A&S #125 June 2016

Page 1


CONTENTS coVer Story

VIVOTEK.Places. Value.on.Ecosystem Partnerships.............................26 Viewpoint

IP.Security.Systems:.Stepping Stones for. Cyberattacks............................................. 28 Special Feature

Challenges.Lie.Ahead.for.Taiwan Security...................................................... 41

product exploration

Video Solutions for Small and Medium Businesses –.New.Opportunities.for. Systems.Integrators.................................... 46 induStry report

Defining.New.Systems Integrators.in.a. More.Connected.World............................... 52 Value-Added.Distribution.in.a. Competitive Business Landscape........ 58

June 2016 www.asmag.com

Market DynaMics

Indian Security Market. Chugs On P..32 Indian Biometrics Market Advances on Public and Private Support P. 37

P. 28

P. 52

Vertical Solution

Terrorism.Concerns. Call.for.Better Hotel Security......................64 Asia.at.a.Glance:. Infographics.of.Hotels. ....................................68

JUNE 2016 ● www.asmag.com

SMahoMe

Traditional.Security, Smart Home.and. Barriers.to.Adoption.................................... 70 Contents...................................................14 Editor’s.Note............................................16 Application.Cases....................................18

14

Products.of.the.Month.............................20 News.Features........................................22 Show.Review...........................................72

Show.Calendar........................................74 Companies.in.This.Issue.........................75 New.Products..........................................76


Recent M&As Forecast the Future for the Internet of “Security“ Things

a&s Asia, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the regional electronic security industry. It caters to importers, distributors, OEM/ODM searchers, systems integrators and other product purchasers on product sources and identifies developments in video surveillance, access control, biometrics, intrusion alarm, intercom/video doorphone, home automation, and other fields relevant to electronic security.

JUNE 2016 ● www.asmag.com

uring the end of Q2 2016, several major M&As in the security industry have again attracted global attention. The most significant one would be Hikvision making its first overseas acquisition of Pyronix, a leading U.K.-based intrusion a l a r m m a n u f a c t u r e r . N o w, Hikvision’s company logo has been added to the Pyronix logo. On the other hand, Axis continued its acquisition of specialized technology companies — 2N, a Czech IP intercom company and Cognimatics, a Swedish video a n a l y t i c s c o m p a n y f o r re t a i l . These acquisitions symbolized the increasing demand for integrated systems and vertical-specific solutions for security and beyond. Most importantly, they are also gearing up for the upcoming era of the Internet of “Security” Things. In recent years, the security supply chain, ranging from manufacturers and distributors to systems integrators and installers, was often faced with the same problems — reducing profit margins caused by the “siliconization” of video surveillance products and price competition from Chinese products. Now, even major Chinese companies are also facing the same problems. Many top executives from leading security

companies can be quoted as saying something similar to the sentiment that “The old good times for traditional security ‘CCTV’ industry has come to an end; now in order to stay profitable, all the companies should prepare well for the Internet of ‘Security’ Things and further embrace opportunities from the Internet of ‘Everything’ — IoE.” Hikvision has already started on its plans in China. In its latest announcement, the company stated that turning all unstructured security data into meaningful data, accompanied with advanced cloud computing technology, can create multiple new applications for security systems. The company then branded it as “Security Data Te c h n o l o g y ” ( S D T ) , w h i c h i s now promoted as the focus of the company in 2016 and the coming years. In addition to security, Hikvision has gotten involved in Industry 4.0 by releasing its own industrial cameras, service robots and drones in China. Meanwhile, Huawei has been joining safe city and then smart city projects. Their recent partnership with Tyco in China can be regarded as its first step toward security. In the Internet of “Security” Things, there are new demands that have yet to be fulfilled by current technologies and this have been testing the creativity of security companies.

jill.lai@newera.messefrankfurt.com 16

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

General Press Jill Lai Alf Chang William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin

Editor-in-Chief Senior Consultant Reporter Reporter Reporter Editor

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com tzuyin.chien@newera.messefrankfurt.com

Officer

michelle.shih@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Tzu-Yin Chien Circulation

Michelle Shih

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Manager

willy.wang@newera.messefrankfurt.com

Event Manager Project Manager Project Manager

peggy.wu@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com

asmag.com

Willy Wang Secutech

Peggy Wu Eva Tsai Jason Cheng

International Advertising [Headquarters]

Fion Tsai Nori Chang Audrey Fang

Sales Manager Coordinator Coordinator

fion.tsai@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Osman Kanatli Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana

U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No. 288, Sec. 6, Civic Boulevard, Xinyi District, Taipei 110, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, web sites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices


ApplicAtion cAses ApplicAtion cAses a&s presents snapshots of security cases from across Asia to provide up-to-date information on how products and solutions are being employed in different industries.

>> Education

TESA Access Control For Australian School

JUNE 2016 ● www.asmag.com

When one of Australia’s most prestigious schools, Brisbane Boys College, needed to upgrade to 21st-century security, it turned to a wireless SMARTair access control system from TESA. SMARTair is a self-contained access control system that met the needs of this institution. The system also allowed the security managers to easily extend or replace a building’s mechanical key system when needed. Because it works wirelessly, installation is quick and easy, requiring no complex, expensive cabling. In the past, the college relied on a traditional master-key system, but lost keys often resulted in time-consuming and expensive efforts to change compromised locks. Now, the doors were fitted with new SMARTair battery-powered electronic escutcheons and wall readers. Nearly 100 doors in the school’s new annex are now protected by electronic escutcheons and wall readers which the staff and students open with programmable smart cards. System installation was quick and caused minimal disruption to building aesthetics and everyday school life. Lost keys no longer pose a security risk as they can be revoked with the click of a mouse. SMARTair is also flexible enough to expand as needed. In fact, work has already begun on the gradual replacement of mechanical keys across the entire campus.

>> Public Safety

NEC Trials Flood Simulation in Thailand

NEC, in collaboration with Thailand’s National Disaster Warning Center (NDWC), has conducted a trial of its

18

flood simulation system to predict the inundation areas in the event of floods. The trial was conducted in Uttaradit Province in Northern Thailand during the period from November 2015 to March 2016 and has confirmed the effectiveness of the system. The flood simulation system is one of the modules of NEC’s “integrated risk management system.” The system consists of a shared platform that features functions such as data integration, visualization and early warning, and disaster modules specialized for particular disasters such as flooding, landslides and earthquakes. The disaster modules or functions can be selected individually as required, or several disaster modules can be combined in order to predict multiple disasters simultaneously. Furthermore, the system can perform detailed simulations using a triangular mesh measuring 50 meters on each side and provide hourly-basis prediction for a period of up to seven days in advance. This allows NDWC to issue warnings to threatened areas before the flooding occurs, helping to reduce potential damage. Moreover, even during periods when no disaster was forecasted, areas at risk of flooding can be identified by performing simulations using previous rainfall data, which enables hazard maps to be prepared.

contract completed at the end of last year. The new contract is expected to be completed by September 30, 2016 and includes the purchase and installation of 500 ZEE cameras to be placed at more construction sites throughout the city. This is in addition to the initial purchase of 460 ZEE cameras. Last year, Sentir was implemented to comply with the new policy instituted by the Taipei City government which requires construction companies to have publicly-accessible cameras for live video at every government-funded construction site. These construction sites utilize Chunghwa’s cellular data network for ZEE camera connectivity. Not only can wireless ZEE cameras be used for site monitoring, they may also be used as a temporary or permanent surveillance solution where there is no fixed Internet connectivity. The portability and wireless feature of the ZEE plug and play cameras, which utilizes cellular routers and battery packs, are ideal for oil and gas well sites, law enforcement, border patrol and other similar applications.

>> Law Enforcement

Thai Police Use GKB Diplomat for Monitoring >> Transportation

Iveda Wins Taipei City Construction Project

Iveda announced that its Taiwan subsidiary, MEGAsys, was awarded a contract by Chunghwa Telecom’s Enterprise Business Group. The award is for approximately US$ 216,000 to once again collaborate on construction projects in Taipei City. This is in addition to the US$1.5 million

The Federation of Saving and Credit Cooperatives of Thailand (FSCT) is registered under the Cooperatives Societies Act on September 1, 1972. It is a financial institute according to the Notification of the Ministry of Finance, dated November 21, 1983. FSCT is the national institute of the savings and credit cooperatives in Thailand. FSCT needed an easy solution that the regional management room can use to monitor different sites using a browserbased central monitoring system. In order to meet their demands, GKB offered


Smart Solutions for Outdoor Large-Scale Projects Solve Major Bandwidth Issues

Editor’s Note:

When real-time monitoring and alerts are required for an outdoor large-scale project, more often than not, project owners experience major bandwidth issues that result in unstable transmission or bad quality footage. Now, a solution has arrived in the form of all-inclusive smart security systems that have an NVR and a camera, all in one place. By using high-end analytics software that only transmits data when needed, bandwidth issues can be easily solved.

auglle edge SurVeillance Solution

A

uglle’s video viewer system runs directly on Auglle IP cameras and stores video directly onboard the camera. Customers can choose to store videos on SD cards, hard drives, solid state drives or to the cloud. With Auglle, there is no need for server-based recording. With built-in Wi-Fi and Ethernet ports or optional cellular modem, live and recorded video can be viewed from any PC, smart phone or smart tablet. Auglle’s inclusive smart analytics work 24/7, monitoring and providing real-time alerts. Alerts are transmitted via SMS, email or video push to any designated personnel. Alerts can be set up to fit user’s designated schedule. Auglle’s built-in power converter allows the camera to be installed in any location that has 205-90VAC, PoE or 12VDC. As an alert-driven system with inclusive onboard storage, Auglle cameras transmit alert messages which require minimal bandwidth. Video is viewed when requested and not constantly streamed back to the server-based storage. Because of these features, Auglle is an ideal surveillance camera solution for large-scale systems.

Supplier: Auglle

URL: www.auglle.com

V5 SyStem Portable Security unit

V

5 System’s Portable Security Unit is a wireless, multi-sensor, portable security solution. This device is an edge computing IIoT platform with advanced onboard analytics, proprietary power management system, onboard storage and communications. It can be configured and installed in a matter of minutes, all packaged in a ruggedized enclosure for easy deployment and/or redeployments in any outdoor environment without the need for trenching and/or permits. The unit allows for video streaming over cellular connection or Wi-Fi and is not limited or tied to fixed power or data cables. V5 devices can be added to extend existing security systems outdoors or be deployed as a standalone solution.

JUNE 2016 ● www.asmag.com

Supplier: V5 Systems

20

URL: www.v5systems.us


news feature

Recent Mergers and Acquisitions: Axis and Hikvision Two major acquisitions have taken place recently as Axis Communications acquired 2N and Hikvision Digital Technology acquired Pyronix. x i s C o m m u n i c a t i o n s ’ a cq u i s i t i o n addressed the growing IP video intercom market and further strengthened Axis’ solution offerings. 2N is a strong player in the field o f IP intercom and also operates in other areas such as IP audio and IP lift intercom. The company has well-established sales channels through electricians and telecom installers as well as lift manufacturers, which can serve as a complement to Axis’ present global sales channels. At the same time, 2N will benefit from Axis’ strong market position and R&D resources. The 2N brand will remain, and the company will operate as a subsidiary within the Axis group. Joint operations will concern knowledge sharing and assisting each other in R&D and market access. An important joint task is to accelerate the convergence from analog systems toward IP intercom and develop new opportunities.

JUNE 2016 ● www.asmag.com

22

The latest acquisitions made by Axis and Hikvision showed how the global companies are re-engineering to provide solutions for their customers.

ikvision Digital Te c h n o l o g y has announced the acquisition of Pyronix, a U.K.-based intrusion alarm security firm. Julie Kenny CBE, DL, founder of Pyronix said: “This acquisition represents a huge opportunity for Pyronix, Rotherham and the region. The foreign direct investment that this will bring to the U.K. will be huge. Hikvision has big plans for the growth of Pyronix and the continued development globally. In the last 15 years, Hikvision has demonstrated what can be achieved in the video surveillance market. With this guidance, Pyronix can achieve great things in the global market place.” Jiang Feng Zhi, recently appointed chairman of Pyronix, commented: “These are exciting times for Pyronix and Hikvision as the two companies work together. Hikvision has plans for significant investment in the U.K. and particularly in its U.K.-based manufacturing, with plans to dramatically expand operations. We are delighted to welcome Pyronix to Hikvision group, and we look forward to growing the business through introduction of intruder alarm products to the global market.” Hikvision plans to apply Pyronix’s expertise and know-how in intrusion detection systems to its leading position in the video surveillance market. The result, says Sebastian Herrera, the Chief Executive Officer of Pyronix, will mark the future of security systems.


How LPWAN Drives Long-Range IoT Applications With the Internet of Things (IoT) picking up steam, many different IoT technologies have emerged, each specifying a particular transmission distance, data rate and power consumption. One of them is the low-power wide area network (LPWAN) technology. BY William Pao

JUNE 2016 ● www.asmag.com

ow-power wide area network (LPWAN) technology, which enables interconnectivity between low-power devices over long distances, has become a popular solution for citywide or even nationwide IoT deployment. One recent example is a partnership between Samsung and SK Telecom on a soon-to-be-launched IoT network throughout South Korea using the LoRa protocol, a form of LPWAN. According to the web portal telecoms.com, Samsung and SK will deploy the dedicated IoT network across the country in the middle of 2016 following an initial Daegu rollout this month, which will serve as an early test bed for determining potential service use cases that can range from cloud platforms and big data analytics for healthcare and medical services to electric vehicle infrastructure for autonomous cars. Also according to telecoms.com, SK Telecom joins Orange and a number of other telecom operators, including Du, Swisscom and KPN, in deploying the LPWAN technology. Dedicated platforms for small devices are leading to the use of a new term called the Internet of Small Things, which Samsung says will be a key facilitator for more business opportunities in Korea if enabled by LPWAN technologies such as the LoRa protocol, telecoms.com reported. The LoRa protocol, or LoRaWAN, was originally developed by Semtech and is now supported by the LoRa Alliance. It uses the 70MHz to 1GHz portion of the radio spectrum, transmitting data from 0.3 to 50 kbps over a distance of up to 40 kilometers. This modulation technique has significant advantages — including lower cost, good penetration of obstacles, greater coverage over longer distances and better battery life — when compared with cellular networks and Wi-Fi. Sensing LoRaWAN’s potential, IBM has developed the long-range signaling and control (LRSC) software

Sensing LoRaWAN’s potential, IBM has developed the long-range signaling and control (LRSC) software to enable smooth and seamless connectivity between devices following the LoRaWAN 1.0 standard.

to enable smooth and seamless connectivity between devices following the LoRaWAN 1.0 standard. A typical LRSC installation comprises a central network server linking hundreds or thousands of radio gateways to dozens of application ro u te r s. I n t h i s way, h u n d re d s o f thousands of LoRaWAN 1.0 end devices, from smoke detectors and temperature sensors to smart electrical heating controllers, can establish a secure bidirectional, low-data-rate connection with corresponding apps, enabling millions of small, IoT-type transactions per day per system installation. Among cities that have deployed smart/ safe city initiatives using LRSC are New York and the Swiss City of St. Gallen. Projects outside smart city initiatives also exist. U.S.-based networking solutions provider Senet, for example, has used the technology to help clients monitor fuel and heating oil usage via a network of sensors attached to customers’ fuel tanks. .

23


WE CARE MORE ABOUT THE COMPLETENESS OF THE ECOSYSTEM AND MAKING SURE EVERYONE IN THIS VALUE CHAIN STAY PROFITABLE.

ast year, 2015, was another rewarding year for VIVOTEK. In that year, the company’s annual revenue reached US$127 million and grew 12.4 percent. This year, VIVOTEK continued to show its success by maintaining double-digit growth each month, from January to May. These achievements have enabled VIVOTEK to stand out from the pack. Owen Chen, Chairman of VIVOTEK, mentioned that this growth proves the effectiveness of current company strategies against commodization and competition in the security industry. Chen explained that the global security industry is currently undergoing many major changes which influence the dynamics of the security business. The “siliconization” of IP cameras and fast price reduction of semiconductors made the product life cycle become much shorter. Taking also into account the fierce competition from low-priced Chinese products, companies worldwide are experiencing this huge pressure in their local market.

Learning from iT To acceLeraTe r&D innovaTions

JUNE 2016 ● www.asmag.com

Due to commodization, Chen emphasized that “Learning from the IT industry is essential in order to remain profitable.” VIVOTEK has optimized its R&D management through enhancing cross-platform integration. This has led to a remarkable increase in productivity and efficiency of its R&D team and largely reduced the unit prices of the company’s products. Some of the latest VIVOTEK innovations show positive results from this re-engineered R&D strategy. VIVOTEK’s Smart Stream II technology, which complements its H.265/HEVC compression technology, successfully reduced both bandwidth and storage consumption to up to 80 percent while still retaining the highest standards of image quality in a camera. Its stereo camera, armed with VIVOTEK’s 3D Depth Technology and video surveillance functionality, provides two-megapixel real-time precise tracking video and high accuracy counting of up to 98 percent. The stereo camera generates data information such as people counting, flow path tracking that can be applied to in-store layout improvements, promotional evaluation, staff planning, and the control of service times, providing retail store owners with key metrics they can use to effectively make operating decisions and increase ROI.

26

Owen Chen, Chairman, VIVOTEK

VIVOTEK PLACES VALUE ON ECOSYSTEM PARTNERSHIPS VIVOTEK’s Chairman, Owen Chen, shared his viewpoint on the current fierce market competition. He also shared how the company was able to overcome these difficulties to continue to grow in the market. He suggested more “partnership” and “cooperation” among companies to stay competitive in today’s connected world. BY Jill Lai


Reliance on PaRtneRshiPs of the ecosystem Another universal trend for security companies to stay competitive and add value is to provide solutions instead of devices. Chen said: “The boundary of security applications has been broken by the Internet of Things (IoT) technologies. The demand for multiple mobile applications, connected homes and cars, and unmanned devices, like drones and robots, is also influencing the development of ‘traditional’ security products and technologies. So thinking out of the box to provide solutions for verticals/applications and also for purposes beyond security is important.” Providing solutions has been a long-term plan for VIVOTEK since five years ago. Chen stressed that leveraging i t s e c o s y s t e m p a r t n e r s’ d o m a i n know-how in certain verticals and applications enabled the company with the ability to quickly develop the right

solutions for its customers. The partners in VIVOTEK’s ecosystem are mostly third-party software and hardware companies like VMS and systems integrators. “We care more about the completeness of our ecosystem and making sure everyone in this value chain stay profitable,” he said. Recently, VIVOTEK just announced strategic partnerships with several companies: with Genetec to deliver a new cloud-based video-surveillance-asa-service (VSaaS) solution, Stratocast for SMB customers, and two partnerships, with Videonetics and Neural Labs, for license plate recognition. Chen further concluded: “In the connected world of the future, it will be impossible for a company to provide all the technologies or solutions on its own. Hence, it is important for us to rely on the partnerships in this ecosystem, which will be the optimal value for our company.” In addition, VIVOTEK now has a complete end-to-end system for video surveillance, which comprises IP cameras and NVRs accompanied with CMS. With multiple field trials in different countries initiated by its project support team, VIVOTEK was able to make its video surveillance system more stable and close to what the end users really need.

AsiA As the home mArket for testing systems Being a global company is another value of VIVOTEK. After establishing its Middle East office in Dubai, the company will soon open an office in Mexico to service the whole of Latin America. Chen said Latin America is full of security demands. As soon as the country’s financial status improves, the market will still be very huge and filled with potential. Asia, in general, is another ver y impor tant region for VIVOTEK to conduct field trials of its video surveillance systems in multiple applications.

Chen said: “We have redefined our own home market. Instead of being confined to Taiwan, all the areas in Asia that we can travel to within 24 hours are our home market now. Over the years, the company’s project support team has frequently travelled to Vietnam, Malaysia, Indonesia and Japan to solve their problems locally.” VIVOTEK strategically grows different key verticals in different countries: it is more involved in factories and educational institutes in Taiwan, the retail sector in Japan, factories and city surveillance in Vietnam, city surveillance in Indonesia, public transportation in Malaysia, and private commercial projects in Australia and New Zealand.

staying Positive about the futuRe It is obvious that 2015 and 2016 would not be an easy time for most of the worldwide leading security companies. Even though the unstable global economy and huge pressure from price competition are testing the ability of these companies, the global demand for security technologies and systems will remain high, and the security market will still show healthy growth. Chen encouraged all the security companies to stay confident but to also be creative enough to find new applications, based on the integration of security systems with other connected ones. Chen finally suggested, “We have to pay more attention to the development of IoT technologies and see how they are applied in smart retail, smart cities, smart factories and smart home.” He continued by saying that there is no single security company right now that has what it takes to be a market leader in this “connected” world, a fact that can also explain why the industry is experie n c i n g a re s h u f f l i n g. Th e re fo re, companies should explore more opportunities in “cooperation” and “partnerships,” instead of focusing only on the competition in the market.

27


IP SecurIty SyStemS:

Stepping StoneS for CyberattaCkS COMPILED BY the a&s editorial team (Source: SIA Education seminar at ISC West 2016)

The introduction of IP technology has made physical security systems – video surveillance, access control and alarm systems – susceptible to cyberattacks. However, the major risk lies not in an intruder seizing control of camera operations, but rather in their use of the physical security system as a stepping stone to obtain sensitive information inside the organization. An SIA Education seminar during ISC West attracted many attendees who came to listen to speakers from Tyco Security Products and Surveillance One discussing the topic.

n today’s connected world, IP-based security systems offer numerous breach points for cyberattacks. The vulnerability of these systems is quite a conundrum, so the biggest question is how we can make these physical security systems more secure.

Risks AssociAted with iP MigRAtion JUNE 2016 ● www.asmag.com

Switching from analog to digital IP-based video surveillance systems can make systems more open. Although this move can benefit the users in many ways, the resulting system can pose as a threat to the organizational network. The reason is that IP-based security systems, whether it’s for video surveillance or access control, can run partially or entirely within the corporate network; thus, an unprotected system can become a “jumping board” for hackers to get into the private system.

28


POtEntIaL SECurItY BrEaCh POIntS This risk is not limited to the intruder taking control of the physical security system, but also includes the damage that can be inflicted when they gain access to the larger IT system. This understanding was one of the main conclusions made at the seminar. The risk and potential damage of an intruder exploiting the vulnerabilities inherent in a camera or VMS to gain access to other IT systems is the most serious aspect of cybersecurity as far as physical security systems are concerned. The first known cybersecurity attack that used this approach took place in August 2008 in Turkey. Unknown hackers took over the IP camera system guarding a British petroleum pipeline connecting the Caspian Sea to the Mediterranean. The attackers managed to hack into the system, disable the camera system and the alarm system, and then proceeded to manipulate the pressure in the pipeline until it exploded. To cover their tracks, the attackers deleted over 60 hours of video footage from the server. Luckily for the investigators, one infrared camera that was not connected to the same network captured the images of two men with laptop computers walking near the pipeline days before the explosion.

InaDEquatE SECurItY SYStEM PrOtECtIOn It is a paradox, but in many cases, operators neglect their physical security systems, making it less secure compared to other endpoints in the network. But if we take employees’ personal computers as an example, they are usually password-protected and the IT department makes it a point to regularly update security patches or change passwords. On the other hand, it is not uncommon to discover that the password for the video surveillance system is still the default one, one that

DetermInIng the neeD for IncreaSeD SecurIty To circumvent possible attacks, many integrators add additional layers of defense. However, is it really worth the effort? To determine this, integrators can do two things: perform a balanced risk assessment that will evaluate the real risks their clients are facing or try to assign the risk an estimated monetary value.

rISk EvaLuatIOn

To estimate threat levels, integrators need to consider several factors: the intent and capabilities of the attackers, the vulnerabilities of the site and the consequences of such an attack. When there is a high threat level, integrators should alert their clients and make sure they make the needed changes to the size and scope of the project to ensure its security. For example, by deploying secure switches that can separate networks from one another and protect data transmission or use other hardened equipment to make sure it is harder to breach the network perimeter.

EStIMatIng MOnEtarY vaLuE

By assigning monetary value to risk, integrators and clients can keep costs under control and make sure they don’t “spend a million dollars on a 10,000 dollar problem.” The speakers recommended the following formula to estimate the monetary value of the security solution: Probability*Impact = Estimated Monetary Value. So for example, if the impact of an attack is the loss of 100,000 dollars, and the probability of an attack is 10 percent, then the monetary value of the solution is 10,000 dollars. In this case, investing more than that in securing the system might be overshooting.

can sometimes be easily accessed via a simple Google search. For IP cameras, an intruder can even walk up to the camera and use relatively simple technical tools to find out network details like IP addresses, user names, passwords and more.

CYBErattaCkS varY In tYPE anD StratEgY Cybersecurity challenges are not theoretical but real and can lead to catastrophic failures. At the national level, the main threat of cyberattacks mostly comes from other nation states and terrorists. Nevertheless, there are also many criminals working independently. Common scenarios warn of cyberattackers taking over power plants or water facilities and bringing the country to a standstill. This scenario became a reality in December 2015 when a cyberattack caused a huge power outage in Ukraine, affecting 225,000 residents. Hackers installed malware that allowed them to remotely switch breakers in a way that enabled them to shut down the power grid. The attacks can take many forms. They can be as rudimentary as walking up to a camera and connecting to it physically. Conversely, they can be sophisticated operations like zero-day exploits, where attackers take advantage of security holes in the software that vendors are not aware of.

29


Indian Security Market Chugs on The Indian security market is growing at a rapid pace as several large, medium and small projects continue to come up. Although there are a few persisting concerns, the country presents a major opportunity for foreign companies as the market matures to demand high-quality products. BY Prasanth Aby Thomas

JUNE 2016 ● www.asmag.com

32


ndia is one of the fastest growing large economies in the world at the moment. According to the United Nations, the country’s growth is expected to be at 7.3 percent in 2016 and 7.5 percent in 2017. Strong foreign direct investments (FDI), government efforts toward infrastructure development, and public-private partnerships are among factors contributing to growth. The security industry in India is expected to grow in tandem with the overall development. The country’s safety levels are still a concern as several incidents have highlighted the lack of adequate security measures. These include issues ranging from terrorism concerns to personal safety issues. A report by 6Wresearch said the Indian video surveillance market is projected to reach US$2.4 billion by 2020. In a separate report, the organization estimated the 2015 shipments value to have reached $160 million. “Increasing terrorist activities, need for remote monitoring and rising government spending on smart cities have led to the growth of the Indian video surveillance camera market,” said Anuj Mehrotra, Senior Research Analyst at 6Wresearch India Electronics Division. “Moreover, increasing application segments across residential, transportation and healthcare sector, coupled with growing awareness and demand across tier 3 and tier 4 cities have further assisted in the progression of the video surveillance camera market in India.”

GrowinG Market, Diverse DeManD Major global security companies with a strong presence in the Indian market suggest several factors are driving the market at a fast pace. Prasenjeet Bhattacharyya, Business Head for Surveillance Products at Panasonic India, explained the market situation from his company’s perspective. “Globally, the video surveillance market itself is slated to grow at an estimated 16 percent and worth $70 billion by 2022,” Bhattacharyya said. “This clearly demonstrates the huge opportunity that exists for a player like us. When we speak about India, courtesy of an expanding consumer class and increase in disposable income, the smart enterprise solutions market in India is growing. Security and surveillance is amongst one of the pillars that we are counting to drive growth in India. Traditionally, or perhaps in the last five years, the market has been growing year after year. Everybody needs security. Today we have customers from residential to city surveillance.” It is obvious that there is demand in India, but what is quite interesting about it is that unlike before, large projects are no longer just from the government. In fact, current demand remains mixed from both public and private sectors, according to some companies. “Demand is a mix now. While at one point in time the government was more, now the corporate is also picking up,” said Ashish Khare, General Manager and Business Head for System Integration Solutions at Wipro. He added that the market presents strong opportunities for foreign brands who

Make in India to

Adapt to the Market

One of the major initiatives of the Indian government has been a Make in India campaign that aims to promote manufacturing in the country. The project has encouraged several local companies to invest more in manufacturing. More importantly, it has opened up an opportunity for foreign manufacturers to produce in India, understand the market requirements and offer customized solutions. Several global companies have already expressed interest. Latest reports suggest that the Apple component maker Foxconn is planning to open a facility to manufacture iPhones and other products in the country. The company also plans to manufacture products of other companies like Chinese phone maker Xiaomi in the country. “With ‘Make in India’ drive, manufacturing in India is getting focus, and that is beneficial for us,” said Ashish Khare, General Manager & Business Head for System Integration Solutions at Wipro, explaining that the market offers ample opportunities for foreign and domestic brands. “There are so many foreign brands which either have or are trying to set up manufacturing. Foreign brands with some good market standing, if they make in India, they can definitely grow faster in the market than others due to mix of proven product, quality, price and preference.” The make in India project is also expected to have another outcome. As it brings in more companies that intend to manufacture in the country, the manufacturing vertical for security could see a boost.

Prasenjeet Bhattacharyya, Business Head, Surveillance Products, Panasonic India Pornsak Budhraja, Chief Solutions Architect, Indigo Distribution Atulya Chandra, General Manager, South Asia, Honeywell Security and Fire Nitin Joshi, MD, Realty Automation and Security Systems Ashish Khare, General Manager and Business Head for System Integration Solutions, Wipro Arun Khazanchi, CEO, Videonetics Hariom Sharma, Director, Solus Security Systems

33


Indian

Biometrics Market Advances on Public and Private Support

JUNE 2016 â—? www.asmag.com

36


The Indian biometrics market is expected to grow steadily over the coming years as several verticals realize the relevance of the technology and adopt it. The market is not without its challenges, but for those companies that can understand the unique requirements here, India offers plenty of opportunities. BY Prasanth Aby Thomas

s advanced security systems gain acceptance in more developing markets, countries like India with large populations would naturally become the most promising markets for technologies like biometrics. According to IHS, the Indian biometrics market will be one of the key drivers of growth in Asia from 2015 to 2019. The market had not done as well as expected in 2015, but things are projected to be different from 2016 onwards. “Biometric readers are generating the largest portion of reader revenue in the Indian market throughout IHS’ forecast period from 2014 to 2019,” said Alexander Derricott, Digital Security and Access Control Analyst at IHS Technology. “It generated US$6.9 million in 2014 and is forecast to grow at 15 percent CAGR from 2014 to 2019.” Ravishankar Mysore, Senior Program Manager at Safran Identity and Security, gave an even more optimistic projection. He said the company expects the biometrics market in India to grow around 30 percent over the next five years. There are several reasons for this growth, but perhaps the most significant development has been a

government initiative known as the Aadhaar project, aimed to bring India’s 1.2 billion population under biometric record and provide them a unique national ID.

Alexander Derricott, Digital Security and Access Control Analyst, IHS Technology Sagar Gosalia, Senior VP, Marketing & Sales, Matrix Comsec Ravishankar Mysore, Senior Program Manager, Safran Identity and Security Sujan Parthasaradhi, Director of Biometric Applications in APAC, Biometrics, HID Global Dimitrios Pavlakis, Industry Analyst, ABI Research

Lower Costs and reLiabiLity boosting Market According to Derricott the affordability of technology along with increased accuracy levels and durability addresses major concerns that have hitherto limited the adoption of biometrics. “There is an end-user perception that card-based projects are less secure than biometrics due to the potential theft or loss of card credentials,” Derricott said. “In the residential market, the range of people, from children to grandparents, that can use the door without having to give out keys is a very important selling point. The requirements for the systems are not too diverse and are still driven wholly by fingerprint solutions.” Sujan Parthasaradhi, Director of Biometric Applications in APAC, Biometrics at HID Global, further pointed out issues of corruption, enhancing customer experience and the promise of biometrics bringing a more efficient system as major driving factors. “Fraud in government benefit disbursement is being addressed successfully with the adoption of biometric authentication,” Parthasaradhi said. “Various government programs are being linked with Aadhaar and require biometric authentication of citizens using fingerprint (mostly) or iris. While government programs are often standards driven when implementing a particular biometric solution for identity verification, the private sector tends to be more performance driven.” Mysore said the national ID project is one of the key factors driving demand in India. Other reasons include initiatives Several mandates from the central bank are encouraging the financial sector to adopt biometrics technology.

37


Challenges Lie Ahead for Taiwan Security Moving forward, what will the security industry’s next step be? Focusing on software as a service, highlighting one’s value, deepening cooperative relationships and expanding security applications could help carve out a clear path for the future. BY the a&s editorial team (adapted from a&s Taiwan)

T

JUNE 2016 ● www.asmag.com

here were 1,559 public construction projects launched in Taiwan in 2015. These projects were valued at approximately US$108 million, down 9 percent (US$119 million) from 2014. These numbers reflect a slowdown in Taiwanese public construction, a result of an increasingly conservative budget from the government. For security companies that target large-scale construction projects, this year looks to be a grim one. Based on the 2015 public construction project analysis chart, the growth of public construction projects in Taiwan is leveling out with large bursts of growth becoming less common. As a result of reduced government budget in the last few years, the building installation value of public construction projects have been low. From this, we can see how Taiwan’s public construction projects have gradually stabilized. Additionally, it explains how the government’s budget is no longer sufficient to support multiple new construction projects.

41


2015 Public Construction Projects Analysis 25,000 Aviation There were only seven more aviation projects in 2015 than in 2014. Project value increased by 123 percent, mainly due to renovations and project upgrades with higher estimated budgets. Conversely, in 2014 the majority of aviation projects were smaller maintenance projects.

20,000

15,000

123%

Hydraulic Engineering Hydraulic engineering projects averaged over US$60,000 in 2014. On the other hand, in 2015, both the 2016 Kaohsuing City pumping station and traffic underpass video surveillance system maintenance project and the second phase of Taipei City’s CCTV river water monitoring equipment engineering project resulted in project values surpassing $30.5 million, a growth of 102 percent from 2014.

102%

10,000

5,000

$.0

on iati Av

y itar Mil

rt ry ity rks ing ion ust spo rat Pa y/C nt eer n t n e a n i Ind po r c e u r g T n d o o n m e ie E C ern pid CC Sc aliz v ulic Ra CP Go tion ss dra a a y N H M

rts Po

Competition for civilian projects will only get tougher due to the increased pressure from Chinese manufacturers.

JUNE 2016 ● www.asmag.com

Despite the slowdown in these projects, the government is still going forth with major building installation projects, according to data released by the Taiwan government. Based on the data, the government will continue focusing on road and neighborhood projects, which are valued at over $31 million. Furthermore, plans for regular upgrades and retrofit projects have contributed to the overall stable growth of building installation projects. For an industry that heavily relies on public construction projects to maintain steady growth, Taiwanese security players view the current situation as a type of “hidden” crisis. With less and less construction projects available, the market is facing an increasing amount of difficulty. Under these trying circumstances, competition among security manufacturers will get more fierce. We believe that public construction projects

42

in 2016 will maintain the same steady growth as in 2015. Taiwanese manufacturers looking to capitalize on this market will need to work harder. Competition for civilian projects will only get tougher due to the increased pressure from Chinese manufacturers. The pressure of which will result in some manufacturers being forced out of the market. In order for Taiwanese security manufacturers to stay in the game, they must find where their added value lies.

2016 Central Government’s ConstruCtion Plans The central government has budgeted nearly $5.8 billion for public construction projects in 2016, almost $51.9 million less than 2015. This further proves public construction projects are decreasing year by year. In addition, whether or not construction projects will be implemented in 2016 due to the change in political power is all but one more thing for manufacturers to keep an eye on this year. Although the budget for public construction projects has gotten smaller, the central government is aiming to carry out projects in 2016 that will bring about new kinetic energy.


Video Solutions for Small and Medium Businesses — New Opportunities for Systems Integrators BY Israel Gogol, Freelancer

JUNE 2016 ● www.asmag.com

The market for video surveillance solutions for small and medium businesses has been growing rapidly in the last few years. Solutions focus on ease of installation and simplicity of use and bring benefits to both end users and systems integrators. 46

he small and medium business (SMB) market segment spans across many types of businesses and facilities. These include offices, retail stores, manufacturing and storage facilities, restaurants, and more. From the manufacturers’ perspective, the definition of an SMB is not according to the business type, but usually defined by

the number of channels they require. Some manufacturers categorize systems with less than 16 channels as small, but in several cases this can stretch depending on the scale of the market. Jeffrey Huang, Sales Account Manager at Synology, explained his company's perspective on this. “Although the deployment scale may vary in different markets, basically


To compete with lower prices, SIs are shifting to solution sales which highlight their skills beyond security sales and camera installations.

we characterize businesses using 64 channels and below as SMB,” Huang said. “Traditionally, 16, 32 and 64 are common analog solutions. 32/64ch DVR/NVR is the biggest single device, so bigger than 64ch means that you need to build a CMS system to manage multiple devices from different locations. Then it will be a more complicated deployment.” Over the past few years, this segment has seen a growing interest from manufacturers. This is the result of two parallel developments. The first is a decreasing market size for higher-end segments. The relatively wide-scale adoption of IP cameras in the high-end market is pushing manufacturers to look for “greener” markets. The second development is the lower price of video surveillance equipment, which has made these systems more affordable for SMB clients.

Lawrence de Guzman, VP, APAC, Vicon Industries Jumbi Edulbehram, Regional President, Americas, Oncam Jeffrey Huang, Sales Account Manager, Synology

“Since the marked economic recovery, particularly in the U.K., we are seeing SMBs needing to upgrade from legacy systems that are failing to provide adequate protection of property, assets and staff, as well as proving to be expensive to maintain,” said Brian Song, MD of IDIS Europe. “In addition, the recovery has seen many businesses grow, so companies are moving to larger premises, which in turn, means office fit outs that include security installations. So we’re seeing really strong growth in the SMB sector right now and we expect that trend to continue.” One of the main characteristics that tends to be common in SMBs is that video security is generally not business critical. “For example, if we compare SMBs to a large airport or a casino, in case the video security is not functioning, the airport will have to close down that area of the airport. Casinos also have strong regulations regarding video coverage. SMBs don’t generally have hard requirements linking their video security to their business operations,” explained Janne Jakobsen, VP of Professional Products at Milestone Systems. Video is most often used post-incident as a reference to see what happened. Nonetheless, businesses are slowly expanding the use of video surveillance. “In the past, video was used as a form of insurance, in case something happened. We find that customers who start using the

47


Security systems integrators are faced with challenges on several fronts. Increased competition in the market has led to price wars among integrators themselves. Economic woes and political instability have caused end users to be more conservative as far as their security spending is concerned. All this has rendered integrators less and less profitable, and they must figure out ways to survive and stay ahead amid the adversity. BY William Pao

JUNE 2016 â—? www.asmag.com

Definingnew SyStemS IntegratorS inaMore ConneCteDworlD 52


ore and more, systems integrators find themselves consumed by challenges in today’s security market. According to the integrators that we spoke with at this year’s Secutech Taipei, these challenges include increased competition, the end user’s budget constraints and increasingly complex user demands in today’s connected world. This article is to define what constitutes today’s systems integrators and find out how they rise up to these challenges and overcome them.

Budget Constraint The biggest challenge facing integrators is the budget constraints of their end-user customers, who reduce investment or spending when times are bad. “The economy in Thailand is not so well. Thailand’s GDP is below 3 percent. The government and enterprises are concerned with where to invest money, and usually security will be the last one,” said Pichai Sihsobhon, MD at Thailand-based Facility Management. Another integrator from Thailand, Bancherd Rachtapattanakul, owner of Thai IP Camera, echoed that sentiment. “The economy in Thailand is not good. If the private company wants to get a new system, he is afraid to pay more money. He might want to get it, but if he pays more money for the better technology, he won't have enough money … in the future,” he said. Decisions by the government or enterprises to delay or outright cancel projects in the midst of a country’s political or economic instability can also be troubling for integrators. “One very renowned worldwide manufacturer … they planned to invest in Thailand to build a new factory. I quote the price to them and the project almost got underway. One day I got a letter saying they would like to postpone this project by three months. Another few months, this project was cancelled due to the political conditions,” said Wissawat Chotbenjakul, MD at Fit IT And Solutions.

Competition intensifies Another challenge is increased competition, not only from rivals who introduce low-price Chinese products but also from those from non-security disciplines. “A lot of IT companies do systems integrations on the side already. When this kind of company comes in, they don’t know much about security — they just know the specs of the equipment,” said Sihsobhon. “When we recommend to our customers, like government officers, they don’t understand — they always compare ours with proposals raised by IT companies, not knowing that while their specs are written very well, in real life, they can’t be used.”

Impact of Recent m&a Deals on sIs Sometimes the competition comes from forces that are beyond the integrator’s control, for example a merger and acquisition deal between a manufacturer and another systems integrator. “Let’s say the manufacturer that we have been working with for so long and from whom we normally get the product and solutions first suddenly acquires another SI, and tomorrow we are going to sit in the client office to present the same proposal of same product,” said Nicholas Yap, Director of Client Relationships for APAC at ICD Security Solutions, a Company of Convergint Technologies. “That will be a challenge, because I’m no longer that sure if I’ll get the best pricing from this manufacturer. I’m not sure there will be a privilege to the other company because they are under one umbrella. That’s definitely something that we would be worried about.”

53


BY William Pao

JUNE 2016 ● www.asmag.com

or security distributors, the market has become more competitive than ever due to the presence of more companies offering more choices for customers. “It’s getting tougher because you’re getting more players. You need to fight the price competition,” said Arnon Kulawongvanich, GM of Sales and Marketing at Bangkok OA Coms. “Normally we give customers a one-year warranty. But now with the competition, we give them extra six months or one year for free. In a lot of cases what we do is give them free after-sales service after the end of the warranty. Now that is extra costs on us,”

58

said Hylbert Chua, President of Alcon based in the Philippines.

Impact of competItIon from chInese Brands A main reason for the cut-throat competition in the market is the prevalence of Chinese brands and products, which are offered at lower and lower prices. “The last few years, we saw Dahua, Hikvision, and many brands from China going into the Thai market. The last year I went to CPSE in China, I could buy a PTZ camera only for US$70 which was very cheap. For my main brand, the cheapest for PTZ is about $700,” said Bancherd Rachtapattanakul, Owner of Thai IP Camera. With Chinese products offered at low prices, it’s only natural for customers to select them. This is especially so in Asian markets where people are more pricesensitive. “To some clients, they would just say, ‘no other brands, except Hikvision,’” Chua said. “Is that a challenge for me? Yes,” said Wissawat Chotbenjakul, MD at Fit IT and Solutions based in Thailand. “When the customer wants something, they always


Distributionina

Competitive Business LandsCape

see the specifications sheet. The Chinese can write down anything.” “People are very careful. They don’t want to spend a lot,” said Mohamed Sirajudeen, International Sales Director at CMOS Dotcom based in Malaysia. “They just want to look for cheaper products. They just want to know how much less can I pay. That's a little difficult sometimes. When I see people, I tend to explain to them that they would want to invest in something lasting.” “In my country, the competition for us is Samsung, Sony, Panasonic and Axis. And then the Chinese companies came in two years ago, and now they are also getting brand awareness in Indonesia,”

said Johan Haryanto, Director of Hotware based in the country. “You can see several projects usually belonging to mid- to high- projects using products like VIVOTEK and Samsung, and now China companies also come in.” And even markets outside Asia have felt the impact of Chinese manufacturing. “In the Italian market you have some very historical brands, very important companies, but you have these big companies from China, and they are trying to give to the market their focus point,” said Alessandro Berio, MD at Videotecnologie. “If you try to fight Dahua or Hikvision with price, you lose.”

poor channel management Sometimes, the competition does not just come from China. It also has to do with the poor channel management by the vendor, especially the Asian ones, who deviate from the structured “two-tier” distribution approach and go directly to the systems integrator, leaving the distributor competing with the vendor. “The distribution business is becoming more challenging, especially with the

59


tErrorISM

concErnS cAll for

BEttEr HotEl Several terrorist attacks, especially in the Middle East, Africa and Asia, have brought hotel security under the scanner, hurting the global travel and hospitality industry. Implementing adequate security systems has become a necessity for hotel businesses to survive.

JUNE 2016 â—? www.asmag.com

64


SEcurIty BY Prasanth Aby Thomas

n November last year, a militant group attacked an upscale hotel in Bamako, capital of the North African country Mali, taking 170 people, including several foreigners, hostage. The local security forces, with international help, were able to free most of the people held, but not before the militants killed 20 of them. In January this year, a group of gunmen stormed into a hotel in Burkina Faso, another African country, killing at least 30 people. Later in March, another attack on hotels in Ivory Coast left 18 people dead. Hotels, especially upmarket ones, are clearly seen as soft targets by terrorist groups as they often have foreign nationals. Terrorist groups looking to launch attacks on other countries seem to find this indirect route more convenient. According to IntelCenter, a firm that tracks terrorist incidents, in 2015 alone there were 25 attacks on hotels. The Middle East, Africa and Asia have been the main targets for such hotel-

related incidents so far, although terror attacks like those seen in Paris and Brussels have prompted demands for better hotel safety in Europe too. Terrorism-related fears have cost the travel industry US$8.2 billion, according to a report from the data-collection site YouGov.

Increased demand Such a strain on the travel and tourism business has shed light on the importance of implementing and tightening adequate security solutions in hotels. The solution providers we interviewed differed on how the market is reacting to this necessity, but at least some of them believe that safety concerns in hotels in these regions have shifted focus after the recent terror attacks. “While in earlier years hotel security was mostly about avoiding fire and theft, the potential of terrorist attacks has certainly influenced the security strategies of many hotel operators,� said Baraa Dakhel, Head of Business Development in the

65


SMAhome

TradiTional Security, Smart Home and Barriers To adopTion By Jim Dearing, Market Analyst II, IHS Technology (Originally published in a&s SMAhome issue 14)

JUNE 2016 ● www.asmag.com

In 2015, the market for traditional residential security equipment was valued at around US$2.3 billion. Yet despite its enormous size, industry growth is at best flat and sometimes negative due to the emerging demand for “connected” or “smart” devices. So what are these new devices and why are they replacing equipment that has been the mainstay of the security industry for over 20 years? • Traditional security – systems installed by a professional which only have local management capabilities (e.g., arm/disarm with a keypad or key fob). • Connected security – systems which can be remotely managed, but with devices that do not speak to each other. Although alert messages may be sent, human intervention is still required. • Smart home security – devices that make decisions based on some form of input. For example, if a thermostat detects that no one is home, the thermostat will shut off the lights, lock the front door, close the garage door and power off the coffee maker. The popularity of the latter two types of equipment has spiked as a result of a variety of factors, for example, increasing smartphone usage. The fact that customers now possess such a powerful device at all times when they’re away from home has flung open the door of possibilities for residential security providers. Manufacturers have given them the ability to arm/

70

The final and single largest barrier to adoption, according to our survey, is the cost of the products.

disarm systems, open gates or live stream home surveillance equipment through smartphone applications. End users are now able to interact with the equipment more often and with greater ease and therefore, see more value in connected/ smart devices. Another important factor has been the affordability of wireless equipment finally reaching a point where the additional costs of buying wireless products is outweighed by the installation costs of a wired system. A number of large multisystem operators (MSOs) have been quick to capitalize on this demand and availability of affordable wireless equipment, making significant inroads in the US residential security market with their own affordable packages. As shown in the graph below, the Americas currently accounts for over 85 percent of connected/smart equipment sales globally. Looking elsewhere across the globe, in Europe, security does not seem to be at the top of the list of concerns for homeowners, while securing savings on energy bills seems to be more of a priority. As a result, it is the utility providers that are having the most success, with companies such as British Gas, Essent, Eneco, Nuon, RWE, EnBW and Eon each


introducing their own smart home solutions. However, it isn’t just MSOs and utility companies that are vying for a piece of the smart home market p i e , n e w m a r k e t e n t r a n t s a re coming from all ends of the value chain. In addition to traditional security service providers, there are also specialist home automation providers, software and platform providers, as well as the device manufacturers and retailers themselves. Each brings their own value proposition to the table and each believes that they will be the one to ignite mass market adoption.

Barriers to adoption and are they insurmountaBle? Last year, IHS conducted an end-user survey with over 1000 participants consisting of current smart home device owners, consumers with interest in the devices (potential adopters) and those that showed little interest (non-adopters). Six of the main barriers to adoption include: privacy, security, interoperability/ inter-application functionality, installation challenges/servicing,

consumer awareness and affordability. Privacy was viewed as the second greatest barrier to purchasing smart home products by respondents to the survey. There were significant differences in attitudes as to which types of information respondents would be willing to share, for example data on energy consumption and climate control appeared to be least contentious, whereas information about the location of individuals in the home and media consumption habits were the most contentious. Surprisingly security ranked fairly low on our list of barriers for the end users themselves, although one specific area of exception was in applications where security devices, such as door locks, can actually be controlled. Interoperability issues typically arise in a new market where vendors are still trying to establish themselves and consumers purchase multiple products from different vendors. The survey results indicate that for non-adopters especially, having a simple network was of paramount importance as complexity was a huge barrier to adoption. The graph below shows that being able to control all the functions from a single application was highly desirable. Over a third of smart home device owners stated that they would not feel comfortable adding additional devices to their current network. This suggests that there is still work to be done by vendors on improving ease of installation as well as providing better after sales support. Although this latest volume of survey results did indicate that market awareness has grown significantly since the previous edition of the survey in 2013, the fact remains that this time around, a quarter of respondents still answered that they were unsure of where to start with a home automation solution. Education remains a key driver for the industry in terms of awareness and also in terms of reducing concerns over data privacy and home security which are barriers to adoption in their own right. The final and single largest barrier to adoption, according to our survey, is the cost of the products. Over 40 percent of survey respondents selected affordability as their number one barrier to purchasing and over 75 percent named it in their top 3. Although device prices continue to fall and huge strides forward have already been made in improving functionality and usability, it seems as though vendors still have a long way to go to convince potential adopters of the value in owning a connected/smart security system.

71


June – December 2016

WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

IFSEC Southeast Asia ISAF Istanbul • Date: 2016/09/29–10/02 • Date: 2016/09/07–09/09 IFSEC • Venue: Istanbul Expo Center, Istanbul, Turkey • V enue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia International • Tel: +90-212-503-32-32

June 2016

• Date: 2016/06/21–06/23 • Venue: ExCel London, London, U.K. • Tel: +44-20-7921-5000 • Email: rachel.eaton@ubm.com • URL: www.ifsec.co.uk

• Tel: +44-20-7921-8127 • Email: Agnius.Kazlauskas@ubm.com • URL: www.ifsecsea.com

• Email: marmara@marmarafuar.com.tr • URL: www.isaffuari.com/en/

Intersec Buenos Aires

December 2016

• Date: 2016/09/07–09/09 • Venue: La Rural Trade Center, Buenos Aires, Argentina July 2016 • Tel: +54-11-4514-1400 SecProTec East • Email: ezequiel.gorbaran@argentina.messefrankfurt.com • URL: www.intersec.ar.messefrankfurt.com Africa • Date: 2016/07/12–07/14 • Venue: Kenyatta International Conference Centre (KICC), Nairobi, Kenya ASIS • Tel: +49-40-710070-51 • Date: 2016/09/12–09/15 • Email: stefan.freiberg@planetfair.de • Venue: Orlando, Florida, U.S. • URL: www.secproteceastafrica.com • Tel: +1-703-519-6200

Security Exhibition & Conference • Date: 2016/07/20–07/22 • Venue: Melbourne Convention & Exhibition Center, Melbourne, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au September 2016

OFSEC JUNE 2016 ● www.asmag.com

• Date: 2016/09/05–09/07 • Venue: Oman International Exhibition Centre, Muscat, Sultanate of Oman • Tel: +968-2478-8476 • Email: info@muscat-expo.com • URL: www.muscat-expo.com/ofsec

• Email: asis@asisonline.org • URL: http://securityexpo.asisonline.org

Secutech Vietnam • Date: 2016/09/21–09/24 • Venue: Friendship Cultural Palace, Hanoi, Vietnam • Tel: +886-2-8729-1099 • Email: stvn@newera.messefrankfurt.com • URL: www.secutechvietnam.com

Security Essen • Date: 2016/09/27–09/30 • Venue: MESSE ESSEN, Essen, Germany • Tel: +49-201-7244-0 • Email: info@messe-essen.de • URL: www.security-essen.de/impetus_provider/

Safety & Security Asia Adria Security Summit • Date: 2016/09/06–09/08 • Venue: Kongresni Centar, Sarajevo, BiH • Tel: +387-33-788-985 • Email: summit@asadria.com • URL: www.adriasecuritysummit.com

74

• Date: 2016/09/28–09/30 • Venue: Halls B & C, Marina Bay Sands, Singapore • Tel: +65-6278-8666 • Email: info@cems.com.sg • URL: www.safetysecurityasia.com.sg/

Security China/CPSE • Date: 2016/10/25–10/28 • Venue: China International Exhibition Center (New Center), Beijing, China • Tel: +86-10-68731710 • Email: secu_chinashow@yahoo.com.cn • URL: www.securitychina.com.cn

Expoprotection • Date: 2016/11/07–11/09 • Venue: Paris Porte de Versailles - Pavillion 1, Paris, France • Tel: +33-1-47-56-50 11 • Email: marie-aurelie.goncalves@reedexpo.fr • URL: www.expoprotection.com

MEFSEC • Date: 2016/12/11–12/13 • Venue: Cairo International Convention Centre, Cairo, Egypt • Tel: +971-4-407-2702 • Email: syed.javed@informa.com • URL: www.mefsec.com


Companies in This Issue Cover Story • VIVOTEK

Products of the Month • AUGLLE • V5 SYSTEMS

Viewpoint

• SURVEILLANCE ONE • TYCO SECURITY PRODUCTS

Vertical Solution

• ARECONT VISION • BOSCH SECURITY SYSTEMS • IDIS • ONYX INTERNATIONAL CONSULTING & SERVICES • PANASONIC MEA • SECURITAS UAE

Product Exploration

• AIMETIS • AXIS COMMUNICATIONS • IDIS EUROPE • MILESTONE SYSTEMS • ONCAM • PELCO BY SCHNEIDER ELECTRIC • PIVOT3 • SYNOLOGY • VICON INDUSTRIES

Market Dynamics

• ABI RESEARCH • HID GLOBAL • HONEYWELL SECURITY AND FIRE • IHS • INDIGO DISTRIBUTION

Next Issue

Market Dynamics THAILAND

Vertical Solution CONNECTED CARS

• MATRIX COMSEC • PANASONIC INDIA • REALTY AUTOMATION AND SECURITY SYSTEMS • SAFRAN IDENTITY AND SECURITY • SOLUS SECURITY SYSTEMS • VIDEONETICS • WIPRO

Industry Report

• ADP TECH • ADTECH SYSTEMS • ALCON • BANGKOK OA COMS • BRIGHT OCEAN • CMOS DOTCOM • D-FLEX STRATEGIC SOLUTIONS

• E-GOZLEM • EXPRESS SYSTEMS • FACILITY MANAGEMENT • FIT IT AND SOLUTIONS • GAMMA SOLUTION • HOTWARE • JCD SECURITY SOLUTIONS • JAWAD ELECTRONICS • LEVEL • NETDOC • PROSYSTEMS • SMART HOME SAFETY EQUIPMENT • THAI IP CAMERA • THANO TECHNOLOGIES • VIDEOTECNOLOGIE • ZARJA ELECTRONIKA

Product Exploration WIRELESS COMMUNICATIONS

Special Feature SI CHALLENGES

75


Elika 2101 Commercial Wireless Access Control and Telephone Entry System

Iris Digital Video System Eyz-On Camera Video Recorder

KMT SASO RB-100F Intelligent Radar Detector

Features:

Features:

• R eady to connect to VoIP, Wi-Fi, BLE and 3G/4G cellular • 10.4” full color HD display and full alphabet keyboard • Forced entry security shutdown feature • HD and night vision-enabled camera • IP65 certified enclosure • No software installation required

• Full-featured digital video recorder • Advanced high-sensitivity IP camera • Motion and surveillance recording • Quick and easy programming • Standard 32 GB storage • Built-in 2 port switch

• F requency modulated continuous wave (FMCW) • Maximum detection distance 100 meters • Detection distance information • Human detection probability more than 99 percent • High immunity against noisy outdoor environment • Low false alarm rate on small animal events

■ Elika Access Systems/U.S. ■ Email: info@elikaaccess.com

■ Iris Digital Video Systems/U.S. ■ Email: seethelight@iris-dvs.com

Features:

■ KMT/Korea ■ Email: overseas@isaso.com

American Dynamics victor VMS Features: • D esigned to handle HD and megapixel cameras and manage real-time alarms and events • Includes advanced policy management, health monitoring, smart search and instant playback • Local storage video vaulting and external storage archiving • Heat mapping shows foot traffic patterns and consumer shopping activity

TVS Infrared Thermal Imaging IP Camera 300/600 Series Features:

• U ncooled FPA with 640 x 480 pixels or 384 x 288 pixels • Clear and sharp resolution • IP66 enclosure rating for outdoor applications • Ethernet output • CVBS output (NTSC/PAL) • Video and power surge protection

JUNE 2016 ● www.asmag.com

■ Thermal Vision Systems/Korea ■ Email: james@tvscorporation.com

• G rants and restricts access to all features within the victor unified client by operator roles • Portable operator access from LAN, WAN or location to location ■ American Dynamics (Part of Tyco Security Products)/U.S. ■ Email: customerna@tycoint.com

Axis P1244 Network Camera Features: • H DTV 720p and 102-degree horizontal field of view • Easy, highly discreet installation • Axis’ Zipstream technology • Built-in microSD card slot • PoE ■ Axis Communications/Sweden ■ Email: axis-sap@axis.com

Anviz P7 PoE-Touch Fingerprint and RFID Access Control Features: • Uses Anviz intelligent core algorithm • 3,000 fingerprints, 3,000 cards, 50,000 records • Optical waterproof fingerprint collection device, abrasion resistance, adapts to all kinds of fingerprints • Touch activation fingerprint sensor and keypad • Supports PoE power supply for both device and lock • RS485, mini USB and TCP/IP communications, Wiegand output ■ Anviz Global/U.S. ■ Email: sales@anviz.com

76


Grundig GRN-M1232N 32 Channel H.264 NVR

Dallmeier IPS 10000 SMAVIA Recorder

Honeywell H4D3PRV2 Performance Series IP Camera

Features:

Features:

Features:

• L ocal user interface on 3 video outputs, with independent multivision • Digital spot function to stream the CVBS spot monitor into network • Hot spare mode – working as failover server for another GRN • Multiplex (live/playback, recording, backup, networking) • Various recording features (normal, schedule, motion, alarm) • Controlled locally by USB mouse or remotely through Ethernet connection with CMS, web page and smartphone

• S MAVIA recording server appliance • Up to 100 audio and video channels • Storage system with JBOD option • Open platform • Rack mount • 3 RU

• 3 MP (20 fps) and Full HD 1080p (25/30 fps) image with 1/3” 3 MP sensor • True day/night capability, vivid color pictures by day and clear black-and-white pictures at night with mechanical IR cut filter • Low light capability with 3D noise reduction, saves storage and bandwidth with H.264 high profile codec • IR LEDs provide up to 30 meters of illumination in dimly lit night time scenes, depending on scene reflectance • Smart IR technology for even distribution of IR • Waterproof (IP66) and IK10 vandal-resistant camera housing

■ Dallmeier electronic/Germany ■ Email: info@dallmeier.com

■ Honeywell Security and Fire/U.S. ■ Email: comments.security@honeywell.com

■ Grundig Security/Germany ■ Email: info@grundig-security.com

Altasec ATHDVR3216 AHD 16 Channel 1080p Real Time DVR Features: • A HD 1080P/720P/analog 960H seamless inputs • Supports multiple input and mixed signal on the same screen • Supports maximum of 1080p30 real-time recording on each channel and up to 16-channel simultaneous real-time playback • Dual stream support for remote access from a PC and/ or a cell phone at low bandwidth

Geutebruck Security Management System G-SIM 5.1 Features: • S uitable for medium- to large-sized video security systems • Customizes dynamic maps • Powerful alarm management • Manipulation-proof exported files • Provides overview of entire security infrastructure, from process control to facility management ■ Geutebruck/Germany ■ Email: info@geutebrueck.com

• Bi-directional audio • Supports push notifications for Android and iOS apps ■ Altasec Technology /Taiwan ■ Email: sales@altasec.com

Wavestore VMS 6 Features: • S imultaneous view, control and management of live video, recorded footage, and integrated devices, all from one screen • Provides greater flexibility by enabling cameras to be fitted onto angled surfaces • Full SDK integration with ImmerVision lenses and Oncam cameras • Improved support for larger systems • Intelligent failover ■ Wavestore/U.K. ■ Email: info@wavestore.com

Genetec SV-32 v2 Hybrid – Analog and IP Network Security Appliance Features: • B uilt-in analog video capture cards guarantee a seamless transition to a networked video surveillance system • Can be used as a unified server and client workstation for both view and recording • Embedded SV control panel, a series of configuration wizards and an automatic update tool allows for rapid deployment • Systems scalable with up to 16 TB onboard storage • Offers 3-year hardware and software warranty ■ Genetec/Canada ■ Email: info@genetec.com

77


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY E-MAIL

25

ABILITY ENTERPRISE CO., LTD.

IP CAMERA / HOME CAMERA

TAIWAN

15

AXIS COMMUNICATIONS AB

NETWORK VIDEO SOLUTIONS

SWEDEN contact-sap@axis.com

2

COMMAX CO., LTD.

SURVEILLANCE

KOREA

pcy@commax.co.kr

5, 7

DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

10

DYNACOLOR INC.

IP CAMERA / NVR

TAIWAN

info@dynacolor.com.tw

75

FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

49

GENETEC

SOFTWARE

CANADA info@genetec.com

3

HDPRO CO., LTD.

CCTV

KOREA

12

HI SHARP ELECTRONICS CO., LTD.

CCTV / DVR / MONITOR / IP CAMERA / HD-SDI / TVI / AHD TAIWAN

sales@hisharp.com.tw

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

17

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

4

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

9

MERIT LILIN ENT CO., LTD.

IP CAMERA / NVR

TAIWAN

sales@meritlilin.com

VIDEO SURVEILLANCE

JAPAN

-

INSIDE BACK COVER PANASONIC SYSTEM NETWORKS CO., LTD.

info@abilitycorp.com.tw

sales@hdprocctv.com

63

SHENZHEN COMMANDER TECHNOLOGY CO., LTD. CASING

CHINA

sjw@yjdcase.com

13

SYNOLOGY INC.

STORAGE

TAIWAN

jeffreyh@synology.com

11

VIDEOPARK TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@videopark.com.cn

FRONT COVER.P21.26.27 VIVOTEK INC.

IP CAMERA / SOFTWARE / VIDEO SERVER

TAIWAN

sales@vivotek.com

6

DVR

KOREA

support@webgateinc.com

INSIDE FRONT COVER. P1 WESTERN DIGITAL TAIWAN CO., LTD.

SURVEILLANCE STORAGE

TAIWAN

Jessica.liu@wdc.com

8

CMOS IMAGE SENSOR

KOREA

sales@zeeann.com

WEBGATE INC.

ZEEANN CO., LTD.

ACCESS CONTROL PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY E-MAIL

43

HUNDURE TECHNOLOGY CO., LTD

READER

TAIWAN

overseas@hundure.com

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

79


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.