Jun 2013
induStry report
Key Findings from the Latest Asian Products:
Advances in Connectivity and Usability
Asia manufactures nearly all the products in the world, which makes it the heart of so many industries, particularly security. From April 24 to 26, Secutech 2013 gathered major Asian manufacturers in Taipei for Asia’s most representative security show. The a&s International editorial team got the latest updates on the newest launches and strategies to stay competitive in the global market.
56
Special Feature
Vertical MarKet
34
Airtight Security Secures Luxury Goods 74
Korea update
Luxury retail is more than top-tier merchandise; it is also about top-tier customer service, and unbeatable security to protect both the valuable assets and VIPs.
14 22
JUN 2013
68
www.asmag.com
SMB Sector Given Great Attention
22
Korean Companies Join IP Video Development
Jun 2013
Product ExPloration
Biometrics Face Off Biometric technologies are set to rapidly increase in usage worldwide over the next few years. According to MarketsandMarkets research, "Global Biometric Systems Market Forecast & Opportunities, 2018", global biometrics market revenues are anticipated to reach over US$20 billion by 2018. Increasing security requirements for public security such as border control management, national identity, e-passports, internet and network access, and financial transactions are acting as growth drivers for the industry.
40
48 Understanding the Best Usage of Biometrics rEadErs’ coluMn
MarkEt uPdatE
94 What Readers Say About Us?
84
Key Verticals Drive Positive Growth in the U.S.
The outlook for growth in the US security market for the next six to 12 months is extremely positive for video surveillance, access control, and home automation.
14 18 20 20
90 Innovative Technologies Bring New
Opportunities
16 22
JUN 2013
www.asmag.com
22
Contents Editor’s Note Corporate News Market Observer
30 103 96 95
Products of the Month Show Calendar New Products Companies in This Issue
EDITOR'S NOTE a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies developments in CCTV, Digital Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home
SOlUTIOnS, nOT JUST PRODUCTS
Automation and other fields relevant to electronic security.
ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄
After the successful ending of the three major international physical security trade shows — ISC West, SECUTECH, and IFSEC this year, some security professionals might have discovered that not many major technological breakthroughs could be seen from those major companies’ latest showcases. The ‘cost-effective,’ ‘easy-to-use/install’ or ‘aesthetically-designed’ products now become the major highlights for many companies this year. Does it mean that the security industry has stopped moving ahead? Not really, I would say. From a marketing point of view, customers’ demands and needs could always be created by new technologies or solutions as long as the new product can fulfill what they need or solve what they suffer from. The existing security technologies and products now are widely adopted by different market sectors and even extended to serve multiple purposes to enhance people’s life quality, which has become a major theme. Home monitoring service would be a perfect example. End users can enjoy the mobile monitoring of their elderly, kids, or pets when they are away. Now, the latest solution includes home automation, energy saving, and even providing local information on the status of inhabitants, assets, and vehicles to further ensure their personal or property safety. Besides inventory management and checking, we also see RFID being used in hospitals to enhance hospital management or in homes for remote health monitoring to secure the elderly. Furthermore, a lone worker can be easily monitored, tracked, managed, and protected by a simple card. Physical access control products can be integrated with other systems to provide venue management or secure logical access. What we observe now is not a development of a single product or technology, but more about a new trend toward vertical solutions — how security products or technologies are used to provide more services and information for human beings. Solutions, not products, can create value. Many Asian access control suppliers also started to provide more vertical-specific solutions for different market sectors in SECUTECH Taipei this year. In the future, we can expect a variety of new solutions to make our lives easier, safer, and more convenient.
Jill Lai
jill.lai@newera.messefrankfurt.com
Parson Lee Joseph Lee John Shih
Publisher & Managing Director General Manager General Manager
Editorial
General Press Jill Lai Alf Chang Tevin Wang Alyssa Fann Christine Chien Jessie Lin
Editor in Chief Senior Consultant Reporter Reporter Reporter Coordinator
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com tevin.wang@newera.messefrankfurt.com alyssa.fann@newera.messefrankfurt.com christine.chien@newera.messefrankfurt.com jessie.lin@newera.messefrankfurt.com
Executive Designer Designer Designer
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Arthur Wu
Circulation & Subscription
Collins Yuan Michelle Shih
Group Manager Coordinator
collins.yuan@newera.messefrankfurt.com michelle.shih@newera.messefrankfurt.com
Corporate Management
Juihui Lin Thomas Pin Chihung Lee
Assistant to Managing Director Account Manager IT Manager
juihui.lin@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
asmag.com
Hayden Hsu Jerry Wu
Web Editor in Chief hayden.hsu@newera.messefrankfurt.com Assistant Sales Manager jerry.wu@newera.messefrankfurt.com
Secutech & Events (Overseas)
Sandra Chen Tina Chang
Project Manager sandra.chen@newera.messefrankfurt.com Assistant Project Manager tina.chang@newera.messefrankfurt.com
Secutech & Events (Domestic)
Veronica Chen
Group Manager
veronica.chen@newera.messefrankfurt.com
International Advertising [Headquarters]
Kay Yang Audrey Fang Helen Chen Jessica Lee
Operation Officer Coordinator Coordinator Assistant
kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com helen.chen@newera.messefrankfurt.com jessica.lee@newera.messefrankfurt.com
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Cemre Ilkan Evris Consolos Muris Hadzic Manish Gandhi Tim Shen Y. C. Suh Takashi Komori Nguyen Thu Ha
USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam
bobbie@globetrottermedia.com produzione@ethosmedia.it cemre.ilkan@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz tim@asmag.com.cn ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com
Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2013 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
18 22
JUN 2013
www.asmag.com
22
Products of the month
iRobot 110 FirstLook The iRobot 110 FirstLook is a small, light, throwable robot that provides hasty situational awareness, performs persistent observation, and investigates confined spaces. FirstLook is ideal for a range of infantry missions and special operations, Key Features including building • Maintains a persistent presence for clearing, raids, and more than six hours other close-in • Investigates tunnels, ditches, culverts, scenarios. The and other hard-to-access places robot operates • Line-of-sight ranges up to 656 feet (200 efficiently in meters) challenging • IR illumination for difficult lighting conditions such as conditions tunnels, ditches, culverts, and etc. It gets more than six hours of runtime on • IP67-rated rugged design a typical mission and uses IR illumination to enhance low-light and no light Supplier operations. Moreover, the rugged design can withstand 16-foot drops onto • iRobot Corporation concrete and is waterproof to three feet. FirstLook is maneuverable in a variety URL of environments; the robot climbs steps up to seven inches high, overcomes • www.irobot.com curbs and other obstacles, turns in place and self-rights when flipped over.
Connexion2 Identicom 8 Series Long Worker Device
Key Features
• Camera function
The Identicom 877c is the first dedicated lone worker device to integrate • Supports two-way audio functionality a camera function for use to improve the flow of information around work • Multi-function buttons link to three specific phone numbers ( a non-alarm function) activities, allowing still-frame images to be captured and distributed easily and effectively. The camera sits on the front face of the device, and is operable • Allows image capture whilst ID is inserted through a small hole in the user’s ID card, or if preferred a user can decide • Photos captured are automatically uploaded to Mobile Workforce Management Platform to remove their ID card prior to capturing. The 877c improves the flow of communication across a range of lone working roles that benefit from the Supplier ability to capture images of locations visited, incidents, works progression, • Connexion2 criminal activities, specific areas of risk, and so on. Photos captured on the URL device do not need • www.connexion2.com to be uploaded at a later date as they are automatically delivered to a client’s Mobile Workforce Management Platform, reducing the number of items lone workers carry, such as digital cameras. Moreover, the device is also configurable allowing one or two-way communication devices that enables long works to make audio-calls through the multi-function buttons on the front of the device to three pre-nominated phone numbers. Correction
StarDot Technologies' URL published on p.30 of the May 2013 edition of a&s international should be www.stardot.com. a&s sincerely regrets this oversight.
30 22
JUN 2013
www.asmag.com
22
Special Feature
The small and medium business (SMB) sector has garnered substantial attention lately, and many security companies are directing their energies to the SMB sector. The sector itself is also increasing its network surveillance and cloud services uptake. In this feature, a&s looks at the network surveillance and cloud trends in the SMB sector, and how security companies, including those that have previously focused on the top-end market, are approaching this sector in terms of market and product strategy. By AlyssA FAnn
SMB Sector Given Great Attention S
MBs are most often defined by a business’s number of employees and revenue. M o s t re s e a rc h o rg a n i z a t i o n s , such as Gartner, defines SMBs as businesses that have less than 999 employees and an annual revenue of less than US$1 billion — small businesses comprise of fewer than 34 22
JUN 2013
100 employees and have less than $50 million in annual revenue; medium-sized businesses have 100 to 999 employees, and an annual revenue of more than $50 million, but less than $1 billion. The European Commission (EC), on the other hand, defines SMBs to have fewer than 250 employees and a turnover of less
www.asmag.com
22
than $65.4 million. The SMB sector is one that should not be overlooked. Although SMB projects are comparatively smaller in size than their government and large enterprise counterparts, they are often the backbone of their respective economies and they are significant contributors to their national GDPs.
▲Jumi Edubhram, VP, Business Development, Next Level Security Systems
▲ Jamie Barnfield, Senior Sales Manager, IDIS Europe
In addition, while each SMB may be small, the entire SMB sector is significant — there are roughly 8 million SMBs in the U.S., 3.3 million in China, and 3.5 million in India. In Europe, more than 99 percent of European businesses have fewer than 250 employees, according to the EC. In the U.S. alone, SMB security spending is forecast to exceed $5.6 billion in 2015, twice the rate of SMB IT spending over the same period, according to International Data Corporation. Hence, while large-scale security projects often grab headlines, the market potential of SMB security sector is significant.
IP SurveIllance uPtake by SMb
Understanding SMB characteristics are vital to gaining market share. First, SMBs have similar security needs to their larger enterprise counterparts, but considerably smaller budgets. Second, most SMBs lack internal IT resources, which is the reason why they have been hesitant over IP technology. Third, SMBs prefer a one-stop-shop as unlike large enterprises, they generally do not have a specified security specialist and most personnel in SMBs tend to wear
▲ Tony Lannon, European IP Surveillance Business Development Manager, D-Link
▲ Aaron Dale, Market Analyst, IMS Research (an IHS company)
multiple hats. The added context of a slow global economy suggests that the focus of SMBs is less on future proofing their solutions for the long term, despite the future financial and technological benefits, and making cost-based decisions in the short term. In terms of product requirements, SMBs typically deploy up to 16 cameras, with storage needs of up to 30 days depending on the business nature. “Most SMB customers want to keep the video for at least a week, but retail customers may want to keep it for approximately 30 days to detect credit card fraud,” said Jumi Edubhram, VP of Business Development at Next Level Security S y s t e m s . “ To a c c o m m o d a t e a range of storage requirements, it is important for video solutions to have flexible storage options, i.e., the ability to easily add as much external storage as required,” Edubhram added. analog vS IP
The tides appear to be changing, albeit slowly. “Across the industry, analog sales for small businesses are still healthy although growth has flattened out in the last two or three years,” said Jamie Barnfield, Senior Sales Manager of IDIS Europe. The 22
JUN 2013
▲ Surajit Biswas, Director, Business Development Channels in APAC, Bosch Security Systems
migration to IP, however, is expected to be steady as opposed to a very rapid switch. This reflects both the steady decline in analog sales and the current slow economy, he added. The uptake of IP surveillance is driven by a combination of factors, but decreasing price and increasing value is proving to be a game changer. “The costs of all IP surveillance equipment components have fallen over the last few years, while their capabilities and specifications have increased,” said Tony Lannon, European IP Surveillance Business Development Manager at D-Link. “This makes features like high-definition, wireless connectivity, low-light vision, and cloud capabilities increasingly part of the norm. As such, it is now possible for a small business to purchase an entire well-specced, four camera surveillance system at a very attractive price,” he added. In the SMB sector, IP surveillance is being deployed side-by-side existing analog systems and gradually replacing them. “At first, we thought we were going to see a lot of hybrid systems, but the cost of encoders and the complexity involved means that actually we are seeing a rise in side-by-side systems,” observed Lannon. These SMBs are gradually
www.asmag.com
22 35
Product Exploration
Biometrics Face Off Biometric technologies are set to rapidly increase in usage worldwide over the next few years. According to MarketsandMarkets research, "Global Biometric Systems Market Forecast & Opportunities, 2018", global biometrics market revenues are anticipated to reach over US$20 billion by 2018. Increasing security requirements for public security such as border control management, national identity, e-passports, internet and network access, and financial transactions are acting as growth drivers for the industry. As of right now, fingerprint is the most common form of biometrics, but face recognition will most likely become its successor in the years to come. By Christine Chien
T
he global biometric market is expected to grow at an estimated compound annual growth rate of 22.9 percent as compared to the facial recognition market growth of 27.7 percent during the forecasted period of 2013 to 2018. Over the next six years, face recognition is predicted to become highly pervasive, ubiquitous across its ecosystem, and penetrating the market to a huge extent, according to the MarketsandMarkets research. Face recognition, one of the oldest forms of biometrics, had been slow to gain widespread adoption due to the problems in accuracy and reliability often found in its algorithm. However, the dynamics revolving around the use of face recognition is changing as government officials
40 22
JUN 2013
and commercial sectors are starting t o re a l i z e t h e c o n v e n i e n c e i n using facial biometrics for various purposes. Its appeal stems from the contactless, non-invasive nature when capturing and recognizing an individual, but also from its similarity to how humans recognize each other — through the face. Now that face recognition is proving to be more accurate, its flexibility of being used in all environments, and the public’s higher tolerance for it, will propel its speed of adoption.
Main PurPoses
There are two main application categories for automatic face recognition: access control (1:1), for verifying the identity of the people
www.asmag.com
22
trying to access restricted physical locations, and search (1:n), for identifying individuals from a watch list in typically large collections of images, recorded footage, or live video. These categories result from trading off the rejection versus the acceptance of the system, emphasizing either its restrictiveness or its eagerness to find a match, explained Carles Fernández Tena, PhD, R&D Project Manager of Herta Security. For one-to-one identification, facial images are used in combination with video surveillance in a controlled situation. Ideal sources of controlled environment for image capture include motor vehicle agencies, visa and passport agencies, mugshots, background checks, and surveillance cameras placed at “choke points”.
For one-to-many identification, face recognition algorithms experienced noticeable improvements through continuous attempts to address commonly associated problems in uncontrolled environments. “Facial biometrics is one of the most promising biometric technologies to be widely adopted and more generally affordable in the short future, given that capturing of samples can be done at relatively long distances and without any participation on the subject’s part,” said Gary M. Lee, International Business Development Manager at Herta Security. With the ability to operate from afar, face recognition is used to conduct passive recognition — where no real cooperation is needed from subjects to detect and
collect their faces in a real-time surveillance video — and start the match against databases of unwanted personnel or the “blacklist”. Areas with large crowds, heavy traffic, and high throughput will be more effective if a separate mode of recognition can be incorporated into the surveillance solutions to further ensure maximum accuracy. When it comes down to identifying an individual against an entire, or multiple databases, herein also lays its advantage — it has a massive and readily available database, such as ones from the FBI, and driver’s license issuing facilities, such as the Motor Vehicle Commission, to increase the chances of locating a match. The database continues to expand not only because of the
22
JUN 2013
FBI’s billion-dollar Next Generation Identity program, but with the help of social media and retail sites where users upload images for a virtual makeover. This allows operators to access dozens of photos of individuals from varying angles and settings. The growing computational powers ameliorate the process of scanning these massive databases.
Challenges and liMitations
Face recognition is achieved by measuring the different features and characteristics on an individual’s face: the distance between the eyes, nose, and lips, width of the nose, depth of the eye sockets, shape of the cheekbones, and length of the jaw line. It is also important that face
www.asmag.com
22 41
Product Exploration
Understanding the Best Usage of Biometrics Biometric recognition comes in quite a few forms, but it is important to understand their limitations and their most suitable operating environments to ensure maximum performance and accuracy. By Christine Chien
T
he growth of applying b iomet ric recognition in different verticals is gaining momentum across the world. The growth is further escalated by the national ID programs and the transition to e-passports. There is no doubt that EMEA and APAC will be the prime region of growth for biometric applications in the upcoming years. “Current product trends in biometrics stem from the continuing maturity and acceptance of iris and fingerprint technology; improvements in voice and face recognition; and the increasing integration of biometric identity and document assurance technology for commercial uses which sit outside government, criminal, and border usage,” said Jim Slevin, Aviation Business Unit Manager at Human Recognition Systems (HRS).
Phil Scarfo, VP, Worldwide Sales and Marketing, Lumidigm
48 22
MAY 2013
Now that biometrics has proven its ability to identify and verify individuals, it is important for users to understand where each form of biometrics will work with utmost accuracy and achieve the best performance. Many times, users employ biometric devices as access control or time-and-attendance system, without considering the dynamics of their environments. Users need to understand what may work in one environment, may not be able to achieve the same level of performance in another. “The most important thing is to understand the application before making a decision. Authentication solutions aren’t solutions at all if they don’t address the specific requirements of the application. A successful authentication solution makes day-to-day operations easier for users, not more
Jeff Maynard, CEO and President, Biometric Signature ID
Raj Venkat, VP, Cards and Credentials, Ingersoll Rand Security Technologies
www.asmag.com
22
difficult,” said Phil Scarfo, VP of Worldwide Sales and Marketing at Lumidigm. Deployment conditions, demographics of the users, and if the solution will prove to optimize and streamline the flow of the environment, are all some things to consider for choosing the right biometric device. Some biometric solutions may be more suitable for one-to-one matching, while others may be more suitable for one-tomany.
AdvAntAges And disAdvAntAges of some Common BiometriCs
Currently, fingerprint recognition is the most commonly adopted form of recognition. They have been used in banks, classic access control, and border crossings to name a few. Users are able to enroll their templates reliably on contact. However, the scanner itself may be prone to frequent replacements in a setting where there is a large usage rate. For instance, fingerprints are not fit for environments with high throughput at a high speed as users have to properly place their enrolled fingers on to the scanners in order to be authenticated. If the finger is not properly placed on the machine, it may take several attempts to proceed. If the finger-
Product Exploration
SHOWCASE OF BIOMETRICS VISION-BOX VB I-MATCH BIOMETRIC E-GATE
CROSS MATCH TECHNOLOGIES SEEK AVENGER MOBILE BIOMETRIC DEVICE
vb i-match is the award winning multimodal ABC e-gate (iris, fingerprint, and facial recognition) developed by Vision-Box. It is currently the first of its kind in biometric e-gates. Designed with the traveler’s experience in mind, vb i-match provides a self-service process, lowering waiting times, minimizing intervention from authorities, and enhancing the overall airport experience. Vision-Box-developed e-gate is extremely robust and safe, and complies with the current e-border security strategies. It supports the existing tight security rings and complies with the inspection processes already in place, while per forming high-level security checks without bringing the traffic at borders to a halt.
Cross Match Technologies’ SEEK Avenger mobile handheld provides immigration, customs, border control, law enforcement and security personnel with a truly rugged portable identity management solution. The handheld incorporates Cross Match’s MOBS software running on a Windows-based OS, biometric sensor technology, and secure credential reader and communication options. Weighing in at just over 3lbs. (1.4kg), it is capable of capturing stand-off dual iris (SAP 40) and fingerprint (FAP 45) images in direct sunlight. A built-in contact card reader and optional MRZ and e-passport readers provide the flexibility to configure the optimal credential solution. Moreover, a 5-megapixel camera provides 1D/2D barcode reading and facial capture. The optional communications cap incorporates seamlessly into the device, providing LTE/3G or other network certified cellular modems for additional connectivity.
■ Vision-Box/Portugal ■ Email: nuno.periquito@vision-box.com
■ Cross Match Technologies /U.S. ■ Email: sales@crossmatch.com
BIOSURVEILLANCE NEXT fACIAL RECOGNITION VIDEO SURVEILLANCE SOLUTION BioSurveillance NEXT is a high-performance video surveillance solution for facial recognition, specially designed for the simultaneous identification of subjects in crowded and changeable environments. Optimized for GPU architectures, it works 40 times faster than traditional systems (up to 150fps), and works with high-resolution video streams. The technology makes it so subjects can be recorded automatically through (on-the-fly) video capture, and works correctly even with partial facial concealment, wearing of glasses, handkerchiefs or caps, changes in facial expression, difficult lighting conditions, and slight rotations of the face. BioSurveillance NEXT is optimized for environments with large crowds in constant movement, such as airports, metro and train stations, shopping centers, sports stadiums, and urban centers.
LUMIDIGM MULTISPECTRAL IMAGING fINGERPRINT READERS AND SENSORS Lumidigm multispectral fingerprint sensors capture fingerprint data beneath the surface of the skin so that dryness or even damaged or worn fingers create no problems for reliable reads. Using multiple wavelengths of light and advanced polarization techniques to extract unique fingerprint characteristics from both the surface and subsurface of the skin, Lumidigm’s sensors provide results that are more consistent, more inclusive and more tamper-resistant than conventional biometric readers. As a result, biometric readers developed by Lumidigm’s partners can scan through dirt, dust, high ambient light, water, and even some latex gloves. Nonetheless, the design of the biometric fingerprint readers is simple, resulting in units that are small, require minimal training, and are easy to install.
■ Herta Security/Spain ■ Email: info@hertasecurity.com
52 22
JUN 2013
■ Lumidigm/U.S. ■ Email: sales@lumidigm.com
www.asmag.com
22
Product Exploration
SHOWCASE OF BIOMETRICS SCHLAGE HANDKEY II BIOMETRIC DOOR CONTROL
SUPREMA BIOENTRY W BIOMETRIC ACCESS CONTROL
HandKey II utilizes hand geometry to verify the identity of the user and enhance security at any door, helping to ensure that only authorized users can gain access. Users cannot swap badges or forget their credentials. Adding and deleting users is easy and the system can be expanded to support more users as needs grow. The HandKey II supports multiple credentials, including proximity, magnetic stripe, bar code, HID iClass, and MIFARE smart cards. It is field-upgradeable and offers expandable memory options to support from 512 to 259,072 users. Three user-definable outputs connect other devices like audible or silent alarms, door locks or lighting systems. A specially formulated antimicrobial coating on the platen inhibits the growth of bacteria, mold, and mildew, limiting the spread of germs. A blue hand outline on the platen facilitates easy enrollment and reduces errors during verification.
BioEntry W combines benefits of IP access control system with high-level security provided by fingerprint biometrics. With its rugged IP65/IK08 certified protective structure, BioEntry W is designed for outdoor installation and harsh operating environments. It offers dust and water protection by featuring IP65 certified body structure with operating temperature range from -20-degree Celsius to 50-degree Celsius; it is also IK08 rated protecting up to five joules of impact. The device’s rugged housing is made of specialized heavy-duty Lexan resin and its outer shell thickness has been doubled than ordinary access readers. BioEntry W provides easy installation and network connectivity by TCP/IP and PoE which completes true IP-to-the-door access control by wiring a single CAT5/6 cable for both network and power. The device also provides RS485, Wiegand, and an internal relay for direct lock interface.
■ Ingersoll Rand Security Technologies/U.S. ■ Email: sales@irco.com
■ Suprema/Korea ■ Email: sales@supremainc.com
SPEED CAPTURE G3 BIOMETRIC DATA ENROLLMENT SYSTEM
HRS SYSTEMS MFLOW JOURNEY MFlow Journey uses passive facial recognition technology to track and manage people flow through transport hubs, such as an airport. It enables real-time journey and queue measurement reducing queue times and bottlenecks, aiding improved planning of staffing levels and increased movement into pre-determined areas of users’ choice. It works by capturing an image of people entering a specified zone as they enter the area of interest. Using the captured image people are then identified at pre-determined way-points. The length of time it takes a person to get from one way point to another is calculated providing an average journey time for all passengers. The real-time data is reflected on a user friendly interface enabling authorized personnel to continuously monitor and quickly react to prevent bottlenecks.
Speed Capture G3 is the third generation integrated biometric data enrollment system for e-passports, visas, driving licenses, and ID documents. It captures biometric data including face photography, fingerprints, and signature, in an all-digital workflow. Its modular design allows flexibility in configuration and integration of a wide range of input sensors. Full interactivity and self-service mode is possible through the integrated touchscreen and built-in audio hardware support. In a robust production workflow set-up, the biometric data captured by the Speed Capture G3 is securely tied to each applicant with minimal possibilities of external tampering to the data output. The concept of “Live Enrollment” is critical, as any outside data source, e.g. print photos, may have been digitally manipulated. ■ Speed Identity/Sweden ■ Email: info@speed-identity.com
■ HRS Systems/U.K. ■ Email: contact@hrsid.com
54 22
JUN 2013
www.asmag.com
22
INDUSTRY REPORT
56 22
JUN 2013
www.asmag.com
22
Key Findings from the Latest Asian Products:
Advances in Connectivity and Usability Asia manufactures nearly all the products in the world, which makes it the heart of so many industries, particularly security. From April 24 to 26, Secutech 2013 gathered major Asian manufacturers in Taipei for Asia’s most representative security show. The a&s International editorial team got the latest updates on the newest launches and strategies to stay competitive in the global market. BY a&s Editorial dEpartmEnt
A
sian manufacturing has stayed strong, helped by manufacturing hub China, and increased domestic demand in some Asian countries. Taiwan, Korea, and Japan have also retained their edge for quality production. In the past two years, Indian and
Vietnamese manufacturing has grown the most, driven by domestic demand or exports to regional customers in Asia. As Secutech 2013 attracted 25,807 visitors from 100 countries, gathering the most representative manufacturers from Asia, Asian manufacturing is expected to grow in the years to come. Buyers can clearly indentify m a i n s t re a m t e c h n o l o g i e s a n d cost-effective solutions from China, Taiwan, and Korea, which are
22
JUN 2013
capable of mass production. Japan remains a technology leader for video surveillance. The most advanced technologies can be seen from their latest launches. Southeast Asia has a number of up-and-coming manufacturers based in Malaysia, Vietnam, and India. With an increased number of manufacturers, Vietnam or India may one day overtake China. The following are our key findings from this year’s latest offerings.
www.asmag.com
22 57
INDUSTRY REPORT Network Cameras BeCome staNdardized Network cameras have matured greatly in terms of performance and technology. There is relatively less product differentiation between network cameras, resulting from the standardization of key components, for cameras in the same price range. Cameras that feature unique functions include models for extreme lighting environments or cameras embedded with advanced analytics that are becoming more reliable. 1- to 3-megapixel Network Cameras
Companies mostly offer 1.3-megapixel, 2-megapixel, and 3-megapixel network cameras. There are a few with more than 5 megapixels, but these are the exception. This is no surprise, as 1to 3-megapixel cameras are ideal for surveillance purposes, with high performance in live viewing and recording. Network cameras with more than 5-megapixel resolutions are suitable for niche applications, such as 360-degree surveillance, mission-critical environments, optimizing performance in LPR, facial recognition, and other video analysis functions that need added detail.
virtually any situation, Panasonic is especially interested in opportunities in PoS, access control integration, US health care, public sectors in Europe, and retail chain stores worldwide. The latest network cameras with advanced technologies and features such as face detection, H.264 high-profile compression, digital slip rings, coatings, shock absorbers, and dehumidification on our PTZ cameras allow users to see things not only clearer but also from a smarter perspective. The face search feature offers accurate visitor analysis in term of gender, age, and visitor numbers so that nationwide chain stores can better improve their marketing and operations,” said Tohru Takahashi, Staff Engineer of China/SI Team at Global Solution Group of Panasonic System Networks.
Huperlab highlighted its 2D and 3D video analytics. All cameras, including HD-SDI, analog, and network models, can use 2D video analytics. Huperlab demonstrated flame and smoke detection with 3D video analytics, designed for oil, gas, and industrial applications, said Kelly Lin, Marketing Specialist at Huperlab. Thermal imaging cameras with video analytics are seeing more interest because of their high accuracy with fewer false alarms, as seen in the latest offerings from Dali Technology, according to Shengyue Xue, Sales Director, Dali Technology. true wdr aNd low-light
performaNCe BeCome
differeNtiators
The wide dynamic range (WDR) industry standard for network cameras
▲ Riki Nishimura, GM, Visual Security
▲ Lida Hsu, Manager, Sales Division,
▲ Steve Ma, Executive VP, VIVOTEK
▲ Water Hsieh, Special Assistant, the
▲ Martin Chen, CCO, Oplink
▲ Tom Shih, Senior Director, Planet
Solutions Division, Professional Solutions Company, a Division Company, APAC, Sony Electronics
Brickcom
Network Cameras with VCa BeCome CommoN
Most high-end cameras are now embedded with basic video analytics, such as motion detection, tampering, trip-wire detection, and facial recognition. The standardization of analytics has become more obvious this year. Panasonic System Networks highlighted its network and hybrid systems.“Having cameras for 58 22
JUN 2013
President’s Office, Pixord
www.asmag.com
22
Technology
▲ Samuel Lin, Sales Director, Hi Sharp
▲ Randy Hong, Manager, Micro Digital
spans between 70-90 decibel (dB). However, the best WDR performance still depends on the noise reduction algorithms on each camera. Sony’s latest cameras boast the best 130 dB WDR range, noise reduction, and light sensitivity, making Sony top in the industry. “We just launched our sixthgeneration (G6) cameras delivering high sensitivity with true WDR and high frame rates of 60 frames per second,” said Riki Nishimura, GM of Visual Security Solutions Division at Professional Solutions Company, a Division Company of APAC Sony Electronics. “They are good for extreme lighting conditions, such as bright reception areas in banks or entrances to underground car parks, along with places where real-time viewing is a must, such as casinos." “Our technology to achieve high picture quality is a very important advantage along with service and organization. We are trying to convey this clear and total value to distributors, and even to system integrators, installers, and end users via education,” said Nishimura. The trend of high performance in WDR and low-light imaging can be seen in the latest component solutions from Sony, Texas Instruments, and Hisilicon. “At Secutech Taipei 2013, Hisilicon highlighted its latest SoC for HD surveillance both for network and
▲ Vanne Lin, VP, iCatch
HD-SDI solutions. The WDR feature and low-light performance have been enhanced with Hisilicon’s latest SoC. Hisilicon also collaborated with Zuken Elmic launching chips to fully support ONVIF interoperability,” said Felix Fu, Project Manager of Digital Media Marketing Department at Hisilcon. 360-degree Cameras with traCkiNg
Fisheye or 360-degree cameras are a relatively new offering, as lenses and dewarping technology mature. According to Brickcom, there are more buyers interested in 360-degree cameras this year. More solutions integrate PTZ tracking with both fisheye cameras and speed domes to achieve wide-area surveillance. VIVOTEK and several Korean companies, such as EOC and Young Kook, are currently producing such offerings.
diY aNd home seCuritY produCts Home security is growing rapidly i n t h e U . S . a n d E u ro p e . M o re cost-effective products for residential applications are available from Asian manufacturers. DynaColor started promoting its latest home surveillance products this year. Pixord 22
JUN 2013
announced the world's first fisheye network camera for home surveillance. According to Water Hsieh, Special Assistant for the President’s Office at Pixord, users can use their smartphones to access home video that covers a vast area with no blind spots. The camera is also designed with a built-in PIR motion detection sensor so that when people pass by or an emergency happens in specified areas, the fisheye camera will detect the event and start recording automatically. Seeing the high growth of smart device-and-cloud service collaboration, Oplink highlighted its total home-monitoring solution, alarmmonitoring packages, and mobile app at Secutech Taipei 2013. “The wireless surveillance and alarm service is our first vertical end-to-end solution. Unlike those offered by alarm monitoring companies, our package is not bundled with minimum contract terms, which is literally no-stringsattached. Our package includes features such as real-time multi location video monitoring, audio/ video event recording, and multiple simultaneous broadband alerts,” said Martin Chen, CCO of Oplink.
ip oVer Coax To extend the transmission distance of network cameras over coaxial cables and solve the problem of power supply, peripherals such as IP over coaxial cable extenders and Power over Ethernet switches are delivering much-needed solutions. Planet Technology’s Ethernet-overcoaxial extenders use a modular EIA/TIA 568 RJ-45 connector that supports CAT-5/5e or above wiring for distances up to 100 meters. On
www.asmag.com
22 59
KOREA KOREA UPDATE UPDATE
Korean Companies Join Development
IP Video
Korean companies are usually known for their quality design of analog and HD-SDI products. However, there are some Korean companies, mostly new to the market, who are taking a different approach, focusing more on IP video surveillance development, and actively seeking potential markets with their own brand names. Facing the changeable economic conditions in worldwide markets, these companies stay flexible and creative to create high-quality, unique products for some niche markets. Unafraid of the competition with Taiwan and China, these companies believe with clear positioning in the market, the security industry still provides many opportunities for different players. In the following, a&s interviewed some companies who are focusing on IP video products or components to talk about how they are trying to penetrate the competitive market. BY JILL LAI
68 22
JUN 2013
www.asmag.com
22
Vertical Market
74 22
APR 2013 MAY 2013
www.asmag.com
22
Airtight Security Secures
Luxury Goods Luxury retail is more than top-tier merchandise; it is also about top-tier customer service and unbeatable security to protect both the valuable assets and VIPs. This feature examines security products for luxury retail market, which secure the valuable assets, improve store management, and enhance customer satisfaction, without compromising the luxury brand’s image and reputation. By AlyssA FAnn
R
etailers are price sensitive when it comes to security budgets and luxury retailers are no different. Luxury retailers, however, have larger budgets and the much higher value of their merchandise serves as a motivation for security system investments. Nicholas Yap, Operations Manager of Hong Kong, Taiwan & South China at ICD Security differentiates retailers into two categories, “High street retailers tend to be more budget conscious and comparatively less concerned over the latest technology and features as long as the system performs its duty and complies with insurance policies. The luxury retailers, on the other hand, are comparatively more serious about security and are willing to invest more on advanced technologies. They are also more likely to appreciate how the latest security technology can enhance overall store performances, as well as business revenue.” “Each surveillance project is unique with many factors that must be taken into consideration. Luxury
22
APR 2013 JUN
retailers need to determine their businesses’ areas of risk and what they need their surveillance solution to deliver. They can then work with a skilled representative to design the best system possible to suit their needs,” said Robin Hughes, Business Development Director for the UK & Ireland at Avigilon. Va l u a b l e m e r c h a n d i s e i s a n a t t r a c t i v e t a rg e t f o r c r i m i n a l activities at all stages of the supply chain. Hence, for luxury retailers in particular, security needs to begin at the manufacturing stage, such as the tagging of items to ensure its security and authenticity. The next security level is at the warehouse and transportation process, where safe transit is paramount to the survival of the industry. Finally, at the shop floor, security remains crucial, but effective, yet discreet security becomes the philosophy. In other words, foolproof security is required at all stages of the supply chain for the luxury retail market sector. Moreover, due to the high value of the merchandise involved, understanding insurance policies
www.asmag.com
22 75
Market Update
Key Verticals Drive Positive Growth in the U.S.
The outlook for growth in the US security market for the next six to 12 months is extremely positive for video surveillance, access control, and home automation. Education, retail, health care, oil and gas, and residential segments all have great demand for higher resolution, easy-to-use, cost-effective, and highly scalable and manageable solutions. By The ediTorial Team (WiTh reporTing by John Shi)
A
merican annual investments in homeland security and public security products and services are expected to increase from US$51 billion in 2012 to $55 billion in 2013, according to Homeland Security Research. It is forecast to reach $81 billion by 2020. Overall, the US market is still growing. Two important factors contribute to this positive growth. First, the industry continues to deliver more effective systems at low prices, which benefits clients with a high return on investment. Second, technological advances and better performance drive demand for upgrades of legacy systems. IP networks grew rapidly in 2012 and will continue for a long and strong run. While the economy along with the 2012 election affected security, as many projects were on hold,
84 22
JUN 2013 2013
2013 will be a bumper year due to the continued transition from analog to digital and high demand for HD video. The following are key verticals driving growth in the US security market. Some companies recognize their potential and provide more applicationspecific solutions.
Top of The pyramid
While security faces budget cuts every year, the high-end market is still driven by new offerings with business benefits. More companies are offering solutions not only designed for security but also increased operational efficiency to help the customer’s bottom line. “When a security director has something happen, they
www.asmag.com
22
22
JUN 2013 2013
www.asmag.com
22 85
Market Update
Innovative Technologies Bring New Opportunities The US market continues its demand for solid solutions. As demand for IP and open solutions has grown, so have business opportunities for making life easier for users and integrators.
By The ediTorial Team (WiTh reporTing by John Shi)
F
or years, analog surveillance, access control, and thermal video solutions used to be fairly standard and straightforward in security. They were plug-and-play or mainly used for perimeter surveillance. However, an evolution is underway as more flexible and cost-effective products or solutions are launched. These innovations in access control, thermal imaging, and multichannel long-distance coaxial cameras allow broader implementations, which equal more opportunities in the industry.
Access control Beyond doors
Of all the security product segments in the U.S., electronic access control is expected to grow at the fastest rate, increasing 9 percent annually to US$5.6 billion in 2016, according to a report by The Freedonia Group. IP technology converges logical and physical security in access control, enabling users to integrate multiple thirdparty products — from wireless locks, asset tracking to iris recognition authentication. IdentIty mAnAgement
The first direct benefit IP brings to access control is better identity management. As access control is brought online with other security devices, it also opens “doors” for the technology to be utilized in a number of different and more efficient ways. “The concept of identity management has had a big impact on the way that people look at physical access,” said Mark Allen, VP of Technology at Identive Group. “For instance, in many organizations, when a new employee is entered into the HR database, they now not only have access to the correct computer systems, but also the areas of a building that they need to gain entry to. Identity management is changing the way companies implement access control management. In the past, as many companies grew
90 22
JUN 2013
www.asmag.com
through mergers and acquisitions, they would end up with multiple, disparate access control systems across the enterprise. This is not only ineffective for the site-tosite access management, but it also creates headaches for employees who work in multiple locations.” WIreless locks reAch more ApplIcAtIons
Continued economic uncertainty has contributed to budget cuts in some public and private sectors. To cope with this, a number of access control providers are creating new product lines and targeting specific customers. “Systems like data on a card, wireless locks
22
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
25
ARECONT VISION
CAMERA
USA
info@arecontvision.com
15
AXIS COMMUNICATIONS AB
NETWORK VIDEO SOLUTIONS
SWEDEN
contact-sap@axis.com
INSIDE FRONT COVER, 1
CNB TECHNOLOGY INC.
CCTV
KOREA
korea@cnbtec.com
3
COMART SYSTEM CO., LTD.
DVR
KOREA
sales@comartsystem.com
37
CONVEX CO., LTD.
SURVEILLANCE
KOREA
sales@conves2000.com
BARN DOOR, 13
DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
8
DYNACOLOR INC.
IP CAMERA /NVR
TAIWAN
info@dynacolor.com.tw
53
FUHO TECHNOLOGY CO., LTD.
CAMERA/DVR
TAIWAN
exp_sales@fuho.com.tw
63
FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.
DOME COVER
CHINA
sales@fjsmt.com
9
GKB SECURITY CORPORATION
CAMERA / DVR / IP CAMERA
TAIWAN
sales@gkbsecurity.com
7
HDPRO CO., LTD.
CCTV
KOREA
sales@hdprocctv.com
BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO. LTD.
DVR
CHINA
overseasbusiness@hikvision.com
10
ICATCH INC.
DVR
TAIWAN
marketing@icatchinc.com
45
INDIGO VISION
SURVEILLANCE
UNITED KINGDOM sales@indigovision.com
FRONT COVER
MERIT LILIN ENT CO., LTD.
IP CAMERA / NVR
TAIWAN
sales@meritlilin.com
31
MICRO DIGITAL INC.
CAMERA / IP CAMERA / HD-SDI CAMERA / DVR
KOREA
sales@microdigital.co.kr
112
MINTRON ENTERPRISE CO., LTD.
CAMERA
TAIWAN
service@mintron.com.tw
63
OB TELECOM ELECTRONICS CO., LTD.
FIBER OPTIC TRANSCEIVER
CHINA
overseas@obtelecom.com
INSIDE BACK COVER
PANASONIC SYSTEM NETWORKS CO., LTD.
DIGITAL SURVEILLANCE
JAPAN
---
5
PINETRON CO., LTD.
DVR
KOREA
sales@pinetron.com
47
POWERTECH ELECTRONICS CO., LTD.
CCTV
KOREA
powercctv@powert.net
4
RIFATRON CO., LTD.
DVR
KOREA
contact@rifatron.com
49
SHENZHEN COMMANDER TECHNOLOGY CO., LTD
CASING
CHINA
sjw@yjdcase.com
33
SHENZHEN TVT DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@tvt.net.cn
12
T.O.M. TECHNOLOGY INC.
DVR
KOREA
export@tomtech.co.kr
27
TAMRON CO., LTD.
CAMERA
JAPAN
newbiz@tamron.co.jp
51
THREE BRAIN TECHNOLOGY
CCTV
KOREA
younglee@tbtcctv.com
21
TRUEN CO., LTD.
CAMERA
KOREA
sales@truen.co.kr
6
TYCO SECURITY PRODUCTS
SURVEILLANCE
UNITED KINGDOM emeasales@tycoint.com
19
VIVOTEK INC.
IP CAMERA/SOFTWARE/VIDEO SERVER TAIWAN
sales@vivotek.com
2
WEBGATE INC.
DVR
KOREA
support@webgateinc.com
ACCESS CONTROL PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
23
FINGERTEC WORLDWIDE SDN BHD
FINGERPRINT
MALAYSIA
info@fingertec.com
89
GIGA-TMS INC.
RFID MODULE / LOCK / READER
TAIWAN
promag@gigatms.com.tw
11
SAMSUNG SNS CO., LTD.
HOME NETWORKING
KOREA
sales.ezon@samsung.com
17
SUPREMA INC.
FINGERPRINT
KOREA
sales@supremainc.com
55
ZKTECO INC.
BIOMETRIC, ATTENDANCE
CHINA
sales@zkteco.com
ADVERTISER
MAJOR ITEM
COUNTRY
PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
39
HT INC.
SEMICONDUCTOR
KOREA
sjkang@ht-ics.com
93
RAYCOM CO., LTD
TRANSCEIVER
CHINA
zhengxf@raycom.com.cn
32
SEAGATE TECHNOLOGY LLC
STORAGE
SIGNAPORE
sales@seagate.com
28, 29
SONY CORPORATION DSBG. SYSTEM LSI DIVISION
SEMICONDUCTOR
JAPAN
95
UNITECHNO CORPORATION
HOUSING
TAIWAN
INTRUSION ALARM PAGE NO.
OTHER
info@unitechno-cctv.com.tw
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.