031123-封面台.indd 1
16/3/31 下午5:03
CONTENTS
Apr 2016 www.asmag.com
VERTICAL SOLUTION
Terrorism Concerns Call for Better Hotel Security .................................. 32 VIEW POINT
Strengthening Solutions for a Competitive Edge ........................................28 Touchless Biometric Technology Continues to Make an Imprint on Security......................................30
P. 32 SOLUTION DESIGN
Bandwidth Optimization: A Cost-Efficient Way to Maximize Surveillance System Performance .........40
SMART TECHNOLOGY
Wireless Communications in IoT: What They Are and How They Work
P. 50
Optimizing the Performance of ALPR ....................................44 BUSINESS TALK
Drone Startup Companies are Reaching for the Sky ..................................62 SPECIAL FEATURE
Systems Integration in Asia: Challenges and Opportunities in 2016 .....66 SMAHOME APR 2016 Ɣ www.asmag.com
Deutsche Tekekom: Partnerships Add Value for Smart Home Users ..................72 Contents..................................................14 Editor’s Note ..........................................16 Application Cases...................................18
14
INTEGRATED SYSTEM
Video Solutions for Small and Medium Businesses — New Opportunities for Systems Integrators
Products of the Month............................24 Show Review ..........................................78 Show Calendar .......................................79
P. 56 Show Preview .........................................80 New Products .........................................82 Companies in This Issue.........................85
a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.
ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄
Brussels Attacks Raise Debate over Security Again elgium just experienced the most severe terrorist attack in its own history. The explosives in the Brussels airport and a subway station on March 22 killed at least 31 people and wounded 230 others. This incident once again heightened the security levels in Europe, which were already up after Paris came under suicide bombings and mass shooting in November of 2015. In the meantime, major cities in Europe and the U.S. have all started to tighten up their airport security. According to many local news and reports, European countries not only strengthened their airport security, but also the security in some “soft targets” like shopping malls, hotels, and other tourist spots. Europe, in general, has been on its highest terrorist alert, after the attacks in Paris and Brussels.
APR 2016 Ɣ www.asmag.com
The airport is usually a place which is equipped with the most advanced and comprehensive security equipment and well-trained security personnel. However, the different degrees of security threats in a country and government attitudes still make the vulnerability levels of the airports around the world varied. Unlike the
easily-accessible Brussels airport, the aviation security in Israel “is regarded as the most effective in the world,” according to the NBC News. The passengers who travel to Israeli airport buildings are all profiled, and have to go through multiple layers of security. If anything suspicious is detected or noticed, immediate action will be taken.
John Shi
Executive Editor-in-Chief
Hubert Duh Charlie Wong
Managing Director / Publisher General Manager
Editorial
General Press Jill Lai Alf Chang William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin
Editor-in-Chief Senior Consultant Reporter Reporter Reporter Reporter
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com
Executive Designer Designer Designer
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com
Manager
george.chang@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Arthur Wu Circulation
George Chang Michelle Chu
Marketing Coordinator michelle.chu@newera.messefrankfurt.com
Corporate Management
Collins Yuan Thomas Pin Chihung Lee
Group Manager Account Manager IT Manager
collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
Manager Product Manager
willy.wang@newera.messefrankfurt.com jessica.yang@newera.messefrankfurt.com
Trade Fair Manager Project Manager
echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com
asmag.com
Willy Wang Jessica Yang Secutech
Echo Lin Eva Tsai
International Advertising [Headquarters]
If some major European countries start to follow the Israeli pattern and security measures, some concerns over people’s privacy and liberty would also arise. Also, the intelligent technologies which come along with the high security measures usually include behavioral analysis. Many of the industry experts are starting to discuss the feasibility of behavioral analysis for the general public, like us, to effectively deter threats before a disaster occurs. However, how much of our life and convenience will we sacrifice for security and safety? We probably have to think more before resorting to new and highly intelligent technologies to protect us.
Juihui Lin Kay Yang Audrey Fang Nori Chang
Manager Operation Officer Coordinator Coordinator
juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana
U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia
bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
jill.lai@newera.messefrankfurt.com
16
APPLICATION CASES
>> Hospitality
IndigoVision Helps Secure Scottish Hotel
IndigoVision’s fisheye cameras were deployed at Gleneagles Hotel, a luxury resort located in the heart of Scotland. Placed within the Gleneagles Pro Shop, IndigoVision’s new 360-degree fisheye camera was a welcome addition to the existing IndigoVision security system. Installed neatly in the ceiling and taking on the functionality of four cameras, the new camera acts like four virtual cameras in one unit. Unlike traditional multi-sensor, 360-degree cameras that only allow fixed views, the fisheye camera allows any view to be set as a virtual camera. The camera featured an ultra-high resolution, 12-megapixel sensor for all-round visibility with pin-sharp detail. The built-in IR illuminator allows for clear images to be obtained under challenging light conditions. Unlike other fisheye cameras that need expensive PC upgrades due to the processing power required to decode and dewarp images via software, IndigoVision’s fisheye is equipped with built-in edge dewarping capabilities and doesn’t require PC processing for dewarping. The camera also comes with video analytics and a microphone, ensuring continuous monitoring of the hotel surroundings.
>> Education
HID Improves Student Validation in Nigeria APR 2016 Ɣ www.asmag.com
The West African Examinations Council (WAEC) in Nigeria teamed up with HID Global to develop an electronic student ID card program that can combat identity fraud and improve the overall student validation process at important examinations. Before, students were only issued a paper receipt that was later manually validated at the time of testing
18
without a secure process to confirm the student’s identity. HID created a customized solution to accept the raw data from WAEC’s online enrollment process, validate the information, and use it to personalize machine-readable smart cards in the Botosoft facility. The turnkey software and hardware solution included 48 ID card printers/encoders with a combined capacity of more than 65,000 cards per day. Additionally, HID assisted with the development of the software used in the mobile readers. Once issued, Botosoft’s Candidates Identity Verification, Attendance, Malpractice, and Post-Examinations Management System (CIVAMPEMS) ensures effective administration of the exam-day process. Students now register online and are issued a smart card. This same information is stored in a central biometric database that can be accessed in real time by the new mobile readers at the time of the exam.
>> Residential
Assa Enhances Security for UK Void Properties
Willmott Dixon, a privately-owned residential development and property support business in the U.K., was experiencing problems with their void properties. Crimes against empty properties in the area are on the rise, partly due to the rising value of metal and thefts of fixtures and fittings. Assa, part of Assa Abloy Security Solutions, worked closely with the void property team to explore a solution to improve security and protect assets in the empty buildings. They chose not to use a key system because it can be quite time-consuming, intensively laborious, and the associated costs can become very high. Assa’s CLIQ Remote system was selected and installed, providing an intelligent electromechanical locking system to allow only those with the necessary authority to obtain access to the private buildings. The system allowed for controlled key and access management without the complexity and cost of a hard-wired solution. Since the system’s installation, the void property team reported it has saved their employees an average of about 40 working hours a week. It has also led to huge cost savings for them because their
employees didn’t have to share keys anymore.
>> Retail
Eyewitness Monitors US Car Dealership
Eyewitness Surveillance was selected to provide video surveillance for Young Chevrolet, an automotive dealership in Texas, U.S., due to its cost-effective solution that incorporates video surveillance monitoring and operational efficiencies including false claims and car lot damage. Prior to working with Eyewitness, the company had utilized security guards for years to monitor and secure the 16 acres of land at the dealership and all of their assets. As car dealerships are frequently targeted for theft and damage, Young Chevrolet was in need of a more comprehensive solution to better protect its property and assets while finding a better return on investment. The company elected to implement Eyewitness’ technology and remote interactive surveillance to cover over 50 exterior sites and used around 20 interior cameras. Since the system was installed, its proactive surveillance and archived video surveillance features has already saved the company US$1,000 on false collision shop claims.
>> City Surveillance
Dahua Improves Public Safety in Brazil
Boa Vista, the capital of the Brazilian state of Roraima, was suffering from the effects of an inflated population. Increasing crime and vandalism rates were directly impacting Boa Vista’s
IoT Expands Sensing Technology to Make Room for Security Editor’s Note:
Internet of Things (IoT) continues to influence the ecosystems for different industries and innovate ways to protect people and property, as well as further collect data to help managers make better business decisions. Sensing technology accompanied by intelligent analytics software becomes vital to enable IoT for multiple purposes.
KENTIX CONTROLCENTER
O
• • • •
Early detection of all risks Real-time alarms via e-mail or SNMP Easy control with built-in web server Data logger with some month of memory depth • Plug-and-play installation due to PoE • 8 integrated sensors
ver 50 percent of IT system failures are caused by technical failures or are due to human error. System and data recovery requires an average of four hours and increases costs. Early detection and the direct reporting of threats are essential to avoid costly recovery processes. The use of a monitoring system for critical threats such as temperature, humidity, dew point, fire, power, movement, and more is part of the basic equipment of every IT environment. The Kentix ControlCenter sums up all important information and shows the state of the entire system at a glance. As a full client application, the ControlCenter communicates with the Kentix AlarmManager and monitors data centers from 20 to 2,000 square meters, even from a distance. In addition to the ControlCenter, a web interface and a smartphone app are also available. The easy connection to superordinate management systems like DCIM, network monitoring solutions, or building management systems can be realized via the open API with SNMP, XML, or OPC. Supplier: Kentix
URL: www.kentix.com
TE CONNECTIVITY AUTOMOTIVE SENSOR SOLUTION
T
o transport passengers safely and efficiently, vehicles need data. Today’s cars can sense and respond to changing conditions, inside and out. TE sensors help provide the data for the control, adaption, and response of vehicle functions that increase safety, comfort, and efficiency. TE’s sensor technology has become an integral part of many modern vehicle nervous systems through integration of innovative sensors in demanding application areas such as automated transmissions, engines, clutch, brake, and other mission critical areas.
• Position sensors: sensors for brake, chassis, clutch, engine, and transmission applications • Pressure sensors: standard and custom pressure products ranging from board level components to fully amplified and packaged transducers • Temperature sensors: helps meet specific temperature sensing demands in OEM applications • Humidity sensors: calibrated and amplified sensors measure relative humidity and are designed for applications in a variety of output signals • Fluid property sensors: based on tuning fork, ultrasonic, and near infrared technology, specifically designed to provide fluid quality and condition monitoring capability to a wide range of applications including oils (engine, hydraulic, transmission), fuels, and DEF (urea) monitoring Supplier: TE Connectivity
APR 2016 Ɣ www.asmag.com
24
URL: www.te.com
AVA RETAIL
D
ata is collected in retail stores with the help of sensors strategically placed throughout the ceiling. Sensors track every activity of each individual shopper – whether or not they carry phones, what specific items they have viewed, what they compared, paths they took, and times spent on each product, shelf, or section. This data is made the basis for the analytics that AVA delivers. Real-time data is used to provide tools for businesses to better assist shoppers. • AVA SmartShelf: When a shopper approaches a product, SmartShelf shows it as a promo video on a screen mounted nearby • Associate app: Sales associates will receive real-time information about shoppers. E.g. products they looked at, dwell times, sequences, wait times, paths which the shoppers take, and their current location • Ask the expert: shoppers can interact face to face with a product expert located at a call center or a store kiosk • Shopper phone app: Incentivize shoppers with loyalty programs and track shoppers with their basic information known to the store • Store analytics: Sensors installed in the store capture shopper’s detailed behavioral data, including shopper’s product preferences, shopper’s journey, staff effectiveness, traffic analysis, hot and cold spots, product alternatives, product attachments, and campaign management Supplier: AVA retail
URL: www.avaretail.com
STRENGTHENING SOLUTIONS FOR A COMPETITIVE EDGE In light of today’s economy, security providers have to deal with increasing challenges such as those posed by increased competition and smaller budgets. Companies have started to increase customers’ return on investment through systems that would not only provide security, but also information that can aid them in managing their assets and business operations. BY Emily Lin
udgets all over the world are taking a hit as companies are tightening their belts in order to deal with recent global economic turbulences. Many security companies are seeing projects either being delayed, payment plans being stretched out, or, in some cases, cancelled. Despite this, customers are not willing to compromise on safety and continue to seek out innovative, market-leading solutions, challenging
APR 2016 Ɣ www.asmag.com
28
security companies to create systems that can offer the same level of services but in a more affordable package. There are, of course, many ways of going about this. Some turn to new technologies, others focus on fully integrating existing systems. For G4S, a global integrated security company, this meant combining two resources, manpower and electronic security systems, into one unique total solution. As one of the few companies that has the means to do so, the company was able to offer its customers solutions that can lessen threats to security at a reasonable cost. “G4S’ differentiator is the ability to combine manpower, technology, and process. Its corporate strategy is to strengthen their value-engineered solutions to the marketplace demonstrating the added value whilst reducing operational risk,” said Mark Horton, Regional Solutions Director for Asia, Middle East at G4S. “We balance the customers’ operational requirements together with the available
budget to find some common ground in providing the best risk mitigation at a lower cost, especially by integrating a number of systems together to reduce the overall cost of ownership,” continued Horton. “G4S is exhibiting market leading third-party drone detection, automatic license plate recognition (ANPR) solutions for reading license plates, access control, video surveillance, and turnstiles. G4S integrates them to an overall solution to match their customers’ needs.”
GOING BEYOND BASIC SECURITY
G4S’ differentiator is the ability to combine manpower, technology, and process. Its corporate strategy is to strengthen their value-engineered solutions to the marketplace demonstrating the added value whilst reducing operational risk. efficiency, decreased overall costs, and possibly even more money being reinvested into security.
Total Banking Solutions An example of end-to-end solutions that would encompass services beyond mere security is the solution designed by G4S for financial institutions. Aside from installing physical security systems such as intrusion detection, access control, screening, and scanning systems, G4S offers banks solutions that can cover everything from manpower outsourcing to high-security cash processing and transport. This approach has enabled them to stay competitive in this sector, as well as work alongside government-owned security companies that widely operate in various regions around the world, such as in the Middle East.
Security companies also have to contend with customers’ expectations that they will be getting the most out of their investments. SELECTING THE RIGHT TECHNOLOGY Therefore, security Creating these multi-tasking systems require an in-depth knowledge systems are now increasof products that are available on the market, as well as their interoperingly relied upon to not ability. Security solution providers often work closely with clients and only provide security, Mark Horton, Regional Solutions Director project consultants to determine their needs and provide appropriate but also double up as for Asia, Middle East, G4S solutions. Being technology agnostic would be important as it would sources for information allow them to choose the right technology for the job and not be limited by their that can help enterprises improve their own portfolio. day-to-day operations. “The starting point is to make sure that every technology is right. We have a very, “When we deal with our customers, very capable project delivery team but if we don’t get the technology right, that’ll be we don’t just focus on security. A well a problem for the customer so selecting the best technology partners, our project designed security system should management, and how we deliver that to the customer is very important so we impact many areas of their business, wouldn’t impact their operation,” shared Horton. security being number one. But in He continued by adding that customers, such as those in the Middle East region, addition a good security system can are very interested in adapting new, smart technologies that can further improve reduce health and safety risks as security. Facial recognition software that can be used in various infrastructure projects well. They can improve operational such as in retail malls and airports is a hot topic. The company has also seen an efficiency and, equally important, increase in demand for video analytics to aid in early detection of unusual behavior customer engagement,” noted Horton. or events and expects that this would lead to further inquiries regarding behavioral For instance, in retail, security systems recognition in the near future. Another technology that has risen in popularity can be used to improve customer is biometric access control as it is a more reliable method of identity verification, experience through video analytics compared to traditional card systems. that can detect customers who are not being attended to and alert the staff END-TO-END SOLUTIONS IS KEY TO STAYING to go and engage with them. A good COMPETITIVE solution can also identify health and Security systems has progressed beyond just simple installations of video cameras security breaches such as slip and trip around the premises. It has evolved to the point that it can help businesses improve hazards or blockage of emergency exit their profitability and protect the well-being of both their customers and employees. routes. Thus, aiding the authorities to Security providers would need to continue to innovate and find ways to create quickly manage the situation, which systems that can keep up with this growing trend in the industry. can lead to improved operational
29
TOUCHLESS BIOMETRIC TECHNOLOGY CONTINUES TO MAKE AN IMPRINT ON SECURITY The use of biometrics in the security industry have been growing in popularity as a form of identification and access control. Ongoing developments in fingerprint recognition and authentication have led to significant advances with regards to accuracy of reading and ease of installments. BY Emily Lin
riven by increasing concern over terrorism and criminal activities, demand for high-level security systems has been on the rise. The biometrics industry, in particular, has been growing steadily. Owing to its convenience and improved accuracy of reading, fingerprint technology has remained one of the mainstays of this industry. However, how well the system operates is highly dependent on how accurate its finger-
APR 2016 Ɣ www.asmag.com
30
print sensors are in capturing images since poor ones can lead to erroneous readings and cause delays or problems down the line.
TOUCHLESS 3D FINGERSCAN TECHNOLOGY Certain limitations associated with the use of conventional fingerprint readers have led to increasing acceptability and use of 3D technology fingerscan readers. One advantage this technology has over its predecessor is accuracy of identification, which is an issue for a lot of 2D readers. “This is common with 2D technologies, regardless of the brand or technology. The reason is that 2D only takes a small detection area. Nothing in the industry is 100 percent but 3D is definitely the closest to that,” said Alex Zarrabi, CEO of Touchless Biometric Systems (TBS). The company’s flagship product, the TBS 3D-Touchless fingerscan reader, simultaneously employs three cameras to capture a 3D image of the finger; thus, increasing
the surface area for more detailed fingerprint details. The additional details captured dramatically decreases the possibility of rejections, which is key to user satisfaction. Furthermore, higher acceptance smoothens user flow and optimizes the passage time, especially in crowded situations. This design also allows it to take images contact-free. Since the finger is just hovering on top of the reader and never touches the sensor, it is more hygienic and can limit the spread of germs. This also eliminates the frequent need to wipe down or clean the fingerprint scanners for both sanitary reasons and for the device to get a good reading.
2D TECHNOLOGY CONTINUES TO EVOLVE
How TBS Grows its 3D Touchless Fingerscan Technology Touchless Biometrics Systems (TBS) is a Swiss manufacturer of 3D finger scanning technology for numerous applications in access control and time attendance. At the beginning, they won a government research grant to develop contactless technology that can overcome the limitations of legacy systems. Conventional 2D rolled fingerprint technologies often suffer from issues such as interference from fingerprints left behind by previous users and distorted images due to varying pressure exerted by the operators.
Their efforts resulted in the creation of the Touchless Ten Finger Scanner, also known as the Bioguard Ten, a device that can capture all ten rolledequivalent fingerprints in a record amount of time. The generated images, available in both 2D and 3D, were highly detailed due to its ability to capture third-level details such as ridge structures, scars, and sweat pores. Originally created for government use, this technology was adapted for commercial applications and resulted in the launch of the 3D Fingerscan Terminal at the beginning of 2010.
Despite this rising trend in 3D readers, TBS readers have now also been embedded in turnstiles. Although, many would technology, 2D fingerprint sensors are think that this can cause more delays compared to traditional card readers, the low rate still what majority of the customers are of rejections of the unique TBS 3D fingerprint technology allows a free flow while identifamiliar with and, therefore, an important fying individuals. Turnstiles can thus be linked to the payroll system for streamlined time & part of any company’s product portfolio. attendance. “3D technology was the core technology BIOMETRIC SUBSYSTEM INTEGRATION at the beginning of TBS and remains the As more companies are now turning toward biometrics to enhance security, it became core product. We have now grown from increasingly important to find a way to easily integrate the technology into existing reader to solution provider. The first step security systems. TBS has created a unique platform that allows customers to use their was completing the 3D with additional products in conjunction with other terminals and systems. products — 2D touch fingerprint, RFID, “We have created the TBS biometric subsystem. This is a platform that attaches to the face recognition (which is upcoming), third party software and enables them with biometrics,” shared Zarrabi. “So imagine, you and 2D Multispectral,” commented have a software that does video surveillance today with no biometrics, you don’t need Zarrabi. to add all the biometric software, you just attach the TBS subsystem, and While 3D readers rely on multiple then your software can manage biometrics and work with all our cameras, TBS’ 2D Multispectral terminals range.” feature HID Global’s Lumidigm sensors, This offering has enabled TBS to market its products as an enabling the readers to combine several end-to-end solution or be installed as a biometric subsystem into images of the finger pictured at different an existing security solution, providing all the needed biometric wavelengths into a single composite infrastructure and hardware. Due to its widespread applications, this picture, resulting in the capture of both has already been integrated in various solutions from companies such surface and sub-surface skin features. as Honeywell Security and Fire, Siemens, Johnson Controls, This increases the yield of terminals that KABA, and Interflex. may be operating in less-thanideal conditions such as in the BIOMETRICS’ ROLE IN SECURITY presence of water, dust or Alex Zarrabi, CEO, Touchless It is evident that biometrics has become an other contaminants. Biometric Systems important tool that can enable companies to The commercial applicaenhance their security systems and protect tions of fingerprint sensors property and people. Ongoing developments seem to be increasing. and innovations will only further help secure its Instead of limiting the place in the industry. technology to biometric
31
TERRORISM
CONCERNS CALL FOR
BETTER HOTEL Several terrorist attacks, especially in the Middle East, Africa and Asia, have brought hotel security under the scanner, hurting the global travel and hospitality industry. Implementing adequate security systems has become a necessity for hotel businesses to survive.
APR 2016 Ć” www.asmag.com
32
SECURITY BY Y Prasanth Aby Thomas
n November last year, a militant group attacked an upscale hotel in Bamako, capital of the North African country Mali, taking 170 people, including several foreigners, hostage. The local security forces, with international help, were able to free most of the people held, but not before the militants killed 20 of them. In January this year, a group of gunmen stormed into a hotel in Burkina Faso, another African country, killing at least 30 people. Later in March, another attack on hotels in Ivory Coast left 18 people dead. Hotels, especially upmarket ones, are clearly seen as soft targets by terrorist groups as they often have foreign nationals. Terrorist groups looking to launch attacks on other countries seem to find this indirect route more convenient. According to IntelCenter, a firm that tracks terrorist incidents, in 2015 alone there were 25 attacks on hotels. The Middle East, Africa and Asia have been the main targets for such hotel-
related incidents so far, although terror attacks like those seen in Paris and Brussels have prompted demands for better hotel safety in Europe too. Terrorism-related fears have cost the travel industry US$8.2 billion, according to a report from the data-collection site YouGov.
INCREASED DEMAND Such a strain on the travel and tourism business has shed light on the importance of implementing and tightening adequate security solutions in hotels. The solution providers we interviewed differed on how the market is reacting to this necessity, but at least some of them believe that safety concerns in hotels in these regions have shifted focus after the recent terror attacks. “While in earlier years hotel security was mostly about avoiding fire and theft, the potential of terrorist attacks has certainly influenced the security strategies of many hotel operators,� said Baraa Dakhel, Head of Business Development in the
33
BANDWIDTH OPTIMIZATION:
A COST-EFFICIENT WAY TO MAXIMIZE SURVEILLANCE SYSTEM PERFORMANCE
APR 2016 Ć” www.asmag.com
Bandwidth management is a key factor in how well a digital surveillance system performs to expectations; it is also one of the most challenging factors to manage in a surveillance system, as it is generally difficult and expensive to scale. This problem is only going to get more crucial due to the continued growth of IP camera deployment, resulting in a greater need for better bandwidth management. BY the a&s Editorial Team
40
n order to balance the growing demand for crisper image quality in video surveillance and the additional network bandwidth that will be consumed, a number of solutions have been developed to help customers get the best image quality possible. These solutions also conserve network bandwidth by employing features such as cropping, on-camera storage, intelligent video analysis, and adaptive bitrate streaming. The following article provides several tips on how to optimize bandwidth for an IP video surveillance system.
OPTIMIZING EXISTING BANDWIDTH The main challenge of network bandwidth management is the difficulty of distinguishing between constantly changing images and static images. Therefore, it is not possible for the system to automatically adjust bandwidth without relying on certain technologies. Using sophisticated techniques, congestion of network traffic can be avoided, bandwidth can be adjusted flexibly and automatically, and information can be prioritized when an alarm is triggered.
One way to try and address network congestion issues is to directly confront the lack of bandwidth available. For example, operators have attempted to increase the available bandwidth with extra leased lines. Unfortunately, this has an associated recurring cost. Therefore, optimization of existing bandwidth is seen as the path of choice for most since it can deliver efficient use of current infrastructures and provide capacity expansion while keeping the same pre-optimization bandwidth costs; however, it requires the purchase of multiple appliances. In order to get the maximum return from a digital investment, optimizing the way video streams from different cameras to their destinations in surveillance networks is important. To do this, QoS (Quality of Service), used in all network equipment, along with the bandwidth management router and simple network management processor (SNMP) switch are musts. An SNMP switch can ensure enough bandwidth for a certain number of channels. With the appropriate QoS setting, the transmission bitrate can be confined within a certain bitrate per second.
REDUCING BANDWIDTH CONSUMPTION BY SETTINGS As mentioned above, it is not always an affordable option to add more bandwidth or new equipment to a surveillance system. This results in some trade-off between image quality and network bandwidth. Instead, the right configuration settings could help reduce network bandwidth consumption. According to a white paper by Avigilon, temporal compression technologies rely on scene changes as part of its compression methodology. It can also introduce variability in the size of the compressed data stream that is generated, which depends on the compression being used — if it is configured to use a constant bitrate (CBR) or a variable bitrate (VBR), in a camera. The white paper points out when configuring a system for a constant
bitrate, the amount of compression applied increases as more activities occur. As a result, compression artifacts could be added to the image and degrade the image quality. On the other hand, to maintain consistent image quality when variable bitrate compression is used, the size of the compressed stream is allowed to vary. Variability in the size of the compressed stream presents important challenges in system design and network bandwidth consumption. Along with the CBR/VBR setting, it is also important to set up GOP (group of pictures), which refers to the type of setting in camera firmware. This setting makes it possible to further reduce the bandwidth and storage consumption of video streams up to 10 times while the concept of constant bitrate stands on the principle that the bitrate level will be fixed regardless of other settings. It is important to note that GOP should not be adjusted for scenes with a lot of motion or under poor lighting conditions because it may influence the video quality. Therefore, increasing the GOP value and extending the gap between frames could cause a loss of a certain number of frames under CBR. However, GOP can be used in combination with CBR if the priority is image quality. A new version of VBR encoding technology has been developed by vendors, giving users the advantages of both CBR and VBR encoding while minimizing the disadvantages. According to VIVOTEK, this new encoding technology functions like VBR with limitations — administrators set a maximum value on allowable bitrates, and the bitrate is able to change in this range according to monitoring scenes. This makes it easier to manage network resources because the bitrate of the encoded video is guaranteed not to exceed the preset limit, and thus the network bandwidth required
41
OPTIMIZING THE PERFORMANCE OF
P AL R Automatic license plate recognition (ALPR) has become the most important tool for identifying vehicles and can be applied to various use scenarios, for example road monitoring, parking, and even crime prevention. However, there are still some challenges remaining, and to optimize its performance the installer needs to have a proper understanding of how the system works and how it’s set up. BY the a&s Editorial Team
APR 2016 Ɣ www.asmag.com
44
utomatic license plate te rec recognition ition (ALPR) has experieri ant g wth o w year enced significant growth over the last few years. ng tto many iinstallers we’ve sspoken to, demands According or ALPR AL R surg for surged last year co compared to 2014, and grow xpected to continue over the next five years. growth is expected RP’s popularity popu ity has to t do with its wide range of applications, from ALRP’ ro oad monitoring monitorin to electronic collection to crime prevention. For road exa example, ALPR is used to report suspicious or blacklisted vehicles. It detects vehicles that are speeding on highways and informs relevant authorities. At residential areas, it can determine whether an incoming vehicle belongs to the community and respond accordingly. vehicle d in n parking lots, which increasingly i More and more, ALPR is used focus on intelligent and automated management. As such, ALPR can come in handy. It determines the entry and exit time of a vehicle and charges a fee accordingly. It also recognizes whether a vehicle is a monthly customer. In lots that are frequented by many visitors, ALPR can calculate the number of empty space left and inform drivers. Use scenarios have become wide and varied.
HOW IT TW WORKS
OPTIMIZING ALPR PERFORMANCE ERFO
Most A ALPR today comess in tthe form ated u off a single, integrated unit that includes a camera, a co computer, and an infrared min illuminator. The camera is equipped with amic a CMOS lens and has wide dynamic range capability. The comput computer has ocessi speed of 6.4 GHz. maximum processing en on rroads or in parking lots where Even vehicle identification can be difficult, ALPR attempts to achieve an accuracy rate of 99.58 percent. The main equipment box of the ALPR unit must include a fiber receiver, a surge protector, and power equipment. They should all be arranged properly inside the box. The casing of the box must be protected against over-current and over-voltage and must be able to withstand rain, dust, high temperatures, and vandalism. The IR rating of the case should be IP65. Right now, recognition can be done by the edge device on the front end or by the server on the backend. At the front end, recognition of the license l 250 plate can be done in approximately microseconds. This data can either be transmitted to the backend, or stored in the front end for future retrieval.
ALPR performancee optim optimization can be done either via software or via hardware. In oftware optical character recognition (OCR) is used in today’s ALPR. It looks terms of software, im at the image of the plate, singles out the characters, and compares each character with a list of characters stored in the database. Or, in feature extraction, the software breaks each character into individual components and performs recognition based on a set of rules, for example two converging lines forming an angle with a third horizontal line in the middle constitute the letter “A.” Some challenges in ALPR today include erroneous recognition of letters, for example “P” and “R,” that look similar. As such, the OCR software must be made strong and powerful enough to distinguish the differences. Certain license plates use specific colors or characters with different fonts and sizes; those nuances must be distinguished as well. For more sophisticated systems, they can recognize license plates from different countries or states. For example, two vehicles from different states with different license plate designs may share the same license plate number. The system must be able to tell them apart. License plates should be effectively recognized even if they are dirtied, soiled, or damaged. In terms of hardware, it helps address other issues that affect the performance of ALPR. For example, illumination can be a problem at parking lots, and cameras
The main equipment box of the ALPR unit must include a fiber receiver, a surge protector, and power equipment. T They should all be arranged properly h must be protected a inside the box, which against over-current and over-voltage. 45
Hi Sharp Diversifies Products to Stave off Competition Founded in 1987, Hi Sharp Electronics is one of the oldest security companies in Taiwan and started as a traditional video surveillance systems provider. Yet, with changing times and increased competition in the industry, the firm realized the need to move outside security to stay alive and succeed. Today, the company boasts a comprehensive line of products and solutions for various niche markets, including car safety. BY William Pao
O
ver the years, competition in the security industry has become fiercer than ever, especially after the introduction of Chinese products which attract with their low prices. This has produced a profound impact on traditional Taiwan security manufacturers, who are faced with a decline in revenue and profit. As a result, many companies have found it important to provide value-added systems for different niche markets. One example is Hi Sharp, which has already found success in video surveillance with its analog, HD analog, and IP products. Yet, as the cut-throat price competition becomes even more intense, Hi Sharp realized that offering video surveillance systems alone was not enough. That’s why it decided to move beyond traditional security and offer high-quality, high-value solutions for various niche markets and applications.
A WINNING STRATEGY According to Jerry Chiang, President of Hi Sharp, security can be roughly divided into two segments: high-end and competitively priced, and Hi Sharp has the capability to deliver all kinds of equipment to both segments. “For the high-end segment that demands a lot of customization, I’ve got the core capability. Products that are high-quality and highly customized, that’s Taiwan’s strength in the first place, and I focus on that,” he said. “For the competitively priced, we have the manufacturing capability. We engage in some collaboration with China, for example taking their key components, and do the production in Taiwan since we have stronger manufacturing skills and better quality control.” The end result of this approach, according to Chiang, is the company’s growth and success in spite of the strong competitive threat brought by China. “I do not accept defeat and will fight on. After the next few years, we'll be one of the few security players who survive the competition and do well,” he said.
Comprehensive Range of Products Hi Sharp boasts a diverse array of solutions to satisfy the needs of different segments. These include car safety systems, industrial cameras, and monitors.
APR 2016 Ɣ www.asmag.com
48
CAR SAFETY SYSTEM One area that Hi Sharp has moved into and found success in was car safety. In 2013, the company founded a subsidiary called Caravision that specifically makes car safety products and solutions, including onboard cameras and mobile DVRs, targeting operators in public transportation, fleet management, and similar industries. As a matter of fact, Hi Sharp has focused on mobile DVRs for quite some time. “We already knew that mobile DVRs would be the trend of the future,” Chiang said. “Simply said, we have accumulated strong video surveillance expertise, and we apply it to car safety, except the technology threshold for the latter is much, much higher.” Car safety systems are quite complex and present a special challenge for manufacturers. Devices like onboard cameras and mobile DVRs must withstand tough conditions on the road. They also have to communicate seamlessly with the backend command center. Hi Sharp equipment meets these requirements: the onboard cameras not only offer high-resolution images but also 180-degree panoramic views, and they are IP68-rated to protect against various environments. The mobile DVRs are shock- and vibration-proof, allow transmission via 3/4G or WiFi, and come with GPS information record and timing functions. Together, they give operators complete oversight and situational awareness. Hi Sharp’s car safety solutions are found not only on public transportation in Taiwan but also service providers in North America, Europe, Australia, China, and Japan. “We do business with the Japanese, who have very stringent requirements for their products, for example how strong they have to be against vibration and high temperatures,” Chiang said. “Doing business with Japan speaks volumes of the quality of our products.” Already, Hi Sharp’s car safety business accounts for approximately 40 percent of the company’s revenue structure. “In the past, the revenue from our security business supported our car safety business. Now, the situation has reversed,” he said. “For other Taiwan security players seeking to step into car safety, they’ll have a hard time. We, on the other hand, have gone a long way,” he added. “You’ve got to have a reputation in security before you move into car safety. For Taiwan security players who also have expertise in car safety for large-size vehicles, Hi Sharp is pretty much unrivaled.”
OTHER PRODUCT LINES Besides car safety, Hi Sharp’s portfolio also includes other product lines targeting different markets. They are summarized as below: Industrial: A product line that Hi Sharp just started, yet is seen as full of potential, is the company’s industrial solutions, consisted of industrial cameras specifically for monitoring and inspection purposes at industrial settings. Being the “eyes” of plants and factories, they have the ability to focus on details and check for defects on products. These features make them ideal for printed circuit board plants, semiconductor wafer plants, as well as food factories. Display: The company has its roots in security monitors, which still form a significant part of Hi Sharp’s portfolio. As opposed to TV or consumer electronic monitors that can’t be left on continuously, security monitors must be on round the clock for constant monitoring of what’s going on. Hi Sharp monitors support different video resolutions and have
Jerry Chi Jer Chh ang an , Preesid sident ent,, ent H Sh Hi SSha harp EEle lectr ctroni on cs oni c
I do not accept defeat and will fight on. After the next few years, we'll be one of the few security players who survive the competition and do well.
meantime before failure of 30,000 hours. “Quality and reliability are of utmost importance,” Chiang said. Camcorder: The company also manufactures handheld camcorders carried by security guards. Each unit features changeable high-capacity lithium polymer battery, high-quality recording of up to 1080 pixels, and a ranking of IP66 to withstand critical environments.
PROSPECTS FOR ASIA GREAT According to Chiang, Asia is full of growth potential, as the GDP for different regions has been on a steady growth trend. Specifically, he cited India and Indonesia as markets whose growth will be especially significant. According to the World Bank, India and Indonesia’s GDP will grow 7.9 and 5.5 percent this year, respectively. To that end, the company will put a stronger focus on Asia. Already, Hi Sharp has made inroads into Vietnam, Indonesia, Malaysia, and Myanmar. “In terms of technology, we’re ready. Now we’ll launch the offensive,” Chiang said. With the security market becoming more competitive, Hi Sharp has stretched its portfolio beyond traditional video surveillance products and applications, now focusing on high-value solutions such as car safety. This, along with the company’s manufacturing and R&D capability, has helped Hi Sharp maintain as a competitive and viable force in the business. The firm indeed serves as an exemplary model for competitors to learn from. For more information, please contact the company at sales@hisharp.com.tw or visit Hi Sharp secutech booth #3129.
49
WIRELESS COMMUNICATIONS IN IoT: WHAT THEY ARE AND HOW THEY WORK
APR 2016 Ɣ www.asmag.com
50
The Internet of Things (IoT) is a growing phenomenon, with billions of devices already connected to the Internet. Inevitably, security — with the different sensors associate with it — will be a big part of the IoT trend. Against this backdrop, it is vital for the systems integrator to understand the different IoT wireless communication technologies by which the devices “talk” to each other. BY William Pao
eedless to say, the Internet of Things (IoT) has become a force we can’t ignore. In fact, Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach US$20.8 billion by 2020. With IoT becoming so prevalent, it is difficult not to count security as part of the whole IoT revolution. “It is clear that most security applications share connectivity and data over the Internet leveraging cloud-based storage and integration — so yes, (IoT and security) are tied together,” said Mark Walters, VP of Strategic Development at ZigBee Alliance. Against this backdrop, knowledge on IoT and the various communication technologies/protocols associated with it becomes key. “Security installers must have a solid understanding of networking, network and data security, and privacy concerns,” Walters added. “Who is getting what information, what are they doing with it, and who owns and controls it are very important factors to understand.”
IoT COMMUNICATION TECHNOLOGIES/ PROTOCOLS Right now, there are a range of connectivity options under the IoT framework, each defining a specific range of transmission, data speeds, power consumption, and level of security. Some of them are listed as follows.
Bluetooth
Andrea Azzoni, Marketing Manager, Fluidmesh Networks
Bluetooth is ideal de for short-range data transmission between de Bluetooth-enabled devices such as smartphones and laptops. It operates in the 2.4GHz band of the radio spectrum. Range is from 1 to 100 meters. The typical data rate is 1 Mbps, and rates may vary depending on the version of Bluetooth used. With Bluetooth low energy (BLE), power consumption is reduced significantly. More and more, hotels and homes employ smart locks that open upon reading the user’s BLE-enabled smartphone.
ZigBee and Z-Wave
Mitchell Klein, Executive Director, Z-Wave Alliance
Both ZigBee and Z-Wave are suitable for low-data, short-distance transmission, and their mesh networking capability can extend the transmission distance if necessary. Both protocols are ideal for home-area networks, which are becoming more widespread in the U.S. and Europe. ZigBee operates in the 2.4GHz range. The ZigBee Alliance has developed various technologies, for example ZigBee PRO, ZigBee RF4CE, and ZigBee IP, and has recently combined all application profiles into a single solution called ZigBee 3.0. Z-Wave employs the 900MHz portion of the spectrum. Devices include motion detectors, door/ window sensors, and door locks.
Mark Powell, Executive Director, Bluetooth SIG
RFID
Mark Walters, VP, Strategic Development, ZigBee Alliance
RFID operates in the 120kHz-2.45GHz portion of the radio spectrum, has a range between 0.5 and 100 meters, and transmits data at 4 to 424 kbps, depending on the type of RFID used. Applications are diverse and wide-ranging. “RFID has been extensively used in short-range identification (LF technology), for example in access control, up to the latest generation of long-range (few meters) UHF applications able to identify bundles of thousands of objects in a few seconds,” said Andrea Azzoni, Marketing Manager at Fluidmesh Networks.
Security installers and systems integrators must have a solid understanding of networking, network and data security, and privacy concerns. 51
Video Solutions for Small and Medium Businesses — New Opportunities for Systems Integrators BY Israel Gogol, Freelancer
APR 2016 Ć” www.asmag.com
The market for video surveillance solutions for small and medium businesses has been growing rapidly in the last few years. Solutions focus on ease of installation and simplicity of use and bring benefits to both end users and systems integrators.
56
he small and medium business (SMB) market segment spans across many types of businesses and facilities. These include offices, retail stores, manufacturing and storage facilities, restaurants, and more. From the manufacturers’ perspective, the definition of an SMB is not according to the business type, but usually defined by
the number of channels they require. In most cases, systems under 16 channels are classified as small; there is a larger variance in defining larger systems. While some manufacturers will define 30 cameras as medium, others may stretch this even further, up to 100 cameras. Over the past few years, this segment has seen a growing interest from manufacturers. This is the result of two
To compete with lower prices, SIs are shifting to solution sales which highlight their skills beyond security sales and camera installations.
parallel developments. The first is a decreasing market size for higher-end segments. The relatively wide-scale adoption of IP cameras in the high-end market is pushing manufacturers to look for “greener” markets. The second development is the lower price of video surveillance equipment, which has made these systems more affordable for SMB clients. “Since the marked economic recovery, particularly in the U.K., we are seeing SMBs needing to upgrade from legacy systems that are failing to provide adequate protection of property, assets, and staff, as well as proving to be expensive to maintain,” said Brian Song, MD of IDIS Europe. “In addition, the recovery has seen many businesses grow, so companies are moving to larger premises, which in turn, means office fit outs that include security installations.
Lawrence de Guzman, VP, APAC, Vicon Industries Jumbi Edulbehram, Regional President, Americas, Oncam
So we’re seeing really strong growth in the SMB sector right now and we expect that trend to continue.” One of the main characteristics that tends to be common in SMBs is that video security is generally not business critical. “For example, if we compare SMBs to a large airport or a casino, in case the video security is not functioning, the airport will have to close down that area of the airport. Casinos also have strong regulations regarding video coverage. SMBs don’t generally have hard requirements linking their video security to their business operations,” explained Janne Jakobsen, VP of Professional Products at Milestone Systems. Video is most often used post-incident as a reference to see what happened. Nonetheless, businesses are slowly expanding the use of video surveillance. “In the past, video was used as a form of insurance, in case something happened. We find that customers who start using the video data as part of their business operations achieve many benefits and use it more consistently,” Jakobsen said. “Some of these areas include employee training, improving business efficiency and effectiveness, supporting business operations remotely, accepting deliveries remotely, and generally linking video data to other sources of data such as point of sales, access control, and so on.” Similar views were voiced by other manufacturers as well. Brien
57
DRONE STARTUP COMPANIES ARE
REACHING FOR THE SKY Startup companies are different from regular companies due to the fact that they are not run based on established business models or products. They are commonly found in young markets such as the drone industry where there is much potential for rapid growth and success, but they are also more likely to crash and burn. Startups should be careful to determine their focus early and use this to develop products that will appeal to the market. BY Emily Lin
APR 2016 Ɣ www.asmag.com
any are attracted to the notion of being a “startup” as it conjures up images of young, hip companies working on the newest technology or cutting-edge ideas. It’s no surprise, then, that an increasing number of companies have taken to proclaim themselves as such to jump on the hype and draw the attention of potential investors. Therefore, the question would be: what makes a company a real startup company? Contrary to many beliefs, this doesn’t really have much to do with being a newly established company, but rather it is determined by the purpose for which the company is created. Startup companies are formed primarily to test the waters, whether it is for testing out the potential demand of a new idea or growth in a new market. The setup would also allow entrepreneurs to try out different business models and refine them in order to discover one that they can build upon. Since they are operating in uncharted waters, success is definitely not guaranteed and risk for failure is high. However, the promise of fast growth in a young, yet untapped, market segment is an alluring bait for investors who are aiming to score huge returns on investment in a short period of time.
DRONE INDUSTRY STARTUPS The drone industry is currently one of the market sectors that has seen a huge jump in the number of startup companies. According to investment research firm, CB Insights, the amount of equity financing raised by drone startups in 2015 was significantly high,
62
Ramon Haken, Director, Avular Daniel Sällstedt, CEO, Sky Eye Innovations Patrick Thevoz, CEO, Flyability DerrickX iong, Co-Founder & CMO, EHang
amounting to more than the amounts raised in the last three years combined. Initially intended for military use, it was not long afterward that companies realized the potential of these devices in both the commercial and private consumer market. Due to recent advances in technology and increased availability of drones, its applications have extended beyond mere visual recordings of events. Typically, most drone companies focus on selling systems or hardware; however, many are including other services or offerings into their portfolio. “Our business model is two-sided. We are selling hardware and third-party applications to certified operators on one side. On the other side we have a revenue sharing program for developers, who can build applications on our industrial vision cameras and on-board computing power,” said Ramon Haken, Director of Avular. With so many drone startups in the industry, it would be important for each of the companies to differentiate themselves from the competition. Luckily, since their business models are still evolving, this
leaves them with room to try things out and find one that works best for them and their customers.
ADDRESSING SPECIFIC NEEDS WITH UNIQUE TECHNOLOGIES As drone applications continue to grow, this is creating new markets for startup companies to cater to. Thus, the challenge for these companies is to come up with a good product and match it with the appropriate customers. One way to do these is to focus on a particular market segment and figure out what specific needs or requirements are not being met. RISK ASSESSMENT & INSPECTION
For Sky Eye, they decided early on that they would like to focus on creating solutions that would help with dealing with dangerous situations. Primarily focused on risk assessment and inspection applications in industries such as agriculture, forest management, and the oil and gas industry, they partnered up with several companies to create drones that can provide thermal imagery and gas detection.
Financing the Dream
Startup Investing
Startup companies usually start with an idea, such as a way to formally address an important yet unresolved problem. However, ideas remain ideas if the founders are unable to secure the funding required to transform it into reality. Some companies are fortunate enough to come up with the funds themselves and there is an advantage to this because this would allow the startup to concentrate on creating and developing the product and not worry about keeping their investors happy. “During our developing phase we felt it important not to include financial stakeholders pressuring us, urging early releases and focusing on only revenue. We needed time to excel, allowing us to closely listen in on actual problems and needs, focusing on creating long-term solutions,” said Daniel Sällstedt, CEO of Sky Eye Innovations.
A lot of startups turn toward outside investment, participating in various investing rounds, each of which represents a particular stage in the development of the company. The first round, the seed round, is an investment made by angel or private investors early on, based on either the concept or an early prototype of the product. Flyability recently completed its second seed funding in 2015. With the funds received, they had the means to start shipping their prototypes to their customers and are preparing to launch its first professional product this year. The consequent funding rounds would take place when the business starts to take off and earn revenue. The company might want to build the business by employing more people or allocating money for advertising (round A). They might choose to further expand the business overseas or explore a different market (round B). EHang was able to secure series B funding; thus, enabling them to explore ways of expanding the use of their drones in both the private consumer and commercial market.
“We are currently the only manufacturer in the world supplying optimized solutions for FLIR SYSTEMS A-series, T-series, and OGI camera segment. By, for example, integrating FLIRs Camera G300a we made it possible as a world first to detect gas leaks from the air using our platform,” said Daniel Sällstedt, CEO of Sky Eye Innovations. Another company, Flyability, has drones that have been used in many industrial inspection applications such as in energy, maritime, and heavy industries, where people are often required to operate in dangerous and difficult-to-reach areas. Drawing from one of the founders’ background in robotics, particularly in mimicking insect flight capabilities, the company created a drone that can be used for close contact operation. “It is the first collision-tolerant drone, which allows it to operate in complex and confined spaces that cannot be reached by other technologies that require
63
Systems Integration in Asia:
Challenges and Opportunities for 2016
APR 2016 Ć” www.asmag.com
Several large Asian n economiess are dev veloping at a quick pace, and this is expected to boost the security y sy ystems integration business in the region. In th his article, we talk to some majjor Asian SIs to understand how they see the marrket and its posssibilities. BY Prasanth Aby Thomas
66
T
he Asia Pacific security industry is expected to see rapid expansion in the coming years, as some of the fast-growing economies in the region develop their infrastructure and seek solutions to issues such as crime and terrorism. A recent report from Transparency Market Research estimates this growth to be at 17 percent CAGR between 2013 and 2019. For security systems integrators (SI) in the region, this means more business opportunities. As nations develop, their concerns of security would increase, paving way for more proactive measures to protect their citizens and resources. Boosting sentiments further are initiatives like the ASEAN Economic Community, an agreement between 10 Southeast Asian countries to form a single economic bloc, something along the lines of the European Union. In this context, we asked some of the major SI in the region to share their perspectives on what to expect in the coming days. Here we present a summary of their answers.
MervinAng , CEO, i3 Technologies LenonC hoo, GM, Cyberguard Systems Sommai Damnoenkiat, MD, Vision and Security System William Goh, Executive Director, ADP Tech Danny Ng, VP of Sales, Yatai Security & Communications Mary Ann Ortiz, Marketing Officer, Alcon Philippines Technologies and Solutions Verghese Thirumala, MD, Maxitulin
How do you see demand for security systems integration in Asia in 2016?
T
here was a consensus among the SIs we interviewed that 2016 will see strong growth, but their reasons varied. William Goh, Executive Director of ADP Tech, said as concerns of terrorism continue to keep the region on its toes, security solutions will have a key role to play. “In view of the terrorist threats, public area security, infrastructure security, and cyber securities should be the main drivers which demand for higher level of integration, usability, business continuity, and off-site command and control,” Goh said. Sommai Damnoenkiat, MD of the Thailand-based Vision and Security System, a partner of Bosch Security Systems, echoed similar thoughts, citing his home-market conditions in particular. Thailand’s capital Bangkok was victim to a terror attack in 2015, and this increased demands for better national security measures. Others have pointed to technological developments and overall economic improvement as potential drivers for growth. According to Verghese Thirumala, MD of Maxitulin, progress in IT infrastructure and evolution of new concepts like big data and the Internet of Things (IoT) will enhance security systems integration. In terms of verticals, sectors like retail and transportation could see more demand, as steps to curb issues like theft in the former and improve passenger flow in the latter become more important. Speaking along similar lines, Mervin Ang, CEO of the Philippines-based i3 Technologies, one of Axis Communications’ partners, said growth of commercial buildings, especially in sectors like business process outsourcing (BPOs) are expected boost demand for security in his home market.
67
SMAhome
How many years has Deutsche Telekom been involved in smart home? Deutsche Telekom founded an alliance of companies from different markets in 2011, under the name of QIVICON. The companies collaborate on a cross-vendor, wireless-based home automation solution that has been available in the German market since fall 2013. Deutsche Telekom also now offers its Connected Home platform as a white-label solution, which has an interoperable, expandable, and scalable architecture that enables companies from multiple industries to develop connected home products and services and integrate them into a larger ecosystem.
How is the QIVICON platform leveraged for different markets?
Not only do these (OEM/ODM) companies represent only one product, they represent hundreds of customers. Thomas Knops, Head of Connected Home Marketing and Sales, Deutsche Telekom
Our strategy is to use QIVICON internationally where it makes sense. In some international markets, we will not use the QIVICON brand right from the beginning. QIVICON is the name of the platform, but if there is only one company starting to offer something based on the platform, it is not necessary to use QIVICON to communicate with the customer. However, as more companies join the platform, we will be more than happy to start using the QIVICON brand.
How can companies benefit from using the QIVICON platform or the Connected Home platform? Both QIVICON in Germany and our internationally available Connected Home
Partnerships Add Value for Smart Home Users
APR 2016 Ɣ www.asmag.com
Europe’s leading telco, Deutsche Telekom, has been in the smart home business for more than five years. SMAhome had the pleasure of speaking to Thomas Knops, Head of Connected Home Marketing and Sales at Deutsche Telekom to learn about the company’s five-year observations and strategies to create growth in the connected home. BY a&s SMAhome
72
platform are open and technologically expandable systems that enable companies to develop new solutions or services, extend existing products and adapt to new market potential and target groups. The partnership opportunities we offer with QIVICON and the Connected Home platform as part of our smart home business allow companies of all sizes, including major telcos and startups, to cooperate with other strong companies. Already, we have more than 35 partners on board that are each benefiting from cooperation on product development or on new and additional sales channels, to name just two of the many possibilities. Other benefits include a constant opportunity to open up additional sales potential in addition to existing business. For example, access new target groups, extend existing customer relationships with up- and cross-selling opportunities or use of applications and related services to create new bundles.
Do you suggest Asian manufacturers join QIVICON? There is not one answer, and the company needs to decide if they want to utilize the platform. If the company already has a footprint in Germany or Europe, then it makes sense for them to launch products on their own because they already have some experience. They have everything in place, like the sales channels and the logistics. But if it’s a new company, not necessarily one that has been seen in Europe, they might need support in different areas. In my opinion, it makes absolute sense to utilize a platform because first of all the platform helps you collaborate with other brands. Utility companies like Vattenfall in Germany, Entega, and others already use the QIVICON platform to sell certain product bundles. Some Asian
Connected Home Installed Base and Penetration EU and NA (North America) 2013 to 2019
Source: Berg Insight: Smart Homes and Home Automation, 2014; Note: Smart home installed base excl. overlap
Data will become the essential element of the connected service offering.
manufacturers might want to utilize the sales channel of different companies, for instance, utility companies. They can also collaborate with Deutsche Telekom or others who already have a good history in the market and all the sales channels ready. So it makes perfect sense to contribute and participate in the QIVICON platform in Germany or talk to us and use the white-label platform. The manufacturer can also utilize the platform to hook the product to an existing application, for instance to include their product in a mobile app, and the manufacturer will be included in this application. It works because it is one platform, and customers don’t care in the end how it works. In terms of scaling the business, we are now starting to internationalize, so if you’re a part of this, you can expand to other countries. Joining QIVICON provides additional business opportunities. For example, D-Link is part of QIVICON. Its products are incorporated in the application of Deutsche Telekom, and they will be sold via Deutsche Telekom. That is the QIVICON side of it, but D-Link is also doing their own business.
What are the biggest challenges Deutsche Telekom faces? One of the greatest challenges facing any firm seeking to enter the connected
73
Sony SNC-VB770 4K Network Camera
IDIS DC-S1283WHX PTZ Camera
Axis M3004-V Fixed Dome Network Camera
Features:
Features:
Features:
• 35-mm Exmor full-frame sensor • Intelligent Cropping feature for cropping images in 4K resolution • Intelligent scene capture feature automatically adjusts and adapts picture quality • Area-specific noise reduction selectively divides images into areas based on patterns (e.g. edges, textures, evenly colored areas) • Sensitivity under 0.004lx, ISO 409600
• • • • • •
• Vandal- and dust-resistant indoor fixed dome camera • Supports HDTV 720p and 1-MP resolution • 3-axis camera angle adjustment allows for mounting on walls or ceilings • Supports Axis Camera Application Platform • Offers horizontal viewing angle of 80 degrees • Supports Axis’ corridor format for vertically oriented video streams or areas such as corridors, hallways, or aisles
Smart UX controls Easy installation with NVRs Full HD 1080p resolution 30x optical zoom IP 66 support Low light enhancer
■ IDIS/Korea ■ Email: info@idisglobal.com
■ Axis Communications/Sweden ■ Email: axis-sap@axis.com
■ Sony Electronics Asia Pacific/Singapore ■ Email: pro.info@ap.sony.com
Grundig VMS Sense Pro Features: • Can be scaled to monitor single sites with very few cameras to large, multi-sited applications with a large number of cameras and integrated systems • Event-driven, alerting operators in real time as site incidents occur • Includes failover server setup for mission critical applications • Dual streaming technology and multi-casting both
Geutebruck G-Cam EHC-3285 Features: • 360-degree surveillance with a total resolution of 6 MP • 1/1.8” CMOS sensor with progressive scan • Low distortion conversion of the 360-degree image in up to 4 individual streams/areas (“dewarping” function) • 2 x Full HD 1080p resolution at 25 fps showing 2 areas (half split view) • PoE, 12 VDC possible • Virtual PTZ functionality in quad mode ■ Geutebruck/Germany ■ Email: info@geutebrueck.com
APR 2016 Ɣ www.asmag.com
82
help to reduce network bandwidth use • Uses open platform technology to ensure comprehensive integration with third-party video products • Mobile app allows remote viewing and control of VMS sites ■ Grundig/Germany ■ Email: info@grundig-security.com
Southwest Microwave Intrepid UniZone Plug-andDeploy Fence Detection Sensor Features: • Quick, easy set up and deployment • Advanced digital signal processing • Point impact discrimination prevents environmental nuisance alarms • Sensitivity leveling for uniform detection along fence line • Operates in harsh environments • Installs on most fence fabrics ■ Southwest Microwave/U.S. ■ Email: infossd@southwestmicrowave.com
ACTpro 1520e Single Door IP Controller Features: • • • • • •
Dual port Ethernet switch, allows for IP connection TCP/IP – DHCP/static IP addresses Break glass monitoring Entry and exit reader standard Reader short circuit protection 1,000 user groups
■ Access Control Technology/U.K. ■ Email: sales@act.eu
Dallmeier DDZ4220HD Outdoor PTZ Camera
Automatic Systems FirstLane 960 Turnstile
Oncam Evolution-05 Mini Indoor Night Camera
Features:
Features:
Features:
• • • •
• • • • • •
• 5-MP CMOS sensor • Video stream of up to 30 fps can be obtained at a resolution of 1 MP and 1/4 MP • IR sensitive to near infrared light (850 nm) • Can provide 3 simultaneous H.264 and MJPEG video streams • SD card slot available
1/2.8” progressive scan CMOS High-speed PTZ dome 20x/30x optical zoom with autofocus Day/night switching with removable IR-cut filter • Day/night switching with change of the presets • Memory expansion with microSDXC card ■ Dallmeier electronic/Germany ■ Email: info@dallmeier.com
Automation of pedestrian access control Restricts access to secured zones Low cost of ownership Employee and visitor entry/exit tracking Reduced need for manned entrance Low energy consumption for a low carbon footprint
■ Automatic Systems (part of Bolloré Group)/Belgium ■ Email: sales.asgroup@automatic-systems.com
■ Oncam Grandeye Technologies/U.S. ■ Email: sales@oncamgrandeye.com
Qognify VisionHub VMS Features: • High-end video management: relying on Qognify’s vast experience and robust video management core, a rich video experience with advanced features for video management, investigation, and export • Access control management: vendor agnostic integration to access control with a built-in two-way rich management module • Openness: integration with key security systems such as intrusion detection, fire detection, and alarm panels
• Visualization: GIS-enabled mapping to track incidents and sensors • Incident management: collaboration, automation, and workflows • Easy deployment: enhanced capabilities for faster and easier deployment ■ Qognify/U.S. ■ Email: info@qognify.com
Real Locks and Security RL-9046 Keyless Security Lock
WD 8 TB Purple Hard Drive
Features:
• Built for 24/7, always-on, high-definition security systems • Supports up to 8 hard drives and 32 cameras • AllFrame technology improves ATA streaming to reduce frame loss • IntelliSeek technology can calculate optimum seek speeds, keeping power consumption low • Three-year warranty
• Lock body: zinc alloy • Cylinder: brass (real detained disc cylinder) • Dual mechanism: digital combination and override key for emergency opening • Knob can be used for operation on opening, setting, and closing • Preset numbers can be detected from in front of the lock • Suitable for use on lockers, safe boxes, mail boxes, and other equipment, especially in need of convenient management ■ Real Locks and Security/Taiwan ■ Email: info@reallock.com
Features:
■ WD/U.S. ■ Email: lisa.yang@grandpr.com.tw
Dandy Locks Janus TN Electronic Lock Features: • 4-in-1 electronic lock (NFC mobile, RFID card, PIN access, and key) • App control interface is more user friendly than traditional keypad control system • Better battery life cycle (approximately 12 months) • ANSI and UL approved lock case • Elegant brass material trim and lever design • Multiple design award winnings (i.e. IF, RedDot, Golden Pin, Taiwan Excellence) ■ Duen-Yih Metal Industrial/Taiwan ■ Email: shihhuichi@dandlylocks.com
83
Companies in This Issue PRODUCTS OF THE MONTH • AVA RETAIL • KENTIX • TE CONNECTIVITY VIEWPOINT • G4S • TBS VERTICAL SOLUTION • ARECONT VISION • BOSCH SECURITY SYSTEMS • IDIS • ONYX INTERNATIONAL CONSULTING & SERVICES • PANASONIC MEA • SECURITAS UAE
SMART TECHNOLOGY • FLUIDMESH NETWORKS • BLUETOOTH SIG • Z-WAVE ALLIANCE • ZIGBEE ALLIANCE • IBM INTEGRATED SYSTEM • AIMETIS • AXIS COMMUNICATIONS • IDIS EUROPE • MILESTONE SYSTEMS • ONCAM • PELCO BY SCHNEIDER ELECTRIC • PIVOT3 • VICON INDUSTRIES
Next Issue
Integrated System ACCESS CONTROL MANAGEMENT SYSTEMS (LARGE/MULTI-SITE MANAGEMENT)
BUSINESS TALK • AVULAR • EHANG • FLYABILITY • SKY EYE INNOVATIONS SPECIAL FEATURE • ADP TECH • ALCON PHILIPPINES TECHNOLOGIES AND SOLUTIONS • CYBERGUARD SYSTEMS • I3 TECHNOLOGIES • MAXITULIN • VISION AND SECURITY SYSTEM • YATAI SECURITY & COMMUNICATIONS
Smart Device/Software SMART VIDEO AND THERMAL (INFRASTRUCTURE)
Vertical Market PRIMARY SCHOOLS
85
ADVERTISER INDEX *The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
23
ABILITY ENTERPRISE CO., LTD.
IP CAMERA / HOME CAMERA
TAIWAN
info@abilitycorp.com.tw
47
CHENGDU POWERVIEW SCIENCE AND TECHNOLOGY CO., LTD. SURVEILLANCE
CHINA
dennis@powerview.cn
21
CONNECTION TECHNOLOGY SYSTEMS INC.
SWITCH/CONVERTOR/ETHERNET MEDIA TAIWAN
sales@iConnectron.com
INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
8
DYNACOLOR INC.
IP CAMERA / NVR
TAIWAN
info@dynacolor.com.tw
25
EVERFOCUS ELECTRONICS CORP.
CAMERA / DVR / IP CAMERA
TAIWAN
marketing@everfocus.com.tw
35
FLIR COMMERCIAL SYSTEMS
THERMAL SURVEILLANCE
BELGIUM
flir@flir.com
59
FOCTEK PHOTONICS, INC.
LENS
CHINA
sales@foctek-lens.com
43
FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.
DOME COVER
CHINA
sales@fjsmt.com
9
GKB SECURITY CORPORATION
IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR TAIWAN
sales@gkbsecurity.com
5
HDPRO CO., LTD.
CCTV
sales@hdprocctv.com
48.49
HI SHARP ELECTRONICS CO., LTD.
CCTV / DVR / MONITOR / IP CAMERA / HD-SDI / TVI / AHD TAIWAN
sales@hisharp.com.tw
BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
17
IDIS CO., LTD.
SURVEILLANCE
KOREA
sales@idisglobal.com
4
MEERE COMPANY INC.
CAMERA
KOREA
sales@cube-eye.co.kr
38, 39
NEXTCHIP CO., LTD.
CHIP
KOREA
sales@nextchip.com
26, 27
QIHAN TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
marketing@qihan.cn
61
RICOM
LENS
CHINA
sales@forecam.com
2
RIFATRON CO., LTD.
DVR
KOREA
contact@rifatron.com
55
SHENZHEN COMMANDER TECHNOLOGY CO., LTD.
CASING
CHINA
sjw@yjdcase.com
12, 13
SONY CORPORATION DSBG. SYSTEM LSI DIVISION
SEMICONDUCTOR
JAPAN
-
6
SUN MYUNG ELECTRO-TELECOM CO., LTD.
CAMERA / DVR
KOREA
salem5@sunmyung.com
INSIDE BACK COVER
TAMRON CO., LTD.
CAMERA
JAPAN
newbiz@tamron.co.jp
15
TECHPOINT INC.
CHIPSET
USA
dma@techpointinc.com
11
VIDEOTEC S.P.A.
IP CAMERA / SOFTWARE / VIDEOSERVER ITALY
info@videotec.com
19
VIVOTEK INC.
IP CAMERA / SOFTWARE / VIDEO SERVER
TAIWAN
sales@vivotek.com
3
WEBGATE INC.
DVR
KOREA
support@webgateinc.com
10
ZEEANN CO., LTD.
CMOS IMAGE SENSOR
KOREA
sales@zeeann.com
KOREA
ACCESS CONTROL PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
53
GIGA-TMS INC.
RFID MODULE / LOCK / READER
TAIWAN
promag@gigatms.com.tw
37
UWC ELECTRIC (M) SDN. BHD.
ACCESS CONTROL
MALAYSIA
sales@uwcelectric.com
7
VANDERBILT INTERNATIONAL
ACCESS CONTROL
SWITZERLAND -
PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
41
ICPDAS CO., LTD.
BUILDING AUTOMATION SOLUTIONS
TAIWAN
info@icpdas.com
OTHER
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
87