Contents Market Update
a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies developments in CCTV, Digital Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home Automation and other fields relevant to electronic security.
06
ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄
Middle East Embraces High Technologies
Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shi General Manager Editorial General Press Jill Lai Editor in Chief Alf Chang Senior Consultant Senior Editor Eifeh Strom Reporter Steve Chin William Pao Reporter Lisa Hsu Reporter Coordinator Weiting Chen
In 2014, the Middle East continued to recover . The U.A.E. sees a promising future because Dubai is hosting the 2020 World Expo.
12
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com steve.chin@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com weiting.chen@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Arthur Wu
IP Video Surveillance Enjoys High Market Penetration in Middle East Vertical Market
34 Luxury Hotels Serve Up First Class Security
Executive Designer Designer Designer
Circulation & Subscription
Michelle Shih
Coordinator
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com michelle.shih@newera.messefrankfurt.com
Corporate Management
Collins Yuan Thomas Pin Chihung Lee
Industry Report
18 Prophecy From Security 50: Time for Solutions!
Group Manager Account Manager IT Manager
asmag.com
Jerry Wu
Assistant Manager
jerry.wu@newera.messefrankfurt.com
Secutech
Peggy Wu Echo Lin Eva Tsai
Trade Fair Manager Manager Project Manager
24 Security 50 Sets Trends for
28 2014 Top 50 Rankings
Juihui Lin Kay Yang Audrey Fang Wayne Ho
2015
collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
peggy.wu@newera.messefrankfurt.com echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com
International Advertising [Headquarters]
Manager Operation Officer Coordinator Sales Officer
juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com wayne.ho@newera.messefrankfurt.com
[Branches & Representatives]
40 Oil & Gas Pump Up Safety
Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Y. C. Suh Takashi Komori Nguyen Thu Ha
USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam
bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn
Product Exploration
48 Change Drives VCA Growth 54 Analog Players Seek to Regain Their Former Glory With HD-over-Coaxial 60 Beyond Opening Doors: Access Control Management Rules 66 Understanding Real PSIM Advertorial
16 WD Capitalizes on Rapidly-Growing Middle East 32 Tecnofire Detection by Tecnoalarm: Advanced Solutions and Hi-tech Products
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2014 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
02 Contents 04 Editor’s Note 72 Companies in This Issue
2
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
EDITOR'S NOTE
a&s Presents Cutting Edge Solutions and Industrial Trends for 2015 in the ME We are proud to present a&s 2014 Middle East Supplement. The Middle East region remains the most important for growth momentum of multinationals, especially in security. Although some areas in this region are experiencing political upheaval and economic instability, the oil exporting countries, especially GCC countries, have maintained healthy growth at 3.9 percent GDP growth on average in 2014, according to the International Monetary Fund. The region is famous for multiple large-scale projects. Adding in the fact that many Middle East buyers have deep pockets, we can see the most advanced and technology savvy solutions being adopted here. End users expect to achieve not only security or safety purposes from security equipment but also multiple management functionalities in different environments, especially in critical weather. In this supplement, we included the most updated, advanced security technologies, such as VCA, PSIM, and video/access control management systems, suitable for multiple verticals and applications, to provide a complete review of the latest security solutions. In this issue, we also proudly give you Security 50 for 2014. In order to clearly pinpoint the industry trends for 2015, this year, a&s also included the financial reports of the first half of 2014. After cross referencing these two lists, we found that the trend to develop solutions has become very obvious, no matter on the manufacturer’s side or sales channel’s side. IP technologies have not only contributed to revolutionary changes to security products but also inspire and motivate many security companies to evolve. Another significant message that we can gain from Security 50 2014 is the penetration of IP video surveillance devices in the SMB sector. IP video has already been widespread in large-scale projects. Now, major IP video suppliers are aiming at the SMB sector for more growth. However, since the fast development of the latest HD-over-coaxial solutions, competition between IP and HD-over-coaxial products in the SMB sector can be expected in the global security market. Security 50 sets the trends for the global security industry. We hope you enjoy reading this special edition to catch up with the most updated trends and solutions in the market!
Jill Lai
Editor in Chief, a&s International & Asia jill.lai@newera.messefrankfurt.com
4
Market Update
Embra
6
Middle East
ces High Technologies In 2014, the Middle East continued to recover for the following reasons. The U.A.E. sees a promising future because Dubai is hosting the 2020 World Expo. Saudi Arabia has lifted its restrictions on foreign workers and the government is continuing its investments in national infrastructure. Iran is ready to grow due to the recent easing of US sanctions. Other countries, such as Iraq and Oman, are benefiting from their oil and gas reserves. Regionally, the Middle East will remain attractive to all multinational suppliers in the coming years. n By JILL LAI
T
he Gulf Cooperation Council (GCC) countries — Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the U.A.E. — still remain the region’s top countries with the largest security markets. In 2012, the Middle East fell dramatically, “due to three unforeseen circumstances — the regional civil unrest, the fall in the price of oil and its production, and the fall in the US dollar,” according to IHS. The actual growth rate of video surveillance equipment in the Middle East fell to 5.3 percent. Although social turmoil and fluctuations in oil prices still made 2013 uncertain, the Middle East security market is predicted to bounce back to around 10 percent in 2013 and grow 12 percent in 2014. “The economy was a bit soft in 2012 and many customers delaying purchasing. Implementation of many projects began in 2013, resulting in an excellent year for us,” said Watheq Abu Gharbiah, Regional Manager of Middle East at FLIR Systems. Most of all the suppliers expect the recovering momentum to continue through 2014 and 2015. Firstly, the U.S. began easing some of its economic restrictions against Iran this January,
including its sanctions on cars and petrochemicals products. Secondly, recovery of the Iranian market would also raise the region’s average growth rate. The latest cheerful announcement is of Dubai winning the bid to host the 2020 World Expo. The BBC reported that authorities in Dubai forecasted the
6-month event to bring in around US$23 billion and cost the country around a total $8.4 billion, of which around $6.5 billion is expected to be government spending on infrastructure projects. Finally, the 2022 FIFA World Cup in Qatar is also serving as a major driver to boost the overall economy in the region.
▲ Watheq Abu Gharbiah, Regional Manager, Middle East, FLIR Systems
▲ Robert Kirkaldie, Director of Marketing/Sales, Security Systems Division, Southwest Microwave
▲ Aditya Khemka, Director, CP Plus
▲ Noriyuki Hayashi, Senior Sales/ Marketing Manager, System Solutions Department, MEA, Panasonic Marketing
▲ Aditya Sahaya, Director of Business Development, Prologix Distribution
▲ Hakan Özyiğit, Regional Director, Middle East, Bosch Security Systems
7
Market Update
▲ Critical infrastructure protection, especially in the oil and gas sector, still remains the most crucial in the Middle East to support its active economic activities.
Critical Infrastructure Protection To support the active economic activities in this region, protection of critical infrastructure ranging from airports, seaports, oil and gas, public utilities, highways, railways, metros, and etc., is important. Critical infrastructure protection remains as the most crucial market sector in the Middle East. The oil and gas sector requires refinery protection and is the largest market sector here. The scale of projects in this sector is also much larger than other market sectors. Aside from the GCC countries,
▲ Ali Boussi, Regional Sales Manager, BASS/ Samsung Techwin
8
Iraq, Pakistan, and the Northern African countries, also have great potential. Robert Kirkaldie, Director of Marketing/ Sales for Security Systems Division at Southwest Microwave, which designs and manufactures integrated, electronic perimeter security systems, especially for the oil and gas sector, in this region said, “In a country like Saudi Arabia, we mostly deal with perimeter projects of 3,000 to 5,000 meters. The biggest complex in oil and gas, which comprises of a storage tank, pipe lines, transportation, and all other facilities, can have a perimeter of up to around 20 kilometers. Thus, the size of a refinery is much bigger than a prison or power plant.”
▲ Miles Chen, Department Manager, International Sales Department 1, VIVOTEK
Another fast developing market sector is airports. Cities in the Middle East compete to build the biggest and most modern airports to attract tourists. Abu Dhabi is planning its new $3 billion international airport terminal, while Doha, Qatar is near completion with its new airport. “Dubai has the largest airport here. The old one, which traffics 150 million passengers annually has 3,500 CCTV cameras. The latest one has around 5,000 cameras. Elsewhere in the region, the latest airport in Doha will begin operations this year; Saudi Arabia has 15 new airports; and Kuwait International Airport also has plans to expand,” said Gharbiah. The Middle East is a project-oriented market. “Because it is so diverse, each country does have their particular preference toward products and partners. I think this unique characteristic brings a good opportunity for CP Plus to build up our own distribution business here. This year, we are going to set up five or six branch offices in some countries in the Middle East,” said Aditya Khemka, Director of CP Plus.
Saudi Arabia is Booming Fast Amongst the GCC countries, Saudi Arabia is gradually catching up with the U.A.E. in terms of security market demand and growth potential. Saudi Arabia has the highest number of large government projects, making it very important in this region. Peter Biltsted, Director of MEA at
▲ Tarek Ismail, Sales Director, Middle East, Tyco Security Products
▲ Baraa Al Akkad, Regional Sales Manager, Middle East, Axis Communications
Milestone Systems said, “Milestone will be more directly engaged in Saudi Arabia this year. This means we will put our feet on the ground in the country, whereas Milestone channel partners used to be in charge previously. We have a very good foothold in Saudi Arabia now, since we have done several large projects. Moving forward, we would like to leverage our past experience to strengthen our business foundation here.” In the past two years, Saudi Arabia heavily restricted the number of foreign workers to secure the employment of local workers. In 2014, the restrictions are expected to be lifted in order to continually push the market to grow. “Saudi Arabia just started their new financial year and the government has announced plans to build six new cities. It also made a US$200 million investment in aviation toward the building of new innovative airports. We can also expect several new cities in Saudi in the near future,” continued Tarek Ismail, Sales Director of Middle East at Tyco Security Products.
Large-Scale Government Projects Everywhere In terms of an average project size, it is not really possible to compare projects
▲ Cities in the Middle East compete to build the biggest and most modern airports to attract tourism.
in other GCC countries with those in Saudi Arabia. In Saudi, one city is just like a country in others. John Davies, MD at TDSi also echoed, “In Saudi Arabia, the projects are much bigger. Last year, we supplied systems to several large government projects across the Kingdom. Saudi Arabia is a very large country and represents more than 25 percent of the GCC GDP. When you do a project for an institute in Saudi Arabia, it includes offices that are
located all over the country. In contrast, institutes in the U.A.E. usually have only one or two offices.” Ismail continued, “Our company has been here for more than 20 years. In Saudi Arabia, for example, we have the largest bank in the whole region as one of our customers. It is a national bank with 400 branches and 2,000 ATMs in the country. The number of buildings for VIP service, VIP accounts, and money transfer, is over 200. More than 1,300 recorders and 8,000 cameras from mixed brands were used in that project. From a banking point of view, a project this size covers the entire banking sector in the GCC countries. In Qatar, for example, the largest capital bank has a maximum of only 50 to 60 branches.”
Religious Buildings, Universities, and Banks
▲ Saudi Arabia has been growing as the single largest market in the Middle East.
Saudi Arabia, being home to the largest and most holy Muslim mosques, has many religious projects. “It has many religious buildings, such as mosques and related infrastructures, where you
9
Market Update
▲ The Middle East will continue to recover in the following years, due to the 2020 World Expo in Dubai and the 2022 FIFA World Cup in Qatar.
can see thousands and thousands of cameras installed. Bosch Security Systems has done many projects in holy places in this country too,” said Hakan Özyiğit, Regional Director of Middle East at Bosch Security Systems. “Bosch is also involved in many prestigious projects in the Saudi Arabian education sector. The country has the largest population in the region and almost half of the Saudi Arabian population is aged below 30. Hence, its government is focused on education and plans to build more universities and facilities to ensure its a much more competitive Saudi workforce in the future.” Also, due to the country’s conservative nature and religious background, the government has strict laws toward gender segregation in many public places, such as restaurants and shopping malls. Therefore, a public place usually tends to have more cameras installed for security and monitoring, compared to other countries. For example, in Saudi Arabia, it is pretty normal to have around 1,000 cameras for a five-star hotel, while only around 100 to 200 cameras are installed in a five-star hotel in the U.A.E., according to an industry expert in this region.
10
Considerations for Doing Business Even though there are plenty of opportunities here, business is conducted very differently in the U.A.E. “The Saudi Arabian government sometimes has strong concerns about the origin of the products for certain projects to avoid products that are made in China,” said Noriyuki Hayashi, Senior Sales/Marketing Manager of System Solutions Department, MEA at Panasonic Marketing. Meanwhile, due to the sheer volume of government projects here, decision making usually takes a little while. Aditya Sahaya, Director of Business Development for Prologix Distribution also pointed out, “Traditionally, the U.A.E. is a very mature market, when it comes to CCTV and surveillance, and the end customers and consultants have very specific requirements which need to be adhered to. Saudi Arabia seems to be going down the same path. Despite a longer sales cycle, the country has been growing as the single largest market in the region.”
U.A.E. Remains Center of Middle East The U.A.E., especially Dubai, is still the financial center of the entire region and
shall remain so in the future, due to the 2020 World Expo being hosted in Dubai. Its security industry is growing very fast in all the different verticals and the government has set up strict regulations for the industry to follow. Compared to other countries, the U.A.E. has a larger market in the commercial sector, such as hospitality, retail, education, and banks. “Government authority instructs detailed security measures in all different market sectors, including the specifications of the security equipment in specific locations, such as in Dubai, Abu Dhabi and Qatar,” said Hayashi. In general, HD and megapixel has become a standard for video surveillance cameras and 180-day video storage is required for almost all the market sectors. Baraa Al Akkad, Regional Sales Manager at Middle East of Axis Communications said, “Because of the government rules, network video surveillance has a very high level of adoption here.” “The most recent government regulation in Abu Dhabi is that all the public/private schools should be covered by megapixel surveillance cameras. This regulation is called by Abu Dhabi Education Council (ADEC). The trend is expected to filter to other areas in the
U.A.E. and even Qatar. Government regulations require that the places such as sports field, corridors to classrooms, and other areas of the campus should have cameras installed. Staff offices and laboratories are recommended to install card readers for access control. Also, mobile NVR, vandal-proof cameras, and GPS tracking solutions are requested by school management to be installed on school buses,” said Ali Boussi, Regional Sales Manager at BASS/Samsung Techwin. “Samsung has solutions for above requirements to comply with ADEC new regulations related to megapixel resolution, advanced WDR with 120dB/130dB, video analytics, 180-day storage on RAID6, and failover and integration with access control systems through one platform.”
Is Africa the Next Middle East? FLIR and Milestone talked about their recent plans in Africa by analyzing its market growth potential. Watheq Abu Gharbiah, Regional Manager of Middle East at FLIR Systems: “In 2014 we expect to complete many large security projects in Egypt. Many of the projects are concerned with city surveillance, border security, critical infrastructure, and gas and pipeline security, etc.” Peter Biltsted, Director of MEA for Milestone Systems: “In Africa, Egypt and Sudan are fast booming markets, even though there is some unrest in the southern part of Sudan. There has been some significant growth there in Northern Africa as the growing middle class is starting to demand security. The government is also more supportive toward the public and is willing to invest in security, such as critical infrastructure and surveillance. People buy things to protect their assets and so they want to have video surveillance at home. We also saw an influx of new companies rising in Africa and a boom in the mining industry. We see the oil sector growing very fast in all parts of Africa, especially the northern, middle, and southern parts of Africa. That is why we want to put more feet on the ground in Africa, especially the southern part of Africa. We currently divide Africa into major three regions — the English speaking part in the south; the French and Arabic speaking countries in the west (Egypt, Libya, Sudan), and some English speaking countries in the middle. We are also looking at Tanzania (East Africa), Uganda, Rwanda this year. We are going to do more indirect sales in the Southern African countries. In short, we want to build up more channel players to raise our sales volume there.”
Oman, Bahrain, Iraq, Iran, Pakistan, Lebanon, and Jordan Compared to the U.A.E. and Saudi Arabia, countries such as Oman, Bahrain, Iraq, Pakistan, Lebanon, and Jordan are what major security suppliers in the region term as the emerging countries. The major factor is still their booming oil and gas industry. “In Oman, we have many critical infrastructure projects, such as oil and gas, airports, and other transportation projects; the government is also quite fast in making decisions. They had almost no security infrastructures in the past few years and are currently speeding up their infrastructures. Iraq has the largest oil and gas industry. We recently did one of their major refineries, using 156 thermal cameras. We are now going to a large project with a 600-kilometer oil pipeline in Iraq, too,” said Gharbiah. Some might say Iran will start to recover in 2014 or 2015 too, due to the easing of US sanctions. Hayashi said, “The
US sanctions on Iran has stopped all the imports with US-related technologies and almost all the electronics devices had been affected. However, the new Iranian government brings hope to the people and to Iran. With a population of 80 to 90 million, and as one of the world’s top 5 countries with huge amounts of oil and gas reserves, we are expecting optimistic future outlook for Iran.” In addition, “IP-based video surveillance has pioneered in countries, like Iran, where both the systems integrators and the end users have a better understanding toward IT and IP technologies, which in itself lay a good foundation for IP-based video surveillance market development,” continued Stefano E Cini, GM of Viseo Systems. “VIVOTEK has a good market share in the overall Middle East market, especially in banking application in Iran. Even
though currently our business has been affected too, I believe, with the new government and recent easing of US sanctions, Iran will start to get better this year,” also echoed Miles Chen, Department Manager of International Sales Department 1 at VIVOTEK.
Market has High Potential Plenty of opportunities can be found in the Middle East market. We can predict that the market will continue to grow exponentially in the following seven years, due to the region’s hosting of major global sports events. However, the civil unrest in Syria and Egypt, in addition to influences from the US and European economies, will continue to make this region unpredictable.
11
Market Update IP Video Surveillance Enjoys High Market Penetration in Middle East IP-based video surveillance has penetrated all market sectors in the Middle East, due to government regulations. Regulations also drive the growth of intelligent video adoption in different market sectors in order to manage huge amounts of video data. In this article, a&s invited some experts to discuss how IP-based video surveillance is implemented in the region. n By JILL LAI
T
he video surveillance market is greatly influenced by government rules. HD and megapixel has become standard for video surveillance cameras and 180-day video storage is required for almost all market sectors. The Ministry of the Interior (MOI) also updates the rules every year. The government regulations usually include where the security cameras must be placed, several details about its specifications, and also, how to make sure they are able to produce good quality video. “In the Gulf Cooperation Council (GCC) countries, it is important to make sure that
12
your IP-based video surveillance system meets all legislation and governmental standards, which should be the key elements of business here,� said Peter Biltsted, Director of MEA at Milestone Systems. According to an industry expert, some IP-based video systems might have the problem of losing images, which would cause the end users and systems integrators to get fined afterwards. Therefore, high reliability of IP-based video surveillance systems is required for this region.
High Adoption of IP-based video Surveillance Due to regulations from the government, the trend of full IP-based video surveillance starts from the U.A.E., such as Dubai, Abu Dhabi, Qatar, and then spreads the rest of the Gulf countries. The IP-based video surveillance trend also leads to high adoption of some innovations in this region, such as multi-megapixel, low-lux, and intelligent video analytics. In the Middle East, people usually want the best technologies. For surveillance, the standard would be around 2 to 3 megapixels with WDR, because of the strong sunlight. ANPR and facial recognition are also usually required for infrastructure projects. In large facilities, such as stadiums, hotels, campuses, and city surveillance projects, end users look for a more cost-effective way to have better coverage over a large area. “Multi-megapixel cameras are proving their worth here. Using multi-megapixel (1,080p for example) cameras, end users receive a minimum resolution more than seven times better than standard definition (VGA) or analog cameras. Megapixel cameras provide detailed
information for capturing license plates and faces, said Scott Schafer, Executive VP Sales, Marketing and Service at Arecont Vision. “We have examples of customers that use 75 cameras to cover an area that would have required about 2,000 analog or standard definition VGA cameras delivering 40 pixel-per-foot resolution, which is enough to identify faces in a crowd. In campus settings, we have used eight multi-megapixel panoramic cameras to replace 24 standard definition cameras and the new system delivered superior resolution at a lower price.”
Intelligent Video Adoption The local requirement of up to 180-day storage for HD megapixel video in some cases drives the need for more intelligent management of data, especially in large-scale projects such as infrastructure.
▲ Peter Biltsted, Director, MEA, Milestone Systems
▲ Scott Schafer, Executive VP Sales, Marketing and Service, Arecont Vision
“To provide an efficient forensic search after events take place, and also meet the challenges of managing so many cameras and data in a large environment, there is a need for intelligent video. And since people here are quite open to new technologies, they are starting to use intelligent video analytics (IVA) for marketing and management purposes,” said Hakan Özyiğit, Regional Director of Middle East at Bosch Security Systems.
▲ Stefano E Cini, GM, Viseo Systems
Intelligent video is commonly used for high-end retailers and some large retailers deploying 160 to 200 cameras for people counting and heat maps. “In some five-star hotels, it has become common to have people-counting features to see who gets inside of the hotel building, 360 fish-eye camera at main areas like lobby/restaurant, heat mapping to analyze customers flow, and missing-object analysis for the retail stores inside. Some hotels provide
13
Market Update the live-streaming video online for marketing. Samsung also provides such solutions for retail/commercial markets controlled by Samsung security management platform,” said Ali Boussi, Regional Sales Manager at BASS/ Samsung Techwin. Due to the demand for intelligent video in this region, “Kedacom launched its latest NVRs, with the latest video analytic technology to do smart searching and quick location of the event as soon as the alarm is triggered. Besides, Kadacom also has a complete solution of centralized chain-store management and HD video surveillance solutions for courts,” said Zhiqiang Liu, Marketing Director, Kedacom Technology.
IP for SMB The small-to-medium business (SMB) sector is also adopting IP technologies, starting from the U.A.E. “I would say in the MEA market, especially in GCC countries, there is very high percentage of SMB market using IP. Even small retail shops — usually requiring six to eight cameras — still need to meet government requirements for megapixel resolution. The analog system can’t reach that standard. All the shops need to be approved by the government. If they are not satisfied with the evidence, they will ask you to shut down the shops or replace the system entirely. That’s why
▲ Tim Shen, Marketing Director of Overseas Business Center, Dahua Technology
14
Adoption of HD-over-Coax Products in ME While the demand for the IP-based security system is on the rise, knowledge of IP infrastructure still remains a major requirement for systems integrators. In major GCC countries, the Ministry of Interior produces guidelines for professional systems integrators based on megapixel resolution for video surveillance, and "in many cases still, the system is not required to be IP-based. Higher resolution is, however, imposed on entry points of public places, like lobbies and receptions of banks and hotels,” said Stefano E Cini, GM of Viseo Systems. “HD-SDI has become more applicable to smaller systems where high quality surveillance in real time is required and high storage is not a major requirement. Therefore, I believe that the demand for HD-SDI will increase especially in the light that HD-SDI is becoming more competitive in the medium-sized market segments,” continued Cini. Raster Electronics, a manufacturer of video surveillance security equipment established in 2003 in Shenzhen under a UK license, also agreed. “Even though IP is the main trend, the total amount of analog products is still bigger than IP,” said A. Reza Hakimi, CEO of Raster Electronics (Middle East). “Furthermore, many major companies are ready to make more affordable HD-SDI products to reduce the price. So, we also think HD-SDI is going to develop very well here in the Middle East and Central Asia although I believe IP would again remain the main trend in the market. Dubai has so many potential, providing a good market for HD-SDI. We predict HD-SDI could be very powerful here and surpass other analog products. Raster has a full range of IP, analog and HD-SDI video surveillance products to meet the market’s requirements.” Tim Shen, Marketing Director of Overseas Business Center at Dahua Technology also said, “Dahua has quite good business in the Middle East, especially Iran and Turkey. Dahua grew around 70 to 80 percent last year in the region, especially from the IP side. This year, we will continue to focus on IP projects. Moreover, in 2013 Q4, we launched HDCVI, a HD-over-coax solution. Since HD-SDI products are still pricey in the market, we hope to win more HD market share by offering this cost-effective option in the market.”
convergence comes there. I would say, in the next two to three years, GCC countries will not allow video that does not supply a certain level of video quality,” said Biltsted. “Even for small customers here, they want integration. They usually want access control to be integrated too. If they have 25 cameras in place, they also want a perimeter solution to be integrated with their systems,” said Biltsted.
▲ Zhiqiang Liu, Marketing Director, Kedacom Technology
▲ A. Reza Hakimi, CEO, Raster Electronics (Middle East)
“What I also found in this region is people have more awareness about security and they use surveillance for more than just for security. They will use the surveillance video to check if the store is clean. So, customers would choose cameras with a corridor view. We also bundle it with our software,” he continued.
Competitive IP-based video Surveillance Market IP-based video surveillance technologies have penetrated to different market sectors here. Intelligent video is commonly used in a five-star hotel and even the small shops want an integrated system for video surveillance and access control. The Middle East has become a competitive market for IP-based video surveillance technologies. To satisfy end users’ desires for new
Advertorial
WD Capitalizes on RapidlyGrowing Middle East WD, the maker of world-renowned premium hard drives (HD), has also been steadily increasing its surveillance HD market in the Middle East region. By placing a foothold in one of the fastest growing regions in the world, Western Digital has established itself in prime position to continue expanding their surveillance market. ■ By Steve Chin
L
ong regarded as one of the best-branded hard drives for many different regions and markets, WD’s own Purple Surveillance Hard Drive reaffirms the company’s commitment to the surveillance sectors by providing specialized HDs specifically catered towards that segment. With the Middle Eastern region growing at a steady clip, WD looks to capitalize on market demands and meet ever-growing demands for surveillance storage. “The demand for home and small business surveillance systems is growing steadily in the Middle East. Today, an increasing volume of surveillance systems are sold without storage, and present resellers with healthy opportunities to address storage needs by offering purposebuilt surveillance hard drives like WD’s Purple,” affirmed Khwaja Saifuddin, Senior Sales Director – Middle East, Africa, and
Khwaja Saifuddin, Senior Sales Director – Middle East, Africa, and India at WD
16
India at WD. Having had a presence in the Middle East for 15 years, the company only just entered the surveillance market roughly five years ago. WD’s interests began when they released their AV HD lineup, while trying to fulfill the needs of surveillance. Marketed as an efficient and reliable storage drive for long-term audio/video usage, the drive eventually evolved into WD Purple, the surveillance-catered storage drive that was released February of 2014. With a regional office stationed in Dubai that covers all of the Middle East, Africa, and Turkey, WD’s product portfolio has grown substantially, and they have introduced a range of innovate storage products that cater to the diversity in demands from their customers, said Saifuddin.
Market Maturity An important point that Saifuddin brought up is the fact that while vastly developed, in some parts of the Middle East, infrastructure advancement remains a concern. Because surveillance ties in hand-in-hand with the level of IP infrastructure maturity, some areas are still in development. In areas like Dubai and Saudi Arabia, the whole of the country is technologically advanced and the level of infrastructure needed for IP surveil-
lance solutions is there. However, when looking at areas like Kuwait or Oman, the infrastructure isn’t at the level of Dubai or Saudi Arabia. Nevertheless, when looking at Oman, the country is fast on its heels in terms of development, and remains a region that WD will keep a close eye on. Indeed, all of the countries that consist of the Gulf Cooperation Council (GCC) are areas of interest. A final thing that Saifuddin brought up are regulations that many governments in the Middle East have enacted. For example, in most public areas, it is now required that it has 360-degree camera coverage as well as a video retention policy of 180 days. This further drives demand and growth in the surveillance market and Saifuddin brought up the fact that these are also some of the bigger drivers in market expansion and development for the company. Overall, it definitely remains a point of interest to see how WD continues to expand its market growth in the region, especially as infrastructure development and further project demands continue to fuel its expansion. “From our marketing strategy, each and every segment is important, and we put equal focus on the smaller resellers and the smaller SIs. Our focus starts from the cabling guys, and all the way up to the larger, high-end government projects,” said Saifuddin. “WD addresses the storage needs of consumers, SMEs, and enterprises with a wide range of products and solutions.” He also further explained that WD’s focus has always been to work closely with all their partners across the region, with their distribution network encompassing all of the key markets in the Middle East region.
Driving Market Awareness Tied into the equal attention strategy, Saifuddin also mentioned
A Closer Look at WD Purple In the words of Khwaja Saifuddin, Senior Sales Director, Middle East, Africa, and India at Western Digital, “WD Purple drives are designed for mainstream surveillance applications where up to eight drives and 32 HD cameras can be used.” Overall, it’s a dedicated surveillance drive that is designed for 24/7 reliability with broad surveillance system compatibility that utilizes technologies such as WD’s own ALLFrame and IntelliPower. “AllFrame technology improves playback performance to reduce errors and frame loss, which is vital when reviewing surveillance footage. Equally important is IntelliPower, which lowers drive power consumption and thus, heat output, which will ultimately contribute towards long-term drive reliability,” explained Saifuddin.
the fact that WD owns more than half of the market shares in the Middle East. Because of tenacious education programs in the region both online and through tradeshows and seminars, market awareness of WD HDs remain large. Another facet of the company’s aggressive marketing is also the fact that WD follows closely in line with industry trends and customer demands. “The main growth areas for storage drives in the Middle East are NAS, surveillance, and mobility. These categories cover a wide array of customers. Our marketing campaigns are geared towards spreading awareness about our various products, while also educating them in the context of what they stand to benefit from our product lineup. SIs, resellers, and our other partners are addressed through direct interactions through
training seminars and even web-based tools,” said Saifuddin.
Customer and Market Driven Coupled with longer-than-industryaverage warranties that are applicable for up to three years, WD also plays a more hands-on role when it comes to technical support and services to its end-users. While true that WD does not sell directly to end-users, support will go down across all levels. With most of the support and services coming through the company’s distributors, WD will also take a more immediate hand through services like online support and working closely in-line with the aforementioned distributors to solve user problems and issues.
17
INDUSTRY REPORT
Prophecy from Security 50 :
Time Solutions! for
This year’s Security 50 rankings again proved the year 2013 was another fruitful year. The top 50 companies grew 8.2 percent on average. Even without very dramatic growth, it symbolizes that 2013 indeed was a turning point for the whole industry: time for solutions! n By Jill lai
Eligibility • Electronic security equipment and systems providers, including video surveillance, access control, intrusion detection, and multiple product segments • Security companies or pure manufacturers with their own products, brands, or solutions • Publicly-listed and privately-owned security companies • Ability to provide FY 2013 and FY 2012 & first half of 2014 financial statements, audited/endorsed by a certified accountant or accounting firm • Distributors, systems integrators, resellers, dealers, installers, guard service providers, information security, and fire safety companies or related revenues were excluded
18
2014 security 50
INDUSTRY REPORT
2 About the Ranking We rank global manufacturers solely by product sales. Participants range from exclusive manufacturers to end-to-end solution providers. Again, we urge readers not to focus on the ranking of the participants, but to further explore the underlying causes for their success.
Note: a&s bears no responsibility for the financial information provided by any individual company. For fair comparisons, non-US currencies were converted using midmarket exchange rate from XE.com on July 14, 2014. This is an unbiased list based on the willingness of participants to share their sales performance.
013 was another rewarding year for the winners of Security 50. Even though the average growth rate was comparatively moderate compared to the past two years, the top 50 still contributed US$16.9 billion in total sales revenue in 2013. Top 10 companies, Honeywell, Bosch, Hikvision, Safran, ASSA ABLOY, Dahua, FLIR, Axis, Samsung, and Tyco Security Products, remain the same as last year’s rankings. However, due to the explosive growth of two Chinese giants, the top 10 rankings have slightly changed. Hikvision has been ranked third, with 2013 being the first time it produced over $1 billion in turnover. Dahua, who had the most obvious growth, beat Axis, Samsung, and FLIR, and has been ranked sixth. These two Chinese companies’ outstanding performance again impressed the whole security industry.
Steady Growth From 2012 to 2013 The average turnover growth rate for the Security 50 was 8.2 percent in 2013. The 8.2 percent growth rate also corresponds to current researchers’ predictions on the global security market growth — 8 to 10.8 percent in 2013, according to IHS and MarketsandMarkets. The result proves that the top 50 companies grew quite steadily in 2013. However, the figure shows a slight slowdown, compared to the average 12 percent growth in Security 50 reports, per year, after 2010. Multinationals among the top 50, which mostly develop multiple security systems, ranging from video surveillance, access control, and alarm, grew exponen-
Acknowledgements 19
INDUSTRY REPORT
tially and have become much more profitable compared to our findings in 2012 and 2011. In 2013, they grew 15.6 percent, compared to 9.5 percent in 2012. Their profit growth is 15.7 percent on average, double compared to 7.1 percent in 2012. The top 10 companies with the fastest growth made a remarkable 44 percent growth on average. ITX led the group and grew 82.8 percent. Avigilon came in second, growing 77.9 percent from 2012 to 2013; followed by Dahua, Hikvision, TKH, Tamron, Tyco, Milestone, Infinova, and VIVOTEK. Milestone grew 28 percent, exceeding its annual growth in the past two years. Recently, the VMS company also launched its NVRs, to quickly respond to the current market demand for easy-to-use and -install IP video surveillance systems. In contrast, some IP video surveillance companies, focusing on developing devices and products only, have experienced a year-onyear slowdown since two years ago, predicted by past a&s Security 50 reports. Tamron also had a fruitful year in 2013.
The professional security/surveillance lens company has successfully transformed its main focus to OEM business with other Asian manufacturers. The Asian manufacturing industry, especially China, has become the most important hub in the whole world, which plays a crucial role in Tamron’s latest success.
Corporate Consolidation Still Continues The top 10 multinationals, led by Honeywell Security, ranked number one among the Security 50, contributed 74.2 percent of the total revenue of the top 50 companies. Due to the consolidation via frequent corporate merger and acquisitions becoming obvious, major multinationals have dominated most of the global product sales market. The most significant merger and acquisition in 2013 was Avigilon’s acquisition of access control company RedCloud. With this acquisition, Avigilon has been able to reach out their business beyond the video surveillance sector. Right at the end of the same year, Avigilon also acquired video analytics company VideoIQ. With its recent acquisitions, the company successfully became a total solution provider in the security industry. The company continues growing its investment and specialties in verticals such as casinos, energy, education, healthcare, critical infrastructure, and retail, managed by a specific business development team. Despite corporate consolidation, multinationals also spin off to become more focused and agile. The best known, Allegion, a spin-off from Ingersoll Rand, made its debut in Security 50, ranking eleventh. Allegion continues to explore non-industrial security market sectors, which differs from its mother company Ingersoll Rand.
Decreased Profit Growth, but Good Gross Margin To maintain valuable profit, margin is an ultimate goal for all
This year, we’ve offered the companies. Telling from this year’s Security 50 rankings, complete HD product line and specific the average gross margin in 2013 was around 33 percent. sales strategies tailoring for different The top 50 companies kept consistent growth in gross market segments. Besides, developing margin at around 30 percent, per year, in the last four solution for verticals has also been years. Yet, the average profit growth slightly dropped the main key in Hikvision’s long-term commitment toward its customers. To gain to 5.9 percent, which is also a slowdown from 14.6 more global presence in the future, Hikvision percent in 2012 and 9.8 percent in 2011. Companies will continue to deeply permeate and strive to gain sufficient margin; however, have expands its markets in the world. Yangzhong Hu, President, Hikvision Digital Technology
20
continually been meet with challenges from the price reduction over standardized products, market competition, and global economic impact. Among the 28 companies, which generously shared their gross profit figures, Avigilon, DynaColor, and GeoVision, were able to maintain both high profit growth and gross margin. Fourteen companies kept
2014 security 50 Today, with the development of IoT and HD, security industry is embracing an integration of video surveillance, alarm, access control and intercom. Having total the first half of 2014. Their growth rate over the past solutions becomes a cutting edge for two to three years have even reach almost 25 to 30 a company to differentiate itself from percent on average. However, their latest growth rate others. Therefore, Dahua dedicates turned moderate. Explosive growth in the IP video surveilto constant technology innovation, lance sector is now gone, which symbolizes technology enabling to provide more for IP video surveillance is now well-developed and there added value, better is fierce competition over multiple suppliers in the market. service and solutions To maintain growth, Axis and VIVOTEK are also developing IP for customers. video surveillance systems. They recently developed NVRs and Fu Liquan, management software and systems, which well demonstrates the President, Dahua Technology future for the security industry.
Time for Integrated Systems
above-average gross margin at 33 percent. We also found that these companies have fully developed integrated systems ranging from IP video surveillance, access control, and smart home, becoming the most profitable companies among the top 50.
IP Video Surveillance Enters Late Growth Stage of Product Cycle Some major pure IP video surveillance companies have started to experience the slowdown during their growth momentum, based on their financial reports in 2013 and
In the video surveillance product sector of Security 50 rankings, company performance is strongly correlated with its overall product strategy. If we divide the video surveillance companies by their tendency to develop systems versus single devices, the average revenue growth and profit growth of these groups were found to be different. Overall video surveillance companies grew 9.2 percent on average. Companies developing systems grew 14.4 percent, 5.2 percent more than those that only develop devices. In addition, the average profit growth for overall video surveillance is 38.9 percent. System developers grew 14 percent versus negative 2.2 percent on the device side. Gross margin of some companies, from the device side, barely kept single-digital growth. To stay profitable and competitive in the market, offering devices only is not enough. Successful suppliers provide systems suitable for different types of projects. IP video surveillance systems, for instance, are well designed for solutions in different applications and vertical sectors. Most importantly, they are well tested and configured and ready to be integrated into a management platform, which saves a lot of headache and troubles for systems integrators and installers. On the other hand,
2013 Growth Rate of Systems Versus Deviceoriented Companies in Video Surveillance Video Surveillance (Overall) Video Surveillance (Systems) Video Surveillance (Device)
9.2% 14.5% 5.2%
3.4% 14% -2.2%
27.9% 35.3% 23.1%
Average Revenue Growth
Average Profit Growth
Average Gross Margin
Top 10 With the Highest Revenue Growth Companies
Revenue Growth 2013-2012
ITX Security
82.8%
Avigilon
77.9%
Dahua Technology
53.2%
Hikvision Digital Technology
50.9%
TKH (Vision & Security Systems)
35.8%
Tamron (Commercial & Industrial)
34.7%
Tyco Security Products
30.0%
Milestone Systems
28.0%
Infinova
26.8%
VIVOTEK
21.0%
21
INDUSTRY REPORT
for some small to mediumsized companies, the capability to tailor-make certain unique features in systems for different projects is also required. Developing integrated systems, which are ready to use for different projects, is not only a buzzword but also exactly what is happening right now for the most profitable companies in security. Keen Yao, International Marketing Director of Hikvision Digital Technology pointed out, “Almost all the big suppliers give total solutions. Hikvision, we also are a total solution provider. Our R&D resources make Hikvision very powerful in different vertical markets. We have seven vertical markets — we call them Seven Stars. For different vertical markets we have different solutions that combine almost all security functions, including access control, alarm systems, and surveillance systems. So this is Hikvision’s strategy.” Tim Shen, Marketing Director for Overseas Business Center at Dahua Technology continued, “We are also in the transition stage from device to solutions development. Dahua is
Top 10 With the Highest Profit Growth Companies
22
Profit Growth 2013-2012
Infinova
638.3%
Avigilon
95.7%
Dahua Technology
49.1%
Hikvision Digital Technology
46.3%
ITX Security
34.7%
Hunt Electronic
26.8%
Win4Net
25.0%
Hi Sharp Electronics
21.0%
DynaColor
10.7%
GeoVision
7.8%
Yes we can! For the past 19 years, EverFocus has always been contributing to the society and striving to improve self-esteem and particularly stepping always ahead considering safety issues before people’s demand. Jemmy Huang, Chairman & President, EverFocus Electronics
one of the few companies which are able to develop solutions in China. To develop solutions, it requires not only a complete wide range of product portfolios but also takes higher level of profound know-how to bring them together for a better integration purpose. Dahua has proven to do several large projects in banks, city surveillance, transportation and commercial sector not only in China but also overseas. We are able to transfer our know-how in China to provide suitable products for solutions in overseas market.”
Taiwanese and Korean Companies Prepare for Their Next Leap From Security 50 reports over the past few years, major Taiwanese and Korean companies continue to be in recession, which has lingered a little bit longer than expected. It is never easy to transform from a device supplier to a systems or solution provider and even harder to change the corporate focus from OEM business to branding. However, the rising of Chinese companies has forced these companies to differentiate themselves. IDIS, a leading video surveillance company Top 10 With the Highest in Korea, is one of the most Gross Margin significant ones that have Companies Gross Margin 2013 started to promote its own 75.8% Mobotix brand business in Europe 56.7% IndigoVision since two years ago. Even though the outcome for its 56.5% Fermax brand business has not been 55.0% GeoVision confirmed yet, the company 54.2% Avigilon seems to be headed in the 50.4% Suprema right direction, developing 48.8% RCG positively in the future. Some of the traditional, 40.7% DynaColor Taiwanese analog-based 38.5% Synectics companies might take a little 38.0% Vicon while to take off; however,
2014 security 50
the IP/IT-based companies, such as VIVOTEK and GeoVision, have maintained steady growth over the years and are active in the market. We predict that in the near future, there will be more corporate consolidation among Asian companies. The security market is still full of opportunities. Some small to mediumsized Taiwanese and Korean companies are striving to find their own “blue ocean” to differentiate themselves from Chinese companies. EverFocus also provided a good example here. The company is ready to demonstrate its capacity to develop an integrated security system to its clients, too. Even though it has gone through obstacles, the company has started to receive some positive outcomes. Jemmy Huang, Chairman & President of EverFocus Electronics also shared, “Now, customer’s demand for security products has become much more diverse. They expect the system to integrate with more devices and realize
To uphold corporate competitiveness, VIVOTEK, based on profound R&D resources, localization and close partnership with global leading software partners and systems integrators, has solidified its capacity in providing comprehensive solutionis for multifaceted surveillance applications, creating more adding value and increasing better return on investment for customers. Owen Chen, Chairman, VIVOTEK
multiple purposes. For example, the customers have some special requirements for the synergy between video surveillance systems and elevators whenever an emergency happens in the building.” Therefore, “we have transformed to be a solution provider. Our open-platform central managment system is well designed to integrate with a wide range of systems and extremely scalable for future expansion. With this system, we can make sure systems integrators have no further problems in product integration, meet their customized requirements perfectly, and ensure their projects can be well completed.”
Looking to 2014 & 2015 Looking into the financial reports for the first half for 2014, the companies which are more likely to continue growing significantly both in 2013 and 2014 are Avigilon, Dahua, Hikvision, ITX, and Tamron. These five companies were ranked in the top 10 companies with the highest revenue growth. However, out of the 29 companies, who shared their financial figures in the first half of 2014, the average growth rate fell to 2.8 percent. Twelve companies are in recession. Korean and Taiwanese 2014 has been companies have experienced even bigger challenges in a successful testimonial to the first half of 2014, which can be obviously found in our open platform strategy, their reports. strong partnerships and Cross referencing profit growth and gross margin entrepreneurial approach. We of these 29 companies in the first half of 2014, it believe that visual services, the is also confirmed that the companies that have next phase in video evolution developed fully integrated systems outperwill surface in 2015. Having the formed the ones which develop only devices, support by a respected global again. When we look into 2014 and 2015, we technology leader such as predict that the trend to develop solutions Canon, we see this evolution as a great opportunity. for verticals/applications will be much more obvious. Lars Thinggaard, CEO and President, Milestone Systems
23
INDUSTRY REPORT
Security 50 Sets Trends for 2015 a&s talked to the winners of Security 50 for 2014 to discuss what’s really trending for 2015. These companies shared their latest strategies and predicted how the security industry would grow in the coming years.
Migration from Device to Systems Axis Communications also see this trend towards solutions. We have broadened our offering for small and medium-sized installations. Axis network cameras and software can now be offered as an overall solution adapted to end user needs. For an overall solution for mid-sized Johan Paulsson, CTO, Axis installations, for example in school environments Communications and in the retail segment, Axis recently launched video recorders. The recorder includes three different server solutions, which are pre-installed with management software and configured to seamlessly match Axis’ wide range of network cameras. Also, the physical access control market is well-suited to Axis’ long-term growth strategy. The investment is part of our ambition to broaden the global offering in security solutions and advance cooperation with partners around the world. The solution is offered in the U.S. and Europe through Axis’ well-established network of distributors and partners. For the box moving business, the trend is going toward solutions type of business. In the past, there were many different vendors in the market, such as camera manufacturers, VMS providers, and systems integrators. However, since the margin has been squeezed, there Steve Ma, EVP, VIVOTEK is no room for multiple vendors. So, the trend is that we need to build total solutions for customers. It should be easy to use, have lower total cost of ownership, be very easy to install and very easy to maintain. That is what we are planning right now — we have cameras, we have software, NVRs, and PoE switches, so that installers can buy a total system from us.
24
Systems/solutions are an important element to our roadmap. FLIR has been investing significantly into a cloud-based service that brings all of our products together into a powerful Matt Bretoi, VP, North management and search tool. This America Field Sales, FLIR is not the only example though. Systems We constantly evaluate how we can bring more value to our largest verticals, whether through internal resources or our partners. A simple example that we have used for years: a fixed thermal imager is a great 24/7 surveillance tool, but coupled with intelligent analytics it is a powerful pro-active security tool that greatly increases the customer’s return on investment. We continue to look for ways on how we can build upon that solution.
SimonsVoss has launched a new digital access management system in building solutions. With this, we consequently pursue solution integration and cooperation with partners in access control. We will open up entirely new customer groups that have long wished to Bernhard Sommer, CEO, have SimonsVoss as a lock system with all of its SimonsVoss Technologies strengths. The configuration of the system has been kept extremely simple, e.g., with self-configuring online routers to establish the optimum network. For installation, this is extremely simple and reduces costs. By providing this new system, SimonsVoss will enter SOHO users market. These solutions are expendable to high-end systems and will grow with the users need.
2014 security 50
Integrated Systems, Well-designed for Applications Within the last year, we’ve increased compatibility between two systems, enabling higher-end commercial end-users to have access to a technology that’s used to support critical infrastructure sites — places like military bases, government installations, etc. — around David Gottlieb, Director, the world. So the same type of high-tech system Global Marketing Communications, Honeywell you see protecting a military base can now Security be used to protect large commercial sites like shopping malls, airports, and such. One of our security management systems can integrate intrusion, video and access systems, and this year we added more support for wireless locks to allow for users to protect more doors. For another Honeywell’s integrated solution, we also added new compact surveillance radar capabilities that will allow sites to detect intruders along perimeters when traditional ground surveillance radar systems are not practical. Milestone open platform integrations with third-party solution partners constantly bring new innovations for more vertical or expanded market needs. For example, Milestone’s video management software integrates GuardTrax mobile video alerts Karl Erik Traberg, Head of for roving officers, SICK and Optex laser Corporate Communications scanners for critical perimeter protection and Business Development, Milestone Systems and challenging physical barrier requirements, and Inovonics panic button interoperability for emergency communication.
There’s no single vendor out there offering best of breed across all disciplines including intruder, fire, access, surveillance, etc. Most corporate enterprises have a complex jumble of disparate Brian Song, MD, IDIS Europe and proprietary systems and that causes gaps in security. A control room with alarms and alerts from multiple disparate systems can result in alarms simply being ignored, through to chaos as operators jump from screen to screen as they try, and often fail, to verify each alarm. To address these challenges, IDIS recently announced the integration with Maxxess (event management), SureView (alarm monitoring) and Lenel (access control management) particularly addressing the corporate enterprise market. This integration delivers IDIS IP video surveillance systems functionality through single security management platforms to enhance resilience through event and video correlation to increase operator effectiveness, and turn streamlines operations to reduce cost. It also helps those customers integrate their legacy video surveillance and develop an easy migration path rather than needing to rip and replace everything immediately.
New Applications, New Markets The connected home is a great example where traditional security systems are now being used for non-security applications, like simple awareness and comfort control. One recently introduced Honeywell control panel can control everything from security to lighting, garage doors and more was one our most-important product launches this year in the Americas because it embodies that type of design; it features the ability to stream four IP camera feeds directly on a touchscreen and it can be controlled remotely from a Honeywell app.
David Gottlieb, Director, Global Marketing Communications, Honeywell Security
Milestone sees the healthcare industry using video surveillance for patient monitoring, schools are using it for parents to be able to see how their children are doing in class and on the playground, universities are using it for student training and teacher evaluations, utilities are using it to monitor equipment and operations including solar and wind farms overseeing remote operations, retail is using it to track customer flow and product areas of interest for improving floor layouts accordingly.
Karl Erik Traberg, Head of Corporate Communications and Business Development, Milestone Systems
25
INDUSTRY REPORT
A great example is in Verint’s retail business. One of the world’s top retailers, with more than 2,000 locations, is working with us to reduce fraud and create a smarter workforce. Working with the Verint intelligence solution to solve the challenges of fraud, risk and compliance, this retailer has deployed Verint security systems to use with their physical security cameras and enhance their ability to detect, investigate and reduce fraud brought on by employee theft. The solution blends Verint’s video management software integrated with their point of sale and exception reporting system. It allows them to identify fraudulent employee activity and take action, reducing loss and improving the bottom line. Since implementing the solution, the customer has seen loss due to employee theft drop dramatically, while making their investigators more efficient in their daily tasks by proactively prioritizing issues to investigate. Reducing loss improves the profitability of the retailer and helps keep prices down, which increases customer satisfaction.
Brian Matthews, VP, Global Marketing and Product Development, Video & Situation Intelligence Solutions, Verint Systems
Erika Gorge, Corporate Communications Manager, Bosch Security Systems
There are new developments within fire detection technology: With the use of video cameras for fire detection, we will be able to combine our expertise in both technologies in the future. These systems will open up new opportunities for special applications where conventional detection technologies have reached their limits. Examples of this are difficult ambient conditions, such as in tunnels, specialized production facilities or warehouses.
With Nedap security management systems, users can channel signals from the different systems into it — from cameras, dirty water pumps, air conditioning — you can link everything. At Ziggo Dome, the largest Dutch music center, for example, the security and facility managers wanted to be able to set up links to other building Arjan Bouter, Head of Sales, systems in the future, such as the heating system, the Nedap Security Management air conditioning system, the beer cooling system, and, something that is very important here, the lockers for visitors. So we were actually looking for something that offered building management system functionality.
Bernhard Sommer, CEO, SimonsVoss Technologies
One of our latest door monitoring cylinders not only offers the customer access control functionality but also a complete overview of the status and events of doors and accesses. We have a case that the aim for installing the door monitoring cylinders in cold storage rooms is to prevent wastage of unnecessary energy. This has nothing to do with safety, yet it affords the customer very high cost savings.
The Secrets Behind the Growth Tamron, we are a professional lens manufacturer. Recently, we have focused more on supporting video surveillance camera manufacturers to fulfill their various requirements. For instance, according to their demand, we’ve developed new Koji Masunari, GM, Industrial Optics Business technologies to increase value of Unit, Tamron total image quality by new optical design for large image sensor, stepping motor iris system and the improved picture quality at near IR.
26
Our sales keep finding new OEM opportunity in EMEA, the U.S., and APAC and current customers get larger demand in local markets or more projects in their countries in 2014. This helps us increase our revenue gradually. Customers nowadays would like to select two Garrett Li, Manager, Product suppliers to cover their middle to high and entry Marketing, DynaColor level products. DynaColor has product lines from full HD small and medium business cameras to 4K real-time IP camera/3-megapixel real-time IP speed dome and this might be the reason DynaColor stay in their supplier candidate list.
2014 security 50
Physical security market including access control has been worldwide growing with the forecast worth US$88 billion by 2019. With the high potential and opportunity in the global market, Suprema sees more from convergence between both the technologies James Lee, CEO , Suprema and markets of security and biometrics. As for the biometrics market, its market size is expected to be around $15 billion in 2015 and more than 20 percent of CAGR is forecasted for the upcoming several years according to a market research. In conjunction with the technology advance and trends, one of our focal points to take initiative in the security market is providing easy and scalable solutions (yet powerful). As a physical security platform, our biometrics based security system including software as well as hardware is to integrate all security solutions to control and management, which includes access control terminals, surveillance, intrusion alarms, etc.
This year, Magal Security Systems marked two important milestones. First, Magal introduced automation into the perimeter security market Hagai Katz, Senior VP, by launching a robot. The Marketing and Business Development, Magal Security robot is ideal for remotely Systems monitored unmanned sites and critical sites such as airports, seaports, military bases and prisons, where a timely first response by manned guards may be impractical or expensive. In the same year, Magal also developed another business line in cyber security, focused in security networks, via the acquisition of CyberSeal.
The easiest way to
Pick Up the World of Security Leading security magazine provides you: • In-depth and unbiased market information • Technology breakthrough • Project and solution design advice
27
INDUSTRY REPORT
1
2
4
3
5
9
7
6
8
10
NEW
11
12
13
14
23
22
17
19
24
18
20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
US
Sweden
Korea
FLIR Systems (Thermal Vision & Measurement)
Axis Communications
Samsung Techwin Tyco Security Products Allegion (Electronic Products & Access Control) Aiphone TKH Group (Vision & Security Systems) Nedap NICE Systems (Security Solutions) Avigilon Optex (Sensing Products Business)
Japan
Tamron (Commercial & Industrial)
Germany
US
Taiwan
VIVOTEK
Verint Systems (Video Intelligence) Mobotix
US
Infinova
Japan
Canada
Israel
Netherlands
Netherlands
Japan
US
US
China
Dahua Technology
Sweden
France
China
Hikvision Digital Technology
Safran (Security Products Only) ASSA ABLOY (Global Technologies)
Germany
US
Multiple
Video Surveillance
117.5
120.4
121.7
130.0
154.8
161.5
Video Surveillance Video Surveillance Video Surveillance (Lens)
167.6
Intrusion Detection
193.9
207.7
325.8
Multiple
Multiple
Access Control
Multiple
419.7
439.6
Access Control
650.0
Access Control & Locks
659.2
Multiple
Multiple
694.4
Video Surveillance
871.6
Video Surveillance 727.9
954.6
Access Control & Locks
Video Surveillance
1614.2
1656.2
Video Surveillance Access Control
2039.9
2700.0
Multiple
Multiple
111.0
119.5
90.4
107.5
122.0
138.1
94.2
185.9
209.2
239.9
364.2
500.0
658.4
613.3
628.0
568.9
923.6
1648.2
1097.9
2018.1
2500.0
5.8%
0.8%
34.7%
21.0%
26.8%
16.9%
77.9%
4.3%
-0.7%
35.8%
15.2%
30.0%
0.1%
13.2%
15.9%
53.2%
3.4%
-2.1%
50.9%
1.1%
8.0%
89
8.6
90.9
181.3
545.5
84.4
1.2
46.4
121.6
372.8
5.5%
638.3%
95.7%
49.1%
46.3%
75.8%
5.6%
54.2%
20.8%
32.9%
55.5
60.8
58.6
59.5
87.1
113.7
59.6
365.1
490.2
478.0
943.3
60.9
51.7
65.0
69.0
76.8
67.0
65.7
308.6
327.3
462.7
618.7
Product Sales Revenue Product Sales Revenue Revenue Gross Profit Profit 2013 (in 2012 (in Gross Profit Gross 2014 1st 2013 1st Headquarters Product Group US$Million) US$Million) Growth Growth 2013-2012 (in US$ M) 2013 (in US$ M) 2012 2013-2012 Margin 2013 half (US$M) half (US$M)
Honeywell Security Bosch Security Systems
14 13 Ranking Ranking Company
2014 Top Security 50
28 -8.9%
17.6%
-9.9%
-13.8%
13.4%
69.7%
-9.2%
18.3%
49.8%
3.3%
52.5%
2014 1st half Revenue Growth (US$ M)
-0.4
63.8
89.5
275.2
2014 1st half Gross Profit (US$M)
1.1
34.9
69.6
181.0
2013 1st half Gross Profit (US$M)
-132.17%
82.89%
28.54%
52.1%
2014 1st half Profit Growth
-0.62%
56.10%
18.26%
29.2%
2014 1st half Gross Margin
2014 security 50
15
27
21
29
25
44
34
30
33
35
37
36
28
31
32
26
16
41
38
40
42
46
39
43
48
49
47
50
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Korea
Korea
Korea
Taiwan
Korea
Germany
UK
Taiwan
Taiwan
Denmark
Germany
US
Korea
Korea
China (HK)
UK
Spain
Korea
China
Korea
US
Korea
Israel
Taiwan
Taiwan
Taiwan
Commax
Hitron
KOCOM
AVTECH
ITX Security
Geutebruck
Synectics
DynaColor
GeoVision
Milestone Systems
SimonsVoss Technologies EverFocus Electronics Napco Security Systems
HDPRO
CNB Technology
RCG
IndigoVision
Fermax Suprema
Dali Technology
Win4Net
Vicon
C-Pro Electronics
Magal Security Systems (Perimeter Products)
Hunt Electronic
Hi Sharp Electronics
Everspring Industry
Taiwan
Korea
IDIS
Video Surveillance Video Surveillance Intrusion Detection & HA
Intrusion Detection
Video Surveillance Video Surveillance Video Surveillance Video Surveillance
Access Control
30.5 Average
16932.4
33.7
28.6
33.9
44.9
49.7
39.4
43.9
50.9
53.1
51.9
132.0
95.1
76.7
70.9
76.4
66.4
58.0
66.6
69.4
66.7
71.5
44.3
108.4
81.8
114.7
86.9
149.5
29.0
29.7
29.9
30.6
38.9
39.8
41.1
42.1
51.1
54.1
54.8
Video Surveillance Access Control
60.2
64.6
69.9
71.4
72.1
73.2
74.3
74.7
75.6
76.7
78.7
81.0
87.2
Access Control
Video Surveillance Video Surveillance
Multiple
Multiple
Access Control
Video Surveillance Video Surveillance Video Surveillance Video Surveillance Video Surveillance Video Surveillance Video Surveillance
93.5
95.0
Multiple
99.3
Video Surveillance
115.4
Multiple
Video Surveillance
8.2%
-4.7%
-11.9%
4.5%
-10.0%
-13.2%
-19.7%
4.1%
-3.9%
0.4%
1.8%
5.7%
-54.4%
-32.1%
-8.9%
0.6%
-5.6%
10.3%
28.0%
12.1%
8.9%
15.0%
10.1%
82.8%
-19.5%
14.3%
-17.2%
14.3%
-22.8%
48.7
7.8
4.6
10.8
7.1
15.1
13.4
5.8
25.8
30.5
31.1
29.4
9.7
12.8
21.7
20.4
41
30.7
29.5
17.2
32.8
22.5
4.8
24.3
40.9
8.3
3.8
8.5
7.8
19.6
10.8
5.8
24.3
31.2
30.6
82.8
23.8
14.4
21.1
25.2
38.1
27.8
28.4
12.8
40.9
21.2
8.6
23.4
5.9%
-5.2%
21.0%
26.8%
-8.8%
-22.9%
25.0%
0.5%
6.3%
-2.1%
1.5%
-64.6%
-59.1%
-11.2%
2.7%
-19.2%
7.8%
10.7%
3.9%
34.7%
-19.6%
5.8%
-44.7%
3.6%
32.9%
27.0%
15.5%
36.2%
18.3%
38.0%
32.7%
13.8%
50.4%
56.5%
56.7%
48.8%
15.1%
18.2%
30.4%
28.2%
55.0%
40.7%
38.5%
21.2%
37.7%
24.0%
5.0%
24.4%
22.6
13.3
11.7
15.1
15.5
21.5
34.6
31.5
24.2
26.7
18.0
39.3
40.4
30.7
48.0
38.3
49.9
56.1
14.7
16.0
14.7
19.8
19.3
18.6
21.5
27.6
35.1
36.8
16.5
34.4
34.0
46.0
34.4
50.2
43.4
60.6
53.8%
-16.6%
-20.4%
-23.4%
-19.6%
15.5%
60.8%
14.2%
-31.0%
-27.3%
9.3%
14.0%
18.8%
-33.4%
39.6%
-23.7%
15.0%
-7.4%
7.2
2.5
4.3
5.6
4.3
2.9
17.0
17.8
3.8
8.7
10.0
15.8
7.8
9.7
12.2
2.4
9.6
4.2
2.5
5.0
7.5
6.6
1.5
11.0
15.0
5.4
10.8
9.1
14.3
8.0
17.5
8.5
3.2
11.9
72.85%
-0.58%
-14.05%
-24.62%
-34.54%
97.82%
54.51%
18.87%
-30.79%
-19.84%
10.26%
11.16%
-1.73%
-44.71%
43.12%
-26.23%
-19.42%
31.85%
18.59%
36.98%
37.09%
27.75%
13.73%
49.06%
56.43%
15.50%
32.50%
55.49%
40.37%
19.43%
31.47%
25.33%
6.20%
19.25%
INDUSTRY REPORT
Security 50 By Product Group (Part1) Multiple
Product Sales Revenue 2013 (in US$Million)
2012 (in US$Million)
Revenue Growth Gross Profit 2013-2012 (in US$ M) 2013
Gross Profit (in US$ M) 2012
Profit Growth 2013-2012
Gross Margin 2013
Company
Headquarters
Honeywell Security Bosch Security Systems Samsung Techwin Tyco Security Products TKH Group (Vision & Security Systems) NICE Systems (Security Solutions) Avigilon Mobotix Commax KOCOM EverFocus Electronics Napco Security Systems
US
2700.0
2500.0
8.0%
Germany
2039.9
2018.1
1.1%
Korea
659.2
658.4
0.1%
US
650.0
500.0
30.0%
Netherlands
325.8
239.9
35.8%
Israel
193.9
185.9
4.3%
Canada
167.6
94.2
77.9%
90.9
46.4
95.7%
54.2%
Germany
117.5
111.0
5.8%
89
84.4
5.5%
75.8%
Korea
99.3
86.9
14.3%
24.3
23.4
3.6%
24.4%
Korea
93.5
81.8
14.3%
22.5
21.2
5.8%
24.0%
Taiwan
72.1
76.4
-5.6%
20.4
25.2
-19.2%
28.2%
US
71.4
70.9
0.6%
21.7
21.2
2.7%
30.4%
15.7%
39.5%
15.6%
Access Control (Systems, Intercoms, HA) Safran (Security Products Only) ASSA ABLOY (Global Technologies) Allegion (Eletronic Products & Access Control) Aiphone Nedap SimonsVoss Technologies Fermax Suprema
France
1614.2
1648.2
-2.1%
Sweden
954.6
923.6
3.4%
US
439.6
Japan
419.7
364.2
15.2%
Netherlands
207.7
209.2
-0.7%
Germany
73.2
66.4
10.3%
Spain
54.1
53.1
1.8%
30.5
31.2
-2.1%
56.5%
Korea
51.1
50.9
0.4% 4.1%
25.8
24.3
6.3% 2.1%
50.4% 53.5%
France
1614.2
1648.2
-2.1%
Sweden
954.6
923.6
3.4%
US
439.6
Netherlands
25.8
24.3
6.3%
50.4%
Access Control Systems Safran (Security Products Only) ASSA ABLOY (Global Technologies) Allegion (Eletronic Products & Access Control) Nedap SimonsVoss Technologies Suprema
207.7
209.2
-0.7%
Germany
73.2
66.4
10.3%
Korea
51.1
50.9
0.4% 2.3%
Intercom & Home Security Systems Aiphone Commax KOCOM Fermax
Japan
419.7
364.2
15.2%
Korea
99.3
86.9
14.3%
24.3
23.4
3.6%
24.4%
Korea
93.5
81.8
14.3%
22.5
21.2
5.8%
24.0%
Spain
54.1
53.1
1.8%
30.5
31.2
-2.1%
56.5%
2.5%
35.0%
11.4%
30
2014 security 50
Security 50 By Product Group (Part 2) Video Surveillance
Product Sales Revenue 2013 (in US$Million)
2012 (in US$Million)
China
1656.2
1097.9
50.9%
545.5
372.8
46.3%
32.9%
China
871.6
568.9
53.2%
181.3
121.6
49.1%
20.8%
US
727.9
628.0
15.9%
Sweden
694.4
613.3
13.2%
US
154.8
122.0
26.8%
8.6
1.2
638.3%
5.6%
Taiwan
130.0
107.5
21.0%
Japan
121.7
90.4
34.7%
US
120.4
119.5
0.8%
Korea
115.4
149.5
-22.8%
Korea
95.0
114.7
-17.2%
4.8
8.6
-44.7%
5.0%
Taiwan
87.2
108.4
-19.5%
32.8
40.9
-19.6%
37.7%
Korea
81.0
44.3
82.8%
17.2
12.8
34.7%
21.2%
Germany
78.7
71.5
10.1%
UK
76.7
66.7
15.0%
29.5
28.4
3.9%
38.5%
Taiwan
75.6
69.4
8.9%
30.7
27.8
10.7%
40.7%
Taiwan
74.7
66.6
12.1%
41.1
38.1
7.8%
55.0%
Denmark
74.3
58.0
28.0%
Korea
69.9
76.7
-8.9%
12.8
14.4
-11.2%
18.2%
Korea
64.6
95.1
-32.1%
9.7
23.8
-59.1%
15.1%
UK
54.8
51.9
5.7%
31.1
30.6
1.5%
56.7%
China
42.1
43.9
-3.9%
5.8
5.8
0.5%
13.8%
Korea
41.1
39.4
4.1%
13.4
10.8
25.0%
32.7%
US
39.8
49.7
-19.7%
15.1
19.6
-22.9%
38.0%
Korea
38.9
44.9
-13.2%
7.1
7.8
-8.8%
18.3%
Taiwan
29.9
28.6
4.5%
10.8
8.5
26.8%
36.2%
Taiwan
29.7
33.7
-11.9%
4.6
3.8
21.0%
15.5%
38.9%
27.9%
Company
Headquarters
Hikvision Digital Technology Dahua Technology FLIR Systems (Thermal Vision & Measurement) Axis Communications Infinova VIVOTEK Tamron (Commercial & Industrial) Verint Systems (Video Intelligence) IDIS Hitron AVTECH ITX Security Geutebruck Synectics DynaColor GeoVision Milestone Systems HDPRO CNB Technology IndigoVision Dali Technology Win4Net Vicon C-Pro Electronics Hunt Electronic Hi Sharp Electronics
Revenue Growth Gross Profit 2013-2012 (in US$ M) 2013
Gross Profit (in US$ M) 2012
9.2%
Profit Growth 2013-2012
Gross Margin 2013
Intrusion Alarms & Others 2013 (in US$Million)
2012 (in US$Million
Alarm & Home automation: Systems
29.0
30.5
-4.7%
Japan
Perimeter & Alarm: Systems
161.5
138.1
16.9%
Magal Security Systems Israel
Perimeter & PSIMs: Systems
30.6
33.9
-10.0%
Companies
Headquarters Product Groups
Everspring
Taiwan
Optex (Sensing Products Business)
Revenue Growth Gross Profit Gross Profit Profit Growth 2013-2012 (in US$ M) 2013 (in US$ M) 2012 2013-2012
7.8
8.3
-5.2%
Gross Margin 2013
27.0%
0.7%
31
Advertorial
Tecnofire Detection by Tecnoalarm:
Advanced Solutions and Hi-tech Products Tecnoalarm will present the world’s first range of completely remotely controllable fire alarm systems, Tecnofire, at the 2015 edition of intersec Dubai. ■ Submitted by Tecnoalarm
T
he Italian manufacturer of hi-tech security systems, with nearly 40 years of experience in the sector, has set up a new manufacturing plant for its range of fire alarm systems. Tecnoalarm boosted its growth with substantial investments in R&D in order to supply customers with advanced and reliable products that respond to the growing need for certification — in 2010 they adopted the ISO 9001 quality management system. The company is
32
now committing to the fire alarm sector with the same attention it has paid to the development and production of burglar alarm systems for more than three decades. Much of their knowledge of the burglar alarm sector has served Tecnofire and provided a basis for the development of a range of advanced and high-performing fire alarm systems. The systems are characterized by an aesthetic contemporary design which combines modern taste with functional
needs. The three models available, TFA1-298, TFA2-596, and TFA4-1192, meet all installation requirements of small-, medium-, and large-sized systems and are certified to the EN 54 standard. All peripheral devices connected to the loop are addressable by a rotary switch and are equipped with an intelligent dual loop isolator. The systems can be programmed to function in the local, master, or slave mode. While the local functioning mode provides one unit systems, the master and slave modes permit to create networks of a total of one master and 15 slave fire alarm panels each, connected over an RS485 serial bus using copper cables or glass fiber. The master has complete control of the slaves and a total of 8,000 detectors — all signaling is collected by the master. Network
functioning is in compliance with the EN 54-13 standard. Special monitoring software with implemented floor plan management provides the central monitoring station (CMS) with detailed and illustrated information on the status of all fire alarm systems of the network. The Tecnofire systems use the “Fire-Speed” protocol developed by Tecnoalarm which, permits optimization of the systems’ response time by polling each device on the loop with less than one-second intervals, even under full load, i.e., 298 devices per loop. The systems implement RSC technology, originally developed for remote interaction with the Tecnoalarm systems, and can be remotely programmed and controlled, even over Ethernet. The RSC tools permit programming, monitoring, and calibration of each individual component of the system, both locally and from a distance, and make start-up and maintenance of the systems easy and less expensive and time-intensive. The hardware coherence control (HCC) analyzes and records the functional parameters and the identification data of the connected hardware, matches the collected data with the programming of the system, and identifies inconsistencies; the parametric analysis confronts the electrical data collected by the HCC and signals every possible deviation from previous values; and the device monitor permits on-demand monitoring of the functioning of individual system components. Automatically drawn reports can be printed or archived — the programming report puts down all the settings of the components of the system, the hardware coherence report records all the functional parameters and identification data of the devices, the parametric analysis report records and matches the functional data and shows any deviation from previously recorded or certified values, and the event log report
lists all of the system’s events with the possibility of sorting and filtering by date and/or type. The Tecnofire systems can be connected via Ethernet to the CMS using the proprietary protocols Contact-ID, SIA, and Tecnoalarm. The on-board Ethernet interface provides four channels performing specific functions, two server channels for LAN and WAN or VPN connections, one client channel for event transmission, and one client channel for call back connections. All four channels are compatible with a 128-bit AES encryption — access to the server channels is protected by a white list. The fire alarm panels provide a programmable four-year calendar, 32 access periods, and 400 Boolean functions for the automatic execution of the functions as well as a completely programmable test call function with TCP/IP. User-friendly and intuitive tools such as a large graphic true color display, integrated in the casing of the fire alarm panel, as well as a multi-language voice synthesis function with a bilingual mode can be used by the user to manage system status information and alarms. Voice synthesis and display messages are available in principal European languages, as well as Arabic. The information is displayed in a hierarchical
order, according to its importance, using clear iconography and different colors and dimensions of font. The multi-level viewing of the events permits a quick classification and a unique identification of the origin. In case of obvious hazard, the data is accompanied by the relative alarm plan. Remote displays with a fine design (TFT-7) are available to be installed in different places of the installation and can be used as either repeater panels or interactive keypads. The range of detectors covers all the classic fire sensor technologies: gas detectors, a Tyndall-effect optical smoke detector with active control of the saturation of the smoke chamber (TFDA-S1), a combined optical smoke and heat detector (TFDA-STR1), and a rate-of-rise detector with programmable class. The Tecnofire product range also includes indoor and outdoor sirens, fire call points, interfaces for conventional and 4-20mA devices, glass fiber converters, additional power supply units, as well as input/output modules with different functional specializations. The Tecnofire trademark, just as its big brother, represents technology, innovation, and design.
For more information, please contact info@tecnofiredetection.com 33
Vertical Market
Luxury Hotels Serve Up First Class Security The hospitality industry is a clear beneficiary of the growing number of tourists floating about the world. As the amount of disposable-income travelers increases, the number of those opting to stay in luxury hotels is also on the rise. As a result, luxury hotel operators are looking at ways to maximize on-site security as well as operational efficiency. BY EIFEH STROM
T
he tourism and hospitality sectors are inextricably linked — you can’t have one without the other. This link becomes even clearer when looking at the numbers. And as the global economy continues to recover, so does the hospitality sector. 2012 marked the first year that international tourist arrivals surpassed 1 billion, a good sign that the world economy is recovering. According to the January 2014 numbers from the ASEAN Tourism Statistics Database, the number of tourists in ASEAN countries reached 89.2 million in 2012, up from 81.2 in 2011. Among ASEAN countries, Malaysia led the way with 25 million visitors, followed by Thailand with 22.4 million. Not only is the number of travelers on the rise, the number of travelers with disposable income is also on the rise, fueling the demand for upscale and luxury leisure travel, according to EY’s Global Hospitality Insights: Top Thoughts for 2014.
34
89.2
million
The number of tourist arrivals in ASEAN countries in 2012.
25M
Malaysia
24.4M 14.5M
8M
Thailand Singapore Indonesia
Note: Data reflects numbers from ASEAN countries only. Source: ASEAN Tourism Statistics Database
1
billion
The number of international tourist arrivals in 2012.
Int'l tourist arrivals surpassed 1B for the first time in 2012 - a rise of 20M from 2011.
Source: United Nations World Tourism Organization
The latest numbers from STR Global indicate that there are 2,321 hotel projects currently in construction, in development, or in planning in the APAC region as of April 2014. So far in 2014, 430 hotels have already opened, with another 497 expected in the second half of the year. Of these hotels, 52 are luxury hotels. Luxury hotels have a lot to offer; however, opting to stay at a luxury hotel is more than just wanting first-class service and accommodations. It is also about feeling secure and knowing you can relax and feel at ease. For the hotel operator, security is of utmost importance. By utilizing newer security technologies such as physical security
There are currently 2,321 hotel projects either in construction, in development, or in planning in APAC.
information management (PSIM) software and video content analysis (VCA) software, luxury hoteliers are able to not only secure their establishment and their guests, but also increase management and operational efficiency.
Upgrades and Procurement How luxury hotel chains upgrade and procure their security equipment is different from standard economy hotel chains. Industry players estimate that luxury hotel chains, on average, look at large system upgrades every seven years, give or take a few. Upgrades are driven by anything from changing local regulations to system failures to incidents that point out security weaknesses. Regardless of the reason, during this time security directors of luxury hotel chains use this opportunity to take a hard look at how security technology has changed and how they can benefit from it, according to Brian Lane, Director of Product Management at 3VR. “This is when the ‘migration’ from one technology to another begins.” In terms of procurement, Ilya Umanskiy, Associate MD of Security Risk Management at Kroll in Hong Kong highlighted the competitive nature of luxury hotel tenders. Certain genuine process indicators/measures are used to select the right supplier. From there, a fixed pricing period is often determined, which is reset every two to five years. Lane further pointed out, “Hotels generally do not network their security systems together as an enterprise, therefore, a single hotel in a chain may elect to choose their own security system, independent of other hotels in the same chain, even luxury hotels.” Because a hotel operator or security director may have an established relationship with a local integrator, they are not always
35
Vertical Market likely to purchase a single solution from one supplier, added Lane. “The hotel may have different components from several suppliers, but often will use only a single integrator.”
Better Efficiency with PSIM PSIM has been promoted within the security industry as solution for centralizing disparate systems; however, due to high cost, mass implementation outside of government-type and critical infrastructure projects has been limited. Despite this, more and more industries are realizing the benefits of using PSIM software to help manage their facilities. A report released by Transparency Market Research in January 2014 estimates that the emerging PSIM segment will grow at a CAGR of 25.8 percent from 2013 to 2019. This rise in PSIM deployment is attributed to a decline in price, increase in sophistication, and growing awareness among end users. Luxury hotel chains are among those that are starting to see the many benefits that PSIM has to offer. “PSIMs are good when you have disparate systems that have been installed over the years where you can aggregate signal information in a single user interface where it can help centralize your monitoring,” said Umanskiy. This ability to centralize different systems makes it a great tool for luxury hotel chains. Yet, demand for PSIM software varies by region and reach. “The demand is there. The big question is the global region of where the hotel chain operates and whether the hotel chain is a global chain or a regional chain or if it’s simply a privately owned hotel or several properties in a particular country or region,” explained Umanskiy. For
There is much more to be done in Asia, in terms of educating users on how PSIM can help. Ilya Umanskiy, Associate MD, Security Risk Management, Kroll in Hong Kong
By saving a customer’s face in the system, the system can then be used to alert the front desk when a ‘platinum-level’ guest arrives. Brian Lane, Director of Product Management, 3VR
example, hotel chains in the Western world are more likely to use PSIM software as a result of more technical know-how available to explain how PSIM operates and what benefits it brings. On the other hand, in Asia, less market education and high cost have made PSIM adoption quite low. “They still rely on another subset of interconnected systems, typically various subsystems connected to access control platforms or those systems are completely standalone, so they end up operating through different interfaces,” said Umanskiy. One reason for this can be attributed to the market for luxury hotel implementation in Asia being owned by integrators. Because integrators generally prefer to get in and get out, they are less likely to spend time educating users on what technology they are receiving. “There is much more to be done in Asia, in terms of educating users on how PSIM can help. A lot of hotel properties operate systems that may have been installed at different times and may not be talking to one another readily, so PSIM can definitely help, but, again, in Asia specifically, that really hasn’t been widely discussed by luxury hotel operators.”
Luxury Hotels Get Smarter ■Personalization of stay and top-notch security at luxury hotels make patrons feel comfortable and secure.
36
VCA, or video analytics, has been a hot topic in the security industry in the last few years. Making systems “smart” allows users to save
time and increase operational efficiency. That is why luxury hotel operators are getting in on the action. Aside from using PSIM software to manage and centralize systems,
Luxury Hotels in India Beef Up Security Terrorism is an unfortunate and devastating part of reality. After the 2008 Mumbai attacks in India, where two hotels — the Taj Mahal Hotel and Oberoi Trident — were among the locations targeted, the Hotel Association of India (HAI) issued the Guidelines for Security Measure in Hotels. The Guidelines are a non-mandatory set of security measures for HAI hotels to consider, addressing several main topics such as external, internal, materials, and people access control; crisis management planning; liaising with local administrations; and others. In regard to external access control, the Guidelines point out limiting access points, which should be monitored by video surveillance cameras, for easier regulation and monitoring of those coming and going. Road barricades such as retractable bollards and hydraulically operated road barriers should be considered to slow down and/or stop incoming vehicles. A three-tiered perimeter security system is also suggested. The first tier starts at the very outer perimeter of the hotel property where incoming vehicles should be stopped and checked before entering the premises. The second tier discourages vehicles from driving up to the hotel doors, putting distance between any potential vehicular threat and the hotel. Lastly, the third tier suggests the installation of video surveillance cameras in all public spaces, particularly at access points. Other access control measures such as scanning all incoming luggage and supplies before they are allowed inside the hotel is also suggested. Implementing a visitor management system is “essential” to allow hoteliers to keep track of who is on their property. An employee verification and management system, as well as a guest profiling system linked to the Ministry of Home Affairs’ watch list is also implored. For those that want to go the extra mile, the HAI encourages hotels to utilize the US Department of Energy’s mass spectrometry scanners, which can analyze up to 1,000 guest room access cards per hour and even detect a billionth of a gram of explosives such as nitroglycerine and TNT.
many luxury hotel chains simply integrate subsystems such as access control with video management systems (VMS), a more affordable solution. A VMS with VCA software integrated with an access control platform allows the video analytics to be applied and married to the access control database, asserted Lane. Video analytics at a hotel can be used for many different things. On the security side, VCA technology can help hotels that have issues with parties in hotel rooms — the video analytics can send an alert to security officers if three or more people enter the hotel through a back entrance using the same access control key. Analytics can also be used to help with operational efficiency, pointed out Lane. “For the operations of the hotel, analytics that determine queue length can notify the manager to add more front desk personnel when the queue hits a certain threshold, while face analytics can be used to identify VIP guests, and people counting analytics can be used to help managers find traffic patterns to help maximize staffing needs during peak and lull periods.” Although deployment of VCA has clear benefits as a proactive tool for operations and surveillance, Umanskiy points out that it has limitations. Making sure that patrons feel safe at a hotel means making sure security measures are as unobtrusive as possible. Therefore, hotel operators cannot put cameras everywhere, as a certain amount of privacy must be maintained. Since analytics requires video content for analysis, it is not possible for analytics to be everywhere on a property.
The Non-Room Service Services Services at a hotel can mean much more than decadent room service. In the case of security, services refer to maintenance services and extended services, both contracted and not. Again, like PSIM software proliferation, the use of monthly/annual service agreements is more widely seen in the Western luxury
37
Vertical Market hotel chain market. Umanskiy attributes this to the fact that the majority of luxury hotel chains originated from Western countries. Because of this, growth and expansion of these Western hotel chains requires them to centralize their models and focus greater attention to best industry practices. However, Asian hotel chains are much less likely to engage in extended services or extended maintenance agreements. According to Umanskiy, Asian hoteliers do repairs based on time and materials. One of the reasons for this is a lack of formalized relationship with the integrator — hotel operators will have the integrators on call, but rarely sign service or maintenance agreements. Even so, more and more hotels worldwide are looking at global best practices, which should result in more formal agreements between hotels and security service providers.
Secure, Personalize, and Pamper There are certain things patrons come to expect when staying at a luxury hotel. Personalization of stay and top-notch security are among those. The fewer distractions a patron has to deal with, the better they feel about their stay, meaning they are more likely
Increased Security Awareness Among Hoteliers I t i s u n fo r t u n a te t h a t o f t e n t i m e s Security security education and awareness are not previously was prioritized until after an event occurs. After just part of a process in hotel a number of terrorist attacks at major tourist management; however, destinations across Asia over the last several with the recent incidents years, security has not only become more it has become a prime important to hoteliers, but to travelers as consideration for hotel well. operations. “Safety and security has since become Nafis Jasmani, Business Development Manager, a much more impor tant criterion to South Asia Pacific, Axis Communications all travelers, especially for business,” explained Nafis Jasmani, Business Development Manager of South Asia Pacific at Axis Communications. “Security previously was just part of a process in hotel management; however, with the recent incidents it has become a prime consideration for hotel operations to protect both people and their property from any potential danger and damage.” As a result, more stringent considerations are now being placed in security planning — new technologies are being applied to replace old equipment and provide an overall integrated security system. “Today there is a paradigm shift in how hotel owners practice and manage the security element in their hotel management as compared to previous. Hotels are going through a series of system enhancements or even new installations in their premises and more initiatives are implemented for staffs to be trained in security-centric programs and familiarize themselves with the security installation to be ready for any unforeseen or stressful situations.”
38
to return in the future. Hotel operators have found several ways of amping up security in a less “in your face” way that is helping to not only ensure the safety of those staying at the hotel, but also personalize their stay as well. One way hotel operators are pampering their guests is by using facial analytics, according to Lane. “By saving a customer’s face in the system, the system can then be used to alert the front desk when a ‘platinum-level’ guest arrives.” Furthermore, combining card-key access with face analytics can provide guests with an even more personalized stay when entering the hotel spa or another service area. By combining these two technologies, service personnel are able to identify guests as they enter allowing them to address patrons by name. This coordination between security and guest service departments allows for in-guest concerns and in-guest needs to be more easily addressed.
Did You Enjoy Your Stay? Making sure all guests are treated to a luxe experience means ensuring safety and security along with all the other five-star amenities people come to expect from luxury hotels. As the global economy continues to recover, both the tourism and hospitality sectors are expected to continue growing as well. The rising number of travelers will definitely require luxury hotels to amp up security measures. And as the price for PSIM software continues to drop and the accuracy of VCA continues to improve, there is no reason why both these technologies cannot see more widespread implementation in the future. At this rate, the only thing standing in the way of Asian hoteliers and these more advanced security technologies is a lack of education, which in time can be easily remedied.
Vertical Market
Oil & Gas
pump up safety From a safety and security perspective, oil and gas installations are among the most critical and challenging environments. The speed in which an incident can escalate to a disaster means that operators need to get information quickly to be able to react and minimize damages. Advances in video technology and video content analytics have great potential to assist oil and gas installations in detecting fires, leaks, and security threats, as well as help make operations more efficient. By Israel Gogol, freelancer, & Eifeh Strom
A
s oil exploration moves to new regions across the world, so does the need for better monitoring of remote facilities, increased protection against terror threats, and pipeline and leak detection monitoring solutions. Exploration and drilling security systems will be the largest segment in terms of spending and adoption followed by refineries and storage facilities. According to research by Frost and Sullivan, the global oil and gas infrastructure security market was estimated at US$19.6 billion in 2013 and will grow to $24.7 billion by 2021. Including network and cyber security, the combined oil and gas security market will reach $30 billion by 2018. Any damage to an oil and gas facility has grave consequences. Incidents have implications on employee safety, environmental damage, cleaning costs, damage penalties, equipment replacement, and the list goes on and on. This becomes even more challenging when considering the nature of these installations. There are hundreds of potential breach points for leaks and damages: numerous valves and pumps, meters upon meters of pipes. Even within the facility, environments are not the same. A refinery for example will include various types of oil, transported at different temperatures and pressures, from ambient temperatures and pressure up to 130 bars at 100째C.
40
Image courtesy of Ex-Sight.
The customer is looking for a common platform such as ONVIF.„ Thomas Soderlund, Business Development Manager, EMEA, Bosch Security Systems
Oil and Gas Grows in APAC Middle Eastern countries and US states like Texas are usually what come to mind when thinking of the oil and gas industry. However, the oil and gas industry in APAC is growing considerably. Moody’s Investors Service gave a positive rating to the Asian oil and gas industry’s China leads the way in the exploration and production sector for 2014. region with the highest According to an April 2014 report by Research percentage of total active and Markets, there are currently 518 active oil oil and gas pipelines with and gas pipelines in APAC, of which 335 are gas pipelines, with a total length of 202,069 kilometers. China leads the way in the region with the highest percentage of total active oil and gas pipelines with 27.5 percent of the region’s total active pipeline length, according to the report. While China may lead in terms of current active pipeline length, India leads APAC in terms of planned pipeline length. India plans to add 20,473 kilometers of pipeline by 2020, which accounts for over 34 percent of planned pipeline length in the region during this period.
27.5 percent
41
Vertical Market In addition, sites are often located in remote and harsh environments. All these make the oil and gas industry one of the most demanding clients for safety and security products. One of the limitations of the oil and gas sector is the stringent regulations regarding equipment. For example, equipment for Class 1 Zone 1 areas —the areas closest to the drill site — needs to be explosion proof, making sure it will not cause an explosion in high risk areas. There are similar limitations on mobile devices since cellular radiation can also cause an explosion. “If you are looking at a typical oil and gas plant, there will be between 300 to 500 cameras to monitor the perimeter and inner workings of the plant. In addition, there will be thermal cameras to monitor flames and detect leaks and specialty cameras for class and zone areas. In an ocean rig there are 16 to 20 explosion proof cameras and 40 to 50 standard cameras,” said William Moore, Senior Account Manager for Pelco by Schneider Electric. With so many cameras involved, it is impractical to monitor them all the time; therefore, the cameras are monitored based
We see a strong trend for coupling video analytics with thermal video surveillance cameras.„ Laurent Assouly, Marketing Manager, Evitech
Adoption of Cloud-based Solutions Oil sites are now scattered all over the world, from Alaska to Azerbaijan to Siberia to Saudi Arabia. The need to monitor these sites (especially off-shore and remote locations) is driving demand for platforms that will be able to aggregate and store all the video feeds. Since the connection with remote sites is done via satellite, cell network, or line-of-sight transmission, the option of cloud storage is becoming more relevant. Cloud storage can also help solve the growing need for storage space. Currently cloud storage is gaining pace slowly. Security concerns, as well as the need for constant connectivity and bandwidth requirements, stop companies from adopting it. In order to save on bandwidth and storage space, iOmniscient developed an overlay for VMS systems to “understand” what is important. “This allows the system to record only the important information, such as faces, in high definition to save storage, bandwidth, and hence costs, and the rest, such as the person’s feet, in low resolution,” explained Dr. Rustom Kanga, CEO of iOmniscient. The option of cloud-based storage will also widen the accessibility of different stakeholders to the video feeds. “We started the company [Osprey Informatics] to answer a need for increased visibility of the field of operations. We saw an opportunity where companies have many assets at many locations and there is a need to integrate all the data instead of having a person permanently on-site,” said Michael Von-Hauff, CEO of Osprey Informatics. “Our cloud-based approach means that the cameras are distributed as the client wants but the video is located in one place and accessible to all stakeholders — safety, security, operations, environmental protection, and even finance.” In this type of solution, cameras are selected and placed depending on their functionality, but the information is consolidated under one dashboard and access to cameras is decided according to pre-defined user roles. In this way, a complete view of the field is available from both a security and an operations perspective.
42
on an alert rule-engine. In case of an event, whether security or safety related, the proper camera will be triggered and brought to the attention of the operator.
The Secondary Line of Defense: Video Analytics
Typically, video analytics are most appropriate for outdoor and wide-area use, when it is impractical to place sensors (i.e. outdoors or in a warehouse with high ceilings). Common analytics in use are smoke and fire detection, leak detection, gas leak detection, flare-size monitoring, and slip and fall (used for employee safety). In addition, more security-oriented analytics such as perimeter protection and theft detection are also used. Despite technology advances, video surveillance and video analytics alone cannot replace traditional fire detection systems. Usually both are implemented as standalone systems. Analytics are however beneficial for verification and supplying
43
Vertical Market
secondary visual inputs to an alert triggered by other sensors. For example, a combination of a thermal camera and a visible spectrum camera can give a better of understanding of a situation. “We use the video analytics only as a second layer of detection and we do not trust it to be the first line of alarm. The reason is due to the day camera sensor’s capabilities. Our first line of detection is the thermal vision sensor,” explained Tomer Dadon, CEO of Ex-Sight. “The flame detector camera is normally packed inside the pan tilt video surveillance system. This system can connect directly to a video surveillance control center or a SCADA system.” Flame detection analytics enables the user to continuously assess and monitor target sites in the range of a few kilometers. While scanning the target area, the system identifies when a designated preset reaches a threatening temperature threshold. Once a flame is identified, the camera uses multiple alarm
■ Video analytics can help distinguish between flame and smoke sources that are part of the industrial environment and those that pose a security threat. Image courtesy of Evitech.
When combined with the analytics from video, systems can provide an enhanced understanding of what is happening in an environment.„ Dr. Rustom Kanga, CEO, iOmniscient
44
mechanisms, including transmitting the fire’s coordinates. The specialty of the system is its ability to distinguish between flame and smoke sources which are part of the industrial environment and those which pose security risks. “We see a strong trend for coupling video analytics with thermal video surveillance cameras,” said Laurent Assouly, Marketing Manager for Evitech. This combination enables a volume protection instead of line detection. Thermal cameras enable long range detection, such as 600 meters or one kilometer, while color cameras usually cannot see beyond 130 meters at night. Detection over color images would possibly raise more false alarms due to moving lights, flashing lights, etc., and would not reveal many details at the end of the fields of view at nighttime. Video Analytics for Operations Monitoring Video analytics can also be used for process monitoring and ensuring the facility is functioning properly. “We monitor pump jacks to detect any problems with their operation. By monitoring the cadence of the pump we can detect if it stops moving and alert the operators immediately,” explained Michael Von-Hauff, CEO of Osprey Informatics. This makes analytics exceptionally useful for remote sites that are not manned permanently. Without this capability, a malfunction can sometimes be detected only after hours, or even days if the pump is located in a remote location, when a human inspector visits the site. Such a solution, therefore, saves lost production time and helps turn video into actionable intelligence. Video monitoring can also be used to audit employee behavior during alarms and other safety events — it allows the relevant officers to check if all employees are following the relevant procedures.
Connectivity and Systems Integration:
A growing market trend is connectivity and systems integration. “There are thousands of land rigs, gated and sensed-in, the clients are asking for the possibility to integrate cameras and access control,” explained Moore. “For example, we implemented such a solution in western Texas. A FOB key card swipe at the gate pops up the picture of the truck to the administrator.” The system is also integrated with LPR cameras, cell phones, and iPads and is used for site management and monitoring site visits. “Another thing the customer is looking for is a common platform such as ONVIF,” added Thomas Soderlund, Business Development Manager for EMEA at Bosch Security Systems. “With the old analog systems it was easy to pick any camera and plug it in and it would work due to the 1 volt peak-to-peak signals. With IP devices it is not always that easy since a new firmware or change of model mean additional programming of the main system is needed to be able to provide functionality.” SCADA Integration There is a benefit in connecting different systems to the SCADA system. The benefit of an integrated system is to have one common interface for alarm handling and monitoring, compared to moving between multiple systems in order to then build up the picture of the event. In addition this integration can help in halting delivery and limiting a leak’s consequences. However, most platforms need to use SDKs to integrate with the SCADA systems, which is often a costly and complex solution.
Avoiding False Alarms
There are several options to reduce false alarms. One is to install multiple different sensors for verification purposes. A second system for avoiding false alarms is to calibrate the system against an existing database of detections and false alarms. Tests can be performed using high pressure water cleaning tools, which deliver varying temperatures and pressures. These simulate various sorts of leaks in the different pipes (themselves at different temperatures). These tests can be used
There are thousands of land rigs, gated and sensed-in, the clients are asking for the possibility to integrate cameras and access control.„ William Moore, Senior Account Manager, Pelco by Schneider Electric
45
Vertical Market non-class and zone cameras. For class and zone areas it is more complicated due to technical reasons. The external microphone has to meet the safety criteria and not cause explosions.” iOmniscient combines with its video analytics smell sensors that can detect gas leaks and audio analysis to identify sounds. “When combined with the analytics from video these systems can provide an enhanced understanding of what is happening in an environment,” explained Dr. Rustom Kanga, CEO of iOmniscient.
Automated Response
as a benchmark for the analytics and then need to be carried out at regular intervals to ensure the continuity of service of the solution. Artificial intelligence analytics check alerts and reduce false alarms by differentiating between real objects and other objects that might cause false alarms such as changes in lighting (e.g. a cloud passing over the sun or a light being switched off or on, long evening shadows, and bright lights pointed at the camera).
Not Just Video: Other Senses Take Part
Dedicated sensors and video analytics are not the only features used for leak detection — there is also an audio-based detection method. “In a southern Louisiana installation, the cameras have the audio option turned on and in the case of an alert the operator can listen to the pipe to hear if there is a high pitch whistle coming out, indicating gas is leaking from the pipe,” described Moore. “This is already an automatic feature in the
Information integration from various sensors into one platform is usually described as PSIM (physical security information management). Kanga described a solution where the information is not only pulled together but is also responsible for automated response. “The system, without human intervention, ■ The global oil and gas will find the nearest appropriate first infrastructure security responder and provide him with detailed market was estimated at US$19.6 billion in 2013 and information,” said Kanga. Relevant will grow to $24.7 billion information can be pushed to the user’s by 2021. cell phone, turning the user’s smartphone Source: Frost and Sullivan into a mobile control room. The user can use the phone to perform all the operations that he could have performed in a control room. However, the quality of the entire system depends on the quality of the core analytics. Automated responses reduce reaction time and as such are beneficial for both safety and security but also for operational efficiency — making sure malfunctions are treated fast.
Our cloud-based approach means that the cameras are distributed as the client wants but the video is located in one place and accessible to all stakeholders.„ Michael Von-Hauff, CEO, Osprey Informatics
46
Future Trends
As oil and gas exploration continuous to expand further to more difficult environments so will the demand for video surveillance systems. The future calls for durable and reliable systems, able to withstand harsh field conditions and connect with other systems that will be able to give operators more than just security and also optimize operations. The future will no doubt involve more and more integrated systems, making full use of technology for both safety and security.
Product Exploration Expectations for new and exciting technology often far exceed the reality. This was the case for video content analysis (VCA), also known as video analytics, when it first landed in the security market. Sci-fi movie expectations that VCA would be able to perform security surveillance miracles put a big dent in the acceptance and adoption of the technology. But as they say, we live and learn. And while there may always be some flaws, the benefits of video analytics far outweigh the imperfections. n By Eifeh Strom
Change Drives VCA Growth V
ideo analytics vendors readily admit that VCA technology will never be 100-percent accurate, but very few things in life ever are 100-percent guaranteed. Accepting the flaws, working with them, and understanding them are the best way to truly take advantage of all video analytics has to offer. It is with these things in mind that has driven market acceptance of VCA technology in the security industry.
48
Driving Change VCA started as a technology focused around perimeter security. While some companies such as SightLogix still focus on outdoor perimeter security, for which VCA was first intended, the use of video analytics has permeated many other applications. Now, VCA can influence almost every aspect of surveillance. However, in order to do that, improvements and changes, not only
to the technology itself, but to outlying factors need to be made. Computer processing power has very much had a direct impact on video analytics, much in the same way it affects computers. Limited processing power means limited means to process algorithms. That is why improved processing power has helped drive change in video analytics. “The locomotive pulling the train of change in
VCA technology, in our view, has been the growth in ubiquitous processing power, allowing increasingly more sophisticated algorithms to be applied to the problems at hand,” said Eric Olson, VP of Marketing at Puretech Systems. “The advances in computing power, including using cloud computing, have opened up the opportunity to analyze mass quantities of video with better algorithms and much faster real-time.” Improved processing power and more CPU availability also allows for more accurate computing, according to Steve Viegas, Director of OEM Sales at IntelliVision Technology. Additionally, increased processing power has also helped big data processing, according to Shiliang Pu, R&D Director of Hikvision Digital Technology, which has facilitated “video surveillance transit from traditional passive surveillance to intelligent proactive surveillance, significantly helping to save on overall labor force, cost and time, and increase both security and non-security values.” Increased use of IP networks, as well as improved picture resolution, has also contributed to change in the VCA market. “The picture material, its quality, and its resolution have increased significantly
▲ Eric Olson, VP, Marketing, PureTech Systems
over recent years. Due to the increased usage of IP networks, it has become easier and easier to access whatever picture content is required, and this is normally already provided in digital format,” said Frank Brandtner, Head of Administrative Product Management at Geutebruck. Continued growth and maturation of the video surveillance market was also pointed out as a key point for change in the VCA market. The global market for video surveillance equipment is expected to grow by more than 12 percent in 2014 alone, according to IHS Technology. This double-digit growth provides a huge market for the growing trend of edge-based analytics. IHS forecasts the market for video surveillance devices with chargeable VCA to expand in 2014, particularly in applications where end users need advanced and reliable analytics. Furthermore, as competition in the video surveillance market continues to get stiffer, embedding edge-based video analytics in network cameras is one way network camera manufacturers could add a competitive advantage, according to a report by MarketsandMarkets.
Quality Over Quantity In truth, there has not been much in terms of new and innovative technology when it comes to video analytics.
▲ Steve Viegas, Director, OEM Sales, ▲ Frank Brandtner, Head IntelliVision Technology of Administrative Product Management, Geutebruck
3D Video Analytics The introduction of 3D video analytics is another point of interest. By utilizing a stereo camera — a camera with two or more lenses and a separate sensor — the synchronization of two image sensors “can provide distance and height measurements that easily distinguish people with different heights, and sense whether the objects are moving toward or away from the camera,” explained Jamie Wu, Marketing Manager of Huper Laboratories. This results in higher accuracy since it less influenced by shadows and light changes, making it particularly suitable for outdoor use.
Instead of a significant amount of new innovations, the VCA market has seen a vast number of subtle improvements in technology, which has upped the quality of the technology and made it more reliable. “It is more a case of incremental improvements in accuracy and reduction in price. It is like cars and TVs: they are significantly better and cheaper than 10 years ago, but the gains are made in the form of a large number of small improvements,” said Geoff Thiel, CEO of VCA Technology. Despite the lack of “new” innovations, there are still “newer” avenues that VCA
▲Geoff Thiel, CEO, VCA Technology ▲ Shahar Ze’evi, Senior Product Manager, Tyco Security Products
49
Product Exploration vendors are exploring. The utilization of metadata, literally data about data, is becoming increasingly popular by VCA vendors. “By employing metadata, it’s now possible to apply new analytics rules to recorded video in an attempt to find, for example, any blue cars that exited the parking lot between seven and nine in the evening last week,” said Shahar Ze’evi, Senior Product Manager at Tyco Security Products. The use of metadata according to Olson is only limited by our imaginations. “Once we have a notion of the content of the video, all kinds of applications can be written to slice and dice the data in different ways for different purposes to translate data into useful information,” said Olson.
Not all Smooth Sailing
▲ Integrating VCA with POS systems can help retailers identify internal theft by detecting, for example, when a sale is voided at a register without a customer present. Image courtesy of 3xLogic .
Although the overall accuracy of video analytics has improved, there are still many quirks that are proving to be a challenge. Detection of gender, age, and race is still proving to be difficult for video analytics algorithms. “VCA will not replace the human eye anytime soon,” said Viegas. “If it is difficult for a person to tell race or weight, a computer will also have a difficult time.” Achim Hauschke, CEO of Riva (by ViDiCore), concurred, saying “filters like gender and age detection are still a challenge, but will certainly become a lot more reliable mid-term, but
mostly used for marketing purposes, not security; this will take more time as it has to be more reliable than for marketing activities.” Behavior analysis is another analytics feature that is not yet up to par. This feature, which is commonly requested for sports events and large stadiums, will require significant improvement before it can be deployed to the standard wanted by users. According to an industry expert, the technology to differentiate between someone jumping for joy because a team scored versus someone
▲ Jamie Wu, Marketing Manager, Huper Laboratories
50
▲Achim Hauschke, CEO, ViDiCore
▲ Charlie Erickson, EVP, Product Management, 3xLogic
throwing a punch is not available. As a result, it may take a combination of technologies to eventually meet some of the requirements customers are looking for today. Intercamera tracking is another feature that the market has yet to find a viable solution for. To be able to track a specific person across non-contiguous security cameras has obvious value. This feature, which was a topic of a National Institute of Standards and Technology technical discussion workshop in the summer of 2013, is much desired, but note yet
▲ Ely Maspero, Product Line Manager, March Networks
▲ David Aindow, Product and Technology Director, Synectics
one that has been deployed to a usable standard, according to Olson. While this feature is highly requested, the technology for this is still in its infancy and very far from being user ready. One challenge that has less to do with technology than it does with application is environmental variables. Lighting inconsistencies, crowded environments, and obstructions can all affect the accuracy and effectiveness of video analytics. Therefore it is necessary to know where and when to use VCA in order to get the best, more accurate results. For example, the object left behind feature can work well in a non-crowded environment, but in a crowded, fast-paced environment like a train station or an airport, accuracy become nearly impossible. In cases like this, it is important for not just the user to understand that such requests are unreasonable, but it is equally important for vendors to know when to say no instead of promising results they cannot deliver. Another non-technology hindrance is the cost of infrastructure, particularly
in the outdoors, which in the past has inhibited the video surveillance market, as pointed out by John Romanowich, CEO and founder of SightLogix. “The cost of installing power and networking infrastructure to outdoor areas where these resources do not already exist has been one of the biggest challenges facing the industry. For this reason, manufacturers have been innovating in the areas of power consumption to make solar power and wireless communications viable options. By increasing video processing while simultaneously lowering the power consumption at the edge, manufacturer’s can offer accurate VCA detection systems that run on solar and wireless, eliminating the majority of the construction once required, unlocking a huge market for outdoor video security.”
Encouraging Acceptance by Adjusting Expectations One of the main obstacles that thwarted early acceptance of VCA technology was the idealized
▲ People tracking and counting in outdoor applications can detect and track several objects, as well as differ between objects, in busy scenarios. Image courtesy of Riva.
expectation of a technology that could do the impossible. On top of already inflated expectations, vendors oversold and overpromised, resulting in disappointment and letdown. However, since then, the industry has taken notice and worked diligently to improve analytic sensors and algorithms. Whereas before false alarms, or nuisance alarms, caused more problems than it helped, VCA manufacturers have since improved algorithms to reduce these types of alarms and taken the time to better educate the market. Now, there are solutions that look closely at video footage to recognize the traveling movement of people and objects while dismissing extraneous and repetitive changes and movement in the scene, drastically reducing the number of false alarms in video motion detection applications. User education has also played a major role in growing acceptance. While there will always be companies that overpromise, end users are now savvier and more aware of where, how, and when video analytics can and should be used. “We can see a clear trend towards a better understanding of the limits and the benefits of VCA since a year ago, not least because of the growing number of publications about video analytics,” opined Hauschke. “We [ViDiCore] are selling every second to third camera with a VCA license, with a clear trend upwards, so it looks like this technology will be accepted as a standard within 2014/2015.” Better understanding of VCA technology is also helping end users to find different uses and applications. “Gone are the days when VCA was solely used as an intrusion-detection system,” said Charlie Erickson, EVP of Product Management at 3xLogic. “Integrators, as well as the organizations and businesses they serve, are realizing that the video
51
Product Exploration asset they have come to rely on for loss prevention and security can now be cross-purposed as an asset benefiting the entire organization.” By leveraging VCA technology, security and loss prevention departments are able to gain valuable insights into their organization, which can optimize overall operational efficiency and profitability.
Verticals Get Smarter User acceptance has allowed video analytics to spread into various verticals. In its beginnings, VCA was mostly used for outdoor perimeter detection, but lately markets such as transportation, city surveillance, critical infrastructure, and especially retail have shown enthusiasm for video analytics. “Video analytics enables organizations to enhance security in both public and private spaces by detecting not only perimeter or area breaches, but also unattended objects, and atypical activity more rapidly and consistently,” said Ely Maspero, Product Line Manager of March Networks, an Infinova company.
VCA Provides ROI Return on investment (ROI) is important to those who invest in any kind of technology; VCA can provide an immediate ROI, particularly for retailers. For example, “Tracking and counting people in a supermarket with all detailed information (how many people, when, where, and for how long) is a very successful analysis, with an immediate ROI, that can be sold far easier than a video security system,” added Achim Hauschke, CEO, ViDiCore. Visible and tangible customer ROI is an important factor for the future of VCA, and it seems that business intelligence may be able to provide just that, thus helping to propel VCA to a new level.
52
“VCA can detect camera tampering in real time and also promotes more proactive system maintenance by alerting staff to camera obstructions or changes in camera positioning that may otherwise go unnoticed.”
Retail Takes Advantage of Intelligence In recent years, there has been noticeable growth in business intelligence applications, particularly in retail. This intelligence enables the cost of a video surveillance system to be spread across multiple departments with a retail organization, which allows marketing and human resources to also tap into the value of video. Video analytics can help retailers highlight customer service issues and provide insight into the effectiveness of merchandizing based on customer traffic patterns via heat mapping. It can also be utilized to quickly and effectively identify unusual events including loitering, unauthorized access to secure areas, blocked doors and fire exits, and even slips and falls.
technology is often considered to be a satisfactory primary detection method for the perimeter security which is prominent in oil and gas, critical national infrastructure, and high security environments,” said David Aindow, Product and Technology Director of Synectics. Banking is another vertical that can benefit from video analytics, according to Maspero. “Banks can reduce losses from fraud and other criminal activities, monitor customer services, assess marketing displays, and improve security in ATMs, drop-boxes, in parking lots, vaults, and cash-counting rooms with video analytics.” The hospitality market can also take advantage of VCA features to improvement operational efficiency — it can even provide a better five-star experience. By using analytics for queue management or even license plate recognition to detect when VIP guests arrive, the hospitality sector can better ensure that guests have a pleasant experience at their establishment.
The Road Ahead No Vertical Left Behind Aside from the retail market, video analytics has found acceptance in many different verticals, such as transportation, critical infrastructure, and city surveillance, which are no stranger to VCA as they are clear beneficiaries of the technology. Perimeter security is where VCA got its start, and although the technology has branched out, video analytics has continued to be vital in this application. Companies like SightLogix, who only deals in outdoor perimeter security, have continued to propagate the use of analytics as a tool coupled with hardware such as a thermal camera, making it a strong outdoor detector. Due to its strength in detection, “VCA
VCA has made strides in both technology and finding user acceptance, but there are still some challenges ahead with certain features; however, whether or not the industry will be able to resolve these issues to meet end-user satisfaction, only time can tell. VCA providers, though, are confident that the value of video analytics will prevail over any overinflated notions of perfection. As long as users know and properly understand what they want out of their analytics and have expectations that fall within reason, there is absolutely nothing in the way of VCA becoming a standard within the security industry in the very near future.
Global Brand. Local Footprint. With professional recognition and 20+ years experience, Messe Frankfurt New Era Business Media (MFNE, formerly a&s Group) is regarded as a well-known and trusted partner for the security and smart home industry. MFNE provides optimal marketing options in both global and regional markets to meet the needs of security players. Global Market
Global Market Europe Market
Europe Market Asia Market
Global Market
Asia Market
Europe Market
mySMAhome.com Asia Market
International Security Expo International Security Expo
14 a&s Magazines 5 sites under asmag.com 2 pad-version magazines 4 Secutech in 5 cities 6 GDSF(global digital security forum) in 10 cities
Brand yourself with our global reach of the integrated marketing network.
Product Exploration The overarching view in the security industry right now is that IP, which employs a network infrastructure and offers HD video, will one day replace analog solutions, which have defined video surveillance for half a century. For analog players, who are seeing declines in sales and revenue, they must find ways to prove that they are still a force to be reckoned with. HD-over-coaxial solutions, which deliver HD video over users’ existing coaxial cabling, represent their latest effort to regain their former glory in the industry. By Alf Chang , a&s consultant
Analog Players Seek to Regain Their Former Glory With
HD-over-Coaxial
54
E
ver since 960H and HD-SDI emerged in 2011, video surveillance players have been trying to find solutions that enhance the quality of CCTV, which remains the mainstream surveillance technology. Analog cameras are inexpensive and easy to install, and they still dominate the market with 70 to 80 percent of market share. However, IP cameras are threatening the very existence of analog players, who are seeing a steady revenue decline. Against this backdrop, analog players seeking to survive have put intensive efforts into the R&D of high-resolution HD-overcoaxial solutions. HDCVI, HDTVI, ccHDtv, and AHD are the products of those efforts. Any HD-over-coaxial solution, be it 960H, HD-SDI, HDCVI, HDTVI, AHD, and ccHDtv, must be easy to use over the end user’s legacy coaxial cable. HD transmission should be achieved using 5C-2V (RG-59U) or 3C-2V (RG-6) coaxial cable without quality loss, and the traditional distance barrier of 100 to 200 meters must be overcome. The solution must incur no extra cost for installation or upgrade, resist quality loss over a long distance, and enable easy upgrade to megapixel-level HD surveillance. Further, it must be high in quality and competitive in price to gain a stronger foothold in vertical markets. In summary, for a solution to be called HD-over-coaxial, six basic requirements must be met: It must have high video clarity and color separation, as well as high signal filtering, noise reduction, and image restoration capabilities; As HD-over-coax is claimed as a breakthrough technology, it must be able to transmit signals for a longer distance over existing coaxial cable; The solution must not be subject to latency, compressionrelated quality loss, or any compromise to video quality; The backend equipment must be compatible with the 960H format, and future compatibility with analog splitters and matrix systems must be considered; HD-over-coax must be easy to use and operate and allow settings on both frontend and backend equipment; Any solution must have low cost and high quality.
1 2 3 4 5 6
There are HD-over-coaxial DVRs that can support both 960H and 720/1080p. These are called hybrid HD DVRs. There are even HD DVRs that are bolstered by Intersil’s decoder chip and the TCP/IP interface to support 960H, 720P/1080p, and IP signals. These are called Tri-brid HD DVRs.
Compare and Contrast Between Solutions
HDCVI, HDTVI, and AHD share one thing in common: as opposed to 960H that uses the CCD sensor, HDCVI, HDTVI, and AHD use the megapixel-level CMOS or Exmor CMOS sensor. The purpose is to capture HD images at the source level. Among manufacturers of CMOS sensors are
Fiber Links Boost HD-over-Analog Solutions Since HD-over-coaxial solutions deliver video for up to 500 meters, any distance longer than that requires the use of fiber transmission. There was a time when HD-SDI was the only non-IP signal format that could be converted to optic signal. “As a result, distance was a main factor for deciding what HD technology to employ,” said Darius Lukocius, Director of Sales for Darius Lukocius, Director EMEA at OT Systems. of Sales, EMEA, OT Yet today, technological advances Systems have allowed fiber transmission to apply to other HD-over-coaxial solutions, including HD-TVI. HD-CVI players also claim they have come up with solutions enabling conversion from HD-CVI to optic, thus allowing video transmission of over 500 meters. According to Lukocius, being a provider of comprehensive transmission solutions, OT does see the need to develop fiber optic products that support all kinds of HD formats. “However, when to have such products depends on several things, including the popularity of such technology, the proprietary nature or patent of such technology, and the effectiveness of the costing of such products,” he said. When implementing HD-SDI surveillance, installers need to beware of several things. “Since HD-SDI cameras mainly come with two different data rates — 1.485 Gbps and 2.97 Gbps — when choosing HD-SDI fiber optic converters, the specs have to comply,” Lukocius said. “Since the maximum transmission distance of HD-SDI on multimode fiber is no more than two kilometers, it is advised to choose single-mode fiber for fiber link installation.”
55
Product Exploration Sony, Omnivision, Pixelplus, and BYD. The formation of images differs slightly according to brand. Another similarity as far as components are concerned is the use of an image signal processor (ISP) in conjunction with the sensor. This device ultimately determines the final image displayed by HDCVI, HDTVI, and AHD solutions. The chipset could be integrated into the sensor module or into the transceiver at the backend of the HDCVI, HDTVI, or AHD camera. Image signal processors, whose manufacturers include Sony, Fullhan, Nextchip, and Eyenix, process and enhance images formed by the sensor. As ISPs of different companies are designed differently, they have different ways of handling backlight compensation, WDR noise reduction, and the 3As, namely auto white balance, auto exposure, and auto focus. One final thing that the solutions have in common is the presence of a signal transceiver, which produces different signal formats based on the technology in question, namely HDCVI, HDTVI, and AHD. Regardless of the technology, these transceivers are similar in that they combine signal augmentation, voltage augmentation, and MCU all in one device and emit signals over different transmission distances. There is also a circuit switch that allows cameras to switch between HD-over-coaxial and CVBS output. All HD-over-coaxial signals travel through coaxial cables, which can be 5C-2V (RG-59U) or 3C-2V (RG-6) for transmission of between 300 and 500 meters. Among the things that set them apart are the codec engine, which is made by TI, Hisilicon, or Grain Media, and the performance of ISP processing.
Applications in Verticals
Based on how things look right now, to popularize HDCVI, HDTVI, and AHD and widen their reach in different verticals, it seems manufacturers still have lots of publicity and marketing to do. In fact, I still have doubts over their market acceptance beyond the banking, financial, and retail verticals, as 960H and HD-SDI themselves are still mostly deployed in retail, banking,
and education. It is my hope that fiber optic providers can develop and commercialize HD-over-coaxial interfaces, so that HDCVI, HDTVI, and AHD can go beyond small and medium implementations and find their way into city and highway surveillance, which requires HD and real-time video transmission. Currently, there aren’t any credible or authoritative figures on the market acceptance toward HDCVI, HDTVI and AHD. Yet, marketing strategies differ according to manufacturers and their OEM partners. Based on our observation, a lack of understanding of the different solutions is the biggest obstacle that manufacturers need to deal with right now.
Opportunities and Future Development
HD and intelligence are future development trends that analog players seeking to upgrade their HD products must embrace. We believe in the future, advances in CMOS, ISP, and transceivers will cause HD-over-coaxial surveillance to become a norm. Applications in different verticals will also become more noticeable. In security, there is a notion that IP will replace analog. But this will not happen anytime soon, and HD-over-coaxial marks the effort by analog players to at least slow the IP invasion and analog’s decline. In the end, maybe there is a purpose for the existence of these solutions.
secutech Helps You See Better and Make the Right Decision
Concurring events that help you decide the future of HD migration: • Panel discussion sessions offering up-close chipset pros-and-cons comparisons; • See the exclusive camera launches from ccHDtv, HDCVI, HDTVI, AHD providers with your own eyes; • Dedicated Seminars help you identify HD-over-coaxial sensors, features, transmission solution, real-life applications, and many more; • Forums with hybrid-system practices; free tour with experienced SIs
28-30 April 2015, Taipei Nangang Exhibition Center, Taiwan
56
Product Exploration
Clarifying the Myths of HD-over-Coaxial Solutions
HD-over-coaxial solutions, which transmit high-definition video over coaxial cables, provide an alternative to HD surveillance besides IP. However, there are still doubts and concerns from the market about how they are set up and whether they can truly deliver. This article lists some of the myths concerning HD-overcoaxial and demystifies them one by one. By Alf Chang, a&s consultant
Will HDCVI and HDTVI completely replace 960H, since their picture quality is the same as 960H? A In
terms of what the 720p HD-over-coaxial solution can offer, it is indeed very similar to 960H picture quality. However, 960H products still stand out since they are offered and supported by most of the current camera vendors. We can assume in the future, if there are more 1080p HD-over-coaxial solutions being introduced to the market, it will definitely affect the market of 960H or even IP for the SMB sector.
For HDCVI, it’s compatible only with its own DVRs. What about HDTVI and AHD? Are they able to connect with any type of DVRs?
Could the current HD-overcoaxial DVRs support 720p and 1080p at the same time?
A The answer to this is of course negative. Each HD-over-coaxial solution has its own format and must go with its own DVRs. The only solution that’s compatible with all formats is 960H. After initial testing, it was confirmed that different-brand HDTVI and AHD cameras can work with their respective DVRs, as long as the same format is used.
A The answer is no. Test results show that HDCVI, HDTVI, and AHD each can support 720p and 1080p cameras and corresponding 720p and 1080p DVRs. The issue right now is whether the same DVR can record 720p and 1080p videos at the same time, no matter which technology is employed. This still needs to be confirmed.
58
From a project implementation perspective, does transmission distance for HDCVI, HDTVI, and AHD matter? Is it a key factor to consider? A Each HD-over-coaxial solution claims to be able to transmit over a distance of 300 to 500 meters, or even 600 to 1,000 meters. First, we must applaud HD-over-coaxial for breaking the distance barrier. Yet from a project perspective, this doesn’t really mean anything. First, in the past, transmission over a 5C-2V cable without a booster can go for 200 to 225 meters. With a booster, transmission can be extended to over 400 meters. Yet quality loss is a byproduct of signal boosting, as noise is augmented. So for any coaxial implementation, shorter distances are preferred due to reliability. To transmit beyond 500 meters without sacrificing picture quality or reducing the number of cameras, what’s usually done is the usage of multimode fiber for distances of three to five kilometers or single-mode fiber for longer distances. With a dense wavelength division multiplexing device, one multimode fiber or single-mode fiber can transmit four to 32 streams. In other words, from a project perspective, transmission distance is not an issue and is not a determining factor for choosing between HDCVI, HDTVI, and AHD.
When different numbers of HD cameras are used, or when coaxial cables of different lengths or grades are used, would there be any signal loss issues? Experience dictates that when signals are transmitted through different-length coaxial cables, the disparity in voltage may cause poor reflection of images, which may appear to be stacking up on one another. Or, the difference in electrical grounding may create noise. Will this also affect HD-over-coaxial? A The answer is yes, due to the lack of equalizers in HD-over-coaxial DVRs at the current stage.
With HDCVI, HDTVI, and AHD breaking traditional distance barriers, can they really help with larger projects, or are they more suitable for SMEs? A No matter what grade of coaxial cable you use, it’s just a medium. Transmission distance really depends on the system and voltage. The size of project depends on several things — for example, whether there will be compatible matrix systems like those used for HD-SDI, or HD DVRs that support more channels. Only by then will the discussion of which solution suits which type of project be more meaningful. For now, HD-over-coaxial is implemented in the same way as traditional analog, namely for small- to medium-size projects through a DVR+CMS architecture.
The above were answers to questions commonly asked of HD-over-coaxial solutions. Once they are more widespread in the market, there will surely be more questions concerning their technology and applications. That’s when HD-over-coaxial will truly become a game changer.
59
Product Exploration Beyond Opening Doors:
Access Control Management Rules n By William Pao
Access control is a growing market and has spawned many related products and technologies, one of them being access control management software, the centerpiece in an access control system. Powerful and integrative, today’s access control management software helps users not only enhance security but also raise operational efficiency and lower cost. The types of subsystems integrated into access control management software however vary across vertical markets according to users’ special needs and demand.
60
Efficiency and cost reduction can be provided in a variety of ways through access control solutions.
A
ccess control remains a major segment of the physical security market and is set to enjoy continued growth. In a recently study, IHS Technology predicted that the global market size for electronic access control will top US$3.5 billion this year, driven by returning growth in the Americas, the Middle East, and Africa. High demand for access control has created opportunities for new products and technologies. One of them is access control management software, which can be useful to users from different verticals. “These may include education, healthcare, retail, transportation, manufacturing and Industrial, sports and leisure, museums, data centers, corporate, airport authorities, and ports,” said Steve Barton, CTO of Software & Controls at Pacom. With strong demand and business from different vertical markets, access control management software’s popularity and growth are set to endure.
Integration Drives Efficiency Access control management software has evolved over the years from being a simple software application with basic functions to being a cutting-edge technology that allows users to access and retrieve information about an access-related event more easily and quickly. On top of that, the increase in integration and interoperability has continued to grow. Today’s access control management software can integrate not only with other security systems, such as video and intrusion detection, but also with non-security systems such as HR, room booking, cashless payments, elevator controls, and visitor management. The resulting optimization in efficiency can help the end-user organization in many ways.
61
Product Exploration
▲ Steve Barton, CTO of Software & Controls, Pacom
▲ Nancy Wanders, Sales Manager of Global Clients, Nedap Security Management
“If an employee gets a new role, the authorizations on his access card will change automatically as soon as his new position is activated in his HR system,” said Nancy Wanders, Sales Manager of Global Clients at Nedap Security Management. “This level of automation means a big reduction in administrative tasks for security managers, so they can focus on other tasks and stay in control.” While the initial cost of investing in an access control system may be high, increased efficiency can ultimately cut cost down the road. “Efficiency and cost reduction can be provided in a variety of ways through access control solutions. Some of these include: elimination of cost of re-keying doors when a key is lost, and the ability to pre-register visitors, which is a more efficient process for visitor management,” said Jeremy Krinitt, GM of Frontier Security. “An access control system can streamline the processes and enable operators to wrap up investigations quickly. It can save operating costs for years to come through the efficiency it provides. Access control does that.”
Integration with Video a Must Pairing access control management software with video surveillance has become a must for running security operations at end-user organizations. With
62
▲ Jeremy Krinitt, GM, Frontier Security
▲ Mike Sussman, Engineering and Operations Director, TDSi
video and access control both becoming more IP-based, integrating the two has become easier. Players from across the supplier chain — vendors, distributors, and systems integrators — are closely watching how video-access control integration may further play out. Together, access control and video form a comprehensive and efficient security solution for users who can make the right decision in the event of an emergency. During an access control event, the security personnel can quickly pull the video from an integrated system instead of running to a separate video system to figure out who is trying to enter. A faster and more efficient way to investigate an event means quicker response and better situational awareness, which cannot be achieved by just video alone. “By using only video management, a security operator is only able to gain evidence of a breach, without being able to automatically act upon it,” said Mike Sussman, Engineering and Operations Director at TDSi. “Using an integrated access control system means that the security team can put in place measures or act directly to counter any threats, so there is also a preventative element dealing with any potentially unauthorized intrusions.” In short, access control management software prevents intrusion by denying access to those who are unauthorized to
▲ Jerry Cordasco, CTO, AMAG
enter a certain area. Videos, meanwhile, provide visibility and evidence to an event. When combined, access control management software and video management software (VMS) offer a more comprehensive and all-around way to run security.
Multi-site Management Access control management software plays a critical role in multi-site management, which has become essential as a rising number of companies now have operations in different parts of the world. Effective management software should offer a global view of what’s going on at each branch office, while giving the local branches authority to make changes or adjustments as needed. “In many companies, you have multiple locations, but there is a corporate human resources department that’s responsible for the initial enrollment,” said Jerry Cordasco, CTO at AMAG. “So what they would want to do is to enroll a new employee in the system with basic access rights to the employee entrance of the facility, and then push that record down to a localized database.” Access control management software and VMS are both important technologies for managing multiple sites. Choosing which one as the primary component, again, relies on the user’s specific needs.
The r M i prem ght so a ises lu s ec
y, e tc
e keep th g. to
Focu s of
Th in
tio re, to u
. t, e en .
▲ Jason Ouellette, Product Line Director for Access Control, Tyco Security Products
s: nes high security needs justi e tiv and d budget constra fy co nt s a n m e need y
Cost -
In today’s security management, more end users are tying access control with visitor management, which is an effective way to grant, deny, and control access by visitors and contractors who are not regular employees of a company. In a non-integrated system, visitors are given a badge or temporary ID card after they write on a paper log their names and other information, which can be illegible at best and at worse, fake. Some visitors are also known to walk away with their ID
m inv p a
rsh
e
Visitor Management: Efficiency and Safety
i nt s
onversely, aul. C des. gra verh e o ll u p let ate fu li d
n Ow term o Level oflp you deurce it t o he This will r to outs system o
“Both have their place as the primary engine, and the choice is dependent upon the business and risk,” said Sussman. “Video can only report on something that has occurred or is happening, whereas access control can prevent an event from taking place, backed up with evidential information.” “Access control and video management each provide benefits, but access control provides many of the necessary pieces of managing a multi-site environment,” said Krinitt. “These key elements include audit of employee location, alarm monitoring, alarm response and processing, guard tour, visitor management and many more.”
Agin Effe g l ow e q u i c sec p ur i t
▲ Harm Radstaak, MD of Identity & Access Management, EMEA, HID Global
fm g dm na n shoul optimize work efficiencanagem
olution ht S Rig he
sider When Choo n o sin oC t gt : ent h your focu gs m c so e at
in ip: a m e whe rol ana ther to own the access cont ged service provider.
cards, which can then be reused to enter buildings, creating security concerns. Combining visitor management with access control management software, on the other hand, can help improve security and efficiency by registering, badging, and checking out visitors all at the same time, and their ID cards expire at a certain time after which entry will be denied. An integrated system can even have more advanced features. “It can be used to screen each visitor on states’ registered sex offender databases and other watch lists, and flag those visitors at the time of check in,” said Harm Radstaak, MD of Identity & Access Management for EMEA, HID Global. “And it can be used to identify guests who haven’t checked out by the
end of visiting hours, and flag visitors who, for instance, may have repeatedly violated check-in procedures or stayed too long, and issue alerts upon their arrival.” Integrating access control management software with visitor management systems offers an ideal solution for end-user organizations, especially those that deal with large amounts of visitors such as corporates and hospitals. They can enjoy stepped up security and efficiency made possible by the integration.
Integration: New Hopes for Verticals When the access control management software is bundled with other subsystems, it can help optimize efficiency
63
Product Exploration and create extra business opportunities for users in different vertical markets. Primary and secondary schools, for example, may bundle lockdown systems and video surveillance with their access control software to better ensure the safety of students and faculty. Colleges and universities, on the other hand, may integrate their access control management software with non-security systems such as meal vending and room booking to maximize the value of students’ ID cards. Healthcare facilities may combine access control with elevators, granting access privileges to emergency personnel who can reach critical areas in the quickest time. In other words, if access control management software is deployed at the right time at the right place, it truly works wonders to end users in different verticals.
Choosing the Right Solution When deciding what type of access control management software to purchase, the user should consider many factors — the size of deployment, the overall objectives that need to be achieved, and whether the software is suitable for the vertical it is to be deployed in. “Any solution needs to be fit for the purpose and will demonstrate increased security levels along with improved efficiency and savings to the bottom line. For example, it may seem favorable to replace a whole security system with all the latest components. However if the security needs are low and the budget is tight, it may not make sense to do so,” Sussman said. “Conversely, if a number of security systems are aging and ready for renewal, buying fully integral systems could make very sound business sense, both in the short term and also for long term investment.”
64
▲ Healthcare facilities can benefit from access control management software combined with elevator controls to allow access privileges for medical personnel who need to reach critical areas immediately.
Meanwhile, the user also needs to consider the level of ownership that it wants. “When buying an access control system, you need to start by determining whether you want to own and maintain the system or opt for a managed/ hosted platform where everything is outsourced,” said Jason Ouellette, Product Line Director for Access Control at Tyco Security Products. “Do you want to handle the maintenance or pay a service to do it? Once you determine the level of ownership, then you can look at the options that allow you to balance capital expense vs. operational expense.”
It All Boils Down to Efficiency With its highly integrative capability, today’s access control management
software can combine with different technologies to help end users take care of security and non-security tasks with greater efficiency. An integrated access control management system makes life easier for users when they investigate events, manage multiple sites, and control access for visitors, not to mention the convenience of performing different tasks with just one ID card. The benefits of integrated access control management software are felt across different vertical markets, and systems integrators should maintain good and open relations with customers to deliver solutions that they truly need.
Product Exploration
Understanding “Real” n By Israel Gogol, Freelancer
PSIM (physical security information management) software is a rapidly growing segment in the security market. Its core strengths lie in the ability to integrate disparate systems, creating an intelligencebased situation picture and supplies operators with active policy management. As the market learns more of the benefits PSIM they have the potential to go beyond security and turn it into a complete site management platform.
▲ Jamie Wilson, Marketing Manager of Security, EMEA, NICE Systems
66
PSIM
T
he world market for PSIM (physical security information management) software in 2013 was estimated at US$160.3 million by IHS Research. Despite being a small segment inside the larger security market, PSIM has enjoyed rapid growth. It is estimated to continue growing at 20 percent and higher growth rates until at least 2018, according to a recent IHS report. Price and also end users’ level of understanding of PSIM solutions are still main barriers limiting PSIM growth. In addition, the PSIM market’s long-term growth is also limited by “competing products successfully being deployed in the mid-tier, a market that has historically been out of reach for the high-end PSIM software platforms due to their prohibitive price tag,” IHS commented.
What is a Real PSIM? PSIM is a software platform that collects and manages information from disparate security devices and information systems into one common situation picture. These can be traditional security sensors like video cameras, access control, intrusion detection sensors, as well as “non-conventional” systems such as networks and building management systems, cyber security hacking alerts, and even weather feeds. A true PSIM solution is vendor and hardware agnostic, giving users the ability to integrate legacy systems and the flexibility and the choice to use best-of-breed technology in the future without limitations.
▲ Michael Mesaros, Group Product Manager, Proximex
▲ James Chong, Founder & CTO, Vidsys
▲ Adlan Hussain, VP of Marketing, CNL Software
67
Product Exploration Being a relative newcomer to the security sector, and displaying a fast growth rate, there is confusion regarding what constitutes a “true” PSIM solution and how it differs from other command and control systems, video management software (VMS), or other security platforms, some of them offering their own integrations between different systems. The main benefit of PSIM lies in its integration capabilities, being able to connect with existing and planned systems without being “locked-in” to any specific vendor. Usually VMS systems or access control systems use proprietary technology. In these cases, extending a system can only be done by the same vendor. Integrating with a legacy system provided by a different vendor could prove difficult, forcing replacement of existing systems. In addition to this unique integration capability, PSIM offers another strong differentiator: PSIM is an intelligencebased solution. Collecting and correlating information from different sources means alerts are only raised on events that are important. “A true PSIM has the ability to identify unfolding events, manage them effectively and mitigate their risk. For commercial, critical infrastructure, and homeland security markets, PSIM provides situation management and establishes the foundation for organizations’ operations,” said Jamie Wilson, Marketing Manager of Security for EMEA at NICE Systems. A third important differentiator is the ability to provide active management of events, improving operational efficiency. By using adaptive workflows, the operator knows what is happening, where it is
68
nts: A e v E g ojects ortin r p S P s y s t i a C M . solutions to Safe t s om PSIM fr y t fi l e l n a ra e Cat at can b ver seve ertical th ystems o
av ral s ads ents are n of seve access ro orting ev integratio villages, e ic th y p it Mass sp s c m e ly ir fe qu t for sa diums, O event re a catalys elds, sta n be s fi a a Such an c g e s in n rv in o e a ti (e.g., tr IM solu nts can s S e P v e d e e y s e locations .). Th e deplo ents, etc cludes, th y. to the ev e vent con e e of the cit th ty e ri on for th c u On IM soluti and sec S ty P projects. fe a a ice d s o h te e plemen nsure th on and c he locati used to e ystems im T S . nese l 2 o a 1 b g 0 a a 2 ple, M eds of G abon in e G n in re tu ld For exam e sh nswer fu urity up Game ned to a Cup sec ut African C ere desig e African w th t d. Witho n e s lle e u ta m s re uip s were in t it could ily a of the eq m s th a te e s o y s e s could b ireless projects systems ssible, w safe city from the e, these never po n e o h b uipment W k q c . e s a e b th d , e ir d d e system w d na le mounte ames en ndence o ms, vehic fter the g A te . s the depe s y e s it d n s air an detectio to other loyed at xplosive relocated were dep .) mobile e tc ., e .g , (e rs s sniffe stadium etectors, , metal d ystems’ systems f NICE S o ts . n ts e c d m je pro deploy d Cup an seaport IFA Worl mples are F a x e e th t f n o e c part sia. Other re Brazil as s in Rus lutions in r Olympic te in W PSIM so 4 201 e Sochi prior to th
happening, and what needs to be done. Step-by-step action plans can be created to address different situations. This is vital in both making the operators job easier, but also in ensuring the company is following corporate safety and security policies every time and complying with local rules and regulations. “Without adaptive workflows, all you have is a lot of interconnected systems and you are solely reliant upon the experience of the operator to be able to coordinate the management of the incident,” added Wilson. Adlan Hussain, VP of Marketing at CNL Software emphasized that dynamic workflows can change based on the time of the day, the threat level, and the number and types of alarms in the system. “This is what makes a
PSIM solution an intelligence-based system and not a mere check list of processes to follow,” he explained. These benefits, combined with growing connectivity change the way corporations work. PSIM allows for a more centralized command and control, without being tied to a specific site. “In the past the security surveillance and sensors’ monitoring had to be on-site at the place of the event. Today we can disconnect between the surveillance and the site. The benefit of a PSIM system is not only in connecting different sites, but thanks to the ability to display the same information in different languages we can connect a company headquarters in Europe with a site in Africa,” explained Hagai Katz, Senior VP of Marketing & Business Development for Magal Security Systems. “This connectivity allows the company headquarters to quickly address issues and make sure that the
initial response is the correct one. A company can extend the benefit it gets from a PSIM system beyond safety and security. Other company procedures can be incorporated into the SOP, for example making sure a proper media response is prepared by the PR function. In that sense a PSIM system also contributes to the company’s risk management.”
Who Should Install PSIM? From the technical point of view, PSIM solutions are intended for easy integration. It is therefore meant for cases when there are several legacy systems that need to be integrated, when there are several control layers (e.g., local and national), and when there are many sensors or when future integrations with additional systems are needed. From the operational point of view, PSIM is mostly needed for critical sites with high security requirements and large sites with many systems/ sensors. It is therefore mostly relevant for national infrastructure, large corporations, government buildings,
mass transportation, and city protection projects. All these already have existing legacy systems and can benefit from integration. A city, for example, can integrate video footage from public space video surveillance cameras and traffic control cameras creating a unified situation picture in the control room.
Obstacles Facing Adoption Though the benefits of PSIM seem natural and logical, there are still many barriers to its adoption. Some are due to lack of buy-in by different stakeholders that refuse to give up control of their systems and information; some are the result of past failures. One of the biggest challenges faced by PSIM vendors is the availability of IT savvy channel partners. “Limitations to growth are predominantly around the current education levels within end users, consultants, and integrators,” explained Hussain,” We are working hard to increase education levels within each of these groups, and have created programs to address some of these challenges.”
PSIM Market Revenue Forecasts (World), 2009, 2012 and 2015
600 500 400 300 200 100 0
2009 Revenues ($ Million)
2012
2015 Source: Frost and Sullivan
Growing Connectivity and Greater Industry Cooperation “With everything today moving at light speeds towards connectivity via the network and the Internet, PSIM is also migrating and expanding towards the ‘Internet of Things’ via the information management aspects of PSIM,” said James Chong, founder and CTO of Vidsys. “The open architecture and browserbased PSIM technology is enabling the software platform to rapidly and literally connect with almost any IP-based device, applications, and systems using open standards and protocols such as XML, SOAP, HTTP, SMTP, and others.” Recent updates in PSIM software functions and features include integration with mobile devices, allowing ground forces to share and receive information through smartphones and tablets. In addition, there is an industry move towards greater connectivity with other business systems such as HR systems, internal directories, visitor management systems, building automation systems, RFID, intelligent transportation, and more. These will create opportunities for other benefits to be realized from PSIMs beyond safety and security. “I think people are realizing that PSIMs can provide a lot more than just physical security,” said Michael Mesaros, Group Product Manager at Proximex, a Tyco Security Products brand. “We’re being asked by customers to integrate with all kinds of systems — elevators, building management systems, luggage conveyors, and even environmental controls in airport jet ways. There is a combination of market forces at work and PSIMs must be capable of leveraging this data for more and more systems as it becomes available.” He pointed
69
Product Exploration make the integration of different systems under a PSIM solution quicker and easier.
Integrating Predictive Capabilities PSIMs can go beyond event management and post-event investigation. The ability to integrate with media broadcasts, open source intelligence systems, and other information analytics gives PSIM a predictive capability, as well as a strategic advantage in predicting and preparing for incidents. Earlier this year, Vidsys and HP Autonomy announced a collaboration to develop a solution that combines VidSys’ PSIM with HP’s advanced information analytics platform. “Social and broadcast media play an increasingly significant role in helping anticipate and mitigate potential security incidents around the world. The nature and profile of threats are constantly changing and this new generation of adversary often leaves a different digital footprint, creating potential gaps in traditional threat detection approaches,” said Chong. “The combination of a vast array of information, including social media chatter, video surveillance footage, emails,
▲
Proximex’s PSIM connects and correlates information from disparate systems into one centralized environment to help mitigate risk, and ensure compliance.
70
▲
out that Proximex has worked to make their PSIM easier to integrate with — for example, by implementing APIs based on REST (representational state transfer), a standard integration in the enterprise IT world. “Following these standards opens up a lot of avenues for customers to integrate social and web solutions.” Industry initiatives are also moving toward greater connectivity and easier integration. CNL has created a PSIM driver development community. This allows other development houses, product vendors, and security integrators to create drivers to connect systems to CNL’s PSIM platform. This allows fast production of drivers, and allows product vendors to create their own drivers if they are not able to share their SDK or APIs. In the past five years, CNL has also been running a technological partner program. Another initiative to foster interoperability between manufacturers and establish industry standards is the Physical Security Interoperability Alliance (PSIA) led by companies such as Cisco, Tyco, Hikvision, and Kastle Systems. PSIA’s mission is to develop specifications for physical security technology that will enable plug-and-play interoperability across the security ecosystem. This will
case files, criminal records, and physical location data help identify potential threats and take actions to neutralize the danger.”
Will High Cost Stop PSIM Growth? Despite vendors’ attempts at making PSIM integration quick and easy as possible, the complexity involved in PSIM deployment still comes at a price. If the deployment takes longer than was originally planned, the costs rise as well. Therefore it is crucial for customers and integrators to have the means and experience to manage the deployment timeline and expenses. “PSIM is not for everyone. There is a cost, and often where security is not a high priority, it is too much to justify for many organizations. In our experience, PSIM cannot be successfully implemented ‘on the cheap.’ Where security is mission critical, organizations understand the cost, equally they understand their specific risks and make sure the PSIM meets these risks,” explained Hussain. On the other hand, Chong believes that PSIM is scalable and therefore can be affordable for organizations large and small. “The efficiencies achieved create
Vidsys PSIM supports safe, effective and timely resolution of events, alarms, and management of more complex incidents that involve multiple simultaneous alarms at one or more locations.
a strong case for return on investment (ROI).” These efficiencies include a shorter training time, as operators need to learn only one system as well as automatic auditing, which allows security officers to trust reports coming from the field and increase compliance with rules and regulations.
the needs of the customer — it is a true solution sell. The best PSIM implementations we have seen require trust and genuine partnership. When this happens, the benefits and ROI become an obvious and tangible natural conclusion,” added Wilson.
Educating the Market Systems Integrators Play a Key Role Systems integrators play a critical role in the success of a PSIM deployment. “Systems integrators need to understand that PSIM is a long term investment. Acquiring and retaining the skills required to understand, implement, and support PSIM installation needs to be viewed as part of their long-term strategy,” said Hussain, “Today, we see many SIs looking at PSIM projects as single sales, rather than opportunities to forge long-term relationships with their clients” “A PSIM solution really requires the supplier to understand
Customers and systems integrators are still unaware of the full potential of PSIM systems. PSIM vendors are constantly taking steps to educate the market on how to make the most out of their investment. Mesaros recommends the use of user stories and use cases to educate customers on the full potential of PSIM systems. “Customers may have to rethink their workflows and operations in order to optimize the benefits they get from PSIM. We find that user stories and use cases are especially helpful in this regard. Sometimes a
tutions i t s n I e te althcar e H cer Institu n i onal Can ti M te a I N ra g S e h te P on to in rticals. T
IM soluti ecific ve across idsys’ PS ited to sp V d lim e t s o u n rotocols ., PSIM is rational p ton, D.C e g p in o g 9,200 h s d in a n s ar W ecurity a ties, hou s ili c e fa id (NCI), ne s as -w u on SIM, it w off-camp rganizati merous r using P u te n several o n inate d e m c n e a d s and dis omman ampuses ating a c systems its five c t of s re c n u e o y ri m B a y . v s loyee the deplo ata from d g in te w a g total emp all llo ggre eed. Fo me, how to both a case of n er the first ti r in fo ff possible , ta e to s e g geth could s y data to s workin rs c m n to e te ra s rg e y e p s em NCI o ll of the re were solution, ce, if a fi to have a the PSIM or instan F ting, and . institute ra ty e ri to p u o r c were controlle mpus se a e c th f ring o systems le b w vie ing muste ould ena -degree the build ftware w g o n sly s ti u for a 360 o ia IM e it S n in P simulta tocols, out, the r ponse pro ures while to break te s d e la re c r y ro fo c p t n merge cuation tire even a n v e e e g n th pre-set e ti men cording nd imple s. ders — re system a purpose y respon c n the e a rg tr e d ining m n e a g onment, ry ir in v to rt ale spital en for regula o h e s a u re in u d s n urity ent, en review a ving sec al equipm n to impro ck medic a tr h use, c In additio to a d e be use ur after n c a c c o s re nce a re u softw proced d complia rilization latory an u te g s r re e p to pro erence ance adh and enh s. directive
particular use case will resonate with a security operations manager and provide him/her with a new way of thinking about processes.” PSIM is still the domain of large-scale facilities with high security demands. “The trend and the challenge now is to bring the same PSIM benefits to smaller organizations and for use cases involving fewer operators, or perhaps with no dedicated full-time operators at all,” added Mesaros. However, as the security industry continues to learn more about the benefits and added value of PSIM solutions, and as PSIM solutions facilitate faster and easier integration, we should see more and more installations deployed outside the traditional scope.
PSIM to Offer Holistic Management’ The benefits of PSIM, especially its ability to incorporate non-security systems, hold within them the promise of expanding beyond physical security and delivering comprehensive information management in the future. “There are two major trends in the future of PSIM systems: The first one is already happening — a growing deployment as part of a safe city solution; the second one is a valid option, for which we see initial signs — the adoption by multinational corporations wishing to build a multi-layered global security system,” said Katz. All in all, the data gathered from security systems, combined with other systems can turn a PSIM solution into a comprehensive site control platform; thus demonstrating that PSIMs are not for security alone. In the future, PSIMs will allow for a more holistic management approach, combining safety, security, and management.
71
Companies in This Issue Market Update • ARECONT VISION • ASSA ABLOY • AXIS COMMUNICATIONS • BASS • BOSCH SECURITY SYSTEMS • CP PLUS • DAHUA TECHNOLOGY • FLIR SYSTEMS • KEDACOM TECHNOLOGY • MILESTONE SYSTEMS • PANASONIC MARKETING • PROLOGIX DISTRIBUTION • RASTER ELECTRONICS • SOUTHWEST MICROWAVE • TYCO SECURITY PRODUCTS • VISEO SYSTEMS • VIVOTEK
Industry Report
• AXIS COMMUNICATIONS • BOSCH SECURITY SYSTEMS • DAHUA TECHNOLOGY • DYNACOLOR
• EVERFOCUS ELECTRONICS • FLIR SYSTEMS • HIKVISION DIGITAL TECHNOLOGY • HONEYWELL SECURITY • IDIS • MAGAL SECURITY SYSTEMS • MILESTONE SYSTEMS • NEDAP SECURITY MANAGEMENT • SIMONSVOSS TECHNOLOGIES • SUPREMA • TAMRON • VERINT SYSTEMS • VIVOTEK
• MAGAL SECURITY SYSTEMS • NEDAP SECURITY MANAGEMENT • NICE SYSTEMS • OT SYSTEMS • PACOM • PROXIMEX • PURETECH SYSTEMS • SYNECTICS • TDSI • TYCO SECURITY PRODUCTS • VCA TECHNOLOGY • VIDICORE • VIDSYS
Product Exploration
Vertical Market
• 3XLOGIC • AMAG • CNL SOFTWARE • FRONTIER SECURITY • GEUTEBRUCK • HID GLOBAL • HUPER LABORATORIES • INTELLIVISION TECHNOLOGY • MARCH NETWORKS
ADVERTISER INDEX
• 3VR • AXIS COMMUNICATIONS • BOSCH SECURITY SYSTEMS • EVITECH • IOMNISCIENT • KROLL • OSPREY INFORMATICS • PELCO BY SCHNEIDER ELECTRIC
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
15
A-MTK
IP CAMERA/NVR
TAIWAN
sales@a-mtk.com
1
DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
13
FLIR SYSTEMS
THERMAL SURVEILLANCE
BELGIUM
flir@flir.com
BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
39
SUPERIOR ELECTRONICS CORP.
CCTV / ACCESS CONTROL / SENSORS
TAIWAN
info@superior-elec.com
COVER, 16, 17
WESTERN DIGITAL CORPORATION
STORAGE
U. A. E.
Shuja.kidwai@wdc.com
ACCESS CONTROL PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
INSIDE FRONT COVER
CEM SYSTEMS LTD.
ACCESS CONTROL
U. K.
cem.info@tycoint.com
5
EVOLIS
CARD PRINTING SYSTEM
FRANCE
info@evolis.com
3
FINGERTEC WORLDWIDE SDN. BHD.
FINGERPRINT
MALAYSIA
info@fingertec.com
INSIDE BACK COVER
PAXTON ACCESS LTD.
ACCESS CONTROL
U. K.
support@paxton.co.uk
ADVERTISER
MAJOR ITEM
COUNTRY
COVER GATE FOLD, 32, 33 TECNOALARM S.R.L.
FIRE ALARM
ITALY
info@tecnofiredetection.com
43
ALARM
NORWAY
ole.falck@zenitel.com
ALARM PAGE NO.
72
ZENITEL NORWAY AS