CONTENTS 30
P.
NOVEMBER 2015
MARKET DYNAMICS
Malaysia Sees Silver-Lining in the Long Term The Malaysian economy is going through a difficult phase and its security industry is worried about slower growth in the coming years. In the short term, things do look bad indeed. But this does not mean that its long-term potential and role as a prominent market in Southeast Asia can be denied, and it’s precisely this reason that continues to attract foreign players to this country.
PRODUCT EXPLORATION
66
P.
OPEN
Hotel Keys Go Mobile Guest safety and hotel security are paramount concerns for all hotel operators. As such, access control through the use of electronic locks has become somewhat of a norm for most hotels. The industry is seeing a growing trend of using locks not merely as a security measure, but rather, as a means to streamline services, enhance convenience, and improve the overall guest experience.
NOVEMBER BER 2015 Ɣ Ɣ www.asmag.com www.asmaag..co com
Wireless Locks Bring Flexibility to Electronic Access The many benefits of wireless locks are becoming more apparent as electronic access control continues to gain popularity. Without extra wires and cables, wireless locks can provide many different verticals with an electronic access solution that is not only more cost-effective, but allows for more flexibility as it is easier to implement and manage.
70
P.
Contents................................P.14 Editor’s Note .........................P.18 Application Cases .................P.20 Products of the Month ..........P.24 Asia at a Glance.....................P.36 New Products ........................P.80 Show Calendar ......................P.84 Companies in This Issue ........P.86
16
Global Security Awareness Rises Due to Recent Incidents
a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.
ISSN 1997-6267
NOVEMBER 2015 Ɣ www.asmag.com
ust around the publication date of this issue, France experie n c e d E u ro p e ’ s m o s t terrifying terrorist attack in the last 10 years, which killed 129 people and wounded over 300. Going back in the history of terrorist incidents in France, 2014 and 2015 have witnessed the most attacks, with the mass shooting at the satirical magazine Charlie Hebdo, which resulted in the deaths of 20 people and 22 injured. This year, the rise of the Islamic State (IS) militant group has caused many countries to strengthen their national security and safety measures, including Asia. In Southeast Asia, security threats also remain very high. At this time, how to provide the most updated security solution to prevent future disasters should be what we work on now. In this issue, we are also proud to present the Security 50 report and ranking for 2015. From this year ’s rankings, we can clearly see the shakeout of the current industry, which we highlighted in several of our past issues. This time, via Security 50, we are able to support our statements with actual figures. Thanks to the contributions from the top 50, we are able to have a clearer picture of the whole industry. Due to the commoditization of security products and the world expansion of some major Chinese brands, mostly in video surveillance, we are now seeing the consolidation of certain brands. This year, it was extra obvious.
18
However, consolidation doesn’t mean the security market is not growing. The market demand is still there, which is also driven by the numerous security threats, but I would say, the market needs something different from the past. In the past, a simple device could satisfy most needs, but now, customers might need a solution with some special technologies or customer support, such as video analytics, biometrics, facial recognition, or cloud service, to actually solve their problems. From the recent terrorist attacks around the world to our findings in the Security 50 report, it is clear to see the market needs effective security solutions to actually predict and deter crimes and attacks in the early stages. We hope to see more companies in the near future focus on developing innovative solutions, especially now as the world is under such a huge terror threat. Hope you enjoy this year’s Security 50 report. You can also find the report and ranking online, please check http://www.asmag.com/rankings/ or scan the QR code.
中華郵政北台字第1571號 執照登記為雜誌交寄 Parson Lee Joseph Lee John Shi
Senior Consultant Consultant Executive Editor-in-Chief
Hubert Duh Charlie Wong
Managing Director / Publisher General Manager
Editorial
General Press Jill Lai Alf Chang Eifeh Strom William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin
Editor-in-Chief Senior Consultant Senior Editor Reporter Reporter Reporter Reporter
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com
Executive Designer Designer Designer
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com
Officer Marketing
michelle.shih@newera.messefrankfurt.com michelle.chu@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Arthur Wu Circulation
Michelle Shih Michelle Chu
Corporate Management
Collins Yuan Thomas Pin Chihung Lee
Group Manager Account Manager IT Manager
collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
Product Manager
jessica.yang@newera.messefrankfurt.com
Trade Fair Manager Manager Project Manager
echo.lin@newera.messefrankfurt.com peggy.wu@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com
asmag.com
Jessica Yang secutech
Echo Lin Peggy Wu Eva Tsai
International Advertising [Headquarters]
Juihui Lin Kay Yang Audrey Fang
Manager Operation Officer Coordinator
juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha
U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam
bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, web sites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2015 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
jill.lai@newera.messefrankfurt.com
VIVOTEK IP Cameras Secure Cosmos Bank in India
To view the most updated and complete content for application cases, please visit the “Vertical Markets” section of our website at www.asmag.com, or scan the QR code. For more information, contact as-pr@newera.messefrankfurt.com
APPLICATION CASES
The Cosmos Cooperative Bank is headquartered in a building with a built-in data center and high-security safe in the center of Pune, India. Three key risk areas were considered for the security system: threats to people, to property, and to the image of the bank. The final security solution involved the installation of 132 VIVOTEK network cameras across the bank headquarters. They employed 103 ultra-mini fixed-dome network cameras featuring megapixel sensors in the interior spaces along with 29 bullet cameras with day/night functionality and IP67-rated weatherproof housing in the basement parking area. Lastly, four additional speed-dome cameras helped secure the headquarters’ periphery. These cameras allowed for a cost-effective IP surveillance system without additional accessories and empowered the security team with the ability to identify and recognize objects and number plates, even in the dark.
Xtralis VESDA-E Protects Largest Shopping Complex in Southern Hemisphere
NOVEMBER 2015 Ɣ www.asmag.com
LILIN IP Surveillance System Increases Security in Prime Intelligence Agency of Bangladesh The Special Branch (SB) is the prime intelligence agency of Bangladesh which works on all strategic, operational, and tactical levels. They wanted to update their existing analog video surveillance system to a
20
high-resolution IP surveillance system after it was incapable of identifying the culprit of a bomb attack on their SB headquarters. Authorities decided to deploy Merit LILIN’s IP surveillance system at SB. Fifteen 20X Full HD PTZ cameras now cover the main gate of the SB headquarters in Malibah, Dhaka, while Full HD IP-based bullet cameras secures the whole branch. The system is being monitored and controlled from three different locations using NAV Client, and all video data is recorded for 30 days in the NVR using WD surveillance hard disk. Additionally, Elsy True Online UPS system ensures 24-hour uninterrupted power supply.
The Chadstone shopping complex in Melbourne, Australia, is the largest shopping center in the southern hemisphere. As part of its expansion project, a four-level glassroofed atrium was completed in the northern part of the complex. The high ceiling and the unusual curvature of the glass atrium presented a fire detection challenge. Mounting locations for fire detectors were limited and pre-determined to comply with management standards. VESDA-E VEU was the obvious solution because of its early and reliable detection and extended pipe lengths that can accommodate for the height of the ceiling. It is flexible enough for longer pipe runs and can provide detection from the
APPLICATION CASES
pre-determined mounting locations. Only four detectors were required and its centralized architecture allows for quick service and maintenance with no special tools needed. In addition, the detectors can be constantly monitored and managed remotely with mobile devices and an iVESDA application.
QNAP NVR and CMS Monitors Chinese Culture University Campus
NOVEMBER 2015 Ɣ www.asmag.com
The Chinese Culture University (CCU) in Taiwan previously used a PC-based video recording software solution that was unstable and would shut down from time to time. CCU reached out to their systems integrator partner, Wergen Technology, who recommended an upgrade to a QNAP surveillance solution. CCU now have mini monitoring rooms to monitor nearby cameras. NVRs were installed in each room to provide HDMI local display and aid easy monitoring. Camera videos with D1, 1.3M, and 2M are now recorded for one month, while QNAP RAID 5 is used to protect the footage from possible hard disk crashes. At the main control center, video input from the NVRs are centralized, monitored, and managed by QNAP central management software. Bandwidth consumption between each mini monitoring room and the main control center is effectively
22
controlled as the system allows users to choose a smaller video stream. All the devices are connected by a dedicated gigabit LAN environment, ensuring no interruptions from other network services.
Axis Solutions Aids Effective Central Monitoring for Safexpress in India Safexpress, one of India’s leading companies in supply chain and logistics services, has a warehousing space of over 8 million square feet. Before, they only had analog cameras installed at a few sites which yielded poor quality video footage and couldn’t be centrally monitored. The primary objective then was to have a centralized monitoring system to keep track of remote warehouses across India and provide high-resolution images and video. The company decided to install over 150 Axis Communications network cameras in warehouses across India which could be centrally monitored. The cameras also provided high-resolution video, enabling authorities to monitor minute details at the warehouses. As the entire solution is based on IP cameras, Safexpress was able to use the existing network. The company is planning to add more Axis cameras to monitor all the facilities and offices in the near
future and they will be able to do so without installing any additional IT network infrastructure.
Salto’s Keyless Smart Access Solution Secures Australian Public Facilities The Infrastructure Services Department of Randwick City Council, in Sydney, Australia, was finding it time-consuming to maintain and secure a number of community centers, parks, and public toilets which all used mechanical keys. Ongoing maintenance was costly, especially if keys were lost, necessitating the changing of locks to maintain security and sorting which keys fitted which door. The Council went with Salto System’s keyless smart access solution and has now secured over 50 doors with a mix of online wireless electronic lock handle sets, cylinder locks, and electronic padlocks. Salto locks allows the council to control access to every door and have a full audit trail. They did not need to cable or hard wire to individual doors which delivered substantial dollar savings.
TS, founded in 1998, has proven itself as a leader in providing fiber optic solutions, boasting a diverse, comprehensive portfolio that includes managed fiber switches, media converters, and CWDM (coarse wavelength division multiplexing) solutions. In recent years, the company has realized the huge market potential for PoE and has set its eyes on PoE products. According to Antony Chen, President of CTS, PoE has become an increasingly popular method for delivering power to networked devices. “We’re definitely seeing more and more smart and energy-efficient security devices that receive both power and data from one Ethernet cable. This is in contrast to the past where you need to run a separate cable for power,” he said. “The delivery of power and other signals on one cable will be the trend, and this is something we’ll be focusing on.” The current standards for PoE switches include IEEE 802.3at/ af, which supply 15.4 and 25.5 watts, respectively, on each port. Yet right now a new standard is in the making — bt — which specifies 60W power delivery from each port. This is exp pec ecte ted d to t pow ower er up evven en mor oree he heav a yav y du duty tyy sec ecur uritityy
devices, such as speed dome cameras, and further drive the growth of PoE, Chen said.
NEW PoE BUSINESS To seize PoE’s growth opportunity, CTS has established a new PoE business called iConnectivity, with the brand name of iConnectron. Both commercial and industrial applications are available. Products include four- to eight-port, hardened PoE switches for industrial applications, as well as multi-port, rack-mount products for server room use in commercial applications. Next year, the company will further roll out 48-port products for commercial use. Commercial or industrial aside, Chen states that the company’s real focus is on differentiation, setting itself apart from standard, commoditized products that are out in the market. For example, CTS has a 24-port commercial-grade PoE switch with a 500W power budget, as opposed to similar products in the market with just 200W. “Say you have a 24-port product and need 30W from each port. p That translates into a total power budget of 720W 72 0W,, w which would incur a higher price,” said Chen. “Our
by CTS
ron on PoE:
ize and Connection Technology Systems (CTS), already an established provider of fiber optic solutions for home and ICT applications, has now moved into the power-over-Ethernet (PoE) field, providing customized, value-added products that deliver power to security devices. BY William Pao
NOVEMBER 2015 Ɣ www.asmag.com
26
position is very clear: delivering a solution that customers need, with a price that is more balanced and reasonable.”
POWER REDUNDANCY AND MANAGEMENT But for CTS, the biggest differentiator is power redundancy and management, which the company has already had a lot of success with on its non-PoE products. Now, CTS wants to replicate that success on its PoE devices. “We want to make sure all our products can continue to deliver power in the event of a power outage. This can be done by way of battery, for example those from motorcycles or cars,” Chen said. “A battery can either be built-in or attached from the side of the switch. For certain industrial applications, the switch comes with two power inputs, one from the regular power source and the other from a backup source. Power redundancy and uninterrupted
supply is an area that we put a lot of emphasis on.” Further, power scheduling and smart distribution functions will also be included. “The switch can be set so that it turns off automatically after 10 p.m. It will also determine which ports are more important based on user behavior, and make the necessary prioritization. This way, in the event of a power shortage, the ports that are prioritized get the power first,” Chen said. All products go through stringent testing procedures in CTS’s own laboratory for quality assurance. “Some of our products lie in chambers for six months under extreme conditions. If they can withstand those conditions for six months, then they can work in regular conditions for ten years,” he said.
TARGET CUSTOMERS AND REGIONS Right now, CTS deals mostly with security systems integrators with PoE demands. “These SIs see security installation as a major source of revenue and have developed expertise in installing cameras, access control, and other devices in schools, retail spaces, and offices,” Chen said. “More recently, they have also entered smart home, building automations, and digital signage
We enter a market and find out what solutions local customers really need, and customize our products to those needs. This way we create brand awareness and retain customers. Antony Chen, President, CTS
a migration from analog to IP video surveillance is seen. “For them, PoE would be a cost-effective solution. In the era of analog-based CCTV, you need to run power lines along with the coaxial cable. With IP-based video surveillance, you can just run an Ethernet cable, and the power issue is solved,” he stated.
LOCALIZATION According to Chen, the company strives to be the biggest or second biggest player in whatever market it goes to. In fact, in terms of CTS’s fiber-to-the-home solutions, it already ranks within the top two in countries such as Sweden, Norway, and India. The key to achieving a leadership position, according to Chen, is product and service localization,
Customize segments to widen their presence. And their demands for PoE are very clear.” However, dealing with these installers has its share of challenges, as most of them already have their own PoE suppliers but don’t know the value of having good PoE products. To demonstrate what good PoE solutions can do, CTS is looking for certain segments with special customization and bespoke demands. “We’re trying to find certain market niches that can’t be satisfied with commoditized products,” Chen said. As for the regions CTS will distribute its PoE products, it will first target the Middle East, due to its mature IP technology, solid network infrastructure, and unrivaled software capability — not to mention a booming constructions market with security installation needs. “The local customers are willing to pay for something that’s high-quality, and once you establish a good relationship with them, they will keep coming back,” he said. Afterward, the company plans to expand westward to Europe. In fact, PoE is ideal for markets such as the U.K. wheree
tailoring the company’s solutions and offerings to the taste, demands, and needs of local customers. “We enter a market and find out what solutions they really need, and customize our products to those needs. This way you create brand awareness and retain customers,” he said. “For example, there are users who demand just online connection, versus users who are into IPTV. For the latter group we need to sell them hardware that optimizes bandwidth usage to enhance the viewing experience. That’s where we can differentiate, selling value-added solutions instead of just selling the hardware itself.”
FUTURE PROSPECTS BRIGHT Beginning as a supplier of ICT solutions, CTS has moved into the PoE arena, seeking to deliver value-added products to certain markets and customers with unique needs and demands. As PoE becomes an increasingly popular power supply option for security players, CTS, with its clear strategy to differentiate, customize, and localize, it is all but expected to achieve success in this field.
27
Malaysia
Sees Silver-Lining in the
Long Term
BY Prasanth Aby Thomas
The Malaysian economy is going through a difficult phase and its security industry is worried about slower growth in the coming years. In the short term, things do look bad indeed. But this does not mean that its long-term potential and role as a prominent market in Southeast Asia can be denied, and it’s precisely this reason that continues to attract foreign players to this country.
NOVEMBER 2015 Ɣ www.asmag.com
t’s definitely not the best of times for the Malaysian economy. The oil prices are down, its major trading partner, China, is struggling, and politicians at the highest level are squabbling over corruption allegations. It’s no surprise then that local businesses across sectors are concerned about the future. At least in the short term there don’t seem to be any reasons to cheer. But being a young market, the Malaysian security industry’s growth potential in the long run is solid. According to Verghese Thirumala, MD of Maxitulin, who quoted a research report, the total value of Malaysian safety and security market is estimated at US$2 billion and is expected to increase in the future. “The year 2015 was robust for security though many claim it was a tough year. Market is probably growing at double digit,” Thirumala said. “For my company, growth was 25 percent over the previous year. Network solutions in both access control and video surveillance are growing rapidly, at least by 25 percent in each category.” These numbers speak for themselves, indicating the growth potential of the security industry in the country. What makes things even more attractive for foreign companies is that Malaysia, with its multilingual population, is an ideal place to serve as a launch pad to other emerging markets in Southeast Asia.
30
LOCAL DISTRIBUTORS CAUTIOUS ON SHORT-TERM Distributors are considered some of the worst-hit when it comes to an economic slowdown. This seems to be quite true in Malaysia, where several local distributors maintain a rather pessimistic view of their short-term prospects. Most of them admitted their desperation at the dire straits, stating the future could take any direction. “It’s a very challenging time for the Malaysian market,” said Dato’ Avent Yap, MD of AAC Distribution. “The economy is looking bad, overall market is slowing down, and the currency has dipped much more than anyone expected. I’m yet to see light at the end of the tunnel.” Indeed, the national economic projections so far have been bleak, with the World Bank forecasting a 4.7-percent growth for the year, way lower than the 6 percent recorded in the previous year. Only by 2017 the World Bank expects the economy to see some significant activity, when it is expected to expand 5 percent. This fragile macroeconomic picture is compounded by a political crisis. The country’s Prime Minister Najib Razak is accused of corruption, prompting protests and calls for his resignation. Ryan Tan, Executive Director at Entry Pass explained this has complicated business outlook for the industry. “We are affected by the political instability and the currency depreciation that has created uncertainties about the future and worries that business may be affected,” Tan said. Bryan Liew, Marketing Director of DotCom Engineering echoed similar sentiments, adding that the current year
poses several challenges for the industry and end users. “This year might see an up and down in overall revenue,” especially in the fourth quarter," Liew said, giving an approximate idea of the seriousness of the situation.
ONGOING PROJECTS AND DEMAND — CALM BEFORE THE STORM? The economic concerns cannot be ignored, but for most local distributors and systems integrators (SI) the issue is not as much about this year as it is about the coming years. This is in line with Thirumala’s comments mentioned earlier. Tan said that the current year is still better than the previous year as there is still revenue from the businesses of last year and the year before that. “Right now what we can see is that the business is continuing to grow, compared to the previous year,” he said. Renee Goh, Manager for Marketing and Communications at Sensorlink said that the year 2015 has actually seen more business enquiries, albeit at a slower pace. “Because of the economic concerns a lot of end users are cautious on their budget, but there are still business enquiries,” Goh said. AAC’s Yap further added that most of the Malaysian security industry is in the outdated analog technology and the market is still in the transition stage to IP. This has created some demand which the distributors and SIs are trying to exploit. Yap said his company’s sales have largely remained flat over the year. Such opinions aside, some distributors pointed out that the real reason of growth this year is a recent change in government policy and not any rise in market demand.
Malaysia’s economy still depends on oil to a large extent, and the recent dip in oil prices has hurt growth. Hassan Uddin Ahmed, International Sales Manager, MEA, Pyronix
Dato’ Avent Yap, MD, AAC Distribution
Renee Goh, Manager, Marketing and Communications, Sensorlink
Marc Chan, Business Development Manager, Security, APAC, FLIR Systems
Abhay Joshi, Business Manager, International Security Sales, Matrix Comsec
31
SECURITY 50 2015:
SPECIAL R EPORT ..............................................................................................................................
FINDING THE
RIGHT FIT AFTER INDUSTRY SH A By Jill Lai
a&s reviews 2014 & 2015 financial reports of 50 worldwide leading security manufacturers. Global market demand is still high; however, multiple factors have caused the security industry to shake up. This year’s report shows how Chinese companies have risen and how its opponents are ready for the competition. The new market order is soon to come. Sponsors
NOVEMBER N NO OVE VEM MB BER ER 22015 00115 Ɣ Ɣ www.asmag.com www.asmag.com
40
.............................................................................................................2015 SECURITY 50 RANKING
AKE-UP
lobal market demand for security equipment reached another historical height in 2014 and 2015. Terrorist attacks and civil unrest keep pushing end customers in various market sectors to invest in security equipment for safer environments. According to IHS 2014 report, the global market size of video surveillance and access control was estimated to be US$15 billion and $3.5 billion in 2014. Furthermore, these markets are forecast to grow to approximately $23.6 billion and $4.9 billion annually by the end of 2018, respectively. The global demand for security remains; however, multiple factors have remodeled the security industry landscape. Two big Chinese companies have been leveled up to the international stage, while their opponents have been left behind or forced to branch out. Meanwhile, the changeable global economic and political status has also made future growth for many companies uncertain.
TOP 50 GROW, SHADOWED BY MULTIPLE FACTORS The top 10 companies with the highest sales revenue in 2014 remain the same. The biggest change is brought by Hikvision Digital Technology and Dahua Technology, both of which grew quite enormously. Hikvision grew 57.5 percent moving up in the ranks to number 2, replacing Bosch Security Systems. Dahua grew 35.5 percent and surpassed the Global Technologies Division of Assa Abloy to rank fifth. Safran and Assa Abloy still maintained healthy growth with their new innovations for access control and high demand from national projects. On the other hand, Samsung Techwin weakened a bit in 2014. After the acquisition this year, the company’s Korean operations was renamed as Hanwha Techwin. Axis Communications’ ranking was influenced most from the growth of Tyco Security Products and FLIR Systems, rounding out the top 10. Looking at the financial reports of the top 50 companies in 2014, companies maintained mild growth but a major reduction of net profit was observed in many companies in 2014 and also the first half of 2015. The
We see a rising need for highly advanced products that enables interconnected solutions. The Milestone Husky is an advanced futureproof intelligent NVR that enables our partners to deliver the perfect solutions asked for by our mutual customers. Peter Biltsted, MEA Director, Milestone Systems
41
SPECIAL R EPORT .......................................................................................................... S
The security industry has had quite an eventful year so far, with several incidents prompting increase in demand for integrated solutions. The market has also seen signs of consolidation, with a number of large mergers and acquisitions. With new technologies like the Internet of Things and initiatives like smart cities, the industry looks poised for more activity in the coming years. By Prasanth Aby Thomas
GLOBAL
NOVEMBER 2015 Ć” www.asmag.com
RUSH TO BE SMARTER AMID RISING SECURITY CONCERNS 52
............................................................................................................. 2015 SECURITY 50 RANKING
mong the numerous sentiments that have floated across the globe this year, a significantly common theme was “fear.” To be more precise, an increase of it. A quick scan of global media reports over the year would show reasons for it too. From the rise of terrorism and war-induced migrant crisis to modern technological developments that have spiked privacy concerns, 2015 has seen the world struggling to come to terms with the fact that security is indeed an issue that has to be dealt with. This is evident in market analyses too. A recent report from Transparency Market Research showed that the global physical security market will expand at a healthy CAGR of 14.9 percent from 2013 to 2019, driven by growing security concerns around the world and accelerating budget allocation for physical security by governments.
Tristan Haage, CSO, Mobotix
Hagai Katz, Senior VP, Business Development and Marketing, Magal Security Systems
INCREASED SECURITY CONCERNS A CUMULATIVE IMPACT The security industry is not oblivious to the rising safety concerns and its potential to boost market demand. Major security solutions providers, who have all seen their revenues rise this year, acknowledge the fact that there is an increased awareness on the need to be protected that has boosted demand for sophisticated security systems. “Certainly the continued high threat level in many of our major markets such as the U.S., Middle East, and Europe is resulting in the continued review of security policies and systems, particularly within the corporate enterprise and public sector spaces,” said Brian Song, MD at IDIS Europe. “This is compounded by many high profile cyber-attacks, and so organizations are looking for a very high Incidents such as the migrant crisis in Europe have spiked global demand for certain specific security solutions.
William Ku, Spokesman and VP, Brand Business Division, VIVOTEK
Leon Langlais, Senior Director, Growth Markets and Regional Strategies, Tyco Security Products
level of resilience from their network surveillance solutions.” Hagai Katz, Senior VP of Business Development and Marketing at Magal Security Systems listed the concerns in more concrete terms. He pointed out that issues range from serious problems like the continued militant activity in African countries, immigration concerns in Europe, and terrorist concerns in the Middle East to more isolated incidents like a drone intrusion into the White House and escape of a drug baron from a Mexican prison. William Ku, Spokesman and VP of the Brand Business Division at VIVOTEK agreed. “European migrant crisis and ISIS terrorism increase the new infrastructure and new government projects in the European and Middle East countries.” Others point out that it is in fact difficult to pick up individual events that have sparked a change in the market, ascribing it more to an aggregated effect of fragmented incidents across the globe. “While no single event can be cited as the cause of major shift, we are all well aware that unfortunately, the world is becoming more insecure due to a range of political, economic, and cultural factors,” said Bodil Sonesson, VP of Global Sales at Axis Communications. “But, surveillance technology has also been improving, with better quality images, smart analytics, etc., thereby helping society to better monitor environments, solve incidents, and prevent attacks.” But it’s not just increased or improved security solutions that are in demand. Along with security concerns, most customers have to contend with the weak global economic outlook; hence, what they look for is more customized solutions that can offer better ROI.
53
SPECIAL R EPORT .......................................................................................................... S
The Internet of Things (IoT) has become quite a phenomenon, as more and more networked devices are connected to the Internet and generate valuable data for users. Security players, meanwhile, have detected this trend and are adapting themselves to IoT, making products that are more networkable, integrative, and user friendly. In this article, some of our Security 50 companies discuss their ideas and thoughts on IoT, and how they have responded in the midst of the IoT craze.
IoT
By William Pao
SECURITY PLAYERS OPEN THEIR ARMS TO
NOVEMBER 2015 Ć” www.asmag.com
IoT
58
............................................................................................................. 2015 SECURITY 50 RANKING
he term Internet of Things (IoT)was first coined by British entrepreneur Kevin Ashton back in 1999 to describe the concept of a globally connected network of RFID devices. Today, the connected vision has become quite a reality as IoT has found its way into different parts of our lives, from safe cities to smart buildings. In fact, according to a recent forecast by Gartner, the number of connected devices in use will reach 25 billion by 2020.
Arjan Bouter, Head of Sales, Nedap Security Management
INTELLIGENCE
SECURITY AND IoT What does all this mean for security players? For starters, physical security is intricately tied to IoT — this is especially the case after security’s migration to IP, which allows devices to be all integrated on the Internet. “The security product is a part of IoT,” said Allen Liu, Product Manager at Dahua Technology. “Video surveillance, mobile devices, access control, and alarm systems are all tied to loT, and we are surrounded by them in our daily life.” “Security devices will be tied to the IoT as ‘sensors’ in the same way that other devices like phones, cars, and refrigerators are sensor sources — all bringing data to inform our lives,” said Lars Nordenlund Friis, VP of Incubation and Ventures at Milestone Systems. “The single common thread with all these technologies is connected components working together as an efficient, integrated whole.” Integrating various networkable devices on the Internet brings many benefits. These include enhanced security, better intelligence, and improved user experience.
percent of people who are aware that someone is watching them typically stop whatever wrongful activity they are engaged in. A horn speaker can make intruders or suspicious characters very aware that they are being observed.”
Martin Gren, Co-Founder, Axis Communications
Allen Liu, Product Manager, Dahua Technology
IoT brings much more to security than protecting lives and assets. The amount of good data generated by security devices can be extracted and analyzed to drive business intelligence. In retail, for example, cameras installed in stores and supermarkets have found their roles expanding from preventing theft to studying consumer behavior — what aisles shoppers visit more frequently or which way they look at a particular spot. This allows operators to make sales and marketing decisions accordingly. “To be successful, a deployment using the IoT needs to do more than just collect a data. It needs to have a concrete way to
ENHANCED SECURITY
When integrated, video surveillance, access control, intrusion alarms, and other systems add layers to security, making premises less vulnerable to intrusion and threats. “Traditional access control systems can be cracked by forged IC cards or fake fingerprints. Now security industry pays more attention to integrate video surveillance with burglar alarms, access controls, and other parts together,” Liu said. “With a camera that is only performing video surveillance it is limited because you really can’t talk to people. But if you add an integrated horn speaker, you can actually communicate to a person — for example, if someone is loitering, or in an area they shouldn’t be, or otherwise acting suspiciously. And you can do it through a single system that manages the video and not have to switch between different systems or interfaces,” said Martin Gren, Co-Founder of Axis Communications. “A recent study says that 74
Security devices will be tied to the IoT as sensors, all bringing data to inform our lives.
59
HOTEL KEYS GO MOBILE OPEN
BY Emily Lin
NOVEMBER 2015 Ć” www.asmag.com
Guest safety and hotel security are paramount concerns for all hotel operators. As such, access control through the use of electronic locks has become somewhat of a norm for most hotels. The industry is seeing a growing trend of using locks not merely as a security measure, but rather, as a means to streamline services, enhance convenience, and improve the overall guest experience. 66
ELECTRONIC LOCKS FOR HOTEL ACCESS CONTROL One inherent feature that all hotel security systems possess is access control, the ability to restrict access and, in essence, control who can go in and out of the various areas in the property. Hotels traditionally turn to locks to fulfill this basic function, installing mechanical and electronic locks to doors both at the front and back of the house. Presently, it appears that electronic locks are dominating the field. IHS forecasted that the global market for electronic locks is set to surpass US$1 billion in 2015 and according to Vegard Prytz, VP and Regional Director of APAC at Assa Abloy Hospitality, electronic locks accounts for over 80 percent of the market in Asia and has an annual growth of approximately 6.5 percent. Since these locks can enhance security and provide the framework for future integration with other systems, many hotels consider this as a worthwhile investment in their property.
Hotel Credentials The majority of hotels are still using magnetic stripe readers (magstripes) as the authentication method for unlocking locks but radio frequency identification (RFID) technology is growing in popularity. Based on Assa Abloy’s figures, RFID locks makes up around 35 percent of locks in the current market and shows a yearly growth of 4 percent. “There is no difference in preferred technology between the different regions, but Asia was much earlier in adopting RFID technology,” Prytz added. Although many of the existing security systems employ magnetic stripe card systems due to their low cost, issues such as demagnetization and shorter lifespan resulting from wear and tear makes it a less attractive option for higher-end hotels. “With so many manufacturers of RFID locks, with varying levels of functionality and performance, most properties can find one that meets their budget needs; consequently, circa 95 percent of the hotel projects that are four and a half stars and above use RFID,” said David Rees, VP of APAC at Salto Systems Asia.
ELECTRONIC LOCKS USED IN MOBILE KEY SOLUTION Hotel operators are continuously finding ways to enhance the overall experience of the guest. One major hassle guests have to go through is the long and tedious process of checking in at the reception area. This has led to the development of the mobile key technology, which according to Rees, is the number one trend right now and is on everybody’s agenda. “More than ever hoteliers are focused on the ‘end-to-end’ guest experience to drive brand loyalty, offering quicker and more efficient service delivery to the guest. Utilizing innovative mobile guest room key technology as part of their on-line and app strategy sends a strong message about being ‘smart’ and customerfocused to prospective guests.” Industry research results also showed that approximately 70 percent of travelers would prefer to stay in smartphone-
Vegard Prytz, VP and Regional Director, APAC, Assa Abloy Hospitality David Rees, VP, APAC, Salto Systems Asia Jeffrey Wong, Assistant Product Manager, UTC Climate, Controls & Security
enabled hotels, while more than 70 percent said that they would choose to use their smartphones to check into the hotel if given the option to do so. With the successful introduction and resulting wide use of mobile app-based boarding passes, companies believe that mobile keys would achieve the same results in the hospitality field. “Major hotel brands have publicly stated the importance of mobile key initiatives. If the hotel industry follows the lead of the airline industry, mobile key technology could transform the industry,” said Jeffrey Wong, Assistant Product Manager of UTC Climate, Controls & Security. An example of the mobile key technology at work in Asia can be seen with Assa Abloy’s SPG Keyless system, which was developed for Starwood Hotels & Resorts Worldwide, a multi-national hotel and leisure company. It was launched last year in select hotels worldwide, including Beijing, Hong Kong, and Singapore; and the hotel conglomerate aims to install the system in all of their 150 global hotels. Using this system, registered members use an app on their phones to bypass the queue at reception and go straight to their rooms. A mobile “key,” in the form of an encrypted code, is sent to their phone via the Internet and used to directly gain access to the room through their phones’ Bluetooth function which can easily be done by holding the phone to the lock.
Picking the Right Hotel Lock Although aesthetics is an important consideration in hotel lock selection, functionality is still the utmost priority for hotel operators. “The most important thing is the security the lock provides; there are several critical parts in a lock as well as possibility to hack the electronic in the locks. The other important part is the quality of the lock; this is for the guest convenience since there is nothing more annoying than a situation wherein you cannot enter the room due to a malfunctioning key card,” said Vegard Prytz, VP and Regional Director of APAC at Assa Abloy Hospitality. Electronic locks should also be compliant with fire safety and functional test regulations that varies depending on the country or region. The location and function of the lock should also be taken into consideration, “A guestroom door lock must ‘dovetail’ into the overall design aesthetic of the hotel; however, storerooms, meeting rooms, offices, passage doors, staff lockers, etc., should have a product designed ‘fit for use’ installed, which should also be able to be operated with the same key as the guestroom lock,” commented David Rees, VP of APAC at Salto Systems Asia. Choices with regards to lock finish and design are quite subjective, wholly dependent on what the client wants or needs to complement the overall look of the property but some generalities can be made. “In Asia, the size of the lock should be as small as possible and even hidden in the door where only the lever is visible. There is also higher focus on the lever design,” Prytz added. As lock designs progressively get more minimal and streamlined, it is important not to lose sight that guests need to operate them, almost without thought. “On top of its security function, a guestroom lock should be discreet and intuitive to use, so that a guest enters their room virtually without pausing,” said Rees. “If I have to stop and wonder where to ‘badge’ then the lock has failed the ‘practicality’ test.”
67
Systems integrators working in the public transportation vertical can choose between fiber optics or wireless networks to transfer information between stations, mobile units, and control centers. However, budget and logistics constraints make a hybrid solution the most practical way to go.
etwork Transmission
for BY Israel Gogol, Freelancer
Public Transportation —
Combining Fiber and Wireless
NOVEMBER 2015 Ɣ www.asmag.com
ublic transportation is a massive user of surveillance technology. A quick look at a metro station for example will find cameras monitoring platforms, gates, escalators, elevators, etc. This footage is used to ensure the fast flow of traffic and commuters’ safety. Oftentimes, the discussion around surveillance systems for public transportation deals with the choice of the right camera, or choosing video analytics that can detect a person on the tracks or a slip-and-fall event. The challenges of transferring mass amounts of information from stations to the operations control center often stay in the background. In reality, the transfer media is not only a critical choice for the system, but also a costly one that requires detailed attention. The challenges in designing a scalable network for public transportation include designing a reliable, stable, and secured network. When surveillance systems are part of the network, having enough bandwidth and network load sharing are also important. “Between stations and terminals, there is a huge network designed for diversified systems’ data to be transmitted and exchanged; the requirements for network security and reliability greatly affect the total cost of the network system,” said Rich Shih, Senior Sales Manager at OT Systems. “The requirement for a network topology that offers faster recovery options in the millisecond level (so that in case of a malfunction the system is not affected too much) are getting more and more popular. Usually public transport operators
74
The transfer media is not only a critical choice for the system, but also a costly one that requires detailed attention.
Tom Larson, Director, Sales & Engineering, BCD Video
Umberto Malesci, CEO and Co-Founder, Fluidmesh Networks
Rich Shih, Senior Sales Manager, OT Systems
—
go for the Cisco network recovery protocols (whose response time is seconds) or choose a proprietary fast recovery ring topology for mission critical system applications.”
CHOOSING THE RIGHT ARCHITECTURE There are two basic architectures used in public transportation. The first is a distributed architecture — video footage is housed in a server on-site and then transferred to a central location. The second is centralized, all the data is relayed to a central location. In reality, many times there is a mix of the two, depending on the circumstances of each project. Usually, a centralized solution is considered ideal, connecting all the cameras and pulling all the video feeds to a central location through a high throughput connection with high availability and high redundancy storage solution. However, a centralized solution requires high throughput and high bandwidth. The distributed architecture can overcome bandwidth constraints as the recorders and servers are located in the stations. The central control center can then opt for viewing the footage through Internet connection or cellular connection which doesn’t require as much bandwidth as streaming the information to the center. Fiber and wireless technologies, or a combination of the two, are used to transfer information from station to station or from mobile units (e.g., rail car or a bus) to the control centers. Fiber optics is used in installations that have to cover large distances or where high bandwidth capacity is needed. Albeit providing secure and reliable data transfer, the costs and work associated with laying this infrastructure are relatively high. On the
Communicating With Mobile Units The expectations from public transportation networks are similar to those from other infrastructure projects: network transmission should provide failover capability, redundancy, and scalability for future enhancement. However, apart from stations, video monitoring also takes place on mobile units such as busses and metro cars. This poses a unique challenge to the public transportation vertical — how to get the information from the mobile centers to the control rooms. “Our wireless Ethernet products have been used on busses and trains as a link to upload surveillance video. The way it works is the surveillance video is stored on the bus or train on an onboard digital video recorder. When the bus or train pulls into a terminal or station, the remote wireless endpoint syncs with the central control center access point and the data is uploaded to the control
Louis Chen, Technical Team Manager, Sales Dept., EtherWAN Systems
center. All this can happen automatically, many times during the day at stations along the route,” explained Frank Haight, VP of Marketing at ComNet. Since trains and busses Frank Haight, VP, might only make Marketing, ComNet brief stops at stations before continuing on, there is a need to use self-managed switches with high-throughput. “These switches can aggregate incoming video data streams making them an easier upload to the central control center. The key is to manage the network. The use of these types of switches prevents flooding the network and keeps the important video records intact,” added Haight.
other hand, wireless solutions do not require human intervention. There is no requirement for a physical connection. The down side of wireless solutions is that they require a higher degree of expertise on the side of the systems integrator and are also more prone to outside interference. “The traditional systems integrator does a poor job of putting wireless infrastructure, so for that you need a specialized company,” explained Tom Larson, Director of Sales & Engineering at BCD Video.
BUDGET IS THE MAIN CONSTRAINT
Long Chang, Associate VP, Sales & Marketing Div., Yoda Communications
The biggest challenge in implementing the ideal infrastructure needed is budget. “Transportation boils down to what is the transfer media, fiber optic or wireless, because this piece of the infrastructure is extremely expensive compared to cameras and storage. The biggest problem in connecting stations one to the other is getting the money to put fiber in place,” Larson explained. Despite the constraints and problems of connecting systems to already existing fibers, Larson stated that cities that had the foresight to invest in fiber infrastructure 15 years ago are “ahead of the game” today. “Fiber infrastructure is where you need to go. Down the road we see more fiber optics being deployed in the US market. We see a shift of providers to much larger bandwidth. As we continue to scale up the connection eventually we will be able to stream the video back at a reasonable rate,” Larson said. Although a buried cable system can serve for many years, making changes to the system is difficult and involves a lot of complicated work.
75
Companies in This Issue Products of the Month • SALTO SYSTEMS • SECURITECH • ZKACCESS Cover Story • CTS Market Dynamics • AAC DISTRIBUTION • DOTCOM ENGINEERING • ENTRY PASS • FLIR SYSTEMS • GLOBAL TOP TECHNOLOGIES • MATRIX COMSEC • MAXITULIN • PANASONIC MALAYSIA • PYRONIX
Next Issue
NOVEMBER 2015 Ɣ www.asmag.com
86
• SENSORLINK • STRATEL • VMNETWORK Special Feature (Security 50) • ALLEGION • AVIGILON • AXIS COMMUNICATIONS • COMMAX • DAHUA TECHNOLOGY • EVERFOCUS ELECTRONICS • EVERSPRING INDUSTRY • IDIS EUROPE • MAGAL SECURITY SYSTEMS • MILESTONE SYSTEMS • MOBOTIX • NEDAP SECURITY MANAGEMENT • SYNECTICS
• TYCO SECURITY PRODUCTS • VERINT SYSTEMS • VICON INDUSTRIES • VIVOTEK Vertical Market • BCD VIDEO • COMNET • ETHERWAN SYSTEMS • FLUIDMESH NETWORKS • OT SYSTEMS • YODA COMMUNICATIONS Product Exploration • ASSA ABLOY HOSPITALITY • SALTO SYSTEMS • UTC CLIMATE, CONTROLS & SECURITY
Product Exploration
Market Dynamics
VISITORS ENTRY CONTROL
CHINA
Special Feature
Vertical Market
2015 YEARLY REVIEW/2016 PREVIEW
CITY SURVEILLANCE
ADVERTISER INDEX *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
15
AXIS COMMUNICATIONS AB
NETWORK VIDEO SOLUTIONS
SWEDEN
contact-sap@axis.com
5, 7
DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
6
DYNACOLOR INC.
IP CAMERA / NVR
TAIWAN
info@dynacolor.com.tw
47
FLIR SYSTEMS CO., LTD.
SURVEILLANCE
HONG KONG flir@flir.com.hk
55
FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.
DOME COVER
CHINA
sales@fjsmt.com
12
GKB SECURITY CORPORATION
IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR
TAIWAN
sales@gkbsecurity.com
10
HANGZHOU JUFENG TECHNOLOGY CO., LTD.
AHD DVR / CAMERA / IPC / NVR / HOME SECURITY
CHINA
oversea_sales@jufenginfo.com
25
HDPRO CO., LTD.
CCTV
KOREA
sales@hdprocctv.com
9, 13
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
4
IDIS CO., LTD.
SURVEILLANCE
KOREA
sales@idisglobal.com
11
INFINOVA
CCTV
HONG KONG sales-hk@infinova.com
21
MEERE COMPANY INC.
CAMERA
KOREA
sales@cube-eye.co.kr
43
MILESTONE SYSTEMS
SURVEILLANCE
DENMARK
sk@milestonesys.com
INSIDE BACK COVER
PANASONIC SYSTEM NETWORKS CO., LTD.
VIDEO SURVEILLANCE
JAPAN
-
28, 29
PIXELPLUS CO., LTD.
SEMICONDUCTOR
KOREA
kahn@pixelplus.com
19
QNAP SYSTEMS, INC.
NVR / VMS
TAIWAN
nvr@qnap.com
23
RIFATRON CO., LTD.
DVR
KOREA
contact@rifatron.com
INSIDE FRONT COVER, 1
SAMSUNG (HANWHA TECHWIN CO., LTD.)
CCTV / DVR
KOREA
apriler@samsung.co.kr
64, 65
SEAGATE TECHNOLOGY LLC
STORAGE
SINGAPORE
apj.sales.enquiry@seagate.com
2, 3
SONY CORPORATION SEMICONDUCTOR GROUP
SEMICONDUCTOR
JAPAN
-
17
SONY ELECTRONICS ASIA PACIFIC PTE. LTD.
NETWORK MONITORING SOLUTIONS
SINGAPORE
pro.info@ap.sony.com
45
VICON
SURVEILLANCE
USA
sales@vicon-security.com
35
WEBGATE INC.
DVR
KOREA
support@webgateinc.com
61
XIAMEN LEADING OPTICS CO., LTD.
CCTV LENS
CHINA
sales@leadingoptics.com
37
ZHEJIANG DALI TECHNOLOGY CO., LTD
CCTV
CHINA
sales@dali-tech.com
ACCESS CONTROL PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
8
GIGA-TMS INC.
RFID MODULE / LOCK / READER
TAIWAN
promag@gigatms.com.tw
BACK COVER
HID GLOBAL
CARD, CARD READER
USA
asiasales@hidglobal.com
49
SUPREMA INC.
FINGERPRINT
KOREA
sales@supremainc.com
33
VOIM TECHNOLOGIES INC.
FINGERPRINT
KOREA
sales@ten-bio.com
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
87