A&S #A123. Apr. 2016

Page 1


CONTENTS VIEWPOINT

Strengthening Solutions for a Competitive Edge .............................................................. 26

Apr 2016 www.asmag.com

COVER STORY

Dmitry Slepov, MD, Tibbo Technology

Touchless Biometric Technology Continues to Make an Imprint on Security ................ 28 PRODUCT EXPLORATION

Addressing Integrators’ Questions on Smartphone martphone Entryy to Hotel G Guest Rooms ........................................................................ .................................................. 34

Tibbo Takes Access Control to the Next Level with IoT P. 24

Smart Locks: First Trigger of the Smart Home ............................................................. 40

P. 48

MARKET DYNAMICS BUSINESS TALK

Systems Integrators Discuss Their Difficulties................................................... 44

Philippines’ Security Market:

Sunny and Hot

VERTICAL SOLUTION

Chain Stores Count on Security for Better Loss Prevention and Business Decisions.................................................... 48 Beacon Technology Provides Better Shopping Experience .................................. 53

P. 30

SPECIAL FEATURE

Robots in Physical Security – Down the Road, But Still Not Close .............................. 60 Drone Startup Companies are Reaching for the Sky.......................................................... 64 SMAHOME

APRIL 2016 Ɣ www.asmag.com

Smart Smoke and CO Detectors for Intelligent Home Safety Monitoring.......................... 68 Smart Flood/Water Leak Sensors for New-Generation Home Safety ............... 70 Contents....................................................8 Editor’s Note ..........................................10 Application Cases...................................12

8

Products of the Month............................16 News Feature .........................................18 New Products .........................................72

P. 44

P. 53

Show Calendar ......................................76 Companies in This Issue.........................79


After the Brussels Attack, Should Brazil and Japan Start to Worry?

APRIL 2016 Ɣ www.asmag.com

errorist attacks have become quite widespread in the world. The bombings at Brussels airport and a subway station on March 22 killed at least 31 people and wounded 230 others, leading all other major airports to tighten their security. However, quite ironically, just before the Brussels bombings, the Brazilian government decided to cut its security budget by more than 30 percent on March 21, according to the Center for Security Policy blog. Many experts and other governments have started to condemn the Brazilian government for putting the world in jeopardy, especially with the Olympic Games in Rio de Janeiro being just four months ahead. The blog also mentioned that “The Islamic State (IS) was trying to recruit jihadists in Brazil to conduct attacks at the 2016 Olympics,” which shows that the country, and even the entire South American region, are also under the same security threats as the European countries. “Brazil’s highly porous 23,000 kilometer border unguarded it would be easy for a terrorist to slip in,” also warned the blog. To respond to world concerns over security for the Rio 2016 Olympic

Games, the government then announced that it will rely more on manpower – the Army and the police – instead of using advanced security equipment to maintain order and further prevent terrorist attacks. After all, other than being terrorist attackfree, how to get rid of its deteriorating economic chaos is the country’s top priority. On the contrary, the Japanese government, almost at the same time, announced it will start to use a facial recognition system in its airport to catch terrorists in order to tighten its immigration control ahead of the 2020 Summer Olympics in Tokyo, according to Nikkei. The government was aware that the number of foreign visitors to Japan soared by 39 percent in 2015. The upcoming Olympic Games, then, also increased its worry that the city will be targeted. Even though these two governments’ attitudes toward security are quite different, now, world governments have started to worry about the security for these two upcoming global events. Moreover, another debate also arises. How much of our life and convenience will we sacrifice for security and safety? We probably have to think more before resorting to more police power or new and highly intelligent technologies to protect us.

a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

General Press Jill Lai Alf Chang William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin

Editor-in-Chief Senior Consultant Reporter Reporter Reporter Reporter

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Manager

george.chang@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu Circulation

George Chang Michelle Chu

Marketing Coordinator michelle.chu@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Manager Product Manager

willy.wang@newera.messefrankfurt.com jessica.yang@newera.messefrankfurt.com

Trade Fair Manager Project Manager

echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com

asmag.com

Willy Wang Jessica Yang Secutech

Echo Lin Eva Tsai

International Advertising [Headquarters]

Juihui Lin Kay Yang Audrey Fang Nori Chang

Manager Operation Officer Coordinator Coordinator

juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Osman Kanatli Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana

U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No. 288, Sec. 6, Civic Boulevard, Xinyi District, Taipei 110, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, web sites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

jill.lai@newera.messefrankfurt.com

10

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices


APPLICATION CASES cameras monitored by the system. These included crimes in progress, welfare cases, suicide prevention, persons under the influence, and traffic accidents among others.

>> Gaming

Surveon Safeguards Casino in Vietnam

Phoenix Casino is one of the only seven licensed casinos in Vietnam. Equipped with beautifully designed facilities, the casino is an entertainment resort offering non-stop excitement. To ensure the safety of all guests and staff in such a hectic environment, the casino needed a stable surveillance solution with low fault rate for their 24/7 operation. Dim lights and crowded spaces result in greater difficulties for the surveillance environment. The casino reached out to Surveon Technology for a system that will meet their demands. Several types of Surveon cameras were employed to monitor the whole casino. This included 5-megapixel fisheye, PTZ indoor dome, and compact network cameras. Thanks to the above deployments, the whole casino can be monitored without any blind spots with low fault rate and high image quality. Moreover, Surveon’s NVR ensured continuous recording of high resolution video with its built-in RAID subsystem storage. Combined with the company’s enterprise VMS and Surveon Control Center (SCC) management software, the advanced matrix wall management enabled Phoenix Casino to monitor each image without negligence. With the end-to-end product lineup, the casino is now enabled with the ability to easily track all events occurring in the premises at all times with improved profitability, while saving on cost at the same time.

APRIL 2016 Ɣ www.asmag.com

>>Infrastructure

Bosch Solution Used in Shanghai Tower

Standing 632 meters above the streets of the megacity, Shanghai Tower is China’s tallest landmark. Capable of accommodating up to 16,000 people per day, providing a safe experience for all

14

was a significant task. With this in mind, the building was equipped with Bosch Security Systems’ network video surveillance and intrusion solutions. A key feature of the tower’s security solution includes a network of 2,100 high resolution fixed Bosch Dinion and Flexidome cameras as well as moving Autodome cameras, dotted throughout the building, covering a full range of operational needs. The cameras came equipped with starlight technology and intelligent tracking features. Additionally, 150 integrated Bosch Videojet decoders controlled by the company’s VMS allowed the security staff to continuously monitor live and playback security video even in the event of an interruption or failure. For a safe and fast evacuation in the event of an emergency, the tower is equipped with a digital Bosch Praesideo public address and voice evacuation system. The tower’s surveillance system is also connected to Blue Line Gen2 intrusion detectors and intrusion control panels, alerting security personnel in the event of an intrusion and allowing them to visually monitor the subject of interest from the control room.

>> Corporate

Anviz Controls Access for Mongolian Bank Building

The Trade and Development Bank of Mongolia is a major player in the country’s financial and banking markets. They were looking for an access control system for their new office building that can provide both security and privacy. It would need to provide them with total control and remote access to the security system so that they can keep tabs on personnel entries and exits. It would also need to be capable of collecting time attendance data on an integrated server, as well as restrict access to certain floors. Topica, the systems integrator for this project, chose to use Anviz Global’s access control products. Fingerprint card access controllers, which fully integrated fingerprint and RFID technology, were installed in the elevators and

rooms, restricting access to authorized personnel. For additional security, only the buttons to the floors that the employee is allowed to access are activated. Fingerprint time attendance systems were also deployed in this project. These devices integrated fingerprint identification, RFID, burglar alarm, time attendance, and access control functions. It aided the company in collecting and reporting data on both the main office workers and the 57 branch workers.

>> Education

LILIN Monitors School in the Philippines

Saint Paul College of Makati (SPCM) is a private Catholic institution located in the Philippines which provides worldclass education to children aged 3 to 17. Their existing analog system was showing signs of wear and tear. It no longer functioned stably and failed to provide clear images needed for security. Thus, the school installed a new IP solution to provide a safer environment for students, visitors, and faculty. The school settled on upgrading its analog video surveillance system to Merit LILIN’s IP-based solutions to improve its overall physical security. A total of 42 bullet network cameras were installed around the campus to monitor the outdoor spaces. The cameras featured built-in Sense Up+ technology which allowed for the delivery of high quality videos in low-light conditions. Other features include intelligent image signal processing, 2D WDR function, AGC control, and 3D noise reduction. All of which combined offered users low-light images without motion blur. The IP66-rated housing is designed to help the camera body withstand rain and dust and ensures operation under a multitude of harsh weather conditions. To view the most updated and complete content for application cases, please visit the “Vertical Markets” section of our website at www.asmag.com, or scan the QR code. For more information, contact as-pr@newera. messefrankfurt.com

14


IoT Expands Sensing Technology to Make Room for Security Editor’s Note:

Internet of Things (IoT) continues to influence the ecosystems for different industries and innovate ways to protect people and property, as well as further collect data to help managers make better business decisions. Sensing technology accompanied by intelligent analytics software becomes vital to enable IoT for multiple purposes.

KENTIX CONTROLCENTER

O

• • • •

Early detection of all risks Real-time alarms via e-mail or SNMP Easy control with built-in web server Data logger with some month of memory depth • Plug-and-play installation due to PoE • 8 integrated sensors

ver 50 percent of IT system failures are caused by technical failures or are due to human error. System and data recovery requires an average of four hours and increases costs. Early detection and the direct reporting of threats are essential to avoid costly recovery processes. The use of a monitoring system for critical threats such as temperature, humidity, dew point, fire, power, movement, and more is part of the basic equipment of every IT environment. The Kentix ControlCenter sums up all important information and shows the state of the entire system at a glance. As a full client application, the ControlCenter communicates with the Kentix AlarmManager and monitors data centers from 20 to 2,000 square meters, even from a distance. In addition to the ControlCenter, a web interface and a smartphone app are also available. The easy connection to superordinate management systems like DCIM, network monitoring solutions, or building management systems can be realized via the open API with SNMP, XML, or OPC. Supplier: Kentix

URL: www.kentix.com

TE CONNECTIVITY AUTOMOTIVE SENSOR SOLUTION

T

o transport passengers safely and efficiently, vehicles need data. Today’s cars can sense and respond to changing conditions, inside and out. TE sensors help provide the data for the control, adaption, and response of vehicle functions that increase safety, comfort, and efficiency. TE’s sensor technology has become an integral part of many modern vehicle nervous systems through integration of innovative sensors in demanding application areas such as automated transmissions, engines, clutch, brake, and other mission critical areas.

• Position sensors: sensors for brake, chassis, clutch, engine, and transmission applications • Pressure sensors: standard and custom pressure products ranging from board level components to fully amplified and packaged transducers • Temperature sensors: helps meet specific temperature sensing demands in OEM applications • Humidity sensors: calibrated and amplified sensors measure relative humidity and are designed for applications in a variety of output signals • Fluid property sensors: based on tuning fork, ultrasonic, and near infrared technology, specifically designed to provide fluid quality and condition monitoring capability to a wide range of applications including oils (engine, hydraulic, transmission), fuels, and DEF (urea) monitoring

APRIL 2016 Ɣ www.asmag.com

Supplier: TE Connectivity

16

URL: www.te.com

AVA RETAIL

D

ata is collected in retail stores with the help of sensors strategically placed throughout the ceiling. Sensors track every activity of each individual shopper – whether or not they carry phones, what specific items they have viewed, what they compared, paths they took, and times spent on each product, shelf, or section. This data is made the basis for the analytics that AVA delivers. Real-time data is used to provide tools for businesses to better assist shoppers. • AVA SmartShelf: When a shopper approaches a product, SmartShelf shows it as a promo video on a screen mounted nearby • Associate app: Sales associates will receive real-time information about shoppers. E.g. products they looked at, dwell times, sequences, wait times, paths which the shoppers take, and their current location • Ask the expert: shoppers can interact face to face with a product expert located at a call center or a store kiosk • Shopper phone app: Incentivize shoppers with loyalty programs and track shoppers with their basic information known to the store • Store analytics: Sensors installed in the store capture shopper’s detailed behavioral data, including shopper’s product preferences, shopper’s journey, staff effectiveness, traffic analysis, hot and cold spots, product alternatives, product attachments, and campaign management Supplier: AVA retail

URL: www.avaretail.com


NEWS FEATURE

Surveillance at Sea? There’s an App For That

Traditionally, all communication from remote locations like ships at sea have been as words, as bandwidth limitations restrict uploading images. Now an app is set to change that. BY Prasanth Aby Thomas

e

viid, an app created by the

providing footage of firearm serial numbers

Liverpool, UK-based YRFree

during on-board security checks. eviid

Technologies, has a patent-

becomes a crew member’s portable video

pending technology that can

surveillance camera, with in-built photo,

compress video and audio up to

video, audio, bookmarking and reporting

15-fold, making it possible to transmit them even in low-bandwidth circumstances.

abilities.” When in areas with mobile network

The company has partnered with Mike

coverage, eviid can provide a direct line of

Wi l l i a m s , a l e a d i n g m a r i n e s e c u r i t y

communication between the person carrying

consultant heading the business consultancy

the device and the control room. If there is

SRM and specialist security services

no signal at all, the app will record and store

company MIRIS International, to launch

the footage, and automatically transmit as

the app in the maritime sector. Williams

soon as an uplink can be established.

will introduce eviid to Private Military and

Alternatively, eviid can switch to satellite

Security Companies (PMSCs), insurers, ship

directly if the device has a satellite sleeve or

owners, and government agencies.

by connecting to the Wi-Fi on the ship that

“In simple terms, eviid stamps date, place

connects to the satellite. And all this can be

and time onto footage, puts it in a tamper-

done without draining the phone's battery

evident wrapper, compresses it, and sends

any more than a regular app would, Williams

it to a safe place,” Williams said. “eviid

pointed out.

provides a means of transmission for recorded audiovisual information from a

Williams expects the app to become an

sea, for example, this enables an event to

indispensable part of marine security in the

be captured on video/audio as it happens,

long run.

providing accurate evidence for incident reporting.”

“ I t ’s a b o u t h a v i n g a b e t t e r, m o r e immediate method of getting time-critical

APRIL 2016 Ɣ www.asmag.com

Most modern ships and boats are already

information back quickly from areas where

equipped with surveillance cameras, but

previously that data could be unavailable

these provide only fixed views. Since eviid

for days — until, for example, a vessel

is used on smartphones, it can reach where

returned to port,” he said. “The fact that

fixed cameras cannot. In that respect, it

data provided through eviid is of evidential

is particularly useful during inspections,

quality and enriched with important

according to Williams.

metadata, also makes it highly useful for

“eviid helps staff prove procedural compliance,” Williams said. “For example,

18

Indispensable in the long term

remote location, over low-bandwidths. At

insurance and compliance purposes.”


Cyberattacks on Banks Highlight Need For Advanced Security Systems Traditionally, banks spend most of the budget allotted to security on video surveillance equipment. However, the criminals of today are using the internet as a means of breaking into the system. BY Emily Lin

T

he banking world today has

over the span of two years. They did so by

never been more different

hacking into more than 100 banks in 300

than before. Owing to

countries, including ones in Russia, Japan,

the convenience afforded

and the U.S.

by both the internet and

Another case just happened earlier this

smartphones, people and enterprises

year when HSBC's online banking website

are opting to do their do their financial

became the target of a cyberattack. The

transactions online via digital banking.

denial of service (DoS) tactic used flooded

According to a 2015 report released by

the website with more traffic than it can

BBA, a trade association for the UK banking

handle and drove it offline. Commonly used

sector, banks experienced an industry-wide

by online criminals to conceal an attempt to

six point decline in branch transactions in

hack into the system, it also resulted in much

2014. On the other hand, internet banking,

inconvenience as it locked customers out of

especially mobile banking, experienced a

the system for hours.

huge increase in use. The report even stated

The reach of these attacks are also

that money transfers, amounting to sums

becoming more widespread. Modern

of approximately US$3.2 billion, is being

criminals are not only after the money

carried out each week using banking apps.

in the bank, but also its confidential

To answer this growing demand for digital

data; thus, targeting both the bank and

banking, banks have been increasing their

its clients. Clients that may include

internet-based services and online data

other establishments or retailers, whose

storage. Unfortunately, the resulting digital

systems can then be hacked next, using the

connections has also become an attractive

information that the cybercriminals have

target for criminals.

obtained from the bank.

It appears that these types of attacks are

Today's banks face challenges on both

on the rise. Websense Security Labs, a

fronts: physical and digital. Hence, banks

cybersecurity company, recently reported

and security companies alike should be

that the incidence of attacks made on

aware of the importance of creating a

financial service institutions are four times

comprehensive solution that can deal with

higher than that of companies involved in

both threats. Both IT and physical security

other industries.

should be factored into the design of security

In 2015, Kaspersky Lab reported that a

systems for these institutions, providing

multinational cybercriminal team was able

security from the outside and the inside as

to steal approximately one billion dollars

well.

19


Dmitry Slepov, MD, Tibbo Technology

Ac A cce ess co on ntr trol oll sol olut uttio u ons s are r no long lo ong nger gerr as m mu uc ch h abo out u sec ecur urit ur itty as ity they th ey e y are r abo b ut ut com ompl plia pl ia anc nce ew wiitth h regul eg gul u attions io ons n an nd d int nter erop er op per errab ab bili itty wi with t th othe ot herr co he corp rpor rp orat or a e sy at syst syst stem ems. em s Tib s. ibbo b Tec bo chn nol olog og gy, y, wit ith th iitts po powe we errfful u ind n us ustr tria tr iall ia cont co ntro rolllllle ro ers and er an nd a fl fe ex xib ble int nteg egra egra eg rati tion on n plla atf atf tfor orm, or m off ffer ers a co c mp pelli ellliing sol el o ut u io on that th at can at an be ta tail aillo orred to cu ust stom omer om er req e ui u re eme ment ntts. BY The a&s Editorial Team

bout 20 years ago, when Dmitry Slepov started an access control distribution and installation business, the first thing that struck him was how inept the products were. His dream, since then, had been to reach a position where he could supply a much more efficient, reliable, and sophisticated access control solution. Now, that dream is being realized through his company Tibbo Technology, of which he is the co-founder and managing director.

ABOUT TIBBO

APRIL 2016 Ɣ www.asmag.com

Based in Taiwan, Tibbo designs, produces, and markets a line of embedded Internet-of-Things (IoT) modules and external controllers. The company also has its own purpose-built, super-compact operating system known as Tibbo OS (TiOS), a powerful development software called Tibbo IDE (TIDE), and a cloud IoT platform called AggreGate. In other words, Tibbo provides a complete ecosystem, where no third-party hardware or software is needed. Tibbo’s latest line of industrial controllers, known as the Tibbo Project System (TPS), is a modular system based on miniature color-coded I/O modules called Tibbits. TPS allows the company’s customers to create their own unique controller configurations by plugging in the Tibbits they need. “Need a certain I/O function? Install the right Tibbit,” Slepov explained. “Have no use for something? There is no need to have it on your device. This module-based approach saves our customers money by allowing them to

24


precisely define the features they require in their automation controller.” What makes TPS all the more attractive is its elegant design with striking color combinations. “The market is full of dull gray boxes,” said Slepov. “We want to breathe life into this colorless market. Good design helps our customers relate to Tibbo’s products at a deeper level.” The company’s AggreGate IoT platform serves as a strong base for all this hardware. AggreGate takes care of acquiring, storing, processing, and visualizing data from connected devices, and integrates them into the enterprise. Devices connected to AggreGate may be Tibbo’s own products or third-party hardware communicating through standard protocols. Such a powerful combination of AggreGate and TPS enables Tibbo to offer compelling, tailored IoT and cloud solutions for a number of vertical markets. One such solution is their access control offering.

pTibbo Project System (TPS) Controller

ACCESS CONTROL WITH INFINITE POSSIBILITIES The access control market is saturated with products today, and nobody knows this better than Slepov himself. What he also understands is that most of these products are simple, low-end devices that lack sophistication, imagination, and execution. “Most access control products are really not all that secure anyway,” Slepov said. “It is not so difficult to break or circumvent them. I can argue that a lot of access control products actually give their owners a fake sense of security. In this regard access control devices and what they can do are somewhat misunderstood by a lot of folks.” The role of access control solutions today is not as much about security as it is about compliance with laws and regulations. Corporate bosses, these days, are rarely worried about an armed assault, but issues of compliance are constantly on their minds. “Say you have construction workers and the law limits the time they can work per day to a single shift,” Slepov continued. “It is not enough to tell your workers that they aren’t supposed to work over X hours per day. As their employer, you must actively prevent them from exceeding the limit.” Ensuring compliance is a complicated process. There are job inductions, expiry and retraining, worktime tracking, visitor tracking, escorting rules, and several other factors to

consider. Decision-making on granting or denying access is far more challenging than it was before and often needs to be customized to a particular site and the country it is in. “AggreGate, with its flexible structure, is perfectly suited for this kind of work,” said Slepov. “Most of our installations are customized to the needs of our clients. Almost nothing is cast in stone. We will work with our customers and partners and implement business rules according to each site’s needs. AggreGate offers unparalleled flexibility in handling today’s compliance challenges.” Making Tibbo’s access control system ever more unique is its ease of connecting various features to it, bringing it right under the paradigm of the Internet of Things (IoT). “Security systems and access control used to be isolated islands within the organization,” Slepov continued. “In the old days access control used to be managed solely by security departments, but now it is more of an IT play. Now, everything gets interconnected with everything else. This is what IoT is really all about.” “Our client may start talking to us about an access control

With the flexibility of AggreGate IoT platform and the versatility of Tibbo Project System, we offer solutions tailored to the customer’s unique requirements. system, and this conversation will quickly expand into building automation, then into HVAC management, and so on,” Slepov said. With the inherent flexibility of the AggreGate platform and TPS devices, Tibbo can deploy a system that is tailored to their client’s needs and takes full advantage of the heterogeneous nature of the TPS+AggreGate architecture.

ADDING VALUE TO IOT The technology world is fast moving toward intelligent devices that connect and communicate with each other. This is set to radically increase the demands on solution providers and their products, but Tibbo has always been well-positioned to take full advantage of it. “We put substance into the phrase IoT,” Slepov said. “What we now call IoT was known as embedded modules, networkenabled devices, etc., 10 years ago. Even before IoT as a term caught on, we were in this business.” In short, what Tibbo offers its customers is a strong hardware and software base, and the flexibility to build unique, tailored solutions upon this foundation. Technologically, this flexibility empowers Tibbo’s customers to have infinite combinations of solutions. That Tibbo does it with such aesthetically designed products is the icing on the cake. www.tibbo.com

25


STRENGTHENING SOLUTIONS FOR A COMPETITIVE EDGE In light of today’s economy, security providers have to deal with increasing challenges such as those posed by increased competition and smaller budgets. Companies have started to increase customers’ return on investment through systems that would not only provide security, but also information that can aid them in managing their assets and business operations. BY Emily Lin

udgets all over the world are taking a hit as companies are tightening their belts in order to deal with recent global economic turbulences. Many security companies are seeing projects either being delayed, payment plans being stretched out, or, in some cases, cancelled. Despite this, customers are not willing to compromise on safety and continue to seek out innovative, market-leading solutions, challenging

APRIL 2016 Ɣ www.asmag.com

26

security companies to create systems that can offer the same level of services but in a more affordable package. There are, of course, many ways of going about this. Some turn to new technologies, others focus on fully integrating existing systems. For G4S, a global integrated security company, this meant combining two resources, manpower and electronic security systems, into one unique total solution. As one of the few companies that has the means to do so, the company was able to offer its customers solutions that can lessen threats to security at a reasonable cost. “G4S’ differentiator is the ability to combine manpower, technology, and process. Its corporate strategy is to strengthen their value-engineered solutions to the marketplace demonstrating the added value whilst reducing operational risk,” said Mark Horton, Regional Solutions Director for Asia, Middle East at G4S. “We balance the customers’ operational requirements together with the available


budget to find some common ground in providing the best risk mitigation at a lower cost, especially by integrating a number of systems together to reduce the overall cost of ownership,” continued Horton. “G4S is exhibiting market leading third-party drone detection, automatic license plate recognition (ANPR) solutions for reading license plates, access control, video surveillance, and turnstiles. G4S integrates them to an overall solution to match their customers’ needs.”

GOING BEYOND BASIC SECURITY

G4S’ differentiator is the ability to combine manpower, technology, and process. Its corporate strategy is to strengthen their value-engineered solutions to the marketplace demonstrating the added value whilst reducing operational risk. efficiency, decreased overall costs, and possibly even more money being reinvested into security.

Total Banking Solutions An example of end-to-end solutions that would encompass services beyond mere security is the solution designed by G4S for financial institutions. Aside from installing physical security systems such as intrusion detection, access control, screening, and scanning systems, G4S offers banks solutions that can cover everything from manpower outsourcing to high-security cash processing and transport. This approach has enabled them to stay competitive in this sector, as well as work alongside government-owned security companies that widely operate in various regions around the world, such as in the Middle East.

Security companies also have to contend with customers’ expectations that they will be getting the most out of their investments. SELECTING THE RIGHT TECHNOLOGY Therefore, security Creating these multi-tasking systems require an in-depth knowledge systems are now increasof products that are available on the market, as well as their interoperingly relied upon to not ability. Security solution providers often work closely with clients and only provide security, Mark Horton, Regional Solutions Director project consultants to determine their needs and provide appropriate but also double up as for Asia, Middle East, G4S solutions. Being technology agnostic would be important as it would sources for information allow them to choose the right technology for the job and not be limited by their that can help enterprises improve their own portfolio. day-to-day operations. “The starting point is to make sure that every technology is right. We have a very, “When we deal with our customers, very capable project delivery team but if we don’t get the technology right, that’ll be we don’t just focus on security. A well a problem for the customer so selecting the best technology partners, our project designed security system should management, and how we deliver that to the customer is very important so we impact many areas of their business, wouldn’t impact their operation,” shared Horton. security being number one. But in He continued by adding that customers, such as those in the Middle East region, addition a good security system can are very interested in adapting new, smart technologies that can further improve reduce health and safety risks as security. Facial recognition software that can be used in various infrastructure projects well. They can improve operational such as in retail malls and airports is a hot topic. The company has also seen an efficiency and, equally important, increase in demand for video analytics to aid in early detection of unusual behavior customer engagement,” noted Horton. or events and expects that this would lead to further inquiries regarding behavioral For instance, in retail, security systems recognition in the near future. Another technology that has risen in popularity can be used to improve customer is biometric access control as it is a more reliable method of identity verification, experience through video analytics compared to traditional card systems. that can detect customers who are not being attended to and alert the staff END-TO-END SOLUTIONS IS KEY TO STAYING to go and engage with them. A good COMPETITIVE solution can also identify health and Security systems has progressed beyond just simple installations of video cameras security breaches such as slip and trip around the premises. It has evolved to the point that it can help businesses improve hazards or blockage of emergency exit their profitability and protect the well-being of both their customers and employees. routes. Thus, aiding the authorities to Security providers would need to continue to innovate and find ways to create quickly manage the situation, which systems that can keep up with this growing trend in the industry. can lead to improved operational

27


TOUCHLESS BIOMETRIC TECHNOLOGY CONTINUES TO MAKE AN IMPRINT ON SECURITY The use of biometrics in the security industry have been growing in popularity as a form of identification and access control. Ongoing developments in fingerprint recognition and authentication have led to significant advances with regards to accuracy of reading and ease of installments. BY Emily Lin

riven by increasing concern over terrorism and criminal activities, demand for high-level security systems has been on the rise. The biometrics industry, in particular, has been growing steadily. Owing to its convenience and improved accuracy of reading, fingerprint technology has remained one of the mainstays of this industry. However, how well the system operates is highly dependent on how accurate its finger-

APRIL 2016 Ɣ www.asmag.com

28

print sensors are in capturing images since poor ones can lead to erroneous readings and cause delays or problems down the line.

TOUCHLESS 3D FINGERSCAN TECHNOLOGY Certain limitations associated with the use of conventional fingerprint readers have led to increasing acceptability and use of 3D technology fingerscan readers. One advantage this technology has over its predecessor is accuracy of identification, which is an issue for a lot of 2D readers. “This is common with 2D technologies, regardless of the brand or technology. The reason is that 2D only takes a small detection area. Nothing in the industry is 100 percent but 3D is definitely the closest to that,” said Alex Zarrabi, CEO of Touchless Biometric Systems (TBS). The company’s flagship product, the TBS 3D-Touchless fingerscan reader, simultaneously employs three cameras to capture a 3D image of the finger; thus, increasing


the surface area for more detailed fingerprint details. The additional details captured dramatically decreases the possibility of rejections, which is key to user satisfaction. Furthermore, higher acceptance smoothens user flow and optimizes the passage time, especially in crowded situations. This design also allows it to take images contact-free. Since the finger is just hovering on top of the reader and never touches the sensor, it is more hygienic and can limit the spread of germs. This also eliminates the frequent need to wipe down or clean the fingerprint scanners for both sanitary reasons and for the device to get a good reading.

2D TECHNOLOGY CONTINUES TO EVOLVE

How TBS Grows its 3D Touchless Fingerscan Technology Touchless Biometrics Systems (TBS) is a Swiss manufacturer of 3D finger scanning technology for numerous applications in access control and time attendance. At the beginning, they won a government research grant to develop contactless technology that can overcome the limitations of legacy systems. Conventional 2D rolled fingerprint technologies often suffer from issues such as interference from fingerprints left behind by previous users and distorted images due to varying pressure exerted by the operators.

Their efforts resulted in the creation of the Touchless Ten Finger Scanner, also known as the Bioguard Ten, a device that can capture all ten rolledequivalent fingerprints in a record amount of time. The generated images, available in both 2D and 3D, were highly detailed due to its ability to capture third-level details such as ridge structures, scars, and sweat pores. Originally created for government use, this technology was adapted for commercial applications and resulted in the launch of the 3D Fingerscan Terminal at the beginning of 2010.

Despite this rising trend in 3D readers, TBS readers have now also been embedded in turnstiles. Although, many would technology, 2D fingerprint sensors are think that this can cause more delays compared to traditional card readers, the low rate still what majority of the customers are of rejections of the unique TBS 3D fingerprint technology allows a free flow while identifamiliar with and, therefore, an important fying individuals. Turnstiles can thus be linked to the payroll system for streamlined time & part of any company’s product portfolio. attendance. “3D technology was the core technology BIOMETRIC SUBSYSTEM INTEGRATION at the beginning of TBS and remains the As more companies are now turning toward biometrics to enhance security, it became core product. We have now grown from increasingly important to find a way to easily integrate the technology into existing reader to solution provider. The first step security systems. TBS has created a unique platform that allows customers to use their was completing the 3D with additional products in conjunction with other terminals and systems. products — 2D touch fingerprint, RFID, “We have created the TBS biometric subsystem. This is a platform that attaches to the face recognition (which is upcoming), third party software and enables them with biometrics,” shared Zarrabi. “So imagine, you and 2D Multispectral,” commented have a software that does video surveillance today with no biometrics, you don’t need Zarrabi. to add all the biometric software, you just attach the TBS subsystem, and While 3D readers rely on multiple then your software can manage biometrics and work with all our cameras, TBS’ 2D Multispectral terminals range.” feature HID Global’s Lumidigm sensors, This offering has enabled TBS to market its products as an enabling the readers to combine several end-to-end solution or be installed as a biometric subsystem into images of the finger pictured at different an existing security solution, providing all the needed biometric wavelengths into a single composite infrastructure and hardware. Due to its widespread applications, this picture, resulting in the capture of both has already been integrated in various solutions from companies such surface and sub-surface skin features. as Honeywell Security and Fire, Siemens, Johnson Controls, This increases the yield of terminals that KABA, and Interflex. may be operating in less-thanideal conditions such as in the BIOMETRICS’ ROLE IN SECURITY presence of water, dust or Alex Zarrabi, CEO, Touchless It is evident that biometrics has become an other contaminants. Biometric Systems important tool that can enable companies to The commercial applicaenhance their security systems and protect tions of fingerprint sensors property and people. Ongoing developments seem to be increasing. and innovations will only further help secure its Instead of limiting the place in the industry. technology to biometric

29


APRIL 2016 Ɣ www.asmag.com

30


31

Security spending will grow as more and more people realize the need to protect lives and assets against criminal activities. Externally, the country continues to deal with terrorists, especially fundamentalists more in the southern parts of the Philippines. Internally, robberies, burglaries, and other crimes also prompt end users to look for security solutions. “In the Philippines, the crime rate is a little bit higher compared with other countries, so the security market is getting bigger every year,” said Noe Arboleda, Sales and

INCREASED AWARENESS AMID SECURITY CONCERNS

conomically speaking, Southeast Asia is a growth market, with the region's average GDP growth this year forecast at 6.3 percent by the World Bank. Among the economies in the region that will perform especially well is the Philippines, whose GDP growth for 2016 is forecast at 6.4 percent, compared to 5.8 percent last year, according to the World Bank. The economic expansion sets the stage for a similar growth in the Philippines’ security industry, which is at a relatively young stage compared to other mature Asian markets yet has lots of room to grow. “It's an emerging market with good potential growth. We have a positive feeling,” said Samuel Winter, Overseas Department Manager at Hytec Inter. In fact, several Philippine security players have pointed out that their operations will grow more than the 6.4 percent GDP expansion. “We're concluding that growth this year will be as big as last year,” said Lester Tolentino, Account Executive at Arrowtek, a distributor of video surveillance solutions. “Last year, growth was double-digit.”

BY William Pao

Alexis Bernardino, Business Head, Public Safety and Cyber Security, NEC Philippines

Noe Arboleda, Sales and Product Manager, Competitive Card Solutions

Ronnel Acebes, Technical Sales Executive, Brownstone Asia-Tech

Government spending on security is set to increase as more projects, such as highways and airport upgrades, are being undertaken. “There are a lot of road widening and repairs, as well as concreting, asphalting, and building of new highways to facilitate the flow of goods and combat traffic congestion. When roads are being built, up north down south, it paves the way for an active economic activity,“ said Bong Paloma, SVP and GM of ICT Solutions at AMTI, a systems integration company. Airport projects are also expected to increase, as the Civil Aviation Authority of the Philippines modernizes navigational aids in Clark International Airport and several other regional airports. More projects related to upgrading airport security equipment are expected later in the year. Separately, Philippine President Benigno S. Aquino III’s administration has allocated US$1.9 billion for defense modernization from 2013 to 2017, the largest defense modernization undertaken by the Philippines. This is good news for those offering defense-related solutions. “The products we're selling now depend on government projects. They depend on the funds available. Most of our customers are in law enforcement and military, and their operations depend on the national budget,” said Ronnel Acebes, Technical Sales Executive at Brownstone Asia-Tech, which distributes chemicals and explosives identification products. Meanwhile, the government also plans to roll out more smart city projects. “You could say that smart/safer cities are more relevant now than ever,” said Alexis Bernardino, Business Head for Public Safety and Cyber Security at NEC Philippines. “More and more local government units now have their own command and control centers, where they monitor the whole city situation — traffic, security, and peace and order — through CCTV and IP camera surveillance.” Private firms are also poised to increase their spending on security, realizing its importance. These firms include domestic as well as international ones seeking to seize the opportunities in the Philippines. “As an emerging market I think definitely outside sources are more likely to invest within the country, especially if they can see good growth potential,” said Winter. Basically, growth will be seen across vertical markets. Residential, hospitality, and healthcare

GOV'T, PRIVATE SPENDING BOTH TO RISE

Product Manager at Competitive Card Solutions, a distributor of video and access control products. “Right now, every now and then there is news about shoplifting. Every time there is news like that, it inspires sales of security equipment, whether for homes or stores,” said Ferwin Lao, VP of Infoworx, a value-added reseller. “If there is a burglary, people want to know how it happened.”


APRIL 2016 Ć” www.asmag.com

The guest is increasingly demanding mobile check-in, which has been in use for many years in the airline industry and is becoming important for hotels to offer.

34 4


Addressing Integrators’ Questions on

Smartphone Entry to Hotel Guestrooms BY William Pao

Locking systems for hotel guestrooms have gone through an evolution, from mechanical keys to proximity cards to a smartphone-based technology, which is now seen in a number of hotel chains across the globe. While the convenience and user experience such technology offers are attractive, installers and end users should gain a better understanding of the technology and some of the challenges involved before deciding how to go about it.

ncreasingly, the hospitality industry is seeing a change in the way guests enter their rooms. Traditional mechanical keys or keycards that you insert into the reader have steadily given way to smartphonebased locking systems whereby the guest points their digital key-loaded smartphone at the lock, and the door opens. The demand for this kind of technology is on the increase. A main reason is the ease and convenience associated with it. “The use of mobile check-in and smartphone technology to gain entry to one’s guestroom allows a guest to significantly reduce or completely bypass the lobby registration process. The ability to go directly to their

room minimizes the time and potential aggravation of check-in, which may improve the guest experience,” said Gregory Botsch, Principal of Production Direction at John Portman & Associates. “With the hospitality trend towards providing smart guestrooms, this is a logical progression.” “The guest is increasingly demanding mobile keys and hence mobile check-in, which has been in use for many years in the airline industry and is becoming important for hotels to offer,” said Magnus Friberg, CEO of Zaplox. At the same time, the technology is also becoming more mature. “Most smartphones today will have a near-field communication (NFC) chip as well as built-in Bluetooth that enables them to communicate with other devices such as point-of-sale terminals and even door locks,” said Peter Romanov, Commercial Director of Hospitality and Access Control for EMEIA at Allegion. Already, smartphone-based locking systems have been deployed at some major international hotel chains. Starwood Hotels, for example, have installed mobile guestroom entry in conjunction with Assa Abloy. Under the partnership, Starwood Preferred Guest (SPG) members with Bluetooth Low Energy (BLE) smartphones receive a guestroom mobile ID via the SPG app before arriving at the hotel and can go straight to their guestroom.

35


Smart Lock: First Trigger of the Smart Home As the smart home trend takes off, so are smart locks, which can be opened or locked with the homeowner’s smartphone and connect with various home automation devices. Sensing this trend, lock vendors have rolled out their smart lock solutions to offer a more automated living experience. BY William Pao

APRIL 2016 Ɣ www.asmag.com

mart locks, which interact with the smartphone and automatically trigger smart home products such as lights and thermostats once the user gets in, are now seen more and more at the front door. “As adoption increases and technology develops further, smart locks will offer the homeowner more convenience and connectivity while maintaining security and control,” said Donald Beene, Product Manager for Smart Home at Allegion. Henning Overgaard, CEO of Poly-Control which makes smart locks called Danalocks, said home smart locks’

40

growth potential will be significant. “We have been in the business for almost 15 years doing smart locks. For the last year, things have moved, and we think that maybe in the next two years things will really take off,” he said.

TECHNOLOGY Needless to say, using the smartphone to open doors brings the homeowner more convenience, which is a main selling point for smart locks. With these locks, the homeowner doesn’t need to bring keys or worry about losing them again. Rather, the door can be opened with the device that’s most personal to everyone, the smart device. When the smartphone is used to open the smart lock, two primary technologies are used to enable the handshake between the two: near-field communication (NFC) and Bluetooth Low Energy (BLE), the latter of which is now gaining prominence due to its pervasiveness and ability to allow a more secure communication. “BLE chips are cheap and increasingly found in every modern smartphone, tablet, and laptop, and this opens up our smart device interoperability over BLE,” said Rocco Vitali, Product Manager of Electronic Security Products at ISEO Serrature. “Security of communication over the BLE channel is achieved with the Advanced Encryption Standard (AES),


Donald Beene, Product Manager, Smart Home, Allegion

Mark Fish, Director, Sales and Business Development, Yale Locks and Hardware

Henning Overgaard, CEO, Poly-Control

using session keys exchanged with DiffieHellmann Elliptic Curves and generated using the NIST-compliant random number generators.” “We both encrypt and authenticate all messages sent with the latest standards to ensure no messages can be ‘replayed,’” said Cameron Robertson, Co-Founder and CEO of Lockitron. NFC solutions, meanwhile, also exist. “Our locking system can be controlled using Android-based smartphones featuring NFC. The smartphone forwards all the events from the door to the online administration to keep the entire system up to date,” said Hanspeter Seiss, Product

Cameron Robertson, Co-Founder and CEO, Lockitron

Hanspeter Seiss, Product Manager, EVVA Sicherheitstechnologie

Rocco Vitali, Product Manager, Electronic Security Products, ISEO Serrature

Manager at EVVA Sicherheitstechnologie. “All transferred data is secured with cuttingedge encryption standards.”

OTHER BENEFITS There are other advantages to smart locks as well. One of them is better security over traditional metal keys and locks. “Metal keys are so easy to bump, crack, snap, kick, or jemmy-open, and they don’t really provide peace of mind in securing your home,” said Steve Dunn, CEO of LEAPIN Digital Keys. “Isn’t it ironic that people’s most treasured possession, their family, and often their second most treasured possession, their home, is protected with a US$20 to $30 piece of flimsy metal that anyone can get through by simply watching a two-minute YouTube video about lock bumping and purchasing or making a bump key for $10?” According to Dunn, a smart lock’s true value comes when it is coupled with stainless steel security screens on windows, doors, and door frames. “Statistics show that most break-ins occur through smashed windows, or from kicking down back doors with wooden frames,” he said. “Installing smart locks with steel screens, doors, and steel frames

41


Systems Integrators Discuss Their Difficulties

APRIL 2016 Ɣ www.asmag.com

Suppliers’ actions can play an important role in making systems integrators’ (SI) work easier and efficient. Some suppliers realize this, and take this role with all its seriousness. Others are less effective when it comes to ensuring their systems integration partners are able to succeed. In this article, we asked some SIs about their experiences in working with various partners and try to understand what more can be done to ensure overall growth of the industry. BY the a&s Editorial Team

44

This article mentions comments from systems integrators (SI). a&s Asia or its publishers do not take responsibility for these comments and cannot vouch for the commenters’ credibility. he SI’s job in the security industry is getting more and more complex as technological advancements and market demands keep them on their toes. Security technology is no longer an isolated segment, but is an integral part of a much larger picture that includes building automation solutions and comes under the paradigm of Internet of Things (IoT). The market, on the other hand, is increasingly price-sensitive, as end users look to lower product and installation costs. In this context, it is important that SIs receive the best possible support from suppliers and distributors. But is this what’s happening in the industry today? To find out, we interviewed a few major SIs in Asia. In this article, we present their answers. It must be mentioned that this was in no way a comprehensive survey and does not represent the entire systems integration industry. It is only a few anecdotes from certain SIs based on their business experiences. Its purpose is to understand the experiences and difficulties of SIs, and to give the industry an opportunity to consider how it can improve itself. Another point to be noted is that several SIs refused to provide answers to our questions, probably due to concerns that any information they give could hurt their business. One of them refused saying that support from companies often depended on the people involved and it was neither good nor bad all the time. Whenever there was a management change, there would be policy changes and this would either pose challenges or be beneficial to the SI.


The SIs that we interviewed spoke under the condition that their identities remain confidential. So in order to separate the different viewpoints in this article, we will refer to them by numbers.

SOME KEY TAKEAWAYS Several points that came up in this survey would help us understand the difficulties that SIs go through. These can be seen as directions the industry can work toward to improve itself. 1. SIs would prefer suppliers providing open platforms that allow them to integrate products from different companies. Suppliers who insist on being end-to-end solution providers do limit a SI’s options. 2. Suppliers should provide consistent support to SIs throughout a project, assisting with the various aspects of integration as required. 3. SIs would be able to perform better if the suppliers remain transparent about their plans of partnership within a region. 4. Suppliers should refrain from approaching end users directly regardless of how lucrative a project may be. 5. Robust customer support round the clock from suppliers. Response to queries and requests in quick time through convenient mediums like Skype is a must. 6. Suppliers should be willing to provide effective training for the SIs. This should not be limited to just a few PowerPoint sessions, but should be extensive enough to provide feedback on projects and their implementation.

Robust customer service from suppliers round the clock is a necessary support for systems integrators.

Security)/ Canada (Avigilon)/ Denmark (Milestone)/ Sweden (Axis)/ UK (The Hague),” said SI 1. “They also provide sales leads and transparent of partners they work with. Systems are more in open format which enables SI to choose brands and products to integrate their system. Companies like S2 and HID are willing to do walk-throughs in the project to ensure proper integration and roll out. They share other projects and challenges faced to ensure that the projects are successful.” One of the key issues pointed out in general was that many Asian companies have not been able to market themselves as well as Western companies. There is also a lack of transparency when picking one partner over another and there are inconsistencies in company policies. They are willing to forego partnerships if a potentially large client approaches them. But the SI warned that this cannot be said of all Asian suppliers. For instance, “Some Taiwanese companies like Instek Digital have strong technical support and are willing to solve issues fast. Instek works like a Western company,” they said. Certain suppliers received low rankings. They were mentioned as eager to get into large projects. They would sell the products at extremely low costs just to get the project and prefer to have their own end-to-end devices and solution. They are termed as “rigid in their approach as they want to do everything themselves.” The SI, who used to buy cameras from these low-ranked suppliers before, no longer do so, due to concerns on quality and consistency.

HELP IN DEALING WITH MARKET CHALLENGES BUSINESS CULTURE AND ITS IMPACT ON SERVICE To SI 1, companies from the U.S., Canada, Denmark, Sweden and the U.K. rank high when it comes to ideal partnership options. In this SI’s opinion, much of how a supplier operates depends on the business culture of the country in which they are based in. “Companies from USA (HID & S2

SI 2 mentioned AxxonSoft and Acumen Intercontinental as companies that provide high-quality customer service. AxxonSoft combines IP-based physical security information management, intelligent video analytics, video management software, facial recognition, POS, and road traffic monitoring and it has a wide platform which can fully integrate vertical and horizontal solutions, according to this SI. The SI said AxxonSoft’s products help their customers save manpower, integrate better, and improve the overall efficiency of their business. He preferred Acumen because it could “control users’ application usage during a specific time range, audit application activity, and record application activity in detail. It can effectively filter

45


R O F N S Y E T OS I I R R T O U N T N C E S E O V S I N E S I ON PR CI A CHUNT OSS SS DE L O R C TTE SINE BE D BU AN BY

r nce eela l, Fr o g o el G Isra

APRIL 2016 Ć” www.asmag.com

Retail is one of the verticals most associated with video surveillance systems, particularly for shrinkprevention. We reached out to several manufacturers to hear from them which features are important in the implementation of security systems in chain stores. 48 8


hain stores are a dominant part of the retail market all over the world and are found in retail, dining, and other service categories. They include any player from small local businesses with two to three branches to national chains with hundreds of locations. Despite their vast diversity they all share similar characteristics like a common brand image, central management, and standardized business methods and practices. The unique characteristics of chain stores naturally affect the design and implementation of video surveillance and other security systems. For example, the centralized management and multiple locations determine the structure of the security system. Usually one central team is in charge of multiple locations and the security system must therefore help solve the team’s work constraints. “Security personnel are more centralized and therefore need access to surveillance video from across the chain quickly,” said Karl Pardoe, Regional Sales Manager U.K. and Ireland at March Networks. “What chain store security managers usually want is to integrate high quality surveillance video with POS transaction data, so that searches can be carried out very quickly across dozens, or even hundreds of stores to detect incidents.” Pardoe further explained chain stores want to be able to customize reports, view transactions potentially indicative of theft, and receive daily reports from multiple cameras or locations to check for suspicious behavior. Furthermore, unless this is automated,

Johan Åkesson, Director, Business Development, Retail, Axis Communications Charlie Erickson, VP, Product Management, 3xLOGIC Jumbi Edulbehram, Regional VP, Americas, Oncam Atul Ghaisas, Business Development Manager, Asia, Pacific, and India, Tyco Retail Solutions Karl Pardoe, Regional Sales Manager, U.K. and Ireland, March Networks

it can be time consuming, which does not allow for quick analysis. Remote access to video footage, and the ability to easily share files with third parties (such as local authorities) during investigations were mentioned by all of our interviewees as extremely important. “For loss prevention managers, accessing video from multiple store locations remotely helps to cut travel costs, reduce response times, and perform investigations promptly and efficiently,” said Jumbi Edulbehram, Regional VP of Americas at Oncam.

DEMANDING TECHNICAL ENVIRONMENT Installing, running, and accessing video footage from across different locations and regions requires a high degree of reliability. In addition, chain stores are dynamic by nature. Each chain wishes to expand and open new branches so the scalability of the system is critical. “For a large-scale chain store with distributed storage and central management, the important thing to consider is that the manufacturer they choose has sufficient ability to ensure the efficiency and stability of cross-regional network structure,” said Adler Wu, Product Marketing Manager in Hikvision Digital Technology. “This is the advantage of an all-in-one solution provider, which translates to lower total cost of ownership when taking into account the optimization of system scalability and maintainability.” From a corporate point of view these systems have to be easy to manage as a whole. Software updates and configuration changes need to be globally applied. Monitoring and reporting when systems have issues is also critical. “To support employees who travel from site to site, you need to offer a very consistent experience at every location. Systems have to be configured and set up the same, right down to the process for naming cameras for each register,” said Charlie Erickson, VP of Product Management at 3xLOGIC. “There has to be an easy way for users to look at all the sites they are responsible for and the software must be able to identify which stores and which employees they need to focus their precious time on.” Erickson highlighted that this attention is also needed at the initial installation and roll out. Systems integrators operating in different locales still have to deliver a consistent unified system. “We have developed tools that allow integrators to send systems to any store in a chain and simply select the store number from a dropdown and the system self-configures all store specific-information. This results in the need for very little DVR training for the technician,” he added. “We have tools that ensure the cameras are named consistently across the network. If you want to compare traffic at the front door at every location, you want the front door sensor to have the same name everywhere. We also have tools that will provide a snapshot of all the camera views at the completion of installation for end user signoff and reference after the fact.”

DATA-DRIVEN DECISION MAKING Apart from loss-prevention, all of our interviewees pointed to uses beyond security as an important feature in chain store systems. Retailers can use the data coming from

49


Robots have been present for a long time, but only recently have they been found occupying customer-facing service positions. Advancements in artificial intelligence will make the adoption of service robots in different scenarios more commonplace, including use cases suitable for the security sector.

BY Israel Gogol, Freelancer

APRIL 2016 Ć” www.asmag.com

T

he use of industrial robots is already common practice in the manufacturing industry. They are usually autonomous or semi-autonomous, being remotely controlled by a human operator. These robots are ideal for performing

60

heavy duty, repetitious, and dangerous tasks. They can weld, lift, paint, and cut things time and time again with unparalleled precision and no need for rest. In addition to working on production lines, robots can assist in performing various dirty, dangerous, or repetitive tasks.

SERVICE ROBOTS FOR EVERYDAY ENVIRONMENTS The use of service robots is growing. Once limited only to science-fiction movies and expensive military projects, people can now encounter them in their very own homes. The launch of the Roomba by iRobot is, perhaps, the most striking example of this.


FFo ou un ndeed in 1990, the U.S.-based company, iRobot, started off manufacturing milittary robots that helped in gaaath g th her erin in ing ng information and disposing expl ex plo pl plos ossiv ives es. es s. In 2002, they released their fifirs irsst flfloo oor vvaacuuming robot, Roomba, an nd ha h s so sold more than 14 million unitits to dat un unit a e. This marked a turning po oin intt w wh hen e personal robots shifted from from fr m thee realm of science into real life aan nd it beccame widely accepted for peeop ople le to use them at home.

RO OBO B TI TIC C HELP TO FACILITATE HU HUMA UMA M N INTERACTION Besi Be side si des household chores, de des comp co mpan a ie an iess are also promoting the usse of of rob o ot o s as a way to bring people clos cl oseerr tog get e her. Telepresence robots aree deesi ar s gn gned n to facilitate human in nteeract ctio ct on across vast distances. T es Th esee of o teen look like an “iPad on wh hee eels ls” ls s be b cause they are basically made ma d up of a screen attached to a po olee on top of a set of wheels. T e us Th user er can control the robot via a mo mobi billee app or website, while a lo oud ud spe peak peak ak and webcam allow for aker twotw o-wa way communication between the robo b t operator and the person being talked to. be The application possibilities of these type of robots are quite broad. They can potentially replace doctors at a patient’s bedside or teachers in a classroom and can even help out tourists and shoppers at retail outlets. According to Inbot, the manufacturer of a telepresence robot called PadBot, the future of these robots can become part of a larger smart home ecosystem. The robots will allow homeowners to check in on what’s going on at home as well as control lighting, air conditioning, electrical appliances, and other smart home devices. In the future, the PadBot can also serve as a personal assistant. For example, users can tell the robot what groceries they need and the robot will place the order online for them.

Source: IBM p Hilton Hotel’s robot concierge, Connie, is powered by IBM Watson and can answer questions guests might have about the hotel and its services.

ROBOTIC DELIVERY SYSTEMS ARE ON THE WAY Delivery service is another common application for service robots. Currently, they are already being used in the military and in certain businesses like Amazon’s warehouses to carry heavy loads. They can also be found in digital hospitals where they travel down corridors, delivering supplies (e.g., linens, food, and medicine) from storage rooms to the wards and clearing waste. The robots are also capable of transporting special containers weighing up to several hundred kilograms, freeing up personnel, and resulting in an overall increase in hospital efficiency. Delivery robots have entered the food industry as well. Domino’s Pizza just unveiled the world’s first autonomous pizza delivery robot that is now being tested in New Zealand. The Pizza-bot, officially known as DRU (Dominos Robotic Unit), made its first successful delivery in March 2016. The autonomous delivery robot possesses obstacle avoidance capabilities thanks to its on-board sensors. Beverages and up to 10 pizzas can be stored in two different compartments which can be unlocked by customers using an order-specific code. It can move on both footpaths and roads and runs on a battery that can last for 20 kilometers. Source: Knightscope

ROBOTIC GUARDS TO ENHANCE SECURITY

p Knightscope K5 is a fully

autonomous robot that can provide Telepresence and autonomous robots are also state-of-the-art surveillance for becoming increasingly relevant for the physical commercial enterprises. security industry and are gradually penetrating the market. a&ss had already reported on several examples of service robots being used for security purposes. One is the Knightscope K5, a robot designed to patrol malls, campuses, and parking lots, replacing the need for human security guards. Another was launched in late 2014 by Magal Security Systems. RoboGuard is a robot that can assist in perimeter security. It travels on a monorail along the fence and inspects it for breaches. Not only that, the robot is also equipped with short-range and

61


DRONE STARTUP COMPANIES ARE

REACHING FOR THE SKY Startup companies are different from regular companies due to the fact that they are not run based on established business models or products. They are commonly found in young markets such as the drone industry where there is much potential for rapid growth and success, but they are also more likely to crash and burn. Startups should be careful to determine their focus early and use this to develop products that will appeal to the market. BY Emily Lin

APRIL 2016 Ɣ www.asmag.com

any are attracted to the notion of being a “startup” as it conjures up images of young, hip companies working on the newest technology or cutting-edge ideas. It’s no surprise, then, that an increasing number of companies have taken to proclaim themselves as such to jump on the hype and draw the attention of potential investors. Therefore, the question would be: what makes a company a real startup company? Contrary to many beliefs, this doesn’t really have much to do with being a newly established company, but rather it is determined by the purpose for which the company is created. Startup companies are formed primarily to test the waters, whether it is for testing out the potential demand of a new idea or growth in a new market. The setup would also allow entrepreneurs to try out different business models and refine them in order to discover one that they can build upon. Since they are operating in uncharted waters, success is definitely not guaranteed and risk for failure is high. However, the promise of fast growth in a young, yet untapped, market segment is an alluring bait for investors who are aiming to score huge returns on investment in a short period of time.

DRONE INDUSTRY STARTUPS The drone industry is currently one of the market sectors that has seen a huge jump in the number of startup companies. According to investment research firm, CB Insights, the amount of equity financing raised by drone startups in 2015 was significantly high,

64

Ramon Haken, Director, Avular Daniel Sällstedt, CEO, Sky Eye Innovations Patrick Thevoz, CEO, Flyability DerrickX iong, Co-Founder & CMO, EHang

amounting to more than the amounts raised in the last three years combined. Initially intended for military use, it was not long afterward that companies realized the potential of these devices in both the commercial and private consumer market. Due to recent advances in technology and increased availability of drones, its applications have extended beyond mere visual recordings of events. Typically, most drone companies focus on selling systems or hardware; however, many are including other services or offerings into their portfolio. “Our business model is two-sided. We are selling hardware and third-party applications to certified operators on one side. On the other side we have a revenue sharing program for developers, who can build applications on our industrial vision cameras and on-board computing power,” said Ramon Haken, Director of Avular. With so many drone startups in the industry, it would be important for each of the companies to differentiate themselves from the competition. Luckily, since their business models are still evolving, this


leaves them with room to try things out and find one that works best for them and their customers.

ADDRESSING SPECIFIC NEEDS WITH UNIQUE TECHNOLOGIES As drone applications continue to grow, this is creating new markets for startup companies to cater to. Thus, the challenge for these companies is to come up with a good product and match it with the appropriate customers. One way to do these is to focus on a particular market segment and figure out what specific needs or requirements are not being met. RISK ASSESSMENT & INSPECTION

For Sky Eye, they decided early on that they would like to focus on creating solutions that would help with dealing with dangerous situations. Primarily focused on risk assessment and inspection applications in industries such as agriculture, forest management, and the oil and gas industry, they partnered up with several companies to create drones that can provide thermal imagery and gas detection.

Financing the Dream

Startup Investing

Startup companies usually start with an idea, such as a way to formally address an important yet unresolved problem. However, ideas remain ideas if the founders are unable to secure the funding required to transform it into reality. Some companies are fortunate enough to come up with the funds themselves and there is an advantage to this because this would allow the startup to concentrate on creating and developing the product and not worry about keeping their investors happy. “During our developing phase we felt it important not to include financial stakeholders pressuring us, urging early releases and focusing on only revenue. We needed time to excel, allowing us to closely listen in on actual problems and needs, focusing on creating long-term solutions,” said Daniel Sällstedt, CEO of Sky Eye Innovations.

A lot of startups turn toward outside investment, participating in various investing rounds, each of which represents a particular stage in the development of the company. The first round, the seed round, is an investment made by angel or private investors early on, based on either the concept or an early prototype of the product. Flyability recently completed its second seed funding in 2015. With the funds received, they had the means to start shipping their prototypes to their customers and are preparing to launch its first professional product this year. The consequent funding rounds would take place when the business starts to take off and earn revenue. The company might want to build the business by employing more people or allocating money for advertising (round A). They might choose to further expand the business overseas or explore a different market (round B). EHang was able to secure series B funding; thus, enabling them to explore ways of expanding the use of their drones in both the private consumer and commercial market.

“We are currently the only manufacturer in the world supplying optimized solutions for FLIR SYSTEMS A-series, T-series, and OGI camera segment. By, for example, integrating FLIRs Camera G300a we made it possible as a world first to detect gas leaks from the air using our platform,” said Daniel Sällstedt, CEO of Sky Eye Innovations. Another company, Flyability, has drones that have been used in many industrial inspection applications such as in energy, maritime, and heavy industries, where people are often required to operate in dangerous and difficult-to-reach areas. Drawing from one of the founders’ background in robotics, particularly in mimicking insect flight capabilities, the company created a drone that can be used for close contact operation. “It is the first collision-tolerant drone, which allows it to operate in complex and confined spaces that cannot be reached by other technologies that require

65


SMAhome

By a&s SMAhome

Smoke detectors are commonly installed for fire detection as smoke can be an indication of a fire. This is important because early detection can help keep occupants safe and prevent property damage. There has also been growing awareness of carbon monoxide (CO) poisoning in homes, which can be a result of incomplete combustion of carbon-based fuels coupled with poor ventilation. More homes are installing CO detectors because it is either required by the local authorities or because they recognized CO poisoning as a credible threat. For example, the Ontario government in Canada put CO alarm requirements into effect in October 2014.

Smart Smoke and CO Detectors for Intelligent Home Safety Monitoring Like other “things” in the home that are going through the transformation to become smart, smoke and CO detectors are catching up as well. Companies are reinventing the relationship and experience people have with their detectors by adding wireless communication to them and bundling them with mobile apps or smart home systems to make them not only connected, but also smart. Smart detectors can be single-purpose or multi-purpose and a popular category for multi-purpose smart detectors for homes is smoke & CO detector. “While multi-purpose detectors provide a higher level of safety and can be installed in a broader range of environments, they cost more and may not be necessary for some environments,” says Jenny Liu, Vice President of Shenzhen Heiman Technology.

MOBILE ALERTS, VOICE ALARMS

APRIL 2016 Ɣ www.asmag.com

These smart detectors are no longer dull-looking pieces of technology that many people cannot comprehend – they can now send mobile alerts to users when something goes wrong, or even speak to users in a human voice, making interaction more natural than ever. Companies like Nest, First Alert, and Halo Smart Labs have all launched products that support voice alarms that tell the user what type of danger it is (e.g., CO or smoke) and where the danger is. Halo by Halo Labs, a smoke/CO alarm, features

68

62 voiced alerts that can be mixed and matched. Halo+, an upgrade to Halo, can even deliver weather and disaster alerts. However, other companies still prefer traditional non-voice alarms over voice alarms. “We think people would react better to alarms that make a high decibel, piercing sound compared with voice alarms,” comments Liu.

REST ASSURED, IT IS WORKING! The greatest benefit, perhaps, of using smart detectors is that users can rest easily, knowing that their detectors are working properly. According to a report by the National Fire Protection Association (NFPA), three out of five home fire deaths resulted from fires in properties with no smoke alarms or ones that don't work, and the risk of dying in reported home fires is cut in half in homes with working smoke alarms. It is therefore crucial for homeowners to make sure that their detectors are in perfect working order so they can be alerted when needed. Rather than staying passive and responding only when there is an event like their traditional counterparts, smart detectors can take a proactive role in ensuring normal operations through advanced software. For example, smart detectors can now do self-testing. By taking over maintenance jobs previously done by humans, smart detectors can eliminate human errors or negligence in keeping the devices functional. Products like Nest Protect and Halo/Halo+ can do automatic self testing so users do not


have to worry about testing the detectors. According to Nest, “Nest Protect tests itself to make sure that its batteries, sensors, speaker, horn, and Wi-Fi connection are working.” Smart detectors can be hard-wired or battery-operated. Some battery-operated smart detectors now come with low-battery warnings via mobile alerts rather than just beeps, which helps maintain the power required for operation.

MAKING DIY INSTALLATION POSSIBLE Some smart detectors feature DIY installation. However, there are still challenges associated with DIY installation – users may not know where to install the unit or may experience issues during the setup. These detectors have to be installed in

appropriate locations to be effective. Companies can help make their products truly DIY by providing step-by-step guidance through their mobile app or clearly written user manuals. Moreover, companies can also provide online or physical support. “Without professional installers, it is sometimes not easy for users to install the smoke detector properly. We offer videos and user manuals that offer clear instructions to guide our DIY customers,” says Johnson Chang, Executive Vice President at Nietzsche Enterprise. “With clear illustrations, our app guides users through each step of product installation and setup, dumbing down the process and making it easy for our users,” says Liu.

Nest Labs

First Alert

Nest Protect

Onelink Wi-Fi Smoke + Carbon Monoxide Alarm

First released in October 2013, Nest Protect detects both smoke and CO in a single device. Since its second generation, Nest Protect has used a Split-Spectrum Sensor. With an extra blue LED, the Split-Spectrum Sensor is supposed to enhance the traditional photoelectric sensor, allowing the device to see large and small particles. Nest Protect has many innovative features worth noting. To name a few: it can tell steam apart from smoke with its humidity sensor and custom algorithms; it has a pathlight that lights up when someone walks underneath it; it allows users to hush alarms (if smoke levels are not too high) right from their smartphones; when unit speaks, all the others also speak, so users can be notified even in a different room. As part of the Nest family, Nest Protect works with Nest Thermostat and Nest Cam, enabling scenarios like when Nest Protect is triggered, Nest Cam will automatically record a clip.

Halo Labs

Like Nest Protect, this alarm also detects smoke and CO in a single device, and all the alarms will sound together when there is an event. The alarm uses photoelectric detection. For the 10-year battery model, the battery will last for as long as the device can be used so users won’t have to replace the battery. The alarm is compatible with Apple HomeKit and allows users to test or silence false alarms from their iPhone, iPad, or iPod touch.

Halo+ Using both ionization and photoelectric technologies, Halo+ can detect fast-moving fires and slow-burning fires. What makes Halo+ really special is its weather alerts. According to Halo, “Halo+ comes with a radio that is tuned to the emergency weather channel, a channel that broadcasts weather threats across the U.S. Customers can even program Halo+ to monitor the threats they are specifically concerned about, whether that’s tornadoes, hurricanes, floods, or even amber alerts (child abductions).” Halo+ will be manufactured in the U.S.

69


SMAhome

Smart Flood/Water Leak Sensors for NewGeneration Home Safety When there are floods or water leaks, sensors typically alert homeowners via audible alarms and sometimes visual alerts as well. But what about when no one is at home? Smart flood/water leak detectors are here to the rescue. With wireless communication and mobile apps, users are kept in the know even when they are away from home.

MUST-HAVE FEATURES

By a&s SMAhome

APRIL 2016 Ɣ www.asmag.com

Fire, water leaks, or floods can cause homeowners extensive property damage if left unattended. They can be a result of having leaky faucets or faulty pipes at home or be due to extreme weather conditions. Flood/ water leak sensors can be placed around the home where water problems may occur to alert the homeowner whenever there is a problem. Early detection can help stop the problem and prevent further damage.

70

When it comes to smart flood/water leak sensors, leakSMART Spokesperson Ann Poston considers the following features to be essential: sensors must have reliable contacts that can quickly detect water leaks and alert the system, be of appropriate size to fit in small areas while still remaining visible, provide audible and/or visual alarms or alerts, have longlasting battery life, and can be named or distinguished via an app. Avi Rosenthal, Vice President of Security & Control Products for Nortek Security & Control, expresses that besides the ability to detect water, durability and reliability are also important for these sensors. “Water/flood sensors must be able to detect water. As a homeowner, you’re counting on these devices to alert and notify you when water has been detected in your home so it’s important they perform as intended. Beyond that, it’s important for these devices to be durable and reliable.”

TYPES OF FLOOD/WATER LEAK SENSORS In general, two types of smart flood/ water leak sensors can be found – the “bug” type, and the type that has a wired probe. Users can choose the type they

want based on where they intend to install the device. “The wired probe model is designed to be used in places where floods are expected and the level of water can reach more than a few centimeters,” says Oren Zandberg, Program and Project manager at The Crow Group. “In places like bathroom closets or faucets where there is not much space and floods rarely happen, the bug type is the best option due to its small dimensions and easy installation.”

MORE SENSORS, MORE APPLICATIONS Some smart flood/water leak sensors like Fibaro Flood Sensor and WallyHome incorporate additional environmental or motion sensors for expanded functionality and more versatile applications. Fibaro Flood Sensors have embedded temperature and tilt sensors, while WallyHome can monitor temperature, humidity, and movement, all in one sensor. “Many sensors are starting to feature a variety of other applications or uses, so that homeowners won’t need many different sensors, including temperature, humidity and motion,” says Poston.

PART OF A SMART HOME SYSTEM, OR A DEDICATED SOLUTION FOR PREVENTING WATER DAMAGE Smart flood/water leak sensors may be part of a larger smart home system, which can be developed by the same company or a third party. To take several examples, Samsung SmartThings Water Leak Sensor is part of the SmartThings ecosystem based around the Samsung SmartThings Hub; Fibaro Flood Sensor is part of the Fibaro System which includes a controller and various other sensors; and Z-Wave based GoControl


Smart Flood Detector and Smart Flow Detector, just like other products under its brand, work with popular Z-Wave enabled home control hubs such as those from Samsung SmartThings, Wink, Nexia, Vera, and others. Alternatively, smart flood/water leak sensors may be part of a dedicated solution that targets the particular application of preventing water damage at home. leakSMART is one example. It is a home water protection solution that includes a hub, sensor, and special valve connected to home’s main water supply. While the solution can stand alone, it can also be integrated with third-party smart home platforms including Wink, Iris by Lowe’s and Samsung SmartThings according to Poston.

Nortek Security & Control GoControl Smart Flow Detector WL00Z-1 Wireless: Z-Wave GoControl Smart Flow Detector takes a very different approach to help prevent leaks. It attaches to any copper water pipe at home to sense if there’s water flowing through the pipe without cutting the pipe. “The detector can be used to monitor the entire house and detects leaks on a more general level. It detects if water is

leakSMART

USE OF ZIGBEE AND Z-WAVE PROTOCOLS ARE POPULAR ZigBee and Z-Wave are two popular wireless protocols for smart flood/water leak sensors. Companies like Samsung SmartThings and leakSMART adopted ZigBee for their flood/ water leak sensors, while others like Nortek Security & Control and Fibar Group adopted Z-Wave. However, other communication technologies may also be used. SNUPI Technologies developed a unique communication technology called Sensor Network Utilizing Powerline Infrastructure (SNUPI), which is used in the company’s sensor solution called WallyHome. SNUPI takes advantage of the copper wiring in walls to create a sensor network and is ultra-low power.

flowing and then, depending on how long that activity has been going on, alerts the homeowner,” says Rosenthal. The device is interoperable with other Z-Wave solutions. It can work with Z-Wave enabled shut-off valves to stop the flow of water if it detects that water has been flowing for longer than the time allotment defined by the user.

Fibar Group

Wireless: ZigBee As mentioned previously, leakSMART comes with a hub, sensor, and valve (electronic motorized brass water ball valve). What is unique about leakSMART is that the valve, which connects to the home’s main water supply, will shut down the water supply automatically when there is a leak. The sensor can send audible alerts even if it’s not connected to the hub. “leakSMART is working with a variety of smart home platforms to ensure that regardless of the chosen smart home platform by consumers, leakSMART can integrate with the system appropriately,” says Poston. She adds that leakSMART’s second-generation line of products will be launched in fall 2016.

Fibaro Flood Sensor Wireless: Z-Wave The Fibaro flood sensor has some eye-catching features – tamper prevention, gold telescopic opic probes, and the ability to float in water. With a tilt sensor that detects tilt and movement over 15 degrees and a tamper button, the device alerts the user if it has been moved or tampered with. Three 24-karat gold-plated probes are found at the bottom of the device and these have been designed to compensate for uneven surfaces. Besides, gold plating provides corrosion resistance and more precise detection. In addition, the sensor provides temperature readings with its embedded temperature reader to Fibaro’s controller, Home Center 2, to help users manage floor heating.

71


Sony SNC-VB770 4K Network Camera

IDIS DC-S1283WHX PTZ Camera

Axis M3004-V Fixed Dome Network Camera

Features:

Features:

Features:

• 35-mm Exmor full-frame sensor • Intelligent Cropping feature for cropping images in 4K resolution • Intelligent scene capture feature automatically adjusts and adapts picture quality • Area-specific noise reduction selectively divides images into areas based on patterns (e.g. edges, textures, evenly colored areas) • Sensitivity under 0.004lx, ISO 409600

• • • • • •

• Vandal- and dust-resistant indoor fixed dome camera • Supports HDTV 720p and 1-MP resolution • 3-axis camera angle adjustment allows for mounting on walls or ceilings • Supports Axis Camera Application Platform • Offers horizontal viewing angle of 80 degrees • Supports Axis’ corridor format for vertically oriented video streams or areas such as corridors, hallways, or aisles

Smart UX controls Easy installation with NVRs Full HD 1080p resolution 30x optical zoom IP 66 support Low light enhancer

■ IDIS/Korea ■ Email: info@idisglobal.com

■ Axis Communications/Sweden ■ Email: axis-sap@axis.com

■ Sony Electronics Asia Pacific/Singapore ■ Email: pro.info@ap.sony.com

Grundig VMS Sense Pro Features: • Can be scaled to monitor single sites with very few cameras to large, multi-sited applications with a large number of cameras and integrated systems • Event-driven, alerting operators in real time as site incidents occur • Includes failover server setup for mission critical applications • Dual streaming technology and multi-casting both

Geutebruck G-Cam EHC-3285 Features: • 360-degree surveillance with a total resolution of 6 MP • 1/1.8” CMOS sensor with progressive scan • Low distortion conversion of the 360-degree image in up to 4 individual streams/areas (“dewarping” function) • 2 x Full HD 1080p resolution at 25 fps showing 2 areas (half split view) • PoE, 12 VDC possible • Virtual PTZ functionality in quad mode

APRIL 2016 Ɣ www.asmag.com

■ Geutebruck/Germany ■ Email: info@geutebrueck.com

72

help to reduce network bandwidth use • Uses open platform technology to ensure comprehensive integration with third-party video products • Mobile app allows remote viewing and control of VMS sites ■ Grundig/Germany ■ Email: info@grundig-security.com

Southwest Microwave Intrepid UniZone Plug-andDeploy Fence Detection Sensor Features: • Quick, easy set up and deployment • Advanced digital signal processing • Point impact discrimination prevents environmental nuisance alarms • Sensitivity leveling for uniform detection along fence line • Operates in harsh environments • Installs on most fence fabrics ■ Southwest Microwave/U.S. ■ Email: infossd@southwestmicrowave.com

ACTpro 1520e Single Door IP Controller Features: • • • • • •

Dual port Ethernet switch, allows for IP connection TCP/IP – DHCP/static IP addresses Break glass monitoring Entry and exit reader standard Reader short circuit protection 1,000 user groups

■ Access Control Technology/U.K. ■ Email: sales@act.eu


Dallmeier DDZ4220HD Outdoor PTZ Camera

Automatic Systems FirstLane 960 Turnstile

Oncam Evolution-05 Mini Indoor Night Camera

Features:

Features:

Features:

• • • •

• • • • • •

• 5-MP CMOS sensor • Video stream of up to 30 fps can be obtained at a resolution of 1 MP and 1/4 MP • IR sensitive to near infrared light (850 nm) • Can provide 3 simultaneous H.264 and MJPEG video streams • SD card slot available

1/2.8” progressive scan CMOS High-speed PTZ dome 20x/30x optical zoom with autofocus Day/night switching with removable IR-cut filter • Day/night switching with change of the presets • Memory expansion with microSDXC card ■ Dallmeier electronic/Germany ■ Email: info@dallmeier.com

Automation of pedestrian access control Restricts access to secured zones Low cost of ownership Employee and visitor entry/exit tracking Reduced need for manned entrance Low energy consumption for a low carbon footprint

■ Automatic Systems (part of Bolloré Group)/Belgium ■ Email: sales.asgroup@automatic-systems.com

■ Oncam Grandeye Technologies/U.S. ■ Email: sales@oncamgrandeye.com

Qognify Situator 8.0 Operational Intelligence Center (OIC) Features: • Strong analytic engine monitors large volumes of data streams and detects deviations in leading indicators • The business and service KPI dashboard provides effective monitoring of business’ status (organization and scorecard) • Allows analysts to conduct effective root-cause analysis and unlock hidden insights from the big data collected by Qognify’s Situator • OIC allows customization of dashboards with information that enables people in the organization to best fulfill their responsibilities – from executives to field personnel

• Continuous monitoring and measuring of business and service KPIs, providing insightful decision support and enhanced incident management capabilities • Trend and pattern analysis and the hidden insights the OIC reveals allows for effective root-cause analysis ■ Qognify/U.S. ■ Email: info@qognify.com

CTS IPM-1240G 8-Port Industrial Managed Gigabit PoE+ Switch

WD 8 TB Purple Hard Drive

Features:

• Built for 24/7, always-on, high-definition security systems • Supports up to 8 hard drives and 32 cameras • AllFrame technology improves ATA streaming to reduce frame loss • IntelliSeek technology can calculate optimum seek speeds, keeping power consumption low • Three-year warranty

• • • • • •

Network redundancy support: RSTP and G.8032 ERPS Configuration: web GUI, serial console, CLI command Supports IEEE802.1Q VLAN, SNMP v1/v2c/v3 Redundant power input design, 58-55 VDC IP30 rugged metal case design Operating temperature range: -40 to 75 degrees Celsius

■ Connection Technology Systems/Taiwan ■ Email: sales@iconnectron.com

Features:

■ WD/U.S. ■ Email: lisa.yang@grandpr.com.tw

ICP DAS CL-212 Data Logger Module Features: • PM2.5, CO2, temperature, humidity, and dew point measurement • Non-dispersive infrared (NDIR) CO2 sensor • Up to 450,000 records with date and time stamps • Supports DCON and Modbus RTU protocols and RS-485 communication interface • Relays output for PM2.5/CO2/RH/T alarm output • Measurement ranges: PM2.5: 0 to 400 μg/m3; CO2: 0 to 9999 ppm ■ ICP DAS/Taiwan ■ Email: info@icpdas.com

73


April – September 2016

WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

Exposec

April 2016

ISC West • • • • •

Date: 2016/04/06–04/08 Venue: Sands Expo & Convention Center, Las Vegas, U.S. Tel: +1-203-840-5602 Email: inquiry@isc.reedexpo.com URL: www.iscwest.com

• • • • •

International Oil & Gas Security Conference

Secutech International • • • • •

Date: 2016/04/19–04/21 Venue: Nangang Exhibition Center, Taipei, Taiwan Tel: +886-2-2659-9080 Email: echo.lin@newera.messefrankfurt.com URL: www.secutech.com

• • • • •

Date: 2016/04/21–04/23 Venue: Bombay Exhibition Center, Mumbai, India Tel: +91-22-4286-3800 Email: info@secutechexpo.com URL: www.secutechindia.co.in

Secutech India

Securex • • • • •

Date: 2016/04/25–04/28 Venue: Poznan Congress Center, Poznan, Poland Tel: +48-61-869-2131 Email: pcc@mtp.pl URL: www.securex.pl

Expo Seguridad Date: 2016/04/26–04/28 Venue: Centro Banamex, Mexico City, Mexico Tel: +1-203-722-7351 Email: marreola@reedexpo.com URL: www.exposeguridadmexico.com

May 2016

Asian Securitex • Date: 2016/05/04–05/06 • Venue: Hong Kong Convention & Exhibition Centre, Hong Kong • Tel: +852-2804-1500 • Email: xhibit@hkesallworld.com • URL: www.asiansecuritex.com

• • • • •

Date: 2016/05/11–05/12 Venue: The Kia Oval, London, U.K. Tel: +44-207-111-1615 Email: cristinar@irn-international.com URL: www.oilgassecurity.com

Securex South Africa • Date: 2016/05/24–05/26 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: info@specialised.com • URL: www.securex.co.za

Security Exhibition & Conference • Date: 2016/07/20–07/22 • Venue: Melbourne Convention & Exhibition Center, Melbourne, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au September 2016

OFSEC • Date: 2016/09/05–09/07 • Venue: Oman International Exhibition Centre, Muscat, Sultanate of Oman • Tel: +968-2478-8476 • Email: info@muscat-expo.com • URL: www.muscat-expo.com/ofsec

Adria Security Summit • Date: 2016/09/06–09/08 • Venue: Kongresni Centar, Sarajevo, BiH • Tel: +387-33-788-985 • Email: summit@asadria.com • URL: www.adriasecuritysummit.com

June 2016

IFSEC International • • • • •

Date: 2016/06/21–06/23 Venue: ExCel London, London, U.K. Tel: +44-20-7921-5000 Email: rachel.eaton@ubm.com URL: www.ifsec.co.uk

IFSEC Southeast Asia • Date: 2016/09/07–09/09 • Venue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia • Tel: +44-20-7921-8127 • Email: Agnius.Kazlauskas@ubm.com • URL: www.ifsecsea.com

Intersec Buenos Aires July 2016

SecProTec East Africa • Date: 2016/07/12–07/14 • Venue: Kenyatta International Conference Centre (KICC), Nairobi, Kenya • Tel: +49-40-710070-51 • Email: stefan.freiberg@planetfair.de • URL: www.secproteceastafrica.com

• Date: 2016/09/07–09/09 • Venue: La Rural Trade Center, Buenos Aires, Argentina • Tel: +54-11-4514-1400 • Email: ezequiel.gorbaran@argentina.messefrankfurt.com • URL: www.intersec.ar.messefrankfurt.com

APRIL 2016 Ɣ www.asmag.com

• • • • •

Date: 2016/05/10–05/12 Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil Tel: +55-11-5585-4355 Email: international@cipanet.com.br URL: www.exposec.tmp.br

77


Companies in This Issue • POLY-CONTROL • YALE LOCKS AND HARDWARE • YIKES • ZAPLOX

Cover Story • TIBBO TECHNOLOGY Products of the Month • AVA RETAIL • KENTIX • TE CONNECTIVITY

Market Dynamics • APTSECURE • AMTI • ARROWTEK • ASSA ABLOY • BOSCH SECURITY SYSTEMS • BROWNSTONE ASIA-TECH • COMPETITIVE CARD SOLUTIONS • FLIR SYSTEMS • HYTEC INTER • INFOWORX • IONTECH • NEC

Viewpoint • TBS • G4S Product Exploration • ALLEGION • EVVA SICHERHEITSTECHNOLOGIE • ISEO SERRATURE • JOHN PORTMAN & ASSOCIATES • KABA • LEAPIN DIGITAL KEYS • LOCKITRON

Next Issue

Vertical Solution • 3XLOGIC • AXIS COMMUNICATIONS • BOSCH SECURITY SYSTEMS • BT GLOBAL SERVICES • EL.MO. • HIKVISION DIGITAL TECHNOLOGY • HONEYWELL SECURITY & FIRE • MARCH NETWORKS • ONCAM • PYRONIX • TRE I SYSTEMS • TYCO RETAIL SOLUTIONS • TYCO SECURITY PRODUCTS Special Feature • AVULAR • EHANG • FLYABILITY • SKY EYE INNOVATIONS

Product Exploration

Vertical Solution

VMS (LARGE/MULTI-SITES AND CITIES)

BANKING

Market Dynamics AUSTRALIA AND INDIA

ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 9

ADVERTISER AXIS COMMUNICATIONS AB

MAJOR ITEM NETWORK VIDEO SOLUTIONS

COUNTRY SWEDEN

E-MAIL contact-sap@axis.com

5, 7

DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

23

DYNACOLOR INC.

IP CAMERA / NVR

TAIWAN

info@dynacolor.com.tw

4

FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

41

GENETEC

SOFTWARE

CANADA

info@genetec.com

3

HDPRO CO., LTD.

CCTV

KOREA

sales@hdprocctv.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

13

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

11

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

2

PANASONIC SYSTEM NETWORKS CO., LTD.

VIDEO SURVEILLANCE

JAPAN

-

6

SHENZHEN COMMANDER TECHNOLOGY CO., LTD.

CASING

CHINA

sjw@yjdcase.com

INSIDE BACK COVER

SINGAPORE TECHNOLOGIES ELECTRONIC LIMITED

SURVEILLANCE

SINGAPORE

agilfence@stee.stengg.com

21

VIDEOTEC S.P.A.

IP CAMERA / SOFTWARE / VIDEOSERVER ITALY

info@videotec.com

15

WEBGATE INC.

DVR

KOREA

support@webgateinc.com

INSIDE FRONT COVER, 1 WESTERN DIGITAL TAIWAN CO., LTD.

SURVEILLANCE STORAGE

TAIWAN

Jessica.Liu@wdc.com

17

CMOS IMAGE SENSOR

KOREA

sales@zeeann.com

ADVERTISER HUNDURE TECHNOLOGY CO., LTD

MAJOR ITEM READER

COUNTRY TAIWAN

E-MAIL overseas@hundure.com

PAGE NO. 58.59

ADVERTISER ETHERWAN SYSTEMS, INC.

MAJOR ITEM TRANSMISSION

COUNTRY TAIWAN

E-MAIL info@etherwan.com.tw

24.25

TIBBO TECHNOLOGY INC.

CONTROLLER

TAIWAN

sales@tibbo.com

ZEEANN CO., LTD.

ACCESS CONTROL PAGE NO. 39

OTHER

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

79


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.