A&S #A119 Dec.2015

Page 1


DECEMBER 2015 SPECIAL REPORT VERTICAL MARKET

Choosing the Right Type of Wireless Systemss for City Surveillance The need to prevent crime, detect events, and investigate them has always been a concern for cities. Apart from deploying cameras, cities must also take into account the best way to connect cameras and other systems with command and control centers.

52

P. SPECIAL FEATURE

Sensorss Search for New Applications and Value A multi-functional sensor or detector is one that integrates multiple sensors. Applications of multifunctional sensors can be found in environmental safety and security, health care, indoor air quality monitoring, or outdoor weather forecast and gardening. The basic models integrate temperature and humidity sensors for indoor climate control.

46

P.

The global economic landscape is shifting rapidly in favor of Asia. For the security industry, the continent has become the fastest growing market in the world. With about 60 percent of the global population and several developing countries, the region has become unavoidable for major global solution providers.

PRODUCT EXPLORATION

Modern Public Parking Lots Get Smart Today’s public parking has become quite different from what we had in the past. Lots that were formerly maintained by staff on duty on a 24/7 basis have given way to smart, automated facilities equipped with advanced video surveillance, access control, and license plate recognition (LPR) systems that are meant to keep the sites secure and easy to use.

DECEMBER 2015 Ɣ www.asmag.com

34

P.

Smart, Speedy, and Stylish — Turnstiles Integral Part of Visitor Entry Control Visitor entry control encompasses many elements. From barricades in parking lots to turnstiles in lobbies, these devices serve as barriers to keep outsiders at bay. This article focuses mostly on turnstiles for office buildings, where users look for security, speed, and aesthetics in their products.

12

62

P.

Smart Sensor Markers’ Multiple Sales Strategies

66

P.

Contents................................P.10 Editor’s Note .........................P.14 Application Cases .................P.16 Products of the Month..........P.18 Asia at a Glance.....................P.29 Corporate News ....................P.70

40

P.

New Products........................P.72 Companies in This Issue ........P.75 Show Calendar......................P.76


Security Threats Push Asian Governments to Upgrade Security Systems

a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.

ISSN 1997-6267

DECEMBER 2015 Ɣ www.asmag.com

n recent months, the Islamic State (IS) militant group has caused global tension over terrorism to rise. The most recent incident claimed to be related to the group is the knife attack at an east London metro station on December 6. Its penetration in Asia is also getting more and more obvious. Thailand, Malaysia, and Indonesia were recently named as the key regions where the IS has started to recruit foreign fighters. The tension in the South China Sea also raises higher maritime security concerns in Southeast Asia. It can be expected that Asia will take a main role in the global anti-terrorism action and also strengthen its homeland security for the coming years. However, different from 9/11, this time, what we are facing is one of the most critical security crises ever, since it was not just a result of conflict between two countries but due to attacks by a militant group across different countries. With the Internet, different parties are able to quickly exchange and collect information via different connected devices, from the cyberworld to the real world. Social media has even become an important tool for the IS to expand its global force. Under these circumstances, how could we continue to use analog security technology to protect our beloved family, friends, and property? The recent incidents should start to push most end users to accelerate their migration toward IP technology and even adopt more intelligent

14

security systems. Without IP-based security systems, information can’t be shared as quickly and widely. Meanwhile, to further strengthen the cooperation between different parties and countries, the high demand for open platforms should be followed. When people start to focus on how fast security data can be shared and further utilized to gain situational awareness in their environment, the security industry will start to enter a new milestone toward “big data.” Luckily, we have already seen some governments start to upgrade their security equipment by utilizing some intelligent technologies in their security systems. An advanced facial recognition system along with high resolution cameras was adopted by the Royal Thai Police, right after the bombing in August. Face recognition technology has been highly developed in China, due to its safe city initiatives, from first-tier to second- and third-tier cities. Using big data to prevent or detect suspicious activities are also the current focuses of the Chinese safe city projects. Finally, we hope more and more Asian governments can follow the footsteps to upgrade their security systems in the near future. Hope you enjoy reading this issue.

ˁൢඵ‫͔̻ݭ‬ϫ୷ ༚ ੮ທച৪޵ᕻგΠ઀ Parson Lee Joseph Lee John Shi

Senior Consultant Consultant Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

General Press Jill Lai Alf Chang Eifeh Strom William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin

Editor-in-Chief Senior Consultant Senior Editor Reporter Reporter Reporter Reporter

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Officer Marketing

michelle.shih@newera.messefrankfurt.com michelle.chu@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu Circulation

Michelle Shih Michelle Chu

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Manager Product Manager

willy.wang@newera.messefrankfurt.com jessica.yang@newera.messefrankfurt.com

Trade Fair Manager Manager Project Manager

echo.lin@newera.messefrankfurt.com peggy.wu@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com

asmag.com

Willy Wang Jessica Yang secutech

Echo Lin Peggy Wu Eva Tsai

International Advertising [Headquarters]

Juihui Lin Kay Yang Audrey Fang

Manager Operation Officer Coordinator

juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha

U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam

bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No. 288, Sec. 6, Civic Boulevard, Xinyi District, Taipei 110, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, web sites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2015 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

jill.lai@newera.messefrankfurt.com


Teleste Secures People’s Safety in Australia

To view the most updated and complete content for application cases, please visit the “Vertical Markets” section of our website at www.asmag.com, or scan the QR code. For more information, contact as-pr@newera.messefrankfurt.com

APPLICATION CASES

The Logan City Council in Australia launched a safety camera program DLPHG WR HQKDQFH UHVLGHQWV· VDIHW\ and reduce crimes. They needed a scalable, flexible video surveillance system that can be centrally managed by a control center. The current video security system was built using Teleste S-VMX video management system. With approximately 300 cameras deployed citywide, existing analog cameras are fed through Teleste video encoders fully integrated in the platform. The video wall provides real-time monitoring to 20 monitors while the stream reflector allows images to be streamed to external mobile devices. Additional operator functionality included GIS mapping features, with multiple permission-based operator logins and a hierarchy of control. Mobile safety cameras can be moved across the city to key locations and events to assist in addressing transient crime and antisocial behavior in public spaces. The system has captured about 2,700 incidents since its deployment 12 months ago. The next stages will result in federating remote sites and mobile videos surveillance systems for rapid deployment.

Bangkok Police Joins With iOmniscient to Counter Terrorism

DECEMBER 2015 Ɣ www.asmag.com

OT Systems Enhances Transmission for Macau Citizen Footbridge OT Systems announced the installation of their industrial PoE switches to enhance and extend the transmission capabilities for the system used to secure the Citizen Footbridge in Taipia, Macau. The current surveillance system uses more than 200 PoE IP and dome IP surveillance

16

cameras. Authorities installed industrial PoE switches to offer the system extended transmission distance without additional infrastructure or cabling. The installment features 60 industrial switches on the camera end and 60 industrial Ethernet switches rack-mounted in the 19-inch chassis in the control center. The industrial switch used connects up to four IP cameras with maximum 30-watt output power for each camera and extends the Ethernet distance up to 20 kilometers via fiber links, offering easy connection to WKH V\VWHP·V FRQWURO FHQWHU The switches are equipped with four Ethernet ports and operates well in high temperatures. Ethernet switch card modules transmit received signals to the system while a hot-swap feature allows a failure card module to be unplugged from the chassis without any service interruption to the other modules.

After a series of bomb attacks, the Royal Thai Police upgraded their systems by implementing a face recognition system from iOmniscient, allowing them to automate their existing Oracle database system of faces of people of interest. Using intelligent video analytics, the system not only detects suspicious items or recognizes faces, it raises an alarm and allows authorities to replay the video from the moment the incident occured. 7KH VXVSHFW·V IDFH LV UHFRUGHG LQ WKH database as a “person of interest” and the V\VWHP·V WUDFNLQJ IHDWXUH FDQ PDS RXW WKH VXVSHFW·V URXWH ZKLOH WKH DXWRPDWHG 36,0


response system alerts the nearest first responder. The iOmniscient system also features a health check system that raises a warning whenever a camera is moved, out of focus, partially covered, or has poor visibility, due to rain, snow, or dust, allowing users to understand where the problems are and address them in a planned manner.

the system in the control room: the e-map feature defines areas and groups by management personnel and health check monitors the device status. At the same time, managers can use the EagleEyes app on their mobile phones to get instant first-hand information about incidents occurring in the factory.

systems in their other branches as well.

Matrix Surveillance Solution Monitors ATMs Across India

AVTECH Supplies Surveillance at Indonesian Plastic Factory A well-known plastic factory that specializes in manufacturing all kinds of plastic products used AVTECH to secure its premises. In the storehouse and the office, they installed 2-megapixel AVTECH IR dome IP cameras with solid light which is suitable for dark environments as it can automatically control the amount of light to avoid overexposure. The production lines, entry ways, and factory surroundings were secured with 2-megapixel vari-focal IP cameras with WDR to ensure high-resolution images in areas that are insufficiently lit. The cameras all support PoE and use a single Ethernet cable to transmit both data and power to the devices. In addition, their external I/O can connect to external alarm devices and emit alarms whenever an event occurs. The server room housed four NVRs with HDMI matrix while CMS Pro was used to manage and monitor

Anviz Global Provides Safety Solutions for Khivraj Groups Anviz provided Khivraj Groups, an automobile dealer in Chennai, India, with a professional access control and time attendance system to meet their security needs. The fully customized VHWXS PDGH XVH RI $QYL]路V ELRPHWULF based terminals to increase security and efficiency. Anviz fingerprint terminals were installed in each of the sales RXWOHWV WR PRQLWRU WKH HPSOR\HHV路 time attendance at each of the showrooms. The system allowed for clear output in reports as well as easy maintenance and management of all the outlets, creating a paperless office. Most importantly, the system uses fingerprint verification to increase security by restricting access to certain critical areas such as showrooms and administration offices. The biometric access control GHYLFHV VFDQ WKH HPSOR\HHV路 ILQJHUprints and use the information as a basis to allow or deny them entry. Following the success of the initial installation, Khivraj Groups is currently installing similar security

The Reserve Bank of India wanted to centrally monitor and manage the security of their ATMs and raise real-time notifications for important events. It also needed to be operable within a limited bandwidth of 32 kbps. IR dome and bullet cameras were installed to provide surveillance in more than 200 remote locations. CMS software allows for the viewing of camera feeds while a hybrid video recorder gives them the option to replace existing analog cameras with IP ones in the future. To centrally manage all the devices at low bandwidth, Matrix offered a notification management software using a SATATYA device monitor, which can offer bitwise information about events like camera disconnection, storage alerts, and recording status. It can also provide information regarding camera tamper, video loss, storage status, etc. Event logs can be searched and exported in Excel format to be used as proof in criminal investigations.

17


DECEMBER 2015 Ɣ www.asmag.com

20

Increasingly, we see an intricate relationship between security and IoT as more and more security devices are connected on the Internet. No one realizes this “Internet of Security Things” more than Axis Communications, inventor of the network camera, which can be said as the very first IoT security device. BY William Pao

he Internet of Things (IoT) has become the buzz word in the IT world as connected devices bring tremendous benefits to users: In a connected smart home, smart thermostats send homeowners alerts while they are away on vacation. Nanny cams let parents keep an eye on their children while still at work. In fact, with Gartner predicting that 25 billion connected devices will be in use by 2020, IoT is expected to prevail in various aspects of our daily life.

AXIS PIONEERS INTERNET OF SECURITY THINGS

IoT makes video surveillance easier to use and integrate with other devices. This lowers the technology hurdle for customers significantly and opens up a great future for integration of video surveillance with other systems.

INTERNET OF "SECURITY" THINGS

In many ways, security is intricately tied to the Internet of Things. This is especially the case after a migration of security products and solutions toward IP. When all connected, they in essence form an “Internet of Security Things” to bring value to users. “In the security world, IoT is helping businesses manage all their security systems — from intrusion sensors and fire alarms to video surveillance, access control, loudspeakers, emergency stations, and video intercoms — as a single cohesive platform,” said Dr. Martin Gren, Co-Founder of Axis Communications. “Fundamentally, IoT makes video surveillance easier to use and integrate with other devices. This lowers the technology hurdle for customers significantly and opens up a great future for integration of video surveillance with other systems.” As a matter of fact, Axis should know something about the security industry’s evolution toward IoT. Back in the

Dr. Martin Gren, Co-Founder, Axis Communications

the needs of many of our partners and their customers in the field.” Integration of these Internet of Security Things brings many benefits to users. In terms of security, such integration helps administrators gain situational awareness and better protect their premises. Integration of IP cameras and horn speakers through the VMS, for example, allows the administrator to directly speak to suspicious individuals. “ With a camera that is only

happening in the retail sector where, for example, heat maps reveal shopper behavior and allow for optimization of shop floor plans and merchandize display,” Gren said. Further, security devices can be linked to building automation and other non-security systems in smart building and smart city deployments. “Smart buildings, smart cities — These are not just made up of video surveillance and physical access control devices. Think lighting, air ventilation, air condition, heating, smoke


1990s, Axis’s core business was in network servers that connected printers to the network, a technology that was based upon the “thin-client” concept popular at the time. Axis saw the success of attaching printers to the network and wanted to connect other products. The technology was named the ThinServer technology and included network optical storage products as well as scan-servers. Under this framework in 1996, the company introduced the world’s first IP camera, a game changer that forever changed the face of the security industry. “The first network cameras were introduced in 1996, and by 1999 they were embedding LINUX to create an open architecture that would finally make network surveillance devices practical solutions for the security industry. This open approach to system development not only became our business model, it launched an entire network video revolution,” Gren recalled. “Today tens of millions of network video devices have been installed around the world from a vast array of manufacturers. We are proud of the fact that Axis Communications developed and brought to market the security industry’s first Internet-of-Things device: ‘The network camera.’”

SECURITY BENEFITS

21

To catch up further with the IoT trend, Axis realized the need to expand its product offerings to include more than just network cameras. That’s why the company rolled out access control, network speaker, and video station solutions that are all based on IP. “About two years ago, in 2013, we introduced our networked physical access control system, which really extended our focus beyond just cameras as connected IoT devices,” said Gren. “We continue to expand in other ways, such as with the IP video door station. We also introduced the market’s first open-standard network speaker addressing

performing video surveillance, it is limited because you really can’t talk to people. But if you add an integrated horn speaker, you can actually communicate to a person — for example, if someone is loitering, or in an area they shouldn’t be, or otherwise acting suspiciously. And you can do it through a single system that manages the video and not have to switch between different systems or interfaces,” Gren said. When video door stations are added into the system, they would further help operators gain a better understanding of what is going on. “If you think of a vertical, for example, the airport, you typically have a lot of remote entrances and exits. You also typically have pilots who come in and come out and who are not part of your access control system because you don’t know which pilot is flying to a particular destination today. So they need door stations on various entry gates in order to identify them as they hold up their name tags or look into the intercom,” he said. Further, since all the devices are connected to the Internet, the systems can be controlled from anywhere with any device. “As network-based devices they could be monitored remotely,” Gren said. “And the connectivity between devices would provide end users more complete situational awareness across multiple locations.”

NON-SECURITY USERS ALSO BENEFIT In terms of non-security, users can also gain from connected security devices, which generate good-quality data that can be extracted and analyzed to drive business intelligence and help users understand more about consumer behavior. “We already see that

detectors, gas sensors, window shades, lifts, and escalators in buildings. Think traffic lights, public transport, parking, and lighting in cities. The Internet of Things will enable comprehensive management consoles combining input from various devices,” Gren said. “This will mean increased security, increased efficiency, and help save energy.”

CHALLENGES

While IoT is gaining further ground in the security industry, there are still some challenges. The biggest one is potential hacking and intrusion into networkable devices that are in a more vulnerable position to such attacks. From the vendor’s perspective, they should make their products secure enough to detect and ward off intrusion. “Our QA department uses first-class vulnerability scanning tools to detect all common vulnerabilities,” Gren said. “We are continuously updating camera firmware with new features, bug fixes and security patches. Axis Communications has a long history of quickly providing firmware updates when vulnerabilities are discovered, even for discontinued products if the vulnerability is considered serious.”

MORE RELEVANT THAN EVER

IoT and security are more intricately tied together than ever. Axis Communications, which revolutionized the industry with the first IP camera, is now catching up to the IoT trend further by rolling out other IP solutions that, when all integrated, help users gain better situational awareness, achieve energy savings, and lower total cost of ownership. With IoT set to become more evolved and mature over time, Axis is expected to see more of its products and solutions present in high-value applications such as transportation and smart city.

>> Visit www.axis.com or send an email to

contact-sap@axis.com for more information.


Integration

China’s

DECEMBER 2015 Ɣ www.asmag.com

24


Edges

Safe Cities Into the Future BY Emily Lin

As China’s economy and city population continues to rise, so will security issues such as crime and violence. To combat this, China has turned toward technology to ensure the safety and security of its people. Going beyond basic video surveillance, the nation is moving toward creating networks that will allow for better data retrieval and interpretation, providing law enforcement and government agencies the information they need to respond effectively.

ver the past few decades, China has emerged to become a formidable economic superpower. Currently considered to be the second largest economy in the world, China’s gross domestic product (GDP) reached US$17.6 trillion in 2014, based on figures from the IMF, while latest figures from the National Bureau of Statistics showed a 6.9-percent GDP growth year-on-year in the third quarter of 2015. Economic growth goes hand-in-hand with urbanization and Chinese cities are growing at extraordinary rates to answer the need for more manpower and consumerism. The government has plans to restructure its nation by relocating 250 million

people from the countryside into the cities by 2025 to ensure further economic growth. Rapid urbanization has its price though. China has been forced to contend with growing pains typical of a developing country. “The most critical issues facing China’s booming cities include: ensuring the safety and security of people and assets, lowering crime rate, housing affordability, alleviating traffic congestion, combating worsening pollution, and optimizing energy efficiency,” commented Derek Tan, Director of Integrated Solutions in Asia at Tyco International. “All these issues present threats to social, economic, and political security if not managed adequately in time.”

25


BY Gavin Archery, A&E Program Manager, Milestone Systems

DECEMBER 2015 Ɣ www.asmag.com

he term A&E (architecture & engineering) does not do justice to the audience which includes (but is not restricted to) IT consultants, network architects, IT engineers, independent security consultants, mechanical and electrical (M&E) contractors, architects as well as main and sub-contractors for large building projects. They are often collectively called the “consultancy community” because what is common to all of them is they are paid for their expertise and the number of those expert hours they dedicate to a specific project. As projects today are becoming larger and more complex, the demand for consultants to manage these projects is definitely increasing. In the U.K. alone there are some very significant infrastructure projects underway right now — HS2, Crossrail, multiple upgrades of rail stations, airports, and road networks. In addition, more large building projects are underway in UK cities than we’ve seen in decades. The same is true in several other parts of the world right now. So it is no surprise that the consultancy community has never been busier than they are today. However, it is also very important to recognize that most of our partners cannot expect to simply pick up the phone and sell solutions into a lead contractor for any of these major

30

The first question ny you ou might ou h ask is why would ht the leading video management software (VMS) vendor need to address the architecture and engineering (A&E) community at all? The answer becomes clear when you look at the an infl in f ue enc n e and value of this diverse group.

building projects. It just doesn’t work like that. You are one piece of a very large and multi-layered pie so the approach needs to be different. The first thing to recognize is that consultants value, above all else, their independence. They want to keep vendors like us at arm’s length. They also need to be instant experts in many technical areas including video surveillance. We see it as our job to give information to the consulting community in a way in which they can use it to build accurate specifications. We ensure that all Milestone offerings have these specifications ready to download or send when we get that call or e-mail from a consultant. However, more than that it is our job to provide a dedicated team of in-house consultants who understand the pressures that consultants are operating under and can provide the reassurance that we can support their team as systems are being specified, configured, and installed; often working in support of a Milestone-certified specialist security systems installer. Our open platform approach also helps systems designers who are increas-


ingly looking to bring centralized control and consolidation of diverse subsystems together for operational efficiency and ease of management. Milestone video management systems are being integrated with SCADA/HMI systems in manufacturing, ERP and CRM systems in retail, and with building management systems in the construction world. In the physical security world access control, intrusion detection, and video surveillance systems are being brought together to provide holistic security solutions to customers. Milestone is often now configured as the principal user interface; helping organizations react quickly and efficiently to alerts from door readers, barriers, cameras, smoke alarms, fire suppression, environmental control, lighting, and other

subsystems. Milestone can become the physical security information management (PSIM) system when configured by a skilled Milestonecertified reseller. In the specification of new buildings having product information and product specification tools ready to feed into BIM (building information management) systems also makes good sense. Other areas to consider in our outreach to A&E is an education program, recognizing again that consultants are constantly looking to deepen their knowledge in new areas and accumulating continuous professional development (CPD) points in the process. CIBSE-approved courses which provide impartial insights into integration areas like access control and video management or sector-focused tracks like intelligent building solutions, while giving attendees valuable CPD points, could be rolled out in the future.

Gavin Archery, A&E Program Manager, Milestone Systems

As projects today are becoming larger and more complex, the demand for consultants to manage these projects is definitely increasing.

Finally, it is important to get away from purely technical language to focus on detailing the benefits of key functionality and configuration options wherever possible. Ideally discussion of benefits needs to include examples of other customers that have delivered specific business benefits from configuring our solutions in specific ways, integrated with specific other products. Although you will have gathered that there is a great deal of work to do to serve the A&E community well, we believe it is worth it now that Milestone has the capability to videoenable the largest and most complex and diverse IT and security systems. We offer dedicated design tools, education programs as well as professional services and support packages to meet the specific needs of the A&E. We have already built a dedicated large bids team, for example, with A&Es and large systems integration businesses in mind. It is about building a combination of tools which helps consultants to help themselves, while recognizing that dedicated support needs to be available at the commencement of the design phase and further support during the tender process in the form of prequalified, certified systems integrators and post-bid professional services to assist with project realization. All this work is essential to ensure this key stakeholder group is properly supported as they draw up specifications for video-enabling IT systems or creating more holistic security command and control and building management systems.

It is the job of manufacturers to provide dedicated in-house consultants that understand the pressures consultants are operating under and provide the reassurance that they can support their team as systems are being specified, configured, and installed.

31


How IoT Impacts Security Development:

Security as a Service BY Jill Lai

a&s talked to Genetec about how the company is following the recent industry trend of the IoT (Internet of Things) to focus on utilizing and managing the metadata from security devices. Body-worn camera integration, IP access control systems, and finally security as a service (SaaS) are the company’s three major recent offerings.

he IoT (Internet of Things) has become an inevitable trend in various industries. It has also greatly influenced the future of the security industry. Surveillance cameras and access control systems act as multiple sensors in the IoT; security management platforms play another important role to manage the metadata by connecting all these sensors. Genetec, an open-platform IP-based security management software provider, is also following the trend to deal with metadata from multiple security devices that have to do with video surveillance, access control, license plate recognition (LPR), and intrusion alarms, according to Andrew Elvish, VP of Marketing and Product Management at Genetec. Elvish pointed out how body-worn cameras and access control systems are important to Genetec, and how cloud service or security as a service (SaaS) will impact the security business in the future.

BODY-WORN CAMERAS AND ACCESS CONTROL AS SENSORS DECEMBER 2015 Ɣ www.asmag.com

To secure inhabitants in metropolitan environments, sensors should widely and thoroughly cover the city, including everything from all buildings and city infrastructure, to the people, in order to provide enough data for situational awareness. The latest and most discussed connected devices [sensors] for safe cities under the IoT are body-worn cameras. “Recently, we have heard a lot of requests from police, urban protection institutes, and law enforcement agencies about how to do more with the data from the body-worn cameras. For instance, how can one utilize the footage from

32

Andrew Elvish, VP, Marketing and Product Management, Genetec

Now the big change is that we started to open up our technology as well as our way to conducting business. This is the strategic way we will go forward.

those body-worn cameras as a part of a larger citywide system and how to make sense of the volume of footage? In order to address that problem, Genetec focuses on how to make metadata sensible and how to integrate different devices into a unified and manageable view for operators and security specialists,” said Elvish. “That is why Genetec offers a direct integration and evidence management feature for body-worn cameras within in our unified security management platform, Security Center.” Elvish added, “When users have the access to the data from body-worn cameras, then they have a bigger picture of what’s going on. If they can’t see the body-worn cameras’ data in relationship to the entire security system, which might comprise fixed cameras, LPR, and door access control, then you don’t actually have a true awareness or control of the situation.” Therefore, Genetec has identified a mix of opportunities from body-worn cameras, which provide the key part of the metadata, especially for safe cities. In addition to that, body-worn cameras are being used quite often in very precise, safety-oriented maintenance and operation applications, such as the ground crew at airports. Another interesting application is for quality assurance. For instance, when you are doing something very complicated the live


cameras could show an expert who is not at the scene how it works, according to Elvish. So, there are multiple conveniences and applications to be created from body-worn cameras. Finally, Genetec has recently released a new series of its IP access control system, Synergis, which enables clients to leverage their on-premises access control with cloud-ready capabilities. Using the newly released Synergis Cloud Link appliances users can rest assured that if a local or cloud-based network fails, it intelligently works on its own till the network comes back. The appliances are smart enough to re-synchronize the data either to the cloud or to the in-house server. So, users can go either to the public cloud or to the internal server with this appliance.

SECURITY AS A SERVICE In order to use metadata and have the flexibility to retrieve it, the company is focusing on developing more cloud solutions. Its guiding principle is “hybrid cloud.” “Some users don’t want to put all their data in the cloud — they would prefer to manage the split between what data stays on premises and what can feasibly go to the cloud. We are giving the user the control over their journey to the cloud rather than forcing an all-ornothing choice,” said Elvish. “When we talked to a large transportation client, they said they didn’t have the money to increase their storage facilities, nor to build out the required server room space with the associated electrical, cooling and IT management requirements. Nevertheless, in compliance with the latest government mandates, they were required to increase video storage to 30 days, effectively doubling their storage requirements. The solution was to store 15 days of video on-premises and the video starting from day 16 to 30 can be put into cloud. This is what we called

‘hybrid cloud’ for enterprise users,” added Elvish. “To ensure the security of cloud content — from capture to transport to storage — we have built in both AES-256 and TLS to deliver a highly secure method for handling the data whether in transit or at rest.” Genetec offers cloud solutions for the small-tomedium (SMB) market sector and for enterprise customers. “We are providing a new service for end users who already have our open-platform security management software, which we call ‘federation as a service’ (FaaS). Federation is a method uniquely designed by Genetec to facilitate centralized monitoring, reporting, and alarm management across multiple sites or organizations. For example, a chain of retail coffee shops typically own a lot of different stores in a city or a country. With Genetec FaaS, a local store can be federated into a master security system to access all the coffee shops in one city, across an entire country, or around the entire globe. The ‘federation as a service’ over the cloud gives our end users the ability to expand their systems in this manner without making a huge investment in servers or other hardware tools,” explained Elvish. “In the U.S., we have several federation-as-a-service customers. While, in Western Europe, we have many cloud customers using our SMB cloud solution, which mainly leverages our camera hardware partnership with Axis Communications. In addition, we have seen many telecom providers getting more interested in security systems for the SMB sector. Through the partnership with telecom providers, more and more end users can realize the benefits of a cloud-based video surveillance as a service. As soon as they hook up the cameras, they can enjoy a powerful and easy to use VMS solution all based in the cloud. Or, even enterprise customers, who have remote offices, can also adopt the Genetec cloud solution to quickly put video surveillance into smaller offices without the investment in local servers and storage, which still being able to federate these remote locations into one centralized, federated, view.” According to Elvish, whenever Genetec designs new products, the company develops with a “cloud-first” strategy, which is the company’s internal direction. “Internally, we have a very strong discipline to move into the cloud. And, we work very closely with our partners like Microsoft to make this a reality. We really leveraged Microsoft Azure in our journey to becoming a cloud-first company. For us it just makes sense since it’s the way our industry is heading.”

33


Modern Public Parking Lots

Get Smart BY William Pao

Today’s public parking has become quite different from what we had in the past. Lots that were formerly maintained by staff on duty on a 24/7 basis have given way to smart, automated facilities equipped with advanced video surveillance, access control, and license plate recognition (LPR) systems that are meant to keep the sites secure and easy to use.

DECEMBER 2015 Ɣ www.asmag.com

he parking management market has grown over the years due to a rise in vehicles across the globe, and the trend is set to continue. In a recent report by MarketsandMarkets, the global parking management market is estimated to grow from US$5 billion in 2014 to $9.2 billion by 2019, translating into a compound annual growth rate of 12.8 percent. Amid this increase in size, parking operators are constantly looking for ways to cut down operating cost and manpower to stay competitive in the market. As a result, they turn to technology, which helps them achieve two primary objectives: security and more efficient management.

34

SECURITY ENHANCEMENT Public parking lots are prone to theft and other criminal activities during nights or off-hours. “According to US government statistics, more than 7 percent of the nation’s violent victimizations and more than 11 percent of property crimes takes place in a parking facility,” said John Mosebar, VP of Marketing at Aiphone. “And surveys show one-third of drivers cite security as a top factor in choosing where to park their vehicles.” Advanced video surveillance, access control, and license plate recognition (LPR) technologies can help


monitor who goes in, what happens in the lot, and who gets out. When combined with LPR, the parking barrier can deny suspicious vehicles at the outset. “The barrier can easily be connected to either an electric switch contained inside a license plate recognition camera or a separate controller which can activate the barrier no differently than the method by which doors are controlled for buildings,” said Larry Reed, CEO of ZKAccess. “License The use of advanced video surveillance, access control, and LPR technology can help monitor who goes in or out and what happens in public parking lots. plate recognition software can be programmed with ‘blast lists of suspicious plates,’ which will then send a notification to a designated authority.” LPR, meanwhile, can combine with facial recognition to see whether people n o p coming in and getting out on the same vehicles match. “By LPR technology and snapping pictures, the system can easily compare the vehicle plate number with the driver’s face,” r q s said Pauline Yen, Director of n Todd Brodrick, Southwest US Director, Pelco by Schneider Sales and Marketing at Afidus. Electric o Maarten Mijwaart, GM, Nedap Identification Systems “This is to make sure the driver p John Mosebar, VP, Marketing, Aiphone q Larry Reed, CEO, ZKAccess is the vehicle’s owner, not a thief.” r Dave Tynan, VP, Global Marketing and Sales, MicroPower If something happens inside the lot, Technologies s Pauline Yen, Director, Sales and Marketing, Afidus for example drivers being attacked or cars being stolen or damaged, the victim can turn to video surveillance, which and changing environments. To get is an effective tool for monitoring and the best optical performance you need to have a chipset technology documenting incidents. that addresses the key environmental “In commercial applications and educational facilities, identifying the pinch points of traffic challenges: WDR, low-light performance, movement is key in gathering specific forensic and anti-blooming,” said Todd Brodrick, evidence of auto descriptions, license plate detail, Southwest US Director at Pelco by Schneider Electric. “Depending on lens and potentially, even individual profiles. Having size, the camera should be mounted surveillance at these ingress/egress points captures overhead or to the side with line of site inbound suspicious targets as well as outbound perpetrators. Auto break-ins can be captured and time/date recorded with surveillance, at 30 degrees horizontal with a detection range from 15 feet to 100 feet depending and the detail of outbound vehicles and identity can be validated in on lens size.” the United States with state license bureaus,” said Dave Tynan, VP of Added Tynan: “Options such as Global Marketing and Sales at MicroPower Technologies. “The most recommended cameras for this type of installation integrated solar and wireless surveillance cameras can be very quickly deployed. are high-resolution/HD cameras that can adapt to challenging

35


Smart, Speedy, and Stylish:

Turnstiles

Integral Part of Visitor Entry Control BY William Pao

Visitor entry control encompasses many elements. From barricades in parking lots to turnstiles in lobbies, these devices serve as barriers to keep outsiders at bay. This article focuses mostly on turnstiles for office buildings, where users look for security, speed, and aesthetics in their products.

DECEMBER 2015 Ć” www.asmag.com

40


If the turnstile needs integration with the access control system to perform more functions, we can make the integrated solution in advance. SMART AND PROTECTIVE Security is the first thing users look for when purchasing turnstile products for their office buildings. “Prevention of tailgating and piggybacking is the number one objective. The overall goal is to allow authorized users to enter, while controlling unauthorized users from passing undetected,� said Mark Perkins, Enterprise Accounts Sales Manager at Boon Edam. Sensors and other sensing mechanisms such as infrared beams are employed on modern office turnstiles to detect tailgating, piggybacking, or other forms of unauthorized entry such as turnstile-jumping, which is easy with turnstiles 1.2 meters in height. Once such activity is detected, an alarm is sent to the command center or to the security guard who can then check what is going on. According to Patrick Lim, Director for Group Sales and Marketing at Ademco Security Group, advances in sensors are expected to make office turnstiles even more intelligent. “We are expecting various sensor technologies to detect size, shape, direction, color, and tailgating. Together with various identification technologies, they form an advanced method of identifying and controlling large crowds,� he said.

Authentication Factors The office building turnstile grants or denies entry based on the input from the reader, which can be based on cards or biometrics. In certain western countries, 3D facial recognition is used to process people faster. “Users are granted entry if 60 to 70 percent of their facial features match,� said Alex Lin, International Sales Manager at Goosafe Security Control. “People can pass by at walking speed.�

From the turnstile vendor’s perspective, the type of authentication technology used rests upon the user. “It is generally the end user that will specify these,� Smith said.

Employee Safety In the event of an emergency, office turnstiles also have egression features to allow timely evacuation of employees. “Certain regions, for example the European Union, require that all gates be switched to the open mode in the event of fire or power outage, which may indicate fire,� Lin said. “After the situation has been rectified, the turnstile system will get back to normal.�

SPEED MATTERS During morning or evening rush hours, the last thing the building manager or employees want to see is a long line of people in front of the turnstiles waiting to get to the other side. Throughput, or the rate at which people are accurately processed, is therefore another key component in a turnstile. “Throughput requirements are always critical and are impacted by the following: current building occupancy levels, maximum building occupancy loads, employee work flows, and elevator banks and waiting area capacities,� said Perkins. In general, an office building turnstile can process anywhere between 30 and 60 people per minute. “The morning and

Installation Challenges

DECEMBER 2015 Ć” www.asmag.com

According to Tony Smith, Sales and Marketing Manager at IDL, turnstile installations in new office buildings are the easiest since the cable containment and fixing requirements can be considered at subfloor level. “Most challenging are retrofits or perhaps buildings of significant architectural or historic value,� he said. “Where changes or additions to the building fabric are not possible, we have a freestanding system of installation which will not damage a current building, but facilitate a clean, functional, and secure installation.�

42

According to Mark Perkins, Enterprise Accounts Sales Manager at Boon Edam, when it comes to installation, the following elements should be looked at: = " > " ality with sensor alignments, and for architectural site lines for barrier types. = "(

>

an X-ray on the area of floor for installation. Core drilling through the existing floor should go without interfering with the subfloor mechanicals and maintain the ceiling appearance for the space below. = 1 > . "(

' you are required to create a trench for the power, interconnects, access control, and fire alarm conduits and cabling.


The global economic lan dscape is shifting rapidly in favor of Asia. For or th the seeccurity industry, th e contin nentt has become the fas test growing market in the w orld. With about 60 perc ent of the glob obal population and sev eral d deevvello oping coun op untr tries, th hee rreegion ha h as beco om me unavoidable for maj or globa bal sso olu ol uttio ion on p prro o ovid derrss. BY Prasanth Aby Thomas

DECEMBER 2015 Ć” www.asmag.com

46


he security industtry enter ered ed d 2015 with stron ng n g antit cciipa p tion of teech chno nolo ogi gica caal aad dva v ncemen nts ts o er ov erssh had adow owed ed by co conc con ncer nce erns erns ns o off ec econ o om omiic ic glo loo om m. TTh he ye yea earr 2201 0 4 ha 01 had en had ende ded o on n a rat a he h r po posi sititive si ve notte afte af ter sp po orad or radic icc ssig ign ig ns of ec ns eco onom omic icc g gro ro owt wth fr fro om o m the euro eu rozzonee aan nd d eme merg rgin ng ma m rkketts liike ke Ind dia ia heellpe ped tto o offset weak weak akne nesss in in Ch Chin ina.. FFor or As Asia iaa alone, a t e ex th expe pect ctat atio at ions wer io ere skyy hi high gh. h. Ac A corrdin rd ng to rd the th hee As A ian iaan De Deve velo lopm opm p en e tB Baank nk ((AD AD A DB) B),, develo lopi piing ng cco ount oun ntriees ntri es in the reegi th gion on n wou ould exp xpand d att about utt 6.33 per u erce cent ce nt tthr hrou hr o gh ou h 201 0 5 015 and aan d 20016. 16 In n lin line with thi his, s, ssever eraaall eemerging g As Asia i n eeccon ia onom omie iess haave h ve b been n pu pushi shiing sh g fo forr fu urthe rtth r u urrbaan nizaatitio ni on, in on, i crreeaasi s ng sing g public speend pub nding on n ve verti rtitica ticcalss succh as pub ubliliic tr traan tran nsp por o t an and in nfr fraastruc uctu turee. On n the he teecchnol hn nolog ogyy si side de too tthe h ree wer ere ree seveeraal facttor orss to o look fo for orwa w rd wa d to. Que uestio ons o ns a& a&s ha had as aske ked dm major in ind du ustry stttry ryy play pl ayer erss att the beginnin ng n g of of 220015 15 h had ad poiint nted eed d tow owar war ard d expecta tattions ns o of inccreea easeed demand d for IP tech chn hn no olo ogy gy gy, iin nte tegr grat ateed, ed, to tota tall sso olu ution on ns, aand nd cclo oud-b bas ased ed,, mo mob ob bile bile sservvic ices es.. T e conc Th nce cept of th he IInt nter erne n t of Things (IoT)) wa wass alsso al o gaining mo momeen mom ntu tum m then, along g wi with th the idea of cco onn o n neected de d vice vviicees sp sspread over small areas to becomee ssmartt ho omes aand d larg ge ar areas tto o bec e omee sm smar a t ci ar citities cit es. Th This i was as ant nticipated pa d to t pavvvee waay forr mo more re ssol olut utio ion--orie ion-or o ien or ient nted nted d aapp pp prro roac oache hess th t at w uld breaaak th wo the bo boun bou unda un nda d ririees es o off tr trad a itio iona naal ap appl plic i at ic atio ions ns and d merrg gee with wi th n nei eigh ei ghbo gh oring riing n ssec eccto tors tors rs. Bu ut lo load adeeed witith ad h such h exp xpectation xpe ons, s, h how ow did the he year actually ly faare re? Ha H vi v ng g see een th thee ye year arr tthr hro rou o gh gh, wee went back to industryy play pl pla ayer erss an and d aan naal alys ysts ts tto o un unde ders de r ta rs tan and d theeir take on how things un nfo fold ld ded ed.

REGION REGI ON-S -S SP PECI PE CIFI FIC C FA F CT TORS CO CONT TRIIBU UTING G TO GROW WTH WT Industry pllaayeers across the board agre ag ee th t e Assian security market has cco onttinued to see strong gro owth h in 2015. Magnus Zederfeldt, Re Regio ional Director for South h As Asia A ia Pacific P at Axis Communiccatition ns put this in concrete teerm r s, giving ing his company’s est stim mated market expansion figures.

“We feel th he demand is sttrron ong in all of South and So d So Sout uthe heast st As Asia for our smartt safe sa afe fetyy pro odu duct cts, s,” Z Zeede derf rfel eldt dt sai aid d. “In geen gen nera ne raal th her ere is is an ex expe exp pectattio pect ion of more th han an 200-perc perccen pe ent ma ent mark rket gro rowth fo or sm smart IP sso IP olut ol o luttio ions.” ion Seve Se vera rall rese sear arch ch repor ep por o ts too o point to o th hee reg gio ion n as tthe hee ffaasteest st g gro rowi wing ng aam mon ong glob obal baall marrkets keet . A Accco cord rdiing tto o Tran TTr a sp an s arren ency cy Mar arkket Re Rese sear arrch ch, th thee Assia ia P Pac acifific ic phy hysi siccaal se secu uririty ty m maar arket ket is p oj pr ojec eccted d to t see g grrowt wth at a C CA AGR of 117 p rc pe rcentt fr from m 22013 to o 2019. A rrep e or ep ortt fr from m Micro Mark Market Ma et Mon onitittor saaiid tth he regi gio on’s periririm pe meteer se secu curirity cu ty m mar arrke kett woul uld exxpa pand nd at a CAGR of 11. at 1.33 pe 1. p rc rrcen cen e t fr from om 220144 to 2019 20 019. But give But ven n th he d dive vers rsee natu natu na ture re o off maark r et ets ts in n thiss regi gio on n, th he fa fact ctor orss drivvin ing g gr g ow wth t vaaryy. No Not all Not a l As al As n econ Asian onomiees aree grrow owin ing ng at a thee sam me pa pace ce,, no nor are thei eeiir seecu uriittyy req quiire reme m nt me nts the same m . Harish sh Veelll at at, GM of As Asia ia Paciffic i att Ho Hone neyw yw weelll Fire aand Fi nd d Seeccur u ity, hin nte ted d att thi hiss as hee poin po inte ted d out th hatt a num umbe berr of ttre rend re nd ds aree driivin dr ing th he strong stt ng gro owtth seen in Assia ia. “TThe hese se iinclu ude rraapid du urb rb ban a ization n amo ong on o g coun ntr triiees in the reg egio ion, io n ong ng going grow owth th in thee mi midd ddle le class ss, conttin inued industrial alization, wid ides espr prea ead d pe pene netr trat atio ion n of mobililee IIn ntern net app plilicaatition on ns, s, aand n incre crease sed inve vest stme m nts being made in in nfras astr str trructure, su uch h as highways, airp rports,, and seeapo ports,” Vella llaat sa said id.. He add dded ed ttha hatt countries likee Vietnam Vie am and Indones esia ia have been experiencin iing good growth iin n the year. Subhranshu Sekhar Das,, VP V and Prrac actitice Head for Aerospace rospace, Defense,

47


Choosing the Right Type of

Wireless Systems for City Surveillance By Israel Gogol, Freelancer

The need to prevent crime, detect events, and investigate them has always been a concern for cities. The availability of cheaper and better cameras allows cities to deploy cameras, license plate recognition (LPR), and other systems to ensure the safety of citizens. Apart from deploying cameras, cities must also take into account the best way to connect cameras and other systems with command and control centers. This article discusses some of the available solutions for cities wishing to deploy wireless networks for surveillance.

WIRELESS OR FIBER

DECEMBER 2015 Ɣ www.asmag.com m

One of the first questions rega regarding projects is network design for safe city proj the availability of fiber optics or wireless networks. “The choice between fiber and wireless varies widely by cit city. In some cases it is 100-percent fiber, fibe in others, it is 100-percent wireless wireless. If fiber is already at a location, the cost of using it is low, however, if it is not generally available, then wireless is genera economical chosen as it is the most econom and fastest to deploy,” explained Greg Management Friesen, VP of Product Managem at Dragon Wave. “Both technologies technolo carry standard-based Ethernet traffic, t and can fully interop with one another. a The depl deployed ploy oyed ed architecture ultimately ultim is selected selecteed based base ba sed d upon upon the th budget and required service levels servi vice ce llev evel e of the municipality.” There are of course cours rsee several sev other othe ot herr factors he fact fa ctor o s that or that a affect affectt this decision. example de ecision on. FFor or ex exa ample if the aapplication ap plicattiio pl on is iintended nten for monitoring fo or lillive vee monit ittorin recording or rrec ecor ec ordi or ding di ng aand nd d post-event post po s -eevent investiinv gation, ga ati tio on, the location on, on cameras of tthe of he ccam special aand nd sp peecc ccircumstances ci irccum u off tthe o th he area he ((e.g., (e.g (e e g., densely populated po p opu area ar eeaa with

52 52


high interference or old building which cannot be changed to install infrastructure). In practice, in most cases a combination of the two is being deployed with a slight advantage for wireless networks. “For the more common ‘open space’ application, we are seeing both fiber and wireless being used to cover different parts of the city. It is not often an ‘either-or’ decision although we can point to a handful of cases where the city has either a fiber-only network or wireless-only network,” said Pervez Siddiqui, Director of Strategic Markets at Genetec. “There are some cities which have built their own fiber rings or lease this infrastructure from third-party providers like telecom companies. Some more progressive cities are breaking down silos within their city government to leverage the fiber backbone for their traffic systems in central business district (CBD) areas. As far as wireless is concerned, many cities have built out wireless networks. More often than not, we see mesh networks at the street level and wireless point-to-point or fiber for backhaul. In the more mature markets, we see a lot more wireless outside of the CBD areas.” Olivier Nitre, VP of Sales and Products for Video Security and Information at Teleste voiced a similar opinion. “In the large cities of the western countries, the wireless is rather used for the last mile (or last hundred meters) most frequently because there is already some sort of pre-existing network (or at least some easy way to install/use fibers). As for the small-sized cities, a fully wireless network can frequently be deployed,” he explained. “The best way to balance both aspects, the cost effectiveness of wireless and the bandwidth advantage of fiber, is probably to use a fiber trunk everywhere possible, and use pointto-point links — short distance — to aggregate cameras to the system,” Nitre added.

WHAT TYPES OF WIRELESS TO CHOOSE?

The most significant disadvantage with Wi-Fi results from the fact that it uses an unlicensed spectrum.

Aluisio Figueiredo, CEO, Intelligent Security Systems

Wireless networks are cheaper to deploy than a wired network, however they come with several constraints. Bandwidth can fluctuate; some network topologies like mesh networks require a high degree of technical expertise and the growing demand for bandwidth (due to ever-increasing camera resolutions) can make a wireless network under-sized during the system’s life cycle. The choice of the right infrastructure is therefore very important. “We see three tiers in wireless communications for video surveillance. Tier 1 refers to low-end, low-cost solutions based on Wi-Fi standards. Their major benefit is their relative low cost which makes them a favorite among integrators who can earn good margins selling them. This type of solution is mainly suitable for short-range point-to-point communications where the number of cameras connected is relatively low,” said Yossi Nissan, Director of Product Marketing at Radwin. “In some regions, we see that mesh-networks are more popular. This is a mid-tier solution suitable for linear installations (such as avenue); mesh architecture allows data to flow through the network even if one of the links fails. However, it has major downsides: it has unpredictable latency resulting in variable video quality and it is very difficult to configure properly and requires a high level of expertise,” Nissan added. “In the high-end part of the market are the point-to-multipoint products that offer guaranteed bandwidth per camera site. These are the solutions that guarantee that city surveillance is put to good use. The cameras and the video management software (VMS) system are the ones that determine the video quality; however, if you invest millions in cameras but choose Fiber optics has the advantage of greater bandwidth, but is more difficult and costly to install compared to Wi-Fi, often resulting in combination fiber-wireless solutions.

Greg Friesen, VP, Product Management, Dragon Wave

Yigal Leiba, CTO, Siklu Communication

53


How Alliances Benefit Security

Systems Integrators

Strategic alliances are relationships between businesses meant to create value in a mutually beneficial way. In the security industry, alliances involving manufacturers are common, but for integrators there are only a handful of alliances. Integrator alliances are a good way for mid-size integrators to grow and differentiate themselves from “big name” brands. We reached out to them to learn what they see as the major benefits of this form of cooperation. BY Israel Gogol, Freelancer

DECEMBER 2015 Ɣ www.asmag.com

strategic alliance is a relationship linking two or more organizations meant to create and capture value through mutually beneficial sharing of technologies, skills, products, markets, etc. Alliances can turn potential competitors into allies and help small and medium-size players leverage the size of the whole network. Airline alliances such as Star Alliance or One World are quite well-known. In the security industry, partner programs are the most common example of alliances. Either in the form of a technology partnership where different companies work together to develop a new product (e.g., an analytics company working together with a VMS vendor) or a channel partnership — of a manufacturer working together with distributors. a&s reached out to two integrator alliances to hear about their thoughts about this form of cooperation and its usefulness for systems integrators (SI). We spoke with Bill Bozeman, President of PSA Security Network, and Alan Kruglak, President of National Security Integrators and Principal of Genesis Security Systems. PSA Security Network is the world’s largest electronic security cooperative. As a cooperative, it is owned by the SIs themselves. The company is owned by 130 integrators

56

In the U.S., most members of integrator alliances are mid-sized companies with revenue of US$8 to $12 million a year.


in the U.S., Canada, Mexico, and Puerto Rico. National Security Integrators is a network of 15 integrators in the U.S. and Canada. Even though these alliances are different in size and governance structure, the benefits they see are similar.

Bill Bozeman, President, PSA Security Network

THE BENEFIT OF ALLIANCES There are three approaches to acquiring new capabilities: build, buy, or borrow. Businesses can acquire new

capabilities through internal development using their own internal resources or using consultants (build); they can acquire another company that has the desired capability (buy); or they cooperate with other firms to build the new desired capabilities (borrow). Building your own capabilities requires resources which might be out of reach for small and mid-size integrators, and even if the company has money, buying another business often leads to acquiring more than is wanted or needed. Alliances are therefore a sensible alternative for an integrator wanting to access the capabilities they need, whether to extend their reach or benefit from group buying size.

WHEN DO INTEGRATORS SEEK ALLIANCES? Alan Kruglak, President, National Security Integrators

In the U.S., most members of integrator alliances are mid-sized companies with revenue of US$8 to $12 million a year. In this stage, many companies reach a point where further growth/development is constrained by specific capabilities difficult to develop on their own. For security integrators developing markets in new locations is the main driver for seeking alliances with other integrators. Dealing with national accounts is lucrative for integrators but can be a stretch of their financial abilities and personnel.

57


MULTIFUNCTIONAL SENSORS SEARCH FOR NEW APPLICATIONS AND VALUE By a&s SMAhome

A multi-functional sensor or detector is one that integrates multiple sensors. Applications of multi-functional sensors can be found in environmental safety and security, health care, indoor air quality monitoring, or outdoor weather forecast and gardening. The basic models integrate temperature and humidity sensors for indoor climate control. Thanks to hardware improvements, smart algorithms, and support for remote control from the smartphone, more and more sensor types can be integrated into one multi-functional sensor for both indoor and outdoor uses.

DECEMBER 2015 Ɣ www.asmag.com

S

mart home sensors are categorized into singlefunction and multifunctional sensors. The former belongs to the mainstream market with competitive unit prices and large sales volume; the latter, called “hybrid sensor” by some makers, belongs to the niche market for the early adopters. In recent years, there has been an increasing demand for multi-functional sensors to address needs from emerging applications.

62


Jason Aramburu, CEO, Edyn

Lars Felber, PR director, Elgato

Phil Smith, Chief Marketing Officer, Halo Smart Labs

Ales Spetic, CEO, CubeSensors

Arthur Chu, Senior Director of Sales & Marketing, Philio

Fred Potter, Founder and CEO, Netatmo

Bengt Rittri, CEO and Founder, Blueair

Ewa Bujak, PR Manager, Fibar Group

Jacques Touillon, CEO, Airboxlab

Elgato PR Director Lars Felber said, “The sensor is a great entry-level solution for smart home beginners as they work similar to a fitness tracker. Users can gather information about their home and make smart decisions to improve their comfort.” Daniel Dykes, Director of Business Development at Aeon Labs said, “Aeotec’s customers and the broader market are demanding multi-functional devices. You can expect that trend to become mainstream. For instance, smart LED bulbs offer more than just lighting.”

develop smaller devices with multiple built-in sensors for the connected home. Wulain's new product Dream Flower, works as a network router and control center, and it integrates environmental sensors, including temperature, humidity, CO2, PM2.5, and noise sensors. Jennifer Ren, Overseas Marketing Sales Manager at Wulian (Nanjing IOT Sensor Technology) indicated that it’s a trend to combine multiple sensors into one device in the smart home space.

BEYOND SECURITY PURPOSES

DATA ANALYSIS PROVIDES VALUE

Previously, smart home sensors were designed for home security and automation applications. In the coming years, there will be more of a convergence in the design of these two applications. The combination will deliver more valuable products, offering benefits like energy cost savings. Moreover, we can see application-driven products that incorporate multiple sensors to achieve more precise detection and full functions, and to offer added value for customers. Ewa Bujak, PR Manager at Fibar Group said, “There are a number of reasons why Internet of Things (IoT) should be brought into the houses. One important reason is for safety and comfort. For us, at the moment, the most important thing is to allow the elderly and disabled people to live dignified lives on their own.” “The security benefits from a device that offers motion and vibration sensing are obvious. We have one company in Australia using MultiSensor 6 to drive a powerful energy saving system where electronic windows, curtains, dehumidifiers, and air conditioning units are all controlled by MultiSensor 6. This particular system aims to cut down on expensive air conditioning use by layering wind forecasts with MultiSensor 6’s temperature, UV, and humidity readings to create natural air flow and cooling systems in a home,” said Dykes of Aeon Labs. Aeotec MultiSensor 6 is a motion sensor capable of powering a connected home’s security or ambience needs by integrating temperature, light, humidity, UV, and vibration sensors. The tiny device measures only 4 centimeters in width. Dykes believes the ultimate trend is to

Besides hardware improvement, it’s essential to effectively collect and analyze data as well as related services to create true value. Ales Spetic, CEO of CubeSensors said, “It’s not just by adding more sensors, that’s usually the easy part. At CubeSensors, we spend a lot of time figuring out how to make use of the data that’s collected, which is a challenge any device with sensors has to face.” Jacques Touillon, CEO of Airboxlab said, indicated that indoor air pollution is complex. He thinks the most interesting trend would be the deployment of a sensor network to provide more precise measurement on granularity as well as the sources of pollution. Touillon said, “Outdoor pollution is both less complex to monitor and different from indoor pollution. Furthermore, there is already a lot of existing and available data for the outdoor pollution. Therefore, instead of recreating another outdoor sensor array, we will collect existing data and use them as the benchmark for our indoor products.” CubeSensors connects data from existing sleep trackers people already wear like Fitbit and Jawbone UP with environment data collected from CubeSensors in bedrooms, enabling users to have better sleep quality and stay healthy. The product helps users find the right balance between temperature and humidity by reminding them when to open the windows along with suggestions on proper ambient conditions like lighting and noise. Besides collecting and analyzing data from the devices or cloud server, the markers work with third-party devices to

63


SMART SENSOR MAKERS’

MULTIPLE SALES STRATEGIES By a&s SMAhome

DECEMBER 2015 Ɣ www.asmag.com

I

n regards to sales channels, there are multiple ways for B2B suppliers to distribute their products through OEM/ ODM business or project cases. Service providers like telcos and utility companies, real estate developers, distributors, dealers, and system installers are major B2B customers. For B2C suppliers, they sell products through online

66

and physical retail stores, including connected-home dedicated stores, electronics retailers, and retailers like Walmart in the U.S., Dixons in the U.K., and Media Markt in Germany, general online stores such as Amazon, and bricks-and-mortar retail stores such as Staples, Lowe’s, and Home Depot. HomeKit-compatible products are available at the Apple Store. For small-scale companies and startups,

online sales channels are useful and can help them evaluate consumers’ feedback. Talking about the market drivers, Stéphane Jaubertou, COO of Sevenhugs thinks that retail branding companies (retail brandslike Nest, Withings, Netatmo, and Apple) are major drivers; while, service providers follow the retail market leaders. Jaubertou sees the smart home


Photo courtesy of Apple Inc.

visibility for hardware startups. He said, “We started with pre-orders on our website and then expanded the sales on Amazon.com. I think it is a great channel for startups when they are still very focused on improving the software part of the device. Also, we conducted a few first market tests in the U.S. with startup-friendly stores like Brookstone.” Touillon thinks average consumers need to see, touch, and feel the products, and get explanations from the seller, as well as be convinced. He thinks online channels are suitable for early adopters and retail channels are ideal for the mass market. CubeSensors sells its products directly through its own website. Its customers come from the United States and Europe. Ales Spetic, CEO of CubeSensors said, “We’ve already tried some other online channels, including Amazon.com in the U.S. with limited quantities. We are eventually planning to move into physical stores, and to work with distributors. That’s certainly a necessary strategy when our sales grow at scale and our product has mainstream appeal.” The startup company Edyn sells its products on homedepot.com and in Home Depot brick-and-mortar stores across the U.S., in addition to its Kickstarter backers in a number of countries. The company has future plans for expanding product distribution to outside of the U.S.

REBRANDING OPTIONS market changing in France. “Though the professional installation market is bigger, the DIY retail market has been growing and may surpass the professional installation market shortly in a few years,” said Jaubertou. Fibar Group provides Z-Wave solutions under its own brand Fibaro to service providers, telcos, utilities, system installers, and real estate developers. The company also

utilizes retail channels for distribution. PR Manager Ewa Bujak said, “The majority of plug-and-play devices are sold to service providers, telcos, utilities, and through retail distribution channels.”

SIGNIFICANT ONLINE SALES Jacques Touillon, CEO at Airboxlab thinks the online retail channel is ideal for getting pre-orders and

Aeon Labs, rebrands its Z-Wave products to its customers, including service providers and security system customers. Daniel Dykes, Director of Business Development of Aeon Labs said, “At least 40 percent of our customers choose to rebrand our products. Our products have long been utilized by premium-tier telcos and utilities such as AT&T, rebranding is now an option pursued by even the most boutique and niche of platforms,

67


CORPORATE NEWS FLIR Systems Acquires DVTEL for US$92 Million Canon India Steps Into Surveillance Domain With New Intelligent Network Cameras &DQRQ ,QGLD KDV VWHSSHG LQWR WKH VXUYHLO ODQFH GRPDLQ ZLWK WKHLU QHZ UDQJH RI LQWHOOLJHQW QHWZRUN FDPHUDV 7KH SRUWIROLR ZLOO FRPH LQ IRXU VHULHV L H 6 VHULHV + VHULHV 0 VHULHV DQG 5 VHULHV RI QHWZRUN VXUYHLOODQFH FDPHUDV ZKLFK ZLOO LQFOXGH ERWK LQGRRU DQG RXWGRRU FDPHUDV XQGHU WKUHH FDWHJRULHV L H 37= IL[HG GRPH DQG IL[HG ER[ 7KH QHZ KLJK SHUIRU PDQFH QHWZRUN FDPHUDV DUH IRU D ZLGH YDULHW\ RI LQGRRU DQG RXWGRRU HQYLURQ PHQWV LQFOXGLQJ UHWDLO FLW\ VXUYHLOODQFH DQG FULWLFDO LQIUDVWUXFWXUH PRQLWRULQJ . %KDVNKDU 93 RI %XVLQHVV ,PDJLQJ 6ROXWLRQV 'LYLVLRQ DW &DQRQ ,QGLD VDLG |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}

DECEMBER 2015 Æ” www.asmag.com

70

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|)/,5 V VWURQJ SRVLWLRQ LQ WKHUPDO LPDJLQJ WRJHWKHU ZLWK '97(/ V H[WHQVLYH YLGHR DQDO\WLFV DQG 906 FDSDELOLW\ ZLOO SRVLWLRQ XV ZHOO WR RIIHU GLIIHUHQWLDWHG DQG KLJKO\ DFFXUDWH SHULPHWHU VHFXULW\ VROXWLRQV IRU WKH XSSHU FRUQHU RI RXU VHFXULW\ VHJPHQW V SURGXFW YDOXH ODGGHU } VDLG $QG\ 7HLFK 3UHVLGHQW DQG &(2 RI )/,5 |'97(/ DGGV D VXLWH RI SURIHVVLRQDO JUDGH VHFXULW\ VRIWZDUH DQG KDUGZDUH WKDW LV YHU\ FRPSOHPHQWDU\ WR RXU FXUUHQW VROXWLRQV DQG ILWV YHU\ ZHOO ZLWK RXU VWUDWHJ\ WR RIIHU HQG WR HQG VROXWLRQV LQ WKH HQWHUSULVH DQG LQIUDVWUXFWXUH VHJPHQWV RI WKH VHFXULW\ PDUNHW } )/,5 DQWLFLSDWHV WKLV WUDQVDFWLRQ ZLOO EH QHXWUDO WR QHW HDUQLQJV DQG DFFUHWLYH WKHUHDIWHU

Technical Experts Gather at ONVIF’s Developers’ Plugfest to Test for Interoperability 219,) WKH OHDGLQJ JOREDO VWDQGDUGL]DWLRQ LQLWLDWLYH IRU ,3 EDVHG SK\VLFDO VHFXULW\ SURGXFWV KRVWHG LWV WK 'HYHORSHUV’ 3OXJIHVW 1RYHPEHU WR DW 'DKXD 7HFKQRORJ\ LQ +DQJ]KRX &KLQD :LWK PXOWLSOH WHVWLQJV RI 219,) FRQIRUPDQW SURGXFWV WKH 'HYHORSHUV 3OXJIHVW LQFOXGHG LQWHURSHUDELOLW\ WHVWLQJ IRU WKH UHOHDVH FDQGLGDWHV RI 3URILOH 4 DQG 3URILOH $ ZKLFK DUH ERWK VFKHGXOHG IRU ILQDO UHOHDVH LQ 7KLV 'HYHORSHUV 3OXJIHVW JDYH PHPEHU FRPSDQLHV WKH RSSRUWXQLW\ WR YHULI\ WKHLU SURGXFWV’ 219,) LQWHURSHUDELOLW\ ZLWK SUDFWLFDO KDQGV RQ WHVWLQJ 7HVWV LQFOXGHG WKRVH ZLWK RWKHU PDQXIDF WXUHUV SURGXFWV DQG DOVR XVHU VFHQDULR WHVWLQJ WR VLPXODWH UHDO ZRUOG XVH RI 219,) V SURILOHV

219,) KHOG LWV ILUVW HYHU &OLHQW 7HVW 7RRO &OLQLF DW WKH 1RYHPEHU JDWKHULQJ ZKLFK DOORZHG FOLHQW PDQXIDFWXUHUV WR PHHW ZLWK WKH YHQGRU IRU 219,) V &OLHQW 7HVW 7RRO LQ SHUVRQ DQG LQGLYLGXDOO\ ,Q DGGLWLRQ WR WKH 5HOHDVH &DQGLGDWHV RI 3URILOH 4 DQG 3URILOH $ 3URILOH 6 IRU ,3 EDVHG YLGHR V\VWHPV 3URILOH & IRU ,3 EDVHG DFFHVV FRQWURO DQG 3URILOH * IRU HGJH VWRUDJH DQG UHWULHYDO ZHUH DOVR WHVWHG DW WKH 'HYHORSHUV 3OXJIHVW

The fall Plugfest drew 57 technical expert attendees from 25 companies from around the world and attendees logged more than 260 hours of total testing time during the three-day event, with all of ONVIF’s profiles tested for interoperability.


Honeywell Security Group Merges With Honeywell Fire Safety Businesses

Bosch Sets Up New Company for Smart Home %RVFK LV VWUHQJWKHQLQJ LWV EXVLQHVV LQ VROXWLRQV IRU WKH VPDUW KRPH )URP -DQXDU\ WKH QHZO\ IRXQGHG VXEVLGLDU\ 5REHUW %RVFK 6PDUW +RPH ZLOO EULQJ WRJHWKHU WKH FRPSDQ\ V VPDUW KRPH DFWLYLWLHV LQFOXGLQJ UHODWHG VRIWZDUH DQG VHQVRU V\VWHP H[SHUWLVH %RVFK V VPDUW KRPH VROXWLRQV DUH DLPHG DW D JLDQW PDUNHW DFFRUGLQJ WR PDUNHW H[SHUWV E\ DORQH VRPH PLOOLRQ KRPHV ZRUOGZLGH z DOPRVW SHUFHQW RI DOO KRXVHKROGV z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

Video Surveillance and VSaaS Market Forecast to Grow 16 Percent by 2020: Report

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

71


Synology NVR216 Features: t % JSFDU Q )%.* PVUQVU GPS NPTU NPOJUPST BOE UFMFWJTJPO t PS DIBOOFM DPOGJHVSBUJPOT BWBJMBCMF t &YQBOEBCMF UP 5# TUPSBHF XJUI BO FYQBOTJPO VOJU t &OFSHZ FGGJDJFOU ‰ CFMPX 8 XIFO GVMMZ MPBEFE BOE SVOOJOH t 'SFF NPCJMF BQQ PO J04 BOE "OESPJE

Å‚ Synology/Taiwan Å‚ Email: jeffreyh@synology.com

WavestoreUSA E4X Video Storage and Management Server

Axis Q1941-E Thermal Network Camera

Features:

t 0 GGFST Y UIFSNBM SFTPMVUJPO t 4VQQPSUT FMFDUSPOJD JNBHF TUBCJMJ[BUJPO &*4 UP SFEVDF UIF FGGFDU PG WJCSBUJPOT t 4VQQPSUT "YJT ;JQTUSFBN XIJDI MPXFST CBOEXJEUI BOE TUPSBHF SFRVJSFNFOUT t $BO CF JOUFHSBUFE XJUI PUIFS *1 TFDVSJUZ FRVJQNFOU BOE XJUI UIJSE QBSUZ BQQMJDBUJPOT t %FTJHOFE GPS EFUFDUJPO JO DIBMMFOHJOH DPOEJUJPOT

t t t t t t

* 1 SFDPSEJOH VQ UP DIBOOFMT 6Q UP 5# PG SFDPSEJOH TUPSBHF IPU TXBQQBCMF ESJWFT .FHBQJYFM DBNFSB TVQQPSU 3FMJBCMF -JOVY PQFSBUJOH TZTUFN *OUFM QSPDFTTPS UFDIOPMPHZ

Å‚ WavestoreUSA/U.S. Å‚ Email: sales@wavestoreusa.com

Features:

Å‚ Axis Communications/Sweden Å‚ Email: pressoffice@axis.com

Qualcomm Snapdragon 618 IP Camera Features: t DPSF CJU $16 XJUI EVBM ()[ "3. $PSUFY 5. " RVBE ()[ $PSUFY " DPSFT t *OUFHSBUFE 9 -5& XJUI HMPCBM NPEF BOE BEWBODFE DBSSJFS BHHSFHBUJPO VQ UP Y .)[ JO CPUI EPXOMJOL BOE VQMJOL t -5& $BU XJUI TVQQPSU GPS QFBL TQFFET PG .CQT EPXOMPBE .CQT VQMPBE t % VBM JNBHF TJHOBM QSPDFTTPST *41 UP PGGFS TVQQPSU GPS VQ UP .1 JNBHFT BOE , WJEFP XJUI

EFEJDBUFE IBSEXBSF ) BOE )&7$ FODPEJOH PGGFSJOH BT NVDI BT B QFSDFOU SFEVDUJPO JO CBOEXJEUI t 1PXFS NBOBHFNFOU *$ XJUI JOUFHSBUFE BVEJP DPEFD TVQQPSUT FGGJDJFOU CBUUFSZ PQFSBUJPO Å‚ Qualcomm Technologies/U.S. Å‚ Contact: www.qualcomm.com/contact

COSEC VEGA With Battery Backup

IndigoVision HD Interceptor PTZ

Aperio KS100 Server Cabinet Lock

Features:

Features:

Features:

t t t t

t t t t t t

t ) JHI TFDVSJUZ (SBEF BTTFU QSPUFDUJPO XJUI BVEJU DPOUSPM t )BSEXJSFE QPXFS 1P& 7ED PS TUBOEBSE 7ED PQUJPOT t 4'*$ IJHI TFDVSJUZ LFZ PWFSSJEF BMMPXT TFDVSF NBOVBM VOMPDL DBQBCJMJUZ t &BTZ UP JOTUBMM t DZDMFT PG PQFSBUJPO t &BTZ UP NBOBHF VTFS BDDFTT

DDFTT DPOUSPM BOE UJNF BUUFOEBODF " 'JOHFSQSJOU TNBSU DBSE BOE QSPYJNJUZ DBSE w 5'5 UPVDI TDSFFO -$% 1PXFS PWFS &UIFSOFU CVJMU JO 8J 'J NPCJMF CSPBECBOE ( (

t *1 CBTFE EPPS DPOUSPMMFS t VTFST BOE FWFOUT Å‚ Matrix Comsec/India Å‚ Email: customer.care@maxtrixcomsec.com

FODPEJOH ) %FMJWFST Q WJEFP *1 BOE *, SBUJOH 0QFSBUJOH SBOHF PG UP EFHSFFT $FMTJVT NN MFOT *OUFHSBUFE XJUI XIJUF BOE JOGSBSFE MJHIUJOH

Å‚ IndigoVision/U.K. Å‚ Email: sales@indigovision.com

Å‚ Assa Abloy/Sweden Å‚ Email: info@assaabloy.com

73


Enforcer SK-1011-SDQ Access Control Keypad

Hundure HPB-10A/HPB10-E Infrared Exit Switch

Features:

Features:

t 6 Q UP QPTTJCMF VTFS DPEFT EJHJUT

t 1SPHSBNNBCMF FHSFTT EFMBZ BOE PS XBSOJOH t 6Q UP QPTTJCMF WJTJUPS DPEFT QSPHSBNNBCMF GPS POF UJNF PS MJNJUFE UJNF VTF IPVST

t 3FBM UJNF DMPDL GPS QSPHSBNNBCMF BVUP EJTBCMF BDDFTT BU TQFDJGJD UJNFT t 4VQFS VTFS DPEF UP QBVTF PS PWFSSJEF DFSUBJO JOIJCJU GFBUVSFT t 0VUQVU UJNJOH QSPHSBNNBCMF VQ UP TFDPOET BMNPTU IPVST

t / PO DPOUBDU JOGSBSFE EFUFDUT PCKFDUT XIJDI USJHHFST UIF SFMBZ UP SFMFBTF UIF FMFDUSPOJD MPDL t -JHIU DIBOHFT GSPN CMVF UP HSFFO NBLJOH JU FBTZ UP EJTUJOHVJTI XIFO UIF TXJUDI IBT CFFO USJHHFSFE t 4UZMJTI NPEFSO EFTJHO t &NCFEEFE EFTJHO t )1# " GPS 64 TQFDJGJDBUJPO BOE )1# & GPS &VSPQFBO TQFDJGJDBUJPO BWBJMBCMF t *OGSBSFE EFUFDUJPO TJHOBM JT GSFF GSPN SFUSJHHFS

Ĺ‚ Superior Electronics/Taiwan Ĺ‚ Email: info@superior-elec.com

Ĺ‚ Hundure Technology/Taiwan Ĺ‚ Email: overseas@hundure.com

Everfocus EAN7200 Star Light Box IP Camera Features: t w 4POZ QSPHSFTTJWF $.04 JNBHF TFOTPS EFMJWFST .1 SFTPMVUJPO t 'VMM )% Q WJEFP VQ UP GQT t 5SJQMF TUSFBNT GSPN ) ) BOE . +1&( t 6MUSB MPX MJHIU t 5SVF EBZ OJHIU GVODUJPO Ĺ‚ EverFocus Electronics/Taiwan Ĺ‚ Email: marketing@everfocus.com.tw

Dahua SD40212T-HN 2 MP Full HD 12x Mini Network PTZ Dome Camera Features: t 1 PXFSGVM Y PQUJDBM [PPN t 4VQQPSU EVBM TUSFBNT FODPEJOH t .BY GQT BU Q Y BOE GQT BU Q SFTPMVUJPO t 8%3 EBZ OJHIU *$3 %/3 % % BVUP JSJT BVUP GPDVT "8# "($ #-$

t .BY EFHSFFT QBO TQFFE EFHSFFT DPOUJOVPVT QBO SPUBUJPO t 6Q UP QSFTFUT BVUP TDBOT UPVST QBUUFSOT

Ĺ‚ Dahua Technology/China Ĺ‚ Email: overseas@dahuatech.com

DECEMBER 2015 Ć” www.asmag.com

OB-DN7126 HD Network Dome Camera

Video-Tech DMR11S Video Door Station

Features:

Features:

t . JOJNVN JMMVNJOBUJPO MVY DPMPS MVY 8 # MVY XJUI *3 t 4 NBSU USBDLJOH &*4 EFGPH t . JDSP 4% NFNPSZ *1 1P& t 6 Q UP ¨ IJHI SFTPMVUJPO t Y PQUJPOBM [PPN Y EJHJUBM [PPN t NFUFS JOGSBSFE EJTUBODF

t " 34 WJTVBM EFHSFF IJHI SFTPMVUJPO DBNFSB t -BSHF DBQBDJUZ NBYJNVN BQBSUNFOUT WJB #%6

t $PNQBUJCMF XJUI BMM %5 XJSF TZTUFN NPEFMT t %JWFSTF NPEVMF DPOGJHVSBUJPOT t 3FMJBCMF QSPYJNJUZ BDDFTT t *1 QSPUFDUJPO SBUF

Ĺ‚ OB Telecom Electronics/China Ĺ‚ Email: overseas@obtelecom.com

Ĺ‚ Guangzhou Video-Tech Electronics/China Ĺ‚ Email: hebe@v-tec.com.cn

74

asmag.com Product Focus

To view the most updated and complete content for new products, please visit the “Products� section of our website at www.asmag.com, or scan the QR code below! For more information, contact as-pr@newera.messefrankfurt.com


Companies in This Issue Products of the Month t '6+*546 t */%*(07*4*0/ t &%"/ 4"'& Cover Story t "9*4 $0..6/*$"5*0/4 Product Exploration t "%&.$0 4&$63*5: (3061 t "'*%64 t "*1)0/& t #00/ &%". t (004"'& 4&$63*5: $0/530t *%-

Next Issue

t +*&4)6/ 4$*&/$& "/% 5&$)/0-0(: */%6453: t .*$30108&3 5&$)/0-0(*&4 t /&%"1 *%&/5*'*$"5*0/ 4:45&.4 t 1&-$0 #: 4$)/&*%&3 &-&$53*$ t ;,"$$&44 Market Dynamics t )*,7*4*0/ %*(*5"- 5&$)/0-0(: t ,&%"$0. t /&5104" 5&$)/0-0(*&4 t 1$*Ĺą46/5&,5&$) 5&$)/0-0(: t 5:$0 */5&3/"5*0/"Special Report t "9*4 $0..6/*$"5*0/4

t '3045 "/% 46--*7"/ t )0/&:8&-- '*3& "/% 4&$63*5: t *%*4 t 26"/56. Business Talk t /"5*0/"- 4&$63*5: */5&(3"5034 t 14" 4&$63*5: /&5803, Vertical Market t %3"(0/ 8"7& t (&/&5&$ t */5&--*(&/5 4&$63*5: 4:45&.4 t 3"%8*/ t 4*,-6 $0..6/*$"5*0/ t 5&-&45&

Product Exploration

Market Dynamics

#*0.&53*$4 '03 /"5*0/"- *%4

*/%*"

Business Talk

Vertical Market

)08 50 13*$& 4&$63*5: 4&37*$&4

4."35 #6*-%*/(4

75


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 11

ADVERTISER AXIS COMMUNICATIONS AB

MAJOR ITEM NETWORK VIDEO SOLUTIONS

COUNTRY SWEDEN

E-MAIL contact-sap@axis.com

5, 7

DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

INSIDE FRONT COVER

FLIR SYSTEMS CO., LTD.

SURVEILLANCE

HONG KONG flir@flir.com.hk

75

FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

19

HANGZHOU JUFENG TECHNOLOGY CO., LTD.

AHD DVR / CAMERA / IPC / NVR / HOME SECURITY

CHINA

oversea_sales@jufenginfo.com

3

HDPRO CO., LTD.

CCTV

KOREA

sales@hdprocctv.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

4

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

37

INODIC INC.

CAMERA

KOREA

sales@inodic.com

9

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

55

OB TELECOM ELECTRONICS CO., LTD.

FIBER OPTIC TRANSCEIVER

CHINA

overseas@obtelecom.com

INSIDE BACK COVER

PANASONIC SYSTEM NETWORKS CO., LTD.

VIDEO SURVEILLANCE

JAPAN

-

22, 23

PIXELPLUS CO., LTD.

SEMICONDUCTOR

KOREA

kahn@pixelplus.com

15

QNAP SYSTEMS, INC.

NVR / VMS

TAIWAN

nvr@qnap.com

39

ROBERT BOSCH (SEA) PTE LTD. SECURITY SYSTEMS

SURVEILLANCE

SINGAPORE

apr.securitysystems@bosch.com

13

SONY ELECTRONICS ASIA PACIFIC PTE. LTD.

NETWORK MONITORING SOLUTIONS

SINGAPORE

pro.info@ap.sony.com

2

WEBGATE INC.

DVR

KOREA

support@webgateinc.com

1,8

WESTERN DIGITAL TAIWAN CO., LTD.

SURVEILLANCE STORAGE

TAIWAN

patrick.lo@wdc.com

ACCESS CONTROL PAGE NO. 6

ADVERTISER HID GLOBAL

MAJOR ITEM CARD, CARD READER

COUNTRY USA

E-MAIL asiasales@hidglobal.com

49

VOIM TECHNOLOGIES INC.

FINGERPRINT

KOREA

sales@ten-bio.com

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

79


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.