CONTENTS
FEB 2016 www.asmag.com
COVER STORY
Hi Sharp Diversifies Products to Stave Off Competition
..........16 Jerry Chiang, President, Hi Sharp Electronics
NEWS FEATURE
Johnson Controls, Tyco to Merge, Create Leader in Building Technology ..18 VIEWPOINT
Security Departments Need to Be Recognized as More Relevant .......20 Key Identity Management Trends for 2016 ...............................................22 Mergers and Acquisitions — What Does the Past Tell Us About the Future...24 Cross-Functional Communication and Citizen Engagement: Technology Enhancements for Achieving Situational Awareness...............................26
P. 16 MARKET DYNAMICS
Macau Bets on Diversification for Future Growth
P. 28
PRODUCT EXPLORATION
Video Content Analytics for Perimeter Defense: Debunking Common Myths ..36 VERTICAL SOLUTION
Oil Dip and Geopolitics Grease the Wheels for Security Industry ........42 SMART TECHNOLOGY
Apps Widen Scope for Integrated Security on the Move ......................50
Growing Regional Ties Point Toward Security Growth in Hong Kong
P. 32
SOLUTION DESIGN
Security Systems — a “Jumping Board” for Cyber Intrusion ................54 SPECIAL FEATURE
Asia Leading Adoption of Biometric National IDs ...................................58 BUSINESS TALK
Manufacturers Seek Partnerships to Strengthen Market Share ...........62 FEBRUARY 2016 ● www.asmag.com
SMAHOME
CES 2016 Highlights: Home Security & Safety — Bringing Greater Peace of Mind ..............................................................................................66 New Directions in Smart Home at CES 2016 ...........................................70 Contents....................................................8 Editor’s Note ..........................................10 Application Cases...................................12
8
Products of the Month............................14 Show Calendar ......................................73 Show Preview ........................................74
P. 58
P. 36
New Products .........................................76 Companies in This Issue.........................79
Major Global M&As Kick Off 2016
FEBRUARY 2016 ● www.asmag.com
ergers and acquisit i o n s (M&A) activity is occurring more and more frequently. Following the last major M&A deal in 2015 of FLIR Systems acquiring DVTEL, Johnson Controls announced plans to merge with Tyco International in the beginning of 2016. Right in the middle of February, a big announcement was made by two major North American home security and automation service suppliers, ADT and Protection 1. Almost at the same time, ADT also entered into a definitive agreement to be acquired by affiliates of Apollo Funds, managed by Apollo Global Management and its co-investors. Then, on Feb 17, Ingram Micro was acquired by Tianjin Tianhai, a part of HNA Group. According to HNA Group’s description, “Tianjin Tianhai has now developed from a traditional marine shipping company into a modern logistic industry investor and operator.” We can assume the acquisition of Ingram Micro can further realize their determination to enter the global logistic market or at least get rid of the bond of weakened Chinese economy now. The one that affects most of the global security market is the merger of Johnson Controls and Tyco. This deal allows both companies to share their resources and create a good synergy in the building automation market sector, as well as further realize the potential of Internet of Things (IoT) in this market, especially by combining specialized security
technologies from Tyco. Most surprisingly, their announcement also forecast disappearance of the Tyco brand in the future. With this, rumors turned to Johnson Controls’ competitors, speculating another major M&A in the building automation sector will happen in 2016. On the other hand, the merger of ADT and Protection 1 shows how competitive and fragmented the North American home monitoring service market is. In recent years, the connected home market has grown quickly, especially in North America. The market demand now is much higher than the past and more end users opt to pay annual/monthly fees for their home security or automation services. It is good for both companies to consolidate in order to increase their customer accounts and secure market share in this region. More venture capitals buying into security companies is also a good sign for the security market in general, which symbolizes the increasing demand, particularly in the home security sector. All these M&A deals show the security industry is still fast evolving to absorb new technologies and expand to new markets. We predict that IoT, big data, and cybersecurity should be major considerations of future M&A deals, and more deals will happen in home or building automation sectors, since more new integrated systems and solutions are required. We expect more M&As in 2016, perhaps between Asian and non-Asian companies.
Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.
ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi
Executive Editor-in-Chief
Hubert Duh Charlie Wong
Managing Director / Publisher General Manager
Editorial
General Press Jill Lai Alf Chang Eifeh Strom William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin
Editor-in-Chief Senior Consultant Senior Editor Reporter Reporter Reporter Reporter
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com
Executive Designer Designer Designer
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com
Manager Marketing
george.chang@newera.messefrankfurt.com michelle.chu@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Arthur Wu Circulation
George Chang Michelle Chu
Corporate Management
Collins Yuan Thomas Pin Chihung Lee
Group Manager Account Manager IT Manager
collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
Manager Product Manager
willy.wang@newera.messefrankfurt.com jessica.yang@newera.messefrankfurt.com
Trade Fair Manager Project Manager Project Manager
echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com sandra.chen@newera.messefrankfurt.com
asmag.com
Willy Wang Jessica Yang Secutech
Echo Lin Eva Tsai Sandra Chen
International Advertising [Headquarters]
Juihui Lin Kay Yang Audrey Fang Nori Chang
Manager Operation Officer Coordinator Coordinator
juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana
U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia
bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No. 288, Sec. 6, Civic Boulevard, Xinyi District, Taipei 110, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, web sites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
jill.lai@newera.messefrankfurt.com 10
a&s Asia, published by Messe Frankfurt New Era Business Media
APPLICATION CASES >> Telecommunications
Morpho Increases Data Reliability in India
>> Retail
LILIN Secures Shopping Center in Vietnam
FEBRUARY 2016 ● www.asmag.com
Merit LILIN was selected to be the central supplier for the security system at Vincom shopping center in Vietnam. Occupying an area of 13,039 square meters, it is one of the largest of its kind in Southeast Asia. The video surveillance system consisted of 167 LILIN IP varifocal vandal-resistant dome cameras and 11 NVRs, which covered the entire shopping mall including the exits, halls, corridors, and parking lots. The 2-megapixel full HD IP-based dome cameras have a varifocal 3 mm to 10.5 mm lens and features a 1/2.8-inch progressive scan CMOS sensor, along with being IP67 waterproof and IK10 vandal resistant. The NVRs utilize a simple network connection which eliminated much of the hassle involved in setting up the system. They are easily controlled and can be used to manage all of the IP cameras in the shopping mall via a multi-touch, smartphone-like user interface. The LILIN security system successfully provided a discreet, low-profile look while ensuring both the shoppers and employees in the mall feel secure and welcome. The whole system provides stable real-time recording and viewing on multiple monitors, aiding the users to respond quickly to active criminal incidents and prevent threats.
>> Transportation
VCA Tracks Success at Chinese Railway
Wuxi East Railway Station in China wanted to install an integrated video
12
surveillance system that could not only detect and create alerts should a member of the public attempt to enter a restricted area of the station or climb down onto the rail tracks, but also supply statistical data about its passengers. VCA Technology in Wuxi won the contract to install the system which utilized high-definition IP network cameras with VCA analytics onboard. The analytics engine can detect trespassers and send SMS and email alerts to security personnel and station platform staff, as well as trigger audio warning messages over the station’s PA communication system. The system enabled security personnel to carry out post-event analysis by allowing rapid retrieval of relevant images recorded onto the NVRs via user-defined search criteria. Thermal imaging cameras are also supported, making it possible for the system to capture clear images even in bad weather conditions. Senior management can use the analytics system to gain valuable business intelligence on how many people use the station at various times of the day and which areas are the busiest or become congested. The information can be presented in customizable reports that provide comparisons with previously collected data.
Airtel India, a leading mobile network operator (MNO), selected Morpho (Safran) to develop its electronic know your customer (eKYC) program, a digitally-based subscriber on-boarding process that will meet increasing demand for data reliability while acting as a cost-effective, flexible, and environmentally-friendly solution for the company. Using the secure, well-established Indian ID system Aadhaar, Morpho’s proof of concept (POC) provides Airtel with innovative technologies and services to enable the deployment of one of the first biometric-based, paperless mobile ID solutions in India for an MNO. The digital ID system will empower service providers to reinforce their authentication processes, avoid fraud, and guarantee secure access to multiple devices and accounts. This is particularly important nowadays as security and authentication issues have taken on a new dimension owing to people and objects becoming more and more interconnected. The Airtel POC initiative to launch registration is being carried out at various retail points in Lucknow, the capital city of the state of Uttar Pradesh. Morpho’s managed services, which are supported by fully integrated MorphoTablets as the single user interface, include both front- and back-end applications. End users will benefit from greater convenience as it eliminated the need to provide multiple kinds of papers and enabled quicker activation of the subscription.
>> City Surveillance
Sony Improves Traffic Management in India
Big cities demand effective road traffic management solutions. The Indore
Smart and Secure Products Presented at CES
Editor’s Note:
At CES 2016, numerous smart products were showcased that used innovative technology to provide users with more automated functions. Among these is a noteworthy selection of products that emphasized on adding a layer of security protocols.
IRVING SELF-SERVICE ATM CONCEPT
E
yeLock and Diebold have teamed up to develop the screen-less, self-service ATM concept, called Irving. The card reader, PIN pad, and physical screen are completely eliminated on the ATM. To take advantage of the technology, a customer signs into their banking app on their phone or tablet, and determines how much money to withdraw. Once the withdrawal is input, the customer can go to any EyeLock-equipped ATM on the network to complete the transaction. The customer would simply approach the machine, which scans the iris of their eye, to ascertain identity and verify transaction via quick response (QR) code. The ATM then dispenses the correct amount of cash. • Bring-your-own-device (BYOD) access eliminates the need for a physical screen, card reader, or PIN pad • Customers schedule their transaction securely using their own smartphone • Eliminating the PIN pad reduces complexity and streamlines processes inside the terminal, Supplier: Diebold
slashing the potential for card fraud • Authenticates users via near field communication (NFC) and QR code, and biometrics • Removing the card reader from the terminal eliminates the possibility of skimming and other card-related fraud URL: www.diebold.com
IKILOCK
I
KILOCK is not just another Bluetooth smart lock, it relies on several protocols to deliver reliable and secure door management. When the user unlocks IKILOCK using the app on their smartphone, the request is sent to IKILOCK’s remote server via the phone’s mobile broadband. After the Wi-Fi connected IKICENTER receives the request from the remote server, it orders IKILOCK to unlock using ISM 6LoWPAN technology. • Uses ISM 6LoWPAN technology, which implements stronger authentication processes than Bluetooth, and has a longer range • Allows for the creation of an unlimited number of virtual keys and assigns time for accessibility • Provides live updates and notification of the lock’s status Supplier: IKILOCK
• Several modes to grant access: hands-free proximity with Bluetooth, administered remotely through Wi-Fi and traditional metal keys • Simple, secure, and convenient way to manage home security and connectivity through the use of Bluetooth, Wi-Fi, and mobile technology URL: www.ikilock.com
DELTA LEAK DETECTOR
FEBRUARY 2016 ● www.asmag.com
T
he Delta Leak Detector identifies a water leak in your home, allowing you to respond before it becomes a bigger issue. Unlike other leak sensors, the detector does not require a hub to send alerts about a potential water disaster. A detector placed under or near each of the home’s water sources will send an alert to the user’s smartphone upon detection of water, which can be the difference between a minor fix and a major problem. • Each individual detector can independently send notifications to your phone • Low-power software will not overload home Wi-Fi • Each unit it powered by three AAA batteries; the device will last approximately two years • In addition to alerts being sent directly to the Supplier: Delta Faucet
14
user’s phone, audible alerts and an LED light at the source will help the user find the leak • If water hits either ring on the bottom of the leak detector, it will send out an alert to the user’s smartphone — unlike most leak sensors that will only trigger when water pools underneath them URL: www.deltafaucet.com
COVER STORY
Hi Sharp Diversifies Products to Stave off Competition
Founded in 1987, Hi Sharp Electronics is one of the oldest security companies in Taiwan and started as a traditional video surveillance systems provider. Yet, with changing times and increased competition in the industry, the firm realized the need to move outside security to stay alive and succeed. Today, the company boasts a comprehensive line of products and solutions for various niche markets, including car safety. BY William Pao
ver the years, competition in the security industry has become fiercer than ever, especially after the introduction of Chinese products which attract with their low prices. This has produced a profound impact on traditional Taiwan security manufacturers, who are faced with a decline in revenue and profit. As a result, many companies have found it important to provide value-added systems for different niche markets. One example is Hi Sharp, which has already found success in video surveillance with its analog, HD analog, and IP products. Yet, as the cut-throat price competition becomes even more intense, Hi Sharp realized that offering video surveillance systems alone was not enough. That’s why it decided to move beyond traditional security and offer high-quality, high-value solutions for various niche markets and applications.
A Winning StrAtegy
According to Jerry Chiang, President of Hi Sharp, security can be roughly divided into two segments: high-end and competitively priced, and Hi Sharp has the capability to deliver all kinds of equipment to both segments. “For the high-end segment that demands a lot of customization, I’ve got the core capability. Products that are high-quality and highly customized, that’s Taiwan’s strength in the first place, and I focus on that,” he said. “For the competitively priced, we have the manufacturing capability. We engage in some collaboration with China, for example taking their key components, and do the production in Taiwan since we have stronger manufacturing skills and better quality control.” The end result of this approach, according to Chiang, is the company’s growth and success in spite of the strong competitive threat brought by China. “I do not accept defeat and will fight on. After the next few years, we'll be one of the few security players who survive the competition and do well,” he said.
Comprehensive Range of Products FEBRUARY 2016 ● www.asmag.com
Hi Sharp boasts a diverse array of solutions to satisfy the needs of different segments. These include car safety systems, industrial cameras, and monitors.
16
CAr SAfety SyStem
One area that Hi Sharp has moved into and found success in was car safety. In 2013, the company founded a subsidiary called Caravision that specifically makes car safety products and solutions, including onboard cameras and mobile DVRs, targeting operators in public transportation, fleet management, and similar industries. As a matter of fact, Hi Sharp has focused on mobile DVRs for quite some time. “We already knew that mobile DVRs would be the trend of the future,” Chiang said. “Simply said, we have accumulated strong video surveillance expertise, and we apply it to car safety, except the technology threshold for the latter is much, much higher.” Car safety systems are quite complex and present a special challenge for manufacturers. Devices like onboard cameras and mobile DVRs must withstand tough conditions on the road. They also have to communicate seamlessly with the backend command center. Hi Sharp equipment meets these requirements: the onboard cameras not only offer high-resolution images but also 180-degree panoramic views, and they are IP68-rated to protect against various environments. The mobile DVRs are shock- and vibration-proof, allow transmission via 3/4G or WiFi, and come with GPS information record and timing functions. Together, they give operators complete oversight and situational awareness. Hi Sharp’s car safety solutions are found not only on public transportation in Taiwan but also service providers in North America, Europe, Australia, China, and Japan. “We do business with the Japanese, who have very stringent requirements for their products, for example how strong they have to be against vibration and high temperatures,” Chiang said. “Doing business with Japan speaks volumes of the quality of our products.” Already, Hi Sharp’s car safety business accounts for approximately 40 percent of the company’s revenue structure. “In the past, the revenue from our security business supported our car safety business. Now, the situation has reversed,” he said. “For other Taiwan security players seeking to step into car safety, they’ll have a hard time. We, on the other hand, have gone a long way,” he added. “You’ve got to have a reputation in security before you move into car safety. For Taiwan security players who also have expertise in car safety for large-size vehicles, Hi Sharp is pretty much unrivaled.”
Other PrOduCt LineS
Besides car safety, Hi Sharp’s portfolio also includes other product lines targeting different markets. They are summarized as below: Industrial: A product line that Hi Sharp just started, yet is seen as full of potential, is the company’s industrial solutions, consisted of industrial cameras specifically for monitoring and inspection purposes at industrial settings. Being the “eyes” of plants and factories, they have the ability to focus on details and check for defects on products. These features make them ideal for printed circuit board plants, semiconductor wafer plants, as well as food factories. Display: The company has its roots in security monitors, which still form a significant part of Hi Sharp’s portfolio. As opposed to TV or consumer electronic monitors that can’t be left on continuously, security monitors must be on round the clock for constant monitoring of what’s going on. Hi Sharp monitors support different video resolutions and have
Jerry Chiang, President, Hi Sharp Electronics
i do not accept defeat and will fight on. After the next few years, we'll be one of the few security players who survive the competition and do well. meantime before failure of 30,000 hours. “Quality and reliability are of utmost importance,” Chiang said. Camcorder: The company also manufactures handheld camcorders carried by security guards. Each unit features changeable high-capacity lithium polymer battery, high-quality recording of up to 1080 pixels, and a ranking of IP66 to withstand critical environments.
PrOSPeCtS fOr ASiA greAt
According to Chiang, Asia is full of growth potential, as the GDP for different regions has been on a steady growth trend. Specifically, he cited India and Indonesia as markets whose growth will be especially significant. According to the World Bank, India and Indonesia’s GDP will grow 7.9 and 5.5 percent this year, respectively. To that end, the company will put a stronger focus on Asia. Already, Hi Sharp has made inroads into Vietnam, Indonesia, Malaysia, and Myanmar. “In terms of technology, we’re ready. Now we’ll launch the offensive,” Chiang said. With the security market becoming more competitive, Hi Sharp has stretched its portfolio beyond traditional video surveillance products and applications, now focusing on high-value solutions such as car safety. This, along with the company’s manufacturing and R&D capability, has helped Hi Sharp maintain as a competitive and viable force in the business. The firm indeed serves as an exemplary model for competitors to learn from. For more information, please contact the company at sales@hisharp.com.tw or visit Hi Sharp secutech booth #3129.
17
Johnson Controls, Tyco to Merge, Create Leader in Building Technology In yet another deal that gathered the attention of the industry, Johnson Controls, a leader in building management and heating/ventilation equipment, has announced it will combine with global fire and security provider Tyco International, with the goal of offering more integrated solutions combining security and building automation. BY William Pao
n January 25, Johnson Controls and Tyco International announced that they have entered into a definitive agreement to merge. According to the agreement, Johnson Controls shareholders will own about 56 percent of the new company and receive aggregate cash consideration of approximately US$3.9 billion. Tyco shareholders will own the remaining 44 percent. The transaction is expected to complete by the end of fiscal year 2016 and is subject to customary closing conditions, including regulatory approvals and approval by both Johnson Controls and Tyco shareholders. A major ramification of the deal is the disappearance of the Tyco brand, for decades a household name in the security industry. Under the terms of the transaction, the businesses of Johnson Controls and Tyco will be combined under Tyco International, which will then be renamed ”Johnson Controls.” The sheer size of the new company will be significant. ”Johnson Controls has an existing security system integration business which the latest research from the Physical Security Channel Intelligence Service at IHS estimates to be the 10th largest in the world. Meanwhile, Tyco Fire & Security is estimated to be the world’s largest security integrator. The two companies would have a combined share greater than 5 percent of a global market worth around $62 billion,” said Paul Bremner, Senior Analyst for Security Services at IHS. ”Despite this, the security integration supply base would remain highly fragmented, with the top 15 integrators accounting for only around 20 percent of revenues.” Under the deal, the combined company is expected to remain in Tyco’s Irish legal domicile and global headquarters in Cork, Ireland. The primary operational headquarters in North America for the combined company will be in Milwaukee, where Johnson Controls has been based. Due to the inversion nature of the deal, it has drawn criticism that the move was for the new company to pay less tax. FEBRUARY 2016 ● www.asmag.com
HigHly Strategic Move But that aside, the deal is highly strategic, aiming to create synergy between two companies whose strengths lie in different fields. Johnson Controls, which sold its federal security integration business to Versar in October last year and has also announced plans to spin off its automotive parts unit, will move a step closer to its goal of offering total security-building automation solutions. ”Johnson Controls has not kept up with the pace of innovation in fire and security,” said Jim McHale, CEO of Memoori Business Intelligence. “They remain strongest in
18
building management systems and HVAC controls, which have much more in common with their other divisions such as batteries and distributed energy storage.” Tyco, on the other hand, is a leading security conglomerate with well-known brands such as Software House, exacq, Kantech, and DSC that cover video surveillance, access control, and intrusion alarms fields. Yet the company has seen its share of ups and downs. In 2007, it split into three units: Tyco Healthcare, Tyco Electronics, and Tyco International. Then in 2012, Tyco International split again into three, spinning off ADT in the U.S. and a flow control company, Pentair. For a company that seeks to gain further strength and competitiveness in the market, merging with Johnson Controls seems to be the right fit. In the end, given the increasing ties between building automation and security, companies from both industries combine to leverage shared resources and create synergy. The latest deal between Johnson Controls and Tyco International is one example. And with the trend showing no sign of stoppage, we may very well see similar deals to come in the near future.
Security Departments Need to Be Recognized as More Relevant In order to better face the issue of security budget and personnel cut, Qognify explains why security departments need to make themselves more relevant in their future operation. BY William Pao (adapted from Qognify White Paper)
understanding the relationship between business Continuity and safety/seCurity
or any end-user organization, the security department is critical in keeping the premises safe. But at a time when budget constraints are the norm and companies seek to streamline operations, the security department must prove they are relevant, lest facing the prospects of budget or personnel cut. “If security is perceived as a commodity service that doesn’t directly improve the top or bottom line, then how can it be perceived as relevant to the business? And as a result, it is inevitable that security budgets will shrink, which is the exact trend we are witnessing,” said Erez Goldstein, Senior Product Marketing Manager at Qognify. According to him, in order to achieve relevance, security departments will need to adopt the following trends:
According to Goldstein, from a financial perspective, the real value of what the security department does must be shown in numbers to prove that investing in it makes sense. “To improve the perception of relevance, it is absolutely critical to quantify the financial impact of those incidents on your organization,” he said. “Recognizing the need to develop an ROI using various tools, such as pre-packaged use cases, has become more prevalent and useful.”
streamlining operations with your existing safety/seCurity platform If the security department invests in a piece of equipment that can also be shared with other departments, then the ROI will be even greater, especially when it streamlines operations. “This is important because the benefits involved are real, tangible, and very high,” said Goldstein. “Security departments that collaborate with unrelated departments and functions can develop plans to leverage the investment elsewhere, potentially improving profit margins by millions of dollars annually.”
dependability: lean, reliable, and Consistent seCurity operations With more streamlined operations, fewer people are expected to do more work, and efficiency and process automation become more important. “An ongoing trend is to level the playing field with automated processes and workflows, allowing people with mixed abilities to perform many tasks quickly and accurately,” he said.
ComplianCe According to Goldstein, some industries have the additional challenge of maintaining compliance and being able to prove that they have. This has led to the trend of enforcing consistent digitalized procedures across the enterprise, with the addition of integrated systems for combined logging and reporting.
Visibility in the C-suite
FEBRUARY 2016 ● www.asmag.com
The C-suite, made up of company executives whose titles start with the word “chief,” makes the decisions and controls budgets. If they have limited or delayed visibility into what is happening within security, then making the case to invest in it becomes more difficult. “If the C-suite knew and understood the impact of incidents, then they would realize how incredibly relevant safety and security is,” Goldstein said. “This would raise their inclination to invest more.”
20
getting more people inVolVed — eVen the publiC One way to become more relevant is to get more people to use your system. Complementing existing conventional sensors such as cameras, perimeter fence shake detectors, and mobile applications on phones and tablets enables the command center to easily receive input from people, validate them, and prioritize the responses carefully. “The people providing inputs could be staff, trusted members of the public, or even open up input from the public, just as anyone can dial 911 to register an incident,” Goldstein said. “As in any business, results have an impact on relevance,” he concluded. “The more visible influence and ROI your security department has on the organization, the more relevant it will become during budget discussions — 2016 trends are supporting this effort.”
BY Emily Lin
Macau Bets on Diversification for Future Growth
FEBRUARY 2016 ● www.asmag.com
s the only place in China where gambling is legal, Macau has long established a name for itself as the gambling center of Asia, raking in gaming revenues that rivaled that of Las Vegas or Atlantic City. The glitter of the semi-autonomous city, however, has dimmed somewhat after the Chinese government started cracking down on corruption. According to Macau’s statistics and census service, GDP for the first three quarters of 2015 shrank by 25
28
percent, with a 24.5-percent contraction in the third quarter year-on-year. Gaming revenues continued to take a huge hit for a second straight year, reportedly falling 34.3 percent in 2015. VIP gamblers continued to stay away as the government continued its anti-corruption campaign and implemented additional measures such as the increased oversight of certain bank transactions to address illegal crossborder financial activities and money laundering. Analysts predict a further fall in numbers if the government approves the proposed full smoking ban in casinos. This makes for trying times for local
casinos, many of which are reevaluating their company plans and business models to stay afloat. “For the gaming operators, it continues to be a time of uncertainty and planning for future developments. Customer offerings and marketing strategies must be reviewed to encompass these changes,” remarked Bob Ruggles, Business Development Manager of APAC at Pelco by Schneider Electric.
THE CHANGING LANDSCAPE Although visitor arrivals in 2015 were only down 2.6 percent compared to the year before, it is quite evident that they are catering to new clients. Instead
of high-stake gamblers, mainstream tourists now account for the majority of people visiting Macau. This resulted in a 39.9-percent drop in VIP baccarat gross gaming revenues according to figures released by the Gaming Inspection and Coordination Bureau. Official data also showed that the number of Macau-registered junket operators fell a significant 16 percent. The results of this change can be felt around the island as shares of local casino operators fell 40 percent. Some operators have become tentative in starting new projects or holding their grand openings in the lukewarm economic environment, causing big casino resort projects, such as the MGM Cotai and The Parisian Macao, to push back their original opening dates.
Adding More Value to Projects
As budgets become smaller, competition for projects become partly cost-driven, which makes it doubly important for security companies to add more value and benefits to their services such as product support and customer service. For Honeywell, professional sales and technical services are the core of their businesses. “We explain thoroughly to casino customers, especially to their technical teams, our product features – how user-friendly our systems are, what advanced functions we have to help improve operation efficiency, etc. Moreover, we emphasize the benefits our solutions will bring to daily operation, manpower allocation, maintenance, and so on,” said Michael Ng, Regional Sales Leader, Security for Hong Kong, Macau, and Taiwan at Honeywell Security and Fire. Adding value can also come by providing clients with choices that can work together or work with the original system in place. According to Lawrence de Guzman, VP of APAC at Vicon Industries, standards-based, open platform products will allow customers to pick and choose products that would best fit their budgets. “This approach is very scalable and optimized to support a lower total cost of ownership (TCO) and higher return on investment (ROI).” Casino operators are always on the lookout for applications that can allow them to gain new insights for improved security and non-security decision-making. “The security industry will continue to develop through better video content analytics. Not only will this allow customers to mine their video data to improve business decisions, it will allow customers to be more proactive with real-time response to threats,” said Bob Ruggles, Business Development Manger of APAC at Pelco by Schneider Electric.
Security Industry Holding Steady Despite this situation, it appears that the security industry in Macau remained relatively stable as the services it provides play an integral role for both old and new ventures. “There are projects that have been postponed and delayed pending new cost justification and a refocus on priorities and the scale of development. However, security and risk mitigation is a very important and necessary part of projects that are ongoing. Therefore, the integrated security project scope has been less affected by the political and economic environment,” said Peter Francis, VP of EMEA and Asia at Gallagher. Business is still coming in in the form of system upgrades and from projects that are already ongoing. “Gambling is still the most attractive target market of security. Besides new construction projects, many existing analog/hybrid systems in casinos are going to be upgraded and potential demand is still huge,” said Gary Deng, Product
Marketing Manager (Engineered Solutions and Software) for Shanghai at Bosch Security & Communications Systems. But it doesn’t mean that the effects of the economic slowdown has not trickled down to security companies operating in Macau. “Budgets are smaller and projects might not entail the latest products on the
market,” shared Michael Ng, Regional Sales Leader, Security for Hong Kong, Macau, and Taiwan at Honeywell Security and Fire. “In the past, casino operators generally asked for the latest products for new projects, but now they tend to look for more ‘practical’ solutions with good priceperformance ratio.”
"The central government has been pushing the city to diversify its economy and transform itself into a tourist and culture destination, appealing to gamblers and non-gamblers alike."
29
Growing Regional Ties Point Toward Security Growth in Hong Kong BY Emily Lin
FEBRUARY 2016 ● www.asmag.com
ong Kong has long been considered an important business and financial center in the
32
Asia-Pacific region. Having been awarded the title of the “world’s freest economy” for the 21st year in a row in 2015, the city remains a popular choice for both Chinese and international investors who are attracted to Hong Kong’s low tax rates and easy access to the rest of the world. The special administrative
region also came in second for global foreign direct investment (FDI) according to the United Nations Conference and Development (UNCTAD) 2015 World Investment Report.
MATURE SECURITY MARKET Companies report that the overall local
security market still shows positive results. “Hong Kong’s security market is quite mature but there is still some positive growth,” commented Michael Ng, Regional Sales Leader, Security for Hong Kong, Macau, and Taiwan at Honeywell Security and Fire. This growth is supported by projects that are steadily emerging from both the public and the private sector. “We saw increasing demand from public infrastructures like airport, metro, hospital, etc., thanks to the government’s effort to improve public service. Hong Kong is a mature market. Banking and commercial buildings still continuously generate demand with new projects and old system upgrades,” said Gary Deng, Product Marketing Manager (Engineered Solutions and Software) for Shanghai at Bosch Security & Communications Systems. “Market trends are heading toward high resolution, IP-based, and also bundled systems with PA and fire alarms.” Many surveillance systems currently deployed in various government and transportation projects around the city, such as the ones in the mass transit railway (MTRC HK) and the Hong Kong International Airport (HKIA) are undergoing upgrades. “Upgrades of existing analog systems to IP solutions have been ongoing in recent years and this has become a trend in the industry,” said Ng. The upgrades can also include the incorporation of new technology to further enhance its surveillance capabilities. “Analytics for intrusion detection, stopped vehicles, radar systems for real-time camera tracking of objects, thermal cameras for nighttime and bad weather viewing conditions, to name a few, can now all be considered by the customers when replacing outdated equipment,”
said Bob Ruggles, Business Development Manager of APAC at Pelco by Schneider Electric.
INFRASTRUCTURE PROJECTS FOR ECONOMIC GROWTH As Hong Kong is an important trading partner and source of overseas direct investment for China, the central government has been involved in the development of several projects that are aimed to enhance trade and tourism between Hong Kong and the rest of the Western Pearl River Delta region, where Macau, Guangzhou, and Shenzhen are located.
Cross-Boundary Projects The governments of Hong Kong, Macau, and Guangdong are working together to complete the construction of the Hong Kong-Zhuhai-Macau Bridge (HZMB). It is a 42-kilometer bridge and boundary crossing facility that, when completed, will extend over the Pearl River estuary and link the three places. A 6.7-kilometer underwater tunnel is also being built as part of this project to prevent the obstruction of this busy water channel. Another significant ongoing
Hong Kong’s
Economic Challenges Highly dependent on international trade, the city was correspondingly impacted by the recent global and Chinese financial crisis. Based on figures from the local census and statistics department, the external sector contracted 2.2 percent year-on-year in the first three quarters of 2015, with total exports of goods falling 3.2 percent compared to the year before in real terms in the third quarter. However, increased domestic demand boosted the local economy, resulting in a GDP year-on-year growth of 2.5 percent in the above mentioned period, which is lower than the 3.2 percent reported in 2014. Hong Kong’s service-oriented economy was also adversely affected by decreasing numbers in inbound tourism. Its strong currency rate, along with a lack in development of new and exciting tourist attractions and China’s anti-corruption policies, have resulted in many mainland Chinese tourists opting to travel to countries like Japan and South Korea that have weaker currencies. As majority of their tourist volume comes from China (currently around 77 percent based on figures released by the local tourism board), this has resulted in a 3.1 percent fall in retail sales in the first 11 months of 2015.
"Ongoing infrastructure projects will reduce transportation costs and time in the region, increasing both business opportunities and security needs around the city."
33
Video Content Analytics for
Perimeter Defense: Debunking Common Myths
Video analytics companies are continuously focusing on increasing their capabilities in object detection and classification to provide better answers to the challenges of perimeter defense scenarios. We reached out to several analytics providers to hear what the realistic expectations from video content analytics are (VCA) and their solutions to increase BY Israel Gogol, Freelancer the accuracy of detection and reduce false alarms.
FEBRUARY 2016 â—? www.asmag.com
36
ideo content analytics (VCA) and their ability to automatically detect events and alert security personnel have made a big contribution to physical security. After all, there is a limit to how long humans can look at a video feed without losing focus. Video analytics on the other hand keeps an ever-watchful eye. One of the widespread uses of video analytics is in perimeter security. Even relatively basic IP cameras today come with some sort of “tripwire” analytic; however, the use of these analytics in perimeter protection is still challenging.
Misunderstandings skew reality Despite major improvements to VCA algorithms over the years, VCA is still by no means perfect. “The most common misunderstanding regarding VCA and perimeter protection has to do with the fact that most VCA solutions that are built into IP cameras are simply not accurate enough for real world perimeter protection applications,” explained Zvika Ashani, CTO of Agent Video Intelligence (Agent Vi). “There is a very wide range of capabilities and accuracy levels available when talking about VCA. Basic capabilities are available today within many IP cameras which allow defining VCA rules and generating detections but these provide high false alarm rates (FAR) and low probability of detection (POD). A high-end solution provides much better performance in terms of FAR and POD.” Ron Grinfeld, Director of Global Vertical Marketing at DVtel added some of the common misunderstandings and over-expectations clients have from video analytics. “Clients believe that perimeter security solutions can achieve 100-percent probability of detection and zero false alarms, that multiple targets can always be tracked individually across different cameras even when crossing each other and/or walking in a group, or that visual identification of facial details, license plate numbers, and small objects is guaranteed across the achievable detection distances. Another false belief is that VCA for perimeter security can detect specific scenarios such as a person cutting the fence, holding a weapon, fighting, and so on.” Jürgen Konetschnig, COO of Austria-based Cogvis pointed out, “Distinguishing cars in size is easier if they cross the line of sight of a camera than if they move towards the camera. However, distinguishing car models, car manufacturers, or detecting persons that carry weapons in real-time using a classical perimeter setup in a reliable way is — up to now — still only possible in Hollywood movies.”
Zvika Ashani, CTO, Agent Video Intelligence
Boghos Boghossian, CTO, Ipsotek
Ron Grinfeld, Director, Global Vertical Marketing, DVtel
Mike Jamieson, Computer Vision Developer, Aimetis
37
and Oil DipGeopolitics Grease the Wheels for
he history of the oil and gas industry is fraught with booms and busts. But when prices of crude dropped about a half in 2014, there was little
How Big is the Oil and Gas Security Vertical? FEBRUARY 2016 â—? www.asmag.com
Security in the oil and gas vertical generally refers to the processes by which the oil and gas operational sectors, namely upstream, midstream, and downstream, are protected with the help of physical and network security measures to ensure operational efficiency and minimize losses associated with security breaches. According to a report from MarketsandMarkets, the global market size of oil and gas security and service is estimated to grow from US$26.3 billion in 2015 to $33.9 billion by 2020, at an estimated CAGR of 5.2 percent. North America is expected to have the largest market share, but Latin America is expected to grow with the highest CAGR during this period. The major forces driving this market include increased government pressure for compliance to regulations, threats of terrorism and cyber-attacks, and attempts to increase operational efficiency.
42
doubt the industry was witnessing a radical shift. Reasons for the price-fall then were several, including lower US imports and increased production from Canada and Iraq. More than a year later, the price of global benchmark Brent Crude and the US benchmark WTI remain at around US$40 per barrel, way below the $90s and $100s seen over the last decade. Predictably the price-drop and subsequent losses have prompted damage control measures from oil companies. Reports suggest over 200,000 people have been laid off and investments in infrastructure and equipment have been cut down. The last part, decline in infrastructure investments, is what mainly concerns the security industry. But unlike sectors like oil-production equipment makers, the security industry is seeing more opportunities in the situation. Efforts to increase
Oil prices are at unprecedented low levels, but security in the oil and gas vertical is expected to grow at a CAGR of about 5 percent from 2015 through 2020. Several reasons contribute to this, the most important being the need to reduce operational expenses and manage concerns of terrorism and geopolitical tensions. In this article we take a look at the changing oil and gas market landscape and how it impacts the security industry.
Security Industry By Prasanth Aby Thomas
operational efficiency and secure against concerns like terrorism are expected to boost the oil and gas security market in the coming years.
Downturn PromPts neeD for Cost-saving measures One of the major reasons for continued low oil prices is that the production remains strong despite oversupply. This means in traditional oil production hubs like the Middle East, site expansions and project developments continue to take place. In fact, according to Johnny Carni, VP of Marketing and Sales at Controp Precision Technologies, even regions like the Mediterranean continue to see rise in oil and gas installations. What has changed though is how oil producers give importance to controlling the costs
by protecting the assets. This is where the good news begins for the security industry. Synectics is one of the major security solution providers with a strong focus on the oil and gas vertical. According to Steven Williams, Manager of Business Development in the Americas at Synectics, the company is able to take full advantage of the changing landscape by offering integrated security solutions that support operational efficiency. “By consolidating multi-system data in a single environment, significant savings (both in money and manpower) can be achieved over the resources required to individually monitor and control a suite of site systems,” Williams said. “As a result more and more projects are deploying command and control solutions that both unify and ‘make sense’ of data from multiple sources.” He added that such intelligent integrated systems, along with modern camera technology, enables remote monitoring of security and processes at locations that are difficult and costly to continuously monitor in-person. This keeps staffing costs low and aids employee safety. Such an approach to lower the total cost of ownership (TCO) and improve return on investment (ROI) is the general direction that security solutions providers are stressing in the situation. Patrick Looijmans, Solution Consultant for Business Development in EMEA at
43
Apps Widen Scope for
IntegrAted secur Mobile apps that provide access to surveillance data have become a standard feature for most solution providers. We look at the various features these apps offer, their security, and possibilities in allowing access to integrated solutions. BY Prasanth Aby Thomas
FEBRUARY 2016 â—? www.asmag.com
odern technological developments are increasingly centered on the ability to access information anytime from anywhere. This is true in the security industry as well, as mobile applications that let users access surveillance data have become an integral part of solutions. The concept of remote monitoring has received much attention over the recent years. According to a report from IHS “remote� had been a bit of a buzzword for video surveillance as early as 2012. Video surveillance as a service (VSaaS) and its ability to provide remote access was then predicted to be an upcoming area in the market. Fast forward to 2016, almost all solution providers offer their own apps for various mobile platforms, with an array of common functions. But subtle differences in their features and facilities make it important that customers familiarize themselves with them before making a purchase decision.
50
The Key FuncTions in The App The most important function that a mobile app for security surveillance should provide is the option to view surveillance feeds, in real time and otherwise. According to Joacim Tullberg, Global Product Manager for Video Management Systems at Axis Communications, this along with core forensic capabilities for instant viewing of recorded material is the key function of an app.
Ity on the Move Matt Connolly, Director, CudaCam Sales, Barracuda Networks
Dean Drako, President and CEO, Eagle Eye Networks
Joacim Tullberg, Global Product Manager, Video Management Systems, Axis Communications
Remote playback is often supported if the camera has local storage.” There are others who offer a different take on the subject. According to Dean Drako, President and CEO of Eagle Eye Networks, the most basic function of a mobile surveillance app is the ability to see a simple camera view, while today’s sophisticated apps can display footage from any number of cameras from the across the globe, and allow you to view historic video. If the solution is cloud-based, it allows the user to use the app without the limitations of onsite storage. Matt Connolly, Director of CudaCam Sales at Barracuda Networks, added that along with the above-mentioned features, the app should also provide the option to download and share visuals or events. This last point, of “events,” is increasingly becoming a crucial factor in security solutions. A facility to allow event-based actions would require the app to incorporate certain configurations that would intelligently detect elements in the surveillance data and take adequate reactionary steps.
enAbling inTelligenT soluTions on Mobile
But while this can be seen as a general requirement, its actual implementation could depend on the vendor’s choices. According to John Zhang, CEO of Drive Headquarters, the nature of storage plays a key role in the remote monitoring functions of the app. “The common feature is they all can support live viewing,” said Zhang. “The actual implementation can be very different. Many apps can only support live view locally. Remote monitoring can be implemented through server relay or P2P.
With the advent of technologies like the Internet of Things (IoT), there is more and more focus on intelligent solutions that can ensure comprehensive security. Surveillance cameras and video management software (VMS) are increasingly being integrated with other connected devices and are becoming smarter. For today’s mobile apps, this means options that go beyond simple access to data would be a key requirement. To some, this doesn’t necessarily mean the app in itself should offer intelligent options, but it should definitely be able to incorporate access to the intelligent functions in the security equipment. “Main parts of the intelligence are in the system, where the VMS and cameras stand for most of the intelligence,” Tullberg said. “The key function of the app is to present these ‘intelligent’ functions in an easy to use and understand interface.” Others point out that apps themselves can be designed to be smart enough to detect certain events and alert the user. Connolly said his company’s apps offer motion event triggered email alerts, where a user may choose to review the triggered event from within the app. This is in fact considered a common function, offered by other vendors too. “Some examples of our event-triggered options are our motion alerts,” said Drako.
51
IP Security Systems –
a “JumPIng Board” for CyBer IntrusIon In today’s connected world, IP-based systems offer numerous breach points for cyber-attacks. Ironically, physical security systems based on IP infrastructure are among the most vulnerable systems to be attacked due to low awareness and limited offering of “hardened” security solutions. BY Israel Gogol, Freelancer
FEBRUARY 2016 ● www.asmag.com
he recent two years have seen a sharp rise in the number of companies devoted to cybersecurity. Targets from retail chains to social media accounts to critical infrastructure have all come under attack from perpetrators as diverse as organized crime rings, “hacktivists,” and even clandestine government cyber units. “Cyberdefense has been a priority in the IT arena for decades, and with the transition from analog video to IP and the convergence of video systems into enterprise networks, it is now a major concern for physical security systems,” said Ron Grinfeld, Director of Global Vertical Marketing at FLIR Systems. With the increasing number and sophistication of these attacks, cyberthreats are no longer only an IT problem. The physical electronic security industry has moved steadily from the closed, protected, and sometimes proprietary communications methods of the
54
past to open and much more vulnerable network-based solutions. “These transitions, from analog closed circuit television (CCTV) to digital IP-based systems have exposed the physical security stakeholders to the same risks that IT departments have faced for years,” Grinfeld added. While in the past cyber-attacks were mainly a concern for large organizations and government institutes, today they pose a significant risk for most organizations. A successful cyber-attack can result in major consequences for companies, financial loss, data theft, intellectual property or classified information leaks, and erosion of confidence by their customers. Cybersecurity has become a real concern not just for end users, but also for manufacturers and other channel players. A recent example is PSA Security Network, one of the world’s largest security integrator alliances, which has set up a cyber committee to help educate its members on the risks and solutions available.
Common Vulnerabilities of seCurity systems IP-based security systems, whether video surveillance or access control systems can run either side-by-side with other IT systems or they can run partially or entirely within the corporate network. As a result, an unprotected system can be a jumping board into the corporate network. In many cases, the problem is that these systems are not treated as other end-points in the network. Whereas employees personal computers are usually password protected, it is not uncommon to see that the password in the video surveillance system unchanged as the default (sometimes easily accessible through a simple Google search). “Many of the integrators haven’t yet adopted sound cyber hardening practices in their system implementations,” said Andrew Lanning, Co-Founder of Integrated
Security Technologies and the chairman of PSA’s Cybersecurity Committee. “Vulnerabilities are numerous,” he added, detailing a long list of possible risks: “Weak password schemas, implementations, and management; wireless everything; unnecessarily open ports; outdated firmware; and outdated or copied (reused) cryptography in certificate implementations.” All these greatly increase the chances of an attacker to find an entry point into the system. Another risk is users demand remote access and mobility. End-user requirements for remote access to their video footage have resulted in traditional DVRs, NVRs, and VMS being connected to the Internet for remote video access, thus creating more breach points outside of the security system. In addition, the use of mobile devices that can be easily hacked or stolen further compromises the security of the system. “There is an emphasis placed on bring your own device (BYOD) and mobile for many businesses worldwide, which can compromise not only data, but physical security systems as well. Mobile devices are extremely vulnerable to digital attacks and physical attacks because of their portability,” explained Brian Lettiere, VP of Product Management at Verint Systems. Logins, passwords, and other important information are often stored on mobile devices, which allows easy access to pertinent information. Email and social media accounts, along with applications, are just one swipe away and easily accessible to unauthorized users. Theft or loss of a device is an open door to access sensitive corporate data. In addition, smartphones and tablets are easy targets for viruses, Trojans, worms, and spyware, which makes it easy for attackers to gain access to proprietary data. Apps and even the operating system itself are not hardened and there are off-the-shelf malware that hackers can buy to hack a specific application used to access the security information.
Jack Cohen-Martin, Co-Founder, Nuvola Ron Grinfeld, Director, Global Vertical Marketing, FLIR Systems Hagai Katz, Senior VP, Business Development and Marketing, Magal Security Systems Andrew Lanning, Co-Founder, Integrated Security Technologies Brian Lettiere, VP, Product Management, Verint Systems Scott Sieracki, CEO, Viscount Systems
Hagai Katz, Senior VP of Business Development and Marketing at Magal Security Systems voiced a similar opinion. “Most of the market/customers are still unaware of the risk. As an integrator we know that in most cases the awareness to cybersecurity is almost non-existent. The same problems persist: IP cameras’ default passwords are untouched; access control systems may have an external unsecured access point; no one monitors new entrants to the network (such as a new device on the network).” Katz went on to explain that intruders today are likely to prefer committing a cyber intrusion, or a mixed cyber-physical intrusion, instead of taking the risk of actively penetrating through the fence or one of the gates. These scenarios can include neutralizing alerts by blocking or saturating the alarms from the smart fence, creating false perceptions by freezing the video of IP cameras, or streaming recorded footage to the guard’s monitor. Other scenarios might be penetrating the system to create fake identities by the remote production of an access card (thus allowing outside people access to the site), and of course hacking onsite operational systems, creating direct outage or damage to power, elevators, fire alarms, or even damaging production systems through pure cyber-attacks.
Cost-Cutting Compromises Security “The vulnerability of the security systems is a well-known industry secret,” said Jack Cohen-Martin, Co-Founder of Nuvola, a New York-based video-surveillance-as-a-service (VSaaS) provider. The vulnerability is even more complicated because it is very hard to detect cyber-attacks. “It is hard to tell if a camera or another system is under a DoS (denial of service) attack or if it is just stuck. In small and medium businesses the problem is even worse since they are either unaware of cyberthreats to their security systems or just don’t care about it.” According to Cohen-Martin, cheap equipment and common platforms only augment
End-user requirements for remote access to their video footage have resulted in traditional DVRs, NVRs, and VMS being connected to the Internet for remote video access, thus creating more breach points outside of the security system. 55
ASIA LEADING ADOPTION OF BIOMETRIC NATIONAL IDS BY Israel Gogol, Freelancer
Despite being controversial, Asian countries lead the way in adoption of biometric ID programs. Thanks to technological advances, biometric equipment is easier to use and deploy, resulting in the expectation that the future will see wider adoption and more use cases for biometric IDs.
FEBRUARY 2016 ● www.asmag.com
ational biometric ID programs have been implemented in a number of countries. These projects are controversial. Naysayers point to the privacy problems and security risks associated with the large amount of personal information collected by the government, which includes physical characteristics such as pictures, fingerprints, iris, etc. Nonetheless, adoption of biometric solutions for national ID and other national projects (e.g., election voter registration) is still ongoing. “When compared to other regions, Asian countries are at the forefront of using biometric identification for national ID programs (and of course many other uses). Malaysia, Hong Kong, and several other Asian countries have similar capabilities and are ahead of or at least on
58
par with, mainly European, challengers in the area of biometric national IDs,” said Daniel Bachenheimer, Unique Identity Services, Global Lead at Accenture. For example, Malaysia introduced the first biometric passport in 1998, preceding the International Civil Aviation Organization (ICAO) standard by five years, and its national identity card MyKad with fingerprint and face biometrics data in 2001. The MyKad
made Malaysia the first country in the world to use an identification card that incorporates both photo identification and fingerprint biometric data on an embedded in-built computer chip. The unique identifiers associated with the card make it a platform that can also be used as a driver’s license, ATM card, electronic purse, and public key. Around the same time, Hong Kong introduced a biometric ID card. This card helped automate the border clearance process through dozens of electronic gates with thumbprint recognition facilitating millions of crossings. Other countries in the region are following suit and biometric ID programs are now being implemented in India, the Philippines, and other countries.
Fingerprint and Facial Most adopted The most common, and required, biometrics technologies used in Asian (and global) national IDs are fingerprint and facial biometrics — often the requirements of international bodies, too. For example, the ICAO standard for electronic machine-readable travel documents (eMRTDs) mandates inclusion of a facial image with the option of including finger and/or iris biometric images. David Gerulski, VP at Integrated Biometrics, explained that Asian countries are ahead of their Western counterparts due to their ability to build out biometric systems in greenfield applications, as opposed to having to replace previous technology. It is interesting to note, that in many cases the countries adopting the most advanced biometric solutions are still considered developing countries. “Identity management programs employing biometrics offer real benefits in countries that have undocumented citizens,” explained Gerulski. “Better than an ID card, biometrics ensures that social services are being provided to the proper citizens.” Young Moon, VP at Suprema, voiced a similar opinion. “Biometric national IDs
(Source: Acuity Market Intelligence) National eID global revenue according to The Global National eID Industry Report: 2014 by Acuity Market Intelligence.
have been recognized as one of the most efficient identification methods for multiple purposes such as fair elections and unbiased welfare payments. It could help governments put their affordable budget in a right place through biometric-based identification.” The unique identification made possible through biometrics helps governments fight fraud and graft, which are rife in situations where a person’s identity cannot be established easily, or where regular IDs can be easily forged. Recently, in a move aimed to restrict criminal and terrorist activity, Bangladesh announced that every SIM card owner in the country would be asked to verify their identity by providing their fingerprint, which will be checked against the fingerprint data associated with their national identification. Despite the controversy over privacy issues, the expansion of using biometric data has been valuable. “ID cards from the dead can no longer be used to receive social services payments, voters are only allowed to vote once, and government officials must actually come to work to receive a salary,” explained Gerulski, who gave an example of “ghost teachers” in Pakistan. In the past, some teachers in rural areas would continue to receive government payments even though they were no longer holding classes. “Pakistan is now saving millions of rupees requiring teachers to be enrolled through fingerprints to receive payments,” he added. While contact fingerprint scanners and facial imagers continue to dominate the market, stand-off iris and contactless fingerprint scanner technology is expected to gain market share.
equipMent advances to increase adoption oF BioMetric ids Technology advances in biometric scanners, storage, and portability of the equipment now make enrollment faster and more accurate. Manufacturers go to great lengths to create systems that can operate in harsh conditions. “New enrollment and verification equipment is 10 times lighter in weight and more energy efficient than they were just five years ago,” explained Gerulski.
59
s r e r u t c a f u n a M ips
h s r e n t r Seek Pa en
h t g n e to Str e r a h S t e k r a M
prefer y l g in s a e r c This has tomers in . s s u e c ic y v it e r d u al Sec r individu cturers to enter e v o s n io solut al manufa heir footprint. r e v e s d e t prompt o expand , t s ip h s r e tegrators in s m e t s into partn nities. and sy u s t r r o o t p u p ib o r w For dist rray of ne a n a p u s this open omas th Aby Th BY Prasan
FEBRUARY 2016 â—? www.asmag.com
62
he security industry has moved well past the phase of merely selling equipment, to providing complete solutions that are customized to specific requirements of customers. Today’s manufacturers ensure they know each of their vertical markets, understand their uniqueness, and put together systems that not just solve security requirements, but improve overall operational efficiency. For similar reasons, vendors now increasingly prefer to be considered solution providers rather than just makers of a video surveillance camera or an access control panel. A few have taken the responsibility to manufacture their own products across segments, expanding the footprint from within their brand. But most have taken the route of entering partnerships with other manufacturers. One such company that has entered into several partnerships with niche technology manufacturers is CNL Software. Adlan Hussain, VP of Marketing at CNL, believes customers prefer to take advantage of the strengths of different manufacturers, instead of relying on a single solution provider. “We have seen a shift from vendors trying to offer a ‘one-stop shop,’ to an understanding that end users like to mix and match technologies based on value and performance within their unique environments,” Hussain said. From the customers’ perspective, this makes perfect sense. Within security, it is more common to see companies that are strong in a particular field than in all of them. For instance, AMAG Technology is primarily known for its access control systems, but as the company understands customers today require integrated security systems, it has partnered with several other companies to improve their
David Ella, VP, Product Marketing, AMAG Technology Vladimir Eremeev, Director, International Business, Ivideon Adlan Hussain, VP, Marketing, CNL Software Larry Reed, CEO, ZKAccess Andy Shen, Channel Director, Global Market, Hikvision Digital Technology Tim Shen, Marketing Director, Overseas Business Center, Dahua Technology
Companies joining hands with others often ensure provisions for product support even after the partnership ends, but complications could rise when product upgrades come in.
presence in the market. One example is their integration with Salient Systems. “While we’ve partnered with numerous technology companies over the years, in 2015 we made the strategic move to strengthen our partnership with Salient Systems,” said David Ella, VP of Product Marketing at AMAG. “Salient Systems manufactures video management software and hardware, and allows us to deliver both access control and video solutions to our customers.” Such partnerships also give manufacturers opportunities to join hands at the engineering level, leveraging each other’s expertise to bring better products to the market. According to Vladimir Eremeev, Director of International Business at Ivideon, partnerships open up possibilities for further innovation in co-branded products. This in turn helps distributors and systems integrators (SIs) offer better solutions to the end customers.
How Distributors anD systems integrators benefit The most obvious advantage for distributors and SIs from manufacturers’ partnerships is the increase in the range of products that they can offer to the market, helping to strengthen their customer base. “It [partnerships] will allow distributors and SIs to offer the differentiated products (from single product to more sophisticated product solutions) to their customers compared to others, which will help them to expand the market and gain more profit,” said Andy Shen, Channel Director for Global Market at Hikvision Digital Technology. The second key benefit that resellers derive from this is the possibility to buy an integrated solution from one source, with equipment that is guaranteed to work together efficiently. This is especially true of SIs, who would appreciate the assurance of products’ compatibility with each other for integration. “For the systems integrator, they are happy to see if we solve 99
63
SMAhome
By a&s SMAhome
Home security and safety were the two largest smart home categories at CES this year. There were upgraded versions of cameras, alarm sensors, smart locks, video door bells, and safety sensors for fire and flood alarms. Among them, network cameras and smart locks stood out as two popular product lines.
Home Cameras witH Feature upgrades
FEBRUARY 2016 ● www.asmag.com
For home cameras, the main features seen so far include support for HD 720p video resolution and a field of view of around 120 degrees or less. At CES this year, new-generation cameras that were battery-powered, wire-free, with 180-degree viewing angle, and resolutions of up to 4K QHD were the highlights. With the introduction of H.265 format, home monitoring cameras supporting up to 4K video resolution are now expected to become more prevalent. Those deserving special mention include Swann’s new 4K Ultra HD Security System, D-Link DCS-2630L, smanos UFO Panoramic WiFi FHD camera PT-180, Blink, Amaryllo iCamPRO Deluxe, and Vivint’s Ping. Swann’s new 4K Ultra HD Security System includes four 4K and eight megapixel HD cameras with IR cut filters to capture sharp images at night up to 100 feet away. D-Link introduced DCS2630L, a full HD 180-degree Wi-Fi camera, supporting de-
66
warping technology to maximize video quality with less distortion. smanos showcased its new Wi-Fi FHD camera, featuring fish-eye lens and 360-degree coverage. The camera provides 360-degree birds’ eye view, auto-corrected 180-degree panoramic view and 90-degree quad view simultaneously, and two-way conversation at HiFi audio quality. Blink and Amaryllo iCamPRO Deluxe won the 2016 CES Innovation Award. Blink is a compact wire-free 720p HD camera for indoor home monitoring, supporting motion detection and temperature alerts. iCamPRO Deluxe is a home security robot with a FHD camera and light bulb base, featuring patented technologies in 360-degree auto-tracking and face detection. It supports E26/E27 socket for one-minute quick setup. Vivint’s Ping camera features two-way talk facility with one-touch callout. It supports cloudbased Smart Clips service to provide ondemand access to 20-second recorded clips. In addition to upgrades in functionality, several camera makers highlight full compatibility with multiple communication standards. Oco2 camera supports dual-band (2.4 and 5 GHz),
n Home cameras are upgrading to 4K UHD and many are targeting nursery solutions.
n Entry control is a highlighted zone among home security sectors.
and BLE 4.0 for integration to other smart home devices. Swann’s security DVR can function as a smart home gateway, which supports up to four protocols, Bluetooth, Wi-Fi, ZigBee and Z-Wave. Beyond hardware enhancements, leading brands are shifting the product portfolios to vertical solutions for better market positions. Smart nursery applications are a good example. Recognized as a camera leader, Binatone launched homecare cameras, Baby Connect 7 and Baby Connect 5, under the Motorola brand. The cameras come with a 7-inch and 5-inch multi-point touch display, and a PTZ camera. Equipped with smart analytics, the system supports monitoring and analysis of indoor and outdoor temperature, humidity, noise, and activity. Besides, the cameras feature two-way audio communication, baby care timer, baby sleep movement and smile detection. The company tries to differentiate itself from its competitors to cope with severe competition in the home camera market.
Better entry Control The smart video doorbell is a growing and promising category, exhibiting lots of innovations at CES this year. Some smart lock companies like August and Yale launched new video doorbells to strengthen their lineup of access control systems. August launched Doorbell Cam while Yale introduced Look Door Viewer, which comes with a smart door bell and 4.3-inch LCD monitor. Innovating on old-fashioned locks is not just about replacing the hardware, but also about making them smarter through leveraging
cloud platforms and software. HomeKit compatibility has been a popular term for smart home devices. With the introduction of Weave, Google’s common language for Brillo in mid-2015, we’ve seen new solutions joining Google’s ecosystem this year. One of the prime examples is Yale’s deadbolts that support Google’s Brillo and interconnectivity with Weave-enabled devices from different categories and brands. Locks supporting Weave can easily talk to other connected devices and support scenario setting, such as unlocking the door, turning on lights and music, etc., when users arrive home. Apart from this, there is another array of camera specialists who have noticed the needs for video monitoring in door entry areas, bringing to the market new products like Ring’s Stick Up Cam and Brinno’s low-power Wi-Fi camera. The award-winning Netatmo Presence is an outdoor home monitoring camera, which features integration of a floodlight to light up the way at night and also deter any unwanted visitors. These cameras feature weather-assistance for outdoor application, and wire-free design for easy installation outside the house. Wearables can be considered as a new kind of home control device for onthe-go convenience. For example, Yale’s Bluetooth smart lock can be controlled wirelessly with a smartphone or Samsung’s smartwatch. Kevo Convert from Kwikset supports Android Wear devices like Moto360 smart watch. Compatible with Apple HomeKit, Schlage Sense Smart Deadbolt and Kwikset’s Premis enable users to control their smart locks via Apple Watch or Siri voice control. Users can create integrated scenes with Premis, such as lighting or heating the rooms when the front door is open. If you don’t have a smart watch, you can also control your smart lock with Yale’s userfriendly design. With Yale’s “Twist and Go” technology, users can unlock the deadbolt by twisting the smartphone from vertical position to horizontal when approaching the door. It is estimated that over 70 percent of homeowners enter their homes through
More and more professional security makers are eyeing on the smart home market for better chances.
67
SMAhome
New
Directions in Smart Home at CES 2016 By a&s SMAhome
True to its hype, CES 2016 was one of world’s largest consumer electronics shows that housed several innovative launches and technological marvels. Shifting focus from mobile devices, this year's show gave due importance to solutions in virtual reality, gaming, connected vehicles, drones, and IoT-related gadgets. Meanwhile, smart home was absolutely one of the highlights. Having interviewed dozens of smart home-related exhibitors at the mammoth showground, SMAhome presents five trends that could influence market developments, that product developers should know.
1. Professional security sPecialists eye smart home
FEBRUARY 2016 ● www.asmag.com
As home security is ranked as the top reason why users are interested in smart homes, professional security manufacturers are eyeing this market as an untapped business opportunity. Leading American security brands such as Honeywell, Tyco, Swann, First Alert, etc., all had booked large spaces at CES to demonstrate their new offerings. Compared to suppliers from other backgrounds, these professional security specialists have an edge in security technology design of smart homes because of their vast experience in the field. However, smart home is all about solutions, which includes cross-brand devices, software, and even cloud services syncing together. Security pros who are used to closed-type systems should be aware of the current inclination to openness in smart home. Aesthetics in product design should not be overlooked either.
2. far from being “Diy-frienDly” A major portion of smart home exhibits at CES this year still needed professional installation or integration services.
70
Furthermore, when asked about their best sales channel, more than half of the exhibitors said retail did not perform as well as they had anticipated, while revenue from professional channels or projects were the highest. It is obvious that majority of smart home solution providers still rely on professional services of builders, construction companies, or house renovators. This “not-so-DIY-friendly” aspect may hamper the adoption of smart home products in the after-builder market because of their extra costs of ownership to users. Yet, it should be noted that major home appliance brands are launching their connected home ecosystems. Bosch, Siemens, Whirlpool, Panasonic with its ORA, LG with its SmartThinq, Samsung with SmartThing and ChangHong with IPP,
are all making steady strides in this direction. With their ongoing market promotions and new business partnerships with service providers in home insurance, utility, or MSOs, the transition into a “consumer technology-oriented” smart home can be faster than we expect.
3. ‘Working With nest’ is the hyPe Thanks to the release of Nest Weave last October, “Works with Nest” was a popular tag seen at CES this year. Nest Weave enables direct device-to-device communication across networks including Wi-Fi and Thread, allowing developers to have end-to-end solutions that enable them to work with Nest, and use only parts of the program that meet their needs. According to Nest, Nest Weave solves many issues associated with connecting products in the home, including connecting power-constrained devices as well as devices that require low latency and redundancy. More than 11,000 developers have accessed Nest’s APIs to connect with Nest products through the cloud – and 1 in 8 Nest homes are using a “Works with Nest” integration. For OEMs and other Asian manufacturers that are interested in the U.S. market
but have integration difficulties, this program may be a solution.
4. sensitive to Data value Rather than highlighting technology, some smart home exhibitors focused on data collected by connected sensors, devices, and smart applications, such as behavioral patterns. The sensitivity to data is turning smart home from a bunch of “nice-to-have” products into a “must-have” life helper. Not only do they give home owners accurate info on what is happening, but also provide options of precaution to possible incidents or any abnormal situations. Another interesting development seen at CES was Icontrol, Arrayent, DSR, Alya and many other IoT or M2M platform designers displaying their products to end customers. By collaborating with different partners to exhibit in their booths, platform designers not only showed the extensibility of their ecosystem to potential OEM platform adopters, device makers and key component providers, but also helped to educate the market on the value of IoT platform for data collection
71
DVTel Ariel CM-3102 Full HD Mini Dome
TeleEye MQ275E-HD 1080p IR Varifocal Camera
Microdigital MDS-1091H AHD PTZ Camera
Features:
Features:
Features:
• Multi-stream H.264 video • Guaranteed frame rates in complex, high motion scenes • Motion processing • Auto-tune technology • IR model delivers more uniform high quality illumination
• • • • • •
• • • • • •
■ DVTel (FLIR Systems)/U.S. ■ Email: info@dvtel.com
1080p HD IR varifocal camera 1/2.8” Sony CMOS sensor, 30 fps H.264 compression 2 independent video streams IP66 weatherproof ONVIF profile S
■ TeleEye Group/Hong Kong ■ Email: info@teleeye.com
10x optical zoom AHD 1080p outdoor PTZ dome camera 1/3” progressive scan CMOS sensor Optical 10x zoom, digital 32x zoom (max 320x zoom) Pan 360 degrees endless, tilt 92 degrees, 250 presets Privacy mask, motion detection Built-in fan and heater
■ Microdigital/Korea ■ Email: sales@microdigital.co.kr
AMG AMG9HME-1GH-1S Industrial Hardened Gigabit Media Converter With PoE+ Features: • Compact size: ideal for confined spaces, including camera poles and roadside cabinets • -40 to 75 degrees Celsius temperature: maintains performance in extreme conditions • Non-programmable: no need for any user configuration or computer setup • DIN rail mountable: quick to install and remove for maintenance
• Gigabit SFP port: supports single and multimode, single, or dual fiber options up to 120 km • Gigabit Ethernet copper ports: high bandwidth support
Matrix Cosec Arc DC 100P IP-Based Single Door Access Control Panel
Videotec MAXIMUS MVX Explosion Proof Day/Night Camera
Hikvision DS-2CD6626BS-R Darkfighter Series 2-MP Anti-Corrosion Dome
Features:
Features:
Features:
• • • •
• In electropolished and silicon micro shot peened AISI 316L stainless steel • High resolution: up to 550 TV lines • Advanced image stabilizer (stable zoom mode) • 1 alarm input and 1 relay output • Integrated wiper • Power supply: 12-24 Vdc/24 Vac
• • • • • •
Compact, single door access control IP panel with PoE Two readers on Wiegand or RS-485 Standby operation with network connectivity Support data and power on PoE for readers and door lock • Stores up to 10,000 users • Support up to 1,000,000 events
FEBRUARY 2016 ● www.asmag.com
■ Matrix Comsec/India ■ Email: customer.care@matrixcomsec.com
76
■ AMG Systems/U.K. ■ Email: sales@amgsystems.com
■ Videotec/Italy ■ Email: info@videotec.com
Darkfighter ultra-low illumination technology 316L stainless steel housing 1/1.8” progressive scan CMOS sensor 2.8 to 12 mm motorized VF lens 120 dB WDR ISO C5-M, NEMA 4X certification
■ Hikvision Digital Technology/China ■ Email: overseasbusiness@hikvision.com
AMAG Symmetry GUEST Web-Based Visitor Management System
BCDVideo BCD215-120-MP-C Rackmount Server
Features:
• Accommodates up to 120 TB of internal storage • Manufactured specifically for enterprise IP video surveillance applications • Combined with Supernova storage to offer high availability solutions for video recording • Built with scalability, reliability, and longevity • RAM: 16 GB • 2U rackmount
Features:
• Flexible, cost-effective visitor management solution • Clear and simple monthly fee • Designed for medium to enterprise scale organizations • Web-based system can run on any PC, tablet, or smartphone • Provides the visitor with information in advance of their visit • Enables visitors to check themselves in and print an ID badge
■ BCDVideo/U.S. ■ Email: sales@bcdvideo.com
■ AMAG Technology/U.S. ■ Email: sales@amag.com
Antaira LMP-1204G-SFP 12-Port Industrial Gigabit PoE+ Managed Ethernet Switch Features: • 8-port 10/100/1000 Tx Ethernet with IEEE802.3at compliant PoE+ and 4-port 100/1000 SFP slot • Network redundancy support: G.8032 ERPS, RSTP, MSTP • Supports IGMP v1/v2, up to 256 groups, IEEE802.1p QoS, CoS/ToS, and IEEE802.1Q VLAN, SNMP v1/v2c/v3 • Redundant power input design, 48-55VDC • IP30 rugged metal case design and DIN-rail mounting, wall mounting • Operating temperature range – STD: -10 to 70 degrees Celsius, EOT: -40 to 75 degrees Celsius ■ Antaira Technologies/Taiwan ■ Email: sales@antaira.com.tw
Vanderbilt Aliro Market Package 1.15 IP Access Control Solution Features: • Flexible operating concept allows the system to be managed from virtually any Internet-connected device • 4 new languages: Russian, Polish, Czech, and Greek • Automatically detects access control units in the system • Manage up to 512 doors, 10,000 users, 100,000 access cards
• Uses MIFARE DESfire card readers ■ Vanderbilt Industries/U.S. ■ Email: info.international@vanderbiltindustries.com
Imaging Source TIS 5 MP Lenses
CEM Systems AC2000 Security Management System v7.1
Continental Access Control Integration Appliance CA-AIA
Features:
Features:
Features:
• • • •
• Improved application programming interface (API) for easier third-party integration • New room booking solution • Multi-card support capabilities • Allows for full bi-directional communication, making is possible to send and receive information from the access control systems to other platforms • System administrations can enroll and differentiate multiple active cards per individual
• • • • • •
Available in C- or CS-mount types Focal length of 3 mm up to 75 mm Optical resolution of 5 MP Can be used in conjunction with a variety of CCD and CMOS sensors • Delivered in a compact, robust metal housing suited for industrial applications
■ The Imaging Source/Germany ■ Email: sales@theimagingsource.com
8 GB RAM 4 USB port Mini display and HDMI ports Over 1,500 inputs and outputs each Flexible mounting bracket included T-base 10/100 network port
■ Continental Access Control (Napco Security Technologies)/U.S. ■ Email: salesinfo@cicaccess.com
■ CEM Systems (Tyco Security Products)/Ireland ■ Email: cem.sales@tycoint.com
77
March – July 2016
WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.
March 2016
Safe Secure Pakistan • • • • •
Date: 2016/03/01–03/03 Venue: Pak-China Friendship Center, Islamabad, Pakistan Tel: +92-21-111-734-266 Email: info@safesecurepakistan.com URL: www.safesecurepakistan.com
PROTECT • • • • •
Date: 2016/03/02–03/03 Venue: SMX Convention Center, Manila, Philippines Tel: +632-818-6828 Email: leverage@leverageinternational.com URL: www.protect.leverageinternatonal.com
Security Show • • • •
Date: 2016/03/08–03/11 Venue: Tokyo Big Sight, Tokyo, Japan Tel: +81-3-3512-5670 URL: www.shopbiz.jp/en/ss
MIPS • • • • •
Date: 2016/03/14–03/17 Venue: Expocentre Fairgrounds, Moscow, Russia Tel: +7-499-750-08-28 Email: security@ite-expo.ru URL: www.securika-moscow.ru
ISC Brasil Date: 2016/03/15–03/17 Venue: Expo Center, Norte, Sao Paulo, Brazil Tel: +55-11-3060-4893 Email: ivan.romao@reedalcantara.com.br URL: www.iscbrasil.com.br
ISC West • • • • •
Date: 2016/04/06–04/08 Venue: Sands Expo & Convetion Center, Las Vegas, U.S. Tel: +1-203-840-5602 Email: inquiry@isc.reedexpo.com URL: www.iscwest.com
Secutech International • • • • •
Date: 2016/04/19–04/21 Venue: Nangang Exhibition Center, Taipei, Taiwan Tel: +886-2-2659-9080 Email: echo.lin@newera.messefrankfurt.com URL: www.secutech.com
Secutech India • • • • •
Date: 2016/04/21–04/23 Venue: Bombay Exhibition Center, Mumbai, India Tel: +91-22-4286-3800 Email: info@secutechexpo.com URL: www.secutechindia.co.in
Securex • • • • •
Date: 2016/04/25–04/28 Venue: Poznan Congress Center, Poznan, Poland Tel: +48-61-869-2131 Email: pcc@mtp.pl URL: www.securex.pl
Expo Seguridad • • • • •
Date: 2016/04/26–04/28 Venue: Centro Banamex, Mexico City, Mexico Tel: +1-203-722-7351 Email: marreola@reedexpo.com URL: www.exposeguridadmexico.com
May 2016
Asian Securitex • Date: 2016/05/04–05/06 • Venue: Hong Kong Convention & Exhibition Centre, Hong Kong • Tel: +852-2804-1500 • Email: xhibit@hkesallworld.com • URL: www.asiansecuritex.com
Exposec • Date: 2016/05/10–05/12 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: international@cipanet.com.br • URL: www.exposec.tmp.br
Securex South Africa • Date: 2016/05/24–05/26 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: info@specialised.com • URL: www.securex.co.za June 2016
IFSEC International • • • • •
Date: 2016/06/21–06/23 Venue: ExCel London, London, U.K. Tel: +44-20-7921-5000 Email: rachel.eaton@ubm.com URL: www.ifsec.co.uk FEBRUARY 2016 ● www.asmag.com
• • • • •
April 2016
July 2016
SecProTec East Africa • Date: 2016/07/12–07/14 • Venue: Kenyatta International Conference Centre (KICC), Nairobi, Kenya • Tel: +49-40-710070-51 • Email: stefan.freiberg@planetfair.de • URL: www.secproteceastafrica.com
73
Companies in This Issue Products of the Month • DELTA FAUCET • DIEBOLD • IKILOCK
• PURETECH SYSTEMS • SIGHTLOGIX Market Dynamics • BOSCH SECURITY AND COMMUNICATIONS SYSTEMS �SHANGHAI) • GALLAGHER • HONEYWELL SECURITY AND FIRE �ASIA) • PELCO BY SCHNEIDER ELECTRIC • VICON INDUSTRIES
Cover Story • HI SHARP NEWS FEATURE • IHS • MEMOORI BUSINESS INTELLIGENCE
Special Feature • ACCENTURE • INTEGRATED BIOMETRICS • SUPREMA
VIEWPOINT • HID GLOBAL • MEMOORI BUSINESS INTELLIGENCE • QOGNIFY • VERINT SYSTEMS
Business Talk • AMAG TECHNOLOGY • CNL SOFTWARE • DAHUA TECHNOLOGY • HIKVISION DIGITAL TECHNOLOGY • IVIDEON • ZKACCESS
Product Exploration • AGENT VIDEO INTELLIGENCE • AIMETIS • COGVIS • DVTEL • IPSOTEK • LUXRIOT EUROPE
Next Issue
Vertical Solution • AMG SYSTEMS • BOSCH SECURITY SYSTEMS • CONTROP PRECISION TECHNOLOGIES • OPGAL OPTRONIC INDUSTRIES • OSPREY INFORMATICS • PELCO BY SCHNEIDER ELECTRIC • SIGHTLOGIX • SYNECTICS Solution Design • EAGLE EYE NETWORKS • FLIR SYSTEMS • INTEGRATED SECURITY TECHNOLOGIES • MAGAL SECURITY SYSTEMS • NUVOLA • VERINT SYSTEMS • VISCOUNT SYSTEMS Smart Technology • AXIS COMMUNICATIONS • BARRACUDA NETWORKS • DRIVE HEADQUARTERS • EAGLE EYE NETWORKS • HONEYWELL SECURITY
Product Exploration
Market Dynamics
INTERCOMS AND DOOR CONTROL SYSTEMS
KOREA
Business Talk
Vertical Solution
SYSTEMS INTEGRATION BUSINESS
EDUCATION
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
9
AXIS COMMUNICATIONS AB
NETWORK VIDEO SOLUTIONS
SWEDEN
contact-sap@axis.com
5, 7
DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
INSIDE BACK COVER
FLIR SYSTEMS CO., LTD.
SURVEILLANCE
HONG KONG flir@flir.com.hk
6
FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.
DOME COVER
CHINA
sales@fjsmt.com
3
HDPRO CO., LTD.
CCTV
KOREA
sales@hdprocctv.com
FRONT COVER,16,17
HI SHARP ELECTRONICS CO., LTD.
CCTV / DVR / MONITOR / IP CAMERA / HD-SDI / TVI / AHD TAIWAN
sales@hisharp.com.tw
BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
15
IDIS CO., LTD.
SURVEILLANCE
KOREA
sales@idisglobal.com
39
INODIC INC.
CAMERA
KOREA
sales@inodic.com
19
MEERE COMPANY INC.
CAMERA
KOREA
sales@cube-eye.co.kr
INSIDE FRONT COVER
PANASONIC SYSTEM NETWORKS CO., LTD.
VIDEO SURVEILLANCE
JAPAN
-
21
SHENZHEN COMMANDER TECHNOLOGY CO., LTD.
CASING
CHINA
sjw@yjdcase.com
11
SONY ELECTRONICS ASIA PACIFIC PTE. LTD.
NETWORK MONITORING SOLUTIONS
SINGAPORE
pro.info@ap.sony.com
4
WEBGATE INC.
DVR
KOREA
support@webgateinc.com
1,2
WESTERN DIGITAL TAIWAN CO., LTD.
SURVEILLANCE STORAGE
TAIWAN
patrick.lo@wdc.com
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
79