is unique in the market for a number of reasons.  Standing apart from other stand-alone readers on the market, the product allows users to retain their initial investment value over time, or as security requirements increase by upgrading to be part of a complete hosted system through the OPIN development partner program of Open Architecture solution providers.  Edge Solo has a user-friendly, instructional web browser based environment, designed and focus-group tested for use in the "real world", allowing cardholder information, schedules and card assignment management through its intuitive user interface.Run through standard CAT 5/6 wiring and able to use PoE or external power supply, Edge simplifies installation while providing a low fixed cost per door.  Bringing intelligence to the door, the flexible design includes an integrated iCLASS® reader or allows connection to any Wiegand or most clock and data readers.Edge Solo is part of HID Global's new Edge platform, a full line of flexible and configurable IP-enabled access control processor and host interface solutions, which also includes EdgeReader™ (with integrated iCLASS® reader) and EdgePlus™ (allowing connection to any Wiegand or most clock and data readers).  A range of EdgePlus Solo and iCLASS kits are now available under single part numbers to reduce time and save customers' administration costs. Part # Description 83110 EdgePlus Solo and iCLASS R10 Reader Kit 83100 EdgePlus Solo and iCLASS R30 Reader Kit 83120 EdgePlus Solo and iCLASS R40 Reader Kit * 83125 EdgePlus Solo and iCLASS RP40 Reader Kit 83130 EdgePlus Solo and iCLASS RK40 Reader Kit  *(Option for single fully integrated unit)Edge is a perfect solution for new building installations, as it is designed to provide complete and full-featured access control infrastructure and contactless smart card capability at "the edge" of the network for stand-alone or OEM software host systems.  Edge products require less wiring and are IP addressable, which means they are cost-effective and are ideally suited for today's IT-centric security environment.

Add to Compare

Access control controllers - Expert commentary

The Intersection Of Education And Fire And Security
The Intersection Of Education And Fire And Security

Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From Kindergartens to Colleges Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognizes outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education.  Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customized solution Chubb Sicli’s quality, capability, and security expertise provided a customized solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.

How To Build An Insider Threat Program
How To Build An Insider Threat Program

Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.

The Benefits Of An Integrated Security System
The Benefits Of An Integrated Security System

Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.

Latest HID Global news

Boon Edam Inc. To Unveil New Compact Turnstile And Exhibit Integrated Solutions At ISC West 2020
Boon Edam Inc. To Unveil New Compact Turnstile And Exhibit Integrated Solutions At ISC West 2020

Boon Edam Inc., a globally renowned security entrances and architectural revolving doors provider, has announced that they are introducing a new optical turnstile, the Speedlane Compact, in a world premiere, in booth #8037 at the ISC West exhibition in Las Vegas on March 18-20, 2020. ISC West is the international largest security event in North America bringing together close to 30,000 participants for networking, education and discovery of new technology. In addition to showcasing this newest member of their premium optical turnstiles, the company will also be showcasing fully integrated solutions that address physical perimeter security and control pedestrian access. Boon Edam is also the official turnstile sponsor of the show. Integrated Technologies for Tailgating Mitigation Access technologies, such as card readers and biometric devices, are critical for controlling entry to secure areas Access technologies, such as card readers and biometric devices, are critical for controlling entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with the appropriate entrance solution. Swinging doors do not stop authorized people from holding the door and letting in others. Security entrances coupled with access technologies provide a complete solution that ensures only one person can enter per valid authorization. The following solutions will be on display in Boon Edam’s booth: NEW Speedlane Compact Optical Turnstile: Following the enormous success in the high-end speed gate market with the top-selling Lifeline Series, the development began to fill the market need for a premium quality, mid-range product. Thus, the Speedlane Compact was created, a swinging barrier turnstile that offers easy installation and integration with access technology and attractive delivery turnaround times. “With this new product, we have a solution that fits in everywhere – both in dimensions and design, without compromising on safety, security or quality,” said Mark de Jong, Product Manager of the Security Products Portfolio. Lifeline Speedlane Swing Optical Turnstile: There will be two, sleek Speedlane Swing turnstiles in the booth featuring unique identity recognition technologies to demonstrate efficient and secure throughput. One Speedlane Swing will feature a custom, integrated pedestal that incorporates the MorphoWave Compact touchless fingerprint technology from IDEMIA. The patented touchless sensor technology scans four fingers in 3D in less than one second, ensuring the most accurate and reliable fingerprint matching for maximum security. The second Speedlane Swing will feature AnyVision facial recognition technology with enhanced AI capabilities. Lifeline Boost Access Control Pedestal: The Boost is a stylish pedestal designed by Boon Edam to complement the popular Lifeline optical turnstile series and house virtually any access technology inside. The Boost will include the latest version of Essex’s credential card reader, the iRox-T, which now features Bluetooth and OSDP capabilities that expand HID Global’s Mobile Access solutions. Tourlock 180+90 Security Revolving Door: The entrance of choice for the Fortune 500, the Tourlock provides the highest level of throughput (up to 42 people per minute in two directions) while preventing unauthorized entry. The Tourlock in the booth will include StereoVision piggybacking detection technology and an AMAG Symmetry card reader to demonstrate the combination of fast throughput with high perimeter security. Circlelock Security Mantrap Portal: Offering the highest level of security available in an entrance using StereoVision piggybacking detection technology, the Circlelock security portal prevents intrusion into the most sensitive locations such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorization, while facial recognition technology provides instant authentication inside the portal: the secure, edge-based facial recognition access control device by Alcatraz AI, called the Rock, ensures only the right person can enter. BoonConnect Software: An IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Users can remotely access door operations and events using devices such as a tablet, laptop or smartphone via a secured corporate network. Tailgating Prize Giveaway Boon Edam was confirmed as the global company in Pedestrian Security Entrances in the Americas according to a report by IHS Markit covering the 2016-2018 timeframe. To celebrate almost a decade of leadership, there will be a tailgating-themed prize giveaway in the booth.

HID Global Names Bjorn Lidefelt As President And CEO
HID Global Names Bjorn Lidefelt As President And CEO

HID Global, a worldwide provider of trusted identity solutions, announces Bjorn Lidefelt has been named President and CEO. Bjorn joins the company after serving as Chief Commercial Officer (CCO) at HID parent company ASSA ABLOY, where he oversaw branding, communications, commercial development and strategy. He also has extensive experience in international sales and marketing, having spent more than nine years in Asia Pacific markets including China and Malaysia. Delivering industry-leading solutions “Bjorn has had a very successful journey with our organization, and will bring a wealth of experience and perspective from various roles and markets to HID,” said Nico Delvaux, President and CEO of ASSA ABLOY. Bjorn holds a Master of Science degree in Industrial Engineering and Management from the University of Linkoping, Sweden, majoring in computer science and marketing. He succeeds Stefan Widing, who led HID Global for over four years. “I look forward to leading a dedicated and talented global workforce focused on delivering industry-leading solutions to governments, universities, hospitals, financial institutions and some of the most innovative companies on the planet to create trusted physical and digital places,” Bjorn added.

Mission 500 Announces A Security 5k/2k Fundraiser At ISC West 2020
Mission 500 Announces A Security 5k/2k Fundraiser At ISC West 2020

Mission 500 is excited to announce this year’s Security 5k/2k fundraiser at ISC West 2020 will be held on Thursday, March 19th. The event will be located at 2601 East Sunset Road, in Las Vegas, Nevada and will benefit children and families in need across the United States. Registrations to participate in this year’s event are open. Those who are unable to attend or participate in the physical event can sign up and donate as a virtual runner or walker. Wide array of new security industry participants “2020 marks our eleventh year hosting the Security 5k/2k and we want to thank all of the previous participants and sponsors who have made the last ten years a tremendous success,” said Tom Nolan, Director of Strategic Partnerships, Mission 500. We can’t wait for this year’s event and hope to meet a wide array of new security industry participants" “We can’t wait for this year’s event and hope to meet a wide array of new security industry participants, reconnect with prior ones, and have a great time while supporting this worthwhile cause.” Participants in the Mission 500 Security 5k/2k will be awarded for their performance across various age categories, as well as those companies and individuals who led the fundraising effort. Humanitarian awards ceremony Those who succeed in raising $500 or more will automatically be enrolled in Mission 500’s 500 Club and receive a jacket as recognition for their efforts. The Security 5k/2k Reception and Mission 500’s CSR and Humanitarian Awards Ceremony will take place Thursday afternoon after the race (time and location to be announced). Confirmed charter sponsors include Alarm.com, Altronix Corporation, Axis Communications, Bosch Security Systems, BRINKS Home Security, CMAC, COPS Monitoring, Dahua Technology, DMP, Freeman, Galaxy Control Systems, HID Global, Hikvision, LENSEC, LRG Marketing Communications, Milestone Systems, Napco Starlink, PSA Security Network, Safety Technology International, Inc., and ZKTeco USA. The race is operated by Las Vegas Running Company, a locally based race management company.