A&S #A128 SEP.2016

Page 1

--0915-128 A&S ASIA-cover.indd 1-3

2016/9/15 上午2:43


CONTENTS

SEPTEMBER 2016 www.asmag.com

COVER STORY

Surveillance Storage Embraces Helium With WD-Branded Drives ����������������������������������������������������18

When It Comes to Security

Japan’s Got Game

NEWS FEATURE

Regional Security Remains a Top Concern as ASEAN Leaders Meet ������������������������� 20

MARKET DYNAMICS

When It Comes to Security, Japan’s Got Game P. 30

Axis and Canon Change Global Sales and Marketing for IP Video Portfolio ������������ 21 Minimize Risk, Optimize Business With Video in Different Verticals ���������������������� 22 Customers are the Real Drivers of Industry 4.0: Siemens ���������������������������������23 How Public Address Works Wonders in IP ���� 24 VIEWPOINT

Video Surveillance Trends Escalate Need for Storage Infrastructure ����������������������26 PRODUCT EXPLORATION

P. 36

Advanced Visitor Management Systems Create Value to Enterprises ���������������������������36

P. 60

VERTICAL SOLUTION

Analytics Keep Stadium Crowds Under Control ���������������������������������������������������������60 BUSINESS TALK

Women in the Security Industry ������������64 What Will Drive More IT Companies into Security? �������������������������������������������������� 68 SEPTEMBER 2016 ● www.asmag.com

SMAHOME

Z-Wave Europe: The Battle of the Z-Twins – Z-Wave and Zigbee ����������������������������� 72 Contents.....................................................8 Editor’s Note ...........................................10 Application Cases....................................12

INDUSTRY REPORT

Know Your Customer With VCA P.44 Smart Search Gains Eminence in a More Dangerous World

P.50

Finding Faces to Increase Public Safety P.54

Products of the Month.............................16 New Products..........................................76 Companies in This Issue.........................77

Show Calendar........................................78

8

-8-0915-Contents.indd 8

2016/9/15 上午1:43


a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.

ISSN 1997-6267

ASEAN Leaders Gather in September While Security Industry Converges

SEPTEMBER 2016 ● www.asmag.com

his August and September, major political events forecast the changing global circumstances of the future. Changes are also being seen in the overall trends of the security industry. Vanderbilt Industries continued its second technological acquisition in security. Axis Communications finally acquired Canon’s marketing and sales force in North America and EMEA even though its APAC region can’t be defined yet. First, in the macro-socioeconomic side, faced with different economic challenges, many developed countries have started to opt for protectionism – such as with Brexit and the appeal of Donald Trump, which have made a strong impact on globalization and free trade. The 2016 G20 Hangzhou Summit, held from September 4-5 in China, tried to build up a new code for globalization in the future. Right after the G20 Summit, the ASEAN Summit was held in Laos. According to CNN, this year’s theme was ‘Turning vision into reality for a dynamic ASEAN community,’ “where leaders are expected to talk about important issues currently facing the Southeast Asian region. Topics such

as South China Sea disputes, counterterrorism, trade and human rights are likely to top the agenda.” Asian countries are now prone to terrorist attacks. Some tragedies caused by terrorist attacks happened recently in countries such as Thailand, the Philippines, Indonesia, Afghanistan, Bangladesh, and even Australia and Japan. Thus, the ASEAN leaders at the Summit looked for cross-country cooperation to enhance regional safety. Regional integration efforts also need to be strengthened to boost the economic growth. The labor cost in China keeps rising every year, which will bring more foreign investment to the countries in Southeast Asia. To support the regional economy, the development of renewable energy is also a key. The global socio-economic status looks gloomy in the near future. While the developed countries tend to take a conservative attitude in global issues and business, the future outlook of developing countries, especially in the ASEAN region, might not be that promising like in the past. However, led by countries like India, Indonesia, Vietnam and the Philippines, the growth in the APAC region is expected to remain robust in the next five years.

中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

General Press Jill Lai Editor-in-Chief Alf Chang Senior Consultant William Pao Reporter Lisa Hsu Reporter Prasanth Aby Thomas Reporter Emily Lin Editor

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Tzu-Yin Chien

Executive Designer Designer Designer

Circulation

Michelle Shih

Officer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com tzuyin.chien@newera.messefrankfurt.com

michelle.shih@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

asmag.com

Willy Wang

Manager

willy.wang@newera.messefrankfurt.com

Secutech

Peggy Wu Veronica Chen Jason Cheng Crystal Chen

Trade Fair Manager peggy.wu@newera.messefrankfurt.com Group Manager veronica.chen@newera.messefrankfurt.com Project Manager jason.cheng@newera.messefrankfurt.com Assisant Project Manager crystal.chen@newera.messefrankfurt.com

International Advertising [Headquarters]

Israel Gogol Audrey Fang

Manager Officer

israel.gogol@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro U.S.A./Canada Carolina Pattuelli Europe (Italy) Osman Kanatli Europe (Turkey) Evris Consolos Europe (U.K.) Adis Hodzic Southeast Europe Manish Gandhi India Iris Lai Taiwan Cliff Kang China Y. C. Suh Korea Takashi Komori Japan Nguyen Thu Ha Vietnam Nikolaeva Olga Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn nikolaevaoe@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No. 288, Sec. 6, Civic Boulevard, Xinyi District, Taipei 110, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, web sites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

jill.lai@newera.messefrankfurt.com 10

-10-0915-EDITOR'S NOTE.indd 10

2016/9/15 上午1:49


APPLICATION CASES APPLICATION CASES a&s presents snapshots of security cases from across Asia to provide up-to-date information on how products and solutions are being employed in different industries.

>> Education

Bosch IP Video Solution Secures New ACPE Premises

SEPTEMBER 2016 ● www.asmag.com

One of Australia’s oldest higher education institutions, the Australian College of Physical Education (ACPE) moved into its new campus in Sydney Olympic Park in February 2016. ACPE’s former site featured an analog system that was slow and dated, so IP was the natural product choice. Particular focus was given to being able to view key areas for the purposes of health and safety of the students and facilitators, public liability, and for possible theft and property damage. The building access points and car park were also significant to monitor for unlawful entry and vehicle damage. A minimum of 30 days of video storage was also specified as part of the recording brief. Force Security installed over 40 Bosch Security System FLEXIDOME IP 5000 5MP indoor and vandal-resistant outdoor cameras into the premises, teamed with a DIVAR IP 7000 recorder running Bosch Video Management System (BVMS) software. With a workstation client for the main security guard front desk, all cameras are visible from this location, with key cameras permanently displayed on-screen. Domes have been positioned in all the main thoroughfares and inside learning areas on each level, as well as two in the working gym and six in the basketball court. The exterior of the premises features vandal-resistant domes at the building entry, external doors and at the car park entry boom gate.

>> Utilities

Milestone Improves Operations for National Water Utility

South East Water based in Melbourne, Australia, recently upgraded its mix of standalone, legacy monitoring systems

with an integrated, flexible video surveillance platform from Milestone Systems to support the organization’s ambitious technology and innovation strategy. Milestone’s open platform, paired with network cameras from Axis Communications, enables South East Water to monitor its assets with a centralized, integrated solution that is easy for employees to use. Axis network cameras provide comprehensive coverage of offices and remote facilities, as well as street and underground sewage and drainage systems. Milestone Mobile’s Video Push notification allows South East Water to quickly respond to incidents like major infrastructure damage, burst pipes, sewer spills and other critical events that can all be streamed in real time from operators’ phones to the control room. Access control integration is also enhancing South East Water’s security processes. Using the Milestone XProtect Access module, South East Water is able to integrate Milestone’s video management and user interface with Integriti access control from Inner Range. This system integration combines visual verification from the Milestone video interface with access control events, for efficient central management.

its positioning as a trusted supplier, the service provider needs to find a reliable and intelligent surveillance solution to efficiently monitor working areas where food safety and facility inspection needs to be close and constantly checked to comply with all necessary location-specific regulations. Surveon’s partner in Hong Kong adopted nearly 60 cameras in this project, including 2-MP indoor dome camera with Sony Exmor sensor and audio in/out to record clear images and assist in managing the staff in the kitchens and outdoor dome cameras with 3-axis support, providing a wider coverage to prevent any suspicious people and vehicles from entering without authorization. Moreover, the 5-MP indoor fisheye cameras and outdoor fisheye cameras were also selected for their ability to cover wide areas with excellent image quality via dewarping functionality. Meanwhile, Surveon NVR, featuring 8-bay hard disks and supporting up to 64-channel 5-megapixel recording with Linux RAID, was chosen to provide large capacities for 24/7 non-stop megapixel recording and 180-day video retention period.

>> Banking

Anviz Access Control System Secures Bank in Mongolia

>>Hospitality

Surveon Secures Safety for Hong Kong Airline Catering Service Provider

A worldwide service provider for airline catering and provisioning has adopted Surveon Technology’s IP surveillance solutions as its partner for security application. With more than 100 locations in the world, the branch in Hong Kong provides catering and provisioning service for airlines with flight services in HK airport. In order to maintain

Systems integrator Topica successfully supplied and installed Anviz Global's access control products and solutions in the Trade and Development Bank of Mongolia. Primary requirements of the access control for banking are security and privacy. The complete system required consists of three sub-systems: access control system for elevators, access control system for rooms and a time attendance system. Topica installed 70 Anviz T5 Pro

12

-12-14-0915-a03-Application Cases.indd 12

2016/9/15 上午1:53


IOT INCREASES CONNECTED DEVICES, BUT CYBER THREAT ARISES

Editor’s Note: The Internet of Things (IoT) has improved ease of connecting devices, but cyber threats are growing along with it. Today, physical security manufacturers are developing ways to secure enterprises by minimizing the threat of cyberattacks.

BOSCH BUILDING INTEGRATION SYSTEM (BIS) SOFTWARE VERSION 4.2

B

osch Building Integration System (BIS) software version 4.2 offers seamless integration with the Bosch digital public address and emergency sound/ mass notification system Praesideo, as well as enhanced cyber protection. Especially well-suited for mission or business critical applications such as government facilities, data management companies and critical infrastructure, BIS 4.2 also pushes ahead of security standards to improve cyber protection in access control and alarm management systems. New OSDP (Open Supervised Device Protocol) v2 Secure Channel controller-reader encryption is combined with established client-server and card-reader encryption to create continuous data security throughout each step of the access control process.

KEY FEATURES: • Integration of Bosch and third-party systems through deployment of OPC • All relevant information in one user interface • Fully embedded access control • Full event log for forensic investigations • Scalable system that grows with user needs Supplier: Bosch Security Systems / URL: www.boschsecurity.com

VISCOUNT SYSTEMS FREEDOM ENTERPRISE ACCESS CONTROL PLATFORM

F

reedom is a new approach to access control that can easily integrate with IT infrastructure, leverage advanced cloud computing methodologies, enable virtualization and mobility, and minimize threats from cyberattacks. Freedom offers a new paradigm from both a technology and deployment model, enabling a unique opportunity to move physical access control out of the realm of “facilities” and into the enterprise IT infrastructure where it is more easily managed by IT security managers and CSOs. Viscount’s Freedom Enterprise is an open platform, web-based software solution designed to integrate identity management (IDM) and video surveillance.

KEY FEATURES: • Cyber-secure: no local panels or databases • Instantly changes privileges based on threat levels • Software installed on a nonproprietary server and can be virtually deployed across multiple servers or in the cloud • Physical and logical security applications share a common database for synchronicity • Output mapping: one card presentation can affect all doors • Virtual muster: providing safety in emergency situations Supplier: Viscount Systems / URL: www.viscount.com

GENETEC OMNICAST VMS

WURLDTECH OPSHIELD NETWORK SECURITY DETECTION AND PREVENTION

O

pShield is an operational technology (OT) cybersecurity solution that delivers visibility across complex OT networks, enforces OT policy at the protocol command level and deploys with minimal or no operational disruption. OpShield monitors and blocks malicious activity and unintended disruptions to promote OT safety and protect productivity. KEY FEATURES: • Enables safe OT connectivity to protect people, processes and equipment • Preserves valuable production uptime • Protects OT efficiently, even with limited security staff and resources • Combines the protection of an OT protocol inspection engine, threat and vulnerability signatures, and non-disruptive network segmentation • Easy-to-use graphical user interface to easily manage security policy and vulnerability signatures Supplier: Wurldtech URL: www.wurldtech.com

SEPTEMBER 2016 ● www.asmag.com

O

mnicast provides users with the flexibility to grow their systems over time, ensuring that they are never locked into a proprietary solution. With fielded deployments of up to 150,000 cameras and support for an unrestricted number of workstations, its powerful architecture allows users to reliably scale with the assurance that day-to-day operations will not be disrupted. Built-in and advanced security mechanisms prevent unauthorized access and protect users’ privacy. KEY FEATURES: • Hybrid cloud service enables organizations to transfer archived video recorded on-premises to the cloud • GPU-accelerated decoding displays more cameras and reviews video with greater fluidity from a single workstation with the ability to leverage graphic cards and embedded GPU to rapidly decode high resolution videos • Highly scalable VMS to reduce on-site hardware

• Failover and redundancy protection against hardware failure or network interruptions • Provides real-time notification of system status and health-related events • Offers greater security of sensitive data with secured communications between clients, servers and edge devices, the ability to encrypt video in transit or at rest, and exported video Supplier: Genetec / URL: www.genetec.com

16

16-07-Product of the month.indd 16

2016/9/14 上午3:46


fter Western Digital made its entry into the surveillance world a few years back, it released its first WD-branded hard drive specifically optimized for surveillance applications – WD Purple hard drives – in 2014. The company has since then expanded its industry portfolio: first with WD Purple NV and then with the launch of WD Gold hard drives.

SURVEILLANCE AS A LUCRATIVE MARKET When asked about Western Digital’s strategy on creating these WD-branded hard drives, Patrick Lo, APAC Sales Pricing Director for WD-Branded Hard Drives at Western Digital, highlighted the role of storage and the importance of the market to Western Digital. Although current IHS market reports indicate a slowdown due to sharp reductions in average camera unit prices, the market still showed doubledigit growth in terms of demand. Overall, the security industry has exhibited an annual growth of approximately 15 to 20 percent in the past 10 years. It appears that storage is set to play a bigger role in surveillance due to the ever-increasing amount of data being generated. According to Lo, this trend will be driven by the adoption of advanced technologies in image processing, such as 4K or 8K ultra-high resolution cameras. “Camera resolutions are increasing, which could lead to better price-performance ratios and demand for more storage capacity.” In addition, the Internet of Things (IoT) and non-security applications such as smart homes and smart factories are generating an unprecedented amount of data, directly impacting big data storage needs.

RIGHT HARD DRIVES FOR THE RIGHT APPLICATION As storage hardware is fast becoming an important part of the surveillance industry, Western Digital has developed two different lines under the WD brand in order to match varying needs in the market. “WD Purple and

Surveillance Storage Embraces Helium With WD-Branded Drives

WD Purple NV drives are ideal for front-end NVRs on smaller projects, while the WD Gold drive is suitable for back-end applications in large-scale projects such as train stations, airports and other mission critical applications,” shared Lo.

GOING FOR THE GOLD Western Digital developed WD Gold drives, as a response to customer needs. “Besides the rapid growth of storage needs on the front-end of the system that can be addressed with WD Purple drives, we also noted an increase in demand in the back-end mission critical application market. This is due to application development, and analysis of data and big data,” said Lo. WD Gold drives are ideal for surveillance systems as they are capable of handling the heavy workloads that occur when running intelligent software such as facial recognition. Furthermore, it can provide the ample storage space required to store the data for future analysis.

ENHANCING STORAGE CAPACITY AND PERFORMANCE WITH HELIUM In the process of creating some of the newer, higher-capacity WD Purple and WD Gold hard drives, the company has utilized helium technology via a hermetic seal design that prevents the gas from leaking out. Owing to helium’s innate property of being lighter than air – one-seventh the density to be exact, helium has the lowest density and best thermal conductor characteristic of all nonflammable substances; which in return benefits traditional hard drives whereby its moving parts would experience less air resistance during operation, as well as capable of running up to 4 – 5 degrees cooler and quieter than conventional air-filled drive. By eliminating the wind turbulence that disturbs the read-write heads, this gives HDD manufacturers design freedom to add more disks and heads to a HDD to reach a higher capacity; from a conven-

SEPTEMBER 2016 ● www.asmag.com

Higher resolution cameras and the need for data analysis are driving the demand for surveillance storage solutions. Western Digital Corporation (Western Digital) provides customers with hard drives specifically tailored for various applications, enabling it to gain a secure foothold in the surveillance industry. BY Emily Lin (sponsored by Western Digital)

18

-18-19-0915-07-Cover Story-WD.indd 18

2016/9/15 上午1:55


SOLID ASIAN PRESENCE

Western Digital developed WD Gold drives, as a response to customer needs. Besides the rapid growth of storage needs on the frontend of the system that can be addressed with WD Purple drives, we also noted an increase in demand in the back-end mission critical application market. This is due to application development, and analysis of data and big data. tional five platters to seven platters design in the same space without adversely affecting the drive's reliability. For mission critical applications, the benefits mentioned can go a long way to improve the Total Cost of Ownership (TCO). “Not only can helium help lower cooling costs, it can also help decrease overall power consumption,” said Lo. Additionally, high capacity hard drives now take up less space per capacity; thus lowering costs further. Helium by nature has compensated much on disk drives Achilles’ heel – Vibration. Western Digital spared no expenses and moved up one step further with its Dual Stage Actuator technology and enhanced RAFF technology, which further increased its reliability and compatibility to be used for mission critical applications. “Unlike our other hard drives, we have added a hardware sensor that can detect unusual events and correct it in real time,” commented Lo.

Western Digital has already established a solid presence in Asia, working with distributors, original equipment manufacturers (OEMs) and systems integrators (SIs) across the region and making sure their needs are being met. WD Purple drives have now been utilized across the region in much of the renowned establishment from various industries including but not limited to governmental transit system, private banking and security facilities, surgical study surveillance, as well as international transportation hub and some of its own SMART parking. Due to Western Digital’s extensive experience in doing business around the world, the company is well aware of the unique differences of each local market, and the challenges they are facing due to the current economic situation. Thus, the company aims to assist them by providing additional support. “We need to help our customers sell the value of our products. We hope that we can offer customers not only the best priceperformance ratios, but also the best added value,” said Lo. To expand the company’s portfolio, Western Digital acquired SanDisk, a manufacturer of flash memory products. “We do not consider ourselves only a hard drive manufacturer. Our portfolio now also includes SSDs, enterprise cloud infrastructures and full range of external and cloud storage products. We are now storage solution providers,” commented Lo. It is evident that Western Digital has its finger on the pulse of the industry and is responding to trends in the market as they arise. By tailoring their WD-branded hard drives to the specific needs of its customers, We s t e r n D i g i t a l i s successfully carving a niche for itself in the surveillance storage industry.

Patrick Lo, APAC Sales Pricing Director for WD-Branded Hard Drives, Western Digital

19

-18-19-0915-07-Cover Story-WD.indd 19

2016/9/15 上午1:56


a&s EXPLORES TOPICS THAT ARE GENERATING INTEREST IN THE SECURITY INDUSTRY, OFFERING READERS IMPORTANT FACTS AND INFORMATION RELEVANT TO THEIR PROFESSION.

NEWS FEATURE

Regional Security Remains a Top Concern as ASEAN Leaders Meet Several security concerns continue to plague Southeast Asia as its leaders met up at Laos for the regional summit. BY The a&s Editorial Team

SEPTEMBER 2016 ● www.asmag.com

ecurity was among the primary concerns for discussion as global leaders gathered in Laos for the ASEAN summit. The attendees of the summit came together for three days to discuss this year’s theme “Turning vision into reality for a dynamic ASEAN c o m m u n i t y.” A c c o r d i n g t o t h e Ministry of Foreign Affairs of the Lao People’s Democratic Republic, the leaders had a candid exchange of views on regional and international issues of mutual interest and concerns, including traditional and non-traditional security challenges such as terrorism and extremism, natural disasters, human trafficking, territorial disputes, maritime security and safety, armed conf licts, and transnational crime and developments. The region is faced with numerous

security issues, such as a recent terrorist attack that took place in Davao, Philippines, causing the loss of 13 lives. In a statement, ASEAN said it is committed to working with the international community to combat violent extremism and terrorism in all forms and manifestations, regardless of motivation. Security concerns, along with the developing market is assisting the growth of security market in the

“The region is faced with numerous security issues, such as a recent terrorist attack that took place in Davao, Philippines, causing the loss of 13 lives.”

region. According to Transparency Market Research, the Asia Pacific physical security market is projected to see growth at a CAGR of 17 percent from 2013 to 2019. A report from Micro Market Monitor said the region’s perimeter security market would expand at a CAGR of 11.3 percent from 2014 to 2019. Security industry players agree with the statistics, citing increase in population and the rapid development that is boosting the region. In an earlier interview with a&s , Harish Vellat, GM in Asia Pacific at Honeywell Fire and Security had noted, “Cities are getting larger and more populated. People increasingly desire more connectivity through mobile devices. Industrialization means more factories, and those factories need security and access control, as do critical infrastructure like airports and seaports.”

20

-20-24-0915a05-News Features.indd 20

2016/9/15 上午1:58


Axis and Canon Change Global Sales and Marketing for IP Video Portfolio Soon Axis will be in charge of marketing and sales of all of Canon’s network video product portfolio in EMEA and North America. BY Axis Communications

xis Communications and Canon announced an agreement under which the two companies would change their sales and marketing efforts in major regional markets worldwide. In Europe, the Middle East and Africa (EMEA) and North America, Axis will assume responsibility for the marketing and sales of Canon’s entire

“This new sales and marketing framework provides an effective means of maximizing the synergies of the Canon-Axis combination.”

network video product portfolio, starting in EMEA from September 1 and in North America from October 1. “The network video surveillance market continues to show great potential. As a leader in the industry, Axis is in an excellent position to include the sales of Canon network video products to our broad portfolio of products and solutions in EMEA and North America. These changes show Canon’s strong commitment to build a long term presence for Axis on the market,” says Ray Mauritsson, president of Axis Communications. Since Axis became a part of the Canon Group in 2015, both companies h ave d i s c u s s e d va r i o u s o p t i o n s for leveraging their network video product and solution offerings. This new sales and marketing framework p rov i d e s a n e f f e c t i ve m e a n s o f

maximizing the synergies of the Canon-Axis combination. In the Japanese market Canon (Canon Marketing Japan) will continue to sell Canon’s network video product portfolio and will in addition become a partner for Axis to sell the Axis product portfolio. This will be in addition to Axis’ existing partner network. As for the rest of the Asia-Pacific region, options for the handling of Canon’s network video product and solution portfolio are still being explored. Under the new framework, Canon partners and customers will benefit from Axis’s marketing, sales and technical expertise and will have access to a wider range of products a n d s o l u t i o n s f ro m t h e l e a d i n g co m p a n y i n t h e n e t wo r k v i d e o market.

21

-20-24-0915a05-News Features.indd 21

2016/9/15 上午1:58


Video Surveillance Trends Escalate Need for Storage Infrastructure With the massive amounts of data being gathered each day, storage is no longer a peripheral consideration for the industry. It is vital for organizations to implement a storage architecture that can readily meet future demands. BY Wayne Arvidson, VP, Video Surveillance and Security Solutions, Quantum

SEPTEMBER 2016 ● www.asmag.com

The best approach is to implement a tiered architecture, especially one that can be tuned specifically for processing video files and viewed as a single file system. Wayne Arvidson, VP, Video Surveillance and Security Solutions, Quantum

mart devices are popping up everywhere such as workplaces, transit stations, restaurants, cars and even homes. In turn, these devices are creating massive amounts of data. According to recent reports, approximately three exabytes of raw storage capacity was shipped to customers in 2015 to address the growth. With the explosion of sensorenabled, network-addressable devices out there, it is no wonder storage and data analytics are such hot topics, and both are affecting not only the way we live and work, but also how we use video-based data to protect ourselves.

26

26-28-0914-01-Viewpoint-Storage Infrastructure.indd 26

2016/9/14 上午3:53


COMPLEX SURVEILLANCE REQUIRES SPECIALIZED STORAGE INFRASTRUCTURES

THREE FACTORS DRIVING INDUSTRY TRANSITION The security and surveillance industry has undergone a steady transition in recent years, and the pace is accelerating. An industry long dominated by stationary analog cameras is embracing digital on a large scale, with high definition (HD) camera unit shipments exceeding analog cameras for the first time in 2015. High-resolution, multi-sensor panoramic cameras are fast-becoming the new normal for video surveillance, streaming more high definition images than ever before and requiring huge increases in storage capacity and performance to handle it. These new cameras produced 556 petabytes of data per day in 2015, and that is expected to steadily increase. In fact, the total RAW capacity of enterprise storage used just for video surveillance is expected to increase by 48 percent in 2016, according to predictions by IHS. By 2019, the average amount of data generated daily by new surveillance cameras is projected to reach 2.5 exabytes. In addition, retention times are also increasing. To adhere to regulatory requirements and protect against litigation, many companies and municipalities are keeping surveillance data much longer — years instead of days — and that is putting even more demand on storage infrastructures. Another factor forcing change in the industry is the ongoing maturation and expanded adoption of video analytics applications. Trends and patterns emerge as data is integrated from different inputs and analyzed over long periods of time. Analytics solutions are becoming more sophisticated, integrating video data with other systems and sensor input, and requiring data to be kept longer in order for patterns to be determined over time. As new use cases for these applications emerge, non-traditional business units are taking notice that video-based data — when integrated and correlated with data from other systems — can be used to make better business decisions. Logistics companies use video data to track cargo through ports and rail yards to improve efficiency. Retail companies use video to observe shopper behavior to make better decisions regarding product placement, store layout and advertising. Municipalities use video to analyze traffic flow, reduce congestion and increase commerce. Given the industry challenges and new uses for video-based data via enhanced analytics, storage is no longer just a peripheral consideration. It is the foundation of today’s — and tomorrow’s — security and surveillance system. As a result, storage architecture decisions need to be made carefully in order to meet the future demands.

Today’s storage infrastructure for video surveillance must be high-performing, scalable and affordable. It must provide the capability to keep video files for a long time while providing easy access and retrieval. The best approach is to implement a tiered architecture, especially one that can be tuned specifically for processing video files and viewed as a single file system. In a tiered architecture, multiple levels of storage exist. The architecture consists of a high performance disk, secondary disk, tape and cloud storage structured in tiers, enabling data sets to be stored on the most cost-effective medium based on user-defined policies. High priority, frequently-used files are stored on high performance disk, while lower priority files are stored on tape or in the cloud. Done well, the architecture provides a single file system view, and the system manages the movement of data between tiers keeping the metadata intact, allowing files to be retained economically for a long period of time and still remain accessible for analysis when needed. Whether implementing new fixed cameras, expanding existing installations or implementing new law enforcement solutions via body-worn or vehiclemounted cameras, selecting the right storage infrastructure is essential in order to build the right foundation. But regardless of which configuration is implemented, the full benefits of a tiered storage solution are available, including high-performance, scalable capacity; low-cost alternatives for long-term retention; and accessibility through a single file system interface.

Fixed Camera Environments Sometimes it seems that cameras are everywhere. Stationary cameras monitor public and commercial buildings, transit stations, ports and a host of other spaces, and more are installed every day. Camera counts can vary widely depending on

27

26-28-0914-01-Viewpoint-Storage Infrastructure.indd 27

2016/9/14 上午3:53


NAS2一般刊物\法蘭克福\A051666 A&S ASIA\30-34-a02-Market Dynamics 檔案夾 \

30-34-a02-Market Dynamics_0919.indd_p31 Dynamics_0919.indd_p30 < 出2彩 >

2016/09/19 Z

CMYK

When It Comes

t o G s ’ n Japa

SEPTEMBER SEPTEMBER 2016 ● www.asmag.com

Despite Japan’s low economic growth, the outlook for the country’s security industry remains bright due to various factors. Law enforcement relies on security technologies to keep residents safe from crime. Meanwhile, end users in city surveillance, transportation and retail increasingly turn to video analytics to manage events as well as optimize business. Finally, with Japan set to host the 2019 Rugby World Cup and the 2020 Summer Olympics, vendors will introduce more cutting-edge technologies and solutions to protect the athletes as well as spectators. BY William Pao

30

30-34-a02-Market Dynamics_0919.indd 30

2016/9/20 上午1:35

NAS2一般


CMYK

NAS2一般刊物\法蘭克福\A051666 A&S ASIA\30-34-a02-Market Dynamics 檔案夾 \

30-34-a02-Market Dynamics_0919.indd_p31 < 出2彩 >

2016/09/19 Z

CMYK

to Security

Game

J

apan’s economy has been lackluster for a while. Citing Japan’s Cabinet Office data, Fortune reported that the country saw year-on-year GDP growth of 0.2 percent in the second quarter, less than the 0.7 percent forecast previously. During the same period, private consumption grew by 0.2 percent year-on-year, and exports were also weak due to a strengthening yen. Overall, the World Bank forecasts Japan’s GDP growth this year would be 0.5 percent, down from the 0.6 percent last year. And the trend is expected to continue, as the organization forecasts growth of 0.5 percent and 0.7 percent for 2017 and 2018, respectively. However, for security, it’s a different story as most of the companies we spoke with expressed a sense of optimism. “The growth rate for security would exceed 0.5 percent, certainly,” said Yasuo Tobinaga, CEO of Tenpo Planning. “The growth momentum will be beyond 10 percent.”

Alan Broderick, Country Manager, Japan, Genetec Chris Cheung, Regional Sales Director, North Asia, Axis Communications Masaya Kida, Senior Manager, OPTEX Benjamin Low, VP, Sales, Asia Pacific, Milestone Systems Yasuo Nagase, Advisor, Locksystem Hiroshi Sasaki, CTO and CEO, Javatel Harry Sia, Regional Sales Manager, Hikvision Digital Technology Yasuo Tobinaga, CEO, Tenpo Planning

31

30-34-a02-Market Dynamics_0919.indd 31

2016/9/20 上午1:36


Advanced Visitor Management Systems Create Value to Enterprises BY William Pao

SEPTEMBER 2016 ● www.asmag.com

Visitor management has gone through a transformation. Traditional paper logs that do a poor job on keeping track of visitors have increasingly given way to computerized visitor management systems, which optimize performance and efficiency.

36

36-40-03-Product Exploration.indd 36

2016/9/14 上午4:03


F

or any end user organization, visitor management is an important part of security. This has even gained more significance today amid a rise in criminal activities by people outside an organization. Keeping tabs on the identity of the visitor and the duration of their visit therefore is something not to be taken lightly. “Adoption of visitor management software has grown steadily, especially in the past 15 years since 9/11. In more recent years, school shootings have increased the adoption of visitor management in the education market, and increased security concerns have made visitor management an integral and required component of security system specifications for companies both large and small,” said Debbie Pendleton, VP of Sales and Marketing at STOPware. Steve Barrett, CEO of Go Reception, echoed those remarks. “A visitor system needs to be available 24/7 as this is not just a marketing or image play for organizations but a very real way to ensure you are monitoring and keeping a workplace safe for visitors and staff,” he said. For a long time — and this still exists in a significant number of organizations today — visitor management has been done by paper and pen, a method that is ineffective and outdated. “It provides very little security and poses a number of problems,” said Eric Chiu, Segment Director for APAC at HID Global. “More often than not, the names are not legible or are false. In an emergency such as a fire, it would be impossible to

VerticalSpecific Demands Demands for visitor management solutions vary according to vertical markets. Government offices, for example, demand powerful visitor management solutions to check in visitors. “Government organizations and vendors require PIV integration to be able to read government smart cards required for federal workers and contractors, as well as denied party screening so they don’t allow people who aren’t allowed to deal with the US government in their facilities,” said Debbie Pendleton, VP of Sales and Marketing at STOPware.

In an education environment, visitor management may be integrated with law enforcement databases to filter out people who shouldn’t be there. “School districts have the need to protect children, and they can do so by searching externally at national sex offender lists or internally through their own lists of custodial searches and deny entry,” said Virginia Savietto, Marketing Manager at Security Identification Systems Corporation. “The strongest demand (for police record integration) is from the UK education sector. We’re able to instantly identify a possible threat or person of interest and notify an authority of their arrival on site. The basics are matching names and details, but we’re also working on something much cooler in respect to the instant threat notices,” Steve Barrett, CEO of Go Reception. In summary, each vertical market has its own set of needs for visitor management, and it is vital for the visitor management system to be customizable to those needs. “This means that the visitor management software must be easy to use but also include the ability to customize user screens and policies to ensure each company can customize the solution to meet their visitor workflow,” said Pendleton.

37

36-40-03-Product Exploration.indd 37

2016/9/14 上午4:03


KNOWYOUR CUSTOMER WITH SEPTEMBER 2016 ● www.asmag.com

44

44-49-12-Industry Report.indd 44

2016/9/14 上午4:11


H RETAILVIDEOANALYTICSHAVECOMEALONGWAYSINCETHEEARLYDAYS.THEY ARENOLONGERJUSTABOUTSECURITY,BUTMOREABOUTUNDERSTANDINGTHE CUSTOMERANDOFFERINGTHEBESTSERVICE.INTHISARTICLE,WETAKEALOOK ATTHEIRKEYFEATURESANDBESTAPPROACHESTORIGHTIMPLEMENTATION. BY Prasanth Aby Thomas

David Jones, VP, Marketing, IntelliVision Jason Luther, Head, Products, RetailNext Eric Olson, VP, Marketing, PureTech Systems Brien TerBush, Global A&E Manager, Aimetis Uma Welingkar, VP, Product Management, 3VR

45

44-49-12-Industry Report.indd 45

2016/9/14 上午4:11


time, present all objects, and act as a decision support for the human operator.”

POST-EVENT PROBE AND REAL-TIME MANAGEMENT

SMART SEARCH GAINS EMINENCE IN A

MORE DANGEROUS WORLD With criminal activities on the rise and terrorist threats more imminent than ever, city and law enforcement officials rely on video surveillance to crack down on crime. But sifting through piles upon piles of video data manually can be a daunting task. This is where smart search analytics tools can come in handy. BY William Pao

SEPTEMBER 2016 ● www.asmag.com

nce a major incident or criminal activity occurs, every second counts as law enforcement officials identify and track down possible suspects. A smart search analytics tool can help them in this regard. “Research shows that many shooting and terror acts can take place across several locations. Having access to a fast, effective and actionable search capability can be vital,” said Erez Goldstein, Senior Product Marketing Manager at Qognify. “Certainly, after a terrorist attack, our company experiences a sudden rise in interest. In the long run, more cameras are purchased. More cameras mean more video,” said Dror Irani, President and CEO of BriefCam. “A smart search tool is able to shorten review

Zvika Ashani, CTO, Agent Vi

Alan Ataev, Global Sales Director, Axxonsoft

A smart search tool usually performs two major functions. First and foremost, as its name suggests, it helps sift through video data and, in the shortest possible time, deliver those data that are relevant. “Without doubt, advanced search is an essential tool for quick video search, especially if we talk about modern security systems with thousands of cameras and petabytes of recordings,” said Alan Ataev, Global Sales Director at Axxonsoft. “In fact, in such circumstances, it is almost impossible to thoroughly analyze the video archive in a reasonable time without using highly developed search tools. Advanced forensic search allows getting useful results within seconds, which is crucial for case investigation.” “In a post-event scenario, investigations can be extremely resource-consuming when using video as a main source of data. In fact, for a major incident, it can take many hundreds of man-hours manually reviewing footage. And it can be slow, which is far from ideal in a time-pressured scenario where you need to learn fast who was involved, who were they in contact with, how they arrived, and where they might have been before acting their crime,” said Goldstein. “In this instance, where time is critical to the success of an investigation, the ability to automate much of the process saves huge amounts of time and resource, improving the likelihood of a successful resolution.” Besides post-event investigation, more and more end users rely on smart search to manage an ongoing event — like a suspected terrorist or criminal activity — and mitigate its impact. “Say you have an ongoing situation happening right now, and you want to evacuate the building and make sure it is empty. You can use our smart search capability to check if the building is empty and also try to locate the suspect to see if he is in the building right now,” said Zvika Ashani, CTO of Agent Video Intelligence (Agent Vi).

50

50-52-0914-04-Industry Report-Smart Search.indd 50

2016/9/14 上午4:16


HOW IT’S DONE Most smart search analytics in the market work in the same way: a search is performed on the video archives, and all relevant data based on certain criteria are retrieved. “Search by keyword or similar object is important, for example clicking to highlight an object and saying ‘find me all instances of video that contains something like this,’” said Ben White, CTO of VCA Technology. “We need, for example, to be able to find a blue car or a man wearing a red jacket, faces similar to the one searched for, a vehicle license plate number, and so on,” said Ataev. “The face capture and search algorithm automatically detects a face in the field of view or in video footage from one or several cameras, and then searches for that same face in other videos provided by networked cameras.” Smart search can be used to find not only people of interest but also vehicles or other objects. “Our latest update is that we have added face and license plate search to MomentQuest. The license plate search works quite similarly: it detects a license plate in the field of view or in video footage from one or more cameras. The algorithm involves advanced heuristic methods (such as substitution of similarlooking letters or numbers) to identify as many potential matches as possible,” said Ataev. The extent of the search is based on the need of the user. In Qognify’s case, for example it performs three types of searches: immediate, which delivers potential

Deep Learning Employed to Increase Accuracy

Increasingly, deep learning is employed in smart search tools to increase their accuracy. “We have a very large database of images that we collected from hundreds of surveillance cameras, including hundreds of thousands of images of people, vehicles, bicycles and other objects of interest. We also have a very large number of images of objects that are considered noise, anything that's not interesting but may be moving in a field of view, and with any VCA solution that does not employ deep learning, these things usually cause nuisance alarms,” said Zvika Ashani, CTO of Agent Vi. “When we run our algorithms on new sources of video, we can accurately identify what that object is, based on this model we created.” However, there is caution that at this stage, deep learning is merely a buzzword, and some challenges still remain. “Deep learning … has some serious requirements to work well. The deep learning approaches require huge amounts of training data and can hence take a significant time to develop. Deep learning approaches in this area are still in their infancy in commercial applications,” said Ben White, CTO of VCA Technology.

51

50-52-0914-04-Industry Report-Smart Search.indd 51

2016/9/14 上午4:16


FINDING FACES TO INCREASE PUBLIC SAFETY FILES Name: Alejandro Estevez Age: 37 Ethnicity: Hispanic Gender: Male Residence: London, UK

*****

LAST MATCH

CURRENT MATCH

MATCH98% SEPTEMBER 2016 ● www.asmag.com

FACIAL RECOGNITION TECHNOLOGY HAS BECOME A PART OF EVERYDAY CONSUMER TECHNOLOGY. DESPITE ITS PROLIFERATION, THERE ARE STILL HURDLES FOR ITS USE IN PUBLIC SPACES. EVEN SO, THE USE OF FACIAL RECOGNITION TECHNOLOGY HAS THE POTENTIAL TO STRENGTHEN PUBLIC SAFETY AND HELP FIND CRIMINALS TRYING TO HIDE IN A CROWD. BY Eifeh Strom, Freelancer

54

54-58-0914-11-Industry Report.indd 54

2016/9/14 上午4:19


[MATCH]

acial recognition technology is everywhere these days. It’s in Facebook. It’s in mobile apps. It’s in ATMs. While its acceptance, or at least proliferation, in consumer technology grows, its use in the public sphere for public safety has faced bigger challenges. Hollywood has set the bar high for facial recognition technology and what people expect. These expectations have been a challenge for this technology; however, the use of facial recognition technology is helping to enhance public safety and assist law enforcement agencies in identifying persons of interest. Research shows that revenue for the global facial recognition market is forecast to reach US$882 million by 2024

at a CAGR of 22 percent, according to Tractica. High-profile terrorist attacks are one of the driving forces behind the rise in adoption, as these have highlighted the need to strengthen security in public areas. In fact, Germany’s Minister of the Interior, Thomas de Maiziere, recently voiced support for using facial recognition in public spaces throughout Germany, such as in airports and train stations. Even with all the possible benefits, there have been many roadblocks for widespread adoption. From a lack of quality databases to technology shortcomings, the use of facial recognition technology particularly in public spaces has faced setbacks.

“FACING” THE TECHNOLOGICAL CHALLENGES For facial recognition technology to work there are certain conditions that must be met. These conditions play a critical role in the success of how well facial recognition works, particularly in a one-to-many facial recognition system where the system is matching faces against a database of photos instead of just one photo. Unfortunately, oftentimes the conditions needed for optimal performance are the technology’s biggest challenge. “Facial recognition can work very effectively in public spaces, but there is a need to change the positioning and focal length of some of the video surveillance

55

54-58-0914-11-Industry Report.indd 55

2016/9/14 上午4:19


Analytics Keep Stadium Crowds Under Control Stadiums can often be targets of violence. With large crowds of people attending events, securing such an environment can be a challenge; however, with current technology, protecting event attendees is getting easier. BY Eifeh Strom, Freelancer

n March of this year, a suicide bomber killed 41 people and wounded a hundred more at an Iraqi stadium during a local soccer match. This is only the latest incident of violence against stadium-event goers. Protecting event goers, stadium staff, event performers and athletes is of the utmost importance. However, stadiums are often very densely occupied and have a lot of blindspots, making security much harder to control. Because of this, unlike commercial buildings or public transportation, the use of private security personnel is still heavily relied on. Traditional physical security equipment such as video surveillance cameras, access control systems and alarm systems are also crucial elements of stadium security. However, with the advancement of technology has come better security tools for stadium security operators to utilize. One such technology is crowd control management. In an environment like a stadium, where tens of thousands of people are packed into close quarters, it is easy for a small incident to escalate into a full-on security risk; furthermore, it makes it a prime target for attacks. As algorithms for video analytics improve, companies are now better able to apply crowd control management technology to heavily populated stadium settings and identify possible risks.

CHALLENGES IN STADIUM SECURITY Depending on the event, stadiums can attract a diverse range of event goers, from the teeny-bopping music lover to the belligerent sports fan. “Nowadays, the main challenges in stadium security are to control the access of troublemakers, such as hooligans and other blacklisted people, as well as controlling attendees’ behavior,” said Laura Blanc, Marketing Executive at Herta Security. The bulk purchase of tickets for stadium events also pose a security risk when it comes to crowd control. “Bulk purchases of event tickets means that unidentified people will be receiving tickets and event organizers will not know who they are,” said Raj Sandhu, CEO of Bikal Distribution. Aside from controlling who is entering the stadium, other security concerns revolve around pre-empting any type of possible disturbance. “Most of the issues in stadium security are related to on-event-day disturbances and crowd control,” Sandhu said. “These are usually under the basis of volume crimes such as pickpocketing, drunk and disorderly conduct, assault, and other anti-social behaviors.” He added, “Crowd issues are not only a problem for safety but the confusion and chaos allow thieves to take advantage of the circumstances.”

SEPTEMBER 2016 ● www.asmag.com

60

60-62-0914-12-Vertical Solution.indd 60

2016/9/14 上午4:23


CONTROLLING CROWDS WITH SOFTWARE While on-the-ground security personnel are a major factor in controlling crowds in a stadium, applying video analytics to video surveillance data can help security officers mitigate issues before they turn into full-scale problems. “Technologically speaking, there is a need for each stadium to have a network infrastructure supporting video surveillance, access control and alarm monitoring, integrated by a powerful software management solution,” Blanc said. “It is also critical to examine the type of cameras installed in the stadium.” She added, “It is very important to have appropriate cameras that can provide the right image quality and resolution. This is especially delicate when the purpose is to control a highly crowded environment.” Herta’s software, which utilizes data from video surveillance cameras, can detect multiple faces in real time over multiple surveillance cameras. “Our technology offers high performance video surveillance solutions for facial recognition, especially for the simultaneous identification of subjects in crowded and changeable environments,” Blanc said. “It is a fully automatic and non-invasive technology that works properly on changes of facial expression, illumination, beard, eyeglasses, scarves and caps.” Blanc added that the software is very tolerant to changes in illumination, pose and partial face occlusions, which are some of the main factors involved in a stadium-type environments. Looking for patterns in video surveillance images via video analytics could also be used to help manage crowds more efficiently from a health and safety perspective. Sandhu explained: “Crowd bottlenecks can occur in venues for specific events, such as using a sports stadium for a one-off music event. As the entry points and the time of the event differs, the stadium will use certain entry and exit points that are not normally used. In addition, the attendees are

Laura Blanc, Marketing Executive, Herta Security

Egbert Jaspers, CEO, ViNotion

new to the venue, in most cases, and being able to direct the attendees effectively will be a challenge. Video analytics are able to spot bottlenecks in crowds and alert the health and safety executives to change, in real time, the management processes for moving the crowd around.” Egbert Jaspers, CEO of ViNotion, a Netherlands-based company specialized in intelligent image interpretation in videos, explained, “Our system, called ViSense, detects, counts and analyzes the motion pattern of people in different directions using IP cameras.” According to Jaspers, ViSense is able to count in streets of up to 18 meters wide and keep an average accuracy of about 95 percent, even in very dense situations (e.g., up to four people per square meter). By using machine learning techniques, the software is able to do more than people counting (e.g., gender and bicycle recognition, speed, throughput, and density measurement), which could be used for security measures in crowded situations. Jaspers added that it can be used at entrances and exits of stadiums to measure crowds to detect, for example, congestion or panic behavior. By analyzing data from IP cameras, the software can detect when a scene appears to become too crowded and then send an alert so that measures can be taken to avoid any problems. The software can also trigger an alarm if it detects a large number of people running or stopping suddenly.

Facial Recognition in Crowds

Raj Sandhu, CEO, Bikal Distribution

The accuracy of facial recognition in crowds is getting better and better as algorithms improve. In a stadium, where people are often moving together in large groups, picking out individual faces may be difficult. This also makes stadiums a perfect place for people to hide in plain sight. “Our system can detect faces within crowds, whereas most facial recognition systems require carefully positioned cameras for the face to be fully visible and only one

LOOKING FOR PATTERNS IN VIDEO SURVEILLANCE IMAGES VIA VIDEO ANALYTICS COULD ALSO BE USED TO HELP MANAGE CROWDS MORE EFFICIENTLY FROM A HEALTH AND SAFETY PERSPECTIVE.

61

60-62-0914-12-Vertical Solution.indd 61

2016/9/14 上午4:23


WOMEN IN THE SECURITY INDUSTRY

Jody Ross, VP, Strategic Accounts, AMAG Technology

As women continue to take over the workforce, the number of women in the security industry, however, is not seeing significant growth. For this article, we spoke to several women in security to find out how they got into the field and how the industry can encourage more women to enter. BY Eifeh Strom, Freelancer

Daniela Hossmann, Head of Regional Business Unit Intrusion, EMEA, Bosch Sicherheitssysteme

SEPTEMBER 2016 ● www.asmag.com

Andrea Iniguez, VP, Business Development, Theia Technologies

Sadiye Guler, Founder and CEO, intuVision

A look at any of the major security shows will reveal that there is a pretty big imbalance of women to men in the security industry. This gap, however, is changing, but slowly. The number of women entering tech jobs has definitely seen an increase, but it seems like security has seen less growth. Many women executives of security companies note a low number of applications coming from women, despite a rise in number of females getting degrees in engineering and computer science. a&s talked to several women in security to find out how they got into the industry, why they think there are so few women in the industry, and what we can do to encourage more women to be a part of it.

Q1. HOW DID YOU FIRST GET INTO THE SECURITY INDUSTRY?

Sadiye Guler, Founder and CEO of intuVision: I got into security through research and development in video content analysis (known as video analytics in this industry), my background is in computer vision. Daniela Hossmann, Head of the Regional Business Unit Intrusion in EMEA at Bosch Sicherheitssysteme: I have been with Robert Bosch for over 14 years and started out in the power tools industry where I collected a lot of experience in product management and marketing. After a couple of years in this field, I started to work for Bosch in the security industry (Bosch Security Systems) where I held several positions such as product manager for fire detectors, corporate communications and marketing. Currently I am responsible for the business unit intrusion in EMEA.” Jody Ross, VP of Strategic Accounts at AMAG Technology: I studied business in college and did not have any plans to enter into the security industry after graduation. I started at Andover Controls in a non-security focused role in the early 1990s and then migrated to the security side of the company in a Regional Sales Manager role. I completed my career at Andover in a National

64

64-66-0914-12-Business Talk-Women.indd 64

2016/9/14 上午6:00


Account Sales role. At AMAG Technology, I have held positions in Business Development and now Strategic Accounts. Andrea Iniguez, VP of Business Development at Theia Technologies: My career has been spent in international business to business and industrial marketing, sales, and business development roles, including in aerospace, specialty metals, orthopedic implants, and now in optics for a variety of industries. I earned an undergraduate degree in international studies and French and a graduate degree in international business. My education and fluency in a foreign language started me down this path. My partners at Theia Technologies invited me to join the company to add my experience and commercial skill to our joint competencies.

Q2. SOME RESEARCH HAS SHOWN THAT WOMEN ONLY

REPRESENT 10 PERCENT OF THE SECURITY INDUSTRY. WHY DO YOU THINK THAT IS? IS THIS DISCREPANCY SOMETHING YOU FEEL IS VERY OBVIOUS IN THE INDUSTRY?

Iniguez: There is a long tradition of male bias in many industries; unfortunately there is no reason to expect that the security industry would behave differently. If anything, bias may be more deeply rooted in this industry since security encompasses, and indeed was engendered by a need for physical security, originally with an emphasis on physical strength, the traditional domain of men. Obviously, there is so much more to security today than what’s provided by physical strength and women have much to offer. Ross: When I first started, there were very few women in the security industry. I almost cringe to say that women were considered a novelty. Today, more women have degrees in business

65漢軍.indd 1

64-66-0914-12-Business Talk-Women.indd 65

FORTUNATELY OVER THE YEARS, THE FEMALE PRESENCE HAS DRAMATICALLY INCREASED AND HAS CHIPPED AWAY AT THE HISTORICALLY MALE-DOMINATED INDUSTRY. Jody Ross, VP, Strategic Accounts, AMAG Technology

65

2016/9/14 上午5:58

2016/9/14 上午6:00


What Will Drive More IT Companies into Security?

SEPTEMBER 2016 ● www.asmag.com

The convergence of security systems and IT systems has been a widely debated topic in the past ten years. In many cases, the results were not successful due to conflicts of interest and disagreements between IT and security professionals. Could a growing presence of IT players in the physical security field shake up the industry? Are recent projects involving IT companies a new trend or just anecdotal evidence? BY the a&s Editorial Team

John Reno, Marketing Manager, IoT Product and Solutions, Cisco Systems

he presence of IP infrastructure in physical security is no longer a novelty. More often than not, new physical security systems are IP-driven, such as in IP video and IP access control. Established industry players are experimenting with new offerings such as video surveillance as a service (VsaaS), cloud storage and edge analytics. In parallel, we can see a growing involvement of IT/ICT companies in projects related to verticals where physical security was traditionally prominent. Not long ago, we saw a lot of NAS companies from the IT industry enter surveillance by offering more powerful storage management systems. Now, we see many of them getting involved in analytics, big data management and cybersecurity.

IT/ICT COMPANIES IN THE FIELD Cisco Systems is one such example of a communication technology conglomerate that has a substantial presence in physical security. “We have widespread involvement in physical security. Important industry segments include manufacturing, energy, smart cities and government. Largely, we engage customers seeking specific business outcomes such as increased worker or public safety and process acceleration,” explained John Reno, IoT Product and Solutions Marketing Manager for Cisco Systems. “Physical security plays an enabling role for IoT (Internet of Things) and enterprise initiatives. Our growth plans are driven by customer demand with expansion happening most recently in the IoT segment. As an ecosystem participant, we continue to drive for promoting the benefits of adopting IP for physical security. This includes work with standards bodies and the development of industry best practices. The primary advantage that Cisco delivers to the market is integration with cybersecurity systems, consistent policy across IT/OT environments and simplified compliance. Customers benefit from the ability to mitigate risks, protect their

68

68-70-0914-10-Business Talk-IT Companies.indd 68

2016/9/14 上午6:05


A LARGE NUMBER OF ICT COMPANIES ENTER SMART HOME SECTOR The relative technical strengths of IT companies, such as in networking, cloud services, etc., holds potential for both private sector smart home and large-scale smart city projects. Companies like Google and Amazon are involved in the smart home sector, offering solutions for home operating systems from thermostats to security and surveillance cameras. This new field has also drawn telcos and internet service providers (ISPs). In Korea, for example, the high penetration rate of high speed internet and available bandwidth enabled the large-scale introduction of cloud services and home security by telecom companies that are venturing into the Internet of Things (IoT) and smart home verticals. It’s not uncommon for people to use 4G networks to monitor their homes through their cellphones, and so far, two of Korea’s leading ISPs offer wireless video surveillance that runs off their own 4G network. In Taipei, the capital of Taiwan, a local cable company is offering a bundle service which includes cable TV, internet and a Wi-Fi IP camera for home monitoring. The service is provided using the cable company’s existing network of fiber optic cables across the city.

THE RELATIVE TECHNICAL STRENGTHS OF IT COMPANIES, SUCH AS IN NETWORKING, CLOUD SERVICES, ETC., HOLDS POTENTIAL FOR BOTH PRIVATE SECTOR SMART HOME AND LARGE-SCALE SAFE CITY PROJECTS.

69Commander 1/2頁.indd 1

68-70-0914-10-Business Talk-IT Companies.indd 69

businesses from an increasingly hostile threat environment, and cost savings from simplified compliance,” added Reno. Cisco is not alone in this, nor is this phenomenon limited to North America. Other companies like Chinese giant Huawei, Japan’s NEC, British Telecom and Korea’s SK have branched out and are now also involved in security technologies like

69

2016/9/14 上午6:02

2016/9/14 上午6:05


SMAhome

Z-WAVE EUROPE: THE BATTLE OF THE Z-TWINS — Z-WAVE AND ZIGBEE By Dr. Christian Paetz, CEO, Z-Wave Europe (originally published in a&s SMAhome issue 15)

Z-Wave and ZigBee are two major wireless networking technologies for smart homes. Z-Wave Europe CEO, Dr. Christian Paetz explains why and how Z-Wave and ZigBee compete against each other. Whenever there are comparisons and overviews made about smart home wireless standards, the two Zs — ZigBee and Z-Wave — are mentioned first. For more than one decade, the two wireless protocols have strived to become the primary choice of technology for the smart home, yet none of them was able to beat the other out of the game so far. Let’s have a closer look at the “Z-twins.” Like human twins, the two standards were developed almost at the same time. The IEEE 802.15.4-2003 ZigBee specification was ratified on December 14, 2004. The ZigBee Alliance announced the availability of specification 1.0, known as the ZigBee 2004 Specification, on June 13, 2005. Z-Wave was invented by a Danish startup Zensys around the year 2001 to 2002 as the foundation of its smart home system. Later on, the company stopped its product business and focused instead on licensing the wireless technology to others. The first Z-Wave devices showed up in the market around 2003.

Looking back to the history of Information technology, open interoperable systems almost always seem to win.

while ZigBee picked the 2.4 GHz frequency range. Besides these, both technologies handle all application-specific issues in the application layer, and adopt the mesh networking technology to provide reliable intercommunication. The technology uses connected devices as routers for connecting other devices in case there is no direct communication available. Furthermore, both technologies tried to manage their energy consumption well to meet the requirement of battery-powered devices. Last but not least, both technologies are promoted by an industry alliance named after the standard. Both the ZigBee and the Z-Wave alliance have a few hundred members, while the Z-Wave alliance seem to have grown a bit faster. Quite a few large companies in the world have joined both camps.

DIFFERENCES Initially, ZigBee focused a lot on the networking layer — networking, meshing and addressing. The technology got a jumpstart by using a well-defined physical layer of IEEE 802.15.4 which is supported by various vendors. The ZigBee ICs are supplied by large chip vendors, lowering the price of the silicon chips. As of today, the lower cost of ZigBee chips is still a clear advantage over Z-Wave. ZigBee was more concerned with the application layer. In the beginning, there was much freedom for developers to implement whatever they intended to do. Later on, the ZigBee Alliance tried to standardize various application layer profiles. But the Pandora’s box was opened. Even adding numerous different profiles that are

SIMILARITIES

SEPTEMBER 2016 ● www.asmag.com

Both technologies have a lot in common. Specifically designed for the smart home, both of them provide two-way communication which confirms every communication message back to the transmitter. Also, their generic communication architectures are similar. They both rely on a physical layer, and provide their own addressing and routing scheme on the networking layer. Z-Wave uses Sub-G frequencies at 865 to 920 MHz,

The ZigBee application layer profiles.

72

72-73-0914-SMA02-Column-Z-Wave.indd 72

2016/9/14 上午4:34


sometimes only adopted by one or only a few vendors did not result in mutually compatible designs of products under the ZigBee flag. Even today, the dilemma can be clearly seen on ZigBee Alliance’s application level profile layout. None of the different profiles, not even different versions of the same profile, share commonality and interoperability. For new vendors, it is almost impossible to find the right profile. Even if the vendor decides to use its own profile, nobody will really object. The toolsets used by the ZigBee Alliance to push toward convergence are not very sharp anyway. Large members of the club defend their own proprietary implementation of ZigBee citing good business reasons , convenient supply of chips plus the lack of any sanctions or benefits given for following the centralized profiles. It results in too many “vendor-specific” implementations. The situation for Z-Wave is just the other way around. The core mission of Z-Wave is to provide interoperability and unification of the application layer which is the central piece of work for the Z-Wave Alliance. There is only one standard application profile and its use is strictly enforced.

The biggest disadvantage of Z-Wave — not having enough hardware suppliers — became an advantage here because it gave Z-Wave promoters the weapon to defend its interoperability claim against misbehaving vendors who want to benefit from the interoperability ecosystem, but still want to lock their customers into their own solutions. The various attempts of the ZigBee camp to unify its application-level protocol proves that Z-Wave is most likely in the right for ruthlessly enforcing interoperability, even at the cost of losing some interesting and large OEMs.

MARKET TODAY Looking at the market place today, we can see that both sides are playing their cards well. When there is a strong need for locking customers into a company-specific solution, ZigBee is the way to go. The most prominent example is the Philips Hue. Since LED lights face severe price pressure from low-end suppliers, an international brand like Philips can only defend its position by locking the customers into their own solution, the Philips Hue platform. Integrators on the other side of the market prefer to have the freedom to choose vendors. They don’t want to buy chipsets from a limited number of suppliers because it would be hard for them to negotiate prices and conditions. However, the world is not that easy and it is interesting to see how large-sized systems integrators such as service providers made their choices. They might prefer to adopt ZigBee because the technology gives them the freedom to implement their own ideas and dreams. Some business people may opt for a closed system based on ZigBee technology because they think they can penetrate and dominate the markets with their proprietary systems. Those who are more realistic prefer the open system for the above-mentioned reasons. Looking back to the history of information technology, open interoperable systems almost always seem to win. The “right to choose” is a very strong argument for consumers. Besides, only competition can create innovation and progress that leads to domination of the market. On the other hand, these processes may take longer than we expect. Also, lack of interoperability will impact large-sized players when their products are placed side-by-side on the same shelf with uncertified or non-interoperable devices. OEM brands may still prefer their own technology wrapped into their own marketing packages, but from a sales perspective, there is certainly a different objective. They want to simplify the sales process and upsell. By saying “no” to the simple question “Can I use this with that?” from consumers, they will not achieve this goal.

73

72-73-0914-SMA02-Column-Z-Wave.indd 73

2016/9/14 上午4:34


3xLOGIC infinias CLOUD Access Control Solution Features:

• S imple to operate • Affordable: no server, no maintenance, automatic updates and pay-as-you-go pricing • Infinite scalability: unlimited doors, cardholders, credentials • Mobile event monitoring with integrated video via the infinias mobile app • Video integration with Milestone XProtect ■3xLOGIC/U.S.A. ■Email: sales@infinias.com

Aurora FaceSentinel Face Recognition Biometric Access Control Reader Features: • • • • •

T otally non-contact Wiegand/RS485 interface Light-immune Fast and simple to use Stores images of all users

■Aurora/U.K. ■ Email: info@ facerec.com

Canon VB-R13VE Speed Dome Network Camera Features:

• G enuine Canon 30x optical zoom lens, 20x digital zoom and enhanced digital zoom function • 2.1-MP high-sensitivity CMOS sensor with exceptional low-light performance • Advanced DIGIC DV III image processor to help maximize image quality • IP66 rated and IK10 vandal resistant enclosure • Haze compensation, smart shade control and auto gain control limit • Scheduled custom video settings ■ Canon USA/U.S.A. ■ Email: pr@cusa. canon.com

Arteco Events Analytics (AEA) Features:

• W eb-based application • Dashboard consists of 2 different pre-configured charts which give the user an immediate representation of all the events that occurred in the last 7 days • System diagnostics allow the user to monitor, analyze and compare the health status of the connected systems • A responsive and effective reporting environment provides the ability to analyze and compare all the events generated by any installed device • Operation ranking provides information for the optimization of the operations and coordination of operators to help improve management ■Arteco/Italy ■Email: support_na@artecous.com

Siemens Siveillance VMS 300

Axis Camera Station S2008 Appliance

• E asily expandable as business needs change • Ensures that video recording is never interrupted using failover recording servers and redundant management servers • Provides multistage video storage, including video grooming possibilities, for efficient long-term storage, without interfering with active video • Secures availability for video for investigations via evidence lock, overriding normal video retention for grooming policies • Enables encryption of sensitive data

• • • • •

Features:

SEPTEMBER 2016 ● www.asmag.com

■ Siemens Building Technologies/Germany ■Email: contact@siemens.com

Features:

ll-in-one solution with integrated PoE switch A Validated with extensive support High definition surveillance up to 4K Axis camera station included Full compatibility with Axis products

■Axis Communications/Sweden ■Email: axis-sap@axis.com

SRI Identity IOM Handheld Identity Reader Features:

• D ual-iris enrollment with wireless connectivity to the database server • Convenient two-click iris and face capture with one hand • Identity verification in less than one second • Standoff capture at a comfortable distance from subject • Onboard enrollment for flexible registration • Portable design for field operations ■SRI Identity/U.S. ■Email: info@sri.com

74

74-76-0914-a04-New Product.indd 74

2016/9/14 上午4:38


Arecont Vision AV1195DN MegaVideo Flex Camera Features: • • • • • •

1.2-MP resolution 2.8 mm lens NightView technology Remote focus True day/night SD card slot

■ Arecont Vision/U.S. ■ Email: support@arecontvision.com

Genetec Security Center 5.5

Seagate SkyHawk Surveillance Hard Drive Features:

• O ptimized for DVRs and NVRs, tuned for 24x7 workloads in capacities up to 10 TB • ImagePerfect firmware enables smooth video streaming • Supports up to 64 cameras • Ready to record 90% of the time • Up to 10 TB or 2,000+ hours of HD videos ■ Seagate/U.S. ■ Email: apj.sales.enquiry@seagate.com

Features: • • • • • •

Disaster recovery Alarm grouping and filtering Plan manager enhancements New tiered SDK packages Security desk in 64-bit mode Active directory universal group support

■ Genetec/Canada ■ Email: info@genetec.com

Sony SNCVB770 4K Network Camera Features:

• U ltra-high sensitivity of expandable ISO 409600 captures clear color video even in near darkness • Overview and close-up at the same time with intelligent cropping • Maximum detail where it matters with intelligent coding • Best picture quality around the clock with intelligent scene capture • 35 mm full-frame Exmor CMOS sensor ■ Sony Electronics USA/U.S. ■ Email: bis.product.support@am.sony.com

Wavestore A-Series NVR

Union 2200 – BS 5 Lever Sashlock

• • • • • •

• C hamfered bolt design increases the performance of the lock under side load testing • Anti-pick, anti-saw and anti-drill security features for resistance against attacks • Radius inner forend for ease of installation • Deadbolt locked or unlocked by the key from either side • Case size: 68 mm or 81 mm • Faceplate: supplied with square faceplate which covers a radius inner forend

Features:

VR channels: up to 8 IP N Hard drive: 1 x 2.5” 9 mm form factor Internal storage: up to 2 TB IP throughput: up to 100 Mbits/s Full WaveView client operation Near silent operation

■ Wavestore/U.K. ■ Email: info@wavestore.com

Panasonic WV-SUD638 PTZ Network Camera

Features:

■ Union (part of Assa Abloy)/U.K. ■ Email: info@uniononline.co.uk

Features: • • • • • •

Full HD (1080p) 60 fps, 30x zoom lens Built-in wiper and auto defroster Wind load durability 60 m/s (operation), 80 m/s (non-destructive) Video stability augment system for high-class image stabilization IP67, IP66, IK10 certified Anti-salt air corrosion protection ideal for seaside operations

■ Panasonic Corporation of North America/U.S. ■ Email: panasonicwebcasesf@us.panasonic.com

75

74-76-0914-a04-New Product.indd 75

2016/9/14 上午4:38


Companies in This Issue Cover Story • WD

Products of the Month

• BOSCH SECURITY SYSTEMS • GENETEC • VISCOUNT SYSTEMS • WURLDTECH

Viewpoint • QUANTUM

Market Dynamics

• AXIS COMMUNICATIONS • GENETEC • HIKVISION DIGITAL TECHNOLOGY

• JAVATEL • LOCKSYSTEM • MILESTONE SYSTEMS • OPTEX • TENPO PLANNING

Product Exploration

• AMAG TECHNOLOGY • BRIVO • GALLAGHER • GO RECEPTION • HID GLOBAL • ICD SECURITY SOLUTIONS • QUANTUM SECURE • SECURITY IDENTIFICATION SYSTEMS CORPORATION • STOPWARE

Next Issue

Vertical Solution

• TIME DATA SECURITY • VANDERBILT INDUSTRIES

• BIKAL DISTRIBUTION • HERTA SECURITY • VINOTION

Industry Report

• 3VR • AGENT VIDEO INTELLIGENCE • AIMETIS • AXXONSOFT • BRIEFCAM • COGNITEC SYSTEMS • IMAGUS TECHNOLOGY • INTELLIVISION • PURETECH SYSTEMS • QOGNIFY • RETAILNEXT • VCA TECHNOLOGY • VIGILANT SOLUTIONS

Business Talk

• AMAG TECHNOLOGY • BOSCH SICHERHEITSSYSTEME • CISCO SYSTEMS • INTUVISION • THEIA TECHNOLOGIES

Market Dynamics

Vertical Solution

Product Exploration

MALAYSIA

GAMING

OUTDOOR INTRUSION SYSTEM

ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO. 9 29 5, 7 6 25 59 BACK COVER 13 15 4 53 INSIDE BACK COVER INSIDE FRONT COVER, 1 42, 43 69 2, 3 17 11 35 FRONT COVER. 18.19

ADVERTISER AXIS COMMUNICATIONS AB COMMAX CO., LTD. DAHUA TECHNOLOGY CO., LTD. DYNACOLOR INC. EVERFOCUS ELECTRONICS CORP. FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. HIKVISION DIGITAL TECHNOLOGY CO., LTD. IDIS CO., LTD. MEERE COMPANY INC. PANASONIC SYSTEM NETWORKS CO., LTD. RIFATRON CO., LTD. ROBERT BOSCH (SEA) PTE LTD. SECURITY SYSTEMS SAMSUNG (HANWHA TECHWIN CO., LTD.) SEAGATE TECHNOLOGY LLC SHENZHEN COMMANDER TECHNOLOGY CO., LTD. SONY CORPORATION SEMICONDUCTOR GROUP SONY ELECTRONICS ASIA PACIFIC PTE. LTD. VIDEOPARK TECHNOLOGY CO., LTD. VIDEOTEC S.P.A. WESTERN DIGITAL TAIWAN CO., LTD.

MAJOR ITEM NETWORK VIDEO SOLUTIONS SURVEILLANCE SURVEILLANCE IP CAMERA / NVR CAMERA / DVR / IP CAMERA DOME COVER SURVEILLANCE SURVEILLANCE CAMERA VIDEO SURVEILLANCE DVR SURVEILLANCE CAMERA / DVR STORAGE CASING SEMICONDUCTOR NETWORK MONITORING SOLUTIONS SURVEILLANCE IP CAMERA / SOFTWARE / VIDEOSERVER SURVEILLANCE STORAGE

COUNTRY SWEDEN KOREA CHINA TAIWAN TAIWAN CHINA CHINA KOREA KOREA JAPAN KOREA SINGAPORE KOREA SINGAPORE CHINA JAPAN SINGAPORE CHINA ITALY TAIWAN

E-MAIL contact-sap@axis.com pcy@commax.co.kr overseas@dahuatech.com info@dynacolor.com.tw marketing@everfocus.com.tw sales@fjsmt.com overseasbusiness@hikvision.com sales@idisglobal.com sales@cube-eye.co.kr contact@rifatron.com apr.securitysystems@bosch.com apriler@samsung.co.kr apj.sales.enquiry@seagate.com sjw@yjdcase.com pro.info@ap.sony.com overseas@videopark.com.cn info@videotec.com Jessica.liu@wdc.com

MAJOR ITEM RFID MODULE / LOCK / READER READER

COUNTRY E-MAIL TAIWAN promag@gigatms.com.tw TAIWAN overseas@hundure.com

ACCESS CONTROL PAGE NO. 41 65

ADVERTISER GIGA-TMS INC. HUNDURE TECHNOLOGY CO., LTD

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

77

ADVERTISER INDEX SURVEILLANCE

a09-Companies this lssue.indd 77 77廣告索引.inddin 77

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions. 2016/9/14 上午6:11 上午6:07


October 2016 – May 2017

WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx. October 2016

March 2017

Security China

Safe Secure Pakistan

• Date: 2016/10/25–10/28 • Venue: China International Exhibition Center (New Center), Beijing, China • Tel: +86-10-68731710 • Email: secu_chinashow@yahoo.com.cn • URL: www.securitychina.com.cn

• Date: 2017/03/07–03/09 • Venue: Pak-China Friendship Centre, Islamabad, Pakistan • Tel: +92-21-111-734-266 • Email: info@safesecurepakistan.com • URL: www.safesecurepakistan.com

Security Show

November 2016

Expoprotection

• Date: 2016/11/07–11/09 • Venue: Paris Porte de Versailles - Pavillion 1, Paris, France • Tel: +33-1-47-56-50 11 • Email: marie-aurelie.goncalves@reedexpo.fr • URL: www.expoprotection.com

Smart Summit Asia

• Date: 2016/11/30–12/01 • Venue: Suntec Convention and Exhibition Centre, Singapore • Tel: +44-330-3353900 • Email: sponsorship@smartsummit.net • URL: www.iotsmartsummitasia.com December 2016

MEFSEC

• Date: 2016/12/11–12/13 • Venue: Cairo International Convention Centre, Cairo, Egypt • Tel: +971-4-407-2702 • Email: syed.javed@informa.com • URL: www.mefsec.com January 2017

• Date: 2017/03/07–03/10 • Venue: Tokyo Bright Sight, Tokyo, Japan • Tel: +81-3-3512-5670 • Email: tradefairs2017@smj.co.jp • URL: https://messe.nikkei.co.jp

Expo Seguridad • Date: 2017/03/14–03/16 • Venue: Centro Banamax, Mexico City • Tel: +1-203-722-7351 • Email: joliver@reedexpo.com • URL: www.exposeguridadmexico.com

MIPS

• Date: 2017/03/21–03/24 • Venue: Expocentre Fairgrounds, Moscow, Russia • Tel: +7-499-750-08-28 • Email: valentina.michaelson@ite-exhibitions.com • URL: www.securika-moscow.ru

Protect • Date: 2017/03/29–03/30 • Venue: SMX Convention Center, Manila, Philippines • Tel: +632-818-6828 • Email: leverage@leverageinternational.com • URL: www.protect.leverageinternational.com

Intersec

SEPTEMBER 2016 ● www.asmag.com

• Date: 2017/01/22–01/24 • Venue: Dubai International Convention and Exhibition Centre, Dubai, U.A.E. • Tel: +971-4-389-4500 • Email: andreas.rex@uae.messefrankfurt.com • URL: www.intersecexpo.com

April 2017

ISC West • Date: 2017/04/05–04/07 • Venue: Sands Expo & Convention Center, Las Vegas, U.S.A. • Tel: +1-203-840-5602 • Email: inquiry@isc.reedexpo.com • URL: www.iscwest.com

Secutech India • Date: 2017/04/06–04/08 • Venue: Bombay Exhibition Center, Mumbai, India • Tel: +91-22-4286-3800 • Email: info@secutechexpo.com • URL: www.secutechindia.co.in

Secutech International • Date: 2017/04/12–04/14 • Venue: Nangang Exhibition Center, Taipei, Taiwan • Tel: +886-2-8729-1017 • Email: danielle.lin@newera.messefrankfurt.com • URL: www.secutech.com

ISC Brazil • Date: 2017/04/18–04/20 • Venue: Expo Center Norte, São Paulo, Brazil • Tel: +55-11-3060-4717 • Email: atendimento@reedalcantara.com.br • URL: www.iscbrasil.com.br May 2017

IFSEC Philippines • Date: 2017/05/03–05/05 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-7966-222-505 • Email: agnius.kazlauskas@ubm.com • URL: www.ifsec-global.com/philippines/

Exposec • Date: 2017/05/23–05/25 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: info@fieramilano.com.br • URL: www.exposec.tmp.br

SECUREX • Date: 2017/05/30–06/01 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: leighm@specialised.com • URL: www.securex.co.za

78

03-Show Calendar.indd 78

2016/9/14 上午5:03


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.