A&S #A124. May 2016

Page 1


CONTENTS

May 2016 www.asmag.com

COVER R STORY

FLIR:: Therm Thermal and Beyond Beyo ond ..... ............................................31 VERTICAL SOLUTION

Modern ATMs Get New Layers of Protection ................................................52

MARKET DYNAMICS

Australian Security P. 38

Asia at a Glance: Infographics of Banking ................................................. 55 SPECIAL FEATURE

Adoption of IoT for Warehouse Management.............................................. 56 How Access Control Systems Are Designed in IoT............................................ 62

P. 36

P. 52

PRODUCT EXPLORATION VIEWPOINT

IoT: Implications and Challenges for Security ........................................................ 34 Smart Workplace Access in a Secure Mobile World.............................................. 36 SMAHOME

MAY 2016 Ɣ www.asmag.com

Zonoff: We Need More Cooperation to Boost More Business Opportunities........68 Statistics and Reports ................................. 70 Contents..................................................14 Editor’s Note ..........................................16 Application Cases...................................20

14

What is Prerequisite for VMS in a City Surveillance Project.......... 42 Benefits of Multi-sensor Panoramic Cameras in Open Space Video Surveillance ........................................................................... 48

Products of the Month............................18 News Feature .........................................24 New Products .........................................72

Show Calendar ......................................76 Companies in This Issue.........................77


Philippines Moves Toward Bright Future, Following China and Vietnam

a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.

n May 9 , Davao C i t y M a y o r Rodrigo Duterte won the Philippine presidential elections. His outspoken character had caught the world’s attention. However, only time will tell how he will influence the country’s diplomatic relations. No matter what, the Philippines had outperformed many countries in the Asia-Pacific region in the past two years. According to the latest statistics and reports by the World Bank, the country’s economy grew to 5.8 percent in 2015 and it is “projected to accelerate to 6.4 percent in 2016 before tempering slightly to 6.2 percent in 2017.” The report also pointed out that private consumption is the key to maintaining this high growth, which would be aided by low inflation. The implementation of public-private partnership (PPP) projects also boosted overall public and private spending. Exhibiting a positive macroeconomic environment, the Philippine government has paid close attention to its security market due to existing high crime rates. Its “No CCTV, No Business Permit” obviously shows the country’s determination to improve its security and safety. Secutech Taipei, which was held from April 19 to 21, also showed an increasing number of attendees from the Philippines. At Secutech, one major video th

MAY 2016 Ɣ www.asmag.com

surveillance equipment distributor told us that the country has grown very rapidly, especially in the past two years. Increasing public and private projects can now be seen in all industries. Originally, the distributor was only focused on the sales and installation of network infrastructure equipment and now, they plan to be more involved in security projects for all kinds of buildings. Since the country doesn’t have many IP video solution providers, the distributor believed that they would be able to differentiate themselves in this market. This company is only one among many other similar Philippine distributors and systems integrators that are looking for more IP products and solutions for their market. Nevertheless, many companies stressed that the country is pretty Americanized and the way people select products and brands is very similar to that of US buyers, which should be noted by companies who are interested in the Philippine market. Overall, the Asian region didn’t g ro w a s m u c h a s i n t h e p a s t . Philippines, Vietnam, and India are projected to be three growing momentums for regional growth in the next few years. Finally, the country have also announced its interest in joining the Trans-Pacific Partnership (TPP), which will push the country to grow to the top.

jill.lai@newera.messefrankfurt.com 16

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

General Press Jill Lai Alf Chang William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin

Editor-in-Chief Senior Consultant Reporter Reporter Reporter Editor

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Executive Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com

Officer

michelle.shih@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Circulation

Michelle Shih Michelle Chu

Marketing Coordinator michelle.chu@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Manager

willy.wang@newera.messefrankfurt.com

Project Manager Project Manager

eva.tsai@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com

asmag.com

Willy Wang Secutech

Eva Tsai Jason Cheng

International Advertising [Headquarters]

Audrey Fang Nori Chang

Coordinator Coordinator

audrey.fang@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Osman Kanatli Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana

U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No. 288, Sec. 6, Civic Boulevard, Xinyi District, Taipei 110, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, web sites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices


360- degree Cameras Spilling Over to Security to Enforce Clearer Views Editor’s Note:

360-degree cameras are beginning to dominate the commercial market, gaining popularity through its use in virtual reality (VR) applications, which can be used not only for entertainment, but also as a teaching tool. For example, a doctor can record an operation using a 360-degree camera then import it into a VR headset. This would allow students to be able to relive the operation over and over and help them prepare for when they would need to perform it themselves. Now, these cameras are starting to make their way into the security industry. The use of which can eliminate issues such as dewarping and blind spots that may be present in other traditional surveillance cameras.

IC720 360° X 360° IP CAMERA

T

he IC Realtime series product is a situational awareness IP camera designed to see everything with no blind spots. It adopts a dual lens design and is powered by a Qualcomm Snapdragon 800 series processor, enabling it to maintain reliable, 24/7 operation. The use of both H.264 video compression and AAC audio compression technology enables the highest quality of recorded audio/video, while maintaining the lowest bitrate utilization. This camera and app delivers a virtual reality monitoring experience where the user can continuously pan 360-degrees vertically and horizontally. Supplier: IC Realtime

URL: www.ic720.com

• Two Sony IMX172 12-MP CMOS image sensors • Uses a smart device to move or swipe in any direction to see other points of view • 180-degrees field of view, with a resolution of 3000 x 3000 per lens • Over 20 patented products and technologies • Mounts to the ceiling or wall via a traditional Double-Gang J Box • Easily moves the smart device in any direction to reveal and explore different views

RICOH THETA S SPHERICAL VR DIGITAL CAMERA

BUBLCAM

A

T

• Dual 12-MP, 1/2.3" image sensors provide an interpolated 14.4MP output in order to produce stills with a 5376 x 2699 equirectangular resolution • Auto, shutter priority, and ISO priority exposure modes are available for shooting stills and auto exposure mode is available for video recordings or live streaming • Sensitivity range of ISO 100-1600 is available for all recording modes to benefit working in a variety of lighting conditions • When shooting stills, shutter speeds ranging from 1/6400 second to one minute are possible • Built-in Wi-Fi allows user to connect to a mobile device or tablet in order to gain live view images, adjust camera settings, and wirelessly transfer stills and videos for instant online sharing • A 1/4"-20 tripod mount is incorporated into the bottom of the camera body for increased stability

• Edits raw JPG and MP4 with any standard editing software • Saves contents to a MicroSD card or cloud storage • Bubl’s 360-degree videos and stills with 100 percent of the spherical range are compatible with virtual reality headsets, including Google Cardboard, Samsung’s Gear VR, and Oculus Rift • Weighs under 300 grams • The patent-pending tetrahedral design allows the four 190-degree lens to overlap, capturing everything within a “digital bubl”

Supplier: Ricoh

Supplier: Bubl

sleek and unique device that allows users to capture 360-degrees stills and Full HD movies with a single click, the Theta S from Ricoh features updated imaging components and performance attributes for producing broad-field imagery in a variety of ways. Dual 12-megapixel, 1/2.3” image sensors pair with bright f/2 twin lenses in order to capture high-resolution spherical images with each exposure and features a sensitivity range of ISO 100-1600 for performance in various lighting conditions. Automated exposure settings are used for both stills and video recordings. Manual settings can be employed when shooting stills for extended exposure times up to one minute long.

MAY 2016 Ɣ www.asmag.com

18

URL: www.theta360.com

he Bublcam, also known as Bubl, is an innovative 360-degree camera, inside and out. The camera has been developed to be light and extremely portable (it’s slightly larger than a baseball). It was also created to provide users with the ability to capture 14-megapixel spherical photos and videos at 1080p at 15 fps and 720p at 30 fps. The software suite lets users experience looking up, down, and all around in any direction. It utilizes Wi-Fi to allow users to live stream directly from computers, mobile devices, and via the web. For industrial applications, Bubl can work with electric utilities, transit operators, and other large enterprises to enhance maintenance strategies and improve efficiencies as part of a complete assessment management plan. Assets can be visualized in any location, from every angle.

URL: www.bublcam.com


APPLICATION CASES a&s presents snapshots of security cases from across the globe to provide up-to-date information on how products and solutions are being employed in different industries.

>> Education

SALTO Secures Access for Australian College

Marist College Canberra, a Catholic school located in the Australian Capital Territory, Canberra, was having increasing problems with its mechanical key system. With different keys for different buildings and classrooms causing problems over the past few years, they decided to upgrade security to a contactless electronic access control solution. Security of the campus perimeter and classroom doors were the primary concerns for school authorities and it was vital that the new system can efficiently control who had access and when these places are accessed. It also needed to afford the staff with the ability to instantly take action if an access card was lost or stolen without the need to rekey or change locks. After considering their options, they decided to go with SALTO Systems’ XS4 solution for the project. 100 SALTO online RF escutcheons have since been installed throughout the college. The SALTO XS4 wireless system is an online, real-time access control system that uses RFID radio frequency technology to communicate with an access control database. If the radio link is ever interrupted or breaks down, the system will continue to work, as the virtual network of the battery-operated escutcheons and cylinders remains operative through the SALTO virtual network.

MAY 2016 Ɣ www.asmag.com

>> City Surveillance

Bosch Monitors Municipality in Thailand Wanon Niwat is a subdistrict located in the northern part of the Sakon Nakhon province in Thailand. Local authorities chose to install a total Bosch security solution to keep the district safe

20

24/7. There was a need for security systems within the subdistrict to provide monitoring of traffic conditions, accidents, as well as possible criminal activities. Footage captured can then be used as forensic evidence when required. The proposed Bosch video surveillance solution installed in Wanon Niwat’s city area along traffic intersections and pedestrian walkways was comprised of 56 1080p30 progressive scan CMOS cameras. These cameras provide round-the-clock monitoring and clear footage even under low-light conditions. The security surveillance solution is centrally managed using Milestone’s XProtect video management system. The synergies between Milestone’s open platform software and Bosch Security Systems’ cameras enabled partners and customers to explore the intelligence and efficiency of Bosch’s camera solutions. Proposed and installed by KN Systems Integrator, this surveillance solution comes backed with Bosch quality and professional maintenance services. The team in charge of the Wanon Niwat sub-district have expressed their satisfaction with the quality of the Bosch security solution and plan to use Bosch in the second phase of their security plans.

solution project. For the upgrade, they wanted to have measures to tighten security, improve the crowd management, apply central monitoring, and identify persons and activities. Thus, they needed to have an intelligent and integrated security and surveillance system in every zone. As of now, Mirasys’ solution has been implemented in four major zones, covering 29 main junction stations. Over 4000 VMS and 1,400 video content analysis (VCA) channels are currently in use and are managed by centralized command and control rooms. Railway authorities are now able to do incident management, which consisted of preliminary planning and plan activation, allowing them to better respond to any event and identify all the needed activities required to resolve any incidents that may occur. The new system also allowed time-synchronized playback of different cameras together in a single video pane. Additionally, advanced video analytics features intrusion detection, left object detection, overcrowding, and camera tampering.

>> Retail

Mobotix Cameras Secures Indonesian Mall

>> Transportation

Mirasys Enhances Railway Security in India

Indian Railway is currently one of the world’s largest railway network comprising of over 8,000 stations. As Mirasys had already successfully delivered video management solutions to several of their railway zones, they decided to continue to work with them for this large-scale command and control

The Pacific Place shopping mall in Jarkarta, Indonesia, had difficulty maintaining and servicing their security system which was made up of more than 300 analog surveillance cameras from different manufacturers. Since problems also arose with the electric cabling, the company in charge of the mall decided to replace the existing setup with a modern security system consisting of 197 Mobotix cameras. The old cameras were replaced with the new ones in six separate phases. Various camera types were employed in the project, including dualdome cameras that featured customized object


NEWS FEATURE

Will 5G be the Answer to Mainstream Connected Devices? Internet of Things (IoT) has taken the world by storm, where various industries, including security, are making use of the technology with connected devices and systems to produce valuable information. But what happens when stable Internet can’t reach everywhere? BY Lisa Hsu

ntroducing the 5G network, which may be announced to the world as early as 2020, will allow for faster service, less latency, and enable more devices to be connected across the globe. The speedy network will support the massive growth of IoT and enable devices to communicate with each other seamlessly through the convergence of mobile communications and computing. Growing demand for high Internet speeds to have real-time response is among one of the major factors pushing the development of latest technologies such as the 5G network. 5G can offer Internet speeds between 10 Gbps (gigabytes per second) to 100 Gbps. Furthermore, 5G delivers an ultra-low latency range between 1ms and 10ms, whereas 4G technology offers a low latency range between 40ms and 60ms. With fast wireless connection for cloud computing, data services, and other connected devices, 5G can facilitate a range of advanced capabilities, user experiences, and devices. For example, self-driving cars with built-in intelligent traffic routing, improved city infrastructures, intelligent machines and sensors,

MAY 2016 Ć” www.asmag.com

24

With fast wireless connection for cloud computing, data services, and other connected devices, 5G can facilitate a range of advanced capabilities, user experiences and devices, for example, self-driving cars with built-in intelligent traffic routing, improved city infrastructures, intelligent machines and sensors, augmented reality, and more.

augmented reality, and more. Aicha Evans, Corporate VP and GM of the Communication and Devices Group at Intel predicted in an Intel report that transmissions that took seconds, minutes, or even days to load or send will be delivered in milliseconds when 5G technology becomes available.

What Does This Mean For Security? Increasingly, video surveillance and IoT are being integrated as products such as cameras and recorders move to IP and are connected together on the Internet. The launch of the 5G network will bring a whole new array of opportunities to the security industry. The faster and more robust network would mean more connected and autonomous devices and systems, as well as better quality images and faster streaming. Gathering information through analytics will become more mainstream as the data produced will provide more information and knowledge, which helps organizations produce better business strategy plans. However, security players are likely to face certain challenges in order to accommodate for the upgraded network, such as storage issues to manage data, hardware compatibility for 5G, and other technical difficulties ahead. The launch of 5G may be a big motivator for more advanced equipment to appear in security, but players must first understand the different wireless protocols that define the standards for networking devices and know what benefits certain security applications.


NEWS FEATURE

Seagate on How to Choose an HDD and Customer Feedback on SRS Seagate Technology, the leading storage solutions provider, launched a clinic consultation service at Secutech 2016 to demonstrate to its customers the importance of using the right drive for the right environment and give recommendations based on their requirements. BY Jill Lai

MAY 2016 Ɣ www.asmag.com

n order to choose the right hard drive for a video surveillance system, it is important to first understand the main purpose of using video surveillance systems and identify the main points of the operators. Rex Dong, Senior Director for Asia OEM Sales at Seagate Technology, further explained, “First understand the workload of a security system so you can determine the performance the system requires from the drive. Will the system be used for fast video analytics like facial recognition, or will it more simply be used to record contents and play it back only when an incident needs reviewing? If it is, then these factors are important to understand the level of performance you’ll expect from the drive. Next, consider what implications this workload will have on your system design. All surveillance applications expect support 24/7, but how does this affect your storage requirements? Through Secutech and our clinic consultation, we are able to help the systems integrators (SIs) and customers to solve their problems and meet their needs for surveillance storage solutions.”

Systems Integrators’ Feedbacks on SRS Another major problem that SIs might have with their current storage systems is unexpected data loss. Seagate, therefore, introduced the Seagate Rescue Services (SRS) to its customers.

26

Dong said, “The storage and access to data are critical for any organization. Seagate’s Surveillance HDDs allow customers and SIs to optimize their drive reliability in a DVR or NVR environment. Adding the Seagate Rescue services (SRS) helps to protect the data against unexpected situations such as vandalism, virus, or unintentional deletion and also serves as incremental support to help SIs better optimize their resources in the field.” The company then shared one of its customer’s story that tells how SRS helps to recover lost data. It is said that two men broke into a jewelry store in China, stole US$200,000 worth of jewelry, and destroyed the store’s surveillance camera and DVR. After numerous failed attempts by the data recovery agency, the Chinese police contacted Seagate. Its SRS team successfully repaired the damaged DVR that allowed police access to the surveillance footage to identify the suspects. Dong said, “Today, we continue to improve the customer experience for data recovery so people feel informed and up-to-date on the progress of their recovery through email updates. The customers can also track and monitor their recovery status from Seagate’s website. From the service hotline, case submission website to the drop-off point, etc., we’re committed to providing customers a smooth and hassle-free data recovery process.”

Another major problem that systems integrators might have with their current storage system is the unexpected data loss. Seagate, therefore, introduced the Seagate Rescue Services (SRS) to their customers.


FLIR: Thermal and Beyond Over the years, FLIR Systems has evolved from being a thermal camera manufacturer to a provider of total security solutions, offering a wider range of products that target different verticals and market segments. Its acquisition of DVTEL at the end of last year has further enabled the company to diversify its offerings and make deeper inroads into various markets, including Asia. BY William Pao

pAvi Gerbi, VP, Security, APAC, FLIR Systems

n December 1, 2015, FLIR acquired DVTEL, a leader in software and es hardware technologies fo r a d v a n c e d v i d e o le surveillance, in yet another high-profile ty merger and acquisition in the security on industry as it undergoes a consolidation trend. According to Avi Gerbi, VP of Security for APAC at FLIR Systems, the deal was driven by a desire to create synergy, as DVTEL and FLIR’s products and solutions can highly complement one another. “ The vision was to expand the FLIR Security portfolio to include a wide offering of top-quality products and well-integrated solutions to our partners and customers,” he said. “ Today we can offer anything from low-cost high-value basic NVR systems through enterprise-level VMS with high-efficiency IP cameras, all the way up to high-end tactical solutions using our Cameleon PSIM, thermal cameras, analytics, radars, and drones.” Already, the combination of both firms has shown initial positive results. “In early

pFLIR Latitude network video management system (NVMS)

April at ISC West, only four months after the acquisition, we were already able to showcase how well-integrated our portfolio is. With our combined range we are able to achieve our aim of offering, in each product category, the best product covered by the best service, at the most competitive price,” Gerbi said. He explained how FLIR has created solutions that are suitable for a variety of verticals, especially those that are more critical and dependent upon products of high quality and reliability. “We have a team dedicated to analyzing the specific needs of different vertical markets in order to put together seamless solutions tailored to each of our major verticals. In April, at ISC West, we were able to display five complete integrated solutions, including transportation, power generation/distribution and safe/smart cities,” Gerbi said. “The fact that FLIR provides a broad range of products that are already well-integrated makes it easy for us to tailor the right solution for each vertical.”

STRONGER INFLUENCE IN ASIA The acquisition has not only helped FLIR product-wise – it has also

31


FLIR’s Other Important Acquisitions

MAY 2016 Ɣ www.asmag.com

enabled FLIR to make deeper inroads into the Asian market. “FLIR already had a strong presence in Asia with offices and service centers in many countries. With the addition of the DVTEL people to the Asia security team, we have created a new structure to exchange knowledge and improve focus,” Gerbi said. In the future, FLIR plans to increase its visibility in Asia even more. “Our security sales activity in Asia is in three sub-regions – Australia and New Zealand (ANZ), ASEAN, and North Asia. Our first priority is to strengthen our presence and efforts in ANZ. Regional management is centered in Australia while operation and administration is centered in Hong Kong,” Gerbi said. “Our Singapore office is fully equipped to demonstrate the entire range of FLIR Security products and solutions. To make it easier for our partners and end users to experience what we can offer, we plan to establish similar capabilities in other regional facilities, including Japan and Australia.”

EMBRACING IOT In the era of IoT, where billions of devices are already connected to the Internet, FLIR will play a more important role. Specifically, FLIR’s open-platform approach will drive integration and interoperability between different devices. “The Internet of Things presents the

32

The vision behind the DVTEL acquisition was to expand the FLIR security portfolio to include a wide offering of top-quality products and well-integrated solutions to our partners and customers.

Besides the DVTEL acquisition, FLIR Systems has also made other important purchases to make its products more complete and wide-ranging. In December 2012, FLIR completed the acquisition of Lorex Technology for an aggregate price of US$60 million. Lorex provides home and business equipment that includes connected visible light video cameras, illuminated infrared cameras, digital video recorders, video monitors, baby monitors, and wearable action sports cameras. By acquiring Lorex, FLIR was able to diversify its offerings and expand into several new markets as the company sought to lower the cost to own thermal technology, it said. Also in December 2012, FLIR acquired Belgiumbased Traficon International, a leader in video detection technologies for traffic applications, for approximately $46 million in cash. According to FLIR, thermal imaging is a superior solution for monitoring traffic, and by purchasing Traficon, FLIR was aiming to accelerate the adoption of FLIR technology in the worldwide market for video-based traffic control solutions.

ultimate platform for inter-connectivity w h e re e v e r y d e v i c e maximizes its contribution to and leverage of shared information. Our solutions already contribute to and leverage shared information but within a private and secure context,” Gerbi said. “FLIR’s Cameleon PSIM allows connectivity and information exchange between video surveillance systems and tactical, intelligent-transportation, or industrial systems.” According to Gerbi, critical infrastructure and city surveillance are two markets where IoT reaches its highest levels of utilization, and FLIR is strong in both. “The emergence of smart cities is a primary example of ongoing IoT technology enhancements in which FLIR is an active player, enabling the connectivity and information flow between security and non-security entities to maximize the safety and security benefits to communities,” he said.

MORE VISIBLE THAN EVER The purchase of DVTEL has given a major boost to FLIR’s operations, enabling them to offer a wider range of solutions that suit different verticals. Geographically, the acquisition has also allowed FLIR to expand its presence in Asia, from Oceana to Northeast Asia. With smart and safe city initiatives becoming more prevalent in the region, deployment of more FLIR products and solutions in these projects is all but expected.


he Internet of Things (IoT) has become a catch-all phrase that encompasses all the communication that occurs among physical objects such as interconnected computer networks, sensors, and devices. It is clearly intertwined with the concept of Big Data, which is not surprising as increased interconnectivity will lead to a rise in the amount of information that can be generated by these ecosystems.

EVOLVING IOT LANDSCAPE

MAY 2016 Ć” www.asmag.com

There is a proliferation of new devices that are coming online and producing data. Based on a recent report by Gartner, 5.5 million new devices will be connected every day in 2016. In part due to strategic actions taken by cellular or Wi-Fi carriers looking for new growth opportunities in the mature market, this boom in numbers is creating more opportunities for devices to be interconnected and produce even more data. The impact of these figures is quite far-reaching, extending beyond the technology industry to influence trends in fields such as retail, healthcare, and security. The implications of this development has even led McKinsey Global Institute to forecast that US$36 trillion operating costs of key industries will be directly impacted by IoT. Although IoT is trending right now, it is certainly not a new concept, especially when it comes to the security industry. This is because it has become common practice for security practitioners to incorporate various different technologies and components into one system. Therefore, the question is how IoT and Big Data differs from before and why it is attracting so much attention.

IOT VALUE PROPOSITION There has never been a shortage of data presented by these systems. What is

34

IoT: Implications and Challenges for Security The evolution of the Internet of Things has reshaped and transformed businesses and industries, bringing with it various benefits and risks, as well as challenging existing best security practices. ISC West organized a seminar to discuss the topic, featuring a panel of speakers from Axis Communications, Central Station Alarm Association International (CSAA), Honeywell, and Securitas Electronic Security. COMPILED BY the a&s editorial team (Source: SIA Education seminar at ISC West 2016)

different is not the actual amount itself, it is how it is being presented and used. With bandwidth becoming faster and more readily available, consumers are finding it increasingly easier for them to connect different devices. The information collected is also managed differently than before as it is now commonly aggregated and mined in data warehouses. Additionally, through the use of web browsers, smartphones, or fitness trackers like Fitbit, the data is automatically transformed into something that consumers can understand, access, and use to add value to their lives. With all these data coming in, it is difficult to pinpoint which information is important or to determine how it is going to be used. Nevertheless, the value of collecting the data for future analysis cannot be underestimated. The promise of Big Data lies in its potential for associations over time when the software matures to be able to create information that is meaningful and useful for the users.


BIG DATA FOR SITUATIONAL AWARENESS In the security industry, Big Data has traditionally been used for two purposes: to prevent bad things from happening and, in instances that something bad happened, to perform forensic investigation. However, people are now looking toward harnessing the data to enable them to use the system proactively by potentially predicting what threats would be present and eliminating them beforehand. Furthermore, the data can also be leveraged in businesses to improve operational efficiency and this can already be seen in the retail space. The omnichannel approach many retailers employ to understand and use customer behavior data is an example of IoT at work.

IMPLICATIONS FOR SECURITY Demands from users for better broadband experiences is expected to grow even further in the near future

The rising demand for immediacy and connectivity can end up creating the so-called 'internet of insecure things' or 'internet of risk.' and this would in turn drive up the need for security. This is because the rising demand for immediacy and connectivity can end up creating the so-called “internet of insecure things” or “internet of risk.” The more devices gets connected to a system, the more breach points the system will potentially have. Cybercriminals will try to find the weakest parts of the systems, which could be the video or the security system, and use it as a backdoor to access the company’s network. Furthermore, many enterprises are now facing the challenge of incorporating devices that may or may not follow best practices into their systems due to the popularity of the “bring your own device” (BYOD) trend in the workplace; hence, necessitating regulating policies that will protect both the employees and the company’s private information. To prevent or minimize the possibility of cyberattacks, many consumers turn toward safety standards such as UL, Triple DES, and ONVIF. However, this can actually lull them into a false sense of security as devices and systems with these labels may not be completely safe. Since the creation of these standards takes time and collaboration, it is entirely possible that it is a year or two behind where the market is at the moment. On the other hand, hackers are continuously formulating new attacks and finding ways to get around existing standards.

ROLE OF THE SECURITY INDUSTRY IN IOT

IoT is constantly developing and security practitioners would be wise to get involved early so as not to be left behind. It would be important for them to continue to communicate and be aware of what is happening with their As the “bring your own device” trend continues to gain popularity in workplaces, it would be important for companies to find the balance between convenience and security. vendor partners and end customers in order to determine and execute the right strategies. It is equally important to collaborate with outside consultants, such as from the IT department, to better identify weak links and come up with possible solutions to make the system more secure. This would also involve developing good security development practices for vendors that is supported by strict and continuous testing programs. Another important point would be to make it easier for the end users to apply, because at the end of the day, it doesn’t matter how secure the system can be if the end users don’t go through the process of securing it.

35


SMART WORKPLACE ACCESS IN A SECURE MOBILE WORLD Mobile technologies have now penetrated every aspect of our lives, including the workplace. It would be wise for enterprises to take advantage of this trend to not only increase convenience, but also to enhance existing physical access control systems. By Alex Tan, Director of Sales, Physical Access Control System, ASEAN, HID Global

MAY 2016 Ɣ www.asmag.com

obile technologies have brought in new levels of choice and confidence to access control. From smartphones to wearables and tablets, mobile devices are ever present in today’s office environment, always on-hand to serve a variety of purposes. It has become the go-to technology of the new millennium, offering convenience and portability. In light of these developments, leveraging mobile technology to access doors, parking facilities, and gates – not to mention networks, other enterprise applications, and so much more – is a logical step in the evolution of access control. These advancements have encouraged a more secure identity lifestyle built around the convenience and ubiquity of mobile devices. It would be, perhaps, the next logical step that organizations and employees consider the use of smart devices to enable physical access (mobile access control). This article will highlight the benefits to consider when implementing mobility initiatives which would enable organizations to answer

36

end-user demand for convenience and choice in a new mobile-first world.

SMART DEVICES ARE EVERYWHERE The convenience that mobile connectivity offers is changing the way we live, work, and play. By extending access control functionality to a mobile device, it allows end users to securely and conveniently access the workplace using their smart devices. In this era of mobility and cloud computing, enterprises and individuals are increasingly concerned about the security and protection of their physical environment. Correctly implemented, secure mobile access has the potential to change how we interact and remains a critical front line of defense for enterprises. Confidence and education in the use of contactless applications and technologies such as wearables, NFC, Bluetooth, mobile wallets, iBeam, and iBeacon are continuously growing and so is the understanding of which technologies are best suited for mobile access control. No matter what the technology, mobile devices offer an unparalleled way to change the way we open doors. However, security administrators and IT directors will need to review which mobile-related technologies will allow them to best engage with their employees to create the optimal access experience on their premises.

TAKING WEARABLES INTO ACCOUNT The wearables market is growing exponentially. The International Data Corporation (IDC) Worldwide Quarterly Wearable Device Tracker reported the shipment of 78.1 million units in 2015, a 171.6 percent increase compared to the previous year. It is, therefore, only a matter of time before wearables and other mobile products join the device ecosystem and give users even more choices and flexibility. Indeed, another research by Gartner also stated that wearable devices would offer many opportunities for customers and employees and that the array of devices available would evolve rapidly in the short term. It is because of this rapidity that these truly mobile, “always-on” devices are the ideal natural candidates for access control applications because of the ready-to-use convenience they offer.


physical access control will eventually merge the network and other secure access needs, creating a more connected environment. With the rapid adoption of the “bring your own device” (BYOD) trend developing at work, some enterprises have been caught by surprise. However, BYOD challenges are gradually being met by more manageable methods of deploying mobile devices in the organization. Instead of an unknown, potentially unsupported population of employee-owned devices, organizations are granting select personal devices permission to access corporate systems. Several options, including the “choose your own device” (CYOD) strategy — where the organization offers a list of permitted devices and applications for specific roles — are overcoming these challenges. Alex Tan, Director of Sales, Physical Access Control System, ASEAN, HID Global

TRANSACTIONAL EXPERIENCE Imagine a world where access fits in the palm of your hand. Smart devices are ubiquitous and always at hand; thus, becoming the most valued technology we own. Using mobile devices to open doors is therefore seen as a marriage of security and convenience, offering an individual the ability to securely access doors, gates, and areas not open to the general public through his mobile device. Secured mobile access solutions allow for the secure creation, issuance, and management of digital credentials into smart devices. In today’s more progressive solutions, digital credentials or Mobile IDs can be securely managed and revoked remotely from a central management portal. As mobile devices proliferate, their users can always utilize connected networks. Another emerging trend in the mobile space is the convergence of cloud and mobile computing, which is expected to promote the growth of centrally coordinated applications powered by embedded intelligence that can be delivered to any smart device.

LEVERAGING THE MOBILE-FIRST WORLD Driven by convenience and operational efficiency, enterprises are increasingly seeking to leverage the potential of a mobile-first world. Harnessing the mobile revolution for

MANAGEMENT CONSIDERATIONS Creating and managing access cards can be a time-consuming process for security professionals and administrators. This is especially true for school campuses where the task of creating and disabling cards for large numbers of students enrolling and graduating can be quite challenging. In such cases, connected secured mobile devices can help manage mobile identities in near real time using cloud-based portals and save the administrative staff valuable time. Another advantage of implementing a cloud-based portal is that all identities are centralized. This is particularly useful in places with addresses in more than one location. With card-based access systems, a visitor from one branch to the next would have to get a visitor badge or go through other forms of red tape to gain access to the other office. With a cloud-based portal, the employee simply sends a notification to the system administrator before leaving for the branch office which would then have an additional mobile identity sent over by the time the said employee reaches the place. In that sense, the management process is significantly streamlined and shortened.

SECURITY CONSIDERATIONS One thing to consider when going for mobile access is the possibility of cyberattacks through many tools and techniques. When a mobile access solution is implemented, devices and backend security systems require multilayered security models to mitigate the effects of such attacks. The upshot of this is that if the attackers manage to breach a layer, the doors will still remain locked. That said, mobile operating systems, such as Android and iOS, are built to maintain high levels of security. With a secured mobile access app like ours, enterprises can take advantage of these security features to ensure that its data cannot be accessed or modified by other running apps. Finally, mobile identities can be signed and encrypted to mitigate the effects caused by their theft. In case someone loses his smart phone, his mobile identity can also be deleted to prevent it from entering the wrong hands.

MOBILE TECHNOLOGY IN PHYSICAL SECURITY Mobile devices are changing the way employees work and enterprises think about their operations, networks, and security. The next logical step for many organizations will be replacing their legacy systems with physical access security systems which would support mobile access on smart devices. Putting mobile devices to work as tools for secure access is more convenient for users, easier for enterprises to manage, and more secure than older generation technologies. This will create many opportunities for the convergence of network and physical security that are simply unavailable with legacy access tools.

37


BY Israel Gogol, Freelancer

MAY 2016 Ɣ www.asmag.com

he Australian market size for electronic security equipment in 2013 was a little over US$ 0.5 billion, according to the estimates of the Australian Security Industry Association (ASIAL). Despite being a mature market that has similar characteristics to that of Western countries, it seems that unlike the stagnant market in the West, the security market in Australia continues to grow. “The local IP surveillance market continues to grow as the full adoption

38

of IP is not completed yet. Many vertical segments are also starting to look into deploying IP solutions such as retail, education, and commercial buildings to leverage the full benefits of IP surveillance and help optimize their business process and objectives,” said Wai King Wong, Country Manager of the South Pacific Region for Axis Communications. This said growth corresponds with estimates cited by Stevan Malesevic, Product Marketing Manager for Video Systems at Bosch Security Systems, as he mentioned that the Australian security market is growing at a rate of approximately 10 percent a year.

"SECURITY SPEN NDIN NG HAS SHIFTED FROM MINING AND THE PRIVATE SECTOR TO GOVERNMENT PROJECTS."


Network Infrastructure Remains an Issue for Industry Growth In the past issues of a&s Asia, we have covered the Australian National Broadband Network (NBN), an ambitious endeavor to increase the country’s high broadband penetration rates. “The NBN is critical for multisite deployments, cloud, and central monitoring applications. The last mile deployment depends on having upload speeds in excess of what standard ADSL has to offer,” explained Angelo Salvatore, Country Manager of South Pacific at Milestone Systems. S

AUSTRALIAN MARKET OVERVIEW All of our interviewees agreed that, generally speaking, the Australian physical security market is relatively advanced and technologically savvy. However, there are obvious differences in the levels and expertise of systems integrators operating in the region. This need for technological sophistication is demanding for manufacturers and channel

As the industry’s shift toward IP cameras and cloud solutions gains momentum, infrastructure becomes even more critical. “While Genetec has sold numerous cloud solutions and data centers, for now, we are still coming up against specific barriers for growth. These consist of the cost of larger network bandwidth, bigger ‘pipes’ and storage needed to move and archive today’s larger video data files, and support from an updated infrastructure,” said Charles Cousins, Managing Director for APAC and Japan at Genetec. “In the long term, NBN will be key to consolidating videos and even the deployment of cloud surveillance. However, the deployment today is not at its optimum stage yet which may delay the adoption of cloud surveillance,” summarized Wai King Wong, Country Manager for the South Pacific Region at Axis Communications.

players alike, but it ensures a better experience for the customers. “There is a lot of emphasis on reliability and robustness and integrity of the solution,” said Charles Cousins, Managing Director of APAC and Japan for Genetec. “The Australian market is very demanding in terms of quality and reliability and support. Australians, of course, also want a good

Charles Cousins, Managing Director, APAC and Japan, Genetec Stevan Malesevic, Product Marketing Manager, Video Systems, Bosch Security Systems Angelo Salvatore, Country Manager, South Pacific, Milestone Systems Wai King Wong, Country Manager, South Pacific Region, Axis Communications

39


What is Prerequisite for

VMS in a CITY

In a city surveillance project, where cameras can easily surpass thousands, a good, powerful video management software (VMS) product is needed to accommodate these cameras, make sense of the data being produced, and drive operators to events that are th relevant relev v and critical. However, a good implementation requires the installer to understand what makes VMS effective and what to th he insta with the end user before the project begins. confirm rm wit w

Scalability Integration Usability

MAY 2016 Ć” www.asmag.com

42


SURVEILLANCE Project BY William Pao

n order to keep a city safe, operators and law enforcement officials rely on video surveillance to detect and deal with theft, assaults, gang violence, drug dealing, and other criminal activities. Yet, monitoring video from thousands of cameras spread across the city can be a daunting challenge. A good video management software (VMS) product, therefore, is needed to keep the operator situationally aware at all times. “Major focuses for citywide surveillance are generally linked with allowing immediate reaction of the operator to the event,” said Aleksandr Jesikov, Account Manager at Luxriot. “A powerful software solution must offer all tools allowing users to be quickly notified of an issue via all necessary instruments. VMS becomes powerful not only by having these instruments, but also by having all functions self-explanatory and easy to configure.” “What a strong or powerful VMS should be doing is focusing in on what’s important to the security profile,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. “Everyy camera

Steve Birkmeier, VP, Sales and Business Development, Arteco Andreas Conrad, Head, Product Management and Marketing, SeeTec Aleksandr Jesikov, Account Manager, Luxriot Benjamin Low, VP, Asia Pacific, Milestone Systems

Tony Luce, Director, Marketing and Business Development, Network Optix Jan van Rosenstil, Product Manager, VMS, Bosch Security Systems Mark Ross, Director, Cathexis Pervez Siddiqui, Director, Strategic Markets, Genetec

has a purpose. If the VMS is working correctly, it notifies the personnel when that purpose happens, and it’s treating all the other video differently. It discriminates that particular event and sends that information accordingly.”

FEATURES NEEDED FOR CITY SURVEILLANCE VMS Since the number of cameras and other types of sensors can be overwhelmingly large, the VMS must be able to support these edge devices as well as present data generated by these devices to operators in a meaningful way, so they can easily understand the situation and respond accordingly. That said, below is a list of features that are needed for the VMS to work effectively in city surveillance.

Scalability S Scalab allab l

Every camera has a purpose. If the VMS is working correctly, it notifies the personnel when that purpose happens.

When deploying a city surveillance project, chances are the user will Wh add more cameras over time. “In a lot of city surveillance projects that we have done, they have a very cautious budget to start with. Later on they see what the value is and they need to be able to add on easily and grow without having to completely replace the VMS,” said Mark Ross, Director of Cathexis. That said, the VMS on the backend must be able to easily and effectively handle the additional devices. “Systems have to be scalable to a large amount of cameras and devices. Scaling should be easy, so new cameras and servers should be added efficiently and easily,” said Andreas Conrad, Head of Product Management and Marketing at SeeTec.

43


High megapixel, multi-sensor panoramic cameras are a good solution to achieve seamless situational awareness in outdoor scenes. Multi-sensor cameras promise to deliver high quality images with a more aesthetic installation. An SIA education seminar during ISC West attracted many attendees who came to listen to speakers from Arecont Vision, Pelco by Schneider Electric, Genetec, and systems integrator Kratos Public Safety and Security discussing the topic. COMPILED BY the a&s Editorial Team (Source: SIA Education seminar at ISC West 2016)

BENEFITS OF MULTISENSOR PANORAMIC CAMERAS IN OPEN SPACE VIDEO SURVEILLANCE anoramic cameras are the fastest growing IP camera category, according to IHS. The predicted compound annual growth rate of 180- and 360-degree cameras for 2014 to 2019 is almost 30 percent. This is double the CAGR for PTZ cameras and way ahead of the figures given for boxed and fixed dome IP

MAY 2016 Ć” www.asmag.com

48

cameras. This rapid growth rate indicates that there is still an upside in the market for these solutions. Multi-sensor cameras deliver several benefits, most noteworthy is its ability to replace several fixed cameras and lower camera count, as well as provide better situational awareness, giving operators a seamless panoramic view of the scene.

LOW LOWERED CAMERA COUNT C Multi-sensor panoramic cameras enable the coverage of larger areas; thus, replacing the need to install several single-sensor cameras. This is because these cameras usually feature several lenses and sensors contained in a single housing with a single video/network output. Combining two sensors and len in one housing can allow the lenses camer unit to cover an area of up to camera 180 degrees. On the other hand, fixed cameras provide a narrow field of view as they are typically limited to a 90-degree angle at most. Panoramic cameras can cover a field of view from 180 degrees when installed at the side of a building and up to 360 degrees in cases when it is, for example, mounted on a pole in a parking lot.

Lesser Number of Cameras, More Benefits Reducing the number of cameras required for a project brings several benefits to the table. All these advantages together can save both the integrators and end users time and money. One advantage of this is that less work is required for installation and cabling. Newer multi-sensor camera models are PoE-operated, allowing the same cable for network connection to be also used for power which eliminates the need for separate power cabling. Additionally,


Ways to address the demand for higher resolution videos 1. Reduce overhead by only streaming high-resolution videos when required

Video is encrypted, using a camera with a user-created encryption key

Cloud

Video archived on-premises

On-premises

Live stream megapixel @ 30 FPS

2. Transfer recordings of events and game days to the cloud for long-term retention Encrypted video transferred to the cloud after X days (user defined)

Live stream megapixel @ 30 FPS Archiver Remote stream VGA @10 FPS

Communication between cloud is secured over TLS connection

Users can access video stored either on-premises or in the cloud seamlessly

Source: Genetec

since the camera only has one IP and MAC address, it will potentially only require a single VMS license, significantly lowering the cost as compared to having several fixed cameras covering the same area. However, this might vary between VMS as some might be charged per stream. There is also an operational efficiency benefit because the investigator wouldn’t need to switch between various cameras and different screen views, but instead he can manage everything from one screen; thus, reducing investigation time. Last but not least is aesthetics. Aesthetics is an important

consideration for property managers and large campuses like hospitals and colleges. Instead of having several cameras mounted on the same wall pointing at different directions, one panoramic camera can solve this problem. For example, a four-sensor camera can effectively cover 270 degrees with one sensor facing forward, one facing down, and two others pointing to the sides that can act as PTZ replacements. In this way, one camera mounted on a corner of a building can replace four fixed cameras covering the same field of view.

BETTER SITUATIONAL AWARENESS The wide field of view panoramic cameras deliver gives operators greater situational awareness, especially since they won’t need to switch between several cameras or watch scenes via tiled view which would not be so intuitive. Multi-sensor cameras can blend and stitch together images from different sensors, allowing users an instant understanding of the scene and giving them the ability to zoom in on specific details. Fisheye cameras are one of the competitive alternatives for multi-

49


MODERN ATMS GET NEW LAYERS OF The role of ATMs has been growing in recent years. They are not only fast and convenient cash dispensers but also offer many other services, from currency exchange to bill payment. Creating a reliable and secure transaction environment for clients is a critical issue from both operational and customer service perspectives. The industry is trying to find additional avenues to secure transactions and is piloting biometric identification for use in ATMs.

PROTECT BY Israel Gogol, Freelancer

MAY 2016 Ɣ www.asmag.com

illie Sutton was an American bank robber known for his innovative “career” and his successful jail breaks. When asked why he robbed banks, Sutton simply replied, “Because that’s where the money is.” Today, it seems bank branches are less focused on cashier services. Banks around the world have converted the way they work, relying more and more on mobile banking and networks of ATMs and information kiosks to serve their clients. In many places the branch experience is now limited to specific services which do not necessarily involve cash changing hands. A modern day Willie Sutton would no-doubt pay close attention to the ATM as a target for robbery. Since bank branches no longer

52

have safes with mounds of cash as before, ATMs, which often can hold several tens of thousands of dollars, become the target for criminals trying to gain access to money. Banks have to balance two demands: safeguard the money against robbery or fraud, and at the same time offer their clients an easy and seamless experience, providing a secure transaction without unnecessary burden for the clients.

SECURING ATMs AGAINST PHYSICAL ATTACK ATM security is an important topic addressed by international organizations such as ATMIA (ATM Industry Association) and EAST (European ATM Security Team). Attacks on ATMs can be divided into physical attacks, trying to reach the cash stored inside the ATM safe or fraud attempts. “Originally, starting in the 60s, physical security for ATMs was underdeveloped. Attacks soon started, as ATMs are spread around the globe, containing large quantities of cash and sitting close to public space. There are also many identical ATM units, which means that robbers can optimize their modus operandi and come up with faster and more successful ways to rob ATMs,” explained Pieter D. de Vlaam, Training and Certification Manager at Gunnebo, one of the world’s largest suppliers of ATM safes. According to de Vlaam, attacks on ATMs went through several stages of evolution. The first wave of attacks included breaking open the ATM with simple tools such as hammers and chisels — manufacturers answered the challenge by developing and implementing better safes. However, robbers did not sit still


Woody Chang, Marketing Manager, QNAP Systems Pieter D. de Vlaam, Training and Certification Manager, Gunnebo Karl Pardoe, Regional Sales Manager, U.K. and Ireland, March Networks

ION

and developed new methods of operations. “In the second stage the robbers started using torches and grinders, and eventually started gas blasting, a method in which robbers pry open the cash dispensing slot and pump gas into the ATM. The gas then detonates and blows apart the ATM from the inside giving the robbers access to the cash,” described de Vlaam. The next generation of attacks involves usage of solid explosives like Gelignite and PETN. Safe manufacturers are currently racing against robbers to provide adequate protection against the use of solid explosives.

Skimming and ATM Fraud Not all criminals choose to attack the ATM safe. Even though ATMs offer a very high potential for return, there are many difficulties due to better safes and newer protection standards. Many criminals resort to fraud attempts, using stolen cards or stealing card details using different skimming techniques. According to the US Secret Service, the agency in charge of fighting financial crime in the U.S., skimming costs American financial institutions about US$8 billion annually. A common modus operandi for robbers is to install clandestine card readers and spy cameras that copy magnetic card details. Once captured, the electronic data is encoded onto other cards and the captured PINs are used to withdraw money from customers’ accounts.

Video Surveillance

Many criminals resort to fraud attempts, using stolen cards or stealing card details using different skimming techniques.

More and more ATMs are using biometric identification (e.g., iris, fingerprint, face) for account access as an added layer of security.

Video surveillance is used extensively in ATM vestibules to record and detect fraud attempts. ATM surveillance equipment such as cameras and recorders needs to comply with specific small form factors and sometimes harsh environmental conditions. “There are three key requirements from video systems deployed in a banking environment. The first is central data integration, which guarantees that transaction data always resides behind secure firewalls in the corporate datacenter, in an environment compliant with the bank data and network operating policies. The second is real-time enterprise health management, so that system issues can be notified within seconds, and this ensures the video is up and running at all times. Finally, centralized management which enables the management of thousands of recorders from a single desktop in one location,” explained Karl Pardoe, Regional Sales Manager for the U.K. and Ireland in March Networks. However, besides the technical challenge, a successful solution requires the ability to interface with the bank’s transaction database to be able to detect fraud and provide a comprehensive security solution. “Our solution associates transactions in ATMs with the relevant video recording. When a suspicious transaction is detected by the bank, video feed can be quickly queried and accessed to assist investigation,” explained Cristina Velasco, Marketing Executive at Spain-based SCATI. “In addition to preventing fraud, it can also raise an immediate alarm in the event of physical aggression and sabotage at ATMs.”

53


Adoption of IoT for Ware Supply chain management is continuously improving, relying heavily on technology to improve work processes and efficiency. New use cases and ways in which businesses can improve their operations and enhance their efficiency are actively being tested as the industry is considering the move toward IoT-enabled solutions. BY Israel Gogol, Freelancer

Ć” www.asmag.com MAYMAY 20162016 Ć” www.asmag.com

56


house Management mazon Prime, the retail giant’s delivery program which promises same-day or two-day delivery for an annual membership fee, is proving to be a big hit. Attracted by the convenience of shopping online and instant gratification, people everywhere are slowly but surely changing the way they shop. This is correspondingly shaping the future of retail and how the

supply chain is being managed. This doesn’t come as a surprise to Daniel Dombach, Director of Industry Solutions for EMEA at Zebra Technologies. “What we see these days, if we look at the warehouse landscape and the way client expectations are shaping, is the expectation to get goods faster – tomorrow or end of day delivery. For that, you need a higher proximity of goods to the consumer and if you want to be flexible and agile in your operations, you need very good visibility of your inventory and to be able to change things fast. This is where IoT comes in. It is about retrieving data from all the sensors and transforming it to business valuable information.”

57


HOW

ACCESS CONTROL SYSTEMS ARE DESIGNED IN

IoT

BY William Pao

The Internet of Things (IoT) is a growing phenomenon, with billions of devices already connected to the Internet and more to come. Amidst this trend, access control, which has more and more migrated to IP, will be an integral part of IoT, connecting with other security and non-security devices. That said, access control systems must be designed to suit the overall IoT trend, helping users achieve better security and more streamlined operations.

MAY 2016 Ɣ www.asmag.com

ust as security products have increasingly moved toward IP, the same holds true for access control. A study by IHS cited that in 2014, 60 percent of the global access control panel market was already IP-based, and the growth is set to continue. In that sense, access control inevitably becomes a part of the Internet of Things framework, connecting with a variety of networked devices. “End users are demanding connectivity between devices across networks, and security directors within enterprise organizations require access control solutions that are accessible remotely for security teams to access at any time, day or night,” said Mitchell Kane, President of Vanderbilt

62


Industries. Indu In d st du stri riies es.. “Acc “A cces cc esss co es ccontrol nttro roll systems migrating “Access tto o IIP P ha ave ccertainly erta er taain n enabled more have in nte t g grrat atio tio on be betw tw we systems and integration between ssensor se n orr d ns evic ev icces e ,” said sa Daniel McVeagh, devices, Seni Se nior ni o Product or Pro r du duct ct Manager ct M Senior at Gallagher. “Thi “T hiss iss p arrti t cu cula larll evident at the la “This particularly ccontrol co onttro ol pa p nell le ne leve ve where automated panel level, de eci ec cisi s on si ns of o ten te nn decisions often need to be made in re eall ttime, iim me, e, w iittho out ut reliance on server real without conn co nne nn nec eeccti t vi v ty ty.. Ex EExamples am am connectivity. of this are vide vi deo de o sy ssystem yst s em m aanalytics na na video triggering alar al arms ar m d ms iirrec e tl t y in a security control alarms directly pane pa nel,ll,, o ne buil ilidi din n management panel, orr a bu building te emp m er erat atu at urree se sens n triggering an ns temperature sensor ac cce cess ss ccontrol on ntr trol ol p a to lock down an access panel area ar eaa ffor o ssafety or afeetty re af rea a reasons. ”

INTERNET OF THINGS IN BUILDINGS (BIoT) TAKING OFF Global market for BIoT is expected to rise from US$22.9 billion in 2014 to over $85 billion in 2020. The networking and related services segment of the market will grow at 22.6% CAGR, rising from $9.5 billion in 2014 to $32.4 billion in 2020. Overall connectivity penetration rates across all building systems are only around 16%. This connectivity penetration rate will rise steadily over the coming years. Source: Memoori Business Intelligence

BENEFITS BENEFI IT TS FO FOR ALL TThee co Th convergence onv nver erge gen ge nc between nc acce ac cess ce s ccontrol ss onttrol aand on n IoT has gained access prom pr omin in nen nccee iin n th prominence the residential sector, wh w her eree smart sm mar artt llo ock c trigger home where locks a to au toma mati ma tion ti nd evvicc such as lights automation devices an nd thermostats. theer th ermo most sttat ats. s “Residential will see s. and m ny ma ny o hes esee be many off th these benefits because there cu urr ur rre rent n lyy m nt orre IoT in the home than is currently more n commercial co om mme merc rccia ial se sec in security installations,” saiid sa d Steve Ste t ve ve Van Van Till, Tililll President and CEO said Bri r vo vo. of Brivo. Butt ev Bu even ven entu tual tu a lyy — and one can al eventually cert ce ert r ai ainl nlyy ar nl argu gu ue th certainly argue that this is already ttaakiin ng gp laace c — iinterest n taking place in access c nt co ntro r l-l-Io ro IoTT convergence Io co onvve control-IoT will spill into o the the ccommercial om mmerc meerc sector, where into user us ers ca er an al aalso so o eenjoy nj the benefits nj users can su uch c convergence con onve verg rg genc en nc brings. “In the such comm co meerrci c al a m a k there is a key ar commercial market, drrivverr ffor d o cconvergence or onve on verg ve g driver between disp di sp spar parrat ate sy ysttem emss and for reducing disparate systems een nergy erg er gyy u saage ge w h providing better energy usage while diag di agno ag nossttiiccs an no and d fflexibility,” said Mike diagnostics SSu uss ssm maan, n, TTechnical echn ec hnicc Director at TDSi. hnic Sussman, ”I””Iff yo ou lo look ook aatt eenterprise, healthcare, you hiigh h igh h security sec ecur urit ur ityy ....... aal it high allll are making use of th he In Inte t rn te rnet e o the Internet off TThings, and most, if nott al no all,l,l, h avee aaccess to networks,” av have said sa id G aret ar aret et Ellams, MD for Gareth A Ac cess ce ss Control at ASSA Access A AB B BLO LO ”It's not sectorLO ABLOY. sp pe specific anymore. It's

about making sure that the solution you want to put in place is the simplest and most effective.”

DESIGNING ACCESS CONTROL TO SUIT IoT

With IoT becoming an unstoppable force, access control needs to be designed to reflect this overall trend. In particular, access control systems in IoT are designed with the following things in mind: enabling integration with other networked systems, providing a better user experience, and leveraging data generated by the devices.

Interoperability

Gareth Ellams, MD, Access Control, ASSA ABLOY Thomas Herling, SVP, Global Business Owner, Electronic Access and Data, Kaba Mitchell Kane, President, Vanderbilt Industries Rob Martens, Futurist and Director of Connectivity Platforms, Allegion

IP-based access control systems can now be connected with other networked devices that are both security- and non-securityrelated. ”We are connecting with video surveillance systems, alarm systems ... and as IP knowledge becomes greater, we are finding easier ways to enable these systems to talk to each other,” said Ellams. ”Access control has almost become the backbone of building security and management systems, so a building now and in the future utilizes access control not just to open or close doors; it also drives other systems such as HVAC, lights, and various different products.” The key to integrating with other devices and achieving seamless interoperability lies in software and APIs, which have become more open than ever in the era of IoT. “The access control system and the components are providing open interfaces, allowing integration with surrounding systems,” said Thomas Herling, SVP of Global Business Owner in Electronic Access and Data at Kaba. “Originally in the access control space, it wasn't so open and flexible. Now over time, the APIs are easier to write, enabling more complex integrations with other products,” said Kurt Takahashi, SVP

63


SMAhome

Zonoff: We NeedtoMore Cooperation Boost More Business Opportunities By a&s SMAhome

How did a software company like Zonoff become a leading consumer IoT platform provider in the U.S. within just five years? Kevin Garton, Chief Marketing Officer at Zonoff, shared his observations on the smart home market and illustrated the company’s business strategies.

Zonoff is a leading consumer IoT platform provider in the United States. Since its establishment five years ago, the company’s customer base has spanned different sectors, including service provider, retail, insurance, consumer electronics and home construction segments. Zonoff ’s software platform powers Staples Connect, one of leading home automation solutions in the United States, which is available in over 550 Staples retail stores.

the best and broadest ecosystem of devices. I think that’s the real differentiator of us versus other competitors. What makes us different is the way we built a software suite and the architecture of our platform. We’ve built a system to have true interoperability to enable connected devices using different protocols to communicate with one another. We continue to support for different protocols, such as Wi-Fi, ZigBee, Z-Wave, Bluetooth, and proprietary wireless and mesh protocols from Lutron and we can easily add new protocols as they come to market.

Please elaborate on your business strategy.

What are your competitive edges?

MAY 2016 Ɣ www.asmag.com

We are a little bit different than most of our competitors. We can really take you from the beginning of the journey all the way to the customer delivery. We provide a set of software services, and work with lots of leading hardware companies by offering reference designs to help them build smart home hubs and allin-one devices. Zonoff B2B2C business models ensures that we are familiar with consumers’ needs and interests. We can take the expertise and apply the learning from various verticals in different individual markets. In addition, we develop solutions w i t h h i g h i n t erop e r ab i l i ty a n d compatibility, meaning we can use almost any radio or protocol in our solutions, which enables us to have

68

What makes us different is the way we built a software suite and the architecture of our platform. Kevin Garton, Chief Marketing Officer, Zonoff

We don’t want to just sell you the software platform; we want to make sure that both software and hardware work in harmony, improving time to market and helping our customers build better solutions. We achieve the results by providing turnkey end-to-end software solutions and services. We offer hardware reference designs, a robust software platform, a turn-key UX and UI program and we offer a subscription services platform that enables our clients to monetize their solution. We can make sure products from different categories work well, including smart locks, thermostats, etc. Furthermore, we help our clients to build the hub or gateway of their choice and provide the integrated software platform that runs the consumer IoT business. For example, insurance companies don’t want to be in the hardware business. They want to deliver value to the consumer by protecting their homes and properties. Connected home solutions can help insurers prevent the frequency and severity of claims. We work with hardware companies to provide insurance players with turn-key starter kits under insurance companies’ names. We can bridge them via our platform to create more business opportunities. We’ve worked to help our customers to improve their abilities to monetize the platform. We hope to elevate


the smart home from a notification engine to an end-to-end home-service solution, creating new and recurring revenue opportunities for Zonoff clients and partners. We integrate our platform with HomeAdvisor’s network of prescreened and customer-rated home service professionals, giving consumers the ability to not only be aware that something is wrong, but also to instantly connect with home professionals like plumbers and electricians through their smart home platforms. Our platform can provide notifications when there is an issue in the home but the homeowners are away at the time of a home maintenance issue or unable to take speedy actions. For instance, if you have a home automation system which detects leaks, you can dispatch plumbers or electricians to your house through the app to fix the leak that may cause the damage.

What are the main market drivers? Every big technology company wants to take part in the consumer IoT marketplace. We see lots of opportunities and innovation with service providers like cable, ISP, telco, and home security companies, as well as retailers. Service providers like cable companies, ISP, telco, security companies generate sales revenue by installing and fixing products for their customers. They have established subscribers and are selling services on a regular basis. Those models are most effective for mass marketplace adoption.

Do you see any killer applications? From our perspective, there is no “killer” application – everything is so specific and personalized, creating lots of capabilities is crucial. I think there will be lots of important applications like personal safety, having a grandparent or elderly

Source: Zonoff

parent being contacted with them by using the technology. User can monitor family members from a remote location, and send messages to take care of their health. It could reduce cost and complexity to improve the lives of consumers. The healthcare market has been getting a lot of attention lately. While we think the application is still more in the early stages, currently, there are lots of new ideas like improving healthcare system better and new innovations of elderly care. Healthcare will be a big focus for Zonoff over the next few years. The industry is booming with lots of new innovations and technologies. Voice control is going to be prominent. In 2016, we will integrate voice control technology into our platform. We think Amazon Alexa is one of the great technologies which has been licensed to different devices.

What are your observations on smart home in the coming years? Concerning protocols, right now there seem to be too many competing standards in the marketplace. We believe that there should be more than one standard to ensure competition and choice. From my point of view, however, we have too many standards or companies trying to introduce new standards so they can control a portion of the market. In terms of adoption and growth, the smart home market consists of three main segments in the U.S.: premium/whole home, mass-market professionally installed and DIY. The premium market will continue to grow but is limited by the price of entry. The mass-market professionally installed systems, like ADT Pulse, will lead the market in growth and DIY will follow. Many consumers still need someone to help them install products for them. Professional installers can deliver better consumer experience than the DIY segment as some DIY products still require lots of effort and knowledge to be installed. The market is in the early stages and it is expected to grow dramatically over the next few years. We think that the industry will take off significantly over the next twelve to eighteen months. We believe that smart home technology will continue to improve and it will become much simpler to use multiple products and services together in that time.

69


SMAhome

STATISTICS AND REPORTS In this article, we will highlight findings from new reports by leading research firms. In summary, MarketsandMarkets predicts that the global HEMS market will grow between 2015 and 2022. Gartner presents top IoT technologies for 2017 and 2018 and TechNavio sees the growth of the global WiFi chipset market between 2016 and 2020.

1. MarketsandMarkets: Global HEMS market will grow to US$ 3.2 billion by 2022, with ZigBee technology growing at the highest rate According to MarketsandMarkets’ report, the global market for HEMS is forecast to grow from $864.2 million in 2015 to $3.2 billion by 2022 at a CAGR of 18.4 percent. The report listed three factors the market is expected to be driven by: • Increased real-time energy conservation approach • Convenience of cloud computing and data analytics • Increased device interconnectivity The report also stated that the ZigBee technology is expected to grow at the highest rate in this market because it supports a variety of topologies such as mesh, stellate, and tree, making it widely preferred by most of the

Global HEMS Market 2015-2022 Unit: US$ Million

3500

US$ 3.15 B

3000 2500

CAGR:

18.36%

2000 1500 1000

US$ 864.2 M

500 0

Year 2015

2. Gartner: Five of the top 10 IoT technologies for 2017 and 2018 are smart home-relevant

MAY 2016 Ɣ www.asmag.com

Gartner announced the top 10 Internet of Things technologies for 2017 to 2018 in a recent report, including IoT security, IoT analytics; IoT device (thing) management; low-power, short-range IoT networks; low-power, wide-area networks; IoT processors; IoT operating systems; event stream processing; IoT platforms; and IoT standards and ecosystems. Among the predictions, there are five categories particularly relevant to the smart home space:

IOT SECURITY The IoT introduces a wide range of new security risks and

70

challenges to the IoT devices themselves, their platforms and operating systems, their communications, and even the systems to which they’re connected. Security technologies will be required to protect IoT devices and platforms

Year 2022

from both information attacks and physical tampering, encrypt their communications, and address new challenges such as impersonating “things” or denial-of-sleep attacks that drain batteries. IoT security will be complicated by the fact that many “things” use simple processors and that operating systems may not support sophisticated security approaches.

IoT Device (Thing) Management

IoT Security IoT Analytics

IoT Analytics Low-Power, Short-Range IoT Networks

Source: Gartner


HEMS providers. Another factor expected to highly influence the global growth of ZigBee during the forecast period is its advanced features and excellent compatibility, which have attracted most of the Fortune 500 companies to support and join the ZigBee alliance. North America and the Asia-Pacific are two major markets to look out for. While North America took the largest share of the global HEMS market in 2015, the HEMS market in Asia-Pacific is expected to show the highest growth rate.

Largest Market Share (2015): North America

Highest Growth Rate Expected: Asia-Pacific

3. TechNavio: Global Wi-Fi chipset market will grow at a CAGR of 4.15% from 2016 to 2020 According to TechNavio’s report, several of the factors likely to boost the Wi-Fi market and drive the demand for Wi-Fi chipsets include the growing integration between Wi-Fi and mobile networks, the development of smart home technology, the proliferation of Wi-

Fi-enabled mobile devices, the emergence of wearable technology, and increasing integration of WiFi into homes and enterprises. The report considers revenue generated from the sales of Wi-Fi chipsets for electronic device manufacturers to calculate for the market size.

Global Wi-Fi Chipset Market Leaders & Key Trends Key vendors:: - Qualcomm - Broadcom - Texas Instruments uments - MediaTek - Intel Other prominent nent vendors: - Infineon - Marvell - MediaTek - NXP - Newracom

Source: MarketsandMarkets

IOT ANALYTICS IoT business models will exploit the information collected by "things" in many ways — for example, to understand customer behavior, to deliver services, to improve products, and to identify and intercept business moments. However, IoT demands new analytic approaches. New analytic tools and algorithms are needed now, but as data volumes increase through 2021, the needs of the IoT may diverge further from traditional analytics.

IOT DEVICE (THING) MANAGEMENT Long-lived nontrivial “things” will require management and monitoring. This includes device monitoring, firmware and software updates, diagnostics,

Source: TechNavio

crash analysis and reporting, physical management, and security management. The IoT also brings new problems of scale to the management task. Tools must be capable of managing and monitoring thousands and perhaps even millions of devices.

LOW-POWER, SHORTRANGE IOT NETWORKS Selecting a wireless network for an IoT device involves balancing many conflicting requirements, such as range, battery life, bandwidth, density, endpoint cost, and operational cost. Low-power, short-range networks will dominate wireless IoT connectivity through 2025, far outnumbering connections using wide-area IoT networks. However, commercial and technical trade-offs mean

that many solutions will coexist, with no single dominant winner and clusters emerging around certain technologies, applications, and vendor ecosystems.

IOT PLATFORM IoT platforms bundle many of the infrastructure components of an IoT system into a single product. The services provided by such platforms fall into three main categories: (1) lowlevel device control and operations such as communications, device monitoring and management, security, and firmware updates; (2) IoT data acquisition, transformation and management; and (3) IoT application development, including event-driven logic, application programming, visualization, analytics, and adapters to connect to enterprise systems.

71


Mobotix 6 MP Vandalism Camera v25

Axis P3707-PE Multisensor Panoramic Camera

3xLOGIC VISIX VERA VX-VT-36 Outdoor Thermal Camera

Features:

Features:

• Professional protection: stainless steel with reinforced dome cover • Shock detection: push or impact generates an alarm • Video sensor: MxActivitySensor reduces false alarms • Event recording: onboard SD card and direct to NAS • MxAnalytics: heat map and people analytics • Alarm notification: e-mail, FTP, and VoIP (SIP) • Communication: two-way audio option

• 8 MP with four varifocal camera heads • 360-degree coverage, or combination of overview and zoomed-in views in four different directions • 1080p resolution videos at 12.5/15 frames per second and 720p videos at full frame rate • Supports Axis Zipstream technology for reduced bandwidth and storage requirements • Camera heads can be rotated to support Axis Corridor Format

Features: • • • • • •

206x156 array size H.264 compression 4mm. fixed lens Standard analytics included Two-way audio IP66 weather-resistant

■ 3xLOGIC/U.S. ■ Email: webmail@3xlogic.com

■ Axis Communications/Sweden ■ Email: axis-sap@axis.com

■ Mobotix/Germany ■ Email: info-intl@mobotix.com

Visionic GB-502 PG2 Glass-Break Detector Features: • Glass-break detection technology delivers near-zero false alarm rate • Acoustic pattern recognition technology provides 360-degrees coverage • Maximum detection range for plate, tempered, laminated, wired, coated, and sealed insulating glass: 7.6m • PowerG two-way frequency hopping spread spectrum FHSS-TDMA technology provides wireless robustness and reliability

Nedap AEOS Security Management Platform v3.2 Features: • Enables various integrations with third-party solutions • Improved integral security management platform • Supports latest access control card technologies • Ease of installation with AEOS Blue • Added value by providing better functionality ■ Nedap Security Management/Netherlands ■ Email: info@nedapsecurity.com

• Large transmission range enables repeater-free installations • Visible link quality indication shown on the device reduces installation time ■ Visionic (part of Tyco Security Products)/Israel ■ Email: sales@visionic.com

MAY 2016 Ɣ www.asmag.com

Matrix Comsec Door Controllers With Multi Spectral Sensor

Antaira LMP-0800G 8-Port PoE+ Managed Ethernet Switch

Features:

• Supports 8 10/100/1000Tx Gigabit ports • IEEE 802.3af/at compliant up to 30 watts per port • Network redundancy support: RSTP/MSTP and G.8032 ERPS (recovery time <50ms) • Supports IGMP v1/v2, QoS (IEEE 802.1p), CoS/ToS, IEEE 802.1Q VLAN, SNMP v1/v2c/v3 • Redundant power input design 48 to 55 VDC plus built-in relay output for port break alarm • Standard operating temperature range: -10 to 70 degrees Celsius

• • • • • • •

Time attendance and access control Reads surface and subsurface of a finger Fast and intuitive user identification Works in extreme tough conditions 50,000 users and 500,000 events storage 3.5-inch touch screen Wi-Fi, Ethernet, 3G/4G

■ Matrix Comsec/India ■ Email: more@matrixcomsec.com

Features:

■ Antaira Technologies/Taiwan ■ Email: info@antaira.com.tw

72


Ability Enterprise IP Bullet Camera

EverFocus 2 MP Full HD Ultra-Low Light Network Camera

SentryMobile S360-BW-G20 Body Worn Camera

Features:

Features:

Features:

• Power over Ethernet (PoE at or PoE af) • IP66/IK10/NEMA 4X • Includes 12 VDC or 24 VAC or 12 VDC + 24 VAC output for power devices • H.264 video compression • 3-9mm autozoom focus lens with IR LED

• • • • • • •

• • • • • •

■ Ability /Taiwan ■ Email: info@abilitycorp.com.tw

1/2.8 inch Sony progressive CMOS image sensor Full HD 1080p video, up to 60 fps Triple streams from H.265, H.264, and M-JPEG Ultra-low light and true day/night function 3DNR/WDR/2-way audio/defog functions supported One push autofocus for remote image adjustment Triple power inputs supported: PoE/12VDC/24VAC

■ EverFocus Electronics/Taiwan ■ Email: sales@everfocus.com.tw

2 MP Maximum resolution: 1920 x 1080 Maximum frame rate: 30 fps Motion detection Automatic white balance Weather rating: IP67 (waterproof)

■ Sentry 360 Security/U.S. ■ Email: info@sentry360.com

Viscount Freedom 9.2B Access Control Platform Features: • True IT topology connects and interacts with cloud services • Potential for system breaches is reduced through elimination of control panels • Real-time authentication with Active Directory per card read • Built-in redundancy (no third-party application needed)

• Complete web services application built on a REST API • Supports FICAM 13.02, FIP201, UL, and more ■ Viscount Systems/U.S. ■ Email: sales@viscount.com

Pelco Optera 12 MP Panoramic IP Camera

Videotec Ulisse2 Full IP PTZ Unit

Features:

• Full IP PTZ unit for complete management and control of IP ONVIF-S cameras • 60 Mbit/s video stream for 4K cameras • Direct access to third-party cameras via browser for setup and diagnostics as a single IP address • Tested and certified from -40 to 65 degrees Celsius, IP66, and NEMA Type 4x • Sophisticated temperature control and demisting system

• Constant, seamless situational awareness • Multiple immersive PTZ views at VMS • Zoom in for detailed live view or retrospectively with client-side dewarping • Up to 12-MP resolution for better detail at a distance • SureVision 2.0 for simultaneous WDR and low light performance • 8 Pelco video analytics behaviors ■ Pelco by Schneider Electric/U.S. ■ Email: sales@pelco.com

Features:

■ Videotec/Italy ■ Email: info@videotec.com

Veracity Trinity Directto-Disk Video Storage Features: • Serverless system – direct to storage from IP camera • High-performance megapixel camera recording • Simplified system architecture designed for high reliability • Camera-level failover feature • Ideal for unmonitored or remote access systems • Long archive periods possible for megapixel cameras ■ Veracity/U.K. ■ Email: sales@veracityuk.com

73


May – September 2016

WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx. May 2016

Asian Securitex • Date: 2016/05/04–05/06 • Venue: Hong Kong Convention & Exhibition Centre, Hong Kong • Tel: +852-2804-1500 • Email: xhibit@hkesallworld.com • URL: www.asiansecuritex.com

July 2016

SecProTec East Africa • Date: 2016/07/12–07/14 • Venue: Kenyatta International Conference Centre (KICC), Nairobi, Kenya • Tel: +49-40-710070-51 • Email: stefan.freiberg@planetfair.de • URL: www.secproteceastafrica.com

Exposec • • • • •

Date: 2016/05/10–05/12 Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil Tel: +55-11-5585-4355 Email: international@cipanet.com.br URL: www.exposec.tmp.br

International Oil & Gas Security Conference • • • • •

Date: 2016/05/11–05/12 Venue: The Kia Oval, London, U.K. Tel: +44-207-111-1615 Email: cristinar@irn-international.com URL: www.oilgassecurity.com

Securex South Africa • Date: 2016/05/24–05/26 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: info@specialised.com • URL: www.securex.co.za

MAY 2016 Ɣ www.asmag.com

June 2016

IFSEC International • • • • •

Date: 2016/06/21–06/23 Venue: ExCel London, London, U.K. Tel: +44-20-7921-5000 Email: rachel.eaton@ubm.com URL: www.ifsec.co.uk

76

Security Exhibition & Conference • Date: 2016/07/20–07/22 • Venue: Melbourne Convention & Exhibition Center, Melbourne, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au September 2016

Intersec Buenos Aires • Date: 2016/09/07–09/09 • Venue: La Rural Trade Center, Buenos Aires, Argentina • Tel: +54-11-4514-1400 • Email: ezequiel.gorbaran@argentina.messefrankfurt.com • URL: www.intersec.ar.messefrankfurt.com

ASIS • • • • •

Date: 2016/09/12–09/15 Venue: Orlando, Florida, U.S. Tel: +1-703-519-6200 Email: asis@asisonline.org URL: http://securityexpo.asisonline.org

• • • • •

Date: 2016/09/21–09/24 Venue: Friendship Cultural Palace, Hanoi, Vietnam Tel: +886-2-8729-1099 Email: stvn@newera.messefrankfurt.com URL: www.secutechvietnam.com

• • • • •

Date: 2016/09/27–09/30 Venue: MESSE ESSEN, Essen, Germany Tel: +49-201-7244-0 Email: info@messe-essen.de URL: www.security-essen.de/impetus_provider/

Secutech Vietnam

OFSEC • Date: 2016/09/05–09/07 • Venue: Oman International Exhibition Centre, Muscat, Sultanate of Oman • Tel: +968-2478-8476 • Email: info@muscat-expo.com • URL: www.muscat-expo.com/ofsec

Adria Security Summit • Date: 2016/09/06–09/08 • Venue: Kongresni Centar, Sarajevo, BiH • Tel: +387-33-788-985 • Email: summit@asadria.com • URL: www.adriasecuritysummit.com

IFSEC Southeast Asia • Date: 2016/09/07–09/09 • Venue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia • Tel: +44-20-7921-8127 • Email: Agnius.Kazlauskas@ubm.com • URL: www.ifsecsea.com

Security Essen

Safety & Security Asia • • • • •

Date: 2016/09/28–09/30 Venue: Halls B & C, Marina Bay Sands, Singapore Tel: +65-6278-8666 Email: info@cems.com.sg URL: www.safetysecurityasia.com.sg/

ISAF Istanbul • • • • •

Date: 2016/09/29–10/02 Venue: Istanbul Expo Center, Istanbul, Turkey Tel: +90-212-503-32-32 Email: marmara@marmarafuar.com.tr URL: www.isaffuari.com/en/


Companies in This Issue Cover Story • FLIR SYSTEMS Products of the Month • BUBL • IC REALTIME • RICOH Viewpoint • AXIS COMMUNICATIONS • CENTRAL STATION ALARM ASSOCIATION INTERNATIONAL (CSAA) • HID GLOBAL • HONEYWELL • SECURITAS ELECTRONIC

SECURITY Vertical Solution • GUNNEBO • IRIS ID SYSTEMS • MARCH NETWORKS • QNAP SYSTEMS • SCATI Product Exploration • ARECONT VISION • ARTECO • BOSCH SECURITY SYSTEMS • CATHEXIS • GENETEC

Next Issue

• KRATOS PUBLIC SAFETY AND SECURITY • LUXRIOT • MILESTONE SYSTEMS • NETWORK OPTIX • PELCO BY SCHNEIDER ELECTRIC • SEETEC • SYNOLOGY Market Dynamics • AXIS COMMUNICATIONS • BOSCH SECURITY SYSTEMS • GENETEC • MILESTONE SYSTEMS

Special Feature • ALLEGION • AMAG TECHNOLOGY • ASSA ABLOY • BRIVO • CISCO SYSTEMS • GALLAGHER • IBM RESEARCH • INFOR • KABA • TDSI • TYCO INTERNATIONAL • VANDERBILT INDUSTRIES • ZEBRA TECHNOLOGIES

Market Dynamics

Product Exploration

TAIWAN AND INDIA

SMB VIDEO SOLUTION

Vertical Solution

Special Feature

VILLAS AND HOTELS

SECUTECH TAIPEI 2016 REVIEW

77


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 15 19 5, 7 47 FRONT COVER, 31, 32,33 79 25 BACK COVER 27 21 INSIDE BACK COVER 4 11 INSIDE FRONT COVER, 1, 66 77 2, 3 17 13 10 6 8.9 29

ADVERTISER MAJOR ITEM AXIS COMMUNICATIONS AB NETWORK VIDEO SOLUTIONS COMMAX CO., LTD. SURVEILLANCE DAHUA TECHNOLOGY CO., LTD. SURVEILLANCE EVERFOCUS ELECTRONICS CORP. CAMERA / DVR / IP CAMERA FLIR SYSTEMS CO., LTD. SURVEILLANCE FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER HDPRO CO., LTD. CCTV HIKVISION DIGITAL TECHNOLOGY CO., LTD. SURVEILLANCE IDIS CO., LTD. SURVEILLANCE MEERE COMPANY INC. CAMERA PANASONIC SYSTEM NETWORKS CO., LTD. VIDEO SURVEILLANCE RIFATRON CO., LTD. DVR ROBERT BOSCH (SEA) PTE LTD. SECURITY SYSTEMS SURVEILLANCE SAMSUNG (HANWHA TECHWIN CO., LTD.) CAMERA / DVR SHENZHEN COMMANDER TECHNOLOGY CO., LTD. CASING SONY CORPORATION SEMICONDUCTOR GROUP SEMICONDUCTOR SONY ELECTRONICS ASIA PACIFIC PTE. LTD. NETWORK MONITORING SOLUTIONS VIDEOTEC S.P.A. IP CAMERA / SOFTWARE / VIDEOSERVER VIVOTEK INC. IP CAMERA / SOFTWARE / VIDEO SERVER WEBGATE INC. DVR WESTERN DIGITAL TAIWAN CO., LTD. SURVEILLANCE STORAGE ZEEANN CO., LTD. CMOS IMAGE SENSOR

COUNTRY SWEDEN KOREA CHINA TAIWAN HONG KONG CHINA KOREA CHINA KOREA KOREA JAPAN KOREA SINGAPORE KOREA CHINA JAPAN SINGAPORE ITALY TAIWAN KOREA TAIWAN KOREA

E-MAIL contact-sap@axis.com pcy@commax.co.kr overseas@dahuatech.com marketing@everfocus.com.tw flir@flir.com.hk sales@fjsmt.com sales@hdprocctv.com overseasbusiness@hikvision.com sales@idisglobal.com sales@cube-eye.co.kr contact@rifatron.com apr.securitysystems@bosch.com apriler@samsung.co.kr sjw@yjdcase.com pro.info@ap.sony.com info@videotec.com sales@vivotek.com support@webgateinc.com Jessica.liu@wdc.com sales@zeeann.com E-MAIL promag@gigatms.com.tw

ACCESS CONTROL PAGE NO. 12

ADVERTISER GIGA-TMS INC.

MAJOR ITEM RFID MODULE / LOCK / READER

COUNTRY TAIWAN

ADVERTISER ANTAIRA TECHNOLOGIES CO., LTD

MAJOR ITEM SWITCH

COUNTRY TAIWAN

OTHER PAGE NO. 23

E-MAIL info@antaira.com.tw Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

79


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.