2018 Award Categories

Category Name Description
Access Control Devices & Peripherals Electronic and electromechanical devices used to monitor and / or control physical access points when connected / networked to access control systems or deployed as stand-alone systems. Includes readers, turnstiles, electric portals, REX devices, lock releases and other access control door peripherals.
Access Control Devices & Peripherals Wireless Products defined in the Access Control Devices & Peripherals category that operate or transmit data via wireless protocols (e.g. RF, Bluetooth, Low- Energy Bluetooth, Microwave, WiFi, etc.).
Access Control Software and Controllers Electronic systems software or controllers that manage databases and / or field hardware for the physical control and tracking of personnel access to facilities or other controlled assets. Includes stand- alone, networked, virtual, and appliance based systems.
Anti‐Terrorism / Force Protection Products that reduce the vulnerabilities, risks, or consequences of threats associated with brute force attacks or other hostile actions against personnel, facilities, and critical information. Products in this category may include barriers, fences, or specialized materials that deter, detect, delay, or otherwise reduce the effects of threats such as WMD(s), IED(s), ballistics, vehicles, or other weapons.
Cloud Solutions Solutions that are designed to provide for various security services (e.g. Video, Access Control, Visitor Management), security-related IT functions (e.g. Archiving, Data Storage, raw computing capabilities), or comprehensive integrated security/facility management functions through the use of virtualized and/or dynamically allocated resources provided by a collection of public ("The Cloud") or private ("private cloud") computing resources. Cloud solutions may employ a combination of strategically configured commercial services (e.g. Amazon Web Services) and/or specially designed physical hardware servers/applications/appliances that provide customized security-related services for a large number of individual customers.
Commercial Monitoring Solutions Hardware or software designed for use in the execution of security system monitoring or commercial applications. A monitoring product may be designed for use in the central station or locally by the user. Examples include alarm monitoring software and hardware, central station monitoring and video verification software.
Convergence and Integrated Software and Solutions Innovative solutions that enable integration between traditional security systems, building management systems, and IT environments, as well as products that support the features and benefits of multiple technologies into a single solution. This includes integration of a physical access control system with logical access control maintained by an IT system. Products may incorporate intrusion detection, access control, video monitoring and life safety functions within a single system.
Cyber Security Software applications, utilities, or hardware designed to promote the security of security by reducing vulnerabilities to cyber security breaches or failures in logical security measures. This would include active or passive measures for the control, monitoring, tracking, identification, or blocking of attacks / breaches, and / or bridging of logical and physical security systems.
Emergency Communication Systems Products in this category shall include solutions designed to facilitate notification of security and / or safety information to select groups of people or the general public via electronic means. Products may include hardware, software, devices or services.
Environmental Monitoring Systems Systems, Sub-Systems or Devices used in the detection of chemical, biological, and / or radiological elements / materials considered to represent possible life-safety hazards. This includes actuating devices, control devices, detectors, processing equipment or warning systems.
Fire/Life Safety Solutions designed primarily for fire prevention, detection and notification. This includes fire controllers, smoke/heat detectors, sirens / annunciators, keypads, pull stations, sprinkler systems and voice evacuation systems. Operates via hard-wire or wireless protocols.
Green / Sustainable Solutions Products (formerly Green Solutions/Energy Conservation Products) Products in this category may demonstrate reduced energy consumption over previous models or demonstrate overall energy efficiencies through their use or integration with other systems. These products may also contribute to the sustainable environment through manufacturing or distribution processes. Products may also provide support of other systems or processes used to monitor, report and / or manage energy use and efficiencies.
Hosted Solutions / Managed Services A method of providing various monitoring, management, storage or processing functions to eliminate the need for these functions to managed by an individual customer or f at a fixed location. These are network-based systems or "Cloud" services that provide various security system functions (e.g. Video, Access Control, Intrusion) that are managed via an expandable computing environment. The computing environment may include virtual processing and storage capabilities that are collocated or geographically separated while providing a single logical interface to the individual customer.
Intrusion Detection and Prevention Solutions Technologies engineered to detect and / or prevent unauthorized entry into a secure area. This includes physical or electronic products that support or interface with monitoring or command and control systems, as well as annunciators, arm / disarm stations, batteries and power supplies, bells and sirens, and control communications. Products or software solutions engineered to reduce the occurrence of false alarms and, most importantly false police dispatches.
Intrusion Detection and Prevention Solutions Wireless Products defined in the Intrusion Detection and Prevention Solutions category that operate via wireless protocols.
Law enforcement / Guarding Systems Products shall support the efficacy of law enforcement, guarding, or the protection of personnel in the performance of these duties through increased speed, improved reporting, or enhanced management of processes. Products may include garments / apparel, hardware or software.
Lock Systems and Secure Storage Containers Mechanical devices, electro-mechanical locks, door hardware products or other security hardware, including mechanical computer locks, keyless locks, key control systems, safes and vaults, electronic locks, computer-activated key locking, egress devices, and other hardware or systems used for the security and safety of persons, materials or a premises.
Loss Prevention and Article Surveillance Solutions Solutions that provide functions of Article Surveillance, Inventory Control or Shoplifting deterrence and detection. Products may include wireless or wired devices, software, or other means methods and means of reducing material or intellectual materials.
Mobile Apps Applications running on a variety of mobile platforms (e.g. Android, IOS, Windows) that provide various monitoring, productivity, or management functions for access control, video surveillance or intrusion security systems or sub-systems.
Network Support Solutions Formerly called IP Devices, Products and Software, this category includes innovative solutions that enable security devices to be installed, maintained or monitored on a network. Examples include network switches designed for security environments, wired and wireless Ethernet solutions, network converters, and software designed to support the monitoring of network or device status and video encoders.
Outdoor Perimeter Protection Products designed to work outdoors to protect large, open perimeters or fence lines. This includes fences, gates, gate operators, outdoor intrusion sensors, perimeter barriers and deterrents, security lighting, security entry doors, microwave perimeter devices, on-the-fence detection systems, seismic sensors and outdoor motion detectors.
Personal Protective Equipment Refers to protective garments or equipment designed to protect the wearer's body from injury. The hazards addressed by protective equipment include physical, electrical, heat, chemicals, biohazards, airborne particulate matter.
Residential and Monitoring Solutions Formerly called Home Automation, this category was broadened to recognize the increasing complexity of software and hardware products designed for residential use. Products may feature a combination of audio/visual, IT, personal emergency response systems and security technologies to bring homeowners a higher level of convenience, safety and security. Products such as central vacuum, custom sound & video, communications systems, environmental and energy controls, home theater, HVAC, lighting and low voltage controls, software and phone systems are included in this category.
Design and Installation Tools Formerly Tools and Hardware, this category seeks to identify innovative products that support the design, installation, functions, or operation of a security products or systems. This includes software programs, pre-application verification tools, wire/cable testers, installation tools and equipment, fiber optic and wire assemblies, cable trays and raceways, patch panels, cable enclosures, ladders, power conditioning, power supplies and battery products, designed primarily to assist in the design, installation, diagnostics or maintenance of security systems.
User Authentication, Identification, Credentialing and Management Products used to facilitate the identification and authentication of users through manual /visual or electronic means. Products - hardware or software - that use biometric technologies for identification, access control and forensic review, and those related to identity management, employee verification, crisis response and recovery, field monitoring and tracking, visitor management and badges, high security ID and credentialing. Includes products or peripherals using fingerprint, iris scan, facial recognition, photo ID, smart cards and other methods of user authentication, as well as hardware and software used in the management, provisioning and / or production of a user credential.
Video Analytics Video products engineered to gather, access and analyze video data in relation to a pre-determined set of criteria. Products may be software or hardware-based, may be integrated into other products such as cameras and may be used in real-time or forensic applications.
Video Surveillance Advanced Imaging Technologies Cameras that provide advanced video capture technologies, such as thermal imaging, night vision and infrared.
Video Surveillance Cameras HD (Megapixel) Cameras that provide high-definition video resolutions using network (e.g., Ethernet, IP) or direct cabling methods (e.g. HDcctv).
Video Surveillance Cameras IP Video Surveillance cameras of any resolution using network (e.g. Ethernet, IP) or HDCCTV protocols.
Video Surveillance Data Storage Hardware, software or virtual solutions for the storage of video surveillance data.
Video Surveillance Hardware and Accessories Video accessories such as monitors, lenses, positioning devices, mounts, enclosures or consoles that introduce a new level of innovation or user benefit or improve the price point.
Video Surveillance Management Systems Hardware and software video management systems - NVR, DVR, HVR, VMS and virtual solutions for the management, display and distribution of video surveillance data.
Threat / Risk Management Systems Stand-alone or integrated software applications used to identify threats to the enterprise and provide actionable intelligence or instruction to the user to reduce the risks and / or consequences to their operations through data sharing, data analytics, visual recognition, and / or mapping.
UnManned Products including aerial or ground vehicles / robots, or other unmanned mobile equipment solutions of all classes and categories that operate autonomously or via remote control to provide support of security operations through the detection of unauthorized activity through the use of visual, sound, and / or other sensors. Products may also include hardware or software that aid in the operation or integration of these solutions into the security enterprise; or those that detect, inhibit, or otherwise neutralize the unauthorized operation of such equipment to protect an entity against unauthorized activities of surveillance, intrusion, or theft on their property and / or generally increase safety.

SIA NPS Application Deadline
February 26, 2018

April 10, 2018
-Face-to-Face Presentations 
-Drop off your New Product in the Showcase Area

April 11, 2018
NPS Awards Ceremony
3:30pm on the Lobby Stage

April 13, 2018
Pick up your New Product from the Showcase Area
3:00pm - 5:00pm


We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.