EDITOR’S NOTE Drones Will Play an Integral Role in Public Safety and Security What is trending in 2017? Now, at the end of the first quarter of 2017, we can see how deep learning is enhancing the accuracy of smart video surveillance and just because of this, we can see how Graphics Processing Units (GPUs) are coming into play in the security field. In addition to this, another main trend I would like to pinpoint would be “drones,” which were first used in consumer electronics, and then gradually used for large-area monitoring, inspection, and mapping, now often becoming an important system for security and safety purposes. In this year’s major security shows, Intersec, ISC West and Secutech Taipei, we saw many suppliers demonstrate their drones or de-drone solutions. At Secutech, NEC facial recognition technology is used by the camera on the unmanned aerial system of GEOSAT Aerospace and Technology to demonstrate how it searches and finds target people during emergency rescues. According to the latest news from the U.S., US border patrol agents are also looking for drones with infrared cameras and facial recognition capabilities to monitor the borders. We can definitely see more drones fulfill multiple purposes for public security and safety in the near future.
KEEP IN TOUCH WITH...
SOCIAL MEDIA www.facebook.com/ asmagglobal
twitter.com/ asmagglobal
www.linkedin.com/ company/ asmagglobal
EDITOR-IN-CHIEF JILL LAI
jill.lai@newera.messefrankfurt.com
EDITORIAL TEAM
April 2017 ● www.asmag.com
REPORTER WILLIAM PAO
REPORTER LISA HSU
EDITOR EMILY LIN
REPORTER RYAN LIU
REPORTER PRASANTH ABY THOMAS
Amid fierce competition Merit LILIN formulated a clear strategy to win out: adding new features to products, promoting non-security video applications and deepening ties with systems integrators. Among the stories of companies succeeding in the competitive security landscape, LILIN’s is indeed a good one.
Airports — a lot has changed. Before, one would probably spend a whole day at the airport — not saying sad goodbyes, but standing in line trying to get past customs. Now, technology saves us the trouble by providing secure and streamlined processes to deliver us to our next destination!
The MIPS event in Macau symbolized a fundamental shift in Milestone Systems’ corporate strategy as it moved the focus from creating products to “co-creating” value via the partner community. By opening up the platform, Milestone is also opening up the community to new possibilities and opportunities.
The security market in Asia is growing as we speak. More countries are demanding more and better security as economy rises and technology advances. This in turn will increase competition, as can be seen in Taiwan where domestic and foreign companies are competing for buyers’ attention.
We are no longer living in an era where reactive security systems alone can be used to protect people and infrastructure. Proactivity is the key. To this end, high-quality video and analytic solutions play an important role. In the coming days, we would see more of these.
8
PRODUCTS OF THE MONTH Secure Access With Biometric Technology
Editor’s Note: Access control comes in a variety of options including smart cards, PIN input or even mobile devices. Biometric access control is one option that is unique to each individual and difficult to replicate. Biometric technology makes it almost impossible for others to steal the user’s identity and eliminates concerns over misplacing cards or passwords. When it comes to the type of biometric access control a user needs, there are many choices to consider. Fingerprint scanners are the most common, owing to developments that have significantly increased the accuracy of print reading. Facial recognition and iris scanners are also viable choices that use the face and eye structures as a means of unique identification. Advances in biometrics have increased the accuracy and security of these access control technologies.
Suprema
SFM6000 Series Fingerprint Embedded Modules The SFM6000 series represents a great leap forward in biometrics. It boasts a powerful 1.0 GHz CPU that empowers the worlds’ fastest authentication, and supports multiple interfaces including RS232 and USB 2.0 that allow high-speed data transfer. With an enlarged template capacity up to 25,000 templates, the SFM6000 Series is a solution for large-scaled yet fast authentication. Key Features: • 1:1 verification in 330 milliseconds (ms) • 8 configurable digital I/O ports • 1:1,000 identification in 400 ms • Suprema, ISO 19794-2, ANSI 378 template options • 256-bit AES fingerprint data encryption • Android SDK
Supplier: Suprema URL: www.supremainc.com
Innovatrics IFace Software Development Kit This face recognition SDK provides fast and accurate facial recognition and tracking functionality, facial template extraction and verification as well as image quality checks with accordance to ISO/IEC 19794-5 and International Civil Aviation Organization (ICAO) standards.
Key Features: • Delivers facial biometrics capabilities to mobile and desktop devices • Assures convenient support for self-service and assisted enrollment scenarios
• Enables quality evaluation of pre-enrolled facial images as per normative requirements • Supports face tracking and evaluation scenarios in real-time image processing • Enables high speed face recognition solutions
Supplier: Innovatrics URL: www.innovatrics.com
Fujitsu PalmSecure Palm Vein Authentication System April 2017 ● www.asmag.com
The Fujitsu PalmSecure sensor uses near-infrared light to capture a person’s palm vein pattern, generating a unique biometric template that is matched against pre-registered user patterns. The palm vein device can only recognize the pattern if the blood is actively flowing within the individual’s veins, which means that forgery is virtually impossible. This advanced, vascular pattern recognition technology provides highly reliable authentication. The PalmSecure technology false accept rate is just 0.00001 percent with an exceptional false reject rate of 1 percent, all in a small form factor that generates extremely fast authentication, usually under one second.
10
Key Features: • Advanced biometric authentication algorithm delivers ultra-low false accept rate (FAR) and false reject rate (FRR) • Contactless palm vein authentication is hygienic and noninvasive – no residual trace technology • Encrypted repository for template storage and enterprise level event logging capability • Quick-start deployment across the enterprise raises security and adds value • Software development kit (SDK) for organizations deploying PalmSecure technology • Fast and easy registration with virtually no enrollment error
Supplier: Fujitsu Frontech North America URL: www.fujitsu.com
Safran Morpho MorphoFACE Biometric Solution MorphoFACE integrates state-of-the-art face recognition technologies, thus ensuring a high level of accuracy and a strong defense against fraud attempts. Based on 3D video tracking, this biometric solution enables a steady flow of users, keeping them “on-the-move” at all times, with no compromise on facial image capture quality and matching performance. MorphoFACE is a comprehensive solution for a range of applications where throughput, security and convenience are key requirements. This includes border control, self-boarding and passenger flow management. Highly adaptable, it comes either as a compact standalone unit or as a complete, ready-to-integrate OEM kit.
Zwipe Access Control
Zwipe Access is a versatile fingerprint-activated contactless credential working seamlessly with existing 125 kHz or 13.56 MHz infrastructure, without upgrading or replacing any readers or backend systems. Only after activation by a fingerprint scan will the card allow communication with a reader. Zwipe continues the security of biometric authentication with the speed and convenience of contactless credentials. Key Features: • Delivers consistent and accurate fingerprint reads in 1 second • Unique to the cardholder, only the card owner can activate card communication with the reader • Biometric data is stored on the card, eliminating the need to manage and secure an external database with fingerprint data • Strong and resistant to cracking or breaking • On-card authentication provides easy path to upgrade security without upgrading readers
Supplier: Zwipe URL: www.zwipe.com
Key Features: • Robust to users’ behavior and profile • Anti-spoofing capabilities • High image quality and accuracy • “On-the-move” face capture and identification • Multi-camera face capture for reliable 3D video tracking • Non-intrusive and intuitive, requiring minimal user cooperation
Supplier: Safran Identity & Security URL: www.morpho.com
Iris ID iCAM 7S Series Advanced Multi-factor Biometric Iris Reader
The iCAM 7S enables rapid iris acquisition with greater image quality for superior enrollment and recognition. The patented holographic targeting mirror is just one part of an intuitive and interactive interface that includes voice and visual feedback for increased speed. All models feature the robust Iris ID countermeasure package. The new iCAM 7S series is a leap forward with larger system capacity and even easier to use. A larger targeting mirror and auto-tilt assist allow touchless operation. The iCAM 7S models will operate in highly lighted areas (up to 17,000 lux). Iris ID’s biometric solutions provide highly accurate, non-contact identification by the iris of the eye from 14 inches away while delivering security, convenience, privacy and productivity to millions of people around the world. The iCAM 7S versatility and flexibility allows for easy integration with any Wiegand or IP network based access control, time and attendance, visitor management or point of sale applications. Key Features: • Fast fully automatic dual iris capture • Non-intrusive, non-contact user interface • Integrated high resolution face capture camera • Leverages existing infrastructure • Capacity for optional third-party surveillance camera • Remote management
Supplier: Iris ID URL: www.irisid.com
ievo ultimate Fingerprint Reader
The ievo ultimate was designed from the outset as a third-party reader, capable of seamlessly integrating into a large number of access control systems. Boasting many unique features and benefits, the ievo ultimate uses multispectral imaging combined with an advanced world-leading algorithm to keep data accurate and secure. Operational in a variety of harsh environments, the ievo ultimate reader is the flagship fingerprint reader from ievo. With a standard template range of up to 10,000 fingerprints (larger capacity options are available), the ability to combat a vast majority of problem fingerprints and customizable options, the ultimate reader is suitable for any business in any industry. Key Features: • Algorithm identification < 1 second • 1:N matching up to 10,000 fingerprint templates • Designed for external and internal use • Multispectral imaging sensor • Data transmission AES (128bit) encrypted • Activated by proximity detection
Supplier: ievo URL: www.ievoreader.com 11
According to Hsu, video is no longer just for surveillance; it can also be used for management purposes. This is made possible by more advanced analytics which enables the end user to perform smart searches and obtain detailed reports about their entities or operations. Hsu used transportation as an example. “Providing simple road monitoring can no longer fulfill the end user’s increasingly complex needs. Once something happens, you need to track suspected vehicles or individuals,” he said. “Now we have license plate recognition
New Features aNd FuNctioNs
his year marks Merit LILIN’s 37th year in business. During the past almost four decades the company established itself as one of the biggest names in video surveillance and built a strong presence in North America and EMEA, thanks to its manufacturing and research & development capability that the company has accumulated over the years. “We do all our manufacturing in Taiwan, and we insist on doing that,” said Cheng Chung Hsu, President of Merit LILIN. “If we manufacture outside Taiwan there are many things we won’t be able to control, for example materials selection, production and product lifecycle. In Taiwan we can control all this, with detailed data to prove to customers the quality and durability of our products.”
BY William Pao
Being a global brand LILIN has built an extensive network of distributors all over the world. Now to expand its customer base the company is also working more closely with systems
workiNg closely with sis
Even beyond security, video has wide applications, and that’s the concept that LILIN is trying to promote. One example that Hsu cited was retail, where video can go beyond its usual functions of keeping stores safe and secure. Now with advanced analytics, operators can use video to achieve further business intelligence which can then help bring more customers and revenue. “For example I’m a retail chain with some 1,000 stores. How do I know who come to my stores? What are the peak hours? Which areas do they frequent more? What age groups do they belong to? As the owner I need to know these things to develop a better strategy,” Hsu said. “Before I could just estimate who my customers were. Now that I have analytics I can get more accurate information.” Another example is parking, where video can not only be used for post-event investigation but also for ease of management. “Before, parking operators had video but didn’t have the needed analytics. Now we can integrate our solution into their system to facilitate management,” Hsu said. “We have license plate recognition so that we can identify a vehicle by its plate number. This can help ease the payment process and navigation. Say you have a large, multi-story parking garage and you forgot where you parked … with a parking system integrated with ALPR this is no longer a problem.”
BeyoNd security
on the front end and back end. So when something happens we can do live tracking. And in case live tracking isn’t possible, we can perform a smart search where we enter the car’s license plate number and all images of the vehicle taken by cameras at difference places come up. That’s how video can be useful.”
LILIN's MR6442AX HD 30M-range IR varifocal dome IP camera
LILIN Deepens Ties With SIs
Being in the industry for nearly four decades, Merit LILIN is one of Taiwan’s premier video surveillance manufacturers. In the face of intense competition in the market, the company realized that focusing on products alone could no longer guarantee success. That’s why the company has transitioned into a system provider targeting different vertical markets. At the same time, the company has also forged stronger ties with systems integrators to widen its reach into more markets.
Merit
April 2017 ● www.asmag.com
12
13
“STARTING TWO TO THREE YEARS AGO WE BEGAN TO STRENGTHEN TIES WITH MID- TO LARGE SYSTEMS INTEGRATORS, HELPING THEM GET AND DESIGN PROJECTS. THIS WAY WE CAN ACHIEVE A MUTUAL-WIN SITUATION.”
integrators, helping them win projects and explore new possibilities in video. “Starting two to three years ago we began to strengthen ties with mid- to large systems integrators, helping them get and design projects. This way we can achieve a mutual-win situation,” Hsu said. “We focus on SIs all over the world but prioritize Southeast Asia, due to the proximity factor. It’s close, and when they need support we can get there immediately. In other regions, LILIN already has North America and EMEA offices, which have also forged deeper ties with local SIs.” To provide help and support to systems integrators, LILIN holds periodic training sessions for them. “We find a place in a particular region and gather up all the major SIs in that region to do a training session. We do this at least every half year because we continue to launch new products. We train these SIs so they know the strengths and differentiators of our products, as well as our strategy and the directions we are taking,” Hsu said. Besides education LILIN also provides other types of support to help SIs as they do projects. “We also participate in the project planning stage. For
Cheng Chung Hsu, President, Merit LILIN
In this fast-changing security industry, LILIN chooses not to stand idly by and get eliminated from the competition. Rather it chooses to rise up to the challenge by transforming itself into a value-added solutions provider to fulfill end users’ specific demands. To make deeper inroads into the market and understand user needs, LILIN works with SIs, providing necessary support to help them win projects. Indeed, LILIN’s effort to make the transition, and the success that came out of it, is a model for fellow peers to learn from.
a Model to learN FroM
LILIN sells their products all over the world, including North America, Europe, Russia, the Middle East and Southeast Asia. In particular, Southeast Asia is now a primary focus for the headquarters of the company due to the region’s growth potential. “We do a lot of business in Indonesia, the Philippines, Vietnam, Thailand, and India, and we have also entered Bangladesh where we have a major transportation project,” Hsu said. “Southeast Asia is an emerging market that keeps developing. It’s an important market for us.”
a Focus oN asia
example if they have a project with 500, 1,000 or 2,000 cameras, we tell them which cameras to use, what’s the best transmission method, and what’s supposed to be on the backend,” he said. “SIs need a lot of help in this regard.”
NEWS FEATURE a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.
Apollo Fire Detectors — Protecting the India Habitat Center
The India Habitat Center (IHC), a new national business center located in India’s capital city of New Delhi, has chosen an Apollo fire detection system to safeguard the staff, visitors, buildings and property at its innovative site. BY Apollo Fire Detectors
T
he IHC is a multipurpose building combining work, commercial and social spaces. The idea for the Center first emerged when India’s public agency, the Housing and Urban Development Corporation (HUDCO), wanted an office building for its workers and made the unprecedented decision to invite chosen non-profit organizations that shared their concern about habitat to share that work space. An urban design project rather than a traditional office building, the IHC provides spaces for a number of uses across its vast nine-acre site. The Center encompasses multiple courtyards, communal meeting rooms, a performing
APPLICATION CASES
6.9 % April 2017 ● www.asmag.com
China posted 6.9% Q1 GDP growth, partly boosted by higher retail sales. Source: China National Bureau of Statistics
14
arts and cultural venue, a library, a restaurant, a museum and hotels. This presented additional challenges for the design of the fire detection system. To provide effective fire detection in this significant space, installers Fire Hut Commercial Equipment specified a range of devices from the Apollo Fire Detectors XP95 and Discovery ranges. In total, over
6,000 devices are linked to fire control panels which communicate via a central monitoring system in the control room of the complex. Commenting on the installation, Anil Vadera, Owner and CEO of Fire Hut Commercial Equipment who executed this project, explains: “We have been associated with Apollo for the last 18 years.
SMART CITY
HIKVISION PANOVU CAMERAS HELP SOUTH KOREA TRACK POLLUTION HOT SPOTS Helping to identify the location of erroneous odors around the Metropolitan City of Deagu in South Korea, Hikvision Digital Technology, a global supplier of innovative video surveillance products and solutions, has supplied PanoVu series 180 degree Panoramic + PTZ cameras to form part of an integrated atmospheric information system. “The Seo-gu Office Atmosphere Monitoring Center is extremely pleased with the high-resolution PanoVu cameras’ picture quality,” says Joey Kim, SI Team for Hikvision Korea. “The atmospheric information system’s pollution monitoring sensors and integrated PanoVu PTZ cameras can define the precise location of triggered events, and automatically track and target the precise location of event actuations.” The Director of the Seo-gu Office said, “The operation of the new atmospheric information system has created a cleaner and more comfortable living environment.”
Oncam Sees APAC as a Dynamic Market The surveillance solutions and business intelligence solution provider Oncam aims to take full advantage of the growing potential of the Asian market. In efforts towards this, the company has appointed new regional directors for APAC and South Asia. BY Prasanth Aby Thomas
S "In total, over 6,000 Apollo devices are linked to fire control panels which communicate via a central monitoring system in the control room."
The India Habitat Center is one of the most prestigious Government building centers to be protected with Apollo Fire Detection and Alarm Systems. This is truly a partnership of pioneers and we look forward to collaborating with Apollo on future projects.”
peaking to asmag.com, Daniel Elvin, Regional Director in APAC, indicated that the company has traditionally been strong in the U.S. and Europe and seen some momentum in India, but are yet to penetrate well into the APAC market. “The markets in Asia are quite different compared to the West and the difference comes in the dynamics,” Elvin said. “It is important to understand, accept and adapt, and by doing that there is a great potential that many brands and even Asian brands as well may take advantage. So that is one core part of how we succeed. We actually understand the market.” The company aims to focus on all the major countries in the region. To start with, Korea and Japan are seen as great markets where the company is seeing some really tangible opportunities in the making. Hong Kong and Macau, the rest of China, and other countries in the region are also seen as priority. “The key strategy is to start looking at ourselves,” Elvin said. “We are now building up a strong team of industry professionals, and also being on board with the partners in the market that share the same passion for Oncam as we do.” Traditionally, Oncam has had a strong presence in some key verticals like transportation and casino and gaming in the region. Going forward, the company aims to capitalize on these strengths, while seeking to enter new verticals. “Looking back at where we have been strong in the region, I can say transportation, we have been very successful, casino and gaming, and government to some extent,” Elvin said. “Looking forward, we will be building on the strengths that we have in the past while growing into markets where we have not been strong before.”
EDUCATION
NEUROTECHNOLOGY NCHECK BIO ATTENDANCE USED BY RED ROSES PUBLIC SCHOOL IN INDIA Red Roses Public School (RRPS), which first opened its doors in 1986, is one of the fastest growing schools in New Delhi, the capital of India. In 2011 the school opened a second branch in Gurgaon, India. Both campuses today offer state-of-the-art facilities, providing a superior learning environment for their students. RRPS also
opened a nursery in 1993. With staff spread across three locations, RRPS faced a number of administrative challenges, including accurately calculating time sheets, managing staff attendance, overseeing
productivity and fully complying with auditing report requirements. The school evaluated several time and attendance systems in the market and ultimately selected NCheck Bio Attendance from Neurotechnology. Within just a few weeks of the system’s installation, RRPS began realizing the benefits: on-time attendance of staff has increased, the overall productivity of the school has been enhanced and, perhaps most importantly, the school has been able to correct several payroll and accounting issues.
15
The Age of the Sharing Economy is Coming:
Can Taiwan’s Security Industry Adapt?
April 2017 ● www.asmag.com
18
In 2016, there were a total of 2,241 public works project tenders in Taiwan, amounting to roughly US$188.8 million. This is up 63 percent from 2015. Based on this data, public works projects seem to be growing steadily. For the security industry this is good news, showing signs of a promising year ahead. However, with the exception of public works projects, the Taiwanese security industry faces difficult times ahead. With the Internet of Things (IoT) and smart technology gaining importance in security, Taiwanese company must find a way to step up their game. In order to turn the market around, companies must look toward interdisciplinary alliances and create added-value for their products to build more opportunities within the security realm.
19
Smart technology |
Cybersecurity
Raises Eyebrows After DDoS Incident
April 2017 ● www.asmag.com
In October last year, a series of coordinated cyberattacks were launched against Dyn, an internet performance management company based in New Hampshire. It was later found out a botnet of Internet of Things (IoT) devices, including printers, baby monitors and IP cameras, were used in the attack. The incident again thrusts the issue of cybersecurity on the center stage, while vendors and users alike are urged to take deeper precautions against these attacks. by William Pao
42
T
he attacks against Dyn took place on October 21, 2016, and resulted in service disruptions across various famous sites including Airbnb, Amazon.com and The Boston Globe. The incident involved a series of distributed denial-ofservice attacks against Dyn, which received requests from some 100,000 IoT devices at data rates of 1.2 Tbps, putting the incident
as the largest of its kind in history, The Guardian reported. The devices were infected with malware called Mirai, which spreads itself from one device to another and enables the attackers to take control of the devices remotely. “Once the malware has identified and accessed the devices, it turns them into bots that can be commanded as part of an army of devices to flood
websites with requests, effectively crippling the server and eventually forcing it to go offline,” said Jeff Hurmuses, VP of APAC at Malwarebytes. This again put the issue of cybersecurity in the spotlight. “A very, very high percentage of the currently deployed devices are completely insecure and can be taken over administratively with a variety of off the shelf hacking products,” said Andrew Lanning, Co-Founder of Integrated Security Technologies. “We all know the weaknesses of physical systems. Interoperability and functionality come way before cybersecurity is evaluated, and security is a common afterthought,” said Darnell Washington, President and CEO of SecureXperts. “The use of default passwords and legacy PLC boards with hardcoded keys cause overall weakness where one small flaw leaves complete exposure to otherwise secure systems.”
Common Vulnerabilities According to experts, there are certain vulnerabilities that, if not taken care of properly, can put connected devices at high risk. Hardening their devices against cyberthreats, therefore, has
Salvatore D’Agostino, CEO, IDmachines
Jeff Hurmuses, VP, APAC, Malwarebytes
become critical for vendors.
Default Usernames and Passwords One of the major security vulnerabilities of networked devices is the default username-password combination that either can be easily guessed or has been made public on the internet. “Exploiting this vulnerability, Mirai was able to gain control of these devices. What the malware did was scan the internet for devices that were still ’factory’ set, which meant they were still using default username and password combinations,” Hurmuses said. Other default settings, for example leaving certain service ports like Telnet open, can also create problems. “While most of the attention has focused on default user names and passwords, default configuration typically uses insecure protocols and leaves open services. This can cause information to be sent in the clear, often exposing proprietary or personally identifiable information (PII) and also enable access to a command
Andrew Lanning, Co-Founder, Integrated Security Technologies
line via services such as Telnet. The default configuration also allow a means of injecting malware into a device,” said Salvatore D’Agostino, CEO of IDmachines. Vendors therefore are responsible to ensure their device software has strong security with a difficult username and password. Requiring the user to change the default username and password is also a must. Further, some even outright recommend the use of multifactor authentication to add extra layers of security. “With today’s computational power of tools used to crack passwords, and the addition of the use of Rainbow tables, we need to move completely away from the use of username/passwords in favor of multifactor authentication, biometrics and smart cards,” Washington said. “Vendors can even consider implementing two-factor authentication, be it from tokens, apps or RFID cards to verify user’s identity instead of simply entering a username and password to log in,”
Darnell Washington, President and CEO, SecureXperts
Hurmuses said.
Encryption Usernames, passwords and other information stored in devices should also be encrypted, and experts advise against proprietary algorithms
that are not vetted. “Using proprietary cryptography — ’our patented high security technology’ — is a widespread problem. Many standards have sections called ’security considerations’ that often are overlooked,” D’Agostino said.
Poor encryption of key information stored in a device is also a vulnerability that needs to be addressed. Experts advise against proprietary, unvetted algorithms and suggest industry-approved ones.
43
Enterprise Identity and Access Management Made Easy With PIAM
Keeping track of each and every person within an enterprise environment can be quite a task. Couple that with managing their access and the task becomes all the more complicated. Utilizing a physical identity and access management (PIAM) system could not only help enterprises ease management, but also protect them from avoidable risks. BY Eifeh Strom, Freelancer
dentity management in enterprise environments is an integral part of both physical and data access. However, identity and access management is complex and can be complicated. Physical identity and access management (PIAM) systems could help ease these complexities. A PIAM system centralizes an enterprise’s ability to manage the lifecycle of identities by processing physical identification, authentication and access management. By 2022, the global PIAM market is expected to reach US$861.5 million, at CAGR of 15.7 percent from 2016 to 2022, according to market research company Global Information. Drivers for growth include increased security and operations management concerns, compliance mandates and technology development. “Most organizations today rely on
the corporate security department to manage policies on how much physical access to facilities zones and assets should be granted to each identity. Separately, the IT department manages access to the information systems. Regardless of the diligence of these departments, changes to the status of individuals is rarely correlated on a timely basis between the IT and physical security data silos,” said Jasvir Gill, CEO of AlertEnterprise. “Full-time employees may leave the company, change jobs or move to new locations. Contractors may become permanent employees, complete their projects or be replaced. There is seldom an integrated and up-to-date profile on how much access has been granted and what happens when an individual’s status, class or category changes.” Now, more than ever, enterprises are
needing to fill those gaps. That’s where a PIAM system can help.
Challenges Enterprises are required to open up more of their business processes to external stakeholders as a result of today’s instant economy. This means that everyone from employees to contractors to vendors, partners, service providers and visitors all need access to particular assets, facilities and resources. However, this raises the question, how much access is too much? Not only that, but what kind of risk does this put the company in? Don Campbell, VP of Products at Quantum Secure pointed to the inefficiency and ineffectiveness of manual identity management processes as a major challenge for enterprise customers. “ Whether it is managing visitors, employees or contractors, manual
45
Don Campbell, VP, Products, Quantum Secure
Jasvir Gill, CEO, AlertEnterprise
April 2017 ● www.asmag.com
processes are slow, error-prone and costly. Customers stand to gain significant ROI by automating these processes to improve accuracy, speed up many of the process steps and collect valuable data that can be used to gain further cost savings and operational improvements,” he said. Even with the majority of today’s key business processes being automated, there are still challenges. “IT manages the underlying applications for these processes. Security practices relating to application and database access and authorization are tracked by IT security personnel; however, this track ing is rarely coordinated with physical security personnel who are tasked with protecting the facilities and physical assets and who are responsible for managing building access,” Gill said. “Further, there is often a lag before status changes noted in HR systems are reflected in IT and physical security systems. Herein lies vulnerability.” Another major challenge is the number of systems from different vendors the enterprises are deploying. These systems are then oftentimes managed by different departments, such as IT, corporate security and operations, resulting in a lack of interoperability. “These systems have been established over time to efficiently perform the tasks for which they are responsible. While each function may perform their own prescribed set of tasks very well, the systems may not be designed to interact with each other, particularly with regard
46
Divyakant Gupta, CEO, IDCube
to how much access and authorization to give a particular employee or contractor,” Gill explained. “ The most effective mechanism for managing these decisions is an integrated individual profile from which responsible managers can holistically determine the combined level of risk inherent in each employee’s assigned access and authorization levels.”
Wanted: Flexibility, sCalability, adaptability Overcoming the challenges presented by enterprise environments means choosing the right PIAM system. This starts with choosing the right system provider. “Enterprise customers want to know that the PIAM system provider has a very complete understanding of the differing workflows for onboarding various identity types, how those workflows can be supported in an efficient, customized way, and the implications of workflow decisions on operations,” Campbell said. Experienced providers understand that enterprise environments need flexible, scalable systems that makes use of the full range of available identity data and possible workflows. Such a system could become the central source of identity data when it comes to onboarding and offboarding, according to Campbell, and should have the ability to tie into the full range of relevant data systems, including PACS, IT, HR and training, for example. “Having the flexibility to connect to the relevant systems and support the
Magnus Malmström, VP, Product, Nexus Group
appropriate workflows is a high priority for enterprise customers,” Campbell said. Magnus Malmström, VP of Product at identity and security company Nexus Group highlighted how “a good PIAM solution must be adaptable to new processes and changes in an organization and preferably through visualization in terms of process mapping and workflows.” He noted that when implemented correctly, it is possible to keep traceability for all actions in regards to authorization and access management. Scalability is also a priority for enterprise users. “Many enterprise customers prefer to roll out systems across their organizations or locations in steps. This approach works well because it allows time for training, testing and operational adjustments with a smaller support team and lower overall risk,” Campbell explained. He further added that larger enterprise customers are likely to grow or acquire additional teams, so choosing a system that can grow as the organization grows is vitally important.
Differences Among Verticals It is safe to assume that all users want flexible and scalable systems; however, when it comes to other requirements, different verticals have different needs. These differences are often a result of regulatory requirements and business model. Divyakant Gupta, CEO of IDCube noted specific requirements for several different vertical markets: “For example, for oil and
Enhancing Surveillance Storage for the Future The rise of large trends such as urbanization and smart city initiatives has spurred the need for business intelligence and video analytics. These, together with technology trends like the increased adoption of HD and 4K, Big Data, artificial intelligence and deep learning, industrial automation, etc. are the factors driving the expansion of surveillance systems. BY the a&s Editorial Team
April 2017 ● www.asmag.com
C.N. Chu, Sales Engineer, Seagate Technology
52
Surveillance Storage on a Growth Path
Storage is an essential part in every surveillance project, yet it does not have the halo of cameras or VMS systems. According to IHS Markit market research, 98 million network cameras will ship out in 2017, all of which would require the right storage solution. ncreasing retention requirements can drive the price of storage up as high as 30 percent of the total project cost. Due to the nature of security systems, reliability is of utmost importance. A hard drive failure can render the whole system useless if there is no place to store video footage or retrieve it. Systems integrators must therefore reach a practical balance between cost and reliability. a&s had a chance to sit down with C.N. Chu, Sales Engineer at Seagate Technology, to discuss the future of storage for surveillance systems. “When I discuss how the future of surveillance landscape will look, I like to use the Jason Bourne movies as an example, if you want to understand contemporary surveillance, watch Jason Bourne,” said Chu. Even though in many aspects, the technology described in these movies is still science fiction, the presence of security systems and their impact on our every-day security and storage requirements is already here. “People now joke that it’s not easy to be a thief today. License plate recognition software
(LPR) can track cars and their routes; facial recognition and analytics open up the possibility of tracking illegal activities, increasing the efficiency of police work. Analytics is becoming more sophisticated, computers need to run faster and the number of cameras are increasing exponentially. As a result, there is a need for more data storage capacity,” he added.
Surveillance verSuS Pc Hard driveS All the major vendors are rolling out dedicated surveillance drives which support surveillance DVRs (SDVRs), network video recorders (NVRs) and centralized or cloud surveillance for video data analytics. Chu pointed to several main reasons which justify having all these different products specifically for surveillance. “The hard drives used in surveillance differ from the hard drives used in regular PCs. PCs need to balance workloads, both reading and writing of data. However, in a surveillance system, the hard drive’s work load is 90 percent write and 10 percent read since the surveillance systems need to record all the time, while playback is sporadic. PC hard drives are not meant to run 24/7, they are not meant to be used in a multiple-drive environment where temperatures and vibration are concerns, and they are not tuned for multiple video streams at the same time,” said Chu. “On the other hand, dedicated surveillance drives support three times the workload of standard desktop drives, are built to be NVR-ready (i.e., they can work with multiple hard drives), have lower power consumption to avoid overheating in a multiple-drive environment, and are ruggedized to perform reliably also in non-climate controlled environments,” explained Chu. “In our surveillance line we also added special firmware optimized to support up to 64 HD
cameras without losing frames.” An additional differentiator between a dedicated surveillance drive and a regular hard drive is the presence of a rotational vibration sensors. Hard drives which are designed to run continuously (24 hours a day, 365 days a year) generate extra heat and vibration compared to “regular” hard drives. When there are several drives packed together (like in an NVR), their vibration can disrupt the proper operation of the drive and lower performance. If there is any other source of vibration, like cooling fans, the performance deteriorates even further. Vibration can shake the drive head off its intended path causing data corruption or making the drive temporarily unavailable. The disrupted drive must then wait for its head to move back into position before resuming normal operation. “One of the things we implemented to solve this problem is providing more rotational vibration sensors in all high capacity hard drives as we see surveillance systems take on more hard drives and vibration becomes a serious issue. For systems that have more than 16 hard drives, we recommend the use of enterprise-grade hard drives for better reliability,” said Chu. The rotational vibration sensors allow the drive to compensate and balance the drive when it senses vibration anomalies and can adjust the drive head as needed.
Future Storage trend Looking into the future, Chu sees growth potential in solutions for surveillance systems. “We see a growing interest in specific vertical surveillance projects that uses 2.5-inch drives. HDDs are a more viable option than SSD as HDD is more cost-effective and has a larger capacity, which are important when vast amounts of surveillance footage need to be stored for compliance and regulatory or data analytics purposes. We are continuing the development of larger capacity, more robust performance and NVR-ready features to offer customers the best way to manage their data and maximize the value of what they have.”
53
SMAhome
HomeKit Compatible Products that Deserve Market Attention D-Link Omna 180 Cam HD The first HomeKit-enabled security camera lets users to be “always home” and includes security features with end-to-end encryption and authentication between the camera and an iPhone or iPad. When activity is detected by the camera, users will receive a notification on their phone’s lock screen, delivered via the Apple Home app, showing a live feed from the camera. Users can also access their Omna remotely to see what’s happening in their home in real time. If the user has other devices connected to HomeKit, the Omna will allow the user to do things like turn on the lights when motion is detected.
C by GE (C-Life/C-Sleep) These bulbs are made to be fully controllable with the app and make life more comfortable. The Connected LED light bulbs go together like day and night, and make it simple to get light that feels good. Users will get all levels of brightness from the C-Life bulb, including optimal daytime light which is clear and clean. C-Sleep, on the other hand, syncs with user sleep cycle (three settings for nighttime, morning and in between) with automatic transition that goes between calm light in the evening and vibrant light in the morning. No hubs are required, and users may control the
The Omna 180 Cam HD features a 1080p camera with a 180-degree field of view, night vision, two-way audio, and an SD card slot. The built-in microphone and speaker allow for two-way audio, so users can still make their presence known when they are not at home. The infrared night vision allows viewing up to 16 feet in complete darkness. Local recording allows video clip storage on a microSDXC card.
Bluetooth-enabled device with their smartphones. Dim or brighten and group multiple bulbs for every use scenario. The bulbs can last as long as 20 years (based on three hours per day usage) The app allows users to create custom scenes for different activities, such as watching movies and doing homework. The lighting can be set up in such a way that it automatically turns on once users step through the front door. Users can also control the lights from anywhere at home.
Legrand Celiane with Netatmo
April 2017 ● www.asmag.com
Legrand and Netatmo are working together to offer the first in-wall smart switch and power outlet solution. The device let users give Siri voice commands to manage lights and various home appliances. With just one tap of the “leave home” button on the master switch of the app, users can turn off all the lights, selected home appliances and close all rolling shutters when they leave home. The app also allows users to control lights and appliances, receive notifications and monitor real-time and overall power consumption. The solution encompasses wireless remote switches, which can be placed wherever users like. They can be detached from the wall and repositioned easily.
56
Birdi Smart Detector The device is able to detect smoke and carbon monoxide, and measures air quality. The smoke sensor was redesigned from the ground up to excel in detecting both fast-burning and smoldering fires, while minimizing false alarms. Users may silence the smoke alarm straight from the phone. Instead of climbing on a chair or frantically waving a dishtowel, they need to simply say “quiet” or use the Birdi app. In a real fire, users are connected to get the help they need. Carbon monoxide is a silent killer. The Birdi system will alert users, their loved ones and the authorities in an emergency. Users will also be notified when low levels of carbon monoxide are detected to minimize danger to those most at risk: children and the elderly. Birdi also helps track the health of the home, whether it’s dust, VOCs, temperature and humidity or how stale the air is. It also tracks outdoor
Honeywell Lyric Controller The Honeywell Lyric Controller serves as the central hub for security and lifestyle management including lights, locks, thermostats and more — all controlled wirelessly from a dynamic, 7-inch display or remotely on smart devices. Lyric is Wi-Fi enabled, features easy installation and is designed for the way consumers really live — delivering a great connected home experience right out of the box. The feature-rich platform lets users easily add smart home technology to installations of any size. End-user replaceable GSM or CDMA cellular options are available — reducing
Heatmiser neoHub (2nd generation) The Heatmiser neoHub is the gateway to the Neo System, providing remote control of heating at home from anywhere. The key aspect of the neoHub is that no special computer knowledge is required. Simply plug into your router, connect to your Neo account on your Android or iOS device and take control of your heating and hot water from anywhere. The neoHub handles all of the network communication between the neoStat, neoAir and neoPlug and is very much the brain of the Neo System. Users will need the device if they’re looking to control their heating and hot water system with their smartphones. Having paired all the Neo devices (up to 32 are supported), users will have both in-home and remote access of heating, hot water and home
dangers like pollution, pollen and particulates. Birdi provides weather tips by using advanced technology to predict when it will rain or snow — down to the minute — at the exact location. Coupled with unique environment sensing, the device protects users against pollen spikes, allergen outbreaks, harsh UV and more.
the need for truck rolls. The Lyric Controller supports Honeywell SiX two-way and 5800 Series wireless sensors, giving users the flexibility to meet any installation requirement. It’s easier to maintain. Programming and remote management can be done via AlarmNet 360 for easy maintenance and faster, more efficient installs. On-board Wi-Fi and Z-Wave provide maximum flexibility — letting users reach more consumers and offer solutions that grow with their changing needs. When enabled, SiX devices are locked into the Lyric panel and must be unpaired by the installing dealer to be used again — protecting the accounts and hardware users have enrolled.
appliances. To ensure neoHub is always up to date, the device will automatically download and install updates so users can benefit from the latest software enhancements. The Heatmiser neoHub handles all of the network traffic, automatically routing data the best way from neoStat to neoStat. Mesh Networking helps ensure good coverage throughout the home. For troublesome signal areas, the neoPlug can be used to boost the signal.
57
CEM Systems S700e Multi-Technology Intelligent IP Reader
Paxton Net2 Entry Touch Panel Features:
• 7 -inch color touch screen • Advanced sound processing provides clear sound quality for busy areas • Convenience with code and PIN entry options available • Multi-panel options – rain hood, flush and surface mount • Dual frequency proximity reader, now offering EM and HID Prox as well as Paxton and MIFARE • Energy efficient – auto screen dimming in idle mode ■Paxton/U.K. ■Email: support@paxton.co.uk
Features:
Vicon Industries Surveyor MKII HD PTZ Camera Dome
Features:
• • • • •
D 1080p resolution at 30 images per second H Integrated camera module with 30X optical zoom WDR day/night camera; low light capability Electronic image stabilization (EIS) Triple encoding generates simultaneous H.264 (2) and M-JPEG video streams • High-speed 360° continuous pan ■Vicon Industries/U.S. ■Email: sales@vicon-security.com
• D esigned for use as part of the CEM Systems AC2000 access control software range • Contactless card presentation with the option to enable Personnel Identification Number (PIN) for two-stage authentication • Integral reading support for 13.56 MHz smartcard and 125 kHz proximity technology • Secure transfer of DESFire and AES encryption keysets • 10/100 Mbps Ethernet host connection • Two changeover relay outputs to activate door strike or other equipment ■ CEM Systems (Part of Tyco Security Products)/U.K. ■Email: cem.info@tycoint.com
Matrix SATATYA SAMAS Centralized Video Management Software Features: • • • • • •
S upports up to 1,00,000 cameras and 10,000 video recorders No public IP required for centralized connectivity Edge recording for central notification of events, even when data is stored locally Camera-wise recording retention can help define storage retention days based on importance Intelligent video analytics like people counting, face detection, missing object, etc. Real-time centralized health status notification for any system issues like camera disconnect, hard-disk failure, camera tamper, etc.
Hikvision Digital Technology Blazer Pro VMS Server Features:
April 2017 ● www.asmag.com
• C apable of handling up to 128 or 256 channels • Performs optional functionality such as ANPR, business intelligence and people counting • Flexible user management – prioritizes access for management and personnel to ensure that staff members can be allocated an appropriate system access authority • Connects previously separated NVR/DVR sites together with centralized management • Alarm management interface displays real-time performance and alarm notification ■Hikvision Digital Technology/China ■Email: overseasbusiness@hikvision.com
■Matrix Cosmec/India ■Email: More@MatrixComSec.com
Fermax VEO-XS Monitor Features:
• 4 .3-inch wide-screen color video door entry system • Avoids the need for a handset and allows for simple, intuitive hands-free communication • OSD menu and the button layout allow for access to any of the functions using just a finger • Auto-start of outdoor panel camera • DUOX technology ■Fermax/Spain ■Email: export@fermax.com
Louroe Electronics AOP530 Speaker Microphone Features:
• F or IP camera • Built-in microphone and a 2-inch speaker for bi-directional audio • Full-duplex communication with DSP technology • Dry contact blue illuminated pushbutton • Vandal-resistant, stainless steel faceplate that fits into a 3 gang electrical box ■Louroe Electronics/U.S. ■Email: Sales@louroe.com
60
Connection Technology Systems iCPE With iBAT Gateway
ZKTeco SBTL3000 Series Turnstile
Features:
• S US304 stainless steel casework ensure long-lasting durability • Barriers swing automatically during emergencies • SBTL3000 series ships already integrated with customers’ preference for either card or fingerprint access control reader, reducing installation time and expense • LCD display screen shows current running status, easy operation • Ergonomic design makes card and fingerprint authentication fast and simple ■ZKTeco/U.S. ■Email: sales@zkaccess.com
• O ptional external battery for additional operational security • Fully certified Z-Wave Plus functionality • Managed layer 2, two future-proof external USB • Internal USB port (3G/4G Backup) • Open middleware/SDK • MQTT protocol support ■Connection Technology Systems/Taiwan ■Email: info@ctsystem.com
Features:
Dahua Technology 2-Wire Apartment Video Intercom System Features:
• V TNS1006A-2 switch and the VTH5222CH indoor unit use a two-wire interface; switch is connected to the indoor unit using any two wires for signal transmission and power • Retains Dahua’s regular IP apartment system functions and satisfies large apartments requirements • Calls can be answered anywhere in the household • Indoor monitors can monitor IPC in real time; connects with wired alarm and detection devices to implement 24 hours protection • Smart PSS management ■Dahua Technology/China ■Email: overseas@dahuatech.com
Honeywell Pro-Watch 4.3 Security Management Suite Features:
• C ombines access control, video surveillance, intrusion detection and other business critical functions into one intelligent business management system • Ideal for a wide range of companies including banking, finance and office buildings • Capable of accommodating more than a million card holders and more than 10,000 doors • Features a new application program interface (API) that allows integration with other operational services • Optimized for mobile control, allowing site security staff to manage time-sensitive access rights from any location ■Honeywell Security & Fire/U.S. ■Email: comments.security@honeywell.com
FLIR PTU-5 Compact Pan/Tilt Unit
Grundig GCI-R1667F 12 MP Fisheye Vandalproof Dome IP Camera with IR LED
• C lass-leading speed and accuracy • Turns on and tracks moving targets in seconds • Extra small, rugged, portable design • Lightweight, MIL-spec system for harsh environments • Easy integration • Flexibility for a wide range of applications and sensors ■FLIR Systems/U.S. ■Email: visiblesales@flir.com
• 1 2-MP CMOS, color/B&W camera • 60° field of view • Rugged anti-vandal body made of die-cast aluminum with polycarbonate lower dome for outdoor applications • Built-in de-warping function • 0 Lux: integrated LED IR Illuminator to see even in total darkness • SDHC memory card slot for alarm and scheduled image recording
Features:
Features:
■Grundig/Germany ■Email: info@grundig-security.com
Hundure Technology HTA-502PEF-N Fingerprint Time & Attendance Recorder Features:
• S upports 1,500 users with 2 fingerprint templates for each person • Provides 3,000 cardholders and 100,000 events • Built-in USB-host interface to import/export data through USB flash drive • Built-in USB-slave interface for connecting PC to upload/ download • Various interfaces TCP/IP, PoE or Wi-Fi are available • The device ACU-30 (with 2 relays) is optional for connecting an external lock and siren ■Hundure Technology/Taiwan ■Email: overseas@hundure.com
61
Show Calendar
Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.
WORLD SECURITY EXHIBITION DIRECTORY MAY
IFSEC PHILIPPINES
• Date: 2017/05/03–05/05 • Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines • Tel: +44-7966-222-505 • Email: agnius.kazlauskas@ubm.com • URL: www.ifsec-global.com/philippines/
EXPOSEC
• Date: 2017/05/23–05/25 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: info@fieramilano.com.br • URL: www.exposec.tmp.br
SECUREX
• Date: 2017/05/30–06/01 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: leighm@specialised.com • URL: www.securex.co.za
JUNE
GUANGZHOU ELECTRICAL BUILDING TECHNOLOGY
• Date: 2017/06/09—06/12 • Venue: China Import and Export Fair Compex, Guangzhou, China • Tel: +852-2238-9917
AUGUST
• Email: building@china.messefrankfurt. com SECUTECH VIETNAM • URL: www.building.messefrankfurt.com.cn • Date: 2017/08/16—08/18 • Venue: Saigon Exhibition & Convention Center (SECC), Ho Chi Minh City, IFSEC INTERNATIONAL • Date: 2017/06/20—06/22 Vietnam • Venue: ExCel London, London, U.K. • Tel: +886-2-8729-1016 • Tel: +44-20-7921-8231 • Email: stvn@newera.messefrankfurt.com • Email: ifseccustomerservice@ubm. • URL: www.secutechvietnam.com com • URL: www.ifsec.co.uk
SEPTEMBER JULY
(ISC)2 SECURITY CONGRESS APAC
• Date: 2017/07/03—07/04 • Venue: Sheraton Hotel, Hong Kong, China • Tel: +852-2850-6957 • Email: securitycongressapac@isc2.org • URL: apaccongress.isc2.org
IFA
• Date: 2017/09/01—09/06 • Venue: Berlin ExpoCenter City Exhibition Ground, Berlin, Germany • Tel: +49-30-3069-6924 • Email: ifa@messe-berlin.de • URL: www.ifa-berlin.de/en/
SHANGHAI INTELLIGENT BUILDING TECHNOLOGY
IFSEC SOUTHEAST ASIA
• Date: 2017/09/06—09/08 • Venue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia • Tel: +6-03-2176-8788 • Email: tj.tan@ubm.com • URL: www.ifsec.events/sea
ISAF ISTANBUL
• Date: 2017/09/14—09/17 • Venue: Istanbul Expo Center (iFM), Istanbul, Turkey • Tel: +90-212-503-32-32 • Email: marmara@marmarafuar.com.tr • URL: http://www.isaffuari.com/en/
SMART SUMMIT LONDON
• Date: 2017/09/19—09/20 • Venue: Business Design Centre, London, U.K. • Tel: +44-330-3353900 • Email: hello@nexusmediacom.com • URL: http://www.iotsmartsummitlondon. com/
• Date: 2017/09/05—09/07 • Venue: Shanghai New International Expo Centre (SNIEC), Shanghai, China ASIS • Date: 2017/07/26—07/28 • Tel: +852-2238-9917 • Date: 2017/09/25—09/28 • Venue: International Convention Centre • Email: building@china.messefrankfurt. • Venue: Kay Bailey Hutchison Sydney, Darling Harbour, Australia com Convention Center, Dallas, U.S.A. • Tel: +61-3-9261-4660 • URL: www.building.messefrankfurt.com.cn • Tel: +1-703-519-6200 • Email: aphillips@divcom.net.au • Email: asis@asisonline.org • URL: www.securityexpo.com.au • URL: https://securityexpo.asisonline. org/
SECURITY EXHIBITION & CONFERENCE
CompanieS in ThiS iSSue COVER STORY
NEWS FEATURE
VIEWPOINT
SMART TECHNOLOGY
• Merit LILIN
• Ademco Security Group • Apollo Fire Detectors • Oncam • Qognify
• Schneider Electric • Seagate Technology
• IDmachines • Integrated Security Technologies • Malwarebytes • SecureXperts
PRODUCTS OF THE MONTH
April 2017 ● www.asmag.com
• Fujitsu • ievo • Innovatrics • Iris ID • Safran Identity & Security • Suprema • Zwipe
PRODUCT EXPLORATION • AlertEnterprise • IDCube • Nexus Group • Quantum Secure
VERTICAL SOLUTION
IoT
• Analogic • Axis Communications • Clear Flight Solutions • Digital Barriers • Genetec • Honeywell Security & Fire • RIMOWA Electronic Tag • SITA Lab
• Acer • Dahua Technology • Genetec • Happiest Minds Technologies • Hikvision Digital Technology • Nedap Identification Systems • Smart Parking Technology • Streetline
58
MARKET DYNAMICS • Hwacom Systems • Koangyow Integration Machine • Merit LILIN
nexT iSSue Market Dynamics | India Vertical Solution | Retail Product Exploration | Multi-Site Management & Monitoring
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
3, 5
DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
INSIDE BACK COVER
GENETEC
SOFTWARE
CANADA
info@genetec.com
40, 41, BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
2
MEERE COMPANY INC.
CAMERA
KOREA
sales@cube-eye.co.kr
FRONT COVER,12,13
MERIT LILIN ENT CO., LTD.
IP CAMERA / NVR
TAIWAN
sale@meritlilin.com.tw
FRONT COVER BARN DOOR
QUANTUM CORPORATION
STORAGE
SINGAPORE
-
INSIDE FRONT COVER
SEAGATE TECHNOLOGY LLC
STORAGE
SINGAPORE
apj.sales.enquiry@seagate.com
63
SHENZHEN COMMANDER TECHNOLOGY CO., LTD.
CASING
CHINA
sjw@yjdcase.com
1
VIDEOTEC S.P.A.
IP CAMERA / SOFTWARE / VIDEOSERVER
ITALY
info@videotec.com
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
63