Download PDF version Contact company

ASIS International, the membership organization for security management professionals, announces the recipients of its 2019 Innovative Product Awards (IPA) for Global Security Exchange (GSX) 2019, to be held from September 8-12 in Chicago.

The ASIS IPA competition, formerly known as Accolades, recognises the security industry’s newest, most innovative products, services, and technology solutions. These peer-distinguished solutions address critical industry trends and reflect the best of the innovation shaping the security industry.

Recognizing the expertise of winners

We congratulate all honorees and look forward to showcasing each winning solution at GSX this year"The program saw a 17% growth in entrants over last year, receiving 35 product submissions from across the globe in this year’s competition. Product entries had to represent a technology that was introduced within the last year. A group of judges comprised of end users and experts in security technology selected the top winners based on level of innovation, unique attributes and the benefit the product or service brings to the security industry.

Developing a new security solution or service can be a difficult challenge, and, as such, we are excited to highlight the dedication, expertise, and sheer hard work of our deserving winners,” said Ronald Lander, CPP, Chief Specialist, Ultrasafe Security Solutions and Co-Chair, ASIS IPA Committee.

This year’s competition was the closest in the eleven-year history of this competition, with contributions from several new security sectors. We congratulate all honorees and look forward to showcasing each winning solution at GSX this year.

Winners of the 2019 IPA:

  • Judge's Choice: Ouster – OS-1-64 Lidar and Object Tracking.
    Ouster's OS-1-64 Lidar achieves 360o superior vision, 24/7 night vision and reliability in challenging weather conditions. With object tracking software, the system builds precise 3D renderings of surroundings, identifies and tracks objects, and predicts threats before they happen.
  • Compliant Technologies – The Force Multiplier Generated Low Output Voltage Emitter (G.L.O.V.E) quickly transforms into a Conducted Electrical Weapon (CEW) to supplement existing intermediate tools within Law Enforcement, Corrections, Security, EMS and the Military.
  • IP Video Corporation – The ViewScan passive walkthrough Concealed Weapons Detection System does not require pat downs as it displays threat images of the exact location on a body and stores images.
  • Orion Entrance Control – The Orion Secure DoorGuard is a high-accuracy tailgate detection system that uses disruptive, solid state LiDAR technology to accurately determine when there’s an attempt to gain invalid entry through a secured access point.
  • Sternum – The EIV (Embedded Integrity Verification) solution offers a holistic and highly scalable solution, which enables IoT manufacturers to secure devices from end-to-end.
  • Sure-Fi – The Serial Data Bridge provides a solution to the problem of wiring access points to controllers in any situation. Utilising the proprietary Sure-Fi 900 MHz Radio Module, users can connect any access point without running wire.
Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...