Consultants
740Companies
1327Locations
We are pleased to announce the introduction of the new Security Innovation Award. Named in honor of Ed Chandler, CPP, founder of Security By Design, Inc., the award will recognize annually an important innovation emanating from the security consulting profession. The innovation may be a service offering, process, or unique application of product or technology.
Ed passed away on Monday, April 7, 2025. He and co-founder Lorna L. Chandler, CPP, navigated the changing landscape of physical security from implementing the first international access control system in the 1980’s to today’s world of networked multifaceted systems. He was an expert in door hardware and was constantly pushing the envelope of what was possible in this realm. He championed new technology and brought people together.
The Ed Chandler Security Innovation Award will be presented at CONSULT 2025 on Saturday, October 4.
CONSULT Web Site
Altronix NetWay4BT is a 4-port networked Managed Midspan in a 1U rack enclosure. It provides up to 90W (802.3bt compliant) power per port, 360W total max. and passes data at 10/100/1000 Mbps at distances up to 100m. Features also include an integral battery charger for applications requiring backup and embedded LINQ™ Technology to monitor, control, and report power and diagnostics from anywhere over the network.
Find Out More >>
Conekt is Farpointe Data's mobile smartphone access control ID solution—consisting of a smartphone wallet app, mobile and physical credentials, and combination Bluetooth Low Energy (BLE)/contactless smartcard readers. Based upon the proven LEGIC® contactless digital radio frequency identification (RFID) platform, Conekt readers interface with a wide range of electronic access control systems by complying with either the legacy Wiegand or bi-directional Open Supervised Device Protocol (OSDP). In addition to supporting mobile access credentials, using the BLE feature of select smartphones, Conekt includes a range of traditional physical access credentials, such as clamshell cards, ISO cards, and key tags. Featuring easy registration, convenient mobile credentials, and multi-technology readers, Conekt is the next-generation ID solution for your electronic access control systems.
Find Out More >>
CPP, PSP, PCI, CISSP, CEH, CNDA, CSPM
Mr. Glasser’s professional background includes two decades of professional experience providing security consulting, systems design and program management for major corporations and organizations. He has provided security assessments, CPTED design, systems design, specification development, technical consultation, IT integration consultation, systems installation and project management services. Projects have been located in North America, South America, Europe, Middle East, Asia and additional locations around the world.
Areas of Expertise:
Physical & Electronic Security Design, Consulting and Engineering
Physical Security Hardware and Technology
Physical Security Red Team
Premises Security
Security Management
Information Security Policy and Technology
Operational Security Penetration Testing
??
Professional Certifications / Licenses / Degrees / Awards:
ISC2 Certified Information Systems Security Professional (CISSP)
ASIS Physical Security Professional (PSP)
ASIS Certified Protection Professional (CPP)
ASIS Professional Certified Investigator (PCI)
EC-Council Certified Ethical Hacker (CEH)
EC-Council Certified Network Defense Architect (CNDA)
New York State Burglar and Fire Alarm License
New York State Approved Security System and Fire Alarm Instructor
New Jersey State Burglar Alarm License
New Jersey State Fire Alarm License
ALOA Certified Registered Locksmith (CRL)
NAAA Certified Security Technician
Named to 2017 Security System News 20 Under 40 End User list
Phone: +1 551 206-0000
Email: MG@GlasserSecurity.com
Linked-In: www.linkedin.com/in/mglasser
Certifications: CPP PSP CISSP
The security consultant is a vital link between a building or facility’s requirement for security and the successful installation of a system to meet that requirement. From risk assessment to security audit to system design to the details of implementation and practice, it is the security consultant who identifies, then turns requirement into reality. SecuritySpecifiers allows a variety of constituencies – OEM's, integrators, facility owners and operators, end-users, and architectural firms – to access an up-to-date listing of companies and individuals skilled in the design and specification of physical security systems.
Search Consultants
Find Products and Manufacturers