A&S #I211 July 2016

Page 1


CONTENTS

July 2016 www.asmag.com

market update

Brazil Market Set to Move Beyond Recession and Politics......................................... 38 Viewpoint

Making 4K Video Surveillance Worth the Investment ......................................................35

P. 38

Business talk

Potential for Outside Investments in Physical Security .......................................48

P. 30

Vertical solution

Analytics Keep Stadium Crowds Under Control.............................................................58

integrated system

Advanced Visitor Management Systems Create Value to Enterprises

iot

Connectivity and Autonomous Cars Are Driving the Future ......................... 62

Viewpoint

Open or End-to-End? Systems Integrators Decide

P. 52

smart technology

Big Data Overload Drives Machine Learning ........................................................66 smahome

Thermostats and Smart Lighting Reign Supreme in Home Energy Management .......68 JUL 2016 ● www.asmag.com

Connected Home in Evolution – What’s Next After IFTTT .............................................72 Contents ...................................................14 Editor’s Note ............................................16 Application Cases ...................................18

14

Products of the Month ...........................22 News Features ........................................24 Show Calendar ........................................74

P. 48 Companies in This Issue........................75 New Products ..........................................76


a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

How Brexit Affects the EU Security Industry

General Press Jill Lai Editor-in-Chief Alf Chang Senior Consultant William Pao Reporter Lisa Hsu Reporter Prasanth Aby Thomas Reporter Emily Lin Editor

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Tzu-Yin Chien

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com tzuyin.chien@newera.messefrankfurt.com

Officer

michelle.shih@newera.messefrankfurt.com

Circulation

JUL 2016 ● www.asmag.com

n June 23, the UK civilians made their voices heard around the world about Brexit. “To leave the European Union (EU)” got the majority of the votes. This result shocked the whole world and also forced the UK Prime Minister to resign after October. Afterwards, enterprises also expressed their thoughts. The world’s secondlargest telecom company, Vodafone, announced that it is “considering moving its headquarters out of the U.K. following last week’s shock referendum result,” according to CNN. Early this year, “Bertelsmann Foundation’s survey of 700 British and German firms finds 29 percent would cut capacity or relocate with 80 percent firmly behind U.K staying in the EU,” the Guardian reported.

of the security companies don’t think it would affect security demand that much in the U.K., its economy, however, was obviously going down right after the announcement. The pound fell to its lowest level again since 1985.

a&s International also interviewed some

Even though market uncertainty is the biggest concern for most of the global companies based in the U.K., the UK civilians have clearly expressed their thoughts to the government that they needed a new approach for the future. This sentiment ranked higher than all of their business interests.

security companies to see how they are responding to it. Most of them expressed the “uncertainty” it might bring to the market and the new rules of trading and cooperation between the U.K. and other EU countries that would be needed to be set up. Even though most

The economic status of a market usually affects the private and commercial security sectors a lot. The result of Brexit has disappointed most of the companies from outside of the U.K. that were planning to invest in the country in the near future, not to mention the ones that already exist in the U.K. It is predicted that the market “uncertainty” will strongly influence all the UK industries in the next three to five years, and British companies might lose their ground in the EU countries.

Michelle Shih

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Manager

willy.wang@newera.messefrankfurt.com

Event Manager Project Manager Project Manager

peggy.wu@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com

asmag.com

Willy Wang Secutech

Peggy Wu Eva Tsai Jason Cheng

International Advertising [Headquarters]

Fion Tsai Nori Chang Audrey Fang

Sales Manager Coordinator Coordinator

fion.tsai@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Osman Kanatli Evris Consolos Adis Hodzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana

U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com marketing@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

jill.lai@newera.messefrankfurt.com

16


ApplicAtion cAses a&s presents snapshots of security cases from across the globe to provide up-to-date information on how products and solutions are being employed in different industries. to manually encode keycards. Lost or stolen keycards can also be cancelled remotely to further limit any potential security issue, streamlining the whole process. Visionline additionally provides properties with remote audit trail tracking abilities, ensuring that hoteliers have detailed and readily available data in the event of a guest dispute. The guestrooms also came equipped with Elsafe Infinity digital electronic safes. These safes were the first to be UL-1037 certified for the hospitality industry, having withstood numerous break-in tests by Underwriter’s Laboratories, as well as providing a detailed access record in the event of property loss or theft. >> Entertainment

Dallmeier Modernizes Security at UK Stadium

JUL 2016 ● www.asmag.com

The Sunderland Stadium of Light in England has completely modernized its video system using Dallmeier electronics’ technology. To do this, Dallmeier designed a video management system that used a virtual matrix, a network-based technology known as SeMSy (Security Management System). The system can enable multiple workstations to be positioned anywhere on the video management network and manage videos from high-definition and megapixel cameras. The combination of this with Dallmeier’s encoders and video appliances allowed the existing 96 analog cameras in the stadium to be revitalized, while also giving the control room a modern up-to-date platform. The virtual matrix enabled the creation of flexible monitor walls for displaying cameras in a variety of formats and allowed users ultimate control over how they configure their screens and access privileges for remote and ancillary users. Dallmeier’s unique Panomera multifocal sensor technology was also implemented specifically for the away fans section of the stadium, allowing the staff a wide area of view with just a single point of installation. The new Panomera technology proved its worth within weeks of its installation. A smoke grenade was set off in the visitor’s section of the north stand and using the new Panomera surveillance system, the police and security staff were quickly able to identify the culprit.

18

>> Hospitality

Assa Abloy RFID Used in Turkish Hotel

The Hyatt Regency Istanbul Atakoy in Turkey has implemented advanced security access solutions by Assa Abloy Hospitality. The hotel has chosen to equip its 284 luxury guestrooms with VingCard Signature RFID door locks and elevator access readers. It allows guests to effortlessly gain access by waving keycards within the proximity of an RFID reader. Additionally, the system also features anti-cloning technology through its encryption platform that can ensure against unauthorized access; thus, improving the overall safety and security of the hotel guests. Using this in conjunction with Visionline also circumvents the need

>> Airport

SightLogix Enhances Airport Security in Norway

Security has been greatly enhanced for Norway’s Torp Sandefjord Airport via the deployment of SightLogix’s smart thermal intrusion detection cameras. Before SightLogix, Sandefjord had been relying on a combination of perimeter fences, surveillance cameras and roving guards to protect the site. Looking for a more effective solution, the airport turned to SightLogix certified integrator Focus Security. They suggested the airport move from a passive security posture to a pre-emptive automated approach using the company’s SightSensors which are thermal cameras with integrated video analytics. With the smart thermal solution in place, intruders that violate rules trigger the system to emit an alarm and send a video of the event and the target’s precise GPS location to the airport’s Security Operations Center, where


Supplier: Axis Communications

URL: www.axis.com

JUL 2016 â—? www.asmag.com

Supplier: ComNet

URL: www.comnet.net

Supplier: Altronix

URL: www.altronix.com

22


news feature

Global Video Surveillance Market Slows Due to Low-Price Chinese Products The growth of the global video surveillance market slowed in 2015 compared to the previous years, as low-cost products from China hurt revenues. BY Prasanth Aby Thomas

ccording to a report from the research firm IHS, the world market for professional video surveillance equipment grew by 1.9 percent in 2015, much lower than the 14.2 percent and 6.8 percent growth posted in 2014 and 2013. The main reason for the weak figures was lower growth in the Chinese market, which grew only 4.9 percent in 2015, down from the 26.7 percent posted in 2014. China is estimated to have been the largest regional market for video surveillance equipment, accounting for over 40 percent of global revenues in 2015. However, the report pointed out that this did not mean unit shipments were slowing down.

IHS forecasts the global market to grow at 6.4 percent and Chinese market at 11.6 percent in 2016.

“The slowdown of the market in China in 2015 was largely because of price erosion,” said Jon Cropley, Principal Analyst for Video Surveillance & Security Services at IHS. “Unit shipments of security cameras in China grew quickly but the average prices of cameras and recorders fell sharply. The slowdown of the market in China in 2015 was largely because of price erosion. Unit shipments of security cameras in China grew quickly but the average prices of cameras and recorders fell sharply.” He added that the Chinese-branded supply base has become more consolidated with the two large players, Hikvision Digital Technology and Dahua Technology, accounting for 47.2 percent of the market in 2015 compared to 42.8 percent in 2014.

Better expectations for 2016

JUL 2016 ● www.asmag.com

However, despite the weak figures for 2015, the current year looks promising. IHS forecasts the global market to grow at 6.4 percent and the Chinese market at 11.6 percent in 2016. Demand for products will continue to rise rapidly while the price erosion could ease. “This will mean that the world market for video surveillance equipment will be worth US$15.8 billion in 2016,” Cropley noted. The report further gave some insights into regional and global market statistics. The supply base for professional video surveillance equipment is becoming more consolidated than before. The top 15 vendors accounted for 55 percent of revenues in 2015. More and more Chinese vendors continued to gain market share outside China, offering products at low prices.

24


Axis Acquires 2N and Cognimatics to Strengthen IP Intercoms and Retail Offering Axis Communications has announced the acquisitions of 2N and Cognimatics to strengthen its retail and solution offerings. BY a&s Editorial Team

xis acquired 2N in a move that could see the addition of intercom to its IP products lineup. The addition of which will no doubt give Axis entry into a growing market segment, but analysts believe that the real advantage for the company lies in its solid position to offer more comprehensive IP solutions. This announcement followed several other small and large mergers and acquisitions that have been taking place in the security industry. “This acquisition will also give Axis a stake in the market for audio and video door phones, which IHS forecast will reach nearly US$2.6 billion by 2020,” said Aaron Dale, Market Analyst for Security & Fire at IHS Technology. “However, the true value in the acquisition is not likely to come from Axis’ ability to penetrate the audio and video door phone market but in its strengthened ability to provide a more complete IP security solution (a position that Axis have been building in recent years).”

The recent acquisitions show Axis’ determination to expand its horizons to provide more solutions.

Dale added that the market for open IP video and video door phones is expected to grow faster than the alternative market for traditional analog door phones. However in recent years, a third market for video doorbells has become stronger and potentially large enough to hurt IP video door phone sales. These products have similar functionality to residential door phones, with their two-way audio and an integrated HD cameras. The main difference is the outdoor unit is synced to the user’s smartphone rather than to a fixed indoor unit. Within the same week, Axis also announced the acquisition of Cognimatics, a company focused on store optimization solutions targeting the retail sector. Cognimatics’ technology is, for example, used for people counting, queue measurement and occupancy estimation. The addition of Cognimatics’ knowledge and technology is expected to strengthen Axis’ solution offering in the fast-growing retail market segment. “Cognimatics’ products are well-known with a successful track record in the retail sector, and complement our solutions in that market. Their commitment to developing innovative and easy-to-use products is consistent with Axis’ approach to provide the highest value solution for a range of customer needs. We are excited to be able to offer our partners and end users solutions that act as a natural complement to their existing Axis solutions,” said Ray Mauritsson, CEO at Axis Communications.

25


Open or End-to-End? Systems Integrators Decide Recent moves from some manufacturers have seen an increasing importance being given to end-to-end solutions over open architecture. There are advantages and disadvantages to both systems, but it is up to the systems integrators (SI) to decide what suits them. In this article we present viewpoints of a few SIs from around the world. BY Prasanth Aby Thomas

JUL 2016 â—? www.asmag.com

30

anufacturers, at a very broad level, can be categorized as those providing solutions that are restricted to their own products and those providing open architecture, allowing the flexibility to integrate third-party applications. There are both advantages and disadvantages to both categories, for customers and the manufacturers themselves. The first category, often known as end-to-end solution providers, has the advantage of forcing their customers to remain loyal to the brand. These manufacturers can ensure that whatever application is required, the customer does not look beyond them. For the systems integrators (SI), end-to-end solution providers come with an assurance of hassle-free installation. The manufacturers will guarantee the different products they sell work well with each other. There will be no incompatibility issues since the manufacturer would have configured everything beforehand. On the other hand, end-to-end solution providers limit the SIs in possibilities of expanding their installations. They lack the potential to develop beyond what the manufacturer prescribes and many SIs would find this too restrictive. The recent months have seen certain manufacturers giving more importance to becoming end-to-end solution providers. FLIR Systems, for instance, has been buying up companies that cater to different segments of the market to become a comprehensive solution provider. Recently, after acquiring visible camera maker ISD, FLIR had pointed out how the new addition helps it become an end-to-end solution provider.


On the other hand, there are companies like Axis Communications that advocate open architecture and suggest that open systems are the future of the security industry. In a report recently published along with Nedap Security Management, the surveillance giant had explained that many analog, hybrid or IP solutions available today have the problem of being proprietary systems, offering limited flexibility. Integrating third-party products is impossible, limiting the user to rely on a single vendor. “Upgrading or expanding security systems, whether it be cameras, audio or card readers is often complex, expensive and time-consuming, because cables have to be laid and connected to a main unit or a central server,” said Daren Lang, Regional Manager for Business Development of Northern Europe at Axis Communications. In the end, however, it is up to the SIs to decide what they prefer. This could depend a lot on the nature of the business that SIs do and the kind of customers they have. But to get a general idea, we interviewed a few SIs from around the world. In this article, we present their viewpoints. Note: For this article, our questions were limited to open and end-to-end solutions in the video surveillance market. Although some interviewees may have referred to integrating other solutions, our primary focus is video surveillance.

features to integrate with ever-changing devices are all seen as advantages. “I prefer the open architecture solutions,” said Mesnik. “It allows us more flexibility and provides more growth options for our customers. Since we use open architecture recording systems, we can specify any brand of camera. In some cases, we may use different cameras depending on the requirement of a specific location. Also the open recording systems such as OnSSi and Milestone have much more features and functions and provide integration with other security systems such as door access control and intercoms.” Nicky Stokes, MD of the UK-based ISD Tech, agreed to Mesnik’s opinions, indicating that for them the future will be all about running different applications from a single network. He compared the security systems integration segment to the IT industry, suggesting that in the future the former will follow the same trends seen in the latter. “Although closed protocol (end-to-end) systems have their place in security and surveillance, for us the future of security will be about running everything from one network Ȅ surveillance, access control, buildings, intruder detection, smart automation, corporate network traffic and more,” said Stokes. “At some point the security industry has to go the same way as IT, with the capability to integrate different security and operational systems onto a single network, and provide the connectivity to optimize all operations to run smoothly in an efficient, coherent way that eliminates the past problems and complexity of disparate systems.” ISD designs, installs and maintains integrated security and life safety solutions encompassing IP surveillance, access control, intruder and fire detection both in the U.K. and overseas. Their focus markets include high-end retail, critical infrastructure, education and renewables as well as a wide range of global corporate enterprises. Such clients often require solutions that are well-tailored to their unique requirements, and for this, an open architecture would be an inevitable choice. “Because we deliver highly customized solutions, tailored to each customer’s specific needs, open architecture technologies offer the flexibility to mix and match best-of-breed components to optimize overall performance,” Stokes said.

7+( )/(;,%,/,7< 2) 23(1 6<67(06 One of the key attractions of open architecture is the flexibility that it offers. Bob Mesnik, President of the US-based Kintronics pointed out that open solutions provide more opportunities to expand their solutions. The freedom to decide on what camera to use depending on the requirements of any given location and the multiple

With more and more entry-level customers opting for DIY products, systems integrators are forced to look for more complex installations. Open architecture is inevitable for that.

31


Making

4K Video Surveillance Worth the Investment

Although it might be difficult at first to justify the investment in a high resolution security system, the benefits of 4K video in the right application can make all the difference. Proper selection of systems technology, including a quality lens, are vital for realizing the full benefit. BY Andrea Iniguez, VP, Business Development, Theia Technologies

n the business world, video surveillance has often been considered a necessary cost of doing business. Initial investment in any new system comes out of a company’s capital expenditure, and “returns” can be difficult to calculate mainly if it simply works to deter crime, or for cost avoidance. Managers have had the difficult challenge of justifying an investment without having a hard target for a new system’s return on investment (ROI). But increasing the quality and resolution of these systems increases the value of that investment and the potential return it can provide. With the advent of 4K, which offers four times higher the resolution and pixels on target than HD, users can expect to increase the value of their system’s investment more easily. More pixels on target, combined with content analytics, offers the potential for the genuine calculation of ROI. JUL 2016 ● www.asmag.com

Loss Prevention and Cost reduCtion Benefits Traditional loss prevention applications, such as point of sale and cash till monitoring, remain strong applica-

34

tions for high resolution systems such as 4K, with camera count reduction being an obvious win in terms of cost of acquisition and system maintenance. For one major UK retailer, clever deployment of high resolution cameras, video management software and analytics nearly halved its shrinkage from 0.8 percent to just 0.4 percent within the first two years — which translated into hundreds of thousands of pounds of savings. In doing so, the number of employees caught in the act increased five-fold. Beyond traditional loss prevention efforts, 4K resolution-based installations can unlock cost reductions in direct security operations, supporting ROI. For example, one US Fortune 500 company was able to deliver a 33 percent reduction in its video systems’ running costs. It calculated cost of use in terms of man-hours required to retrieve and review event footage. With a higher resolution video system, not only were they able to reduce the man-hours required for this activity, but they also cut the cost per hour of running the system. The reduction in man-hours was achieved because the higher resolution system enabled the use of video content analytics software to automate the review of the system footage. Put simply, analytics algorithms find higher quality images easier to process. They become more accurate and reliable in spotting anomalies as a result. The cost per hour reduction was achieved by reducing guard headcount since, as routine monitoring tasks were automated, fewer staff were needed to follow up on pre-qualified abnormal behaviors and events.

Business Intelligence Finally, by bringing together 4K, analytics, cloud storage and “big data”, it becomes possible to deliver concrete and accelerated ROI in a more consistent manner. 4K video data, combined with these technologies, will enable data from various sources to form a powerful source of business intelligence. A 4K video system can be used to monitor shop aisles for loss prevention, and the same video data can be mined to help understand consumer behavior via “heat mapping” analysis of traffic patterns, people counting, etc. The resulting


intelligence can then be used to develop tools to increase sales such as targeted sales promotions, queue management, improved store layouts, etc.

BuiLding the Case for 4K systems Justifying an investment in 4K video becomes easier when you include traditional loss prevention, operational cost reductions and efficiencies, and now potential top-line revenue increases from better merchandising and store management. To make the strongest business case for 4K systems, managers may still want to funnel investment toward the areas where they see the highest risk of losses. To this end, securing areas where there is significant risk to human life or high value assets are two clear areas where we anticipate early adoption of 4K: power plants, chemical plants, airports, stadiums, casinos and banks, for example. In addition, managers across any large organization can share the system to realize benefits in multiple departments and build an ROI story much quicker as a result. But with all the resolution promises of megapixel cameras, HD is only now reaching critical mass in the security industry. Why should we believe what we are told about 4K implementation? Will we be left with broken systems, faded images and vanishing ROI?

Higher Resolution Requirements In manufacturing operations, high resolution video surveillance systems are being deployed to serve multiple department heads responsible for areas as diverse as security, health and safety monitoring, quality control, and operations. Such systems can be used to provide video evidence to resolve conflicts in a worker’s compensation claim, monitor staff behavior to a level where managers can intervene early enough to prevent accidents and manufacturing errors, as well as verify workers’ hours — most of which require (or would be greatly facilitated by) higher resolution 80 pixels per foot systems. In one US manufacturing plant, supervisors documented a 20 percent increase in productivity from better supervisory monitoring of the shop floor, warehouse and delivery areas, using a new high resolution video system. Just as 250 pixels per meter is becoming the standard for facial recognition in the U.K. and the rest of EMEA, in the United States, the Security Industry Association recommends 80 pixels per foot for a host of video system tasks. Automatic Number Plate Recognition (ANPR) and facial recognition have long been associated with higher image resolution requirements. However, a number of other video content analytics-based applications demand higher specification systems for them to deliver to their full potential. One way to look at it is shown in the images below. With an Ultra HD 4K camera, it’s easier to get the required 250 pixels per meter than with an HD camera. In this case, with a 9mm lens on an HD camera positioned 15 meters away, users can only get 189 pixels per meter (see image on the right); while with an Ultra HD 4K camera together with the same lens from the same distance, they can get nearly twice as much detail — 302 pixels/meter (see image on the left).

Addressing Limitation Issues Much has already been written about the factors affecting the adoption of 4K as a standard in the security industry. These typically include the cost of infrastructure and hardware. However, technological and market advances are addressing these limitations with the introduction of H.265 compression and the rapidly declining price of 4K monitors. With these advances, 4K is on course to become the next big video surveillance standard within two to five years.

With the same lens, higher resolution, higher detail images can be produced by an Ultra HD 4K camera (left) as compared to an HD camera (right) when taken at the same distance.

35


Brazil Beyond recession Politics MarkeT Marke T SeT T To o Move

and

The Brazilian security market continues to remain under pressure from economic concerns and political instability. But it’s not all bad news for security as improving financial situation and private investment are expected to strengthen the market in the coming months. BY Prasanth Aby Thomas

OLYMPIC GAMES AND DEMAND JUL 2016 ● www.asmag.com

The 2016 Olympics is set to take place in Rio de Janeiro from 5 to 21 August. This comes two years after the FIFA football World Cup. From the security industry’s perspective, both these sporting events have helped the market demand to varying degrees. “The Olympic Games has increased tourism and the need of new and improved security systems in airports, city surveilsurveil lance, transportation systems, Olympic stadiums, athlete villages and hotels,” said Felipe Arguello, Regional Sales Director – Latin America at Arecont Vision. “We have seen an important increase in the last five years in hotel constructions, with over 70 new hotels in the area of Barra da Tijuca in Rio

38

de Janeiro, where 50 percent of these new lodging facilities will be 4- to 5-star facilities requiring internationally approved security systems. New security systems have been deployed in the Olympic stadiums and athlete lodging areas.” Bruce Wu, GM of Dahua Brasil at Dahua Technology, added that the Olympic Games is seen as a good opportunity for the company and that the investment is more significant than those seen during the World Cup two years ago. “Dahua has already won the main parts of the Olympic project in Rio 2016 for surveillance and we believe Brazilian government will continue invest more for the safety in whole country,” Wu said. “Comparing with football World Cup two


he Brazilian economy has been going through one of the worst recessions ever. Once considered one of the most promising emerging economies in the world, the Latin American country has, in the recent years, plunged deeper and deeper into economic crisis. From a growth of 7.5 percent in 2010, the economy contracted last year, marking a downward swing of over 11 percentage points. The dip in international oil prices, local economic policies and a highly unstable political situation were all seen as reasons for the financial downturn. But according to some economic data released this month, things may finally be beginning to pick up. The Brazilian central bank’s economic activity index rose 0.03 percent in April from the previous month, for the first time in over a year. The increase, although razor-thin and weaker than expectations, is seen as light at the end of the tunnel for the economy. This pick up is inevitable, according to most industry experts, as Brazil is fundamentally a strong developing market. The political crisis is expected to come to an end soon and the country looks steady as it goes into one of the biggest events it has ever hosted, the 2016 Olympics.

OppOrtunities fOr the security industry According to a report from Research and Markets, the Brazilian video surveillance

years ago, the Olympic games have more influence and power worldwide.” However, not everyone is of the same opinion. Jose Garcia, Marketing Director for Hikvision Latam at Hikvision Digital Technology, opined that contrary to expectations the Olympic Games did not help increase demand. There has been some development in the city of Rio, but stiff economic conditions and currency devaluation has hurt the prospects elsewhere. “In contrast of what we would think of, the Olympic Games did not impact the demand drastically,” Garcia said. “Despite the demand has increased in Rio de Janeiro, where the Olympic Games will be held, but not for the rest of the country. On top of that, due to the Brazilian currency devalu-

ation, there are no significant growth figures over the last years coming from this event, compared with the World Cup, where Brazil enjoyed a great economy situation and the growth figures were more visible.” Victor Merino, Vice President for LASA at Pelco by Schneider Electric gave two major reasons for the Olympic Games not making as much an impact as the World Cup, stressing on the limitations of the venue. “First, the Summer Olympics are only taking place in Rio de Janeiro, which limits the necessity of security countrywide,” Merino said. “Second, most of the larger projects have been assigned to the official sponsors of the games, so the impact on the demand for companies who are not taking a large role in sponsorships is limited.”

39


Potential for Outside Inves in Physical Se JUL 2016 ● www.asmag.com

Despite several mega deals and mergers in the physical security field in the last two years, it is interesting to note that most of these investments were made by industry players. The role of private equity or venture capital investors seems limited. Companies that can offer strong software solutions appear to be the most likely recipients of external investments. BY Israel Gogol, Freelancer

48

he physical security market has seen some major M&A activity in the past few years. This M&A activity, especially seen in the video surveillance market, has been driven by a several factors: pricing pressure, product commoditization and competition with Chinese companies such as Hikvision Digital Technology and Dahua Technology. These have made it more difficult for vendors to maintain margins and turn a profit. As a result, companies are selling off non-core business units that are not as attractive,

or buying other companies in order to expand their current offerings to become “total solution” providers. For example, in August 2015, private equity firm Battery Ventures acquired NICE Systems’ Physical Security Business Unit and renamed it as Qognify. NICE sold the business unit off as part of its plan to focus on its core competencies in software solutions for managing customer relations and risks. More recent examples include FLIR Systems’ purchase of DVTEL in late 2015 and acquisition of ISD in 2016; thus, adding to its expertise


Josh Daniels, CEO, VideoSurveillance.com

tments curity and product portfolio, taking them one step closer to becoming an end-to-end solution provider. This active buying and selling environment is typical for private equity investors who typically buy mature companies that are already well-established. Usually these are companies seeking investments for further expansion or, conversely, companies that may be deteriorating or not performing well due to inefficiency. Private equity firms buy these companies and support their

Chip Hazard, General Partner, Erik Krieger, Partner, Flybridge Capital Partners Riverlake Partners

management team in improving business operations to increase revenues and profits. It is a private equity firm’s modus operandi to eventually liquidate its holdings and return the money to its investors. This is similar to venture capital firms. However, these mostly invest in earlier stage startups with high growth potential rather than more established mature businesses. It is interesting to note, however, that with the exception of a few investors, most of the M&A activity within the video surveillance sector are “strategic” — one company in the industry buying another. The question arises then — why aren’t there more outside investors in the industry?

Limitations and opportunities in the market “The industry is dominated by large corporate players that have consolidated over the years,” explained Erik Krieger, Partner at Portland, Oregon-based private equity firm Riverlake Partners. “Private equity groups have been less active in this space due to the fact that large corporations are invested in this field, and it is difficult to compete on price given the strategic benefits of an industry player.”

Nevertheless, given this industry dynamic, Krieger sees an opportunity for private equity firms in unique niches such as remote video monitoring and video surveillance as a service (VSaaS). He is also particularly attracted to the recurring monthly revenue model and the predictability of the revenue. Recently, Riverlake Partners made an investment in a remote surveillance services business called CamGuard Systems. “We were initially approached by CamGuard and thought that the business had strong fundamentals. However, we typically will not invest in a business without ‘familiar’ leadership and management,” said Krieger. To solve this problem, Riverlake brought the deal to another company, VideoSurveillance.com, a Portland, Oregon-based video surveillance integration company. “We merged the two companies and brought VideoSurveillance.com and CamGuard’s leadership together. The elements of the company are attractive. There is a technology that is starting to change the profile of the industry and we think there is a unique niche in remote tower surveillance that has not been provided by larger security companies,” explained Krieger. “There is a changing mindset that

COMPANIES ARE SELLING OFF NON-CORE BUSINESS UNITS THAT ARE NOT AS ATTRACTIVE, OR BUYING OTHER COMPANIES IN ORDER TO EXPAND THEIR CURRENT OFFERINGS TO BECOME ‘TOTAL SOLUTION’ PROVIDERS. 49


Advanced Visitor Management Systems Create Value to Enterprises BY William Pao

JUL 2016 â—? www.asmag.com

Visitor management has gone through a transformation. Traditional paper logs that do a poor job on keeping track of visitors have increasingly given way to computerized visitor management systems, which optimize performance and efficiency.

52


F

or any end user organization, visitor management is an important part of security. This has even gained more significance today amid a rise in criminal activities by people outside an organization. Keeping tabs on the identity of the visitor and the duration of their visit therefore is something not to be taken lightly. “Adoption of visitor management software has grown steadily, especially in the past 15 years since 9/11. In more recent years, school shootings have increased the adoption of visitor management in the education market, and increased security concerns have made visitor management an integral and required component of security system specifications for companies both large and small,” said Debbie Pendleton, VP of Sales and Marketing at STOPware. Steve Barrett, CEO of Go Reception, echoed those remarks. “A visitor system needs to be available 24/7 as this is not just a marketing or image play for organizations but a very real way to ensure you are monitoring and keeping a workplace safe for visitors and staff,” he said. For a long time — and this still exists in a significant number of organizations today — visitor management has been done by paper and pen, a method that is ineffective and outdated. “It provides very little security and poses a number of problems,” said Eric Chiu, Segment Director for APAC at HID Global. “More often than not, the names are not legible or are false. In an emergency such as a fire, it would be impossible to

VerticalSpecific Demands Demands for visitor management solutions vary according to vertical markets. Government offices, for example, demand powerful visitor management solutions to check in visitors. “Government organizations and vendors require PIV integration to be able to read government smart cards required for federal workers and contractors, as well as denied party screening so they don’t allow people who aren’t allowed to deal with the US government in their facilities,” said Debbie Pendleton, VP of Sales and Marketing at STOPware.

In an education environment, visitor management may be integrated with law enforcement databases to filter out people who shouldn’t be there. “School districts have the need to protect children, and they can do so by searching externally at national sex offender lists or internally through their own lists of custodial searches and deny entry,” said Virginia Savietto, Marketing Manager at Security Identification Systems Corporation. “The strongest demand (for police record integration) is from the UK education sector. We’re able to instantly identify a possible threat or person of interest and notify an authority of their arrival on site. The basics are matching names and details, but we’re also working on something much cooler in respect to the instant threat notices,” Steve Barrett, CEO of Go Reception. In summary, each vertical market has its own set of needs for visitor management, and it is vital for the visitor management system to be customizable to those needs. “This means that the visitor management software must be easy to use but also include the ability to customize user screens and policies to ensure each company can customize the solution to meet their visitor workflow,” said Pendleton.

53


Analytics Keep Stadium Crowds Under Control Stadiums can often be targets of violence. With large crowds of people attending events, securing such an environment can be a challenge; however, with current technology, protecting event attendees is getting easier. BY Eifeh Strom, Freelancer

n March of this year, a suicide bomber killed 41 people and wounded a hundred more at an Iraqi stadium during a local soccer match. This is only the latest incident of violence against stadium-event goers. Protecting event goers, stadium staff, event performers and athletes is of the utmost importance. However, stadiums are often very densely occupied and have a lot of blindspots, making security much harder to control. Because of this, unlike commercial buildings or public transportation, the use of private security personnel is still heavily relied on. Traditional physical security equipment such as video surveillance cameras, access control systems and alarm systems are also crucial elements of stadium security. However, with the advancement of technology has come better security tools for stadium security operators to utilize. One such technology is crowd control management. In an environment like a stadium, where tens of thousands of people are packed into close quarters, it is easy for a small incident to escalate into a full-on security risk; furthermore, it makes it a prime target for attacks. As algorithms for video analytics improve, companies are now better able to apply crowd control management technology to heavily populated stadium settings and identify possible risks.

JUL 2016 ● www.asmag.com

58

Challenges in stadium seCurity Depending on the event, stadiums can attract a diverse range of event goers, from the teeny-bopping music lover to the belligerent sports fan. “Nowadays, the main challenges in stadium security are to control the access of troublemakers, such as hooligans and other blacklisted people, as well as controlling attendees’ behavior,” said Laura Blanc, Marketing Executive at Herta Security. The bulk purchase of tickets for stadium events also pose a security risk when it comes to crowd control. “Bulk purchases of event tickets means that unidentified people will be receiving tickets and event organizers will not know who they are,” said Raj Sandhu, CEO of Bikal Distribution. Aside from controlling who is entering the stadium, other security concerns revolve around pre-empting any type of possible disturbance. “Most of the issues in stadium security are related to on-event-day disturbances and crowd control,” Sandhu said. “These are usually under the basis of volume crimes such as pickpocketing, drunk and disorderly conduct, assault, and other anti-social behaviors.” He added, “Crowd issues are not only a problem for safety but the confusion and chaos allow thieves to take advantage of the circumstances.”


Controlling Crowds with software While on-the-ground security personnel are a major factor in controlling crowds in a stadium, applying video analytics to video surveillance data can help security officers mitigate issues before they turn into full-scale problems. “Technologically speaking, there is a need for each stadium to have a network infrastructure supporting video surveillance, access control and alarm monitoring, integrated by a powerful software management solution,” Blanc said. “It is also critical to examine the type of cameras installed in the stadium.” She added, “It is very important to have appropriate cameras that can provide the right image quality and resolution. This is especially delicate when the purpose is to control a highly crowded environment.” Herta’s software, which utilizes data from video surveillance cameras, can detect multiple faces in real time over multiple surveillance cameras. “Our technology offers high performance video surveillance solutions for facial recognition, especially for the simultaneous identification of subjects in crowded and changeable environments,” Blanc said. “It is a fully automatic and non-invasive technology that works properly on changes of facial expression, illumination, beard, eyeglasses, scarves and caps.” Blanc added that the software is very tolerant to changes in illumination, pose and partial face occlusions, which are some of the main factors involved in a stadium-type environments. Looking for patterns in video surveillance images via video analytics could also be used to help manage crowds more efficiently from a health and safety perspective. Sandhu explained: “Crowd bottlenecks can occur in venues for specific events, such as using a sports stadium for a one-off music event. As the entry points and the time of the event differs, the stadium will use certain entry and exit points that are not normally used. In addition, the attendees are

Laura Blanc, Marketing Executive, Herta Security

Egbert Jaspers, CEO, ViNotion

new to the venue, in most cases, and being able to direct the attendees effectively will be a challenge. Video analytics are able to spot bottlenecks in crowds and alert the health and safety executives to change, in real time, the management processes for moving the crowd around.” Egbert Jaspers, CEO of ViNotion, a Netherlands-based company specialized in intelligent image interpretation in videos, explained, “Our system, called ViSense, detects, counts and analyzes the motion pattern of people in different directions using IP cameras.” According to Jaspers, ViSense is able to count in streets of up to 18 meters wide and keep an average accuracy of about 95 percent, even in very dense situations (e.g., up to four people per square meter). By using machine learning techniques, the software is able to do more than people counting (e.g., gender and bicycle recognition, speed, throughput, and density measurement), which could be used for security measures in crowded situations. Jaspers added that it can be used at entrances and exits of stadiums to measure crowds to detect, for example, congestion or panic behavior. By analyzing data from IP cameras, the software can detect when a scene appears to become too crowded and then send an alert so that measures can be taken to avoid any problems. The software can also trigger an alarm if it detects a large number of people running or stopping suddenly.

Facial Recognition in Crowds

Raj Sandhu, CEO, Bikal Distribution

The accuracy of facial recognition in crowds is getting better and better as algorithms improve. In a stadium, where people are often moving together in large groups, picking out individual faces may be difficult. This also makes stadiums a perfect place for people to hide in plain sight. “Our system can detect faces within crowds, whereas most facial recognition systems require carefully positioned cameras for the face to be fully visible and only one

LOOKING FOR PATTERNS IN VIDEO SURVEILLANCE IMAGES VIA VIDEO ANALYTICS COULD ALSO BE USED TO HELP MANAGE CROWDS MORE EFFICIENTLY FROM A HEALTH AND SAFETY PERSPECTIVE.

59


NTERNET THINGS

OF

dvanced driver assistance systems (ADAS) are systems created to help drivers with the driving process. They are meant to increase car safety and, more generally, road safety. These come equipped with semi-autonomous features such as lane keeping, adaptive cruise control, emergency breaking, parking assist, blind spot detection and warning alerts. The driver is in control and allows the vehicle to assist at his discretion. According to information from research and advisory firm Frost & Sullivan, ADAS/Automation is the fastest growing segment in the European and US automotive market. It is driven by consumer safety ratings like the New Car Assessment Program (NCAP) in countries such as Europe, U.S., Japan and China, as well as insurance companies and legislation which

require new vehicles to have features like autonomous emergency assistance. By 2028, Frost & Sullivan expects 6.2 million vehicles to have automated features, the majority of which being semi-automated and the rest highly automated or even fully automated. Although these features improve safety, the existing technology holds much more potential beyond this. “Through the automotive OEMs and parts manufacturers we serve, we are seeing demand for more and more sophisticated ADAS features as we gradually transition to autonomous vehicles,” said Shaun Kirby, CTO of Rapid Elizabeth Beasley, Marketing Coordinator, Velodyne LiDAR Praveen Chandrasekar, Consulting Director, Mobility, Frost & Sullivan Shaun Kirby, CTO, Rapid Prototyping, Cisco Systems Christian Schumacher, Global Head, ADAS Customer Programs, Continental Danny Shapiro, Senior Director, Automotive, NVIDIA

CONNECTIVITY AND AUTONOMOUS ARE DRIVING THE FUTURE JUL 2016 ● www.asmag.com

The automotive world is now experiencing major disruptions. Innovative technologies are coming together in a way that has the potential to change how we interact with our cars. Car companies are experimenting with autonomous cars. Thanks to the combination of sensors and connectivity, cars will be constantly connected to the web, transmitting and receiving telematics and effectively becoming an Internet of Things (IoT) sensor. BY Israel Gogol, Freelancer

62


Prototyping at Cisco Systems. These include assisted or automated parking, collision avoidance to wrap-around video for blind spot avoidance as well as vehicle aerodynamic streamlining and weight reduction by replacing mirrors with tiny cameras that send video via Ethernet to the interior. “We expect many technologies to play a transformative role in next generation ADAS systems. In the next three to five years, we could see vehicles that are capable of foreseeing and avoiding hazards far in advance of what is available today, through connectivity to important context like conditions of the road ahead, traffic status and trends, hyper-local weather forecasting, and nearby vehicle intentions. These new technologies, together with cloud and edge embedded analytics, will make vehicles far more intelligent and the driving experience far more accommodating and safe in three to five years than they are today,” he added.

Car SenSor BottleneCkS The sensors accompanying ADAS should be coupled with programming that will allow the vehicle to react appropriately. “The biggest challenge is to develop algorithms so that the autonomous car will be able to handle complex situations and take the correct action to navigate on the roadways,” said Elizabeth Beasley, Marketing Coordinator for Velodyne LiDAR.

CURRENT TECHNOLOGY FOCUSES ON VISION PROCESSING MODULES OR ALGORITHMS THAT COMBINE OBJECT RECOGNITION AND OBSTACLE DETECTION DATA TO PERFORM ENVIRONMENTAL SCANS.

CARS Source:NVIDIA

63


here has always been a human element to the analysis, dissemination and application of what has been learned from data. But what if we could reduce the amount of human intervention needed for our computers to “learn” something, allowing machines to process data and learn from it themselves? Machine learning is not a new concept. As a subfield of computer science, machine learning is a successor of pattern recognition and computational learning. Arthur Samuel, a pioneer in the field of computer science, artificial intelligence and machine learning, defined machine learning as a "Field of study that gives computers the ability to learn without being explicitly programmed.”

As science continues to advance, what we now call deep learning evolved from machine learning. Although considered by many as simply a buzzword, the promise of deep learning is the unsupervised or semi-supervised feature of learning through efficient algorithms, replacing handcrafted features. However, in order to learn, there must be data to learn from. The current availability of big data and the ability to process it has really allowed both machine learning and deep learning to advance. Particularly in the security industry, there is an abundance of data in video surveillance, data that in the past has gone unused due to the sheer volume and lack of ability to process it. In fact,

Big Data OverlOad drives Machine Learning The amount of big data being produced has increased dramatically over the past few years. Companies are now teaching machines to manipulate the data and use it toward enhancing security systems. JUL 2016 ● www.asmag.com

Compiled by the a&s Editorial Team

66

over 60 percent of big data comes from video monitoring. In other words, over 60 percent of the data that comes from the video monitoring domain can be analyzed and used for image recognition. For the security industry, this opens up opportunities to “teach” security equipment to help thwart attacks, identify threats and much more, without the need — or at least less need — of human operators every step of the way.

Rising ThReaT LeveLs RequiRe MoRe DaTa anaLysis In the last few years, there have been many mass killings and terrorist attacks. The terrorist attacks in Paris and bombing in Bangkok in 2015, along with mass shootings like the recent nightclub attack in Orlando, Florida, have all served as a reminder of the importance of city surveillance. However, as urban areas continue to rapidly expand, monitoring these areas becomes increasingly difficult. Yet still, the rise of smart cities and safe cities means that there is also an incredible increase in the amount of data being produced. Video surveillance cameras offer a lot of data from video recordings. Data collected from images and recordings produced by video surveillance could be used to establish databases and then used toward security applications in retail, traffic, transportation, city security, manufacturing, education, etc. This is only one of the many benefits of image and data collection.

Deep LeaRning in secuRiTy With the intention that a computer could “learn” enough from data to imitate the advanced analytical abilities of the human brain, deep learning could have significant benefits for security. It could be used to analyze non-structural data, such as video and images, that is readily available in security. Owing to its ability to correctly recognize objects, the addition of this technology could make systems smarter


and more intelligent. Currently, in security, deep learning is making big strides with improvements in pedestrian detection, vehicle detection, facial recognition, license plate recognition (LPR), crowd behavior analysis, etc. The accuracy of these algorithms have vastly improved over time and have even surpassed human operators. Systems could also be programmed to automatically analyze incoming data from surveillance systems, speeding up searches and freeing up human operators to focus on more important details and not waste time looking though huge amounts of images or footage. Companies are now applying more image recognition and deep learning algorithms to front-end applications such as pedestrian recognition and gait recognition technologies.

pedestrian Recognition R&D teams from some security manufacturers are utilizing advanced deep learning technology to overcome illumination, weather and other difficulties to be able to quickly and accurately distinguish different traits of

Analyzing Big Data for Risk Assessment The point of any attack, whether it be a terrorist attack or an isolated incident, is to instill fear into the public. This is often the reason heavily populated, public areas (e.g., large-scale events, international competitions, public transportation hubs, etc.) are targets. In these arenas, not only do attackers inflict the most damage, but they also play with the public’s feelings of safety. So how can we prevent an incident before it happens? Determining risk beforehand is the first crucial step. For example, assessing the risk for a certain event starts with assessing the type of event, scope, location, capacity, staff, storage locations, etc. Any place that could possibly be a potential threat must be carefully considered. How do we gather related intelligence and then objectively analyze the data to determine possible threats? Big data. Both the United States CIA and FBI have been working with big data company Palantir Technologies to target terrorist organizations. Despite the strong data processing capabilities of the US intelligence community, computers themselves cannot distinguish whether a person is plotting a terrorist attack. In this instance, it is necessary that all data (e.g., phone records, bank transactions, etc.) is cross analyzed before a determination can be made and the information be passed on to the appropriate authorities. By using Palantir’s analytics software, human analysts are better able to determine the location of a possible bomb placed by terrorists, as well as infiltrate the network to search for more criminal activity.

pedestrians (e.g., gender, age, whether or not they are wearing eyeglasses/ sunglasses, hairstyle, clothing, body type, whether or not they are carrying something, etc.). Furthermore, using intelligent image analysis server clusters could support pedestrian recognition

As interconnected systems produce more data than ever, it is not surprising to see companies leveraging this to improve security through machine learning and deep learning.

analysis and search in a city 24/7 over hundreds of surveillance cameras.

Gait Recognition The difficulty in gait analysis lies with trait stability. For instance, a person’s gait will vary depending on circumstance (e.g., weight gain/loss, illness, clothing, etc.). Some companies are using deep learning and gait energy images (GEI) to describe gait sequences and then match the depth of convolutional neural networks (CNN) training model.

The FuTure oF Deep Learning It is easy to see how deep learning fits in the security industry, especially since a key element to “learning” is data, which video surveillance provides plenty of. Especially now with the vast amounts of data available, machine learning and deep learning have more resources to learn from than ever. From here, algorithms will only continue to improve, further improving security and safety for everyone.

67


60$KRPH

Thermostats and Smart Lighting Reign Supreme in Home Energy Management *'4/156#65 #0& 5/#46 .+)*6+0) #4' 1(6'0 6*17)*6 61 $' 6*' 24'4'37+5+6'5 (14 *1/' '0'4); /#0#)'/'06 j k #&126+10T 41&7%6g9+5'X HTM /+..+10 5/#46 6*'4/156#65 *#8' #.4'#&; $''0 51.& ).1$#..; 5+0%' FNEIX 1( 9*+%*X 146* /'4+%# #.10' #%%1706'& (14 KN 2'4%'06 1( 6*' 616#. 5*#4'X #%%14&+0) 61 # 4'2146 $; 1 0#.;6+%5T +/+.#4.;X 5/#46 .+)*6+0) %10641..'45 /#-' 72 #016*'4 /#,14 241&7%6 %#6')14; 9*+%* +5 ':2'%6'& 61 #%%1706 (14 57$56#06+#. /#4-'6 )4196* +0 6*' ;'#45 #*'#&X .'#&+0) 4'5'#4%* (+4/ #4-'65#0&/#4-'65 #.51 4'8'#.'&T ; #n5 *1/'

JUL 2016 Æ” www.asmag.com

68


With increased consumer concerns over energy efficiency, these quintessential devices are driving the overall HEM hardware market, and to some extent, they are helping to spur on smart home market growth. The use of home temperature controls was made popular when Nest Thermostat came into existence, as it was the first “king of the hill” when it was launched back in 2011, and it is still what everyone thinks of when they hear the word “smart thermostat.” It was so popular that the device fabricator, Nest Labs, was eventually acquired by Google in early 2014. This trendsetting device led the way for smart thermostats on the market today, each wrestling for a spot in this highly competitive market segment. Besides thermostats, smart lighting also has substantial energy-saving potential in the home. The call for energy-efficient lighting only became more prevalent in recent years, as different kinds of solutions are increasingly being adopted in homes, public buildings and offices.

6($0/(66 &211(&7,9,7< When it comes to user experience, nothing will ever beat the call for ease of use, Xing Connected CTO Kent Hsin pointed this out, attesting that it has chosen Wi-Fi as its predominant protocol for connectivity because it is something everyone is familiar with. “The mishmash of protocols we see today only confuses consumers.” He added that the smart home would be able to reach mass adoption only if things were kept simpler. Similarly, Meo.life CEO and Founder Saketaram Soussilane considers the seamless and hassle-free integration of new appliances, as well as connection reliability as some of the key HEM features that customers are yearning for. “The home energy management requires a ’seamless experience’ for customers to be satisfied,” he said. In short, if smart products can’t talk to one another, which can be made worse by interrupted connectivity and interoperability issues, consumers will end up frustrated and in dismay.

*(2)(1&,1* ,6 7+( 1(: %8== :25' Geofencing (aka geolocation) is a relatively new technology that makes gadgets like

the momit Smart Thermostat so promising. Geofencing is a technology that defines a virtual boundary around a real-world geographical area. In doing so, a radius of interest is established that can trigger an action in a geo-enabled phone or other portable electronic devices ³ and in this case, some newer smart thermostats also have it as an embedded feature. According to momit, its device uses geolocation to adapt itself to user’s habits. Its sensors allow it to automatically switch on or off the heating or cooling according to the distance from your home. It detects when you leave and when you are on your way back home to pre-emptively switch on the heating. Put simply, geofencing works on location detection rather than traditional motion sensing as in many other smart thermostats or smart lighting. It can therefore work immediately once it’s set up, and recognizes when the user leaves or approaches. Another company that has put geofencing into practice is the totally-revamped, secondgeneration Lyric Thermostat by Honeywell. It can also be easily integrated into other current ecosystems, such as Samsung SmartThings, and link to many home products and services that customers choose, including those from Honeywell.

69


July 2016 – January 2017

WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

July 2016

SecProTec East Africa • Date: 2016/07/12–07/14 • Venue: Kenyatta International Conference Centre (KICC), Nairobi, Kenya • Tel: +49-40-710070-51 • Email: stefan.freiberg@planetfair.de • URL: www.secproteceastafrica.com

Security Exhibition & Conference • Date: 2016/07/20–07/22 • Venue: Melbourne Convention & Exhibition Center, Melbourne, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au September 2016

Intersec Buenos Aires • Date: 2016/09/07–09/09 • Venue: La Rural Trade Center, Buenos Aires, Argentina • Tel: +54-11-4514-1400 • Email: ezequiel.gorbaran@argentina.messefrankfurt.com • URL: www.intersec.ar.messefrankfurt.com

ASIS • • • • •

Date: 2016/09/12–09/15 Venue: Orlando, Florida, U.S. Tel: +1-703-519-6200 Email: asis@asisonline.org URL: http://securityexpo.asisonline.org

Secutech Vietnam • • • • •

Date: 2016/09/21–09/24 Venue: Friendship Cultural Palace, Hanoi, Vietnam Tel: +886-2-8729-1099 Email: stvn@newera.messefrankfurt.com URL: www.secutechvietnam.com

OFSEC • Date: 2016/09/05–09/07 • Venue: Oman International Exhibition Centre, Muscat, Sultanate of Oman • Tel: +968-2478-8476 • Email: info@muscat-expo.com • URL: www.muscat-expo.com/ofsec

Adria Security Summit • Date: 2016/09/06–09/08 • Venue: Kongresni Centar, Sarajevo, BiH • Tel: +387-33-788-985 • Email: summit@asadria.com • URL: www.adriasecuritysummit.com

JUL 2016 ● www.asmag.com

IFSEC Southeast Asia • Date: 2016/09/07–09/09 • Venue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia • Tel: +44-20-7921-8127 • Email: Agnius.Kazlauskas@ubm.com • URL: www.ifsecsea.com

74

Security Essen • • • • •

Date: 2016/09/27–09/30 Venue: MESSE ESSEN, Essen, Germany Tel: +49-201-7244-0 Email: info@messe-essen.de URL: www.security-essen.de

Safety & Security Asia • • • • •

Date: 2016/09/28–09/30 Venue: Halls B & C, Marina Bay Sands, Singapore Tel: +65-6278-8666 Email: info@cems.com.sg URL: www.safetysecurityasia.com.sg

ISAF Istanbul • • • • •

Date: 2016/09/29–10/02 Venue: Istanbul Expo Center, Istanbul, Turkey Tel: +90-212-503-32-32 Email: marmara@marmarafuar.com.tr URL: www.isaffuari.com

October 2016

Security China • Date: 2016/10/25–10/28 • Venue: China International Exhibition Center (New Center), Beijing, China • Tel: +86-10-68731710 • Email: secu_chinashow@yahoo.com.cn • URL: www.securitychina.com.cn November 2016

Expoprotection • • • • •

Date: 2016/11/07–11/09 Venue: Paris Porte de Versailles - Pavillion 1, Paris, France Tel: +33-1-47-56-50 11 Email: marie-aurelie.goncalves@reedexpo.fr URL: www.expoprotection.com

Smart Summit Asia • • • • •

Date: 2016/11/30–12/01 Venue: Suntec Convention and Exhibition Centre, Singapore Tel: +44-330-3353900 Email: sponsorship@smartsummit.net URL: www.iotsmartsummitasia.com

December 2016

MEFSEC • • • • •

Date: 2016/12/11–12/13 Venue: Cairo International Convention Centre, Cairo, Egypt Tel: +971-4-407-2702 Email: syed.javed@informa.com URL: www.mefsec.com

January 2017

Intersec • Date: 2017/01/22–01/24 • Venue: Dubai International Convention and Exhibition Centre, Dubai, U.A.E • Tel: +971-4-389-4500 • Email: andreas.rex@uae.messefrankfurt.com • URL: www.intersecexpo.com


Companies in This Issue Products of the Month • ALTRONIX • AXIS COMMUNICATIONS • COMNET Viewpoint • EPRI TOTAL INTEGRASI • ISD TECH • ITQAN • KINTRONICS • SECURITAS UAE • THEIA TECHNOLOGIES Market Update • ARECONT VISION • DAHUA TECHNOLOGY • GIGA SECURITY • HANWHA TECHWIN AMERICA

• • • • • • •

HIKVISION DIGITAL TECHNOLOGY INDIGOVISION INTELBRAS PELCO BY SCHNEIDER ELECTRIC SC TECHNOLOGY VIVOTEK WDC NETWORKS

Business Talk • FLYBRIDGE CAPITAL PARTNERS • RIVERLAKE PARTNERS • VIDEOSURVEILLANCE.COM Integrated System • AMAG TECHNOLOGY • BRIVO • GALLAGHER • GO RECEPTION • HID GLOBAL

Next Issue

• QUANTUM SECURE • SECURITY IDENTIFICATION SYSTEMS CORPORATION • STOPWARE • TIME DATA SECURITY • VANDERBILT INDUSTRIES Vertical Solution • BIKAL DISTRIBUTION • HERTA SECURITY • VINOTION IoT • CISCO SYSTEMS • CONTINENTAL • FROST & SULLIVAN • NVIDIA • VELODYNE LIDAR

Integrated System

Smart Device/Software

PERIMETER SYSTEM

VCA FOR RETAIL

Vertical Solution TUNNEL SECURITY

75


Videotec NXPTZHD HD PTZ Camera

Axis P3707-PE Network Camera

Synectics SY-BLM3-LLX 2 MP Low Light IP Bullet Camera

Features:

Features:

• Entirely made from AISI 316L electropolished stainless steel • Camera: Full HD 1080p, 30x, 60 fps • Easy installation thanks to the pre-wired multipolar cable supplied with the unit • Weatherproof standard: IP66, IP68, IP69 • Extended temperature range from -40 to 60 degrees Celsius

• 8 MP • 360-degree multisensory camera • Flexible positioning of four varifocal camera heads • 1080p videos at 12.5/15 fps, 720p videos at 25/30 fps, quad view streams • Axis’ Zipstream technology • Weatherproof standard: IP66 and IP67

■ Videotec /Italy ■ Email: info@videotec.com

■ Axis Communications/Sweden ■ Email: axis-sap@axis.com

Features: • • • • • •

Full real-time 2-MP HD multistream Sony Exmore progressive scan CMOS sensor Provides full 1080p HP 50/60 fps streaming True WDR at 25/30 fps 3x AF zoom lens IR illumination up to 25 meters

■ Synectics/U.K. ■ Email: sales@synecticsglobal.com

Algatec UL545L-SL ECO Series Electro-Magnetic Lock Features: ■ Algatec/Malaysia ■ Email: sales@uwcelectric.com

• 1,200 lbs ECO series EM lock features eco-friendly design with power consumption less than 300mA • Integrated lock status monitoring feature (LSMF) • Electrolytically coated with a protective oxide film • Zero residual magnetism • Single voltage operation – 12Vdc • Ease of installation with low maintenance and low energy consumption for cost efficiency

Tci aluna Touch Panel Features: • Multi-touch display, available in 7 or 10 inches, can be operated intuitively • Integrated microphone and speaker with echo-canceling, hands-free intercom with high audio quality • Two hardware versions are offered, one for Android and one for Windows as an operating system • Suitable for various applications such as building control, conference technology and digital signage • Two colors available ■ Tci/Germany ■ Email: info@tci.de

JUL 2016 ● www.asmag.com

76

Software House IP-ACM Ethernet Door Module

S2 Magic Monitor Version 2

Features:

• Allows for live video tours and on-screen PTZ controls • Takes picture snapshots directly from a live video stream • Opens a Magic Monitor digital canvas on multiple monitors connected to the same computer • Zooms in for the details on a live or recorded video stream • Plays back video directly from a live video stream • Enables search, review and catalog of evidence with just a few clicks

• • • • • •

Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra GCM Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption

■ Software House (part of Tyco Security Products)/U.S. ■ Email: customerna@tycoint.com

Features:

■ S2 Security/U.S. ■ Email: sales@s2sys.com


VCA VCA1100EN 1 Channel D1 Network Video Encoder Features: • • • •

Two-way audio H.264 full frame at D1 RS-485 support Embedded CVA Technology video analytics (optional) • MicroSD/SDHC memory card slot • Power over Ethernet (IEEE 802.3af) • ONVIF ■ VCA Technology/U.K. ■ Email: info@vcatechnology.com

Bosch Access Professional Edition 3.3 Features: • Software for access control and security management, utilizing the innovative access modular controller family • Cardholder administration of up to 10,000 records in the database • Graphical location map with device control via both maps and device tree • Alarm management with details via alarm list and animated GIFs on interactive location maps • Video verification, video alarm verification and video monitoring of live and recorded events • Online swipe and attendance overview ■ Bosch Security Systems/Germany ■ Email: apr.securitysystems@bosch.com

Grundig GCI-F0795P 3 MP Outdoor Motorized Dome IP Camera Features: • • • • •

3 MP IP camera with real-time video streaming 30x motorized optical zoom with 12x digital zoom Vandal resistant dome (IK10) Weatherproof outdoor installation (IP66) WDR function, color/B&W function with removable IR cut filter • ONVIF Profile S compliant for maximum compatibility with VMS ■ Grundig Security/Germany ■ Email: info@grundig-security.com

Milestone XProtect Enterprise 2016 R2 VMS Features: • Supports more than 2,400 IP cameras, IP video encoders and selected digital video recorders with analog cameras • Supports ONVIF and PSIA-compliant cameras and devices • Hardware use is optimized with two independent, configurable video streams, one for live viewing and one for recording • Evidence collection mode retains recordings even when a camera is deleted from the system or if a hard

GJD GJD500 D-TECT Laser

disk runs out of space • Privacy masking capability enables administrators to define privacy masks for individual cameras to hide areas in the camera view that must not be visible or recorded in order to comply with local legislation • Automatic online or offline activation. 30-days grace period for device licenses ■ Milestone Systems/Denmark ■ Email: info@milestonesys.com

3xLogic VX-VT-36 Outdoor Thermal IP Camera

Hundure HTA-500PEF Fingerprint Time Attendance Recorder

• • • •

Suitable for internal and external use Can create a virtual wall or ceiling Compact design and single cabling point 2 programmable detection zones that are configurable within 10 cm • Virtual tamper and anti-masking • Available in black and white housing

Features:

Features:

• • • • • •

■ GJD Manufacturing/U.K. ■ Email: info@gjd.co.uk

■ 3xLogic/U.S. ■ Email: webmail@3xlogic.com

• Fingerprint time attendance recorder with built-in EM reader module • Supports 1,500 users with 2 fingerprint templates for each person • Provides 3,000 cardholders and 100,000 events • Built-in USB-host interface to import/export data through USB flash drive • Various interfaces: TCP/IP, PoE or Wi-Fi are available • The device ACU-30 (with 2 relays) is optional for connecting an external lock and siren

Features:

206 x 156 array size 7 fps (320 x420) H.264 compression 4 mm fixed lens Two-way audio IP66 weather-resistant

■ Hundure Technology/Taiwan ■ Email: overseas@hundure.com

77


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

BARN DOOR, 23

AV TECH CORPORATION

IP CAMERA

TAIWAN

ezum@avtech.com.tw

21

CHENGDU POWERVIEW SCIENCE AND TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

dennis@powerview.cn

7

COMMAX CO., LTD.

SURVEILLANCE

KOREA

pcy@commax.co.kr

11

CONNECTION TECHNOLOGY SYSTEMS INC.

SWITCH/CONVERTOR/ETHERNET MEDIA TAIWAN

sales@iConnectron.com

INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

33

DALLMEIER ELECTRONIC GMBH & CO.KG

SURVEILLANCE

GERMANY

info@dallmeier.com

8

DYNACOLOR INC.

IP CAMERA / NVR

TAIWAN

info@dynacolor.com.tw

75

FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER

CHINA

sales@fjsmt.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

45

ICATCH INC.

SURVEILLANCE

TAIWAN

marketing@icatchinc.com

29

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

4

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

46

NEXTCHIP CO., LTD.

CHIP

KOREA

sales@nextchip.com

2

RIFATRON CO., LTD.

DVR

KOREA

contact@rifatron.com

12, 13

SONY SEMICONDUCTOR SOLUTIONS CORPORATION

SEMICONDUCTOR

JAPAN

-

INSIDE BACK COVER

TAMRON CO., LTD.

CAMERA

JAPAN

newbiz@tamron.co.jp

15

VIDEOPARK TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@videopark.com.cn

3

VIDEOTEC S.P.A.

IP CAMERA / SOFTWARE / VIDEOSERVER

ITALY

info@videotec.com

9

ZEEANN CO., LTD.

CMOS IMAGE SENSOR

KOREA

sales@zeeann.com

INTRUSION ALARM PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

10

KMT CO., LTD.

ALARM

KOREA

overseas@isaso.com

6

LINCE ITALIA S.P.A.

INTRUSION ALARM

ITALY

info@lince.net

ACCESS CONTROL PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

51

GIGA-TMS INC.

RFID MODULE / LOCK / READER

TAIWAN

promag@gigatms.com.tw

5

VANDERBILT INTERNATIONAL

ACCESS CONTROL

SWITZERLAND -

PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

17

MESSE ESSEN

EXHIBITION

GERMANY

-

OTHERS

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

79


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.