Security Technology Executive

NOV-DEC 2014

Issue link: https://securitytechnologyexecutive.epubxp.com/i/431828

Contents of this Issue

Navigation

Page 40 of 67

THE SECURITY INDUSTRY'S PRODUCT GUIDE A supplement to Security Dealer & Integrator, Locksmith Ledger and Security Technology Executive www.SecurityInfoWatch.com A supplement WINTER 2014 RS2 Technologies Step Up SM System The Step Up SM System is the latest in RS2's line of access control solutions that allow customers to enjoy the benefits of an open platform approach at a reasonable cost and with a minimum of installation hassle. The Step Up SM System is a reliable, easy-to- install hardware retrofit offering a simple board swap of boards currently installed in legacy systems. By using Authentic Mer- cury TM legacy replacement hardware, Step Up SM provides a "screwdriver-less" retrofit of outdated and unsupported installations that use proprietary hardware and software. By working in partnership with Mercury Security, RS2 is able to provide customers who have previously-installed legacy sys- tems with a solution that saves their entire investment in peripheral and network wiring, reader technology, enclosures and power deployment. Labor costs are also minimized compared to entire system replacements. By using a Step Up SM replacement unit, cus- tomers can simply remove the connectors from the legacy board, remove it from the enclosure, replace it with the corresponding Step Up SM board, refit the connectors and power up. The bridged hardware is now open platform, reliable and uses current technol- ogy. System downtime is also minimized, as all boards are "hot swappable," meaning that replacements or additions can be installed while the enclosure is powered up and running the system. To find out more, call 877.682.3532 or visit the website below. Request more information: www.SecurityInfoWatch.com/12023792 www.rs2tech.com h b i d d h d i AXIS Q6000-E: Simultaneous Full 360° Overview and Detailed Zoom AXIS Q6000-E is an outdoor-ready 360° network camera that integrates seamlessly with the AXIS Q60-E Series of PTZ dome net- work cameras to provide a unique surveil- lance solution. A click on any object in AXIS Q6000-E, using the one-click PTZ control feature, will trigger an integrated AXIS Q60-E to optically zoom in to the specific object of interest. The use of two screens gives a full 360° overview from AXIS Q6000-E and a zoomed- in view from AXIS Q60-E, providing operators with a high level of detail while still being able to maintain an overview of the entire monitored area for up to 215,000 sq. ft. Any AXIS Q60-E camera is easily mounted inside the AXIS Q6000-E, allowing pre-exist- ing AXIS Q60-E installations to be upgraded to monitor wide areas, while simultaneously capturing every detail of interest with just one click. Time and cost of installation are minimized since AXIS Q6000-E uses the same brackets and network cable as the AXIS Q60-E. Furthermore, AXIS Q6000-E is supplied with PoE+ through AXIS Q60-E, eliminating the need for power cables. AXIS Q6000-E features four 2MP camera heads, each providing individ- ually configurable 720p HDTV video streams in H.264 compression. Motion JPEG is also supported for increased flexibility. AXIS Q6000-E is ideal for city surveillance applications, such as monitoring of public squares and parking lots or other open areas. Axis Communications 300 Apollo Drive, Chelmsford, MA 01824 800-444-2947 Request more information: www.SecurityInfoWatch.com/12024131 www.axis.com i l e d Z o o m 6 0 0 0 - E f e a t u r e s c a m e r a h e a d s , v i d i n g i n d i v i d - f i g u r a b l e T V s i o n . P E G i s p o r t e d f o r d f l i b i l i Bolide's Newest Digital Video Recorder – Now with P2P Technology Bolide SVR9000HDP DVR Series introduces a new feature that makes it the most user-friendly and powerful DVR today — P2P technology. This function allows automatic port forwarding and instant connection to the network without any time-consuming configuration. The SVR9000HDP DVR records HD-quality video without compromise — 960H resolu- tion at real-time frames per second on every channel. View your DVR in 1080p display on a high definition monitor via its HDMI output. Multiple video management options feature time schedule recording, motion detection, alarm triggering, etc. Other fea- tures include audio in/out, alarm in/out, PTZ control via RS-485 port, among others. The SVR9000HDP comes in 4-channel, 8-channel and 16-channel models. With the SVR9000HDP DVR Series, remote viewing has never been easier. Simply scan the QR code on your phone or tablet and log in to any DVR anytime, anywhere. Bolide's Central Management Software also comes packaged with every unit for multiple DVR management on one interface. Request more information: www.SecurityInfoWatch.com/12024049 www.bolideco.com e r f u l D V R t o d a y — P 2 P o n a l l o w s a u t o m a t i c s t a n t c o n n e c t i o n t o n y t i m e - c o n s u m i n g V R r e c o r d s H D - q u a l i t y m i s e — 9 6 0 H r e s o l u - e s p e r s e c o n d o n e v e r y V R i n 1 0 8 0 p d i s p l a y o n i t o r v i a i t s H D M I m a n a g e m e n t o p t i o n s r e c o r d i n g , m o t i o n WinDSX AES-256 Encryption Software The WinDSX AES-256 encryption software from DSX Access Systems contains gov- ernment approved AES-256 bit encryption tech - nology that can be implemented system-wide. Encryption capabilities are built into the soft- ware and every field controller. For example, communica- tions to each Location in WinDSX AES-256 can option- ally be encrypted with a unique encryption key assigned by the customer for communicating with that Location's field controllers. This is but another tool for DSX Integra- tors in meeting government requirements and FIPS compliancy just like the recently achieved UL 1076 listing. Once purchased and enabled in the DSX Features Key, there is an Encryption Key that can be implemented to encrypt communications between the Comm Server and the Workstations. There is also an encryption key that can be implemented optionally and individually for each location. Once com- munication is encrypted from the Comm Server to the Master Con- troller, the encryption is propagated to all control- lers in that location. Request more information: www.SecurityInfoWatch.com/10271691 www.dsxinc.com

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - NOV-DEC 2014