CONTENTS JULY 2018 | www.asindia.in
VERTICAL MARKET Critical Infrastructure: Achieving .. 22
BUSINESS TALK Honeywell a Global Leader ... 56 India is the Key Contributor ... 58
34
INDUSTRY REPORT VSaaS slated to ... 60
COMPANY SPOTLIGHT Uniview is the pioneer ... 64
PRODUCT EXPLORATION Identity Management ... 34
22
SPECIAL FEATURES SHOW REVIEW
64.
JULY 2018
56.
www.asindia.in
Contents........... 04 Editor’ s Note...... 06 Readers’ Feedback.... 10 Show Calendar...... 88 4
Drone-Covert Cameras play.. 38
CASE STUDY
CP PLUS Hosts .... 78 Dahua Chairman Spoke .... 80 Matrix Concludes .... 81 CONNECT-2018: a .... 82 Office in Bengaluru .... 83 Axis Communications .... 84
Senegal’ s new International .... 50 CP PLUS Secures Kidzania .... 52 KKB Anadolu Data .... 53 Video Surveillance .... 54
LAUNCH PAD
VERTICAL SOLUTION
Hikvision Launches .... 72 Honeywell Introduces .... 73 Dahua Thermal .... 74 One Camera with .... 75 Multi-Biometric Finger .... 76 Vehant Technologies .... 77
New Technologies Help .... 30
Corporate News....... 14 News Feature.......... 18 Product Showcase.... 42 Advertiser Index...... 89
VIEW POINT Looking Ahead for a New and Improved Homeland Security Structure... 66
Strengthening the Security of the Critical Infrastructure
A
cross the globe, critical infrastructures constantly face the risk of terror as well as cyber-attacks from hostile and malicious entities as well as damage inflicted by natural disasters. There have been many terrorist attacks but Mumbai faced the deadliest terror attack that killed more than 160 people leaving behind scars among citizens and forcing the government to improve security. Several measures were announced by the government to strengthen the coastal and maritime security with the latest technologies. Immense funds were diverted for tightening the security of India’s Critical Infrastructure. As such the security concerns are really diverse. They range from the territorial integrity of nations through to the consequences of disasters for economies, cultures and societies. There is a need to look ahead for new and improved Homeland Security structure too. Homeland security starts with home towns being secure. Protecting critical infrastructure includes surveillance and remote monitoring. One way to achieve this is to have a drone flying over to monitor any suspicious activities as well as to check the status of the condition of hard-to-reach areas of the infrastructure. So the high tech drone cameras are a boon now. Actually physical security is important for creating sufficient time between detection of an attack to any of the critical infrastructure and the point at which the attack becomes successful. Physical security is essential for safeguarding high-risk critical infrastructure, as it often provides the first-line of defense against potential incidents. Physical and cyber security threats are increasingly interlinked in a way that companies must account for and defend the structure and people. Building resilience can bring multiple benefits, including strengthening the economy, protecting the environment and improving quality of life. Preparing for extremes can reduce recovery costs. When communities make themselves more resilient, they can get back to business after a disaster faster. And the faster they get back to business, the stronger their communities become. JULY 2018
July issue of a&sINDIA also covers VSaaS which is a solution with cross-industry appeal. Retail, health care, education, and transportation all benefit from the flexibility and architecture of the solution.
www.asindia.in
Protecting government, transport, energy, finance, and critical infrastructure operations against terrorist activities and natural disaster is vital today. Be resilient and stay secured!
Manish Gandhi info@asindia.in
6
a&sINDIA, published by Oil Asia Publication, is a monthly professional publication for channel players in the Indian electronic security industry. It serves importers, distributors, OEM/ ODM searchers, system integrators and other product purchasers to update product sources and identify development of CCTV, Digital Surveillance, Access control biometrics, intrusion alarm, Intercom/video door phone, home automation and other fields related to electronic security. a&s India also covers active and passive fire protection and emergency rescue management issues. It contains articles on cutting-edge products, technical applications and safety code issues in India and many other themes of interest to fire safety professionals. Manish Gandhi Prachi Shah
Publisher & Chief Editor
info@asindia.in
Editorial Swati Dhake Editor Graphic Designer Sarvesh Jha Advertising Circulation & Subscription Allwyn Fernandes Aparna Kadam Business Unit Manish Gandhi
Director Sales
Mumbai Delhi Bengaluru
+91-22-4286 3760 +91-11-6629 5700 +91-80-4852 4410
Secutech India 2019 Manish Gandhi Prachi Shah
Director Sales Project Head
info@asindia.in
info@asindia.in
info@secutechexpo.com
Messe Frankfurt New Era Business Media,
Publisher of a&s India (a subsidiary of ABECL) 530, Laxmi Plaza, Laxmi Industrial Estate, New Link Road, Andheri (W), Mumbai - 4000 53, India.
Oil Asia Publication Private Limited,
Oil Asia Publication Private Limited (OAPPL), founded in 1983 by Surendra Mohan Singh Gandhi, is a more than 25-year-old publication, engaged in publishing industry specific magazine, organising exhibitions and conferences related to the oil, gas and petrochemical industry. The portfolio of a&s Magazine, published by Messe Frankfurt New Era Business Media (formerly known as a&s Group), includes a&s International, a&s International China Best Buys, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, a&s Taiwan, Fire & Safety and Info Security (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For change of Address or subscription problem, contact us at info@asindia.in Copyright@2011 Oil Asia Publication Private . All Rights reserved. No parts of this magazine may be republished, reprinted, redistributed, or reproduced in any way, including electronic, without prior written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent, image or trademark disputes from advertisements or among advertisers.
Insight: a&sINDIA Main • Critical Infrastructure:Achieving Greater Security Alertness • Identity Management Systems add to the Business Value • Drone-Covert Cameras Play A Vital Role In Security Operations In India • VSaaS slated to grow big! • Looking Ahead for a New and Improved Homeland Security Structure
When it comes to safety, there are no half measures You don’t need to be a security expert to recognize that the school grounds during the school day creates a security problem, though people speak a lot about this issue but it is certainly a tough mission. Allowing students to leave campus during lunch, for example, creates vulnerability by increasing foot traffic in and out of schools. The tighter a school’s security procedures, the safer a school will be. Schools now engage security solution providers, parents, students and NGO members into conversations about how to ensure that schools are a safe and welcoming place for students to learn and grow. Having uniformed officers in schools is actually a win-win for everyone. Students behave better, students learn police are people, officers get an early chance to influence young lives, and teachers and administrators don’t have to the sole source of enforcement on campus. ---- Col Sudhir Sinha, Delhi
a&s India is special JULY 2018
www.asindia.in
I really like the professional focus maintained by a&s India in bridging the security industry professionals and the other sectors. I always search for new products with updated versions and features. Generally the suppliers keep surfing Google and fail to reach the correct people and many a times the contact details are not correct and that is really very
10
frustrating. The products displayed and details given in a&s make it simpler as once you glance through it, you feel your search ends here.
in the universal perception on gender equality is advocated through these thought-provoking talks.
The ads are very informative and I always find them informative and note the details. It is here where products in detail are updated on regular basis. a&s is definitely the best package. a&s India is for the security magazines what TOI is for newspapers! --- Sandesh Jhingan, Thiruvananthapuram
I would like to applaud the efforts undertaken by the a&sIndia team on the extensive research-led content provided to us every month. --- Arvind Nag, Mumbai
Safety of students needs the top priority Gun violence and shooting incidents in educational campuses around the globe are on a rise. An enhanced security strategy is expected by parents and students alike from the management of educational institutes due to the rise of these uncertain incidents. Application of latest security technologies like video surveillance systems, control panels, access controls will definitely make campus atmosphere safer than before. The Vertical Solution report covered in the June issue is very relevant to our times and the insights shared by global experts were truly awakening. Also the Business Talk segment in the last issue gave us an opportunity to connect with few leading women professionals from the field of security, investigation and consulting. A much needed change
For security and fire safety news update log on to: www.asindia.in
www.facebook.com/asindiamag
www.twitter.com/a_sindia
www.linkedin.com/company page/a&sindia
12
z Hikvision Awarded Best Technology Company by DMCC
H
ikvision, the world’s leading supplier of innovative video surveillance products and solutions, was awarded ‘Best Technology Company’ at the 2nd DMCC Members Awards 2018. Dubai Multi Commodities Centre (DMCC), the world’s most interconnected Free Zone and the leading trade and enterprise hub for commodities, awarded Hikvision for its outstanding performance in the field of science and technology.
DMCC is the Dubai Government Authority on commodities, trade and enterprise. The Members Awards highlights outstanding DMCC member enterprises and industry leaders, and thanks them for their efforts in the construction of the DMCC community. Hikvision was the only Chinese enterprise to receive the award. In 2008, Hikvision set out to penetrate the Middle East and North Africa market, extending its business across 23 countries. Hikvision’s MENA headquarters was officially established in 2010, joining DMCC that year.
JULY 2018
The DMCC Members Awards covers a wide spectrum of business sectors, providing an opportunity for all our members to submit their entry into the award categories that best suit their business. The awards were evaluated based on the enterprise performance and ability to achieve business growth, their global influence, market share, high turnover, and contribution to the industry. The winners for each category were carefully selected by an esteemed panel of judges.
www.asindia.in
We are excited and honored to win the Best Technology Company Award. Since the establishment of Hikvision MENA office in DMCC in 2010, the company has moved forward at a rapid pace in the MENA market Robert Wong Technical Director, Hikvision MENA
14
The Chandani Chowk to Hangzhou, China – India Program
D
ahua Technology announced that it has successfully organised a tour program called ‘The Chandani Chowk To Hangzhou, China – India Program’ for the high performing Indian partners to its headquarters at Hangzhou in East China. The 25 high performing Indian partners had an extensive guided tour of Dahua’s facilities.
‘The Chandani Chowk To Hangzhou, China – India Program’ aims to enhance cooperation by enabling partners to learn more about Dahua and its latest technologies, products and solutions, as well as the country and its culture. The Indian partners were warmly received by the Dahua Technology top managementMichael, the Vice President and James, the CTO. First the Indian partners visited Dahua Showroom, where they had a first-hand experience on all the newly developed security technologies and products, such as Display Solutions, Video Conference Solutions, Smart Home Automation Solutions etc. The group also had onsite training, where they were shown Dahua advanced security solutions. The partners also visited the new Dahua Smart IoT Industrial Park in Fuyang District, Hangzhou and they were presented a UAV show in The Dahua Industrial Park, showing the company’s advanced production capabilities and technologies.
Dahua always rewards the best performers and surprises them with these kinds of valuable and beneficial trips. Now they have more knowledge and understanding about Dahua products and technologies after this visit which will help them to find more opportunities for Dahua products and increase their market outreach in India. We will support their initiatives in this direction Dahua spokesman
CP PLUS Alights in Myanmar with an Introductory Partner’s Meet
C
P PLUS, the global leader in advanced security and surveillance technology, recently hosted an introductory Partner’s Meet in Myanmar marking its entry in the country. The event was an introduction to the brand, its global presence and its key technologies through an elaborate technical session and live demonstrations. Partners from around the country gathered at the Park Royal Hotel on 29th May for the meet.
On showcase were CP PLUS Red and Indigo Series cameras and DVRs. While the Red Series is designed for small to mid-sized commercial installations, with up to 4MP resolution, H.265 compression, motorised zoom, WDR, starlight, night vision, etc., the Indigo Series are high end, enterprise grade cameras that are designed rugged and undergo stringent tests to meet a wide range of environmental and situational conditions. They are equipped with resolutions up to 12MP, InstaStream compression, 44X zoom, Edge analytics, and more.
It was a great session. The people of Myanmar are very supportive and warm. We had a great experience conducting this show. I’d like to thank our partners here who made it to the meet and expressed their interest in CP PLUS technologies. We look forward to a great association with them Yogesh B. Dutta COO, CP PLUS
Mayor of London and London & Partners recognises VIDEONETICS as Global Emerging Indian Enterprise
V
ideonetics, World’s leading Visual Computing Platform Development Company, has been honoured with the prestigious India Emerging Twenty (IE20) 2018 Award by the Mayor of London. Created by London & Partners and launched by the Mayor of London, the IE 20 Programme aims to discover 20 of India’s most innovative and high-growth companies to help them grow to London.
The award was adjudged using a robust rating scale by an esteemed panel of business leaders, venture capitalists and entrepreneurs. By flawlessly surpassing rigorous three-phase evaluations, Videonetics emerged as India’s Top 20 Emerging Enterprises with global aspirations. The 20 winners were chosen from over 300 applications from some of Indians leading business hubs such as Mumbai, Bengaluru and New Delhi.
It is indeed an honour to receive ‘India Emerging Twenty 2018 Award’ from Mayor of London and we all are set to lay the foundation for our success in the UK market. This recognition validates our drive for high performance, innovation, differentiation and global scalability Dr. Tinku Acharya Founder & MD Videonetics
15
z Western Digital Streams Greater Efficiency and Innovation into Huawei Big Data and Video Applications
W
estern Digital Corporation announced that Huawei has qualified its host-managed shingled magnetic recording (SMR) helium-based HDD, the Ultrastar® Hs14 – the industry’s first 14TB HDD designed for demanding big data applications. An early adopter of Western Digital’s SMR HDDs, Huawei is breaking new ground by optimising its distributed cloud
storage OceanStor® 9000 system for the sequential nature of data capture in video surveillance applications. Seeing the value in enabling significant TCO improvements, Huawei has made considerable investments in the integration of Western Digital’s SMR HelioSeal® HDDs, which deliver unsurpassed density, power efficiency and reliability.
JULY 2018
Large data volumes is the typical feature for video archiving, data backing up and more. Huawei’s OceanStor® 9000 makes full use of the Ultrastar Hs14 SMR drive’s capacity and drive characteristics through its ROW (Redirect on write) technology. With the OceanStor 9000 solution based on high-density 14TB SMR hard drives, customers can save up to 40 percent of a room’s floor space, and power consumption can be reduced by more than 40 percent compared to 8TB hard drive solutions commonly used in the industry today.
www.asindia.in
Huawei is an early innovator and valued partner, and their qualification of our 14TB SMR HDD underscores the strength of our long-standing relationship Mark Grace Senior Vice President of Devices Western Digital
16
Dubai Airports to save 20% on annual energy bill with Siemens solution
D
ubai Airports will use Siemens Building Technologies data analytics and smart building technology to guarantee annual energy savings of almost 20 percent per year at Dubai Airports’ facilities, by implementing energy efficiency measures at Terminal 1, Terminal 2, Terminal 3 and Concourse B at Dubai International (DXB). Focusing on air and water systems, the seven-year project is expected to reduce CO2 emissions by approximately 25,000 tons, with annual electricity savings of approximately 50 gigawatt hours (GWH), and water savings of around 21 million gallons. The initiative is part of Dubai Airports’ comprehensive energy-saving strategy and program designed to limit the environmental footprint at both of its airports.
A tailor-made energy optimisation solution has been designed for the project by Siemens, comprising a range of physical and digital technologies including variable frequency drives, panels, sensors, intelligent controls, energy metering and efficient water fixtures. These will be deployed to the air and water systems to optimize the air-handling units, chilled water system, fresh air plant and the secondary fresh air, supply and exhaust fan systems.
Sustainability underpins our facility management strategy and these energy and water savings have the double benefit of limiting our environmental footprint and improving our bottom line. As longstanding partners, Siemens understands our business, our systems and has the expertise and technology needed to help us deliver our vision Michael Ibbitson Executive Vice President, Infrastructure & Technology Dubai Airports
Varanasi Airport to Get Facial Recognition Security System Under Digiyatra Scheme
NCR to install country’s first centralised traffic control system at Tundla
The Lal Bahadur Shastri International Airport in Varanasi will soon become the first airport in the country to have an automated smart facial recognition system, ensuring hassle-free movement of travellers from entry to boarding points.
By the end of June month, Tundla railway station would be the first station in the country to have centralised traffic control (CTC) system, to control and operate train operations from one location.
Representative Image
z
The CTC is being installed in Kanpur-Ghaziabad section of the North Central Railway (NCR), which is one of the most important and oversaturated sections of Indian Railways. On an average, over 400 trains comprising freight, oil tankers and passengers pass via this section of NCR. “The project, being executed at a cost of Rs.40 crore has several important advantages, such as efficient time table management of train operations, up to six train movements on a route at a particular period which would save time and energy, facility for real time detection and online rectification of mistakes if any are committed by controller and various others advantages,” he said.
The system has been developed under Prime Minister Narendra Modi’s ambitious DigiYatra scheme. Varanasi is among three airports – the others being Visakhapatnam and Kolkata – selected under the programme for availing of this facility.
DigiYatra is an ambitious initiative aimed at developing a digital ecosystem to provide the best possible paperless services to air travellers at every stage of their journey, from boarding to checking in and landing. Rai said the automated facial recognition checking system will be put into service over the next four months. However, there will be no change in the way luggage is being checked.
JULY 2018
The DigiYatra scheme also aims to provide passengers with real-time notifications on air traffic congestion and resultant delays. Besides this, it will allow people to plan their trips more efficiently by identifying price trends and estimating future air fares.
www.asindia.in
The installation of the automated security system is already underway. Automated walkthrough security scanners equipped with facial recognition technology are being installed at the airport’s entry, security and boarding points
Representative Image
The walk-through security scanners, which are capable of identifying passengers by their faces, will make entry into the airport faster and ensure automated check-ins without the requirement of any paper-based intervention. Details of passengers provided at the time of booking tickets will be examined digitally through their Aadhaar numbers.
“The CTC will be a game changer for train operations, as it will allow the planning and operation of trains to be done from a centralised location” said General Manager of NCR, M.C. Chauhan. “The benefits of CTC will be reflected both in the form of enhanced punctuality and safety of trains besides an increase in throughput of goods trains” he added.
What makes the CTC unique is that, the signalling functions are operated from a centralized location instead of distributed operation from individual stations Amit Malviya Public Relation Officer, NCR
AK Rai Airport Director, Varanasi Reference: Hindustan Times
18
Source: TOI
z East India’s Biggest Port Implements Container Scanning
RBI asks lenders to upgrade ATMs for greater security
Krishnapatnam Port, India’s largest deepwater port on the east coast of India, has installed its ‘Rapiscan Eagle P60’ (Eagle P60) — a drive through x-ray container scanner and radiation portal monitors.
By the end of June month, Tundla railway station would be the first station in the country to have centralised traffic control (CTC) system, to control and operate train operations from one location.
Representative Image
The CTC is being installed in Kanpur-Ghaziabad section of the North Central Railway (NCR), which is one of the most important and oversaturated sections of Indian Railways. On an average, over 400 trains comprising freight, oil tankers and passengers pass via this section of NCR. “The project, being executed at a cost of Rs.40 crore has several important advantages, such as efficient time table management of train operations, up to six train movements on a route at a particular period which would save time and energy, facility for real time detection and online rectification of mistakes if any are committed by controller and various others advantages,” he said.
The drive through container scanner will enable the port to increase the volume of handling import containers by an estimated 5,000 TEUs per month and encourage the movement of transshipment cargo. It is also set to increase the frequency and connectivity of vessels by reducing the dwell time, transaction costs and ensuring timely delivery.
Representative Image
The new container scanner will give a boost to the volume of containers handled as it will increase the speed of inspection, reduce the manual work at the terminal and enhance the efficiency of the entire logistic chain. Krishnapatnam Port is the first seaport in India to procure and install the drive through container scanner at its port. The move will improve the problem of Indian exporters experiencing losses when non-scanned containers are rejected and help in the direct port delivery of import containers, which will tackle congestion at the container terminal and the container freight station. After a rise of 88% in its container handling capacity and 25% in total cargo handling for 2018, the port plans to become a key transshipment hub on the east coast of India. JULY 2018
www.asindia.in
Krishnapatnam has been at the forefront of embracing technological advancements and integrating the most modern port solutions Anil Yendluri
“The CTC will be a game changer for train operations, as it will allow the planning and operation of trains to be done from a centralised location” said General Manager of NCR, M.C. Chauhan. “The benefits of CTC will be reflected both in the form of enhanced punctuality and safety of trains besides an increase in throughput of goods trains” he added.
What makes the CTC unique is that, the signalling functions are operated from a centralized location instead of distributed operation from individual stations
CEO, Krishnapatnam Port Container
Amit Malviya
Reference: Porttechnology.org
Reference: Indian Express
20
Public Relation Officer, NCR
Govt. should build data security frame specific to Indian context : Cisco
Banks must comply with 16 SWIFT security principles by December to avoid RBI action
As Digital services are becoming a large part of every individual’s life and in the light of various instances of data breaches, a regulatory framework to ensure data protection has become more important than ever. And to ensure the information of its citizens are kept safe, the Indian government is looking to formulate its data protection laws to be able to better deliver digital services.
Banks will have to comply with 16 security principles of SWIFT technology by December 2018 to avoid being reported to the Reserve Bank of India (RBI).
As the government works on framing these guidelines, Vishak Raman, Director, Security at Cisco says it is extremely important to have a consolidated 360-degree view of security. For example, when there is a breach of Aadhaar data, the hacks don’t often happen from the central repository of data but from the third-party connections which are there. Vishak says that to be able to secure all links, don’t just look at securing the fort. What this also means is that it’s not the technology, it’s the products, people and processes involved and process is what needs to be worked on. Cisco was part of the feedback that the government took from stakeholders on how the government should look at the framework. Vishak says that just adopting European Union’s General Data Protection Regulation will not help. It is important to look at the framework specific to the Indian context. Cisco has been working with the Indian government and various state governments over the past few years. It has tied up with CERT-In (Computer emergency response team) and has also set up cyber security centres to help monitor threats and train people, including government officials to handle cyber-attacks.
Look at the third-party links, the security of their APIs. The approach should be different from our perimeter approach of a firewall. Have a 360-degree view across security kill chain.
SWIFT, short for Society for Worldwide Interbank Financial Telecommunications, is a messaging system that enables banks and financial institutions worldwide to send and receive information about financial transactions via encrypted codes making the transactions secure. The messaging platform was recently in limelight after it was used to conduct fraud worth Rs.11,000 crore (now risen to Rs.14,000 crore) at the Punjab National Bank (PNB) unearthed on February 14 this year. SWIFT operates in 200 countries and is present in India for 25 years. In India, SWIFT has set up a data infrastructure company as per RBI’s rule that disallows any domestic data to leave the country. Among the recent innovations at SWIFT is the global payments innovation (GPI), launched in 2016, now live with over 60 banks globally; almost five in India have signed up to utilize the technology. GPI enables crossborder payments in seconds along with online real-time information tracker end-to-end to bring in more visibility, speed and transparency.
We are able to see the emerging trends now and basis that we have come up with security principles which is customer security programme. Any bank (across the globe) that wants to connect with SWIFT has to mandatorily comply with 16 security principles and we gave them time till December 2017… Now, we have given them time till December 2018 to comply with the gaps. Kiran Shetty CEO & Regional Head, India and subcontinent, SWIFT India Domestic Services Private Ltd.
Vishak Raman Director-Security, Cisco Reference: The News Minute.Com
Reference:moneycontrol.com
21
Critical Infrastructure:
Achieving Greater Security Alertness
JULY 2018
T
www.asindia.in
he nation's critical infrastructure provides the essential services that underpin the society and serve as the backbone of our nation's economy, security, and health. Critical Infrastructure includes the systems, such as nuclear reactors, dams, public water systems, healthcare, agriculture, and energy, upon which our lives, health, and safety depend. The biggest threat to critical infrastructure security may not be targeted exploits such as equipment destruction attacks but random malware that could inadvertently take down essential systems. A malicious attacker intent on corrupting or controlling these systems could do damage to large population centers that is orders of magnitude greater than stealing social security numbers or money. Just as we all rely on critical infrastructure, we all play a role in keeping it strong, secure, and resilient. Securing and making critical infrastructure resilient is a shared responsibility. By Swati Dhake, Editor, a&sINDIA
22
WAYS IN WHICH CRITICAL INFRASTRUCTURE SITE CAN BE SECURED BETTER According to Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd., “In the Indian context, critical infrastructure security strategy needs to be planned with local risk factors and evolving threats. The critical infrastructure security can be strengthened by an upgrade to the latest technologies in security and surveillance systems, including Artificial Intelligence Applications, AI Cloud Solutions, Face Recognition Solution, Advanced Video Analytics, Drone Cameras and Body Worn Cameras.” He continued, “The critical infrastructure establishments need the latest security and surveillance hardware like Cameras, DVRs, NVRs based on Artificial Intelligence and Deep Learning technologies. They require video management applications with command and control center and quick response mechanism. The solution needs to be integrated with Entrance Automation, Access Control, Perimeter and Plant Surveillance, Vehicle Movement and Identity Management for a secured critical infrastructure.” He further continued, “Critical infrastructure is a key vertical for Hikvision’s thermal cameras, AntiCorrosion Cameras and Explosion-proof Cameras. Thermal Cameras offer customised solutions for critical infrastructures. The potential users of thermal cameras include transportation (airports, ports and rail), energy (oil and gas facilities), grid protection (electrical power plants, substations and nuclear power), and government (border protection).” Robbin Shen, Managing Director, Dahua Technology India Pvt. Ltd cited, “Well, the critical infrastructure site can be secured better by regular upgradation of technology, strict enforcement of
policies, constant vigilance, hiring the best professional in the security industry, offering regular training to those involved in manning, monitoring, maintaining and managing various sites. By working closely together both with inter and intra departments and units , by broadening security expertise, and by conducting joint cyber security projects, industry , academia and government can gain sufficient exposure and experience to tackle bigger challenges. Embracing security automation strategies is one way to give better security.” He continued, “Deploying anti-malware software, breach detection system and ensuring basic security measures in between network segments, such as firewalls/IPS in between the business network and the ICS network. Education, multi-layered security and strong legislation and enforcement will go a long way in providing better security.” According to Aditya Khemka, Managing Director, CP PLUS, “To be able to secure a critical infrastructure better it is important to choose the right product for the right place. There should be balanced approach to designing a security solution for a critical infrastructure to ensure effectivity and efficiency, where systems such as access control, alarm systems, fire systems, etc. all are integrated so as to provide complete security. There should also be a health monitoring system to ensure the functioning of all devices, reduce downtime and keep the system up and running at all times.” According to Sharad Yadav, General Manager, Buildings, Honeywell Home and Building Technologies, India, “There is a huge potential in securing India’s critical infrastructure and facilities. Rapid urbanisation of Tier II and Tier III cities, government initiatives such as smart cities, investments in public infrastructure, increasing crime rates, data thefts, and increasing security awareness are boosting the market for security products and solutions. Digital is raising requirements with focus on connected offerings.” He continued, “The most effective security systems provide actionable intelligence — bringing together the right combination of existing and new technologies into an integrated solution that connects all critical systems and processes to deliver real-time information for actionable outcomes.” He further mentioned, “Honeywell continues to invest in advanced technologies such as Pro-Watch integrated suite which integrates closed-circuit televisions, access control, intrusion alarm and video analytics, unified command and control center, and emergency response ecosystem to drive Connected Buildings. Pro-Watch is a distributed system designed for large
[
The critical infrastructure security can be strengthened by an upgrade to the latest technologies in security and surveillance systems Ashish P. Dhakan MD & CEO Prama Hikvision India Pvt. Ltd.
23
scale multi-level management and cross functional networks with integrated MAXPRO VMS based video surveillance that has been developed through rigorous testing and validation to deliver exceptional benefits.” According to Jatin Desai, Marketing Manager, Matrix Comsec Pvt.Ltd., “Energy, Defense and Transportation are considered among the components of Critical Infrastructure. They form the backbone of a nation’s economy and security. Looking at the rising threats of vulnerabilities, protecting our critical infrastructure requires implementation of new technologies. There is no “all – in – one” concept when it comes to protecting critical infrastructure. • It is important to have reliable surveillance and video monitoring tool for three dimensional security that is persistent, proficient and preventive. Apart from system dependency, it is vital to ensure that personnel are intact and available 24*7 to monitor and manage the system effectively. • When designing an enhanced security solution for critical infrastructure facilities, one needs to be prepared for all sorts of threats strengthening the resiliency. A well-integrated Intelligent Video Analytics like Motion Detection, Intrusion Detection, Trip Wire, Face Detection, Access Control, etc. must be implemented to ensure the real-time preventive security. More and more security solutions must be implemented to reduce the risk of vulnerabilities.” According to Sudhindra Holla, Sales Director India & SAARC, Axis Communications, “When it comes to safeguarding a critical facility, you need to be prepared for all sorts of threats be it natural or man-made. Critical infrastructure is the backbone of our nation's economy, security, and health. Installations in this sector include Energy and Power, Forest and Highways, Telecommunications and Oil and Gas. Everything from incidents and theft to terrorism and natural disasters can cause process disruption and safety hazard. An intelligent surveillance system is required to provide superior protection and situational awareness, which can provide intelligence and help mitigate risks and potential liabilities.
[
Modern HDTV security cameras from Axis, includes multiview streaming that allows a single high-definition camera to function as multiple cameras, and digital PTZ functionality which allows the viewer to zoom into vital areas to properly interpret a suspicious event.
According Vishal Sanghavi, “We can use IoT and AI technologies to secure better existing critical infrastructure sites. Increase the awareness of the latest trend of threats and preventions measure to the organisation. Take help of consulting professional about analysis and report which can help to release grant from management. It can help them for external funds required to bring sustainability into the operation and profitability of the organisation. Take help of academic talent for initial analysis and continue training the team taking into regular practice including supervision. It can partially adopt new IoT based infrastructure even SaaS model. The system should be placed as per users profile and try to make it a seamless operation so that actual benefits or purpose can be delivered. Protecting people is most important during a disaster so it is important to educate them for self-protection during any critical situation. Need industryfriendly cross-border trade policy as this industry requires hardware resources which need to be procured from outside until our country can build expertise which may take another 5-7 to years. Encouragement for best practice by the government as some of the public critical infrastructures needs a self-revenue business model for operation. SOME OF THE KEY CHALLENGES OF CRITICAL INFRASTRUCTURE SECURITY According to Ashish P. Dhakan, “The 26/11 terrorist attack in Mumbai forced the government and central security agencies to rethink India’s critical infrastructure security framework. Critical infrastructure is the backbone of our nation's economy, security and health, it needs to be secured by all means necessary. As the IoT (Internet of Things) enabled connected devices are becoming an integral element in our critical infrastructure, the risk of cyber-attack and its prevention is going to be a mission critical challenge.
JULY 2018
www.asindia.in
The emerging security threats to India’s critical infrastructure are terrorism, insurgencies, political unrest, growing militancy, sectarian violence, communal conflicts, rising crimes and cyber-attacks Robbin Shen Managing Director Dahua Technology India Pvt. Ltd.
24
The Banking, Financial Services and Insurance (BFSI) sector also an important part of critical infrastructure. The BFSI sector needs to be protected from all vulnerabilities emanating from Data security and physical security perspective.” He continued, “The vehicle and human traffic movement data need mission critical monitoring, any negligence can lead to fatal breach and attack on Critical Infrastructure. These are a high risk area and have outdoor locations. So there is always need for solutions to cater to the specific requirement. The key challenge is to secure transport networks on land, air and sea. Airports continue to be a soft target for terrorists due to heavy passenger traffic. Seaports play a very important role in the international sealand transport chains and have a strong effect on the efficiency of foreign trade. Moreover, the protection of seaports constitutes and important element of the general concept of crisis management of local, regional and international levels. In recent years, both by adopting the directive on enhancing port security, and the International Maritime Organization, by preparing the International Ship and Port Facility Security (ISPS) Code, has paid special attention to the protection of seaports against any incidents endangering their security.” According to Robbin Shen, “The key challenges include lack of skilled manpower, legacy technology, inadequate resources, cumbersome procedures, absence of clear cut policy framework, want of coordination, complex environments, command & control complexity, lack of close cooperation among all entities involved, privacy and law enforcement issues, budget constraints and severe and abnormal weather conditions.” According to Aditya Khemka, “Considering the dependence on critical infrastructure, the destruction or incapacitation of even one of them can have a debilitating effect on the country’s security, national public health and safety, and economy. The key challenges to ensuring the best for critical infrastructure include Crime prevention, Industrial process monitoring, Traffic monitoring, Transport safety and Surveillance.” According to Sharad Yadav, “The Indian market for critical infrastructure security is fast changing with new technologies being introduced, coupled with technological advancements towards integrated, software-based analytics solutions to effectively protect critical assets and life. One of the challenges in ensuring safe and secure critical infrastructure is the selection of the right, open and scalable integrated security platform designed
Aditya Khemka Managing Director CP PLUS
[
To be able to secure a critical infrastructure better it is important to choose the right product for the right place
25
for todays’ as well as future expansion requirements. Each critical asset and facility is unique. To ensure their security, the needs of various stakeholders (developers, tenants, occupants, citizens, government, others) is considered and the accountability responsibility matrix is clearly laid out for execution.” According to Jatin Desai, “The key challenges to protect critical infrastructure are to identify the scenarios that lead to a security breach. Cyber terrorists are now rapidly shifting their focus towards critical infrastructure and strategic industries to bring down the nations by causing deadly damage. Although most respondents agree that threats to organisations are on the rise, they maintain a high degree of confidence in existing security solutions.” • Development of Effective Information Sharing Mechanisms • Lack of Intact Personnel to Monitor, Maintain and Manage Protection of Critical Infrastructure (24*7) • Hindrance in Effective Partnerships between Government and Private Sector According to Sudhindra Holla, “The critical infrastructure facilities are vulnerable to a very unique set of challenges and the impact of a security failure can cause panic, lead to human lives and harm the economy. Often the topography restricts the use of resources leading to increase in the response time to alarms. Upcountry locales may make human intervention challenging if not altogether impossible and in turn these become blind spots for easy attacks. India is still a very cost sensitive market and we need to encourage our end users to think beyond. A comprehensive solution is needed that is cost effective, fully scalable with increased surveillance along a perimeter. Not only does implementing robotic guards allow for a more cost-effective plan for protection, the added security can help boost productivity.”
[
He continued, “Axis has a legacy of products that are easily compatible with existing operating systems, advanced technology and new techniques such as facial recognition and high definition video have allowed critical infrastructure facilities to be secured without reducing accessibility.” According Vishal Sanghavi, “Some of the Key challenges are less efficiency, lack of better connectivity, customised industry-specific solutions, cyber threat, awareness of new technology and its adoption. Another challenge is the absence
of a market place for professionals that would help to connect emerging players with customers. Networking hardware may contain malicious hardware or firmware code. Average security in cloud infrastructure can be the attractive target for a hacker. Academic absence to this subject creates a shortage of skill talent.” THE EMERGING SECURITY THREATS TO INDIA’S CRITICAL INFRASTRUCTURE According to Ashish P. Dhakan, “The emerging security threats apart from the traditional ones to Critical Infrastructure, include Cyber Attacks, Terror Strikes, Improvised Explosive Device (IED) attack, Drone Attack and Social Unrest (Caused by rumours and fake news or unverified video on social media). The other potential threats include Chemical, Biological, Radiological, and Nuclear (CBRN) attack. The highly sensitive critical infrastructure installations must have Chemical, Biological, Radiological, and Nuclear (CBRN) defence systems.” According to Robbin Shen, “Well, the emerging security threats to India’s critical infrastructure are terrorism, insurgencies, political unrest, growing militancy, sectarian violence, communal conflicts, rising crimes and cyber-attacks.” According to Aditya Khemka, “The very fact that Critical Infrastructure forms the backbone of a country makes it vulnerable to a host of threats, including intrusion, tampering, theft, and terrorist activities. In fact, there has been a significant rise in terrorist threats on critical infrastructure over the past decade. Hence, it has become extremely important to secure critical infrastructure and assets.” Sharad Yadav mentioned, “India has seen a heightened need for better security and safety standards across various critical facilities. Modern IP technology can enable effective
JULY 2018
www.asindia.in
The most effective security systems provide actionable intelligence bringing together the right combination of existing and new technologies into an integrated solution Sharad Yadav General Manager - Buildings Honeywell Home and Building Technologies, India
26
and manageable video surveillance to protect people, their information, and their properties and help ensure non-stop operation. It can also create potential for enhanced security and safety benefits for our society to prevent costly security incidents. However, the cyber security of IP technology has been challenged by the pace of technology transition and development, creating potential safety and economic risk.” He continued, “When the critical infrastructure industry is transiting to more and more IP technology driven business, the software development to mitigate lastest cybersecurity threats is essential part of the development process and Honeywell has several global technology centers contributing to industry leading cyber secured software platforms.” He further continued, “In the present day world, most critical infrastructure facilities are equipped with standard security products and technologies. Standalone multiple subsystems installations have their own limitations which includes correlated alarm information, lack of information exchange between regions or sectors are some of the potential issues that jeopardize the security operations of these sites. In situations like these, it becomes extremely pertinent to implement centralised connected security solutions that would help urban planners adopt a more integrated approach towards designing and planning the perimeters of a city.” According to Jatin Desai, “Cyber Threats are continuously threatening public infrastructure in India. The community of cyber criminals and hackers has become more sophisticated, which influences the vulnerabilities of our infrastructure. Critical infrastructure faces both traditional threats as well as industry specific security threats. Traditional threats such as physical and military attacks and digital threats of cyber security breaches can be termed as emerging security threats.” According Vishal Sanghavi, “The digitalisation process of Indian organisations has given rise to more challenges of security based on its people handling, lack of productivity, integrity, cyberattack, absence of standardising a protocol for better governance. Only few critical infrastructure organisations are up for taking such challenges and opportunities.” THE SECURITY TRENDS WITHIN INFRASTRUCTURE INDUSTRY
THE
CRITICAL
According to Ashish P. Dhakan, “The situational awareness has become a leading consideration in the protection of critical
Jatin Desai
Marketing Manager Matrix Comsec Pvt.Ltd.
[
Looking at the rising threats of vulnerabilities, protecting our critical infrastructure requires implementation of new technologies
27
infrastructures. In critical infrastructure, the security trends move forward to adopt Physical Security Information Management (PSIM) System, UAV (Unmanned Aerial Vehicles)- Drone, Thermal camera, Command and Control setup, Facial Recognition and AI based advanced video analytics solutions.” He continued, “PSIM solutions seem to be the answer to the demand of centralized management systems, offering efficient threat-response procedures. Furthermore, PSIM software is able to integrate systems — such as perimeter, intrusion/ motion detection, video surveillance, access control, fire alarm, mass notification systems, audio, gas detection, radio communication, Internet, IT, and building automation — both legacy and new, making them interoperable on the same interface and works with supervisory control and data acquisition (SCADA) systems.” According to Robbin Shen, “Artificial Intelligence, Augmented Reality, Machine to Machine Sharing, Drones Operated Surveillance, Robotics, highly interconnected information and communication technologies, Internet of things (IoT) applications and multisite monitoring are the trends that are taking place within the Critical Infrastructure segment. Also, rise in user awareness will lead to standardization and make authorities to come out with better industry regulations.” According to Aditya Khemka, “Electronic security has advanced significantly over the past few years, not only making video surveillance accessible, but offering a host of additional features that make monitoring and analysing video easy. The latest trends in electronic security for critical infrastructure include face recognition, ANPR, Thermal Cameras, Explosion proof cameras, UVSS, Integrated VMS platform, and SDK integration to integrate with 3rd party software.”
[
According to Sharad Yadav, “Today, advancements in security innovation are driven by technological development in both software and hardware. IoT is driving the need for edge based devices interconnectedness to central intelligence/ analytics hub. As far as technological changes within security products, we see these key trends.” • Continued convergence of analog systems with data transmission on analog cables to TCP/ IP data packet. This is now evolving from structured cabling to wireless communication.
• Convergence of data storage from being stored in discreet hardware locally to moving to cloud architectures in which the information is stored in server farms that are in the premises or served up from a third-party cloud provider. • Data security becoming paramount as we see the ability for data theft to occur more easily and the need for higher data encryption between edge devices such as cameras to the video management software and storage. • Increasing adoption of IoT and cloud hosted applications to increase scalability of system • Greater integration with other sub systems like fire detection, access control, intrusion alarms, etc • Data science that allows for better analytics to know the vulnerabilities of a site, and as a result its ability to clearly show (from a risk mitigation perspective) the weakest security area or the probability of an internal or external threat to occur. Leveraging the cloud, SaaS and app based solutions ecosystem to monitor and manage security and safety to enable anytime, anywhere access and on any device. He continued, “In addition to these major trends, we see a constant upgrading of some security technologies such as CCTV. We see continuous enhancement to megapixel from low resolution, improved compression technology that allows more data, more storage capacity, and overall lowering of cost for storage recording devices. Honeywell has the broadest, most robust selection of security solutions. The reliability, integrity, and dependability of Honeywell’s security solutions ensures meeting existing and future security challenges with complete confidence.” According to Jatin Desai, “Many opportunities continue to exist with the growing awareness about security in India along with governmental influence to secure critical infrastructure against emerging threats. Our way of lifestyle is
JULY 2018
www.asindia.in
When it comes to safeguarding a critical facility, you need to be prepared for all sorts of threats be it natural or man-made Sudhindra Holla Sales Director – India and SAARC Axis Communications
28
interlinked with the critical infrastructures that supply public safety, health, power, transportation, water and more. Following are the security trends that are being noticed. • Smart Cities Project (Developing 100 Smart Cities by 2022) Gaining Attention of National and International Business Community • Internet Access Across Rural and Urban Regions of India • Digital Lockers for Verifying Documents • More Cashless and Electronic Transactions • Adaption of E-governance • Exponential Growth for Internet of Things (IoT) Moreover, with consistent innovation in technology we can expect good market for security solutions in India. While an attempt is being made to secure India's critical infrastructure, there are huge gaps in understanding the components of critical infrastructure and execution of planned strategies.” Sudhindra Holla mentioned, “According to an IHS report India’s market for network video cameras is estimated to reach USD 194.7 million by 2020. We see a paradigm shift to IP adoption. The next decade will see proliferation of IP based video surveillance systems which will replace analog systems.” He continued, “There’s a growing requirement to have better cameras which provide higher image clarity with increased bandwidth. In fact both go hand in hand. A security solution should be end to end that stores evidence for a longer period and provides HD image clarity. Advancements in areas such as video analytics, compression and data analytics enabled end users to begin leveraging video beyond traditional security applications. We expect this trend to continue as the market finds new uses for video storage, and integrators build out their service portfolios.” According to Vishal Sanghavi, “Security trends within the Critical Infrastructure Industry are:” • All new technology will use IoT structure, so the quality of secure communication infrastructure is upgrading. • Virtualisation and mobility make infrastructure more competitive, thereby increasing the threat of cyber-attacks and system malfunctions. • One should ideally apply data encryption techniques before cloud storage. • SaaS model helps for faster adoption across the globe. • The industry has started to give a rating to the organisations to improve their standardised protocol. • Adoption of better mobile security to prevent International collaboration has also been helpful in improving cyber resiliency.
Vishal Sanghavi Founder & CEO NET2POINT
[
We need to bring more investment into this industry for rapid implementation with the creation of customized smart solutions, awareness and building SaaS model for building trust in the market
29
Growth in the smart stadium market is being attributed to factors such as a rising focus on enhancing fan engagement and offering an unforgettable customer experience, the report stated. In order to reach such goals, however, there is a need for smart technologies. Additionally, an increasing frequency of upcoming sport events across the globe and government initiatives for smart building projects are also driving market growth.
JULY 2018
www.asindia.in
T
he Internet of Things (IoT) has been a catalyst for new technologies.In fact, increasing adoption of IoT is one of the major drivers for smart stadium growth globally. According to a report by MarketsandMarkets, the global smart stadium market is expected to increase from US$4.6 billion in 2016 to $17.3 billion by 2021, at a CAGR of 30.2 percent during the forecast period. Regionally, Europe is leading the smart stadium market in terms of market share.
30
Keeping stadiums safe, however, is a challenge. Despite the efforts of even the best traditional security technology, in today’s world, it’s just not enough. Although no technology can predict or prevent an outside attack from happening, stadiums can now use new technologies alongside traditional ones to maximize their efficiency when responding to such events.
owners and their team are selecting a single point of responsibility for technologies early in the process.” The Johnson Controls process of technology contracting involves assigning a single point of responsibility upfront to bring an enterprisewide perspective to managing the planning, design, installation, integration, commissioning and service of technology systems, business applications and supporting infrastructure. “Technology contracting can save time, reduce risk and decrease construction and operating costs while ensuring that technology is deployed and integrated in an orderly manner to achieve desired outcomes,” Monaco said.
Looking for Faces in a Crowd With up to 100,000 people crammed together in one space, the deployment of effective crowd management technology could be crucial to identifying unwanted persons. In fact, according to a report by KBV Research, the global crowd analytics market is expected to grow at a CAGR of 25.9 percent from 2016 to 2022, and is forecast to reach a market size of $1.5 billion by 2022. “This technology informs users on how large venue crowds may react when an incident occurs which requires emergency evacuation or sheltering in place,” explained Jeffery Miller, SVP of MSA Security. “This information can greatly aid event planners and security personnel in understanding where to deploy staff and how to communicate effectively in an emergency.”
Maximizing Technologies More important than a single technology to address security concerns is implementing a process to address the holistic technology needs and desired outcomes for the stadium as early as possible, inclusive of security requirements, according to Hank Monaco, VP of Marketing for Building Technologies and Solutions at Johnson Controls.
Herta Security’s crowd management software detects multiple faces in real time over multiple video surveillance cameras and is very tolerant to changes in illumination, pose and partial face occlusions, which are the main factors involved in a crowded stadium environment. The software, according to Laura Blanc, International Marketing Executive at Herta Security, is optimized for GPU architectures, works many times faster than traditional systems (up to 600 fps), and works with very high-resolution IP cameras and video streams. The technology is fully automatic and non-invasive and works properly on changes of facial expression, illumination, beard, eyeglasses, scarves and caps.
“Constructing a smart stadium that meets energy, technology, security and operational objectives depends on early collaboration between the owner, design and construction teams, sharing informed, data-driven decisions about connectivity, security and interoperability,” Monaco explained. “With deliberate expert attention applied early during the planning phase, pitfalls can be avoided and the security needs of the stadium can be met. This is why, increasingly, stadium
31
“Every time there is a ‘match’ it means that there has been a coincidence withthe person previously registered in the database and the one that has beendetected. Our software can send instant alarms to tablets or smartphones, and istotally scalable in terms of numbers of cameras, database size and multiple sitesand installations,” Blanc explained. By using cameras integrated with access control systems located at the mainentrance door to a stadium, Herta’s software can identify a certain subjects andblock access if there is a match. Blanc noted how face recognition is a perfect complement to an alreadyexisting surveillance system, providing both security and enhanced customer experience in real time. “Facial recognition can also be used for forensic search of recorded data — hence data does not necessarily have to be live. Our facial recognition solution integrates with access control systems, and it is a highly reliable way of automating entry access,” she said. “Matching live images from security cameras toward a watch list or black list of specific individuals, our solution smoothens security processes and also helps through automatic alerts.” The facial recognition market size is estimated to grow from $3.4 billion in 2016 to $6.8 billion by 2021, at a CAGR of 15.3 percent from 2016 to 2021, according to a report from MarketsandMarkets.
Protecting Stadiums Against Drones Several drone incidents at stadiums have led to a heightened interest in anti-drone measures and a general need for better aerial protection. Drones have become a nuisance and even a security concern at stadiums. In May of this year a drone crash landed at Petco Park, San Diego, California, during a Major League Baseball game. While no one was injured, this incident only further highlights the possible dangers posed by drones. One way to manage such threats is with drone detection software. “Stadiums remain to have excellent protection from ground based threat, but little to no protection from aerial threats, such as drones,” said Oleg Vornik, CEO and MD of DroneShield. “The drone technology evolves quickly, and packed locations represent prime opportunity for terrorists, but also competition spying on sports team practices, fans filming games and infringing on TV networks rights, and endangering players and public.”
JULY 2018
DroneShield offers DroneSentinel, a hardware and software system that can detect incoming drones using a combination of radar, radio frequency, acoustics, thermal and optical cameras; it can also combine with jamming to neutralize a drone where legal for the venue’s security. In fact, DroneShield has been working with Boston Police to provide drone security to the Boston Marathon for last three years.
www.asindia.in
DroneShield’s anti-drone technologies integrate via a common API protocol to the main security control centers of a stadium. By utilizing a common API protocol, it gives it the ability to integrate with more custom systems as appropriate. The system provides an advanced warning with a detection and location service for an intruding drone, allowing for a timely reaction of relevant authorities.
32
Social Media Monitoring Social media monitoring services came under fire in the fall of 2016 when Facebook, Instagram and Twitter all cut access to well-known social media monitoring firm Geofeedia. At the time, the service had been revealed by the ACLU as a tool being used by the government to track in real-time protests. Still, though, Miller noted that “social media intelligence is gaining more widespread support as an effective tool to better understand potential threats to a facility, the players/performers or fans.” In its resource guide for best practices in anti-terrorism security for sporting and entertainment venues, the Command, Control and Interoperability Center for Advanced Data Analysis (CCICADA) states, “The use of social media for stadium security is growing rapidly and new uses are still developing. Social media may be an effective way to distribute pre-event information updates to patrons expecting to attend an event. Following an event, social media may present efficient ways to collect data concerning patron satisfaction and fan experience.” The CCICADA also highlights the use of social media feeds as useful investigative or security risk tools. “Crowd sourcing through social media provides a method to obtain situational information and awareness that otherwise might not be easily available,” it said. Aside from security, the use of social media intelligence is also great way to engage event goers and an important tool for brand marketing. Getting More Intelligent Stadiums will continue to get smarter as more and more advanced technologies reveal their usefulness. Furthermore, artificial intelligence and machine learning have become increasingly important in the security market, and as such, will also find a place in stadium security.
33
Identity Management Systems add to the Business Value I JULY 2017 JULY 2018
dentity Management platform is now an automated tool that enables officers to streamline and accelerate processes, delivering exponential cost savings and faster time-to-value across the enterprise while manual systems would take hours. With cloud-based identity management systems a single sign-on and automated provisioning remove a lot of the manual vulnerabilities and centralise management of the user life-cycle. The major driving factors in the market are, rising security concerns with existing models across the globe, growing demand for block chain identity solutions across industry verticals, for self-sovereign identification, and easing the business functions through hightransaction speed and immutability.
www.asindia.in www.asindia.in
By The Editor, a&sINDIA team
34
The different types of Identity Management Systems According to Robbin Shen, Managing Director, Dahua Technology India Pvt. Ltd, “Nowadays there are various types of Identity Management Systems. They are Face Recognition, Voice Recognition, Access Control, Biometric Authentication, Fingerprint Scan, Iris Scan, inserting a smart card or USB stick, User Name & Password, Receiving Code via SMS to a Smart phone, Risk-based authentication (RBA), User behavior analytics (UBA), Single sign-on (SSO), Security Principal, Digital Identity with one or more credentials that can be authenticated and authorized to interact with the network and Mobile Device Management.”
A robust IMS solution can ease management pains, streamline provisioning & de-provisioning, and boost user productivity, while lowering costs, reducing demands on IT, and providing the enterprise with comprehensive data to assist in complying with regulatory standards Robbin Shen Managing Director Dahua Technology India Pvt. Ltd.
According to Yogesh Dutta, COO, CP PLUS, “Facial recognition system is one of the latest technologies in identity management system that has taken the industry with storm. While it is primarily used to identify faces and facial expressions, when combined with AI and Deep Learning it can provide progressive accuracy in identifying and analysing individuals and their expressions. Besides this the latest Aadhaar enabled biometric system offers a credible approach to identity management by authenticating entries from the Aadhaar database. This intuitively plugs the loopholes of the traditional biometric systems which are susceptible to forgery. Retina scan is yet another identity management solution that maps and traces the unique pattern of a person’s retina for authentication. Though it is widely being used globally owing to its highly credible authentication factor, it is yet to catch momentum in India.” According to Nilmani Kumar, Product Head- Access Control, Prama Hikvision India Pvt. Ltd., “Identity Management majorly can be defined in two parts, Identity Management for Physical Access Control and Identity Management for Online Applications. In terms of physical access control it enables the Right Individuals to access, the Right Resources at the Right Time and for the Right Reasons. Physical Access Control focuses on Authentication and Authorisation. Authentication is any combination of the 3 factors which are “What you know – Password”, “What you have – Token, Smart Card”, “What you are – Finger, Vein, Palm, Face, Iris”. Authorisation defines the rights and role of the individuals that is majorly “Where to get the Access”. “Identity Management for online application enables the rights of an individual to access the resources, application,
35
network, cloud, ERP, Employee Self-service etc” Nilmani Kumar, Product Head- Access Control, Prama Hikvision India Pvt. Ltd. Benefits of Identity Management System According to Robbin Shen, “Well, the Identity Management System (IMS) has many benefits such as enhanced security, efficiency, simplicity, increased productivity, cost reduction, regulatory compliance, proof of evidence, speed, convenience, accuracy, collaboration and information sharing among business units and efficient access provisioning process. A robust IMS solution can ease management pains, streamline provisioning and de-provisioning, and boost user productivity, while lowering costs, reducing demands on IT, and providing the enterprise with comprehensive data to assist in complying with regulatory standards. It facilitates quick access to bona fide employees, partners, contractors, or guests—and easily revokes or denies privileges to unauthorised users. It can ensure reduced risk of internal and external breaches.”
Facial recognition system is one of the latest technologies in identity management system that has taken the industry with storm
Yogesh B. Dutta JULY 2018
COO CP PLUS
www.asindia.in
36
He continued, “A central database which stores relevant information about identities and their attributes which can be used by all systems of access management to gather business intelligence and improve information security. the IMS benefits include system integration and efficacy in application development, deployment and management by obviating the need for duplication and proliferation of vulnerable systems.” According to Yogesh Dutta, “Probably the biggest advantage of identity management system is improving the user experience. Since they work around unique characteristics of an individual and allow access only when they match, they save users the task of having to save multiple passwords at a time. Time tracking of individuals such as monitoring the attendance and entry/ exit times of employees simplifies auditing and reporting, and tracking of a dubious persons and mischief makers in any given environment. Identity management system can also be integrated with other applications to automate processes. And thanks to technological advancements, overall, the kind of security profiles that can be deployed for authentication has increased considerably.” According to Nilmani Kumar, “The Identity Management improves operational efficiency, where a centralised system manages your complete Identity management so the process of new role creation, role transfer will be very easy. It reduces time to deliver applications and services so as an organisation, it makes huge resource cost saving. It enhances security and
meets the regulatory compliance issues, which gives more power to audit. In addition to managing employees, the use of identity management along with access management enables a business to manage customer, partner, supplier and device access to its systems and premises while ensuring that security remains the top priority.” Ways to improve the Identity Management System According to Robbin Shen, “By regular reviews of server settings, inventory and password policies, having more than one authentication system, developing a data bank, deploying video analytics and face recognition solutions, implementing an Identity PMO, making a Managed Service Provider as a strategic partner and eliminating high risk legacy systems are some of the available avenues to improve Identity Management Systems. Scanning process enables to know about the robustness of all applications in use which in turn allows the enterprise to improve the Identity Management Systems and enhances the level of efficienty and security.”
Identity Management for online application enables the rights of an individual to access the resources, application, network, cloud, ERP, Employee Self-service etc Nilmani Kumar Product Head- Access Control Prama Hikvision India Pvt. Ltd.
According to Yogesh Dutta, “Take stock of the administration level challenges from developers, DBAs, and security managers; reevaluate retention and business data classification policies and procedures; consult security and internal audit people for ideas on improvements; document and update standards and policies from time to time to identify and plug in loopholes. Further, adopting Artificial Intelligence coupled with Deep Learning can also help improve Identity Management systems considerably.” According to Nilmani Kumar, “The right steps at the right time can give a robust Identity Management System.” He stated the ways to improve: • Monitoring End of life systems, which restrict any possible breach of the system. • Open Standards Lead the Way – an open system gives freedom to change the application or services at any point of time so it should be in a checklist at the time of new system implementation. • Removal of overlapping systems and manual processes, which can cause unseen threat. • Strong architecture and strategy before implementation of any new Identity management system. • Focus on end-to-end user experience, where need to check the user friendliness of the system.
37
From the armed forces to the real estate businesses to sports, drones have found applications in almost every sector. It is not uncommon to see drones with either built-in cameras or camera mounting options. Some even offer extras like night vision and thermal tracking. The Drone cameras are used for aerial photography even. The feedback is given to computers which is used for orientation, navigation and recognition to implement obstacle avoidance. JULY 2017 JULY 2018
When you're on the move, a body worn camera is an ideal, hands-free way to film. Body worn cameras can record an event such as a concert or festival or extreme sports such a hiking, cycling, or climbing adventure, there are body worn cameras that are designed to meet various needs. Some users want to wear body worn cameras in order to record evidence as well.
www.asindia.in www.asindia.in
Concealed wireless - covert cameras are ideal for undercover surveillance and investigations, even in low light conditions. Disguised as rocks, electrical boxes, plants, and more, there are outdoor hidden cameras that provide top-notch property security to homes and businesses alike. By a&sINDIA team
38
I
nnovations in the Drone Cameras/Body Worn Cameras/Covert Cameras of the Critical Infrastructure specific applications
According to Yogesh B. Dutta, COO, CP PLUS, “Drone cameras have evolved in design and features. The latest developments include improved sturdy designs, powerful battery support, GPS positioning system, thermal and optical image sensor support, increased transmission range of up to 10kms and more. While Body Worn cameras have been around for a while, the latest ones are now equipped with 4G, Wi-Fi and GPS which allows remote monitoring, live location tracking using Google map and more. They sport a rugged design that makes them more sturdy and durable and offer expandable storage of up to 128GB that supports SOS and GPS loss alerts. Covert cameras have also advanced considerably over time, offering high resolution imagery of up to 4MP; compact build; Smart Analytics such as Face Detection; Trip Wire, etc.; and Wide Dynamic Range (WDR) for better image quality in varying light conditions.” According to Robbin Shen, Managing Director, Dahua Technology India Pvt. Ltd, “Well, Drone Cameras, Body Worn Cameras and Covert cameras are now equipped with rich features such as Automatic Number Plate Recognition (ANPR), Thermal Cameras to get a long-range view to monitor, GPS to find exact location and 4 G module for live transmission. They are also enabled with high definition surveillance, getting real-time information and real-time video analytics scanning, storing, and analyzing the face of an unknown suspect.” According to Vinay Mishra, Vice President – Projects, Prama Hikvision India Pvt. Ltd., “A drone camera can be defined as a camera specifically designed to be mounted on a drone for capturing videos in a particular operation. Drones equipped with cameras are increasingly being adopted across commercial, military and homeland
security end-users. The major applications of drone cameras are thermal imaging and surveillance. These drone cameras are used across commercial, military and homeland security end-users. Body Worn Camera or wearable camera is a wearable audio, video surveillance recording system. Covert Camera is suitable for professional evidence gathering, time and date stamped recordings.” He continued, “The critical elements of national infrastructure (facilities, systems, sites, property, information, people, networks and processes), can add more security through drones, body worn cameras and covert cameras besides the standard physical security mechanism of Video Surveillance, Access Control and Perimeter Security." He further continued, "Critical infrastructure is multidimensional and so are the applications that drones can bring to address some of the challenges encountered in this environment. For physical sites drones can be used to easily and quickly inspect the infrastructure to determine maintenance issues before they occur. Additionally, a full range of survey data capture activity can address the geospatial needs of the site.” He further continued, “Another important use for drones at critical infrastructure sites is that of physical security. Drones can be employed in monitoring, remote sites or where there are long linear barriers to routinely patrol in support of the overall security task. In the latter case, a drone can cover vast amounts of linear features in a short space of time, much more than if it were being patrolled by a human on foot or even in a vehicle. Drone applications include, Risk Assessment, Perimeter Control and other Security Officer Situations, Inspection, Executive Security, Securing Remote Assets, Safety, Emergency Relief and Cost Savings.” He added, “Rugged, wearable body cameras record activities of critical infrastructure employees, visitors and authorities
The applications of Drone Cameras/Body Worn Cameras/Covert Cameras have increased considerably because of their unconventional functionality. They are largely being adopted by government bodies and in critical applications where conventional cameras aren’t feasible Yogesh B. Dutta COO CP PLUS
39
as they happen. Their advanced technology, portability, and ease-of-use make them extremely effective companions for mobile enforcement. Equipped with GPS locators, security control room officers know where the emergency exists as it happens. These cameras build forensic evidence with safely stored data, and play back video footage clearly and accurately. Protect people, Critical Infrastructure Installations and security troops with wearable video recording devices.” Trends in the Drone Cameras/Body Worn Cameras/Covert Cameras‘Market According to Yogesh B. Dutta, “The applications of Drone Cameras/Body Worn Cameras/Covert Cameras have increased considerably because of their unconventional functionality. They are largely being adopted by government bodies and in critical applications where conventional cameras aren’t feasible. Drone cameras are increasingly being considered for border areas, body worn for Special Forces, and covert cameras for banks and retail stores. While the market for these cameras significantly developed and advanced globally, in India it is still in its nascent stage but quickly catching winds.” According to Robbin Shen, “Drones with thermal cameras, drones with sensing capabilities, 4k video recording, modular drones, mobile operated drones, implementation of Virtual Reality (VR) and Augmented Reality (AR) on drones are the trends evolving both globally and in India. As for the body worn cameras / covert cameras there have been an increasing number of types. They include a simple pen, or a ring, or a belt or a shirt button which looks innocently but takes the pictures of the surroundings.”
"Global Drone Camera Market, Analysis & Forecast, 2017 2021", the global drone camera market is expected to reach US$19.25 billion by 2021." The key trends in Drone Cameras market: • Drone detection technologies: According to top video surveillance trends by IHS Markit, Drone detection technologies will be one of the latest trends to watch for. Consumer drones are readily available for just a couple of hundred dollars and flown by anyone, with no prior training and without a license. Thus, the problem of drones in restricted airspace has become an increasing concern. Given the large physical area these restricted airspaces covers, simply being able to identify a nearby drone has proven challenging. Recent developments in drone detection technology mean that anyone wanting to secure a perimeter in 2018 will have to take into account the threat from above. • Mass adoption of Drone Cameras at Security and Emergency Response Operations: Drone Cameras have provided an incredible example of how significant an impact they can have on many industries, specifically law enforcement, security, and first response. • Increased Regulation: Though often associated with limiting growth, the regulation of drone cameras will lead to more professional use of the technology and address concerns over privacy, safety, and national security. • Drones-as-a-Service (DaaS): The year 2018 is set to see the introduction of DaaS: Drones-as-a-Service. Drone Cameras in DaaS will drive the security and safety segments in the civilian applications, including Critical Infrastructure Security. • Drones Enabling Big Data: Drone technology has a variety of uses for companies across many different industries, with the ability to gather data in a fraction of the time.
Vinay Mishra mentioned, “According to a new market intelligence report by BIS Research, titled
JULY 2017 JULY 2018
Drones with thermal cameras, drones with sensing capabilities, 4k video recording, modular drones, mobile operated drones, implementation of Virtual Reality (VR) and Augmented Reality (AR) on drones are the trends evolving both globally and in India
www.asindia.in www.asindia.in
Robbin Shen Managing Director Dahua Technology India Pvt. Ltd.
40
He continued, “Body Worn Cameras and Covert Cameras as security gadgets will become much more affordable while providing higher quality service. As we've seen in recent years, even though cameras are getting smaller, the components are continuing to provide the highest quality imaging, large, expandable storages, and increased battery life.”
• The drone built-Netra (Sanskrit for eye), was recently used by Mumbai Police to keep vigil on idol immersions during Ganesh Chaturthi Festival. • The Kerala Police is considering using drones for traffic and crowd surveillance at the popular temple in Sabarimala later this year. • The Odisha government is deploying them in its antiNaxal operations
Challenges and opportunities for Drone Cameras/ Body Worn Cameras/Covert Cameras solutions
• Drone cameras can also be deployed to 3D mapping river basins to help in tackling floods in future.
According to Yogesh B. Dutta, “The deployment of these specialised cameras without running the risk of misuse is going to be a significant challenge. The government will have to take the necessary steps to frame guidelines and policies that shall govern the use of such specialised cameras.
• In agriculture, drone cameras are useful in taking a normal as well as infra-red picture of the crop that helps in calculating the chlorophyll absorption and provides a pretty accurate idea of yields. Also, drone cameras help in identifying areas that need pesticides which can be sprayed as they are cost effective rather than using a plane
The opportunities abound; for instance, with drone cameras in use, heights and depths will just become numbers; body worn cameras will not only capture the law breakers right from the field of action but also act as a deterrent; and covert cameras will inconspicuously probe into incidences to capture breakthrough evidence in covert operations.” According to Robbin Shen, “The major challenges are security issue, regulatory issues, want of comprehensive policies, getting approvals from various bodies, security concerns, threat perceptions, security breaches privacy issues, low awareness and battery life 15 to 45 minutes.” He continued, “Opportunities for Drone cameras are immense. It is already being touted as the next big opportunity after e-commerce. Police in Indian cities are using drones to monitor and control traffic. There is a huge opportunity from police and paramilitary forces.
• Drone cameras are used in tracking animals in forests to prevent poaching and preserve animals’ population. • The Board of Control for Cricket in India has experimented with drones to take aerial pictures in some matches. • In real estate drone cameras are used to provide customers the view they would get from their apartment on each floor in all directions, by stitching together pictures taken from a drone. So, opportunities are aplenty in every field whether it is agriculture, industry, service, security, health, logistics, retail etc.” According to Vinay Mishra, “The key challenge in Drone Camera, Body Worn Camera and Covert Camera segment is lack of training and awareness. The policy framework of the government continues to be an evolving process. Though DGCA has taken a step further by releasing a draft regulation of the civil use of drones in India. Despite these challenges this segment is having a huge growth prospects in the near future.”
The key challenge in Drone Camera, Body Worn Camera and Covert Camera segment is lack of training and awareness. The policy framework of the government continues to be an evolving process. Though DGCA has taken a step further by releasing a draft regulation of the civil use of drones in India Vinay Mishra Vice President – Projects Prama Hikvision India Pvt. Ltd.
41
DS-KIS204 Video Door Phone FEATURES Door Station -- Self-adaptive IR supplement -- One-touch calling -- Pinhole camera with720 x 576 @ 25 fps -- Unlock controlling Indoor Station -- Hands-free video intercom communication -- Supports monitoring the door station and the external analog camera -- Supports captured image playback -- Remote unlocking -- Convenient installation and easy operation Door
CP-UNC-TE4K081ZL5E-VMD 4K Full HD IR Network Bullet Camera - 50 Mtr. FEATURES -- -- -- -- -- -- -- --
1/2.5” 8MP PS CMOS Image Sensor 15fps@4K (3840x2160), 25/30fps@3Mp (2304x1296) H.265 and H.264 Triple-stream encoding WDR, Day/Night(ICR), 3D-DNR, ROI, AWB, AGC, BLC, HLC 2.7mm ~12mm motorized lens IR Range of 50 Mtrs, IP67, IK10, ePoE Mobile Software: iCMOB, gCMOB CMS Software: KVMS Pro, vOptimus Pro
Fingerprint Access Control Terminal FEATURES -- -- -- -- -- -- -- --
Operation System - Linux No. of Fingerprint Template – 3,000 No. of Transaction/Event Storage – 100000 Uplink Communication Interface: TCP/IP, Wi-Fi, USB 2.0 Inbuilt Card Reader Options: Mifare / Proximity Fingerprint Sensor – Optical, 508 DPI Application – Access Control & Time Attendance Other Functions – USB, 1 Lock Interface, 1 Magnetic Contact, Doorbell, 1 Exit Switch, Exit Reader, etc.
Optional Model No. -- DS-K1T804F - Fingerprint Only -- DS-K1T804EF - EM Card and Fingerprint -- DS-K1T804MF – Mifare Card and Fingerprint
CP-UNP-F4521L55-DAP 2MP WDR 45x IR Network PTZ Camera- 550 Mtr. FEATURES -- -- -- -- -- -- -- -- -- --
1/2.8” 2MP CMOS Image sensor Max. 50/60fps@1080P Powerful 45x Optical zoom and 16x Digital zoom WDR(120dB), 2D/3D-DNR, Day/Night(ICR), EIS, Defog, ROI, AGC, AWB, BLC, HLC Up to 300 presets, Auto scan, 8 Tour, 5 Pattern, Auto pan IR Range of 550 Mtr. Max 240° /s pan speed, 360° endless pan rotation Built-in 7/2 alarm in/out, IP67,SD Card, Hi-PoE Mobile Software: iCMOB, gCMOB CMS Software: KVMS Pro, vOptimus Pro
Fingerprint Time Attendance Terminal FEATURES
JULY 2018
www.asindia.in
-- -- -- -- -- -- -- --
Operation System - Linux No. of Fingerprint Template – 3,000 No. of Transaction/Event Storage – 100000 Communication Interface: TCP/IP, Wi-Fi & USB 2.0 Inbuilt Card Reader Options: Mifare / Proximity Fingerprint Sensor – Optical, 508 DPI Application – Time Attendance only Attendance Reports – Ready to use report from device through USB
Optional Model No. -- DS-K1A802F – With Fingerprint Only -- DS-K1A802EF – With EM Card and Fingerprint -- DS-K1A802MF – With Mifare Card and Fingerprint
42
Intevio: PAVA FEATURES -- -- -- -- -- -- --
3 In 1 Value pack serve as public address, voice alarm and BGM system Solution for the end user Simple and flexible system which can take care most of the applications: 8 Zone Master controller with In-built 500W Class D amplifier and can expand the zones using 8 /24 zone expander A single system for larger applications: Supports up to 128 speaker zones Comprehensive fault detection and indication for easy maintenance Inbuilt Scheduler for time based automatic audio trigger: exact fit for Factory and school applications. Supports automatic recording and temporary recording: For easy mainte nance and records for audit. Comes with Over-riding feature on emergency microphones in case of CPU/Controller failure: a value add to the end user.
LU65-ST400 65'' UHD Interactive Intelligent Whiteboard FEATURES -- -- -- -- -- -- --
65" ultra-HD display Metal housing, 4mm AG anti-glare tempered glass, and ultra-thin and ultra-narrow appearance Built-in smart core and operating system, Android and Windows system as standby for each other Detachable type design, PC module and display are separated IR (Infrared Ray) touch technology, supports 10 points writing and 20 points touch. Wireless screen sharing, convenient to presentation Rich interface, plug-and-play
IPC-PF83230-A180 4x8MP Multi-Sensor Panoramic Bullet Network Camera Bullet Network Camera Panoramic Series FEATURES -- -- -- -- --
Four 1/2.0” 8Megapixel progressive scan CMOS H.265/H.264 triple-stream encoding Max 25fps@8640x3840 Support 180-degree panoramic view Day/Night(ICR), 3DNR, AWB, AGC, BLC
LDH55-PAI200 55'' Wall-mounted Digital Signage Premium Digital Signage FEATURES -- -- -- -- --
Abundant interfaces including HDMI, DVI, DP, VGA, Audio in/out, USB, OPS slot 700 nits high brightness display, perfect image effect Metal housing design, anti-interference, high reliability and stable opteration 178°H/178°V extra-wide viewing angle for overall viewing performance High fidelity digital processing, brilliant and vivid video
HAC-HFW2241T-I8-A 2MP Starlight HDCVI IR Bullet Camera Fighter 2241 Series FEATURES -- -- -- -- -- -- --
Starlight, 120dB True WDR, 3DNR Max. 30fps@1080P HD/SD output switchable Audio in interface, built-in mic 3.6mm fixed lens (6mm optional) Max. IR length 80m, Smart IR IP67, DC12V±30%
Biometric Terminal Series: Performance Lite Camera: 2MP IP IR Bullet & Dome Camera FEATURES -- -- -- -- -- --
2MP full real time recording PoE power supply 3D DNR, DWDR True day night function Up to 30m IR distance Supports triple stream
FEATURES -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
HON-BIOEM-500TA DISPLAY 2.8 inch TFT Screen Fingerprint template 500 ID Card Capacity 500 Log Capacity 50,000 Communication TCP/IP Interface USB| BIS certified HON-BIOMI-5000TA & HON-BIOEM-5000TA DISPLAY 2.8 inch TFT Screen Fingerprint template 1000 ID Card Capacity 1000 Log Capacity 100,000 Communication TCP/IP Interface USB MI fare & EM card BIS, CE & FCC certified
43
Tourlock – The high security revolving door
Circle Lock The high security interlocking door FEATURES
FEATURES -- -- -- -- -- -- -- -- -- -- --
The highest level of tailgating and piggybacking detection available today Highly accurate physical access control while maintaining a high traffic flow Safe and efficient access for authorized individuals only Adjustable security levels A high security environment Designed to integrate with different kinds of authorization/access control solution. Simultaneous Bi-directional traffic flow Stylist design available in different finish and sizes Surveillance by a third part such as “security guard” is no longer required. Always closed/always open No construction in the floor necessary
-- -- -- -- -- -- -- --
One of the best security barrier to control piggybacking and tailgating Highest possible level of security Designed to integrate with different kinds of authorization/access control solution. Elegant design with different finish option (stainless steel 304/ powder coat) Can be used for handicap people Stylist transparent design Option for vandalism (P4A), burglary (P6B) or bullet resistant (BR2NS/BR4NS) glass or solid panels in the door set or glass walls Option for mounting on computer floor
L series Cameras Wisenet 2MP Indoor/outdoor cameras
QRN-1610S/810S/410S Wisenet Q series Network Recorders with PoE Switch
FEATURES
FEATURES
-- -- -- -- -- -- --
-- -- -- -- --
Max. 2MP (1920 x 1080) resolution H.264, MJPEG codec support Max. 30fps@2MP(H.264) True WDR(120dB), WiseStream II Hallway view, LDC(Lens Distortion Correction) Motion detection, Tampering IP66/IK10(Vandal-resistant cameras only)
16CH 8MP(Max. 128Mbps) recording (QRN-1610S) 8CH 8MP(Max. 80Mbps) recording (QRN-810S) 4CH 8MP(Max. 40Mbps) recording (QRN-410S) Plug & Play by 16 / 8 / 4 PoE ports Max. 2 HDDS (QRN-1610S) / 1 HDD (QRN-810S/410S) support H.265, H.264, MJPEG codec / WiseStream support P2P service (QR code connect) support
JULY 2018
www.asindia.in
FLIR K2 Extremely affordable thermal imaging camera for firefighters
Aadhar Based Attendance System
FEATURES
-- -- -- -- -- -- -- --
-- -- -- -- -- -- -- --
Robust and reliable - The FLIR K2 is designed to meet tough operating conditions. It can withstand a drop from 2 m, water resistant IP67. Innovative - The FLIR K2 utilizes FLIR patented technology MSX, where a thermal sensor is combined with a visual camera sensor to give detailed image information in many user situations. Easy-to-use - Easily used in a gloved professional hand. An intuitive and simple user interface allows you to focus on the job. Object Temperature range up to 500 Degree. C Having Large field of view to scan the area 47° x 35° K2 have five different imaging modes depending on the primary use of the unit. Available with PC software Offer 2-10 years warranty.
44
FEATURES OS Version : Android 6.0 RAM/Type : 1GB , ROM/Type : 8GB Touch Screen : Capacitive SIM port : 2 x 2FF (mini) USB Hub : 1 USB port WiFi, Hotspot : YES , Battery Capacity : 4000mAh Screen Size : 7"
D1 Countertop Time Attendance Terminal
K40 Pro Time & Attendance Terminal
FEATURES
FEATURES
-- -- -- -- -- -- -- -- -- -- --
-- -- -- -- -- -- -- -- -- --
Max User(1:N) - 1,000 Max Fingerprint - (1:N) 1,000 Max Record - 50,000 Wi-Fi - WLAN / Hot Spot USB - USB 2.0 (Host) Countertop placed without installation Wi-Fi communication Build in battery up to 8-hour standby Build in time attendance report Mobile APP control and download report USB Micro port for DC power bank charge available
Featured with Inbuilt Battery Along with Push Data Technology Fingerprint Capacity - 1000 (2000 without SSR ) ID Card Capacity - 1000 (Optional) Record Capacity - 80,000 Communication - TCP/IP, USB Host TCP/IP, USB-host Built-in battery Simple access control or external bell Multi languages SSR report in excel forms Supports WDMS
Pro 2MP, 3MP, 5MP Mini-Domes
Pro 2MP & 3MP Compact Mini-Domes
FEATURES
FEATURES
-- -- -- -- -- -- -- -- -- -- --
-- -- -- -- -- -- -- -- --
Distortion-Free wide angle Theia 1.8-3mm model Zoom 9-22mm lens model Superior low light performance Face detection enhancement Quick and easy installation and configuration One-touch focus and motorized zoom Multiple motorized lens options Intelligent ROI-based compression Operates in extreme temperatures as low as -30°C operating temperature on PoE (outdoor models) IP66 & IK10 Edge-Ready support for exacqVision Edge
2MP and 3MP models provide true HD quality images VideoEdge® TrickleStor technology for edge-based failover redundancy Illustra® IntelliZip offers powerful video compression technology for bandwidth management Compact design allows for discreet deployments True WDR Motion detection for instant intruder alerts License to a VideoEdge Network Video Recorder at no additional cost IP66- and IP67-rated with IK10 ONVIF Profile S conformant
Pro LT 2MP Bullet
Pro Compact Mini-Bullet
FEATURES
FEATURES
-- -- -- -- -- -- -- -- --
-- -- -- -- -- -- --
720p and 1080p resolution Auto focus and zoom control integration Auto True Day/Night (TDN) Wide dynamic range Integrated IR illumination H.264 and MJPEG compression with 30 ips PoE SD card slot ONVIF compliant
Compact and discreet 1080p resolution Built-in high power IR LED illuminator True Day/Night (TDN) and WDR Motion detection Quick, easy installation and configuration Corridor mode
45
G3 Plus Multi-Biometric Time Attendance & Access Control System FEATURES -- -- -- -- -- --
Fingerprint Capacity: 5000 Face Capacity: 3,000 Card Capacity: 10,000 Transactions: 1,00,000 Push Data: Yes Display: 4.3 Inches TFT – LCD Screen
Plock 2 Private Parking Manager FEATURES -- -- -- -- --
Material: Steel Control Distance: ≤20m Arm rising time: ≤6s Altitude After dropping: 75mm Operating Temperature: -10°c˜ + 55°c
12V-2Amp SMPS Adaptor Product Code – AD-122A0P FEATURES
JULY 2018
www.asindia.in
-- -- -- -- -- -- -- -- -- -- -- --
Input Voltage: 150V to 285VAC, 50/60Hz Output Voltage: 12V DC Output Current: 2 Amp (Max.) Output Wattage: 24 Watt (Max.) BIS Approved Highly Integrated SMPS Switcher I.C Design Surge Protection, Over Temperature Protection Over Current, Over Voltage & Over Load Protection High-efficiency, low energy Consumption Low Ripple Voltage (mV P-P): <5% Small size Plug In Type. Output DC Plug size 5.5x2.1mm (Grip Tag DC Pin)
46
G3H Multi-Biometric Time Attendance & Access Control System FEATURES -- -- -- -- -- --
Fingerprint Capacity: 10,000 Face Capacity: 6,000 (1:N), 10,000 (1:1) Card Capacity: 10,000 Transactions: 10,00,000 Push Data: Yes Display: 4.3 Inches Touch Screen
Time Attendance & Access Control System F22 FEATURES -- -- -- -- -- -- --
Fingerprint Capacity: 3,000 Card Capacity: 5000 Transactions Storage: 30,000 Push Data: Yes Communications: RS232/485,TCP/IP,USB-host, Wi-Fi Display: 2.4-inch TFT LCD Color Screen Keypad: Feather Touch Keypad
12V-10Amp CCTV Camera power supply with cable compensation switch Product Code – AD-1210AT FEATURES -- -- -- -- -- -- -- -- -- -- -- -- --
Input Voltage: 150V to 285VAC, 50/60Hz Output Voltage: 12V DC Output Current: 10 Amp (Max.) Output Wattage: 120 Watt (Max.) BIS Approved Highly Integrated SMPS Switcher I.C Design Surge Protection, Over Temperature Protection Over Current, Over Voltage & Over Load Protection High-efficiency, low energy Consumption Cable Compensation Switch For Voltage Boosting Low Ripple Voltage (mV P-P): <5% Attractive Grey Color FR Grade ABS Cabinet. Wall Mountable/ Desktop Type.
Panasonic WV-S1550L 5 Megapixel iA H.265 Network Camera
Panasonic WV-S2550L 5 Megapixel iA H.265 Network Camera
FEATURES
FEATURES
-- -- -- -- -- --
-- -- -- -- -- --
5 Megapixel images up to 30 fps iA (intelligent Auto) Super Dynamic 120dB Color night vision (0.0044 to 0.07 lx) H.265 Smart Coding FIPS 140-2 Level 1 compliant
5 Megapixel images up to 30 fps iA (intelligent Auto) Super Dynamic 120dB Color night vision (0.0044 to 0.07 lx) H.265 Smart Coding FIPS 140-2 Level 1 compliant
WV-S2250L 5 Megapixel iA H.265 Network Camera
Panasonic WV-X8570N i-Pro EXTREME H.265 Multi-Sensor Camera
FEATURES
FEATURES
-- -- -- -- -- --
-- -- -- -- --
5 Megapixel images up to 30 fps iA (intelligent Auto) Super Dynamic 120dB Color night vision (0.0044 to 0.07 lx) H.265 Smart Coding FIPS 140-2 Level 1 compliant
New Flexible Lens Configurations with Less Blind Spots Extreme Image Quality with 4K Resolution Each Sensor Extreme H.265 Compression with Smart Coding & iA Easy Toolless Lens Positioning ClearSight Coating
Magnetic Pedestrian High door
MPW Swing gates!
FEATURES
FEATURES
-- “Make in India” with efficient engineering, manufacturing, sales and support teams -- High separation reliability with rapid passage of persons -- Comfortable non-contact passage -- Simple integration of all common access control systems -- Automatic opening if power fails -- Wide variants suitable for wheelchairs, prams, bicycles, and material transport -- Designed for 10 million opening and closing actions -- The MHTM™ drive unit ensures energy-efficient, maintenance-free and quiet operation -- Low cost of ownership -- Meets Global standards and regulations
-- “Make in India” with efficient engineering, manufacturing, sales and support teams -- German technology with direct drive mechanism -- Tested and Proven Products -- Designed for more than 10 million cycles| -- Varied logics without compromising safety and ensuring security -- Different versions with customisations -- Less power consumption and Lower Maintenance which makes Low Cost of Ownership -- Meets all the available Global standards and regulations
47
IPC6322LR-X22-C
NVR516-128
FEATURES
FEATURES
-- -- -- -- -- -- -- -- -- -- -- --
-- -- -- -- -- -- -- -- -- -- -- --
1/2.9" CMOS ICR 1920x1080:30fps Ultra 265/H.264/MJPEG Triple streams DC12V Micro SD card slot -40-65o IP66 22 x optical zoom (5.2 ~ 114.4mm) IR range: up to 150m IR anti-reflection window
128-ch 16 SATA interface 3U H.265&4K 4 Network interface 2 SFP interface RAID1 RAID5 Hard disk hot swap on front panel Redundant power supply(opitional) Up to 14 HDMI output(optional) 2 miniSAS ports
DAC 04 Controllers
ID 15
FEATURES
FEATURES
-- --
-- -- -- -- -- -- -- -- -- -- -- -- --
The DAC04 access control and time and attendance panels set the industry standard for performance, reliability, flexibility and cost effectiveness. They are designed and manufactured for use with the iSOLUS Integrated Security Management Software, Based on a 32 Bit Dual Processing platform, each IPW panel contains 64MB RAM & 64MB Flash (Expandable up to 1GB Memory)
JULY 2018
SATATYA NVR3204X H.265 NVR with 4K Support
www.asindia.in
FEATURES -- -- -- -- -- -- --
Video Channels: 32 IP Channels Inbuilt Storage Slot: 4 SATA Ports (10TB each) Raid Support: RAID-0, RAID-1, RAID-5 and RAID-10 Compression Technique: H.265 with 512Mbps Throughput Cascading: Monitor Cameras Connected with up to 20 NVRs without a Server Instant Notification: Call responsible person in case of an event and send SMS/email with snapshots in real-time. Integration: Database Level Integration with Matrix Access Control, Fire Alarm and other Third Party Sensors
48
Choice of fingerprint technologies. Card, Finger Print, Card+Finger & iris7 or 10.1 inch Display. Identification (1:N) & Authentication modes (1:1) Simultaneous Identification or Verification orscheduled mode change. 1:N (Identification) for 480/3000/10000 Templates < 2 seconds processing time. Biometric bypass for select users. Mifare / Prox / i Class/ 7816 Smart cards option. Secure Access Module (SAM) option. Template storage on Terminal or Smart Card Built in Web browser User Interface. Wiegand, Serial, Ethernet, communication mode. Power over Ethernet Option. External (Exit Reader), Input / Output Ports. IP 65 0ption.
Matrix VYOM An Authenticated Multi-tenant Cloud based People Mobility Management Solution FEATURES -- -- -- -- -- -- -- --
Access from Anywhere, Anytime On Demand Scalability in Sync with Organization Size No Capex, Maintenance and Upgrades for IT Pay Per Usage Easy Access through any Internet Enabled Device Multi-level Data Encryption and Protection Email and SMS Notifications Backup, Archival, Retrieval and Migration
RFID Card Digital Lock for Glass Doors FEATURES -- -- -- -- -- -- -- --
RFID Card, Use Pin Code & Remote Control Access Suitable for: 8-12mm thick glass doors 50 RFID cards can be registered 3-19 digits User Pin Code can be set| Automatic & manual setting option Automatic lock up time can be adjusted Fire alarm function in case of fire emergency Application: Office Glass Doors
Agate Laptop: FEATURES -- -- -- -- --
Electronic locking system 3-8 digits User Code & Master Code access options 03 Wrong Code Inputs, consecutively, puts the Safe in Secure Mode Low battery indicator Mechanical Override Key for Emergency Access
Slim Electromechanical Tripod with Drop Arm
Swing Lane Flap Barrier
FEATURES
FEATURES
-- -- -- -- -- -- -- --
-- -- -- -- -- -- -- -- --
Solenoid locking mechanism Bi-directional operational control Positive action lock to prevent two passage at one time Integration with all type of access control available in the market Drop Arm in case of power failure Dynamic LED passage indicator Low power consumption The built-in hydraulic damper provides smooth & silent operation of the turnstile
GILPRO instaproteKt (Kitchen Hood Fire Suppression system) from Gunnebo India
Anti-tailgating feature to block unauthorized people Crawling detection to avoid illegal intrusion DC brush less motor based highly reliable drive Alarm function in case of illegal intrusion and reverse intrusion Short opening times in seconds for a high through flow Automatic opening during power failure with battery backup Long life cycle and low operating cost Simple integration with all access control systems Acrylic Flap wings with illuminating LED effect
Firephant Extinguishers from Gunnebo India FEATURES
FEATURES -- -- -- -- --
PLC based Control Panel to monitor and protect kitchen hoods 24/7 Advanced Thermal Sensors – monitor/analyse temperature with pre-alarm Manual and Electrical Actuation – Zone wise or Complete System Flexible and easy maintenance SS304L piping with complete ferrule fittings Most compact in its range and requires minimum space
-- -- -- -- --
Cutting edge fire extinguisher Handy and User friendly operation Ultra-chic design (Reddot design best of the best award winner, 2012) Highest extinguishing performance in its class (Fire Rating : 1 Kg – 1A 34B, 2 Kg – 2A 55B) Red colour model – ISI marked.
49
Senegal’s new International Airport Chooses Smart Surveillance & Car Park Management from Hikvision The industry-leading Hikvision Darkfighter and True WDR imaging technologies were employed in the airport’s ANPR system to deliver crisp and clear recognition, alongside a recording of every vehicle using the car parks day and night. By Prama Hikvision India Pvt. Ltd.
S
enegal’s new Blaise Diagne International Airport (AIBD) has chosen to manage and secure its parking lot, and massive freight zone with intelligent Smart surveillance from the world’s leading supplier of innovative video surveillance products and solutions, Hikvision.
Opened in December 2017, AIBD is located 47km from the Senagal capital, Dakar and is one of the largest travel hubs in West Africa, designed to accommodate longhaul aircraft and approximately 3 million passengers annually. With a passenger terminal and cargo terminal designed to handle 50,000 tons of cargo and 80,000 aircraft movements annually, the new airport provides excellent levels of aviation connectivity. Parking Management JULY 2018
www.asindia.in
To address the security, management and profitability objectives of the airport’s 17 car park entrances and exits, operator Senecar enlisted the help of CST Securite. A Hikvision Authorised Distributor, CST Securite enlisted the support of the Hikvision Technical team to confirm a specification to meet the needs of the airport’s car parking and freight zone security surveillance, and site management requirements.
50
Drawing on products from Hikvision’s Smart Parking Management Solution, for the airport’s car park areas, CST Securite installed 17 x DS-TCG225 2MP HD resolution ANPR cameras, featuring built-in whitelist, LPR identification support, barrier/gate control and audio output. Effective Access Management The Hikvision Smart Parking Management System employed, uses the latest barrier technology combined with Hikvision industry-standard ANPR, to ensure seamlessly managed vehicular entrance and exit from parking lots. Fast vehicle identification and integrated barrier control software means queues are kept to a minimum. The industry-leading Hikvision Darkfighter and True WDR imaging technologies employed in the airport’s ANPR system were specified to deliver crisp and clear recognition, alongside a recording of every vehicle using the car parks 24/7. The airport’s car park barrier activation is not driven by traditional sensor coils in the floor but by highly accurate ‘radar’ sensors. This technology enables far simpler installation and maintenance, as no ground works are required for trenches. Additionally, the Hikvision radar solution is not affected by local environmental influences such as light, dust or rain that can inhibit the performance of traditional sensing coil solutions.
A range of configurable alarms helps the ANPR system operators to manage activity, such as unauthorised parking, over-time parking and illegal access etc. High-level Freight Security CST Securite liaised with the airport security team to identify the best locations to install cameras covering the freight zone. Capturing a comprehensive view of all key internal and external areas, a mix of Hikvision DS-2CD2T42WD 4MP / DS-2CD2T22WD 2MP full HD EXIR Bullet Network Cameras with builtin IR to 50m, and DS-2CD2142FWD 4MP / DS-2CD2122FWD 2MP full HD Vandal-resistant Network Dome Cameras with built-in IR to 30m and edge storage - all with IP67 protection were installed. To provide automated alarm activations and situation awareness of any predetermined set of events within each cameras’ view, their on-board VCA alarm activation parameters were set-up to cater for individual cameras’ scenes. Providing the airport with effective real-time and playback monitoring, at the control room, Hikvision NVR7332NI-E4/16P Embedded Plug & Play NVR’s and a DS-7716NI-I4 NVR were installed to provide up to 6MP resolution recording. Simple and intuitive systems control is provided by Hikvision’s iVMS-5200E Control Software.
CP PLUS Secures Kidzania Entertainment City Noida By CP PLUS
K
idZania is an infotainment concept designed for children aged 1-14 years. It showcases an interactive city that combines inspiration, fun and learning through realistic role-play. Spread over 7,000 square meters, kids can independently explore more than a 100 exciting careers, the inner-workings of a city and the concept of managing money.
JULY 2018
When the KidZania management reached out to CP PLUS, they had two main concerns: firstly, considering the expanse of this theme park, it was challenging to watch and control activities of kids playing around, and secondly, video feed of the children’s activity was to be provided to parents sitting in the lounge area. While the premise did have manned security, manually monitoring all corners of expansive area was rendered ineffective. Solution
www.asindia.in
After analyzing the requirements, the CP PLUS team conducted a detailed survey of the area with the system integrator for the project, Honeywell, to draw out a comprehensive plan for the campus. • To monitor the kid’s activity
52
A combination of state-of-the-art IP cameras and NVRs were chosen by CP PLUS to address the unique needs of specific areas of KidZania. areas, a combination of CP PLUS 1.3MP Dome and 1.3MP Varifocal Dome cameras were used that offer high resolution imagery with wide coverage and a visibility range of 30 meters. The footage from these cameras would be displayed on the lounge screens for guardians of children to see. • The lanes and aisles were secured using the CP PLUS 1MP Vandal Dome cameras which support variable focal length thereby making them ideal for corridors and lanes. Additionally, these cameras are also vandal and tamper proof. • The entry and exit points and the outdoor would be covered by CP PLUS 1.3MP Bullet cameras, which offer high resolution imagery, WDR that automatically adjusts to varying light conditions, and come with an IP66 rating making them ideal for outdoor environments. • For the monitoring station/control room setup an embedded VMS solution has been provided, with a capacity to cater to 500 IP Cameras with 700Mbps incoming bandwidth and 700Mbps transmission bandwidth. The control room solution has been designed
considering future needs such as scalability wherein ‘n’ number of devices can be added on to the existing server/client architecture, and a ‘failover system’ which allows switching over to an alternate system in case of a system failure, and more. It also provides an option to integrate multiple solutions and analytical features such as people counting, face recognition any many more, access control, Fire alarm system etc. • Additionally, as per the project’s requirement of 30 days of recording, a NAS solution has been provided which easily configures with the DSS server and can be upgraded to increase the days of recording required by simply cascading more NAS servers to act as one NAS recorder. Impact The solution provided the administration with a ready access to the all sections of the expansive area at a click of the mouse. It enhanced the overall safety and operational efficiency of the setup, while enabling guardians to keep an eye on their children.
52
KKB Anadolu Data Center Adapts Costeffective Matrix Data Center Solution
KKB Anadolu Data Center required devices that supported both smart card authentication as well as door locks.
K
redi Kayıt Bürosu (KKB) was founded by the then nine leading banks of Turkey on 11th April, 1995. KKB is a highly regarded financial institution in Turkey and has a total of 156 members. The KKB Anadolu Data Center is located in the capital city of Ankara across 43,000 square meters of land, consists of three main sections. The facility is equipped with protection systems against lightning and earthquake. Issues The data center has cabinet system in place while access to data racks require biometric authentication. The center is equipped with numerous data racks for which they required a display device at the entrance. Each rack was locked with physical locks as a result of which the center required a cost effective solution that did not include a device for each rack. Moreover, they required devices that supported both smart card authentication as well as door locks. The center authorities were looking forward to provide the supervisors with an additional option of authentication through RFID cards. With respect to gaining access, they wanted a solution that would grant access through two steps, biometric authentication and physically opening
By Matrix Comsec Pvt.Ltd.
the locking system. Finally, the center wanted a solution that could alert them in case of situations such as a door being left open. Solutions Provided Matrix, in association with SouthCo, provided the KKB Anadolu Data Center with the following solution: The data center required a display device at the entrance, integrated with the biometric device installed by Matrix. So, they integrated the Data Center solution with a touch screen display. Whenever any user tried to access the data center with their biometric credentials, the touch screen would display a list of racks the respective user is authorised to access. From the display, the user would be allowed to choose the racks he/she would like to access. Once the user is granted access into the chosen racks, they would be allowed to access the same for a pre-defined period of time. User based access ensures security of sensitive company data. They also installed 200 COSEC ARCs, at the entry/exit of racks between 400 SouthCo locks, one between two door locks, making it a cost-effective solution for the center. Additionally, the ARC also provides the admin
personnel with real-time notifications such as SMS or email notifications in case of any mishaps such as an open door, a door forced open, door being left open, etc. The personnel can also gather customised reports on events like who, when and which rack was accessed.
Solution Diagram
Results • Maintenance of Diverse Data • Foolproof Security with Biometric User-wise Rack Access • Accurate Records of Who Accessed Data Center at What Time
53
Video Surveillance Brought Up-to-date At Iconic West Midlands Site in UK Dahua Technology, a leading solution provider in the global video surveillance industry announced that a compressive video surveillance solution consisting of 96 cameras from Dahua Technology UK is being installed at the striking Fort Dunlop commercial and retail site, overlooking the M6 motorway in Birmingham.
By Dahua Technology
Built for Dunlop Rubber, Fort Dunlop became the tyre-maker’s flagship production facility and at one time was the world’s largest factory, employing 3,200 workers. After production stopped in the 1980s, the building lay derelict before being redeveloped into 360,000 square feet of office and retail space, also now with an adjoining hotel. Much of the site’s previous video surveillance system was installed during the refurbishment in 2006, but with advances in modern technology, it was felt that the current system was no longer meeting basic requirements. An external consultant assessed the site and put forward plans for an upgrade. Bromsgrove-based Champion Security Installations won the bid for the upgrade project. JULY 2018
www.asindia.in
Installed over two phases, the design consists of a total of 96 static and PTZ cameras from Full HD to 4K resolutions. Cameras include the 12MP panoramic internal IPC-EBW81230 fisheye camera, which uses H.265/H.264 triplestream encoding, and the external panoramic IPC-PDBW8802 dome camera, with four 2-Megapixel progressive scan CMOS sensors and day/night functionality.
54
Images are managed and recorder by a 128-channel, ultra 4K NVR616 network video recorder. A spokesperson from Champion Security Installations added, “We have worked with the management of Fort Dunlop for a number of years now, so we designed the new IP CCTV system in consultation with them. The aim was to meet all of the different security, health and safety criteria, as well as ensure ease of use for the operators. Having installed Dahua equipment at a number of sites, we invited them to assist with the design of the Fort Dunlop system using a number of their new products. Working in conjunction with Dahua and Oprema Ltd, the project was delivered on time and within budget.”
Having undertaken a full review of the security systems at Fort Dunlop, it became clear that a replacement CCTV system was required to ensure protection of the staff, visitors and building. Three different options were presented by contractors, but it quickly became clear that the Dahua system presented by Champion Security met our brief. The system installed has changed the way we monitor and protect our asset, and its ease of use has been a revelation to our site staff A spokesperson from Savills
HONEYWELL A GLOBAL LEADER IN CONNECTED BUILDING TECHNOLOGIES Honeywell maintains a leadership position in India by integrating building automation technologies, fire, safety, and security solutions with the most comprehensive and broadest product portfolio to drive Connected Buildings. Interview of Sharad Yadav, General Manager - Buildings, Honeywell Home and Building Technologies India By The Editor, a&sINDIA
JULY 2018
www.asindia.in
Sharad Yadav General Manager, Buildings Honeywell Home and Building Technologies India
56
We have the biggest sales and functional teams present across top 15 cities in India and serving more than 45 cities through our channels partners. We are uniquely positioned to empower building owners and facility managers to have complete control with focus on insights and connected devices with adaptive platforms
Q. Do briefly tell us about your role at Honeywell. A. At Honeywell, I am responsible for developing and executing Honeywell connected buildings strategy in the South Asia region for Fire, Security and Building Management System businesses. Have spent more than a decade with Honeywell, in multiple leadership roles including Commercial Excellence Leader, Honeywell Security and Fire, APAC, Regional General Manager; Honeywell Fire Systems for the India region; and before that as the Director Sales – South Asia for Honeywell’s Life Safety business. Q. What comes under Honeywell Building Technology? A. Honeywell Home and Building Technologies (HBT) is a global business with more than 38,000 employees. HBT creates products, software and technologies found in 10 million buildings worldwide. Commercial building owners and occupants use our technologies to ensure their facilities are safe, secure, energy efficient, sustainable, and productive. Honeywell’s Connected Building solutions bring together a full range of control systems throughout virtually any building from a single point of control. Q. What is Honeywell’s strategy for connected buildings? A. Honeywell, a global leader in connected buildings maintains a leadership position in India by integrating building automation technologies, fire, safety, and security solutions with the most comprehensive and broadest product portfolio. For three decades, Honeywell has been serving enterprise, small and medium businesses, banking, pharma, hospitality, retail, residential, and industrial customers with a complete portfolio of intelligent products comprising wireless, voice, cloud, mobility, data analytics, edge devices, software and ecosystem partners to drive Connected Buildings. We have the widest portfolio including CCTV, PAVA, access control, video monitoring, fire detection, and building management systems. Q. What were the new launches of Honeywell in the first quarter of 2018? A. Leading the way were Honeywell’s latest range of Biometric Readers, an outdoor fingerprint access control device that offers highest matching performance, outdoor durability, and multi-card reading in a package to provide comprehensive access control features for offices, retail, schools, clubs, small and medium enterprises, and healthcare.
and retail were introduced to ensure early detection and warning of developing fires, providing precious escape time before a fire spreads. It can be used as an independent photo-electric smoke detecting alarm as well. Honeywell’s new Performance Lite IP camera series is an affordable offering that provides high quality basic surveillance for the small and medium businesses including small retail shops, gyms, schools, and residential homes. The new series includes 2 megapixel IR cameras in both dome and bullet configurations with fixed and variable lens options to cater to all kinds of customer applications. The cameras come with IR LEDs to provide effective and efficient surveillance even during the night time. The cameras are IP66 rated making them resilient for outdoor applications as well. The other launch was the fire protection Gas Suppression System, a relatively a new technology in India that uses gas to extinguish the fire unlike the conventional system that used water. It can be used for data processing centers, telephone switches, process control rooms, and art and historical collections among others. Honeywell offers clean agent suppressants for class c (electrical/electronic) asset safety vis-à-vis water/foam based suppressants which are not suitable for applications like data centers, telecommunication etc. Q. What is Honeywell’s strategy for the Indian Market? A. Honeywell in India has a strong legacy of eight decades with more than 15,000 employees, including 8,000 engineers across 50 cities, 6 manufacturing plants and 5 technology development centers. It has a great foundation with industry leading position, a sound strategy and investment plan to support its growth. We are supporting the government’s Make in India initiative by understanding the needs of the Indian customers and locally manufacturing the products for them. Honeywell is consistently investing in product innovation to grow and consolidate its global leadership position and local business intelligence in the Indian market by leveraging its global knowhow and developing products for the Indian market. Honeywell is the trusted go-to technology partner for those who value productivity, comfort, energy efficiency, and safety and security. India continues to be an important market for us and we see Honeywell’s future growth to come from here through 2018 and beyond.
Plug and play battery operated smoke detector targeted at homes, small commercial space, banks,
57
India is the Key Contributor in Milestone’s Growth Across the APAC Region Interview of Benjamin Low, VP (APAC), Milestone Systems By The Editor, a&sINDIA
Milestone Systems is a leading provider of open platform video management software, providing technology that helps to ensure safety, protect assets and increase business efficiency
Q
Looking back at 2017 what were the challenges identified and the business potential in India?
A. The video surveillance industry in India is undergoing intense transformation, driven by the rise of security concerns and growth of infrastructure in the country. According to a recent study by Research and Markets, analogue-based surveillance systems have traditionally dominated the market. However, growing awareness of the value of IP based surveillance systems, along with market consolidation and declining prices, are increasingly influencing the adoption of this technology.
JULY 2018
The influx of projects like smart cities, demand from commercial sector and surveillance of sensitive parts in urban areas will continue to drive the video surveillance market in the next few years in India. India is a highly diversified market, where the video management software (VMS) market is worth a sizeable US$12 million according to IHS Markit. Milestone’s revenue growth in India - 44% a year from 2014 to 2016 - is evidence of this. In May 2018, we inaugurated a new office in Bangalore, and are continuing this growth trajectory with planned expansion in major metro cities of Delhi, Mumbai and Kolkata.
www.asindia.in
Q. Looking ahead in 2018, what will Milestone be focusing on in India having identified the challenges and business potential? A. With projects like smart cities opening up new opportunities, we want to help our customers and business partners stay ahead of the changing demands in India’s diversified market.
58
We are in a strong position to do this now, having
been delivering VMS solutions in India since 2006. Led by Amit Sarkar, our Country Manager for India, we intend to capitalise on our growth. Talent development is at the cornerstone of Milestone’s philosophy – we have a pool of skilled people who share our belief in integrating the best industry practices aligned with evolving customer demands. We are also focusing on our portfolio and empowering our community. This approach has helped us gain a considerable share of the Indian market, achieving significant growth in verticals such as government, oil and gas, as well as retail. Innovation will also be a major focus, and we recently announced we are increasing innovation capacity by 45% by the end of 2019. Our teams in Europe will advance the development of disruptive innovations within deep driver integration, advanced rendering, IoT and metadata sources, online services, advanced data management and Milestone Systems’ platform software development kit (SDK). These innovations will accelerate the enablement of video and data processing from solution partners in India who use neural networks, deep learning and AI technologies. In 2018, we will continue the numerous training programs we run for our business partners, helping to ensure they have the most up-to-date knowledge of products and solutions so that they can meet customers’ changing requirements. We have also recently launched “Milestone Community Learning Day”— an event which brings together our partners and customers to discuss issues impacting the industry and solutions. Something that will always be important to us is making sure our customers are supported. We have a local team based in Bangalore that provides unique after-sale support. Support is also provided to our end-users based on the Service Level Agreement (SLA) in their Care package. An APAC regional team, alongside the global team, further backs the local support team. Depending on the level of care, the SLAs might include 24/7, 365 days support from either the local or global teams. This allows Milestone to maintain top of the line service for our customers.
A. Milestone Community Learning Day was launched to enrich the knowledge of our customers and partners. It’s a learning session where we bring them together to discuss industry issues and share the latest technology trends, business insights and solutions. Through the event, we also provide a huge networking opportunity and help facilitate valuable conversations.
In the coming years, we forecast continued growth in India and look forward to exceeding customers’ expectations. We see it as a great honour for us to have built such a strong reputation across the market here while delivering solutions that meet local demands.
Q. What are your plans for partners/consumers’ growth? A. For the 10th year running, research from IHS Markit has shown that Milestone Systems is the number one global VMS vendor by company revenue. We are also number one in Asia Pacific (APAC), having grown our market share in the region to 12.4% in 2017 from 11.7% in 2016. Milestone’s net revenue in APAC grew by 14.6% in 2017 – nearly 7% more than the world market for VMS – and with such positive growth it’s important we help our partners and customers grow with us.
In such a diverse and growing market as India, we want to ensure they are able to seize new opportunities as they arise. To enable this, Milestone’s open platform allows the widest choice of hardware, cameras and solutions in the market, meaning each can decide what they require based on their unique needs.
We will also continue helping our partners gain more knowledge of the different types of solutions, meaning they will be better equipped to meet new opportunities from customers.
Milestone will host its Milestone Partners’ Open Platform (MPOP) event in Kerala this September, where partners will be invited to showcase how they have effectively applied Milestone Systems’ solutions to different situations. The event will also serve as an opportunity for our partners to interact with industry professionals and share ideas and opinions.
Our partners are vital, and we are committed to helping our community deliver best-in-class solutions that meet customers’ demands by driving business in developing areas.
Our inaugural Milestone Community Learning Day, which took place in Singapore in November last year, was a great success. Facial recognition was the focus of the event and our speakers shared some fascinating insights on the technology and its enormous potential to help our customers. Our second Singapore event, which put the spotlight on storage, took place in May and we hope to bring the same event in India this year.
Q. Which are the key industries or verticals you are catering to in India? A. We currently have a strong foothold in industries such as oil and gas, hospitality, critical infrastructure, power, and enterprise. We have a huge referral base in India across the various verticals, which we are immensely proud of. The top five IT or Information Technology Enabled Service (ITeS) players in India have been onboard with us for more than five years. This has served as a great reference in other verticals such as retail, banking, and pharmaceuticals.
This year, our key focus is on smart cities and ports, where we see huge growth over the next two years. We look forward to partnering with customers in these segments to enhance their businesses through our VMS solutions.
Q. Tell us about MS Market place. A. We are in the era of the polyglot, where we look for solutions that have the ability and agility to adapt to changing needs of the industry. Milestone Systems Marketplace connects solution providers and system integrators in one place. It’s our gateway to the opportunities made possible by a wide range of applications and integrations. This way, we help to connect the world and provide a knowledge hub for the industry. Q. Please briefly Learning Day.
introduce
Milestone
Community
Milestone believes in integrating best industry practices aligned with customers’ ever evolving demands Benjamin Low VP (APAC), Milestone Systems
59
VSaaS slated to grow big! Increased economic activities, higher urbanisation rates, residential and commercial infrastructure modernisation, and rising crime are factors driving the need for video surveillance in India. A shift from analog to IP technologies, cloud solutions for storage, and rise of video surveillance-as-a-service (VSaaS) present new, untapped opportunities for security solution providers. By The Editor, a&sINDIA
I
nsight on the SaaS and VSaaS Market
JULY 2018
According to Ashish Gujarathi, AVP- Non CCTV Products (Access Control, VDP & Intrusion Alarm) Prama Hikvision India Pvt. Ltd., “With the growing demand of SaaS & VSaaS from BFSI and Retail customers, the SaaS and VSaaS market segments are showing a strong year on year growth of more than 30%.These modules are becoming more cost effective and viable for end-customers to run the business more efficiently. Additionally, IoT (Internet of Things) has enabled to reduce the operating cost of the organization by using Managed Infrastructure Services clubbed with SaaS / VSaaS. Now Managed Infrastructure Services has become an integral part of SaaS / VSaaS trend.”
www.asindia.in
He continued, “There is a lot of hype around Software-Defined Camera (SDC) concept in the video surveillance market. The grapevine is that it will enable diversified video analytics algorithms, developed by the independent software vendors (ISV) ecosystem, to run on one
60
camera. It will be interesting to see whether the SDC model is able to run like a smartphone, with a unified operating system, plus dynamic app ecosystem. However, video surveillance as a service (VSaaS) or video analytics as a service (VAaaS) are two more ongoing examples of ICT changing traditional video surveillance business models. These two technologies offer vendors the possibility of generating Monthly Recurring Revenue (MRR), a concept commonly used for Information and Communication technology (ICT).” According to Prakash Prabhu Regional Sales Director –India, Pivot3, “SaaS is a well-defined market already, Video Surveillance as a Service or VSaaS, while appealing for many reasons, has not been previously achievable due to concerns and challenges around bandwidth and system performance, trust in system security, meeting comprehensive security compliance, and the ability to scale.” He continued, “In overcoming those challenges, VSaaS offers a range of advantages to various organisations
and environments. End users and customers of the service will benefit from an affordable, subscriptionbased surveillance service that is technologically advanced compared to what they would install and run on their own.” According to Balaji Sivakumar Director, Product Marketing, Western Digital, “A trend we’re seeing is an evolution from traditionally onpremise NVR installations to both on-premise and VSaaS installations. In a report by MarketsandMarkets, the Video Surveillance as a Service (VSaaS) market was valued at $1.7 billion in 2016 and is expected to reach $5.93 billion by 2022, growing at a CAGR of 22.0% between 2017 and 2022. This includes hosted, managed and hybrid architectures.” He continued, “With the growing need for real time analysis of data, edge technology seems to be taking over the VsaaS market. Gone are the days of collecting surveillance data on premise and then transferring it to a safe spot solely for analysis and archival. We have now entered a
time where data needs to be analyzed and insights need to be generated in real time and on-premise. This has become possible due to Edge Analytics and is leveraged across industries from retail, hospitality, to the service industry and many more. This technology allows distributed resources to be managed from a single point of control and facilitates fast and local actions on data without network dependency.” The Developments that are Paving the Way to Make VSaaS a Useful Tool for Security Planners According to Ashish Gujarathi, “The need for integrated security system
has paved the demand for VSaaS from banking customers. Retail and BFSI customers needed Integrated CMS and VMS platform for catering to their security related needs. Additionally, SaaS model is also applicable in Managed Infrastructure Services for Energy, Lighting Control and Access.”
recurring revenue stream, and for their customers, it can neutralise additional surveillance costs, and allow them to standardise on a common infrastructure that reduces support requirements, improves incident response times, and allows tracking across multiple tenants for loss prevention without having to use multiple interfaces.”
According Prakash Prabhu, “Offsite data protection and system management via a fully supported service is appealing as data growth skyrockets and management of security and surveillance becomes more complex. For managed service providers, VSaaS can translate to a
With the growing demand of SaaS & VSaaS from BFSI and Retail customers, the SaaS and VSaaS market segments are showing a strong year on year growth of more than 30% Ashish Gujarathi AVP- Non CCTV Products (Access Control, VDP & Intrusion Alarm) Prama Hikvision India Pvt. Ltd.
61
According to Balaji Sivakumar, “As cities get smarter, there is a dire need for 24*7, always-on surveillance systems to help keep the cities as safe and secure as they are smart. The data generated by surveillance cameras can be analyzed either on the edge or at a later point of time for unearthing insights. This works as an extremely useful tool in understanding the efficiency and effectiveness of the security measures implemented. The evolution of edge systems was also accelerated by combining different sources of data to add context to the surveillance data getting generated on-premise.” He continued, “One of the biggest applications of surveillance and security can be seen in smart homes and connected devices, that makes technology and data flourish at our wrists and fingertips and opens avenues for centralised surveillance and security. Even in the automotive industry, particularly in autonomous driving, dash cams are an integral part of the navigation system. Hence, it is imperative for them to be edgeanalytics compatible, since the surveillance data must be analyzed, processed and fed back into the system for self-driving to be made possible. Apart from this, the retail industry also takes help from VSaaS, not only for surveillance but also to explore and understand customer behavior, leading to the generation of new marketing strategies and tactics.” He further continued, “All this surveillance data from CCTVs and dash cams have storage and analysis requirements. WD storage solutions have the capacity to make all of it possible, from the Edge to the Core. WD Purple microSD cards are
optimised for 24/7 video surveillance cameras – which is key to security planners when there is a need for performing basic real-time analytics at the edge, especially in cases where there may be unexpected power failure resulting in loss of connection to the NVR. In such cases, the WD Purple microSD card kicks in & the video recording carries on unaffected. The ability of WD Purple microSD card to operate continuously for up to 2 years (64GB model) makes it a go-to storage solution for security planners.” Key Benefits Offered by VSaaS Systems to Video Surveillance Customers Ashish Gujarathi stated the key benefits of VSaaS: Real Time Alerts on Central Command Station (CCS) Live View of Video gets Pop-Up of the incident site on Alarm 24 x 7 Proactive Management and Monitoring of Critical sites Incident based Real Time Monitoring at CCS and on Mobile App Authentication & Validation through Two-Way Audio / Video Call Complete Incident Reporting Health Maintenance of the system Reduces the cost of Physical Guards, thus providing better Security and expedited ROI According to Prakash Prabhu, “There are distinct opportunities
JULY 2018
www.asindia.in
VSaaS solution providers must be able to provide security compliance in a simple, straightforward manner that addresses the technology triad for reliability, resilience and scalability Prakash Prabhu Regional Sales Director – India Pivot3
62
for companies with multiple tenants on a single infrastructure (shopping malls, rented or shared office space) ISP/Telecom companies that install dedicated network infrastructure for the backhaul of the video back to the core datacenter, or for government entities seeking to launch Safe City initiatives, there are challenges in each case. For government entities, VSaaS offers the ability to improve inter-agency collaboration, which can result in better decision making, safer public spaces and a more comprehensive way to manage and increasingly complex threat landscape.” Significant Problems Faced by Advanced Vsaas Systems to Operate Effectively According to Ashish Gujarathi, “Multi-location sites, spread across urban & rural areas adds to the complexity of effectively operating VSaaS." Some of the frequent operational challenges faced by the end-users. High Broadband Internet services in order to fetch video on-demand in case of alerts and mission critical monitoring 24x7 power back-up, with effective UPS monitoring QRT to periodically monitor the sites in regular intervals
According to Prakash Prabhu, “In terms of performance, bandwidth can become an issue especially if the environment is distributed with multiple sites spread over a wide network. Maintaining image quality is vital in video surveillance and making sure that the infrastructure is capable of this, especially in degraded mode, is crucial. When it comes to data security, the human element, or human error, becomes an issue. Further, preventing unauthorised access, leaks and inappropriate use is crucial, especially when sensitive data is involved. Government agencies are reticent to share data between the various agencies that make up their broader environment, so a multi-tenanted approach must deliver solid data security and robust practices that allows that which should be private, stay private. Compliance remains a big issue, especially with government clients or regulated industries.” He continued, “VSaaS solution providers must be able to provide security compliance in a simple, straightforward manner that addresses the technology triad for reliability, resilience and scalability. Pivot3, the performance and technology leader in hyperconverged infrastructure solutions, and its partner HyTrust, deliver multitenant infrastructure solutions that provide the performance, scale, and efficiency required of cloud and virtualised data centers, as well as the required levels of data protection and security controls needed to simplify regulatory compliance and safeguard against the risk of breaches and other attacks.” He further continued, “Finally, scale remains an issue across all
applications of VSaaS. Video data is continually increasing at a staggering rate, placing a heavy burden on the ability of an IT infrastructure to scale. Not only does it need to scale to support data growth and retention requirements, it must do so in a manner that is seamless and nondisruptive as new tenants come in, or as regulations change. And it must do all of this while maintaining an acceptable level of cost for the VSaaS provider to make the solution viable in the first place. Pivot3 HCI allows IT organisations to leverage bestin-class solutions to create secure, modular infrastructure that provides the necessary levels of protection and performance where they are needed the most based on business priorities and requirements mitigating the technology risks of VSaaS service providers.”
the IT ecosystem and now they are making inroads into the security industry. We at Hikvision have two Video Management System (VMS) software Platform i-VMS 8600 & i-VMS 5200." Stating here some of the applications these Platforms support. Video Management System Alarm Management System Managed Infrastructure Parking Management Entrance, Entry & Exit monitoring People Counting Heat Mapping Que Detection and many other AI applications
Applications of Platform as a Service (PaaS) And Infrastructure as a Service (IaaS) According to Ashish Gujarathi, “Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) are time tested and proven concepts in
With the growing need for real time analysis of data, edge technology seems to be taking over the VsaaS market Balaji Sivakumar Director, Product Marketing Western Digital
63
Uniview is the pioneer and leader of IP Video Surveillance in China Uniview endeavors to build a safer world by providing professional, reliable and cutting-edge products and services. By Uniview Technologies Co. Ltd.
U
niview is the pioneer and leader of IP video surveillance which started video surveillance business in 2005. Firstly introduced IP video surveillance to China, Uniview founded in 2011 and now is the third largest player in video surveillance in China. In 2016, Uniview has the 7th largest global market share(IHS Markit). Uniview has complete IP video surveillance product lines including IP cameras, NVR, transmission device, storage, VMS and display devices which featured with abundant innovative and leading technologies such as Ultra 265, smart analysis, 4K, starlight etc.
Ximen Yan
International Business Department Uniview JULY 2018
www.asindia.in
We started to invest in AI technology research three years ago. A professional algorithm team built by more than 100 engineers has been ready. Benefit from our rich experience in Chinese high-end market, Uniview is able to transfer ability and mature solution to international market
64
Looking Ahead for a New and Improved Homeland Security Structure By a&sINDIA Team
CONSIDERATIONS FOR THE FUTURE WHEN HOMELAND SECURITY AND NATIONAL SECURITY ARE THE TWO SIDES OF THE SAME COIN According to Robbin Shen, Managing Director, Dahua Technology India Pvt. Ltd., “Well, the two must chalk out mutually beneficial strategies that don’t duplicate but integrate the entire system so that their concerted operations will thwart nefarious designs and ensure safety and security to people and properties. Communication, contacts, coordination and combat readiness will be given top priority in future operations. Whether it is natural disaster or a terrorist attack all security personnel will bring in synergy and synchronization in their functions and responsibilities.”
JULY 2017 JULY 2018
www.asindia.in www.asindia.in
According to A. L. Narasimhan, AVP, Government Projects, Prama Hikvision India Pvt. Ltd., “While national security is generally associated with foreign affairs and defence, homeland security is more concerned with the internal affairs of a country. It is more associated with preparing and protecting the nation against terrorism and other hazards like natural disasters and public health emergencies. As both are concerned with the Safety and Security of citizens, we may call it as the two sides of the same coin.” He continued, “India has taken giant strides in bolstering Homeland Security mechanism by implementing Safe
66
India needs cutting edge security solutions to enhance the Nation’s capabilities in countering modern day security threats. Homeland Security Forces need developing solutions relating to Access Control, Visual-Intelligence, Counter Terror Mechanisms, Specialised Communications, Armour, BombDisposal, Command Centers, and Training, that will enhance their abilities to prepare and plan for emergencies as well as their response and recovery skills. City Projects and Smart City Mission.The key Homeland Security challenges, including Counter-insurgency and Counter-terrorism operations, Trans-national crime, Coastal security, Critical Infrastructure Security, Cyber Security, Mega-city policing, Countering Illicit Financing, Money Laundering and many such issues concerning internal security.” He further continued, “India’s New Homeland Security challenges require advanced India specific products and solutions that are more suitable for police and para-military forces. There is a lot of scope for innovations in systems and accessories, including Bullet Proof Jackets, Headgear, Weapons, Night Vision capabilities, Body Worn Cameras, Mobile Enforcement Solutions and Advanced Communication Devices supported by Indigenous GPS systems, Land Mine Detectors, Armoured Vehicles, UAVs (Drones) and Jammers. India’s Homeland Security market is expected to double to US$ 16 billion by 2018. India’s security market promises vast opportunities for the fast growing security manufacturing sector.” Addressing the considerations for the future A.L. Narasimhan said, “The Homeland security domain has expanded beyond the physical security domain to cyber and social media frontiers. The government must enhance the overall physical security capabilities of homeland security forces with latest technologies and resources to get them future ready.” He continued, “Cyber Terrorism and the threat against the nation's infrastructure must be the prime consideration in planning for homeland security. While terrorists still inflict mass casualties
• Thermal imaging for detection of persons and vehicles in complete darkness • Higher levels of authentication for protection against cyber threats Thereby it enables you to detect potential and real incidents at an early stage through the efficient – and secure – sharing of data in real-time.”
Robbin Shen Managing Director Dahua Technology India Pvt. Ltd.
through guns, bombs and other conventional weapons, terrorist groups can become increasingly familiar with information technology and its application as a weapon. Social media has become another front for the unverified news, sensational videos, inflammatory speeches trolls and tweets that cause tension, spread rumours and violence between communities. This mission critical challenge needs a social media cell for crisis management from the Homeland Security perspective.” According to Sudhindra Holla, Sales Director India & SAARC, Axis Communications, “India still does not have an Internal Security Act, however Clean India mission, Digital India and internal security are among the important priorities for the Government now. We see this as very encouraging. Internal security or national security should be proactive and a national prerogative. The scope of national security is vast and with better flow of intelligence, we will be more resilient to respond to disasters; whether natural or the result of terrorist action.”
A.L. Narasimhan AVP, Government Projects Prama Hikvision India Pvt. Ltd.
• Remote access to real-time and recorded video in HDTV quality
He continued, “Efficient manpower is an important factor. For this, the members must be aware about latest developments, infrastructure & technologies, threats and countermeasures. Needless to mention, proper coordination between all agencies is a must for the success of homeland security in the coming days.” REASONS FOR MAKING RISKBASED DECISIONS IN HOMELAND SECURITY DIFFICULT
Sudhindra Holla Sales Director – India and SAARC Axis Communications
He continued, “At Axis, we have the solutions that provide the most robust, secure and explosion protected IP surveillance devices and allows you to experience the benefits of leading-edge technology with capabilities such as: • Automatic alerts at security breach and advanced intelligent video applications
According to Capt. Praveen Dahiya, Managing Director, InQuest Advisories Pvt. Ltd, “Homeland security agencies must be able to accomplish their designed assignments properly, safeguard the interests of citizens, and secure the life and property of the nation. Similarly, the future of homeland security depends upon the extent to which these agencies are able to fulfil their goals and ultimately the extent to which citizens believe that they wish to continue with the prevailing national security structure.”
Praveen Dahiya Managing Director InQuest Advisories Pvt. Ltd
According to Robbin Shen, “Accurate data scarcity and reliability are main issues when attempting to assign probabilities to the threat of terrorism. Despite intense efforts by the intelligence community, threat data can be sporadic and spasmodic and too general to eliminate uncertainty.” He continued, “The Homeland Security has been grappling with a variety of significant challenges, including coordinating across multiple security agencies, reporting to several designated committees, and interacting with the public, intelligence and security personnel. Homeland Security has to cut through a labyrinthine maze of bureaucracy before acting on any risk-based decision. Hence, in a democratic set up as those who are engaged in
67
Homeland security are answerable it is difficult to take a risk-based decision and act unilaterally.” According to A.L. Narasimhan, “The characteristics of terrorism make it more dangerous and difficult to combat. Clearly, new and innovative approaches are necessary to protect and defend against terrorism. Scientific and technological breakthroughs resulted in significant changes in the tactics and weapons used in the conflict. From the corporate wars fought in the boardroom to the war on terrorism fought in virtually every corner of the world, technology provides combatants the ability to both protect and destroy.” According to Capt. Praveen Dahiya, “When certain things are static, it is easy to make a plan or take any decision with regard to an issue impacting that domain. But, homeland security is an area which is very dynamic, the factors changing very often depending upon the political scenario, social and economic changes, etc. So, it is very difficult to evaluate the magnitude of threat that may come and its source. That is the reason, when a risk-based decision has to be taken; different other relevant factors have to be taken into consideration, i.e. Risk= Threat (target will be selected by a threat actor, likelihood of an attack, probability); V = Vulnerability (exposure); C = Consequence (expected Impact of attack). In short, Probability of the threat/ attack, Vulnerability existing in the organisation, and Consequence of an attack – all these have to be taken in to considered when decision has to be taken with regard to any risk.” JULY 2017 JULY 2018
www.asindia.in www.asindia.in
He continued, “Further, this is because, we have no control over the type of threat/attack, how it will happen, modus operandi that is going to be adopted by the attacker, capability of the attacker. So, depending upon all these factors, the effect of attack will also vary. So, we must be very serious to understand the vulnerabilities existing in our installation/organisation and looking to it all appropriate measures have to be taken to plug those vulnerabilities.”
68
AREAS OF CONCERN INCLUDED IN HOMELAND SECURITY According to Robbin Shen, “The areas of concerns are terrorism, insurgencies, Naxal menace, fringe elements, political and social unrest, illegal immigrants, porous borders, infiltration of Islamist militants, natural disasters, aavailability and reliability of data,cyber-attacks, fund crunch to acquire latest technologies and inadequate response system.” According to A.L. Narasimhan, “The focus of homeland security is to protect the people, infrastructure and resources. We will never fully know the majority of the protections and activities undertaken in an effort to ensure our security. While some find comfort in that fact, others have expressed outrage over the possible loss of civil liberties and privacy. The biggest task for the government is to
Homeland security agencies must be able to accomplish their designed assignments properly, safeguard the interests of citizens, and secure the life and property of the nation Praveen Dahiya Managing Director InQuest Advisories Pvt. Ltd
using robotic submarines to deliver thousands of tons of cocaine annually to the United States. Technology is good as long as it is in good hands but the same technology in the wrong hands can be misused and put people into trouble.” According to A.L. Narasimhan, “The value of information technology in the war against terrorism is ever increasing. Information technology can be used as an offensive or defensive tool/weapon. Offensive use of information technology may include systems or software that deny, exploit, corrupt, or destroy an adversary's information, informationbased processes, information systems, and computer-based networks while protecting one's own. Defensive use of information technology may include intelligence gathering systems, sensor networks, alerting and communications systems, and systems that interrupt massive amounts of data to uncover patterns of activities related to terrorism. Technologies such as Video Surveillance, Smart ID cards, Face recognition and data fusion techniques are just a sample of the tools; we can use these technologies to combat terrorism both at home and abroad.”
protect the citizens without dissuading their individual civil rights, which is a very challenging task given the size and population of our country.” TECHNOLOGY’S CONTRIBUTION TO HOMELAND SECURITY AND THE WAY IT MAKES US MORE VULNERABLE Robbin Shen said, “Well, technology is actually a boon to Homeland Security without which present day operations are well-nigh impossible. Technology plays a major role whether it pertains to manning remote sites, surveillance of rugged terrains, identifying criminals from a crowded place though face recognition solutions, and preventing intrusion though thermal imaging,, Technology in fact is used in critical infrastructure protection, detection and mitigation of a catastrophic terrorists attack , border and transportation security, video analytics and information analysis.
He continued, “Regarding vulnerabilities I would say that technologies are largely open and due to this openness criminals take undue advantage which can lead to unintended consequences.” He detailed, “For example the terrorists in the Mumbai incident even used search engines during their attack to identify individual hostages and to determine, based upon their backgrounds, who should live or and who should die. These innovations gave terrorists unprecedented situational awareness and tactical advantage over the police and the government. Newer forms of technology are also subject to criminal misuse. Robots are becoming more commonplace, and international organised crime groups and terrorists have lost no time in deploying these technologies as part of their field operations. For example, drug traffickers in Latin America are
Accurate data scarcity and reliability are main issues when attempting to assign probabilities to the threat of terrorism. Despite intense efforts by the intelligence community, threat data can be sporadic and spasmodic and too general to eliminate uncertainty Robbin Shen Managing Director Dahua Technology India Pvt. Ltd.
69
According to Capt. Praveen Dahiya, “The infusion of technology in security has resulted in drastic changes to the strategy and tactics; becoming the deciding factor in achieving desired results. The increased impact of these tools has profoundly affected society at both mental and physical levels.” He continued, “From the corporate boardroom strategies to some of the serious homeland security challenges, technology provides combatants the ability to both protect and destroy. This double-edged sword has made our planet more vulnerable than safe. Vulnerability increases with the fact that while technology is unbiased in providing options to augment either protection or destruction element; it does get biased by the intent of humans controlling it. And when it is about humans; social, political, religious, economic, climatic and any other unknown factor could become the factor for technology being largely destructive only triggering the domino effect of destruction.” ROLE OF THE GOVERNMENT AND CITIZENS
JULY 2017 JULY 2018
According to A.L. Narasimhan, “In the government's fight to defend and protect all of us from terrorists, information from human sources, ground- based sensors, airborne intelligence platforms and satellites will be combined to monitor activities of known or suspected terrorists as well as to collect intelligence from which we can infer the plans of terrorists. The new war is all about information, vast amounts of information from all over the globe. Homeland Security plans should be designed in such a manner that citizens can play a proactive role in forewarning threats and reporting incidents.”
www.asindia.in www.asindia.in
According to Sudhindra Holla, “Security cannot be the responsibility of the government alone, they should consider offering incentives with respect to the adoption and implementation of security systems and technology aiding its implementation. Regular third party security audits should be conducted to ensure that the systems are up-todate to counter any security threats.”
70
According to Capt. Praveen Dahiya, “Government has many arms (departments) to fulfil its responsibilities towards its citizens. Government needs to evolve a system in which all these departments should work jointly. We had many experiences in the past in which the required level of cooperation has not taken place, and hence, the government agencies were not able to meet the eventualities satisfactorily.” He continued, “In many circumstances, the government alone cannot manage the HS enterprise properly. Here comes the importance of Public Private Partnership. So, what the government does? – They identify certain industrial sectors which are badly in need when an emergency occurs, and establish tie-ups, linkages, MoUs, Contracts
The biggest task for the government is to protect the citizens without dissuading their individual civil rights, which is a very challenging task given the size and population of our country A.L. Narasimhan AVP, Government Projects Prama Hikvision India Pvt. Ltd.
so that when an emergency occurs, these private sectors would come forward, take up the responsibility to provide services to the citizens.” He further continued, “Citizen’s role in managing homeland security is one the most important things missing in our current developmental agendas. Citizens must learn and also make efforts to increase education and knowledge at all levels of the society about their duties beyond rights. Education or knowledge without feelings is nothing. Ideas of service must bring sea change in the security stature and transforming individuals from passive citizens to citizens in action.”
Security cannot be the responsibility of the government alone, they should consider offering incentives with respect to the adoption and implementation of security systems and technology aiding its implementation Sudhindra Holla Sales Director – India and SAARC Axis Communications
71
Hikvision Launches EasyIP 4.0 Cameras and NVRs to Help Small and Medium Businesses Maximise their Site Security
By Prama Hikvision India Pvt. Ltd.
H
ikvision, the world’s leading provider of innovative video surveillance products and solutions, has announced a new range of EasyIP 4.0 cameras and NVRs. Building on the capabilities of their EasyIP 3.0 range, these provide simple, practical and affordable surveillance solutions for small and medium size businesses. The EasyIP 4.0 products are built on Hikvision’s H.265+ Smart Codec, which reduces bandwidth and storage requirements by up to 50% over H.265, delivering major IT savings for small and medium size businesses. JULY 2018
www.asindia.in
As an additional benefit, the EasyIP 4.0 range introduces a number of new technology innovations to help businesses maximise their surveillance and security. These include: Hikvision AcuSense – key benefits Integration of Hikvision AcuSense into EasyIP 4.0 IP cameras and NVRs, helps filtering out false alarms with more than 90%
72
accuracy, and faster reaction to real security threats. Hikvision AcuSense works by detecting humans or vehicles, and effectively filters out false alarms triggered by natural movements, such as rain or leaves. With automated strobe light and audio alarms, Hikvision AcuSenseenabled cameras also deter wouldbe intruders before a security breach occurs. Besides, the Hikvision AcuSense cameras further incorporate Hikvision “Powered by DarkFighter” ultra-low-light illumination technology, which provides superior surveillance images, even at night. Hikvision ColorVu – key benefits EasyIP 4.0 ColorVu cameras use warm, supplemental lighting to deliver bright colour video images, even at night. Round-the-clock colour-boosting capabilities are powered by an F1.0 super aperture, a more advanced sensor, warm supplemental lighting, and a range of other technologies. With brighter, more colourful video, EasyIP 4.0 ColorVu cameras support protection
against security breaches whenever they happen, day or night. The new EasyIP 4.0 ColorVu cameras can be paired with one of Hikvision’s AcuSense-enabled NVRs to minimise false alarms, and speed up target searches.
In the past, surveillance features such as ultra-highdefinition video, night-time colour video and automated strobe light and audio alarms were out of reach for many smaller organisations. Now, with the EasyIP 4.0 range, we have now made these features accessible to small and medium size businesses, helping them achieving much higher levels of site security Frank Zhang General Manager International Product Marketing Department Hikvision
Honeywell Introduces New Connected Building Software to Optimise Space Usage and Operational Costs IoT-enabled Honeywell Vector Space Sense connects organisations to actionable insights for better-informed space decisions
By Honeywell
H
oneywell (NYSE: HON), a global leader in Connected Buildings introduced the Honeywell Vector Space Sense, a software solution that shows where, when and how building spaces are used at any given point in time. As a result, the building operations team can make better-informed real estate and space usage decisions that provide opportunities to optimise costs and promote better building experiences for occupants. “From higher levels of employee productivity to healthier environments that help drive cost savings, Connected Buildings have real benefits for owners, operators and occupants,” said Vimal Kapur, president and chief executive officer, Honeywell Building Technologies. “Honeywell Vector Space Sense is the latest example of how Honeywell is using cuttingedge technology to enable smarter, data-driven buildings that work for their organizations.” Recent studies indicate most offices around the world are underutilized by as much as half of their actual capacity due to factors such as shifting work schedules, mobile technology usage and changing business needs. However, many facility managers lack the comprehensive insights required to take action to address these usage
issues. This can lead to overpaying for unused space, wasted energy usage, off-temperature spaces and other inefficiencies that negatively impact an organisation’s bottom line. Honeywell Vector Space Sense helps address this issue by gathering and analyzing data from multiple sources throughout a building to deliver actionable insights that help personnel better utilise, optimise and prioritise building spaces. The facility team can view these insights through detailed, information-rich dashboards and reports incorporating visualisation methods like maps, usage profiles, overall trends and other metrics to show where, when, and how space is used, along with opportunities to optimise usage and
help reduce costs. For example, organisations can gain the necessary insights to repurpose unused spaces for more productive uses, make better-informed decisions about future space investments or divestments, and better align building equipment schedules with actual usage patterns. Honeywell Vector Space Sense is part of Honeywell’s Connected Services portfolio, which includes other technologies such as the Honeywell Vector Occupant App that leverage the connectivity of buildings to improve how they operate and the experiences they offer for those who visit and work within them.
Expenses associated with unused building spaces often go unnoticed, simply because it’s so difficult to get an accurate, moment-bymoment view into how building spaces are used, or if they’re being used at all.Honeywell Vector Space Sense takes the mystery out of space usage through real-time, IoT-enabled insights that give organisations the real picture of where and how people are using spaces, so they can get the most out of their buildings John Rajchert President, Building Solutions, Honeywell Building Technologies
73
Dahua Thermal Cameras Create Value with Temperature Dahua Technology announced that it had developed a new generation of thermal imaging devices. Since clear day and night monitoring is an important benchmark in assessing a surveillance system’s effectiveness, thermal imaging devices present a clear advantage in their ability to convert heat energy into an image visible to the human eye. By Dahua Technology India Pvt.Ltd.
lens, has a 29.70x22.30 field of view, and the older model TPC-BF5300 is 250x190 with the same lens. Meanwhile, newer models have received improvements in detailed information, contrast and other upgrades.
D
ahua Technology announced that it had developed a new generation of thermal imaging devices. Since clear day and night monitoring is an important benchmark in assessing a surveillance system’s effectiveness, thermal imaging devices present a clear advantage in their ability to convert heat energy into an image visible to the human eye. Conventional surveillance cameras are already capable of capturing video in daytime and well-lit areas. However, when faced with a poorly lit area or at night, these cameras’ video capture abilities begin to diminish as sensors must compensate for the lack of light by increasing sensitivity, thus producing a noisy image, if one is produced at all.
JULY 2018
www.asindia.in
Leveraging its experience in camera image analysis and intelligent algorithms, Dahua Technology has developed a new generation of thermal imaging devices with innovative functions that balance visible light with infrared, enabling users to effectively monitor an area under all lighting conditions. In addition, these functions include advanced capabilities such as intelligent temperature measurement and behaviour analysis, further extending the scope of surveillance applications such as perimeter protection or equipment predictive maintenance in substations. The new products adopt advanced uncooled infrared detectors with 400x300 effective pixels, realising a 40% increase over the previous infrared detector with-336x256 effective pixels. The benefit is that the field of view is increased, for example, TPC-BF5400 with 13mm thermal
74
Thermal imaging is probably the most reliable security solution for perimeter protection. A thermal camera is less sensitive to changes in the environment. It detects moving people or objects even in total darkness, 24 hours a day and 7 days a week. A thermal camera is not just for video surveillance, it is also suitable for remote temperature monitoring to prevent accidents. Calculating the corresponding relationship between received radiation energy and temperature, it shows the surface temperature of the target through different gray values. Currently, the temperature measurement tolerance is within a certain range- ±2°C, ±2%. It provides users with real-time information about substation equipment much more efficiently, saving time and labour. If the temperature of equipment or part of the station exceeds a preset threshold, the system will automatically trigger an alarm and alert management.
One Camera with the Capability of Two Hanwha Techwin announced the release of its PNM-7000VD, a multi-directional camera boasting the capability of two surveillance cameras in a single body.
By Hanwha Techwin
G
lobal security company Hanwha Techwin announced the release of its PNM7000VD, a multi-directional camera boasting the capability of two surveillance cameras in a single body.
Last year saw the release of the PNM-9081VQ, a four-channel multi-directional camera that allows a 360 degree range of surveillance. Thanks to the numerous positive responses received from the U.S. and beyond, Hanwha Techwin has launched another version, PNM7000VD, to strengthen its product lineup. The best feature of this new product is its ability to simultaneously monitor two areas through multiple angles by installing two camera lenses in one surveillance camera, which removes the need for multiple cameras in corners within buildings. The selection of field adaptable fixed lenses comprises of 2.4, 2.8, 3.6 and 6mm according to the desired direction and viewing angle. By installing two 2.4mm lenses, monitoring up to 270 degree can be achieved, making it perfect for surveillance of large spaces such as parks, parking lots and shopping malls. In addition, the full HD video feature enables clear and sharp monitoring. A comprehensive range of intelligent video analytics includes intrusion detection and motion detection, which help users to quickly respond in case of incident. The alarm quickly notifies the user of an intrusion based on virtual lines designated in places such as the doorway. With the new PNM-7000VD, installation and management have also gotten easier and more convenient. The users can install and manage just one single surveillance camera instead of multiple cameras to monitor multiple corner angles.
The key feature of our newly launched two-channel multi-directional camera is multi-angle monitoring with just one compact CCTV. The global market for video security has shown good responses to multi-directional cameras that can carry out the same workload as multiple cameras,” adding, “We’ll keep leading the global security market by introducing products that suit a variety of consumer needs based on the optical and chipset technologies we’ve accumulated for over 30 years A Hanwha Techwin source
75
Multi-Biometric Finger Vein and Fingerprint Standalone Time Attendance & Access Control Terminal
By ZKTeco
FV18 is a multi-biometric reader capable of capturing and processing finger vein and fingerprint biometric data at the same time. The new hardware platform uses ZMM220 core-board with 1.2 Ghz CPU. With optimisation of both hardware platform and algorithm, FV18 is one of high recognition rate, high security & high-speed terminal. The device offers flexibility of both standalone installation and installation with any thirdparty access control panels which support standard Wiegand signal. Features: • Multi-Biometric reader with finger vein and fingerprint authentication; JULY 2018
• Full Access Control Features: Webserver (Optional) ; Anti-pass back; Access control interface for 3rd party electric lock, door sensor, exit button, alarm and doorbell;
www.asindia.in
• Unsurpassed performance with highly accurate finger vein recognition technology; • New Firmware: Adopts new firmware which optimizes various functions and supports flexible user privilege setting for multi-level management
76
Display
2.4-inch TFT LCD Color Screen
Fingerprint Capacity
1,000
Vein Capacity
1,000
Card Capacity
5,000 (Optional) ID / Mifare / HID Proximity card / iCLASS card
Transaction Capacity
100,000
Sensor
ZK Finger vein senor
Algorithm Version
ZKFinger VX10.0, ZKFingerVein VX3.0
Communication
TCP / IP, USB-host, WIFI (Optional)
Access Control Interface 3rd Party Electric Lock, Door Sensor, Exit Button, Alarm, Doorbell Wiegand Signal
Input and Output, SRB
Aux. Input
1ea for linkage function
Functions
DST, Record Query, Anti-passback
Optional Functions
Webserver, WorkCode, Printer, Wireless Doorbell
Power Supply
12V DC, 3A
Operating Temperature
0 °C- 45 °C
Operating Humidity
20%-80%
SDK and Software
Standalone SDK, ZKAccess3.5 software
Dimension (L x W x H)
210.9 x 80.1 x 96mm
Vehant Technologies announces the launch of our 3D X-ray Baggage Scanner - KritiScan 6040R. TM
KritiScan 6040R is the Dual-energy X-ray Baggage Scanner designed and developed by Vehant Technologies to create virtual 3D images, which provide operator with isometric view of the scanned baggage by generating three dimensional image of the object. By Vehant Technologies
K
We, at Vehant Technologies are committed to the idea of making world a safer place. Through our vast range of integrated Security, Surveillance and Monitoring products & solutions we offer to our clients and customers the most contemporary security solutions Ritika Kaul
ritiScanTM 6040R provides extremely detailed images for enhanced detection capabilities. It is a compact X-ray baggage scanning system ideal for checkpoints and small baggage scanning at high security premises and other baggage scanning applications. Salient Features: • Dual energy based virtual 3D imaging. • Radiation safe as per AERB India. • High density alert feature. • Distortion correction through software. • Self-diagnosis feature. • Central supervisor console (Optional). • Threat image projection feature (Optional). • Energy saving device (Optional).
Manager Marketing, Vehant Technologies
77
CP PLUS Hosts Elaborate Iftar Party in Bangladesh
â&#x20AC;˘ By CP PLUS
CP PLUS recently hosted its annual Iftar Party in Dhaka, Bangladesh to celebrate the spirit of the holy month of Ramadan.
C
P PLUS the leading global manufacturer of advanced security and surveillance solutions with presence in over 60 countries across the globe. CP PLUS organised an elaborate Iftar party at ARAAZ Restaurant & Banquet in RAPA Plaza, as an expression of the companyâ&#x20AC;&#x2122;s gratitude to its partners in Bangladesh for their continuous support and for sharing a strong business relationship with CP PLUS.
JULY 2018
www.asindia.in
The party saw the presence of more than 100 people which included partners along with their families, top officials and the management from the CP PLUS Bangladesh team. Partners were addressed by Yasin Arafat, Country Manager, CP PLUS Bangladesh, wherein he expressed his gratitude and appreciation, on behalf of CP PLUS, for the contributions that they have made towards growing the business in the region.
78
It was a delight to host the Iftar Party for our esteemed partners. An Iftar Party is always a great way to celebrate the holy month of Ramadan where everyone comes together to break the fast at sunset. Our partners were present with their families at the party and everyone enjoyed themselves. We look forward to hosting many more in the years to come Aditya Khemka
Managing Director, CP PLUS
Dahua Chairman Spoke At China (Zhejiang)-Zimbabwe Business Forum
• By Dahua Technology
F
u Liquan, the Chairman of Dahua Technology, one of the leading solution providers in the global video surveillance industry participated in the China (Zhejiang) – Zimbabwe Business Forum on June 11, 2018 held in Harare, the capital city of Zimbabwe. Fu Liquan gave a speech at the forum on behalf of Dahua Technology.
JULY 2018
The forum, participated by political and business representatives on the Zimbabwean side, including President Emmerson Mnangagwa, and the Zhejiang delegation led by Secretary of Zhejiang Provincial Committee of the Communist Party of China, Che Jun, focused on exploring the business opportunities in Zimbabwe’s key economic fields.
www.asindia.in
Che Jun said that the China (Zhejiang)Zimbabwe Business Forum would serve as an important platform for business circles of both sides to get acquainted. He hoped that through this platform, members of the Zhejiang delegation will enhance its strategic cooperation with local companies and also find viable projects to invest in.
Fu Liquan was granted an opportunity to speak at this state-level business forum as an outstanding business representative. He briefly introduced Dahua Technology to all forum participants, and Dahua Technology’s business development in Africa, including a number of successful projects completed including airports, railroads, military harbors, safe cities, etc. During his introduction of Dahua Technology, Fu Liquan specifically mentioned President Emmerson Mnangagwa’s visit to Dahua Technology in April, 2018. He said that Dahua Technology, upon the request of the President, would establish a branch in Zimbabwe and help build Harare into a safe city in the future. In addition, Dahua Technology would bring professional trainings to local scientific and technical personnel and provide endto-end service and true value to the local government and people. President Emmerson Mnangagwa personally unveiled a plaque of
Dahua Technology Zimbabwe Liaison Office symbolising his warm welcome towards a Dahua branch in Zimbabwe in future. Under the expectations from both sides, dozens of projects were signed that day. With a mission of “Enabling a safer society and smarter living”, Dahua Technology, a leading solution provider in the global video surveillance industry, will continue to focus on “Innovation, Quality and Service” to serve partners and customers around the world.
Dahua Technology is willing to contribute to creating a stable economic development and investment environment for Zimbabwe Fu Liquan
Chairman,Dahua Technology
80
Matrix Concludes Enterprise Solution Meet - Matrix Insight 2018 at Belgrade, Serbia
Matrix Insight 2018, an inaugural edition of Enterprise Solution Meet was organised in Serbia, on May 29, 2018 in association with their regional partner MS Security System. Matrix unveiled its recently launched Face Recognition solution and PRASAR UCS. Numerous technology evangelists were a part of this one day event. • By Matrix Comsec Pvt. Ltd.
D
uring this event, Matrix showcased solutions equipped with advanced technologies from the domains of Time-Attendance and Access Control. Zeljko Djukanovic from MS Security System unveiled COSEC Face Recognition. It is a technology that records the user’s face through COSEC APTA mobile application. It ensures contact less authentication and identifies user’s face in less than one second. Matrix also demonstrated their Time-Attendance and Access Control solutions that help escalate productivity and security of SMEs, SOHOs and Large Enterprises. Matrix also exhibited enterprise grade TimeAttendance solution rigged with real-time features such as Auto Push Events to Server, Instant Notification, Automatic Device Identification, Scheduler Services for Report and Backup, and more.
Matrix also unveiled recently launched PRASAR UCS – Pure IP Solution for Modern Enterprises from its portfolio of Telecom products. It supports up to 2,100 IP users from a single box and helps streamline communication process.
We are enthralled to receive huge footfall from the visitors at our event. The interactions we had at the event has given us a proper insight of the customers’ requirements which we will be using to draft our future sales and marketing strategies for the region Ganesh Jivani
Managing Director, Matrix
81
CONNECT-2018: a partner meet in Kolkata
Tyco Securities- the security division of Johnson Controls recently concluded a partner meet in Kolkata. â&#x20AC;˘ By Johnson Controls India
T
he event coined as CONNECT-2018 was designed to bring in top partners and system integrators further attended by key consultants from Kolkata.
JULY 2018
www.asindia.in
Rajeev Samanta, Regional Sales Director, South Asia gave the welcome address followed by an introduction session of Johnson Controls offering by Ken May, VP Sales, APAC. Further to this, Snigdhodev Bhattacharya, Senior Strategic Sales Manager, took the audience through a journey of what is new on offer from Tyco Securities. The presentation also included information on new and updated technology across all product portfolios. The attendees were also given a brief introduction to the newly acquired cloud based surveillance company called Smartvue which makes the video solution offering far better equipped and robust than anything currently offered by the competition. Tyco Securities is looking forward to replicating this event across all key zones of business across India in the coming months.
82
Office in Bengaluru: Milestone Systems capitalisies its growth in India
In May 2018, Milestone Systems inaugurated a new office in Bengaluru, which was attended by some of the top names in the security industry
Glimpses of the office opening ceremony at Bengaluru
â&#x20AC;˘ By Milestone Systems
T
he office is a stepping stone for continuing their growth trajectory with well planned expansion in major metro cities of Delhi, Mumbai and Kolkata. Milestone Systems is in a strong position to do this now, having been delivering VMS solutions in India since 2006. Led by Amit Sarkar, the Country Manager for India, Milestone Systems intends to capitalise on its growth. Milestone Systems has a pool of excellent partners and dealers who share their belief in integrating the best industry practices aligned with evolving customer demands.
83
Axis Communications felicitated Outstanding Partners at South Asia Pacific Partner Summit 2018 held in Singapore
• By Axis Communications
A
xis Communications, the market leader in network video, concluded their three day annual South Asia & Pacific Partner Summit 2018 held in Singapore. The Summit, a joint event for the whole region, provided a platform to interact with key Axis Partners from 11 countries as well as Axis business heads and representatives both from the region and their headquarters. The event also helped facilitate cross pollination of ideas among key partners.
JULY 2018
The conference hosted interactive discussions around the growing importance of security in retail, smart city applications, in-depth panel discussion on innovation in cyber security and how it is interwoven with the organisation’s physical security needs.
www.asindia.in
The invited members, top performers from India SAARC included 22 partners from India, three from Bangladesh, four from Sri Lanka The conference was held between May 14 and16, 2018 in Singapore. It
84
Axis Communications felicitated the loyal partners and distributors for outstanding work in their respective fields. Over 25 key channel partners, invited from across India and SAARC. provided the members and sponsors an opportunity to engage and interact with top management from Axis Communications. They also got insights on the company’s vision and new technologies in the offing. Taking forward the Axis Communications’ value of crediting a major portion of their success to their channel partners, the participants were given insights into how Axis can support them in leveraging new market opportunities. India business strategy, product innovations and solutions were also discussed in depth at the conference. Axis Communications, which started its Indian operations in August 2007, is a leading provider of network video solutions for professional installations across verticals. The company’s customers in India include the Novotel Shrem Goa, Café Coffee Day chain, Fortis Healthcare, Punjab, Indian Public School, Coimbatore and some key smart city surveillance installations like Junagadh, Kolhapur and Nanded.
List of winners from India & SAARC region • Distributor of the Year - Inflow Technologies Pvt. Ltd. • Solution Partner of the Year Toshniwal Industries Pvt. Ltd. • Project of the Year - Aegis Automation India Pvt. Ltd. • Partner of the Year - Datacom Pvt. Ltd.
We owe a significant amount of our success to our partners and we believe in recognising and lauding their efforts and contributions. Axis is a strong channel focus organisation wherein we work hand in hand with all our partners who help us take the Axis brand to newer zeniths Sudhindra Holla
Sales Director- India and SAARC Axis Communications
WORLD SECURITY EXHIBITION DIRECTORY
AUGUST -NOVEMBER 2018
Please refer to the “Show Calendar” at www.asindia.in/events.aspx
PRIVATE SECURITY INDUSTRY CONCLAVE (PSIC) 2018 Date : 03/08/2018 Venue : FICCI, Federation House, New Delhi Tel : +91-11-23487515 Email : sumeet.gupta@ficci.com URL : www.ficci.com
SECUTECH VETNAM
AUGUST 2018
Date : Venue : Tel : Email : URL :
16/08/2018 – 18/08/2018 Saigon Exhibition & Convention Center, Ho Chi Minh City, Vietnam +886 – 2- 8729-1099 ext. 768 stvn@newera.messefrankfurt.com www.secutechvietnam.com
IFA Date : Venue : Tel : Email : URL :
31/08/2018 – 05/09/2018 Berlin ExpoCenter City, Berlin Germany +49-30-3069-6924 ifa@messe-berlin.de b2b.ifa-berlin.com
ADRIA SECURITY SUMMIT
SEPTEMBER 2018
Date : 12/09/2018 – 14/09/2018 Venue : Ljubljana Exhibition and Convention Centre, Ljubljana Slovenia Tel : +387-33-788-985 Email : summit@asadria.com URL : www.adriasecuritysummit.com/index.php/en
SECURITY ESSEN Date : Venue : Tel : Email : URL :
25/09/2018 – 28/09/2018 Messe Essen, Essen, Germany +49(0)201-3101-444 info@messe-essen.de www.security-essen.de
VISION JULY 2018
NOVEMBER
www.asindia.in
2018
Date : 06/11/2018 – 08/11/2018 Venue : Stuttgart Trade Fair Center, Stuttgart, Germany Tel : +49 – 711 -18560 -0 Email : info@messe-stuttgart.de URL : www.messe-stuttgart.de/vision/en
SECUTECH THAILAND Date : Venue : Tel : Email : URL :
88
08/11/2018 – 10/11/2018 Bangkok International Trade & Exhibition Center (BITECH) Bangkok, Thailand +886-2-8729-1099 ext 215 stth@newera.messefrankfurt.com www.secutechthailand.com
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
Company Name Aditya Infotech - CP PLUS
Location
Country
Gate fold India
Boon Edam
Page 5 India
Enterprise Software Solutions Lab Pvt. Ltd.
Page 90 India
Flir
Page 21 India
Hanwha Techwin
Page 02 South Korea
Honeywell
Page 13 India
Honeywell
Back index page with Flip (2) India
IVIS
Page 79 India
Matrix
Page 11 India
Matrix
Front Index Page with Flip (1) India
Messe Essen
Page 33
Magnetic Autocontrol Pvt. Ltd.
Inside Back India
Panasonic
Inside Front India
Prama Hikvision India Pvt Ltd
Page 03 India
Prama Hikvision India Pvt Ltd
Back Cover India
Solus
Page 17 India
Toshiba
Page 19 India
Tyco
Page 08-09 India
Uniview
Front Index Page with Flip (2) China
Zhejiang Dahua Technology Co., Ltd
Page 01 India
ZKTECO
Back index page with Flip (1)
Germany
India
89