The ASIS show has not traditionally been a big forum for new product introductions -- those happen mostly at ISC West in the spring. Even so, there is plenty of technology to see at this year's show, and many exhibitors now say the products they were talking about last spring are now ready to ship. On Day Two of the show, it seems a lot of the attendees are ready, too.

Video Camera Technology

The technologies of video cameras march on, and Hanwha Techwin America has embraced the new H.265 codec in a big way. All their cameras since last January have offered three different streaming options -- H.264, MJPEG and H.265. In addition, Hanwha offers its WiseStream smart compression. Combining H.265 and WiseStream enables video outputs that use 75 percent less data, according to Hanwha.

The company is leveraging the better compression to enable cameras with higher resolutions (and at 30 frames per second). For example, at ASIS, they are introducing an 8 megapixel multi-sensor camera (four 2-megapixel sensors) that provides video at 30 frames per second at a manageable data level (in fact, according to Hanwha, combining WiseStream and H.265 makes the bandwidth comparable to a 1080p camera using H.264 compression). 

Hanwha is displaying a complete
H.265 at ASIS, including the
company’s own H.265 cameras,
network video recorders (NVRs)
and software

Hanwha has been on a tear in the product development department, introducing 46 new products this year. Previously there were two camera lines; they now have five, including a mid-market line that falls between their existing lines, and new premium 4K cameras that include the new multi-sensor camera, fisheye cameras and multiple form factors. Features like simplified focus make the cameras easier to install.

Detractors of H.265 say the technology creates a costly processing burden on the server side. In answer to detractors -- and to prove the viability of H.265 to a market where implementation has lagged -- Hanwha is displaying a complete H.265 at ASIS, including the company’s own H.265 cameras, network video recorders (NVRs) and software.

Ensuring Reliable Solutions

But not all end users want to be at the cutting edge of technology. Many prefer to stick with tried-and-true solutions. “Technology moves very fast in this channel, but I think as fast as we think it’s moving, there’s also a moment of ‘hang on, we’re talking about technology and security,’” says Minu Youngkin, Market Manager at lock manufacturer Allegion. “There’s no history to this technology yet. I know wireless locks work, but users need a solution that’s reliable, and you can’t prove reliability with history if it’s new. As manufacturers, we owe it to ourselves to make sure we are constantly doing the due diligence, working with software partners, and taking into consideration the ‘what if?’”

Allegion is introducing a new mortise lock in its Engage wireless technology platform. The LE Series mortise lock joins the previously introduced NDE Series cylindrical lock as Allegion continues to fill out its selection of wireless locks.

Youngkin says end users, who are the predominate attendees of ASIS, tend to speak more broadly about complete solutions, not as specifically about products, which integrators tend to do. And the levels of technology understanding vary widely among ASIS attendees. Most of the Allegion booth visitors at ASIS are looking for retrofit solutions to existing installations, she comments.

Tyco-Johnson Controls Merger

I spoke briefly with Joe Oliveri, Vice President and General Manager of Tyco Integrated Security, about Tyco’s merger with Johnson Controls, which was recently finalized. He noted that Johnson Controls’ and Tyco’s complementary branch structures will offer opportunity for both companies to leverage each other’s customer bases. “We can sell more to existing customers,” he commented. Tyco Integrated Systems will keep its name, and other high-profile Tyco brands such as Software House and SimplexGrinnell will also continue under the new combined company, named Johnson Controls. 

"It’s really about being bold
and nimble and innovative
, I
don’t want to just be a security
player, I want to bring new
technologies to customers"

Oliveri sees technology innovation playing a big role in the market, especially as a differentiator for integrator companies like TycoIS. “It’s really about being bold and nimble and innovative,” he says. “I don’t want to just be a security player, I want to bring new technologies to customers.” TycoIS operates innovation labs in Tel Aviv and Silicon Valley, vetting security solutions for some of the biggest end user customers in the world. At ASIS, they are highlighting innovative technologies such as Magos ground-based radar that enables protection of wide areas inexpensively. Another technology is Convexum’s proactive counter-drone cyberfencing -- it identifies the frequency of intruder drones and then lands them safely outside a protected zone. 

Many of TycoIS’ customers are early adopters of such technologies. TycoIS is also highlighting its ability to view systems data remotely, and to solve problems remotely without needing to roll a truck to a site.

Working With Data

Data increasingly has a role helping to secure a facility, and several companies at ASIS this year are introducing new ways to use data -- both for security and also for other business purposes. An example is Qognify’s Operations Intelligence Center, which enhances the abilities of Qognify’s Situator software management system. Situator ties together multiple sensors into one interface that enables detection and guides and tracks response. The Operations Intelligence Center extracts and analyses data from Situator about threats and responses, and presents customized dashboards to inform users about issues such as response times. Data can be analyzed and filtered according to specific information or time intervals, and then compared to external metrics or information such as occupancy or company sales. The resulting analysis can provide valuable insight about a business -- and how it can be more efficient, effective and/or profitable. The goal is to analyze security information in terms of how it affects overall business operations and success. It's intelligence that can enable a security department to make money rather than cost money.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Larry Anderson Editor, &

An experienced journalist and long-time presence in the US security industry, Larry is's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.