Description
Products defined in the Access Control Software, Hardware, Devices & Peripherals category that operate or transmit data via wireless protocols (e.g., RF, Bluetooth, Low-Energy Bluetooth, Microwave, Wi-Fi, NFC, Lidar).
Description
Products that reduce the vulnerabilities, risks, or consequences of threats associated with brute force attacks or other hostile actions against personnel, facilities, and critical information. Products in this category may include environmental analytics, barriers, fences, or specialized materials that deter, detect, delay, or otherwise mitigate the effects of threats such as WMD(s), IED(s), ballistics, vehicular attacks, or other weapons.
Description
Hardware and/or software used in the verification of identity for the purposes of access authentication or denial through the analysis of a person’s face, iris, retinal, finger, hand, vein, or other anatomical/physiological features. May be a stand-alone, networked, or hosted / cloud-based solution and work in conjunction with other measures for multi-factor authentication, e.g., physical credentials, codes, or analytical feature sets such as behavioral traits.
Description
Hardware or software designed for use in the execution of security system monitoring or commercial applications. A monitoring product may be designed for use in the central station or locally by the user. Examples include alarm monitoring software and hardware, central station monitoring and video verification software.
Description
Communication/signal transmission/networking solutions using any medium that provide more efficient, translation/conversion, cost-effective, faster, reliable, distance, and/or enhanced security in support of security systems/operations. This includes but is not limited to monitoring, command and control, detection, supervision, signal conversion, and/or technology enhancements. Qualifying products might also leverage existing communications models like OSDP.
Description
Innovative solutions that enable integration between security systems, BMS / BAS, fire / life-safety, and/or IT environments, as well as products that support the features and benefits of multiple technologies operating together to appear as a single solution or data stream for the user. This includes but is not limited to the integration of physical security system(s) with logical systems.
Solutions will ultimately produce actionable intelligence or other information not available through one system or another, effectively create automated efficiencies that cannot be realized by one of the systems alone, or create a trusted physical/logical security environment.
Description
Products that detect, track, interrupt, and/or defend against surveillance or trespass by aerial or ground vehicles/robots, or other mobile equipment solutions of all classes and categories that operate autonomously or via remote control
Description
Software applications, utilities, or hardware designed to reduce attack vectors and vulnerabilities to cyber security threats, failures in logical security measures, and/or the protection and encryption of security systems-related data (in transmission or at rest), networking and/or communications. This includes active or passive measures for the control, monitoring, tracking, logical hardening, identification, or blocking of attacks/breaches, and/or bridging of logical and physical security systems.
Description
Products and/or services that support the design, installation, testing, diagnostics/troubleshooting, or operation of security products or systems. This includes software programs, mobile system utilities, pre-application verification tools, wire/cable testers, installation tools, connectors, electrical performance/analysis, RF signal strength and analysis, and any other appurtenance to assist in the design, installation, diagnostics or maintenance of security systems and related support hardware.
Description
Products in this category are designed to facilitate notification of security, life safety, and critical customer messaging. Solutions may utilize various digital messaging technologies (such as email/text alerts, PC-based messaging components), live or recorded voice communications, and various forms of message presentation/annunciation. Communications may be targeted to select groups of recipients based on static/dynamic parameters or to the general public. Products may include hardware, software, devices or services.
Description
Envisioned to be software, tools, systems, or other mechanisms, including contracting means or methods that provide efficiencies in delivery, reductions in cost, or enhanced quality / value to clients / end users of security products and services. Solutions must be able to demonstrate defined objectives, repeatable processes, repeatable results with measurable outcome / metrics.
Description
Systems, sub-systems, or devices used in the detection of chemical, biological, and/or radiological elements/materials considered to represent possible life-safety hazards. This includes actuating devices, control devices, detectors, processing equipment or warning systems.
Description
Solutions designed primarily for fire prevention, detection, and notification. This includes fire controllers, smoke/heat detectors, sirens/annunciators, keypads, pull stations, sprinkler systems and voice evacuation systems. Solutions may operate via hard-wire or wireless protocols.
Description
Products and/or services for monitoring, management, storage, cyber security, and/or intelligent control of security/life safety applications that eliminate the need for traditional on-premises client/server computing resources. Solutions may be network- based systems or "Cloud" services that provide various physical security system functions, and security-related IT functions (e.g., archiving, data storage, raw computing capabilities: cyber threat detection and prevention). SaaS, PaaS, and IaaS solutions are included.
Description
Products shall include hardware and/or software used to facilitate the authentication of users and the provisioning of access credentials through manual or electronic means. Products shall support the creation/production and/or management (i.e., tracking, distribution, provisioning, programming, or maintenance) of user credentials and the information associated with and/or stored on the credential. Products may include but not be limited to cards, fobs, readers, keypads, printers, and software management solutions and may support multifactor authentication or enhanced use/security using multiple technologies, improved communications, encryption, or other means. Excludes biometric- centric devices.
Description
Technologies used to detect and/or prevent unauthorized entry into a secure area; indoors or outdoors. This includes electronic systems and devices that support or interface with primary monitoring or command and control systems, as well as annunciators, arm / disarm stations, bells and sirens, and control communications. Products or software solutions engineered to reduce the occurrence of false alarms.
Description
Hardware and/or software specifically designed to manage keys or other assets through secure storage, assignment and use tracking, and reporting. Products may include secure storage containers (safes, cabinets, racks) or software programs.
Description
Products shall support the efficacy of law enforcement, public safety, guarding, or the protection of personnel in the performance of these duties through increased speed, improved reporting, or enhanced management of processes. Products may include hardware or software and can be wired or wireless.
Description
Mechanical devices, electro-mechanical locks, door hardware products, or other security hardware, including mechanical computer locks, keyless locks, computer-activated key locking, and other hardware used for the security and safety of persons, materials, or property.
Description
Solutions that provide functions of article surveillance, inventory control, or shoplifting deterrence and detection. Products may include wireless or wired devices, software, or other methods and means of reducing physical or intellectual property theft.
Description
These products enable an organization or entity to leverage external provider resources to manage some or all of the required systems administration, outsource operations, and maintenance tasks for a security operation. Such services could include but may not be limited to comprehensive integrated security/facility management functions (programming, diagnostics, or repair support) through the use of virtualized and/or dynamically allocated resources; public or private. Examples might include third-party SOC operations or Help Desk services.
Description
Applications running on a variety of mobile platforms (e.g., Android, IOS, Windows) that provide various monitoring, productivity, or management functions for access control, video, identity management, location services, or incident notification or response supported by a hosted application through wireless communications
Description
Garments or equipment designed to protect the wearer's body from injury. Hazards addressed by protective equipment include physical, electrical, heat, chemicals, biohazards, and airborne particulate matter.
Description
Actionable systems, hardware, applications, or services leveraging analytics, machine learning, and/or artificial intelligence solutions to deter, detect, and respond to physical and/or logical threats, including insider threats.
Description
Stand-alone or integrated software applications used to identify threats/risks to the enterprise and provide actionable intelligence or instruction to the user to mitigate the risks and/or consequences to their operations through data sharing, data analytics, visual recognition, and/or mapping.
Description
Video products or services engineered to analyze video data through the use of either predetermined criteria or artificial intelligence to identify and evaluate authorized and/or unauthorized activity or behavior or to process video data to provide greater resolution and/or image detail. Products may be software or hardware-based, may be integrated into other products such as cameras, and may be used in real-time or forensic applications.
Description
Camera products that employ non-traditional image capture technologies to provide enhanced surveillance capabilities, such as thermal imaging, night vision, infrared, and radiometry.
Description
Cameras of any resolution that provide high-definition video images for live or recorded use via network (e.g., Ethernet, IP) or direct cabling methods (e.g., coaxial, NTP). Products may include single or multi-sensor units.
Description
Hardware, software, or virtual solutions for the storage of video surveillance data that introduce a new level of innovation of performance or user benefits (e.g., increased storage density, reduced cost(s), enhanced data management (storage or retrieval),
redundancy/fault tolerance, or others)
Description
Video accessories such as monitors, lenses, positioning devices, mounts, enclosures, or consoles that introduce a new level of innovation or user benefits (e.g., ease of installation, maintenance, reduced cost(s), enhanced ergonomics, or others)
Description
Hardware and software video management systems, including NVR, DVR, HVR, and virtual solutions for the management, display, and distribution of video surveillance data.Applicant/Submitter Name*
First
Last
Presenter Name*
First
Last
This individual will present to SIA NPS Judges on Tuesday, March 24, 2026
Marketing Contact Name*
First
Last
Description of Product/Service*
Do you want to add any additional notes to judges?* Additional Notes to Judges
Acknowledgement* I acknowledge that this submission is complete and will be available on the market by March 24, 2026 (the first day of judging at ISC West).
Pre-Show Marketing Opt-Out * Checking this box will limit marketing exposure but will ensure your product marketing is only shared with judges under embargo.
This field is hidden when viewing the form
Time