CONTENTS P.16
a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.
ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi Executive Editor-in-Chief Hubert Duh Managing Director / Publisher Editorial
General Press Jill Lai Alf Chang Emily Lin William Pao Prasanth Aby Thomas Ryan Liu
Editor-in-Chief Senior Consultant Executive Editor Reporter Reporter Reporter
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com ryan.liu@newera.messefrankfurt.com
Art Design
Gaven Lee Executive Designer gaven.lee@newera.messefrankfurt.com Mao Chang Senior Designer mao.chang@newera.messefrankfurt.com Circulation
VERTICAL SOLUTION
Michelle Shih Officer
michelle.shih@newera.messefrankfurt.com
Marketing
Addressing
Lisa Hsu Sr Media Mktg Coordinator lisa.hsu@newera.messefrankfurt.com
Securityand Management in Hospitals Security in hospitals is a complex thing.
Corporate Management
Thomas Pin Account Manager Chihung Lee IT Manager
thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
asmag.com
24 Creating Safe Environments in Nursing Homes
Jessica Yang Project Manager jessica.yang@newera.messefrankfurt.com Secutech
Peggy Wu Veronica Chen Jason Cheng Michelle Chu
Trade Fair Manager Group Manager Project Manager Event Marketing Manager
peggy.wu@newera.messefrankfurt.com veronica.chen@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com michelle.chu@newera.messefrankfurt.com
International Advertising [Headquarters]
Israel Gogol Manager Audrey Fang Officer
israel.gogol@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com
[Branches & Representatives]
Carolina Pattuelli Evris Consolos Adis Hodzic Manish Gandhi Iris Lai Carol Guan Y. C. Suh Takashi Komori Nguyen Thu Ha Ekaterina Shapovalova Mariusz Kucharski
Europe (Italy) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia Poland
produzione@ethosmedia.it evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com carol.guan@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn shapovalovey@ru-bezh.ru mariusz.kucharski@aspolska.pl
P.26 P.32 INTEGRATED SYSTEM JULY 2017 ● www.asmag.com
Advances in Video Keep Perimeters Safe Perimeter detection is usually the first line of defense for end-user organizations, especially critical facilities such as airports, refineries and military bases.
2
SMART TECHNOLOGY
Drones Boost the Security Industry With Eyes in the Sky With the rapid development and incorporation of technologies like artificial intelligence (AI), deep learning and machine learning, unmanned aerial vehicles (UAV) are becoming increasingly popular in the security industry.
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard, Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.newera.tw.messefrankfurt.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former a&s Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Intelligent System, and a&s Taiwan (above published in Chinese). a&s Adria, a&s India, a&s Italy, a&s Japan, a&s Polska, a&s Russia and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2017 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
EDITOR’S NOTE “Devil’s Ivy” Vulnerability Hits Security Cameras and Other IoT Devices The physical security industry now faces another major cyberthreat — the “Devil’s Ivy” vulnerability, discovered by Senrio, an Oregon-based cybersecurity company that specializes in the Internet of Things (IoT). Reported by many well-known cybersecurity blogs and websites, “Devil’s Ivy could be used to intercept and shut down video feeds.” The vulnerability has been found in many security cameras, including some major brands, that use an open-source software library called gSOAP. According to some reports, gSOAP is “widely used by application developers at Fortune 500 companies.” Even though the software developer has issued a patch for the flaw on June 21st, it is still very challenging to fully avoid getting infected. Cyberthreats has recently become the overriding threat in physical security. Both software developers and users alike should all be knowledgeable and well informed of the latest cyberthreats. In the near future, all devices will become networkable and this type of scenarios would be a total nightmare for all human beings. Companies whose businesses deal with the IoT should also pay extra attention to this issue. This month, we have provided some solutions for hospitals to tackle these cyberthreats. Hope you like it!
KEEP IN TOUCH WITH...
SOCIAL MEDIA www.facebook.com/ asmagglobal
twitter.com/ asmagglobal
www.linkedin.com/ company/ asmagglobal
EDITOR-IN-CHIEF JILL LAI
jill.lai@newera.messefrankfurt.com
EDITORIAL TEAM
JULY 2017 ● www.asmag.com
REPORTER WILLIAM PAO
EXECUTIVE EDITOR EMILY LIN
REPORTER RYAN LIU
REPORTER PRASANTH ABY THOMAS
Among the highlights of IFSEC this year were body-worn cameras, advanced analytics and radar as a perimeter protection solutions. In particular, the latter has generated a lot of interest among vendors and visitors due to its detection capability and lowering cost. These topics are discussed in the Market Update section.
Although demand for video surveillance equipment continues to rise, companies are increasingly turning toward software as a way of differentiating themselves from the rest of the crowd, now competing in terms of features and services rather than price and hardware. This is opening up new avenues for growth and advances in security technology.
AI may become the future of surveillance as more companies are starting to integrate this technology to further enhance video analytics capabilities. In this issue, we selected several companies that offer AI and machine learning functions that range from people counting to detection of abnormal behavior.
What’s that in the sky? Is it a plane? Is it a bird? Is it Superman? No, it’s a drone. Drones are taking over our skies and lives. In our technologydriven world, it seems like drones can do a lot for both industrial and consumer purposes.
6
PRODUCTS OF THE MONTH Innovation in Security at IFSEC 2017
Editor’s Note: Many companies at IFSEC International this year gathered at ExCel London to showcase the latest in security innovation. Even though there are an abundance of new products, solutions appear to be one of the major highlights at the show. Companies are finding ways to deliver the most innovative solution to give end users peace of mind. Some solutions at IFSEC displayed analytics for video surveillance that have the ability to identify and track multiple faces at the same time. Others showcased safety solutions for users to quickly call for help while in a public area. The future of security is becoming less about the product and more about combining different technologies to secure what is important for end users.
Quanergy
M8 Long Range Lidar Sensor The M8 is a long range Lidar sensor enabling ubiquitous use of smart sensing in dynamic situations — made and tested for 3D mapping, security, harsh industrial environments and the most demanding applications. The M8 sensor’s small design sees by day or night, with no IR signature needed, and works in any weather. Multiple laser beams and time-of-flight (TOF) depth perception result in 3D point clouds for spatial sensing. The M8 Lidar sensor provides a 360° field of view, high accuracy, fine resolution and has a maximum range exceeding 150 meters. In IFSEC, Quanergy merged its Q-Guard technology, comprising an M8 Lidar sensor, with Overview’s Hydra Uno camera, which is designed for operation in harsh environments. Q-Guard and Hydra can work both indoors and outdoors, and in any weather or lighting condition. █ KEY FEATURES: • Measurement range of 200 meter (80% reflectivity) • 360° horizontal and 20° vertical field of view • 420,000 points per second • Dimensions of 103 mm in diameter and height of
87 mm • Adapts with dynamic weather
Supplier: Quanergy Systems URL: www.quanergy.com
TDS
Cognitec FaceVACS-VideoScan
TDS Life-Safety is a robust, state-of-the-art technology solution which guarantees real-time accountability for colleagues, contractors and visitors during on-site emergencies and evacuation procedures. Combining TDS SIP (safety information panel) and TDS headcount features, TDS Life-Safety guarantees optimized rescue planning and management. The TDS SIP updates in real time as personnel on-site enter and leave at any given time. It also provides real-time information in relation to available emergency response team members should an incident arise on-site and emergency assistance is required.
FaceVACS-VideoScan detects and identifies persons of interest in real time while computing demographic and behavioral data, supporting security staff, marketing departments and operations management in one application. The application detects people’s faces in live video streams or video footage and stores video sequences of cropped faces (face streams) for each appearance in front of a camera. Anonymous analysis of all face streams over time allows the software to compute people count, demographical information, people movement in time and space, and to detect frequent visitors and crowds. FaceVACS-VideoScan also performs real-time identity checks against image databases to find known persons and alert appropriate staff.
Life-Safety Solution
JULY 2017 ● www.asmag.com
█ KEY FEATURES: • Safety information panel • Real-time head counting • Smart tablet mustering • “Swipe Safe” muster points • Automated “Missing List”
generation • Missing list designated printer
Supplier: TDS URL: www.tds.ie
8
█ KEY FEATURES:
• Tracks multiple faces simultaneously • Compares faces against image galleries in real time • Displays real-time signals when user-defined events occur • Displays and exports statistics about people flow, visitor demographics and client behavior • Sends signals and statistics to mobile devices • Supports interactive enrollment from still image and live video stream Supplier: Cognitec Systems URL:www.cognitec.com
BIODIT Olock WBLS
IoT Fabrix Fleet Control
Olock WBLS is an innovative wireless biometric device for access control. It provides strictly controlled user access to different rooms or areas through fingerprint identification. There is no need for keys, magnetic cards, passwords, etc., which can be stolen, lost, broken or forgotten. Olock WBLS is connected via Gateway to the Biodit management software. The secure encrypted 128-bit connection is based on ZigBee protocol. This connectivity simplifies installation using standard computing resources. The wireless technology does not need any building reconstruction, repair or wiring works.
Fleet Control is an end-to-end connectivity solution, allowing each user to track multiple devices and/or any vehicle remotely, allowing the possibility to provision devices, extract reports, enable geo-fencing on vehicles and engage better with the end customer. New and in-depth insights into vehicles’ performance can cut costs while the easy-to-use interface offers advanced logistic opportunities. █ KEY FEATURES: • Monitor where and when machines are being used and get alerts
when they operate within virtual boundaries • Track total mileage and fuel levels per machine while keeping track
of the speed at specific times and locations • Get notifications when a machine requires maintenance and export
█ KEY FEATURES: • Fingerprint biometrical identification technology • Compatible with different door thicknesses from 30 to
machine history to excel with one click • Visualize driving behavior through acceleration and braking habits,
115 mm • Bi-directional wireless communication between the
control software and the Olock device • Compatible with ANSI embedded locks • Anti-panic function, the door can always be opened from
and notice trends over time Supplier: IoT Fabrix URL: www.iotfabrix.com
BASED ON A HOSTED WEB ACCESS MANAGEMENT SERVICE
inside by using the handle • Visual warning with red and green leds on access
Supplier: BIODIT URL: www.biodit.com
Navisat
Warehouse Management System Designed to support warehouse or distribution center management and staff. This system facilitates daily planning, organizing, staffing, directing, and controlling the utilization of available resources and stock movement in and out of the warehouse. RFID warehouse management systems identify and transmit identity in the form of a unique serial number of a product wirelessly. It reduces time, labor and improves real-time data accuracy. This technology connects products to the internet for tracking purposes so that information can be shared with businesses across the supply chain. In tracking products throughout the supply chain, often active and passive RFID systems are combined to provide gain visibility where products are in real time. Used with GPS technology, goods can now be traced while in transit. █ KEY FEATURES: • Reduce labor costs • Prevent the distribution and sale of counterfeit products • Decrease the need for manual checks and counts • Reduces inventory handling costs • Improves order fill rates • Increases distribution center productivity
Supplier: Navisat Telematics URL: www.navisat-gps.com
InnoSenT
IoT Fabrix | FLEET CONTROL
ISYS-5010 Radar System Detection and separation of moving and stationary targets according to their speed, range and azimuth angle allows the possibility to detect a target in a 2-dimensional environment. High speed modulation concept for best signal to noise performance. Simultaneous capture of speed, distance and angular deviation of a target. Complete signal processing included. Target list output on SPI, UART. █ KEY FEATURES: • MIMO-Radar working in
the 24 GHz ISM band • Simultaneous capture
of speed, distance and angular deviation of a target • Detection of targets up to 54.9 m in distance • Unambiguous velocity: 34.9 km/h • FOV ±75° with an angular resolution of 16° in azimuth • Target list on SPI Supplier: InnoSenT URL: www.innosent.de
9
NEWS FEATURE a&s explores topics that are generating interest in the security industry, offering readers important facts and information relevant to their profession.
Why Eagle Eye Bought Panasonic’s Cloud Services The cloud-based security solutions provider Eagle Eye Networks has acquired Panasonic Cloud Management Services Europe, which owned Cameramanager and Nubo. Combined with the latter, Eagle Eye is now the world’s first global cloud video surveillance company. BY Prasanth Aby Thomas
I
n an exclusive interview with asmag. com, Dean Drako, CEO of Eagle Eye Networks, explained the vision behind the company’s decision to enter into the deal at this time. “Eagle Eye has been very successful in the North American market,” Drako said. “I am pretty confident that we are the largest cloud video surveillance company in North America. We also started very early in our work in Asia, with a strong team there. So we have been doing very well in parts of Asia — Japan, Australia, Singapore [and] Hong Kong as well. But I had so much executive bandwidth and so we have not put a whole lot of effort into the European market.” He added that the company began its move into the European market about a year ago, and although it got some good traction in the U.K., Eagle Eye was not happy with the results in the continent. Drako has known the Panasonic Cloud Management Services team for quite a
APPLICATION CASES
$8.7 trillion JULY 2017 ● www.asmag.com
Global healthcare spend to reach US$8.7 trillion by 2020. Source: Deloitte
10
while and as he began considering the European market more seriously, a deal with the Japanese company seemed appropriate. Asked why Panasonic would consider such a deal, Drako said that the company had come to a realization that open systems were the future as opposed to proprietary systems. “If you look at the history of the IT world, which Panasonic is very familiar with, open systems like Ethernet and Linux have generally won, and closed systems have generally staled in the market place
in the long run,” he said. “The system that Panasonic (Cloud Management Services) was proposing was kind of closed, really only for Panasonic cameras, and they did not really have a good way to support a broad spectrum of cameras, because they were Panasonic. Whereas the Eagle Eye system is open with thousands and thousands of cameras with every manufacturer. The Cameramanager team really wanted to be part of that winning solution. Panasonic would be able to provide a better product for their customers and
COMMERCIAL
RENTAL COMPANY UPGRADES TO KABA ORACODE LIVE
Twiddy & Company, located in Corolla, U.S., is a premier rental management company that serves and represents nearly 1,000 Outer Banks vacation rental properties and four-wheel drive beaches. They wanted a system that could provide real-time notifications and alerts, and found it in Kaba’s Oracode access control system. The solution provides keyless access for temporary users, such as vacation renters and corporate housing tenants. Using a time- and date-specific code, Oracode eliminates keys and cards as well as time-consuming access control management. The addition of Oracode Live provides all the features of the standalone system and now adds real-time notifications and alerts, such as guest first arrival and internet down. Additionally, it also integrates into the BeHome247 energy management system, streamlining property management operations by allowing managers to monitor and control temperature, lights as well as pool and spa settings.
Here is a Solution to Stop Illegal Waste Dumping! Illegal garbage disposal, or fly-tipping, is a major problem that hinders city development. Now, a security company has come up with a mobile surveillance solution that can monitor the streets and help authorities catch those who are engaging in illegal waste dumping. BY Prasanth Aby Thomas
S “Customers really liked the idea of the additional technical capabilities that Eagle Eye brought in.” better support and their customers will be happier.” And the customers who have been briefed about this deal prior to the public announcement seemed happier indeed, according to Drako, who said that they have been extremely enthusiastic. They really liked the idea of the additional technical capabilities that Eagle Eye brought in and the fact that they would now be working with the largest cloudbased surveillance solutions provider in the world.
TROPS Technologies, a Latvia-based company, deals with illegal waste dumping by offering high-quality evidentiary video footage. This is possible due to a mobile battery-operated concept that keeps the system switched on constantly so as not to lose a single frame. The owner of the STROPS AVS can use the system for almost a week without recharging the battery. STROPS offers everything that the customer needs in terms of a professional remote video surveillance system. Speaking to asmag.com, Normunds Stepans, Founder and CEO of the company, explained the software and hardware combination behind their solution that makes them stand out in the market. “There are six critical components without which a video surveillance system does not work — a video camera, the server, the VMS, the infrastructure, the power source and, in some cases, the internet,” Stepans said. “For mobile systems, there is also a battery, a mobile router, a set of antenna and casing. We put all of these components together and made them easy to use with an additional monitoring platform that allows you to track all of the systems at once. STROPS AVS captures video in its cache memory up to 15 seconds before the event starts and when an alarm has been triggered it takes video out of cache and stores it to local memory, thus ensuring that you never lose a single frame and can capture illegal activities in site.” Making it all the more attractive is the fact that STROPS AVS comes ready to use, is easy to install, and is battery-powered, stable and affordable. In addition to video surveillance features, the STROPS partner portal makes it possible to track all activities related to the video surveillance system, including state of charge information, communication and signal strength, the location of the camera, etc. The user is always informed about the mobile video cameras and systems.
TRANSPORTATION
US TRANSPORTATION AUTHORITY USES VIDSYS FOR MANAGEMENT Three years ago, the Massachusetts Bay Transportation Authority (MBTA) transitioned from approximately 700 analog cameras to upwards of 10,000 cameras using VidSys to control and manage video, access control and monitoring, along with emergency phone and intercom systems. PSIM has helped the MBTA to not only integrate legacy security systems, have a centralized command and control strategy for its security operations, but also to save money by leveraging price points from different security vendors. In particular, the PSIM system helped the security team with video surveillance during the Boston Marathon. Stakeholders worked with MassDOT/MBTA to integrate cameras from many vendors/networks. The Vidsys platform was used as a video user interface and was accessible from more than 10 command and control centers. Cameras and fields of views were mapped and labelled on Google Earth, while a comprehensive video surveillance map was developed and distributed to key agencies and command centers.
11
VERTICAL SOLUTION
Addressing
Securityand Management in Hospitals
JULY 2017 â—? www.asmag.com
Security in hospitals is a complex thing. Patient safety is indeed paramount; however, this is tempered by the need for systems that are discreet enough to put them at ease. The evolving healthcare environment is forcing security teams to think beyond mere access control and video surveillance, and incorporate new technology to manage resources and staff. To complicate things further, cybersecurity has become an important issue as well, with hackers targeting not only sensitive patient information but also life-saving medical equipment. The following articles aim to shed some light on these topics and point out key actions healthcare organizations can focus on to enhance their security systems. BY Prasanth Aby Thomas
16
FRAUDULENT ACTS DONE WITH STOLEN DATA FROM HEALTHCARE BREACH: Access/modify health records
Purchase items 37% Fraudulently receive care Source: Accenture
Fraudulently bill for care Fraudulently fill prescriptions
TOP PLACES BREACHES OCCURRED WERE IN:
HOSPITALS 36% URGENT-CARE CLINICS 22% PHARMACIES 22% Source: Accenture
ONE IN TWO CYBERSECURITY BREACHES RESULTED IN MEDICAL IDENTITY THEFT. Source: Accenture
AVERAGE OUT-OF-POCKET COSTS PER INCIDENT: US$ 2,500 Source: Accenture
17
SMART TECHNOLOGY
Drones Boost the Security Industry With Eyes in the Sky With the rapid development and incorporation of technologies like artificial intelligence (AI), deep learning and machine learning, unmanned aerial vehicles (UAV) are becoming increasingly popular in the security industry. BY Prasanth Aby Thomas
A JULY 2017 â—? www.asmag.com
lthough the Federal Aviation Administration (FAA) in the U.S. has come up with a strict code of conduct for commercial drones, most countries are yet to come to terms with the rapid rise in their popularity. However, this has not stopped the drone industry from making bold strides forward, coming up with innovative technologies and solutions. Companies are eagerly investing money in this sector, experimenting with the hardware and software as well as their applications.
26
Lack of regulations has not stopped users from making full use of these flying machines either. In fact, in several parts of the world, drones are increasingly being used in many industries, solving problems that have hitherto remained tedious, costly or even impossible. From security to agriculture to manufacturing and retail industries are now beginning to take advantage of the benefits that drones bring. According to a report from the research firm MarketsandMarkets, the global UAV/drones market is
"According to MarketsandMarkets, the global UAV/drones market is expected to increase to US$21 billion by 2022, growing at a CAGR of about 20 percent from 2016." expected to increase to US$21 billion by 2022, growing at a CAGR of about 20 percent between 2016 and 2022. Among the various industries
that are actively making use of drones, security stands out as an important vertical.
The Increasing Role of AI in Drones
Categorizing Drone Operation in Security The security industry has always depended on technology to ensure maximum efficiency, especially in the form of advanced electronics, sensors and video. However, despite several companies coming up with innovative security solutions over the recent years, the industry largely requires, and depends on, human involvement. The arrival of drones is, to some extent at least, changing this. With their speed, maneuverability, size and
W
ith the advancements in technology and reducing costs, autonomous drones are becoming increasingly popular in various industries. The fact that you can assign a drone to accomplish a task without having a pilot navigating it has made them attractive to customers who wish to automate their processes, saving labor and Developments in artificial operational costs. intelligence ensure drones However, as the number of self-flying drones increases, fly safer and are more there are also growing concerns on technologies to ensure effective. these machines operate without colliding against each other. In fact, this fear has been one of the major factors hindering the development and market adoption of autonomous drones in general. Fortunately, there are now some innovative companies trying to deal with this issue and offer solutions that would enable drones to navigate through the skies without problems. One of them is the San Francisco-based Iris Automation. According to Alexander Harmsen, CEO of the company, Iris Automation has created a solution that allows the drones to see what is around them. “We’ve built a collision avoidance ‘sense and avoid’ system for industrial drones so that they can see the world the way a pilot can,” Harmsen said. “It’s 3D reconstruction and dynamic tracking of moving objects at long ranges, in order to keep the aircraft safe while they fly in national airspace, potentially beyond-visual-line-of-sight.” The solution is completely based on computer vision, harnessing the recent breakthroughs in embedded computing Developments in AI are equipping drones with software capable of understanding, segmenting and classifying objects in the and cameras to its advantage. The company surrounding. has built proprietary algorithms that Image source: Iris Automation allow their system to operate in outdoor, unstructured environments, onboard in real-time ranges that apparently no other company has ever attempted. Harmsen believes that fitting all this into a tiny module that weighs 300 grams and is actually affordable will be a game-changer for the entire industry. At the core of Iris Automation’s solution is a software that runs on an embedded GPU. The software is capable of understanding, segmenting and classifying objects in the surrounding, as well as being able to completely, geometrically, recreate the environment into an internal world model. “Propagating forward in time allows the system to assess Alexander Harmsen, CEO, Iris whether we will actually collide with anything or not, allowing Automation the system to take an avoidance action,” Harmsen added. “Of course a lot of this is not possible without the underlying deep learning and artificial intelligence onboard.” The arrival of AI has clearly revolutionized the drone industry. Before this year, drones were blindly following GPS waypoints or following the direct instructions from a pilot’s joystick or controller. Iris Automation’s solution, based on AI, allows drones to actually see the world the way a pilot does and make real-time decisions to help the mission or to actively keep the drone safe from any possible collisions.
27
INTEGRATED SYSTEM
Advances in Video Keep Perimeters Safe Perimeter detection is usually the first line of defense for end-user organizations, especially critical facilities such as airports, air refineries and military bases. Detection of intruders and responding to them, therefore, has become vital for operators. Today, video surveillance has become more and more advanced and is used for both intrusion detection and verification purposes. BY William Pao
A
JULY 2017 ● www.asmag.com
major advantage of video is it actually sees what’s being detected. “Advanced surveillance technologies provide fewer false alarms than conventional detection sensors, which can be triggered by a variety of factors including weather and wildlife,” said Mike Prysock, Global Vertical Market Manager for Airports/ Seaports at Pelco by Schneider Electric. “Sight is the primary sense for humans, as such, this is the sense we go to in critical situations and the sense we tend to believe over all our other senses. So even if another sensor provides a warning, humans will want some form of visual verification to confirm what they are being told is true,” said Eric Olson, VP of Marketing at PureTech Systems. The most important component in a video-based perimeter detection system is the camera. For detection, thermal cameras are almost always used as they can overcome some of the issues encountered by visible cameras. “Thermal cameras are very, very precise. If you were using analytics with visible images, you’d run into a lot of nuisance alert problems with stray lighting and other issues like headlights in the dark and rain and puddles, but thermal is resilient to all those problems. It becomes almost the perfect human detector,” said John Romanowich, President and CEO of SightLogix. In most instances, thermal and visible cameras are used in conjunction with one another. “What you’ll find around the perimeters these days is a thermal camera for detection, and that thermal can be augmented with a visible camera
32
so the user can get a lot more details about the target,” Romanowich said. Usually, detection of an object by a thermal camera can trigger a PTZ
camera to zoom in on that object. “The combination of thermal for detection and PTZ dome camera to pinpoint and collect visible information brings
Radar Gains Popularity as a Perimeter Solution More and more, radar has become a popular perimeter protection option that offers superb performance as well as competitive prices. Radar, which stands for radio detection and ranging, is an active sensor. It sends signals into the environment and then listens to the energy returns that get back — if there’s a person who appears and that person has not been there before, the radar can sense that and show it to the operator. Compared to other sensors, which detect the presence of an intruder, radar offers more information about the target. “Depending on how the radar is operated, the received information can be used to provide the following information: movement, movement direction, velocity, distance and angle information,” said Martin Maidhof, Key Account Management for Security Business Unit at InnoSenT. Another advantage of radar is it is unaffected by various environmental factors. “It is a very robust technology that can be operated in any weather condition,” Maidhof said. “Radar has no problem with light
Stewart Dewar, Product Manager, Senstar
Bernard Lee, VP, Sensors Business Group, ST Electronics
a big advantage for the first layer,” said Andrea Sorri, Business Development Director for Critical Infrastructure at Axis Communications.
Smarter Than Ever The video feed taken by the cameras is then analyzed by video analytics, which generates an alarm when certain predefined conditions are met. Today’s analytics has become more intelligent than ever and is capable of more than issuing an alarm when an object enters a specific region. It can restrict alarms by the object that is detected, be it a human, an animal or a car, or by the action taken by the object, for example loitering,
Martin Maidhof, Key Account Management, Security Business Unit, InnoSenT
tailgating or dropping an object. “Other developments include the capability to perform video analytics on all types of moving platforms; vehicles, UAVs, boats, and the continued trend to combine intelligent video with other sensors for a more robust solution, such as radar, GPS, fence, gunshot detection, access control and Internet-of-Things (IoT) devices,” Olson said. “The availability of open source neural network software has had an impact on the video analytics market. Deep learning has definite applications for some types of video detection, and it has been proven to decrease nuisance conditions for these types of installations.”
reflections, dust, fog or rain. It works in any weather condition.” Radar’s maintenance cost is relatively low, requiring little cleaning over a stretched period of time. But more importantly, radar can cover a wide area, from a few meters to couple of kilometers. This makes it a cost-effective solution compared to other technologies: according to experts, a few radars securing a 15 to 20 kilometer-fence would cost about half the money needed to do so with fixed, high-quality cameras. Radar lowers the burdens of operators who do not need to stare at video surveillance monitors the whole time. But this is not to say the user should get rid of their cameras altogether, as video can still offer visual verification of certain objects that are being detected. In fact, a radar system integrated with video optimizes perimeter detection, fulfilling the user’s detection and verification needs. “The combination of radar technology with other technology like video surveillance becomes more and more important on the market. The benefit of such a solution is to combine the advantages of each technology to reduce false alarms and increase the efficiency of such systems,” Maidhof said.
Eric Olson, VP, Marketing, PureTech Systems
Detection accuracy can improve significantly if the camera is geo-registered, able to determine the distance of various objects in the camera’s field of view. “A dog at 10 meters from the camera is approximately 250 times larger than a man at 300 meters appears to be. Cameras that lack geo-registration will see the dog as the larger object and send an alert, while ignoring the person-sized object in the distance,” Romanowich said. “A camera with geo-registration will be able to adjust its size calculation for distance, determine that the man is actually bigger than the dog, and recognize him as a more credible target because of his size.” The VCA can reside on cameras, servers or even edge boxes, depending on application. “The difference for the user typically comes down to the desired complexity level of the detection algorithm, or the desire to analyze higher-resolution video. Due to limited space in a camera housing, camera-based VCA algorithms tend to be restricted by processor speed, data throughput and available memory. Servers will always be the most affordable solution if you desire the highest performing video algorithm,” Olson said. “Edge boxes are a great alternative between camera-based and server-based solutions. They are small, environmentally rugged devices, that are installed in the vicinity of the cameras but are typically dedicated to video analytics. This dedicated computing power allows them
33
INTERNET OF THINGS
Adding AI and Machine Learning to Video Surveillance Video surveillance has moved beyond simple video recordings and footage. The introduction of artificial intelligence (AI) and machine learning has changed the way surveillance is being viewed. Humans have the ability to view and analyze the data being shown but there is always a limit to the amount of information being received. On the other hand, AI’s capacity to gather information is virtually limitless. With the help of machine learning, it can increase accuracy of applications involving people counting or suspicious behavior detection through assigned commands or learning from past mistakes. In this article, we feature several video surveillance solutions with AI and machine learning functionalities. Many are used to analyze video feeds and determine the next steps to be taken, while some integrate the use of sensors to further increase the amount of data being gathered. BY Ryan Liu
IronYun AI NVR
Surveillance systems often contain hours upon hours of footage. With IronYun’s AI NVR, operators can receive video footage that contain the most relevant information.
JULY 2017 ● www.asmag.com
Positioned by the company as the industry’s first deep learning-based video search NVR, its ability to use natural language greatly reduces the time spent on searching through recordings by only displaying videos that match the description input by the user. The company uses its own artificial intelligence in its NVR for deep learning and training to detect and analyze the data collected. The AI uses natural language input description of people, faces, cars, buses, motorbikes, colors and time and many other types of objects. The system can learn more items as the deep learning system is continuously trained. The AI NVR is able to detect objects by analyzing both live stream and uploaded video data. The whole system is made to be integrated with existing NVRs or IP cameras, but users are able to choose to deploy the AI NVR as a standalone unit. Company: IronYun/U.S. URL: ironyun.com
36
Xovis PC3 3D Stereo Vision Person Tracking Sensor Counting the number of humans on a video stream can be a difficult task especially in crowded areas. Xovis PC3 3D Stereo Vision Person Tracking Sensor takes away the challenge of counting every person in the footage by accurately tracking and counting each person that appears in the sensor’s vicinity. Up to nine sensors can be quickly configured and the system is able to track people from one sensor to another without the use of additional
hardware or software. The sensor gives each person his own ID once he enters the area being covered, allows up to 99 independent counting lines, and monitors forward and backward crossings. PC3 sensors can also configure and monitor up to eight zones with a single sensor. It can give the number of occupants in a particular zone. The zone can be used as an activation area where a dedicated counting performs a logical function. Real-time analytics is processed by the sensor itself without the need for a video stream. Company: Xovis/Switzerland URL: www.xovis.com
Vi Dimensions ARVAS Smart Surveillance System
The ARVAS system utilizes machine learning to automatically analyze hours of data to find potential threats and unusual patterns. It reduces false alarms and increases the detection of potential threats based on the detection of new anomalies. With machine learning, the system simultaneously analyzes multiple moving figures such as in crowded areas. All this can be done without the user specifying rules for finding abnormalities and threats, which greatly reduces the need for a human operator to monitor every scene. ARVAS can be integrated with existing cameras, video management and video analytics systems to effectively enhance the overall surveillance network. Learning from its environment, the system can pick up on incidences such as aggressive behavior or suspicious activities like loitering or someone carrying unusually large objects. The AI can also help increase safety by spotting mischievous behaviors like children jumping over barricades, barriers or entering unsafe and restricted zones. By further increasing productivity for operators, the AI will automatically list the top 10 abnormal events based on the camera or geographic location so the user can focus on the next step of action. Company: Vi Dimensions/Singapore URL: vidimensions.com
Umbo SmartDome
The PoE SmartDome is a self-learning camera that does not need a NVR, it stays connected and continuously monitors its assigned view. It records and plays back 30 or more days of HD video using surveillance-grade onboard SD storage cards of up to 512 GB. The camera features an image coverage of 112.4 degrees across and 129.3 degrees diagonal and is tri-axis with dual plane 360 degrees mounting option. The SmartDome is able to withstand temperatures ranging from -40° to 122° Fahrenheit and is equipped with IP66 and IK10. The camera comes with a neural network-based AI that gets smarter over time by learning from the objects it spots and gives alerts when necessary. Its ability ranges from simple people counting to detecting trespassers and objects left behind. Umbo’s AI will automatically tag objects that are of concern to decrease the time spent on searching through playbacks. The AI is integrated into Umbo Shield for management of video monitoring devices. Company: Umbo Computer Vision/U.S. URL: umbocv.ai
37
MARKET UPDATE
EMEA Market: Security Evolves Amid Threats, Smartness Trends Overall, EMEA is a growth market as the region slowly walks out of the shadows of the recession that dominated from the late 2000s to the early 2010s. Demand has risen further amid a spate of terrorist and cyberattacks of recent. Further, with people demanding more out of their security, providers are developing non-security solutions to help meet users’ business intelligence needs. BY William Pao
B
y segment in the EMEA market, Europe and Africa are expected to see flat to significant growth, while the Middle East is faring worse due to a continuing oil price slump and other factors. Altogether, security players expect doubledigit growth for EMEA, albeit such optimism is accompanied by a sense of caution due to various geopolitical uncertainties. Continental Europe is expected to see somewhat flat growth amid strong competition. “We are very strong in Western Europe, and Eastern Europe is a little bit more difficult because we have more price pressure from Chinese manufacturers,” said Baudouin Genouville, Business Development Director for EMEA at Suprema. “End users don’t always want to spend money for expensive devices.” “Europe is somehow flat. The unit price itself is going down,” said Gerard Figols, Manager for Product Marketing at Panasonic Europe. “From our side, we see there are some customer looking for high-end products, adding value to their business environenviron ments. That’s why we are focusing on those vertical markets where we can deliver products that are needed, technologies that can help customers gain value. These include finance, retail and city surveillance.” Compared to Europe, Africa is a growth market where more projects are being rolled out. “We have a nice business in South Africa, although it can be better,” said Genouville. “We are very strong in North Africa — Morocco, Algeria, Tunisia — we have good business there, and we have very good partners as well. We have started two airports in Morocco.” “Africa is catching up very quickly, and there is a lot of projects and investment in Africa,
JULY 2017 ● www.asmag.com
Yury Akhmetov, Business Development Director, AxxonSoft
42
Raziel Bareket, Director, North and South Europe, Milestone Systems
Stuart Bettle, Video Product Marketing Manager, EMEA, Tyco Security Products
especially in security,” said Yury Akhmetov, Business Development Director at AxxonSoft. “There’s a lot of investment in Eastern Africa and Southern Africa, and North Africa is recovering from all the wars.” The Middle East, on the other hand, is beset by regional instability as well as a price dip in oil. “If we look at the Middle East, we have some challenges with the oil. That is an industry challenge — when the Middle East doesn’t get more money from their oil, they have less money to play with, and that of course has an effect on us,” said Raziel Bareket, Director for North and South Europe at Milestone
Marie Clutterbuck, Marketing Director, Simon Cook, Sales Engineering Digital Barriers Manager, EMEA and APAC, Genetec
Aude Desbrieres, Marketing Manager, OPTEX Europe
can still be affected by uncertainties. “The EMEA market is full of opportunity, but that opportunity is tempered by the idea that there is a lot of geopolitical uncertainty, the idea that many elections have just occurred, that you move from a conservative government to a more liberal government and vice versa, and with that the priority for spending may change. The biggest uncertainty is going to be in large public works projects and large government-funded projects, as different candidates have different priorities on national security spending,” said Peter Kim, Senior Director at IDIS. According to Kim, this tests a solution provider’s ability to be flexible and agile. “This is where IDIS really leads. We provide flexible solutions that are adaptable to any need or any size. When large projects contract or grow uncertain, it’s important to not be so tailored to one set of requirements that you don’t have the ability and agility to adapt, both within a project or a marketplace,” he said. “When you offer products that work, for any need, of any size, in any vertical, you are in a much better position to respond to changes, because when new priorities emerge, you are already ready to meet them.”
Evolving Amid Physical, Cyberthreats While the EMEA market has a unique set of needs, none compares with the need to protect people and assets against physical and cyberthreats that have become more rampant of recent. Solutions offered by security vendors evolve around that need and are equipped with advanced features to better protect users.
Systems. “Due to all the wars, the Middle East is very slow now. There are three big wars in the Middle East now, and there’s a lot of conflicts between Arabic countries as well,” said Akhmetov. “Oil price is very low, so the Middle East doesn’t have much money, and they don’t have much budget for security. They approach the manufacturers and installers asking for security solutions, but finally they can’t pay. They try to cut prices, but you can’t cut prices for hardware and storage.” Overall, most security players are still optimistic about EMEA, saying double-digit growth is expected. “I think in 2017 and 2018 there will be probably 25 to 30 percent growth, which is a little bit down from 2015 and 2016,” Akhmetov said. “We estimate growth to be 30 percent next year in the (EMEA) countries where we have a branch,” said Genouville. That sense of optimism, however, is accompanied by a sense of caution as the market
Concealed Weapons Detection Needless to say, terrorism is a real threat in Europe, as demonstrated by a recent spate of incidents in
43
VIEWPOINT
The Many Layers of Commercial Building Risk Management The first key component to smart building design is risk management, according to Andrew Flint, Technical Director for EMEA at Anixter. This year at IFSEC International Flint addressed how deploying a layered physical security strategy can help end users reduce the risk of breach and increase peace of mind. BY the a&s Editorial Team
N
ow a d ay s, we s e e m o re and more buildings becoming smart by utilizing automation and technologically advanced security systems. This year at IFSEC International, Andrew Flint, Technical Director for EMEA at Anixter addressed the five pillars of infrastructure best practice for commercial buildings: risk management, network performance, workplace productivity, space utilization and Internet-
of-Things enablement within the commercial building space. Of these five pillars, Flint focused on risk management and explained how it is the first key component to building a smart commercial building.
The Five Layers of Physical Security In terms of what is driving physical security in commercial buildings, Flint pointed to the integration of building management, providing a safe and secure workplace, and achieving that with open architecture technology. To provide a safe workplace environment, ensuring every layer of a building is secure is of utmost importance. Flint pointed to five layers of physical security in commercial buildings: the perimeter, reception, floor levels, specialized zones and technical spaces. Properly securing each and every one of these layers is the first and most crucial
Technology in Smart Buildings Technology is constantly changing and as such requires updating and replacement.
JULY 2017 ● www.asmag.com
In a commercial building, the technology investment cycle for network hardware, servers, IT hardware, etc., tends to lean toward a three to five year lifecycle, according to Andrew Flint, Technical Director for EMEA at Anixter. Cable in a building tends to have a longer lifecycle of 10 to 15 years. “In terms of the security of a structure, it should be considered at least every five to seven years because the security hardware is changing, and the threats to that security hardware are changing as well,” he said. “If we go back five years ago, IP was in its infancy… Now you
50
look around and everything is IP,” he noted. “Where we are today is interoperable systems where there is an open API and with a little bit of software coding we can make system one talk to system two. It might not work straight out of the box, but with a little bit of understanding and a little bit of coding the two systems can be made to talk to each other.” In terms of investment, Flint explained that because technology is changing so quickly it does not need to be considered as part of a planned investment, instead it would be part of an unplanned upgrade at a given time.
When setting up perimeter security, it is important to consider how to control who gets into the building and when, manage entrances and exits after hours, monitor parking facilities, prevent unauthorized building access and prevent incidents on the premise. These challenges can be mitigated by deploying outdoor LED lighting, emergency communication systems, day/night video surveillance, access control and intrusion detection sensors.
The Reception Area The second layer of building security addresses the reception area and how to control employee and visitor traffic. Identity and visitor management are key parts of reception security. It is important to consider whether the building has multiple tenants, and the role of reception in enforcing security policies. Reception solutions should include identity management, credential management, visitor management, badging systems, integrated video and access control.
The Floor Levels On floor levels, visitor and employee traffic should be monitored for safety and access to various parts of the building. Considerations should include identifying key business areas to protect, how to secure departmental assets, how to comply with privacy regulations, and how to integrate active directories with security. Flint pointed to a number of solutions, including open architecture security systems, corporate day lockers, workplace asset management, restricted key systems, destination dispatch, restricted access level control, remote video management, fire detection and suppression, advanced notification and occupancy control. Utilizing such systems could assist with building traffic between work areas and the Commercial buildings spent US$4.4 billion globally in 2016, execution of emergency evacuation plans.
Commercial Building Surveillance
according to Andrew Flint, Technical Director for EMEA at Anixter.
Furthermore, he noted 22 percent of global video surveillance is used in commercial buildings. Of the $4.4 billion spent by commercial buildings, $3.3 billion was spent on IP surveillance, with the remaining going to analog systems. Flint pointed out that five years ago these numbers would have been reversed, with the majority going to analog instead of IP. While analog systems still have their place in the market, IP is better for managing risk, being proactive and reducing false alarms. At the same time, Flint acknowledged the challenges of IP: “By putting systems onto the network, from a network point of view, you’re increasing the attack surface for the network.� The ease of hacking video surveillance systems is made easier by end users that fail to take the necessary precautions to secure their systems. For example, a large number of end users do not change default passwords or device names. This makes hacking a system all the more easy for intruders looking to take advantage of such weaknesses.
Specialized Zones Specialized zones include key business areas such as human resources to executive offices that require careful security attention. It is important to secure department assets, comply with privacy and information regulations, and integrate your active directory with security systems. Open architecture and restricted key systems, as well as corporate day lockers and work place asset management, can assist in the protection of valuable resources and information in these specialized zones.
The Technical Space step to constructing a safe and smart commercial building.
The Perimeter The property perimeter is not just a boarder, it is the first layer of commercial building protection, according to Flint.
Lastly is the technical space; the most critical layer of building security, as it protects networking infrastructure, IT servers and data storage. Oftentimes this layer is comprised of multiple rooms involved in IT security. Deploying solutions such as identity recognition access control, video verification and server and network cabinet-level locking systems can not only assist in securing this space, but also help with regulatory compliance, including the Sarbanes-Oxley Act in the U.S. and Payment Card Industry Data Security Standard (PCI-DSS).
51
SMAhome S T A T S
&
F I G U R E S
North America and Europe to Keep Leading Smart Home Market
M
arket research firm Transparency Market Research published a forecast on the global smart home market between 2017 and 2025. The North American market will keep leading the industry, while the Asia Pacific region will have higher growth than other markets, according to the report. Increasing internet
penetration rates, availability of high-speed internet worldwide, and price drop in processors and sensors were pointed out as factors that will drive the growth of the global smart home market. On the consumer side, the need for more efficient energy use will drive sales in smart thermostats and smart energy solutions, among other product categories. The report predicts that the global smart home market size will grow from US$30 billion in 2016 to $97.6 billion in 2025, registering a CAGR of 14.6 percent. Regionally, North America will lead the market from its existing basis of 38.7-percent market share in 2016, the report says. Along with Europe, the second largest smart home market, the western world will create most opportunities for smart home manufacturers.
Smart Home Market in UK to Grow at 24% Through 2021
T
JULY 2017 â—? www.asmag.com
he UK smart home M2M market will grow 24 percent annually between 2017 and 2021, according to a report released by market research company Technavio. Smart Home M2M is defined as a technology that has an intrinsic network, intelligent control system and home automation system as its basic components. The six major application segments in the U.K., according to the report, are energy management and climate control systems, home appliances, lighting control systems, home entertainment systems, security and access control systems and healthcare systems. Three market drivers are highlighted for contributing to the growth of the smart home M2M market in the U.K. They are increased installation of smart meters, rise in the use of thermostats, and adoption of cloud-based technologies. A smart meter combined with an in-home display offers real-time data about the use of gas and electricity. These smart meters help the consumer monitor and control energy devices effectively using energy management systems. Therefore, peak demand rates and blackouts can be avoided by installing these devices instead of the traditional systems.
54
One-Third of US Broadband Households are Familiar With Smart Home Devices
R
oughly one-third of US broadband households are familiar with smart home devices, with even more people who see value in smart home devices, including smart door locks, video door bells and networked cameras, according to research conducted by Parks Associates. This indicates a robust opportunity for broader adoption and usage, according to the research institute. “More than one-fourth of households
own at least one smart product, but only 12 percent own a smart home system,” said Tom Kerber, Director of IoT Strategy at Parks Associates. Smart Home: Quest for Compelling Use Cases from Parks Associates shows that nearly 70 percent of smart product owners own a device that is not connected to a smart home system and only 35 percent of smart product owners have the product integrated into a smart home system.
Smart Home Market Transition to Early Majority Adoption
T
he smart home market is experiencing strong growth and is preparing the transition from early adoption to the early majority, says Tom Kerber, Director of IoT strategy at Parks Associates. “Natural language control and analyticsbased automation are simplifying the user experience and together act as a catalyst for the smart home market,” Kerber said. More than 100 million households out of the total 117 million in the U.S. do
not have any smart gadgets at home, according to a report recently published by research firm Parks Associates. While the rate of smart home adoption may seem slow, the research firm also pointed to the potential. Smart lighting will be the most common smart gadget at home since lighting is already the second largest energy consumer at home, just behind HVAC. The report predicts that about 50 million US households will have at least one smart light bulb by 2020.
Consumers are looking for easier ways to control lights while conserving energy.
55% of US Households Want Voice Control for Their Smart Home Devices
V
oice-control technology is gaining traction among smart home applications, and consumers have taken notice of it. According to research firm Parks Associates, 55 percent of US broadband households would like to use voice command to control smart home devices and entertainment gadgets. The report found a higher rate of positive response toward voice control among
households already using smart light bulbs, programmable thermostats, smart smoke or carbon monoxide detectors and smart garage door openers. Digital voice assistants have seen greater adoption among US households than other new consumer electronics. According to a report released by Parks Associates in March, voice assistant adoption rose from 5 percent in US
broadband households in Q4 2015 to 12 percent in Q4 2016. The growing awareness and adoption of digital voice assistants, such as Amazon Alexa and Google Assistant, heralded a rush of app development and product introductions by vendors, according to the research.
55
SHOW CALENDAR
Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.
WORLD SECURITY EXHIBITION DIRECTORY AUGUST
SECUTECH VIETNAM
San Diego, U.S. • Tel: +1-800-669-5329 • Email: info@cedia.org • URL: expo.cedia.net
• Date: 2017/08/16—08/18 • Venue: Saigon Exhibition & Convention Center (SECC), Ho Chi Minh City, Vietnam IFSEC SOUTHEAST ASIA • Tel: +886-2-8729-1016 • Date: 2017/09/06—09/08 • Email: stvn@newera.messefrankfurt.com • Venue: Kuala Lumpur Convention • URL: www.secutechvietnam.com Centre, Kuala Lumpur, Malaysia • Tel: +6-03-2176-8788 • Email: tj.tan@ubm.com • URL: www.ifsec.events/sea
SEPTEMBER IFA
• Date: 2017/09/01—09/06 • Venue: Berlin ExpoCenter City Exhibition Ground, Berlin, Germany • Tel: +49-30-3069-6924 • Email: ifa@messe-berlin.de • URL: www.ifa-berlin.de/en/
SHANGHAI INTELLIGENT BUILDING TECHNOLOGY
• Date: 2017/09/05—09/07 • Venue: Shanghai New International Expo Centre (SNIEC), Shanghai, China • Tel: +852-2238-9917 • Email: building@china.messefrankfurt. com • URL: www.building.messefrankfurt.com.cn
CEDIA
• Date: 2017/09/05—09/09 • Venue: San Diego Convention Center,
• Email: hello@nexusmediacom.com • URL: www.iotsmartsummitlondon.com
ASIS
• Date: 2017/09/25—09/28 • Venue: Kay Bailey Hutchison Convention Center, Dallas, U.S. • Tel: +1-703-519-6200 • Email: asis@asisonline.org • URL: securityexpo.org
ADRIA SECURITY SUMMIT
OCTOBER
ISAF ISTANBUL
• Date: 2017/10/03—10/05 • Venue: RAI Amsterdam, Amsterdam, The Netherlands • Tel: +31-346-590-901 • Email: service@european-utility-week. com • URL: www.european-utility-week.com
• Date: 2017/09/13—09/15 • Venue: Convention Center, Sibenik, Croatia • Tel: +387-33-788-985 • Email: summit@asadria.com • URL: ww.adriasecruitysummit.com
• Date: 2017/09/14—09/17 • Venue: Istanbul Expo Center (iFM), Istanbul, Turkey • Tel: +90-212-503-32-32 • Email: marmara@marmarafuar.com.tr • URL: www.isaffuari.com/en/
SMART SUMMIT LONDON • Date: 2017/09/19—09/20 • Venue: Business Design Centre, London, U.K. • Tel: +44-330-3353900
EUROPEAN UTILITY WEEK
SECUTECH THAILAND
• Date: 2017/11/16—11/18 • Venue: Bangkok International Trade and Exhibition Center (BITEC), Bangkok, Thailand • Tel: +886-2-8729-1015 • Email: Jason.Cheng@newera. messefrankfurt.com • URL: secutechthailand. tw.messefrankfurt.com
IoT TECH EXPO NORTH AMERICA
• Date: 2017/11/29—11/30 • Venue: Santa Clara Convention Center, Santa Clara, U.S. • Tel: +44-1170-980-9023 • Email: enquiries@iottechexpo.com • URL: www.iottechexpo.com/ northamerica
DECEMBER NOVEMBER SICUREZZA
• Date: 2017/11/15—11/17 • Venue: fieramilano, Rho, Milano, Italy • Tel: +39-02-4997-1 • Email: fieramilano@fieramilano.it • URL: www.sicurezza.it/en
MEFSEC
• Date: 2017/12/03—12/05 • Venue: Cairo International Convention Centre, Cairo, Egypt • Tel: +971-4-336-5161 • Email: sonakshi.gandhi@informa.com • URL: www.mefsec.com
COMPANIES IN THIS ISSUE PRODUCTS OF THE MONTH • BIODIT • Cognitec Systems • InnoSenT • IoT Fabrix • Navisat Telematics • Quanergy Systems • TDS
INTEGRATED SYSTEM
JULY 2017 ● www.asmag.com
• Axis Communications • InnoSenT • Pelco by Schneider Electric • PureTech Systems • Senstar • SightLogix • ST Electronics
VIEWPOINT
• Anixter • IoT Consulting • Parks Associates • Qolsys
58
VERTICAL SOLUTION
• AMAG Technology • Avery Dennison Retail Branding and Information Solutions • Milestone Systems • Vanderbilt Industries • Vizinex RFID
• Kipod Video Analytics • Sensority • Siwel • Ultinous • Umbo Computer Vision • Vi Dimensions • Xovis
SMART TECHNOLOGY
MARKET UPDATE
• Arctic Robotics • Elistair • Iris Automation • NEC • OTSAW Digital
IoT
• Alchera Technologies • Avigilon • Calipsa • Cogniac • Everseen • Face++ • Hitachi • iCetana • IronYun
• Axis Communications • Axxonsoft • CNL • Dahua Technology • Digital Barriers • Genetec
NEXT ISSUE
• Honeywell Home and Building Technologies • IDIS • Milestone Systems • Oncam • OPTEX Europe • Panasonic Europe • Pelco by Schneider Electric • Suprema • Tyco Security Products • Vanderbilt Industries • Verint Systems
Vertical Solution | Casino Integrated Systems | Intrusion Detection Systems Smart Technology | Facial and Iris Recognition Industry Report | Cybersecurity in Physical Security Systems
NEW PRODUCTS Dahua Technology
TPC-BF2120 Thermal Mini Hybrid Bullet Camera ● 160*120 VOx uncooled thermal sensor technology ● Athermalized lens (thermal camera), focus-free ● 1/2.8” 2 megapixel progressive scan Sony CMOS ● Support ROI, motion detection, color palettes ● Support fire detect & alarm ● Micro SD memory, IP67 Dahua Technology/China Email: overseas@dahuatech.com
OnSSI
Ocularis v5.4 VMS ● H.265 support ● Auto notification of new version of Ocularis Client availability ● Two-way audio ● Improved flexibility for Corporate SQL ● Triggers are now a privileged feature ● Hikvision Smart Driver support for encoders OnSSI/U.S. Email: info@onssi.com
AMAG Technology
Symmetry CompleteView ViewPoint VMS
ZKAccess
● Up to 8 desktop monitors or webcams may be displayed and recorded from a single PC ● Live viewing, playback, PTZ control associated with a camera connected to Symmetry CompleteView video ● Stream desktop monitor activity from target PC’s running Symmetry Security Management software AMAG Technology/U.S. Email: sales@amag.com
LR-UHF-12 Long Range Card Reader ● 40 ft read-range ● Built-in Wiegand-Out port which can be connected to most any access control panel ● 125 kHz frequency ● Electronics sealed in weather-resistant epoxy potting ● 9 to 12V DC power supply ZKAccess/U.S. Email: sales@zkaccess.com
Matrix
COSEC Field Visit Management ● Web-based field employee’s portal ● Real-time monitoring of time attendance ● Automatic attendance marking for employees using GPS ● Better planning of field employees ● Accurate and quick salary payments ● SMS or email notifications to supervisor/employees Matrix Cosmec/India Email: More@MatrixComSec.com
Pelco
VideoXpert Professional Surveillance Systems for SMB Installation ● Designed for Unicast or multicast environments ● Up to 450 Mbps throughput per recorder ● Supports attached storage (NAS) to extend video retention ● Includes pre-defined roles for easy user creation ● Software extensible through plug-ins ● Supports ONVIF S compliant 3rd-party cameras and devices Pelco by Schneider Electric/U.S. Email: sales@pelco.com
JULY 2017 ● www.asmag.com
PlateSmart
Gemalto
● ARES Insights ● Camera calibration utility ● Edge dynamic motion detection ● Integration with Verint VMS ● Region-ofinterest definition in Edge LPR software PlateSmart Technologies/U.S. Email: sales@platesmart.com
● Built-in integration templates ● Supports long-term IAM strategy ● Risk-based analytics and detailed access policies ● Provides the right level of visibility into workforce identity and access activities & events ● Centralized access management ● Regulatory compliance Gemalto/France Email: orders@safenet-inc.com
Analytic Recognition Enterprise Solution (ARES) Platform, ARES 2.4.5
60
SafeNet Trusted Access Cloud-Based Access Management
NEW PRODUCTS FLIR
Quasar 4K Fixed Box Camera ● High performance true day/night camera ● 4K at 30 fps or 1080p at 60 fps with enhanced low light performance mode ● Multi-stream adaptive streaming ● P-Iris and DC-Iris capable ● H.264, H.265, ONVIF profile S/G ● Bi-directional audio FLIR Systems/U.S. Email: visiblesales@flir.com
Arecont Vision
Hikvision
MicroDome G2 IP Megapixel Cameras
DS-2CD2H85FWD-IZS 8 MP WDR Vari-focal Network Turret Camera
● 1.2, 1080p, 3, or 5 MP models ● SNAPstream capability to reduce bandwidth without impacting image quality ● Strong low light performance via NightView on 1.2 MP cameras and binning mode on 3 MP and 5 MP cameras ● True day/night functionality with mechanical IR-cut filter ● CorridorView allows 90° image rotation for better coverage in hallways and corridors ● Remote focus module Arecont Vision/U.S. Email: avsales@arecontvision.com
● 1/2.5” progressive scan CMOS ● 3,840 × 2,160 resolution ● 2.8 to 12 mm focal length ● H.265, H.265+, H.264+, H.264 ● 120 dB Wide dynamic range ● IP67, IK10 Hikvision Digital Technology/China Email: overseasbusiness@hikvision.com
Eagle Eye
Bridge 305/305s ● Supports up to 15 IP cameras (305s up to 6 IP cameras) ● 4 port Class 3 managed PoE ports ● Ruggedized enclosure ● Solid state version available (305s) ● No special configuration needed ● Graphical display illustrates active ports Eagle Eye Networks/U.S. Email: sales@EagleEyeNetworks.com
MEGApix 4 Megapixel 3.6mm Turret IP Camera With IR
Daiwon
37624-2M Pinhole Lens ● 2 MP pinhole lens for 1080p full HD cameras ● Any aspect ratio can be used without losing resolution ● Clear image without color smear by minimizing chromatic aberration ● Suitable for 2 MP 1/2.7”, 1/3”, 1/4” CMOS sensors ● Megapixel resolution under IR illumination ● Large aperture (at pinholetype lens series) Daiwon Optical/Korea Email: sales@dwopt.com
HID
Approve Two-Factor Authentication Solution ● Trusted identity ● Interface is simple, intuitive and powerful ● Flexible policy customization ● Easily brand the icon and interface with their own logo and color schemes ● Robust Security HID Global/U.S. Email: customerservice@hidglobal
Afidus
JULY 2017 ● www.asmag.com
3 MP H.265 Palm Size Vandal Dome Network Camera VU-331F6-IR ● H.265, H.264 and MJPEG simultaneously ● Up to 25/30 fps at all resolution ● Fixed lens, enhanced WDR, digital image stabilization (DIS) ● Smart IR LED and ICR ● Built-in camera tampering and motion detection ● Support various protocols: RTSP, UPnP, HTTPS, Samba, SNMP, QoS Afidus/Taiwan Email: sales@afidus.com
62
Command Centre v7.70 ● Improved the encryption of sensitive database information ● Mobile Connect has been enhanced with more feature such as arm alarm zones and change the access mode for a door and turn on lights ● Re-issue credentials faster and more easily ● Configure Bluetooth Low Energy (BLE) capable readers using Command Centre Mobile ● Enhanced notifications let user create a more personalized experience and improve business processes Gallagher/New Zealand Email: security@gallagher.com
Digital Watchdog
● 1/3” 4 MP CMOS image sensor ● 3.6 mm fixed lens ● Wide dynamic range (WDR) ● Multiple codecs (H.265, H.264, MJPEG) with simultaneous dual-stream ● 65 ft IR range ● Smart DNR 3D digital noise reduction Digital Watchdog/U.S. Email:sales@dwcc.tv
Gallagher
Suprema
BSI Security
● FAP20 certified fingerprint scanner ● 13.5 mm slim optical sensor ● Multi-dynamic range (MDR) technology, FBI PIV and mobile ID FAP20 compliance ● Android device support ● Live finger detection (LFD) technology Suprema/Korea Email: inquiry@supremainc.com
● US ANSI Grade 1 ● UL10C 3 hours fire rating ● Keypad reader all-in-one ● 3 access methods: pin code/Mifare cards/key ● Max 200 users (pin code/cards) ● PIN to administer enrolment BSI Security/Taiwan Email: sales@bsi-hardware.com
Intelligent RFID Door Lock R8
BioMini Slim 2
EverFocus
16CH Embedded NVR with 2HDDs - EPRO NVR 16 ● Records up to 16 CH (main stream and sub stream) ● Supports ONVIF IP cameras ● Supports H.265, H.264 codec and dual-stream recording ● Supports 2HDD ● Multiple serial interfaces ● Supports mobile applications and multiple network monitoring EverFocus Electronics/Taiwan Email: sales@everfocus.com.tw
asmag.com
PRODUCT FOCUS
Hundure
To view the most updated and complete content for new products, please visit the “Products” section of our website at www.asmag.com. For more information, contact as-pr@newera.messefrankfurt.com
HTA-502PEF-N Fingerprint Time & Attendance Recorder ● Supports 1,500 users with 2 fingerprint templates for each person ● Provides 3,000 cardholders and 100,000 events ● Built-in USB-host interface to import/export data through USB flash drive ● Built-in USB-slave interface for connecting PC to upload/ download ● Various interfaces TCP/IP, PoE or Wi-Fi are available for choice ● The device ACU-30 (with 2 relays) is optional for connecting an external lock and siren Hundure Technology/Taiwan Email: overseas@hundure.com
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
13
COMMAX CO., LTD.
SURVEILLANCE
KOREA
pcy@commax.co.kr
INSIDE FRONT COVER, 1
DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
29
FUJIAN FRAN OPTICS CO., LTD.
DOME COVER
CHINA
sales@fjsmt.com
BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
7
IDIS CO., LTD.
SURVEILLANCE
KOREA
sales@idisglobal.com
INSIDE BACK COVER
TAMRON CO., LTD.
CAMERA
JAPAN
newbiz@tamron.co.jp
5
TECHPOINT INC.
CHIPSET
USA
dma@techpointinc.com
3
VIDEOTEC S.P.A.
IP CAMERA / SOFTWARE / VIDEOSERVER
ITALY
info@videotec.com
PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
35
GIGA-TMS INC.
ACCESS CONTROL
TAIWAN
promag@gigatms.com.tw
ACCESS CONTROL
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
63