A&S #I206 Feb 2016

Page 1


CONTENTS

Feb 2016 www.asmag.com

Integrated System

Addressing Integrators’ Questions on

Smartphone Entry to Hotel Guestrooms .......................32 Smart Lock: First Trigger of the Smart Home..................................................... 38 News Feature

Johnson Controls, Tyco to Merge, Create Leader in Building Technology............................... 24

P. 32

Viewpoint

Mergers and Acquisitions — What Does the Past Tell Us About the Future.......................... 26 Cross-Functional Communication and Citizen Engagement: Technology Enhancements for Achieving Situational Awareness.................... 28 Smart Technology

Apps Widen Scope for Integrated Security on the Move......................................................... 42 Vertical Solution

Chain Stores Count on Security for Better Loss Prevention and Business Decisions..... 46

P. 46

Solution Design

IP Security Systems – a “Jumping Board” for Cyber Intrusion.................................................... 50 Business Talk

Manufacturers Seek Partnerships to Strengthen Market Share...................................... 54 Looking into the Pricing Structure of Managed Security Services............................. 58 SMAHome

FEB 2016 ● www.asmag.com

7 Must-See Outdoor Home Cameras of 2015/2016.......................................................... 62 4 Must-See Smart Video Doorbells of 2015/2016.......................................................... 66 Contents...................................................14 Editor’s Note ...........................................16 Application Cases....................................18

14

P. 50

Products of the Month.............................22 New Products..........................................70 Show Calendar .......................................74

P. 42 Companies in This Issue.........................77


a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

Frequent M&A Activity to Continue in 2016 ergers and acquisitions (M&A) activity is occurring more and more frequently. Following the last major M&A deal in 2015 of FLIR Systems acquiring DVTEL, Johnson Controls announced plans to merger with Tyco International in the beginning of 2016, which gained a lot of attention in all the industries. Overall, this M&A allows for both companies to share their resources and create good synergy in the building automation market sector, as well as further realize the Internet of Things (IoT) potential in this market, especially combining specialized security technologies from Tyco International. Most surprisingly, their announcement also forecast the disappearance of the Tyco brand in the future. Then, rumors turned to Johnson Controls’ competitors, speculating another major M&A in the building automation sector will also happen in 2016.

FEB 2016 ● www.asmag.com

Around a week after the Johnson Controls-Tyco announcement, Axis Communications acquired Citilog, a provider of intelligent real-time video monitoring for traffic and transportation security and safety, something quite new to Axis, which was just acquired by Canon in 2015. Axis has been quite focused on key technologies and components of IP cameras. The company’s first acquisition shows its ambition to expand its strength to the fast-growing traffic analytics market. These M&As are also a sign of how competitive the security market is right now that companies are striving to stand

16

out in terms of product innovation and performance; even when the company already has a huge amount of technological partners around the world. Other major acquisitions that influenced the global security market in 2015 the most are as follows: • Avigilon completed the acquisition of ObjectVideo and 96 other international video analytics patents • Canon Inc. completed the acquisition of Axis Communications • OnSSI acquired Seetec

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director/Publisher General Manager

Editorial

General Press Jill Lai Editor-in-Chief Alf Chang Senior Consultant Eifeh Strom Senior Editor William Pao Reporter Lisa Hsu Reporter Prasanth Aby Thomas Reporter Emily Lin Reporter

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Circulation & Subscription

Michelle Shih

Officer

michelle.shih@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

asmag.com

Willy Wang Jessica Yang

Manager Product Manager

willy.wang@newera.messefrankfurt.com jessica.yang@newera.messefrankfurt.com

Secutech

Echo Lin Trade Fair Manager Eva Tsai Project Manager Sandra Chen Project Manager

echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com sandra.chen@newera.messefrankfurt.com

International Advertising

[Headquarters]

• Kaba merged with Dorma • Vanderbilt Industries acquired Siemens Security Products • Allegion acquired SimonVoss • Hanwha Group acquired Samsung Techwin (now Hanwha Techwin) • NICE Systems sold its physical security unit to Battery Ventures (now Qognify) These M&A deals show the security industry is still fast evolving to absorb new technologies and expand to new markets. We predict that IoT, big data, and cybersecurity should be major considerations of future M&A deals. We expect more M&As in 2016, perhaps between Asian companies and non-Asian companies.

Juihui Lin Kay Yang Audrey Fang Nori Chang

Manager Operation Officer Coordinator Coordinator

juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana

USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

jill.lai@newera.messefrankfurt.com


Application Cases

>> Public Utility

GKB Secures South African Power Plant

FEB 2016 ● www.asmag.com

Additional power stations and major power lines are continuously being built in South Africa as a response to the country’s rising demand for electricity. One problem faced by these sites involved subpar video streaming as most of the power stations only support a very low bandwidth of 40 bps, making it nearly impossible to have simultaneous remote real-time viewing and pop-out alarm live viewing of important events. Datavision, GKB Security’s partner, created a turn-over IP solution for a local power plant that combined the use of GKB IP cameras, cloud NVR, and IVAST alarm system. To accommodate the low bandwidth, they deployed GKB speed dome, dome, and bullet cameras, along with Linux NVRs. The cameras support multiple streaming so it became possible for the operators to make network adjustments based on users’ conditions while the IVAST system allows remote alarm and viewing from different sites under low bandwidth simultaneously. Additionally, the cloud NVR provided great convenience because a single account can be used to manage numerous cameras at different sites. Hierarchical management and multiple video streams can also be applied if needed.

>> Law Enforcement

Genetec Connects LAPD Security Operations

The Los Angeles Police Department

18

(LAPD) in California employed Genetec’s Federation-as-a-Service (FaaS) cloud-based service to help ensure the security of the athletes and attendees that participated in the 2015 Special Olympics World Games. The LAPD leveraged FaaS to connect its command post to monitor over 400 video cameras that were spread throughout multiple venues including the Staples Center and the LA Live entertainment complex area, along with other athletic complexes and event facilities in Los Angeles and the nearby city of Long Beach. The system required no additional on-site servers and facilitated a seamless connection across all the sites, including ones that were already outfitted with their own security center system and managed by their respective police and security forces. FaaS enabled all stakeholders to define which cameras were shared, which operators could access them, how far back operators would be authorized to view recorded video, and what level of control the LAPD would have over the PTZ cameras. It was also possible to cap the video stream quality when multiple cameras were being viewed, helping to limit the bandwidth required.

>> Hospitality

Siklu’s Wireless Solution for US Resort

In Colorado, Siklu Communication’s 60 GHz and 70/80 GHz wireless radios were deployed to enable gigabit wireless backhaul and to extend the town of Vail’s underground fiber infrastructure for communication and surveillance. One of the largest ski resorts in the

world, the town’s underground fiber optics connects the town buildings, facilities, surveillance cameras, and wireless access points. A wireless solution was sought to extend the reach of the municipal fiber network, which in many locations, terrain challenges made fiber laying a physical impossibility. The town also wanted to add new megapixel cameras and upgrade analog surveillance cameras to IP. Siklu’s mmWave radios were selected to deliver interference-free Gbps to futureproof Wi-Fi and video surveillance services, and enable speedy and foolproof recovery. Siklu backhauled selected cameras from Arecont Vision and Axis Communications as well as integrated these new cameras with Milestone Systems’ Xprotect Expert version VMS to create a reliable surveillance network. Today, wireless backhaul capacity has soared from 20 to 50 Mbps to Gbps and the new cameras have improved video quality, shifting from low-rate standard resolution to multiple megapixels at 30 fps.

>> Corporate

Bosch Enhances Workplace Fire Safety in UAE

Bosch Security Systems installed a fire alarm system at Etisalat, the leading provider of telecommunications services in the United Arab Emirates. The Etisalat headquarters in Abu Dhabi, which covers a 25-floor office building and a nine-floor parking garage, was equipped with five modular fire panels 5000 Series, as well as 800 smoke and heat detectors. Thirty duct smoke detectors were also installed in air ducts throughout the office tower and manual call points were installed at each of the 100 exits. The modular construction will allow for additional buildings and alarms to be integrated easily into the main system. The centralized building integration system (BIS) is used to coordinate, operate, and monitor all of the alarm system components. In addition, the integrated Bosch Fire Telephone and Voice Evacuation (EVAX) system


combines alarm information with floor plans and emergency evacuation routes. Bosch partner GECO installed the new fire alarm system at the Etisalat headquarters, using the building’s existing wiring. They were also able to incorporate the existing loud speakers into the system due to open standards.

>> Airport

Morpho Expedites US Travel Security Screening Process

The Transportation Security Administration’s TSA Pre program is an expedited security screening program that connects travelers departing from more than 150 US airports with smarter security and a more convenient travel experience. Enrollment in the program will allow travelers to go through security checkpoints without removing their shoes, laptops, liquids, belts, or light jackets. MorphoTrust USA (Safran), currently the sole enrollment services provider for the TSA Pre program, ramped up its efforts to meet the growing demand for enrollment through its IdentoGO Centers. Passengers begin the application process by pre-enrolling online and making an appointment at a local center. Upon arrival, trained agents verify approved identity documents and obtain biographic information before live-scanning applicants’ fingerprints and securely transmitting the application package to TSA for review. The agency completes the application vetting process and issues a known traveler number (KTN) via mail once the application is approved. The company has also launched a mobile enrollment program for businesses and other organizations as well as formed partnerships with companies such as H&R Block to provide enrollment services at a growing number of retail locations.

>> Airport

Tyco Selected for Turkish Airport Security

Tyco Security Products has announced that Izmir Adnan Menderes Airport in Izmir, Turkey, has chosen its unified security solution for managing live and recorded video and access control at its new domestic terminal and parking garage. Tyco’s victor video management system, along with multiple VideoEdge NVRs, enabled airport officials to manage both new IP cameras in the new terminal as well as the current analog cameras in an existing terminal on one integrated platform. The NVRs allow multiple streams of video for live or recorded viewing, including alarm-based incidents. Embedded video analytics also helps the airport’s security officers easily identify and address suspicious activities in real time, including people loitering and objects/ luggage left behind. Using the Software House C•CURE access control platform for security and event management, Izmir airport security personnel are now able to better monitor restricted areas in the terminal, along with customs and apron areas. The platform also serves as the backbone for integrating video surveillance and access control, so operators can view video triggered by alarms.

>> City Surveillance

Axis Helps Monitor Expressways in Brazil

The São Paulo State Military Police (PMESP) in Brazil decided to expand

and modernize its monitoring system along two major expressways: Marginal Tietê and Marginal Pinheiros. These roadways are frequently scenes of accidents, acts of protest, and various types of criminal activity. They installed 82 Axis Communications network cameras which are managed using video surveillance software from Genetec, an Axis partner. Their high-definition images allowed a detailed overview of events on the two roadways, day and night. Operators at the control center can select specific persons or objects and use auto-tracking to monitor their movements. The success of the Axis cameras on Marginal Tietê and Marginal Pinheiros inspired the military police to try out installing cameras in the open space underneath the suspended structure of the São Paulo Art Museum, located on Avenida Paulista. The resulting solution, which allowed the operator to zoom in to view details without losing wide-range overview capabilities, was evaluated as a potentially important tool to assist the São Paulo police in their strategic crime-fighting efforts.

19


Smart and Secure Products Presented at CES

Editor’s Note:

This year at CES 2016, numerous smart products were showcased that used innovative technology to provide users with more automated functions. Among these is a noteworthy selection of products emphasized on adding a layer of security protocols.

Irving Self-service ATM Concept

E

yeLock and Diebold have teamed up to develop the screen-less, self-service ATM concept, called Irving. The card reader, PIN pad, and physical screen are completely eliminated on the ATM. To take advantage of the technology, a customer signs into their banking app on their phone or tablet, and determines how much money to withdraw. Once the withdrawal is input, the customer can go to any EyeLock-equipped ATM on the network to complete the transaction. The customer would simply approach the machine, which scans the iris of their eye, to ascertain identity and verify transaction via quick response (QR) code. The ATM then dispenses the correct amount of cash. • Bring-your-own-device (BYOD) access eliminates the need for a physical screen, card reader, or PIN pad • Customers schedule their transaction securely using their own smartphone • Eliminating the PIN pad reduces complexity and streamlines processes inside the terminal, Supplier: Diebold

slashing the potential for card fraud • Authenticates users via near field communication (NFC) and QR code, and biometrics • Removing the card reader from the terminal eliminates the possibility of skimming and other card-related fraud URL: www.diebold.com

IKILOCK

I

KILOCK is not just another Bluetooth smart lock, it relies on several protocols to deliver reliable and secure door management. When the user unlocks IKILOCK using the app on their smartphone, the request is sent to IKILOCK’s remote server via the phone’s mobile broadband. After the Wi-Fi connected IKICENTER receives the request from the remote server, it orders IKILOCK to unlock using ISM 6LoWPAN technology. • Uses ISM 6LoWPAN technology, which implements stronger authentication processes than Bluetooth, and has a longer range • Allows for the creation of an unlimited number of virtual keys and assigns time for accessibility • Provides live updates and notification of the lock’s status Supplier: IKILOCK

• Several modes to grant access: hands-free proximity with Bluetooth, administered remotely through Wi-Fi and traditional metal keys • Simple, secure, and convenient way to manage home security and connectivity through the use of Bluetooth, Wi-Fi, and mobile technology URL: www.ikilock.com

Delta Leak Detector

T FEB 2016 ● www.asmag.com

he Delta Leak Detector identifies a water leak in your home, allowing you to respond before it becomes a bigger issue. Unlike other leak sensors, the detector does not require a hub to send alerts about a potential water disaster. A detector placed under or near each of the home’s water sources will send an alert to the user’s smartphone upon detection of water, which can be the difference between a minor fix and a major problem. • Each individual detector can independently send notifications to your phone • Low-power software will not overload home Wi-Fi • Each unit it powered by three AAA batteries; the device will last approximately two years • In addition to alerts being sent directly to the Supplier: Delta Faucet

22

user’s phone, audible alerts and an LED light at the source will help the user find the leak • If water hits either ring on the bottom of the leak detector, it will send out an alert to the user’s smartphone — unlike most leak sensors that will only trigger when water pools underneath them URL: www.deltafaucet.com


Johnson Controls, Tyco to Merge, Create Leader in Building Technology In yet another deal that gathered the attention of the industry, Johnson Controls, a leader in building management and heating/ventilation equipment, has announced it will combine with global fire and security provider Tyco International, with the goal of offering more integrated solutions combining security and building automation. BY William Pao

n January 25, Johnson Controls and Tyco International announced that they have entered into a definitive agreement to merge. According to the agreement, Johnson Controls shareholders will own about 56 percent of the new company and receive aggregate cash consideration of approximately US$3.9 billion. Tyco shareholders will own the remaining 44 percent. The transaction is expected to complete by the end of fiscal year 2016 and is subject to customary closing conditions, including regulatory approvals and approval by both Johnson Controls and Tyco shareholders. A major ramification of the deal is the disappearance of the Tyco brand, for decades a household name in the security industry. Under the terms of the transaction, the businesses of Johnson Controls and Tyco will be combined under Tyco International, which will then be renamed ”Johnson Controls.” The sheer size of the new company will be significant. ”Johnson Controls has an existing security system integration business which the latest research from the Physical Security Channel Intelligence Service at IHS estimates to be the 10th largest in the world. Meanwhile, Tyco Fire & Security is estimated to be the world’s largest security integrator. The two companies would have a combined share greater than 5 percent of a global market worth around $62 billion,” said Paul Bremner, Senior Analyst for Security Services at IHS. ”Despite this, the security integration supply base would remain highly fragmented, with the top 15 integrators accounting for only around 20 percent of revenues.” Under the deal, the combined company is expected to remain in Tyco’s Irish legal domicile and global headquarters in Cork, Ireland. The primary operational headquarters in North America for the combined company will be in Milwaukee, where Johnson Controls has been based. Due to the inversion nature of the deal, it has drawn criticism that the move was for the new company to pay less tax.

FEB 2016 ● www.asmag.com

Highly Strategic Move But that aside, the deal is highly strategic, aiming to create synergy between two companies whose strengths lie in different fields. Johnson Controls, which sold its federal security integration business to Versar in October last year and has also announced plans to spin off its automotive parts unit, will move a step closer to its goal of offering total security-building automation solutions. ”Johnson Controls has not kept up with the pace of innovation in fire and security,” said Jim McHale, CEO of Memoori Business Intelligence. “They remain strongest in

24

building management systems and HVAC controls, which have much more in common with their other divisions such as batteries and distributed energy storage.” Tyco, on the other hand, is a leading security conglomerate with well-known brands such as Software House, exacq, Kantech, and DSC that cover video surveillance, access control, and intrusion alarms fields. Yet the company has seen its share of ups and downs. In 2007, it split into three units: Tyco Healthcare, Tyco Electronics, and Tyco International. Then in 2012, Tyco International split again into three, spinning off ADT in the U.S. and a flow control company, Pentair. For a company that seeks to gain further strength and competitiveness in the market, merging with Johnson Controls seems to be the right fit. In the end, given the increasing ties between building automation and security, companies from both industries combine to leverage shared resources and create synergy. The latest deal between Johnson Controls and Tyco International is one example. And with the trend showing no sign of stoppage, we may very well see similar deals to come in the near future.


Mergers and Acquisitions —

What Does the Past Tell Us About the Future Memoori shares its insights into M&As in the physical security manufacturing industry. BY Memoori Business Intelligence

FEB 2016 ● www.asmag.com

emoori Business Intelligence has been charting merger and acquisitions (M&As) in the world physical security manufacturing industry for the last 15 years and it has been a roller coaster ride with an average rise and fall cycle lasting between three and four years, making it a volatile market to predict. Figure 1 shows the value of deals consummated since the year 2000 and identifies the value of cash deals. The volatility has been caused by a number of factors. The first is that the industry underwent a major restructuring during the period 2009 to 2011 after the 2008 financial crisis. The second is the lack of confidence and or interest by many of the major conglomerates in the business to commit more investment to the industry, and the third reason is that since 2011 there has been a significant fall off in the number of deals from buyers outside the business, particularly defense and IT. We would have expected these three factors to have resulted in a much greater reduction than 40 percent in the value of acquisitions since its peak in 2011. The main reason for this is that over the last three years consolidation within the industry has become the main driver. Acquisition activity in the middle market, mainly populated by specialists focused security companies, has significantly increased in the last three years and this has produced a number of financially stronger companies with funds to invest

26

in new innovative products. The net result is that over the last 15 years expenditure on acquisitions has grown at a CAGR of 7 percent. This year the value of deals increased to US$5.7 billion with Axis being acquired for $2.8 billion by Canon and the merger of Kaba Holdings and Dorma Holdings. The first shocked the market with an offer of $2.8 billion cash, which delivered an exit value on revenue of 4 and an exit value on EBIT of 45. The world’s largest camera maker offered 340 kronor ($40) per share, almost 50 percent more than the stock’s closing price. The merger of Kaba Holdings and Dorma Holdings was the second mega deal and together these accounted for more than 80 percent of the total value of acquisitions this year, but this is down by 40 percent on the peak year of 2011. Throughout the last 15 years the acquisition of video surveillance companies has had the highest share by value and in 2015 this stood at 49 percent but was the second highest by number at 16.3 percent. Over the last three-year period it has delivered the most consistent performance. In 2015 access control recorded the second highest share by volume at 21.6 percent and value at 36 percent well exceeding its volume of 11.5 percent in 2014, which was down from 16.6 percent in 2013. Access control sales have significantly increased this year and it is the rising star of the physical security industry and therefore not surprising that it is also very active in growth through acquisition. The intruder alarms and perimeter protection business accounted for a share by volume of 2.7 percent in 2015, well down on 2014 at 11.5 percent, but this being well above its average performance during the last five years. So what does the past history tells about the future size, direction, and impact of mergers and acquisitions on our industry. The last three years has shown that there is a Figure 1


much stronger drive for acquisition to be an internal matter driven by the need to acquire leading edge technology, expand geographic scope, and across the different branches of physical security. Balancing these facts out, we forecast that the trend in M&As across the physical security industry will increase to $6.5 billion by 2020. We expect some of the major conglomerates may sell off parts of their security products businesses and this will provide a great opportunity for the specialist manufacturers to continue their M&A strategy. There will be pressure by venture capitalist companies having investments in slow growth companies to either divest or turn to acquisition to solve this problem. That assumes that going for an IPO is not an option that many are likely to be taking at this time. We expect the most important driver for acquisition over the next three years will be to accelerate growth through expanding geographic scope and the major imponderable here is will western manufactures buy into China and will Chinese companies acquire western manufactures to both gain IP technology at the enterprise level and strengthen their routes in overseas markets particularly the U.S.

In the video surveillance sector major western manufacturers will take a serious look at buying a Chinese-based company if they believe this could improve their chance of opening up the China market but whether this is possible or practical is debatable as government contracts are taking the lion’s share of the business. It seems more likely that the leading Chinese manufacturers that now have significant share of the SMB market in the U.S. and parts of Europe have good reason to acquire western companies with leading IP technology at the enterprise level. However it has just been reported that Hikvision Digital Technology has been granted a $3.1 billion debt financing package over the period 2015 to 2019 by the China Development Bank, one of the three government-owned policy banks. This will provide it with tremendous support to further its global expansion. It would seem a logical move for Hikvision to seek out a major acquisition of a western video or access control manufacturer, assuming that they believe this the best way to operate within western markets. But we should remember that this level of debt financing gives them the opportunity that no other western company could even dream about. The need to acquire leading edge technology may drive them to acquire western companies but only when China is ready to absorb it. There is plenty of anecdotal evidence to show that in just two industries alone LED lighting and photovoltaic cell government agencies have placed a consistent stream of orders to help build up selected quasi-Chinese private companies. This has allowed them to achieve very large-scale output, allowing them to sell at low prices in both home and overseas markets. We are not suggesting that this could be the fate of western manufacturers of video surveillance equipment because it is not yet a commodity product across the whole range of needs, but in the SMB market Chinese products are fast driving out their competition. Whatever, strategic acquisitions will continue to play an important role in strengthening manufacturers competiveness and producing a more consolidated and robust physical security industry. * This article has been taken from Memoori’s 2015 Annual Report - The Physical Security Industry 2015 - 2020.

27


FEB 2016 â—? www.asmag.com

The guest is increasingly demanding mobile check-in, which has been in use for many years in the airline industry and is becoming important for hotels to offer.

32


Addressing Integrators’ Questions on

Smartphone Entry to Hotel Guestrooms BY William Pao

Locking systems for hotel guestrooms have gone through an evolution, from mechanical keys to proximity cards to a smartphone-based technology, which is now seen in a number of hotel chains across the globe. While the convenience and user experience such technology offers are attractive, installers and end users should gain a better understanding of the technology and some of the challenges involved before deciding how to go about it.

ncreasingly, the hospitality industry is seeing a change in the way guests enter their rooms. Traditional mechanical keys or keycards that you insert into the reader have steadily given way to smartphonebased locking systems whereby the guest points their digital key-loaded smartphone at the lock, and the door opens. The demand for this kind of technology is on the increase. A main reason is the ease and convenience associated with it. “The use of mobile check-in and smartphone technology to gain entry to one’s guestroom allows a guest to significantly reduce or completely bypass the lobby registration process. The ability to go directly to their

room minimizes the time and potential aggravation of check-in, which may improve the guest experience,” said Gregory Botsch, Principal of Production Direction at John Portman & Associates. “With the hospitality trend towards providing smart guestrooms, this is a logical progression.” “The guest is increasingly demanding mobile keys and hence mobile check-in, which has been in use for many years in the airline industry and is becoming important for hotels to offer,” said Magnus Friberg, CEO of Zaplox. At the same time, the technology is also becoming more mature. “Most smartphones today will have a near-field communication (NFC) chip as well as built-in Bluetooth that enables them to communicate with other devices such as point-of-sale terminals and even door locks,” said Peter Romanov, Commercial Director of Hospitality and Access Control for EMEIA at Allegion. Already, smartphone-based locking systems have been deployed at some major international hotel chains. Starwood Hotels, for example, have installed mobile guestroom entry in conjunction with Assa Abloy. Under the partnership, Starwood Preferred Guest (SPG) members with Bluetooth Low Energy (BLE) smartphones receive a guestroom mobile ID via the SPG app before arriving at the hotel and can go straight to their guestroom.

33


Smart Lock: First Trigger of the Smart Home As the smart home trend takes off, so are smart locks, which can be opened or locked with the homeowner’s smartphone and connect with various home automation devices. Sensing this trend, lock vendors have rolled out their smart lock solutions to offer a more automated living experience. BY William Pao

FEB 2016 ● www.asmag.com

mart locks, which interact with the smartphone and automatically trigger smart home products such as lights and thermostats once the user gets in, are now seen more and more at the front door. “As adoption increases and technology develops further, smart locks will offer the homeowner more convenience and connectivity while maintaining security and control,” said Donald Beene, Product Manager for Smart Home at Allegion. Henning Overgaard, CEO of Poly-Control which makes smart locks called Danalocks, said home smart locks’

38

growth potential will be significant. “We have been in the business for almost 15 years doing smart locks. For the last year, things have moved, and we think that maybe in the next two years things will really take off,” he said.

Technology Needless to say, using the smartphone to open doors brings the homeowner more convenience, which is a main selling point for smart locks. With these locks, the homeowner doesn’t need to bring keys or worry about losing them again. Rather, the door can be opened with the device that’s most personal to everyone, the smart device. When the smartphone is used to open the smart lock, two primary technologies are used to enable the handshake between the two: near-field communication (NFC) and Bluetooth Low Energy (BLE), the latter of which is now gaining prominence due to its pervasiveness and ability to allow a more secure communication. “BLE chips are cheap and increasingly found in every modern smartphone, tablet, and laptop, and this opens up our smart device interoperability over BLE,” said Rocco Vitali, Product Manager of Electronic Security Products at ISEO Serrature. “Security of communication over the BLE channel is achieved with the Advanced Encryption Standard (AES),


Donald Beene, Product Manager, Smart Home, Allegion

Mark Fish, Director, Sales and Business Development, Yale Locks and Hardware

Henning Overgaard, CEO, Poly-Control

using session keys exchanged with DiffieHellmann Elliptic Curves and generated using the NIST-compliant random number generators.” “We both encrypt and authenticate all messages sent with the latest standards to ensure no messages can be ‘replayed,’” said Cameron Robertson, Co-Founder and CEO of Lockitron. NFC solutions, meanwhile, also exist. “Our locking system can be controlled using Android-based smartphones featuring NFC. The smartphone forwards all the events from the door to the online administration to keep the entire system up to date,” said Hanspeter Seiss, Product

Cameron Robertson, Co-Founder and CEO, Lockitron

Hanspeter Seiss, Product Manager, EVVA Sicherheitstechnologie

Rocco Vitali, Product Manager, Electronic Security Products, ISEO Serrature

Manager at EVVA Sicherheitstechnologie. “All transferred data is secured with cuttingedge encryption standards.”

Other Benefits There are other advantages to smart locks as well. One of them is better security over traditional metal keys and locks. “Metal keys are so easy to bump, crack, snap, kick, or jemmy-open, and they don’t really provide peace of mind in securing your home,” said Steve Dunn, CEO of LEAPIN Digital Keys. “Isn’t it ironic that people’s most treasured possession, their family, and often their second most treasured possession, their home, is protected with a US$20 to $30 piece of flimsy metal that anyone can get through by simply watching a two-minute YouTube video about lock bumping and purchasing or making a bump key for $10?” According to Dunn, a smart lock’s true value comes when it is coupled with stainless steel security screens on windows, doors, and door frames. “Statistics show that most break-ins occur through smashed windows, or from kicking down back doors with wooden frames,” he said. “Installing smart locks with steel screens, doors, and steel frames

39


Apps Widen Scope for

Integrated Secur Mobile apps that provide access to surveillance data have become a standard feature for most solution providers. We look at the various features these apps offer, their security, and possibilities in allowing access to integrated solutions. BY Prasanth Aby Thomas

FEB 2016 â—? www.asmag.com

odern technological developments are increasingly centered on the ability to access information anytime from anywhere. This is true in the security industry as well, as mobile applications that let users access surveillance data have become an integral part of solutions. The concept of remote monitoring has received much attention over the recent years. According to a report from IHS “remote� had been a bit of a buzzword for video surveillance as early as 2012. Video surveillance as a service (VSaaS) and its ability to provide remote access was then predicted to be an upcoming area in the market. Fast forward to 2016, almost all solution providers offer their own apps for various mobile platforms, with an array of common functions. But subtle differences in their features and facilities make it important that customers familiarize themselves with them before making a purchase decision.

42

The Key Functions in the App The most important function that a mobile app for security surveillance should provide is the option to view surveillance feeds, in real time and otherwise. According to Joacim Tullberg, Global Product Manager for Video Management Systems at Axis Communications, this along with core forensic capabilities for instant viewing of recorded material is the key function of an app.


ity on The Move Matt Connolly, Director, CudaCam Sales, Barracuda Networks

Dean Drako, President and CEO, Eagle Eye Networks

Joacim Tullberg, Global Product Manager, Video Management Systems, Axis Communications

Remote playback is often supported if the camera has local storage.” There are others who offer a different take on the subject. According to Dean Drako, President and CEO of Eagle Eye Networks, the most basic function of a mobile surveillance app is the ability to see a simple camera view, while today’s sophisticated apps can display footage from any number of cameras from the across the globe, and allow you to view historic video. If the solution is cloud-based, it allows the user to use the app without the limitations of onsite storage. Matt Connolly, Director of CudaCam Sales at Barracuda Networks, added that along with the above-mentioned features, the app should also provide the option to download and share visuals or events. This last point, of “events,” is increasingly becoming a crucial factor in security solutions. A facility to allow event-based actions would require the app to incorporate certain configurations that would intelligently detect elements in the surveillance data and take adequate reactionary steps.

Enabling Intelligent Solutions on Mobile

But while this can be seen as a general requirement, its actual implementation could depend on the vendor’s choices. According to John Zhang, CEO of Drive Headquarters, the nature of storage plays a key role in the remote monitoring functions of the app. “The common feature is they all can support live viewing,” said Zhang. “The actual implementation can be very different. Many apps can only support live view locally. Remote monitoring can be implemented through server relay or P2P.

With the advent of technologies like the Internet of Things (IoT), there is more and more focus on intelligent solutions that can ensure comprehensive security. Surveillance cameras and video management software (VMS) are increasingly being integrated with other connected devices and are becoming smarter. For today’s mobile apps, this means options that go beyond simple access to data would be a key requirement. To some, this doesn’t necessarily mean the app in itself should offer intelligent options, but it should definitely be able to incorporate access to the intelligent functions in the security equipment. “Main parts of the intelligence are in the system, where the VMS and cameras stand for most of the intelligence,” Tullberg said. “The key function of the app is to present these ‘intelligent’ functions in an easy to use and understand interface.” Others point out that apps themselves can be designed to be smart enough to detect certain events and alert the user. Connolly said his company’s apps offer motion event triggered email alerts, where a user may choose to review the triggered event from within the app. This is in fact considered a common function, offered by other vendors too. “Some examples of our event-triggered options are our motion alerts,” said Drako.

43


r o f n s y e t os i i r r t o u n t n c e S e o v i S n e s i i n r a c P o e h C unt oss ss D L o r C tte sine Be d Bu an r nce eela l, Fr o g o el G Isra BY

FEB 2016 â—? www.asmag.com

Retail is one of the verticals most associated with video surveillance systems, particularly for shrinkprevention. We reached out to several manufacturers to hear from them which features are important in the implementation of security systems in chain stores. 46


hain stores are a dominant part of the retail market all over the world and are found in retail, dining, and other service categories. They include any player from small local businesses with two to three branches to national chains with hundreds of locations. Despite their vast diversity they all share similar characteristics like a common brand image, central management, and standardized business methods and practices. The unique characteristics of chain stores naturally affect the design and implementation of video surveillance and other security systems. For example, the centralized management and multiple locations determine the structure of the security system. Usually one central team is in charge of multiple locations and the security system must therefore help solve the team’s work constraints. “Security personnel are more centralized and therefore need access to surveillance video from across the chain quickly,” said Karl Pardoe, Regional Sales Manager U.K. and Ireland at March Networks. “What chain store security managers usually want is to integrate high quality surveillance video with POS transaction data, so that searches can be carried out very quickly across dozens, or even hundreds of stores to detect incidents.” Pardoe further explained chain stores want to be able to customize reports, view transactions potentially indicative of theft, and receive daily reports from multiple cameras or locations to check for suspicious behavior. Furthermore, unless this is automated,

Johan Åkesson, Director, Business Development, Retail, Axis Communications Charlie Erickson, VP, Product Management, 3xLOGIC Jumbi Edulbehram, Regional VP, Americas, Oncam Atul Ghaisas, Business Development Manager, Asia, Pacific, and India, Tyco Retail Solutions Karl Pardoe, Regional Sales Manager, U.K. and Ireland, March Networks

it can be time consuming, which does not allow for quick analysis. Remote access to video footage, and the ability to easily share files with third parties (such as local authorities) during investigations were mentioned by all of our interviewees as extremely important. “For loss prevention managers, accessing video from multiple store locations remotely helps to cut travel costs, reduce response times, and perform investigations promptly and efficiently,” said Jumbi Edulbehram, Regional VP of Americas at Oncam.

Demanding Technical Environment Installing, running, and accessing video footage from across different locations and regions requires a high degree of reliability. In addition, chain stores are dynamic by nature. Each chain wishes to expand and open new branches so the scalability of the system is critical. “For a large-scale chain store with distributed storage and central management, the important thing to consider is that the manufacturer they choose has sufficient ability to ensure the efficiency and stability of cross-regional network structure,” said Adler Wu, Product Marketing Manager in Hikvision Digital Technology. “This is the advantage of an all-in-one solution provider, which translates to lower total cost of ownership when taking into account the optimization of system scalability and maintainability.” From a corporate point of view these systems have to be easy to manage as a whole. Software updates and configuration changes need to be globally applied. Monitoring and reporting when systems have issues is also critical. “To support employees who travel from site to site, you need to offer a very consistent experience at every location. Systems have to be configured and set up the same, right down to the process for naming cameras for each register,” said Charlie Erickson, VP of Product Management at 3xLOGIC. “There has to be an easy way for users to look at all the sites they are responsible for and the software must be able to identify which stores and which employees they need to focus their precious time on.” Erickson highlighted that this attention is also needed at the initial installation and roll out. Systems integrators operating in different locales still have to deliver a consistent unified system. “We have developed tools that allow integrators to send systems to any store in a chain and simply select the store number from a dropdown and the system self-configures all store specific-information. This results in the need for very little DVR training for the technician,” he added. “We have tools that ensure the cameras are named consistently across the network. If you want to compare traffic at the front door at every location, you want the front door sensor to have the same name everywhere. We also have tools that will provide a snapshot of all the camera views at the completion of installation for end user signoff and reference after the fact.”

Data-Driven Decision Making Apart from loss-prevention, all of our interviewees pointed to uses beyond security as an important feature in chain store systems. Retailers can use the data coming from security systems to improve their sales and marketing; people counting and heat mapping are

47


IP Security Systems –

a “Jumping Board” for Cyber Intrusion In today’s connected world, IP-based systems offer numerous breach points for cyber-attacks. Ironically, physical security systems based on IP infrastructure are among the most vulnerable systems to be attacked due to low awareness and limited offering of “hardened” security solutions.

BY Israel Gogol, Freelancer

FEB 2016 ● www.asmag.com

he recent two years have seen a sharp rise in the number of companies devoted to cybersecurity. Targets from retail chains to social media accounts to critical infrastructure have all come under attack from perpetrators as diverse as organized crime rings, “hacktivists,” and even clandestine government cyber units. “Cyberdefense has been a priority in the IT arena for decades, and with the transition from analog video to IP and the convergence of video systems into enterprise networks, it is now a major concern for physical security systems,” said Ron Grinfeld, Director of Global Vertical Marketing at FLIR Systems. With the increasing number and sophistication of these attacks, cyberthreats are no longer only an IT problem. The physical electronic security

50

industry has moved steadily from the closed, protected, and sometimes proprietary communications methods of the past to open and much more vulnerable networkbased solutions. “These transitions, from analog closed circuit television (CCTV) to digital IP-based systems have exposed the physical security stakeholders to the same risks that IT departments have faced for years,” Grinfeld added. While in the past cyber-attacks were mainly a concern for large organizations and government institutes, today they pose a significant risk for most organizations. A successful cyber-attack can result in major consequences for companies, financial loss, data theft, intellectual property or classified information leaks, and erosion of confidence by their customers. Cybersecurity has become a real concern not just for end users, but also for manufacturers and other channel players. A recent example is PSA Security Network, one of the world’s largest security integrator alliances, which has set up a cyber committee to help educate its members on the risks and solutions available.

Common Vulnerabilities of Security Systems IP-based security systems, whether video surveillance or access control systems can run either side-by-side with other IT systems or they can run partially or entirely within the corporate network. As a result, an unprotected system can be a jumping board into the corporate network. In many cases, the problem is that these systems are not treated as other end-points in the network. Whereas employees personal computers are usually password


protected, it is not uncommon to see that the password in the video surveillance system unchanged as the default (sometimes easily accessible through a simple Google search). “Many of the integrators haven’t yet adopted sound cyber hardening practices in their system implementations,” said Andrew Lanning, Co-Founder of Integrated Security Technologies and the chairman of PSA’s Cybersecurity Committee. “Vulnerabilities are numerous,” he added, detailing a long list of possible risks: “Weak password schemas, implementations, and management; wireless everything; unnecessarily open ports; outdated firmware; and outdated or copied (reused) cryptography in certificate implementations.” All these greatly increase the chances of an attacker to find an entry point into the system.

Jack Cohen-Martin, Co-Founder, Nuvola Ron Grinfeld, Director, Global Vertical Marketing, FLIR Systems Hagai Katz, Senior VP, Business Development and Marketing, Magal Security Systems Andrew Lanning, Co-Founder, Integrated Security Technologies Brian Lettiere, VP, Product Management, Verint Systems Scott Sieracki, CEO, Viscount Systems

Another risk is users demand remote access and mobility. End-user requirements for remote access to their video footage have resulted in traditional DVRs, NVRs, and VMS being connected to the Internet for remote video access, thus creating more breach points outside of the security system. In addition, the use of mobile devices that can be easily hacked or stolen further compromises the security of the system. “There is an emphasis placed on bring your own device (BYOD) and mobile for many businesses worldwide, which can compromise not only data, but physical security systems as well. Mobile devices are extremely vulnerable to digital attacks and physical attacks because of their portability,” explained Brian Lettiere, VP of Product Management at Verint Systems. Logins, passwords, and other important information are often stored on mobile devices, which allows easy access to pertinent information. Email and social media accounts, along with applications, are just one swipe away and easily accessible to unauthorized users. Theft or loss of a device is an open door to access sensitive corporate data. In addition, smartphones and tablets are easy targets for viruses, Trojans, worms, and spyware, which makes it easy for attackers to gain access to proprietary data. Apps and even the operating system itself are not hardened and there are off-the-shelf malware that hackers can buy to hack a specific application used to access the security information. Hagai Katz, Senior VP of Business Development and Marketing at Magal Security Systems voiced a similar opinion. “Most of the market/customers are still unaware of the risk. As an integrator we know that in most cases the awareness to cybersecurity is almost non-existent. The same problems persist: IP cameras’ default passwords are untouched; access control systems may have an external unsecured access point; no one monitors new entrants to the network (such as a new device on the network).”

End-user requirements for remote access to their video footage have resulted in traditional DVRs, NVRs, and VMS being connected to the Internet for remote video access, thus creating more breach points outside of the security system. 51


s r e r u t c a f u n a M ips

h s r e n t r Seek Pa en

h t g n e to Str e r a h S t e k r a M

prefer y l g in s a e r c This has tomers in . s s u e c ic y v it e r d u al Sec r individu cturers to enter e v o s n io solut al manufa heir footprint. r e v e s d e t prompt o expand , t s ip h s r e tegrators in s m e t s into partn nities. and sy u s t r r o o t p u p ib o r w For dist rray of ne a n a p u s this open omas th Aby Th BY Prasan

FEB 2016 â—? www.asmag.com

54


he security industry has moved well past the phase of merely selling equipment, to providing complete solutions that are customized to specific requirements of customers. Today’s manufacturers ensure they know each of their vertical markets, understand their uniqueness, and put together systems that not just solve security requirements, but improve overall operational efficiency. For similar reasons, vendors now increasingly prefer to be considered solution providers rather than just makers of a video surveillance camera or an access control panel. A few have taken the responsibility to manufacture their own products across segments, expanding the footprint from within their brand. But most have taken the route of entering partnerships with other manufacturers. One such company that has entered into several partnerships with niche technology manufacturers is CNL Software. Adlan Hussain, VP of Marketing at CNL, believes customers prefer to take advantage of the strengths of different manufacturers, instead of relying on a single solution provider. “We have seen a shift from vendors trying to offer a ‘one-stop shop,’ to an understanding that end users like to mix and match technologies based on value and performance within their unique environments,” Hussain said. From the customers’ perspective, this makes perfect sense. Within security, it is more common to see companies that are strong in a particular field than in all of them. For instance, AMAG Technology is primarily known for its access control systems, but as the company understands customers today require integrated security systems, it has partnered with several other companies to improve their

David Ella, VP, Product Marketing, AMAG Technology Vladimir Eremeev, Director, International Business, Ivideon Adlan Hussain, VP, Marketing, CNL Software Larry Reed, CEO, ZKAccess Andy Shen, Channel Director, Global Market, Hikvision Digital Technology Tim Shen, Marketing Director, Overseas Business Center, Dahua Technology

Companies joining hands with others often ensure provisions for product support even after the partnership ends, but complications could rise when product upgrades come in.

presence in the market. One example is their integration with Salient Systems. “While we’ve partnered with numerous technology companies over the years, in 2015 we made the strategic move to strengthen our partnership with Salient Systems,” said David Ella, VP of Product Marketing at AMAG. “Salient Systems manufactures video management software and hardware, and allows us to deliver both access control and video solutions to our customers.” Such partnerships also give manufacturers opportunities to join hands at the engineering level, leveraging each other’s expertise to bring better products to the market. According to Vladimir Eremeev, Director of International Business at Ivideon, partnerships open up possibilities for further innovation in co-branded products. This in turn helps distributors and systems integrators (SIs) offer better solutions to the end customers.

How Distributors and Systems Integrators Benefit The most obvious advantage for distributors and SIs from manufacturers’ partnerships is the increase in the range of products that they can offer to the market, helping to strengthen their customer base. “It [partnerships] will allow distributors and SIs to offer the differentiated products (from single product to more sophisticated product solutions) to their customers compared to others, which will help them to expand the market and gain more profit,” said Andy Shen, Channel Director for Global Market at Hikvision Digital Technology. The second key benefit that resellers derive from this is the possibility to buy an integrated solution from one source, with equipment that is guaranteed to work together efficiently. This is especially true of SIs, who would appreciate the assurance of products’ compatibility with each other for integration. “For the systems integrator, they are happy to see if we solve 99

55


Looking Into the Pricing Structure of Managed Security Services

The possibility of connecting cameras and doors to the cloud has opened the door for companies to offer hosted or managed services to end users. This offers end users the convenience to outsource a part of their operations that is not their core competence and even enjoy a lower total cost of ownership. BY Israel Gogol, Freelancer

FEB 2016 â—? www.asmag.com

58

he advent of cloud technology has changed existing business models in many sectors, including in the security industry. Software as a service is a common model now for both private and enterprise users. Companies can set up online stores using Amazon Web Services or manage their sales pipeline and customer relationships using Salesforce as well as other services. In the security sphere, the common offerings are video surveillance as a service (VSaaS) or access control as a service (ACaaS). Using cloud technology, users can connect cameras or doors from different sites directly to the cloud, sparing the need for on-site recorders or other equipment. In addition, the cloud offers the ability to store data from different locations in one place and have that information accessed and shared in a centralized fashion. The major benefit managed services bring is flexibility in infrastructure and finance. Opting for a managed service offers end users flexibility in scaling their systems, either expanding or downsizing according to the business needs. From a financial perspective, it also offers the possibility of spreading the associated costs over time instead of paying a large sum upfront. Managed services also give users the chance to get better features and technological capabilities, for example video analytics or features previously available only in high-end video management systems that might be out of the financial reach of smaller players. The cost saving is not only for the end user but also on the vendor side. Apart from the initial installation, vendors also centralize their operations and can achieve efficiencies in management and maintenance, reducing the need for site visits and


giving them the ability to upgrade systems in a centralized manner and address problems faster. “From a business model standpoint, managed security services such as VSaaS will appeal to companies wishing to shift from capital expenditures to monthly operating expenditures. It can simplify their budget, and make it more predictable,” said Dean Drako, President and CEO of Eagle Eye Networks. “The underlying technical foundation, whether the VSaaS offering is cloud-based or not, will also have an impact. End users can achieve higher economies of scale with a true cloud-based system, while other managed video services can be more of manpower outsourcing model, along with potentially distributing costs over a longer time period. Additionally, true cloud services are generally cyber secure and have built-in redundancies. Cloud vendors also have large teams of dedicated specialists who can evolve the solution faster from a feature standpoint.” For video surveillance, the ongoing subscription fee is generally associated with the number of cameras and video retention period. Payment is per-camera and according to the length of storage in days the end user wants. Resellers usually offer either fully managed or partially managed services. In a fully managed service, the end user signs a multi-year contract which amortizes the cost of installation and cameras over the course of the contract, along with other subscription services. With a partially managed service, the end user pays upfront for cameras and installation, and pays a monthly fee. “Our resellers follow the same monthly pricing models that we do. Some will bundle the charges into a single annual payment for the sake of simplifying invoicing, but the underlying rate structure is the same,” said Steve Van Till, President and CEO of Brivo.

Opting for a managed service offers end users flexibility in scaling their systems, either expanding or downsizing according to the business needs. Recurring monthly revenue (RMR) is of course a lucrative option for solution providers, but might be a deterrent for end users who don’t want to be tied into a recurring cost. “Resellers need to present the value proposition of hosted services in a way that makes sense — like the data plan that goes with a cellular subscription. The service is a continual benefit to the customer, so it only makes sense that there is an ongoing fee for as long as the benefit is being provided. Hosted services offer far more value than on premise alternatives,” Van Till added. In some cases, the pricing of managed services follows models common in other managed services, such as the “freemium” model. Freemium is a pricing strategy by which a product or service is provided free of charge, but money (premium) is charged for advanced features and functionality. Ivideon’s cloud video surveillance service is one such example. The company offers three pricing plans: free, premium, and professional. The free program allows users to connect up to two cameras per account. Larger numbers of cameras, longer periods of cloud storage (e.g., seven or 30 days), as well as other features are covered in the other plans. “Free and premium pricing plans are suitable for B2C users, professional pricing plan is the best choice for B2B users, and it can be customized for all types of businesses, from small to large,” said Vladimir Eremeev,

Cloud technology has opened up many opportunities for the security industry, ranging from increased flexibility to reduced costs.

59


7 Must-See Outdoor Home Cameras of 2015/2016

By a&s SMAhome

FEB 2016 ● www.asmag.com

There is no doubt that home surveillance cameras have been a highlight of the smart home in recent years. Up until now, the majority of smart home cameras on the market have been for indoor use, and options for similarly equipped outdoor home cameras (i.e., easy installation and setup, motion detection, remote viewing of live/recorded videos from a smartphone or a tablet, instant mobile/email alerts, and local or cloud storage) with were limited in comparison. Popular home cameras like Piper nv, Netatmo Welcome, and Withings Home all made their debut at CES last year, and they are all indoor cameras.

62

Nevertheless, more smart home cameras for outdoor use have started to surface since last year. In April of 2015, FLIR Systems released a multi-purpose Wi-Fi camera for indoor, outdoor, and sports use called FLIR FX. In November, Zmodo announced a new home camera line, which includes Zmodo Replay — a four-camera kit with two indoor and two outdoor cameras. And at CES 2016, Ring released Stick Up Cam, a wirefree outdoor camera featuring two-way talk, and Netatmo released Presence, an outdoor camera that can differentiate detection of a person, car, or animal. Both Zmodo and Ring have a smart doorbell in their product lineup, and Ring specifically states that the Stick Up Cam is designed to supplement the Ring Video Doorbell. Fe a tures such as weatherproof capabilities and longer detection ranges are the main differences between outdoor and indoor cameras. For cameras to be installed outside, they have to withstand exposure to rain, sunlight, and dirt. Outdoor cameras also need to “see” further. Netatmo Presence features a detection range of up to 20 meters/65 feet. Outdoor installations of cameras that require wiring or chords can be a real hassle. Luckily, there have been more wireless and wire-free outdoor home cameras released to the market to make installation simpler. Some cameras, like Zmodo’s outdoor camera, use wireless communication, but they have to be plugged in for power. Others, although

in the minority, are completely without wires. Arlo by NETGEAR released in 2014 is a classic example. Ring’s Stick Up Cam is one of the latest to join the cohort — it is Wi-Fi connected and operates on a rechargeable battery that will last six to 12 months on one charge with regular usage. As more activity takes place outside of the home than inside, motion detection must be more precise and smarter to prevent false alerts. Dividing the field of view into “zones” and allowing users to choose which zones to look for activity, all from within the app, is a popular technique for selective detection of meaningful events. Cameras like Stick Up Cam, FLIR FX, and Edimax’ IC9110W all use this technique. For FLIR FX and Stick Up Cam, users can further customize sensitivity. Although they don’t support face recognition like Netatmo Welcome does, the company’s newest addition Presence uses SmartSight technology that leverages a deep learning algorithm to detect people, cars , and animals so users can quickly grasp the situation.

Features such as weatherproof capabilities and longer detection ranges are the main differences between outdoor and indoor cameras.


Zmodo Replay

Edimax IC-9110W Photo courtesy of Edimax

The HD outdoor camera included in the system has an extended Wi-Fi range thanks to its long-range Wi-Fi antenna. While some cameras only record when motion is detected or when the user manually hits the record button, this camera records continuously for up to 50 days to the included 1 TB hard drive. With smart recording, it can save up to 80% of hard drive storage. No monthly fees are required.

IC-9110W is a HD camera with a diagonal viewing angle of 139 degrees. It comes with an indoor Wi-Fi unit to make placement of the camera more flexible. The camera is physically connected to the indoor Wi-Fi unit with a cable through the wall, and recordings are saved to the microSD card (up to 32 GB) on the indoor Wi-Fi unit. The camera features an anti-cut bracket system to prevent the cable from being damaged. The viewer software supports simultaneous access of up to 16 cameras, offering the possibility of expansion for homeowners.

TRANWO GigaAir SMH101 Photo courtesy of Tranwo

Photo courtesy of Zmodo

GigaAir SMH101 is a wireless outdoor camera and alarm kit based around an indoor monitor. The indoor monitor has a 7-inch touchscreen and can support up to four cameras. Up to 128 GB of recordings from the camera can be saved onto the microSD card located in the monitor. The camera can pre-record five to 15 seconds prior to detected motions, and it also supports scheduled recording and playback while recording.

63


4 Must-See Smart Video Doorbells of 2015/2016

By a&s SMAhome

FEB 2016 ● www.asmag.com

While smart video doorbells can operate as standalone devices, they can also integrate with other security devices for the entry area, such as smart door locks. But it doesn’t end there. New integrations with products, services or platforms beyond home security are also happening. Nest and IFTTT integrations are two examples.

66

Smart video doorbells are becoming the next popular home security gadget to get for upgrading the entry area for homes. Not only do smart video doorbells bring connectivity to the door, they are also an attractive alternative to traditional intercom systems because they are easier to install and less costly in comparison. In 2015, well-recognized smart home brands like Vivint and August released their own smart video doorbells. Meanwhile, existing brands like Ring and SkyBell continued to push for upgrades by improving performance, adding new features, and enabling integrations. SkyBell HD, the third g e n e r a t i o n o f t h e S k y B e l l Vi d e o Doorbell, offers an upgrade in video quality with a new 1080p camera and many new innovative features. With fullcolor night vision and a temperature and humidity sensor, SkyBell HD is a rare breed in doorbells. While temperature and humidity sensors have been increasingly embedded in smart home cameras and hubs, they have not really made it to doorbells. This year, new smart video doorbells were unveiled at CES 2016 by companies like smanos and French startup Fenotek, adding new members to the smart video doorbell landscape. Although smart video doorbells share the common theme of supporting remote-video monitoring, two-way talk, and possibly access control (when connected with a smart lock) from mobile devices, they can be highly

versatile in design and color. Going wireless has become a trend in order to make installation simpler, with Wi-Fi being one of the most adopted wireless standards. However, smart video doorbells like the August Doorbell Cam and SkyBell HD also support Bluetooth on top of Wi-Fi. Similar to smart door locks, many doorbell cameras are integrating with Nest. Integration with other connected devices at home, such as smart door locks and lights, are also popular. This has allowed companies to extend their services to encompass access control and home automation. Integration with smart door locks is an obvious choice as homeowners would naturally want the option to unlock the door after seeing /speaking with the visitor. ring has a program called Ring Plus that lets the Ring Video Doorbell connect with partners like Wink, Kevo, LockState, and Kisi. One way for companies to implement integration is through IFTTT (If This Then That). Products or services can join IFTTT and become an IFTTT channel. Users can then create “recipes” to connect two channels, so that when an event (“if”) occurs on one channel, an action (“that”) can be triggered on another channel. Ring announced IFTTT integration in December 2015, adding a new member to its Ring Plus family. With IFTTT, users can, for example, have their Philips Hue turn on when the Ring Video Doorbell detects motion.


August Doorbell Cam

Vivint Doorbell Camera

Wireless: BLE and Wi-Fi

Wireless: Wi-Fi

August Doorbell Cam is equipped with an HD camera and requires Wi-Fi connection and a Bluetooth Smart Ready phone. Users can receive alerts when someone rings the bell or when motion is detected — the audio and video of each visit is recorded. If used in conjunction with the August Smart Lock, users can remotely control and monitor the status of the lock, so the doorbell cam also serves as the gateway for connecting the lock to the Internet. However, if the user just wants to connect their lock to the Internet, they can choose the August Connect (US$79), an affordable dedicated gateway, versus the doorbell cam ($199).

With a 180-degree view and night vision, the Vivint Doorbell Camera is the newest member of the Vivint smart home system, Vivint Sky. At the heart of Vivint Sky is the Vivint SkyControl panel, which is placed inside the home; the Vivint Doorbell Camera communicates with the panel using Wi-Fi. Vivint Sky’s integration with third-party products like door locks, garage door openers, and more, gives users the option to remotely unlock their door or open the garage door, for example. The system also works with other Z-Wave locks, such as those from Yale, and is optimized for all models of Kwikset lock. Vivint Doorbell Camera supports live video streaming to both mobile devices and the panel, auto audiovideo capture of every visit, and video sharing. Vivint currently offers three packages; Vivint Doorbell Camera is one of the options available for two of the packages.

Photo courtesy of August

Photo courtesy of Vivint

SkyBell HD Wireless: Wi-Fi Released in October 2015, SkyBell HD is the third generation of the SkyBell video doorbell. With Nest integration, a user’s Nest Cam can be activated (or deactivated) from the SkyBell HD app while talking to the visitor. IFTTT is also supported and according to SkyBell, SkyBell HD now connects with Nest Protect, Amazon Echo, Philips Hue, SmartThings, Scout Alarm, Life360, and personal email via IFTTT.

Photo courtesy of SkyBell

Exterior part Photo courtesy of Yale

Yale Real Living Look Door Viewer Wireless: Wi-Fi/Wi-Fi + Z-Wave

Interior part Photo courtesy of Yale

Released during CEDIA, the Look Door Viewer is a one-ofits-kind device that replaces traditional peepholes with two parts: a doorbell camera on the exterior side of the door and a LCD monitor on the interior. Homeowners can see the visitor either on the monitor or on a smartphone (with Wi-Fi connection). They can also see and speak with the visitor from the smartphone. Photos are automatically taken when someone pushes the doorbell or when motion is detected within 6.5 feet. Unlike many others, this device runs on four AA batteries. A Z-Wave version is available.

67


DVTel Ariel CM-3102 Full HD Mini Dome

TeleEye MQ275E-HD 1080p IR Varifocal Camera

Microdigital MDS-1091H AHD PTZ Camera

Features:

Features:

Features:

• Multi-stream H.264 video • Guaranteed frame rates in complex, high motion scenes • Motion processing • Auto-tune technology • IR model delivers more uniform high quality illumination

• • • • • •

• • • • • •

■ DVTel (FLIR Systems)/U.S. ■ Email: info@dvtel.com

1080p HD IR varifocal camera 1/2.8” Sony CMOS sensor, 30 fps H.264 compression 2 independent video streams IP66 weatherproof ONVIF profile S

■ TeleEye Group/Hong Kong ■ Email: info@teleeye.com

1 0x optical zoom AHD 1080p outdoor PTZ dome camera 1/3” progressive scan CMOS sensor Optical 10x zoom, digital 32x zoom (max 320x zoom) Pan 360 degrees endless, tilt 92 degrees, 250 presets Privacy mask, motion detection Built-in fan and heater

■ Microdigital/Korea ■ Email: sales@microdigital.co.kr

AMG AMG9HME-1GH-1S Industrial Hardened Gigabit Media Converter With PoE+ Features: • C ompact size: ideal for confined spaces, including camera poles and roadside cabinets • -40 to 75 degrees Celsius temperature: maintains performance in extreme conditions • Non-programmable: no need for any user configuration or computer setup • DIN rail mountable: quick to install and remove for maintenance

• G igabit SFP port: supports single and multimode, single, or dual fiber options up to 120 km • Gigabit Ethernet copper ports: high bandwidth support

Matrix Cosec Arc DC 100P IP-Based Single Door Access Control Panel

Videotec MAXIMUS MVX Explosion Proof Day/Night Camera

Hikvision DS-2CD6626DS-IZ(H)S Darkfighter Series 2-MP Anti-Corrosion Dome

Features:

Features:

Features:

• • • •

• I n electropolished and silicon micro shot peened AISI 316L stainless steel • High resolution: up to 550 TV lines • Advanced image stabilizer (stable zoom mode) • 1 alarm input and 1 relay output • Integrated wiper • Power supply: 12-24 Vdc/24 Vac

• • • • • •

Compact, single door access control IP panel with PoE Two readers on Wiegand or RS-485 Standby operation with network connectivity Support data and power on PoE for readers and door lock • Stores up to 10,000 users • Support up to 1,000,000 events ■ Matrix Comsec/India ■ Email: customer.care@matrixcomsec.com

FEB 2016 ● www.asmag.com

70

■ AMG Systems/U.K. ■ Email: sales@amgsystems.com

■ Videotec/Italy ■ Email: info@videotec.com

arkfighter ultra-low illumination technology D 316L stainless steel housing 1/1.8” progressive scan CMOS sensor 2.8 to 12 mm motorized VF lens 120 dB WDR ISO C5-M, NEMA 4X certification

■ Hikvision Digital Technology/China ■ Email: overseasbusiness@hikvision.com


AMAG Symmetry GUEST Web-Based Visitor Management System

BCDVideo BCD215-120-MP-C Rackmount Server

BXB ICP-5000 IP-Based Audio and Video PA System

Features:

Features:

Features:

• A ccommodates up to 120 TB of internal storage • Manufactured specifically for enterprise IP video surveillance applications • Combined with Supernova storage to offer high availability solutions for video recording • Built with scalability, reliability, and longevity • RAM: 16 GB • 2U rackmount

• 8 -channel Full HD video broadcasting without delay • Time and schedule management and remote control visual display • Telephone and smartphone broadcasting • Text-to-speech (TTS) • Security alarm, emergency call, two-way intercom, door access • Disaster warning broadcasting

■ BCDVideo/U.S. ■ Email: sales@bcdvideo.com

■ BXB Electronics/Taiwan ■ Email: selena@bxb.tw

• F lexible, cost-effective visitor management solution • Clear and simple monthly fee • Designed for medium to enterprise scale organizations • Web-based system can run on any PC, tablet, or smartphone • Provides the visitor with information in advance of their visit • Enables visitors to check themselves in and print an ID badge ■ AMAG Technology/U.S. ■ Email: sales@amag.com

Vanderbilt Aliro Market Package 1.15 IP Access Control Solution Features: • F lexible operating concept allows the system to be managed from virtually any Internet-connected device • 4 new languages: Russian, Polish, Czech, and Greek • Automatically detects access control units in the system • Manage up to 512 doors, 10,000 users, 100,000 access cards

• Uses MIFARE DESfire card readers ■ Vanderbilt Industries/U.S. ■ Email: info.international@vanderbiltindustries.com

Imaging Source TIS 5 MP Lenses

CEM Systems AC2000 Security Management System v7.1

Continental Access Control Integration Appliance CA-AIA

Features:

Features:

Features:

• • • •

• I mproved application programming interface (API) for easier third-party integration • New room booking solution • Multi-card support capabilities • Allows for full bi-directional communication, making is possible to send and receive information from the access control systems to other platforms • System administrations can enroll and differentiate multiple active cards per individual

• • • • • •

Available in C- or CS-mount types Focal length of 3 mm up to 75 mm Optical resolution of 5 MP Can be used in conjunction with a variety of CCD and CMOS sensors • Delivered in a compact, robust metal housing suited for industrial applications ■ The Imaging Source/Germany ■ Email: sales@theimagingsource.com

8 GB RAM 4 USB port Mini display and HDMI ports Over 1,500 inputs and outputs each Flexible mounting bracket included T-base 10/100 network port

■ Continental Access Control (Napco Security Technologies)/U.S. ■ Email: salesinfo@cicaccess.com

■ CEM Systems (Tyco Security Products)/Ireland ■ Email: cem.sales@tycoint.com

71


Companies in This Issue PRODUCT OF THE MONTH • Delta Faucet • Diebold • IKILOCK VIEWPOINT • Memoori Business Intelligence • Verint Systems NEWS FEATURE • IHS • Memoori Business Intelligence VERTICAL SOLUTION • 3xLOGIC • Axis Communications • Bosch Security Systems • Hikvision Digital Technology • March Networks • Oncam • Tyco Retail Solutions

INTEGRATED SYSTEM • Allegion • EVVA Sicherheitstechnologie • ISEO Serrature • John Portman & Associates • Kaba • LEAPIN Digital Keys • Lockitron • Poly-Control • Yale Locks and Hardware • yikes • Zaplox SOLUTION DESIGN • Eagle Eye Networks • FLIR Systems • Integrated Security Technologies • Magal Security Systems • Novula • Verint Systems • Viscount systems

Next Issue

SMART TECHNOLOGY • Axis Communications • Barracuda Networks • Drive Headquarters • Eagle Eye Networks • Honeywell Security BUSINESS TALK • AMAG Technology • Brivo • CNL Software • Dahua Technology • EAGLE Eye Networks • Hikvision Digital Technology • Ivideon • Kastle Systems • ZKAccess

Integrated System

IoT

VIDEO MANAGEMENT SYSTEMS (LARGE/MULTI-SITES AND CITIES)

INTELLIGENT RETAIL

Smart Device/Software INTRUSION DETECTION Systems (RESIDENTIAL & COMMERCIAL SECTORS)

Vertical Solution BANKING

77


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

23

ABILITY ENTERPRISE CO., LTD.

IP CAMERA / HOME CAMERA

TAIWAN

info@abilitycorp.com.tw

37

CHENGDU POWERVIEW SCIENCE AND TECHNOLOGY CO., LTD. SURVEILLANCE

CHINA

dennis@powerview.cn

17

CONNECTION TECHNOLOGY SYSTEMS INC.

SWITCH/CONVERTOR/ETHERNET MEDIA TAIWAN

sales@iConnectron.com

INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

11

DAIWON OPTICAL CO., LTD.

LENS

KOREA

sales@dwopt.com

8

DYNACOLOR INC.

IP CAMERA / NVR

TAIWAN

info@dynacolor.com.tw

15

EVERFOCUS ELECTRONICS CORP.

CAMERA / DVR / IP CAMERA

TAIWAN

marketing@everfocus.com.tw

77

FOCTEK PHOTONICS, INC.

LENS

CHINA

sales@foctek-lens.com

25

FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

5

HDPRO CO., LTD.

CCTV

KOREA

sales@hdprocctv.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

21

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

39

INODIC INC.

CAMERA

KOREA

sales@inodic.com

4

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

10

MERIT LILIN ENT CO., LTD.

IP CAMERA / NVR

TAIWAN

sales@meritlilin.com

30, 31

QIHAN TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

marketing@qihan.cn

63

QUANZHOU SOUTHEAST PHOTOELECTRIC CO., LTD.

SURVEILLANCE

CHINA

sales@soest.cn

7

RICOM

LENS

CHINA

sales@forecam.com

2

RIFATRON CO., LTD.

DVR

KOREA

contact@rifatron.com

41

SHENZHEN COMMANDER TECHNOLOGY CO., LTD.

CASING

CHINA

sjw@yjdcase.com

12, 13

SONY CORPORATION DSBG. SYSTEM LSI DIVISION

SEMICONDUCTOR

JAPAN

-

INSIDE BACK COVER

TAMRON CO., LTD.

CAMERA

JAPAN

newbiz@tamron.co.jp

9

TECHPOINT INC.

CHIPSET

USA

dma@techpointinc.com

3

WEBGATE INC.

DVR

KOREA

support@webgateinc.com

6

YOUNGKOOK ELECTRONICS CO., LTD.

CAMERA

KOREA

aralee@youngkook.com

FEB 2016 ● www.asmag.com

ACCESS CONTROL PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

53

GIGA-TMS INC.

RFID MODULE / LOCK / READER

TAIWAN

promag@gigatms.com.tw

75

UWC ELECTRIC (M) SDN. BHD.

ACCESS CONTROL

MALAYSIA

sales@uwcelectric.com

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

78


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.