a&s international jun 2014(trial version)

Page 1


CONTENTS

June 2014

Industry Report

How P.38

and

“Internet of Things” Revolutionize the Security Industry Vertical Market

P.72

1422

Lights, Cameras, ENERGY! Energy Management is the New Trend

JUN 2014

Intelligent Video Solution

P.48

Counting on Intelligence: Retail Wises Up

www.asmag.com

22


CONTENTS

June 2014

Product Exploration

Beyond Opening Doors:

Access Control Management Rules P.50

Access Control Management Empowers Verticals

Special Feature

P.58

News Feature P.32

How Much Does Cost Reduction Really Cost You?

Smart TVs Open Up New Opportunities for Video Surveillance

P.68

Viewpoint P.34

Why Data Protection in Physical Security Matters

SMAHome P.78

All-in-One Features Taking Home Automation to New Levels

P.14 Contents P.18 Editor’s Note P.20 Corporate News

1622

Company Spotlight

JUN 2014

P.82

Dahua Draws Road Map to be Global Leader

P.26 Products of the Month P.86 Show Calendar P.88 New Products

www.asmag.com

P.101 Companies in This Issue

22


EDITOR'S NOTE a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, system integrators and other product purchasers on product sources and identifies developments in CCTV, Digital Surveillance, Access Control,

Beyond Security, What Else Can You Offer? In the security field, we usually talk about how the latest technological development makes security equipment become more reliable and effective in providing forensic evidence, and further protect everyone in the world. In fact, technologies usually evolve according to the latest criminal techniques or the recent major security events, such as the shooting at the University of California Santa Barbara or terrorist attacks. I have to say, whenever something bad happens, it often brings business to security. Will security business always have to count on something bad? Thanks to the trends of “Big Data” and “Internet of Things,” and technologies such as intelligent video and different types of situational awareness or management systems, security equipment has finally found its extra values for other purposes. Just like what Milestone Systems said in an article — “The focus of video surveillance innovations have evolved from video functionality, to video integration, and now to video enabling. By enabling processes with video, the open platform fosters many innovations to optimize business operations in different verticals.” Over the years, we do feel that the purpose of “being secured and safe” has become a basic need for people to want from security products. Beyond security, what else can we, as security professionals, offer? According to the increasing demand from the aforementioned technologies, I feel like the users, especially in North America, have started to become aware of the extra benefits of security equipment. In the future, we can probably predict that the markets in Europe, the Middle East, and then APAC will be able to catch up to these new trends. After all, we are happy to see the security market is still quite active and full of business potential because of the new demand or, at least, something positive!

Biometrics, Intrusion Alarm, Intercom/Video Doorphone, Home Automation and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄 Parson Lee Publisher & Managing Director Joseph Lee General Manager John Shi General Manager Editorial General Press Jill Lai Editor in Chief Alf Chang Senior Consultant Reporter Eifeh Strom Reporter Steve Chin William Pao Reporter Weiting Chen Coordinator

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com steve.chin@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com weiting.chen@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Circulation & Subscription

Collins Yuan Michelle Shih

Group Manager Coordinator

collins.yuan@newera.messefrankfurt.com michelle.shih@newera.messefrankfurt.com

Corporate Management

Veronica Chen Sandra Chen Thomas Pin Chihung Lee

Group Manager Project Manager Account Manager IT Manager

veronica.chen@newera.messefrankfurt.com sandra.chen@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

asmag.com

Veronica Chen

Group Manager

veronica.chen@newera.messefrankfurt.com

Secutech & Events (Overseas)

Echo Lin Eva Tsai

Trade Fair Manager Project Manager

echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com

Secutech & Events (Domestic)

Peggy Wu Trade Fair Manager Sandra Chen Project Manager

peggy.wu@newera.messefrankfurt.com sandra.chen@newera.messefrankfurt.com

International Advertising [Headquarters]

Juihui Lin Kay Yang Audrey Fang Alex Pai

Manager Operation Officer Coordinator Coordinator

juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com alex.pai@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Y. C. Suh Takashi Komori Nguyen Thu Ha

USA/Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India China Korea Japan Vietnam

bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn

Messe Frankfurt New Era Business Media Ltd.

Jill Lai

jill.lai@newera.messefrankfurt.com

Taiwan Branch: 2F, No. 8, Lane 360, Sec. 1, Nei-Hu Rd.,Taipei 114, Taiwan Phone/886 2 2659 9080 Fax/886 2 2659 9069 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, Web sites, events and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2014 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

1822

JUN 2014

www.asmag.com

22


Corporate News

IHS: Middle East and Africa Expect a CAGR of 14.8 Percent in Access Control Market The EMEA region continued to make strides toward recovery in 2013 and is expected to see moderate growth from 2014 through 2015 for traditional electronic access control. For traditional access control, IHS has estimated growth of about 3.1 percent in 2014. When including electronic locks such as mechatronic, digital cylinder, and electromechanical, IHS estimated a growth of about 7.4 percent in 2014. According to IHS’ 2014 report on access control, the Middle East and Africa regions are forecast to be worth about US$180 million in 2014, with a combined CAGR of about 15 percent from 2013 through 2018. The Middle East and Africa regions are expected to be great markets for growth over the next two to three years. Wireless locks, IP-enabled devices, and iris recognition readers will be at the forefront of product requests. Training and educating not only integrators, installers, and distributors but also end users is critical to success.

IndigoVision Provides Solution to Photovoltaic Power Station in Ningxia One of the world’s largest photovoltaic power stations, Ningxia Zhongwei Tianjingshan, has chosen to deploy four of IndigoVision’s NVRs and a total of 80 encoders as part of their new security system. IndigoVision’s solution was chosen for its advanced H.264 compression technology, which allows the power station to transmit footage to a remote control room at ultra-low bandwidth. Another important factor was the solution’s scalability. The site has already set the record for the fastest construction of a photovoltaic power station; therefore, having a system that could expand to keep up with the rapid growth was vital.

KBC and SA Consulting Announce New Partnership KBC Networks and Sweden-based security solutions provider SA Consulting have announced a new partnership. In addition to supplying KBC’s IP, wireless, fiber, and HD video ranges, SA Consulting will provide sales, design, and technical support to customers within the Nordic countries. MD of SA Consulting Tomas Styrbjörn commented, “When customers come to us, they expect to be provided with secure solutions that have considered each media and transmission type. Our partnership allows us to work more closely with KBC and pass the benefits of doing so on to our customers.” Sarah Moss, Commercial Director of KBC Networks, added, “Our customers need to know that as well as support from us, they have access to in-region support from a team that has technical expertise, extensive market knowledge, and a collaborative relationship with us.”

2022

JUN 2014

CEM Systems Secures Power Plant in Oman CEM Systems, part of the security products business unit of Tyco, announced that their industry security management system has been installed in the Sur Independent Power Plant (IPP), Oman. The system was installed by CEM-approved reseller Majees Technical Services. The gas and oil-fired IPP will be the largest power plant in Oman, representing approximately 30 percent of Oman’s installed power capacity when it is completed in 2014. The US$1.6 billion project owned by Phoenix Power Company will provide much needed power to meet the growing demand for electricity by employing state-of-the-art technology and introducing high efficiency conversion technology. The system provides the IPP with a suite of client- and browser-based applications including central alarm monitoring, integrated command and control, sophisticated ID badging, visitor management, time and attendance, and much more.

www.asmag.com

22


Corporate News

ADT Acquires Protectron to Expand in Canadian Market The ADT Corporation announced it has executed a definitive agreement to acquire Reliance Protectron, a subsidiary of Reliance Comfort Limited Partnership, a portfolio company of investment funds managed by Alinda Capital Partners, for a total cash consideration of approximately US$500 million. The acquisition of Protectron will strengthen ADT’s Canadian operations and create a combined security industry leader in Canada, differentiated by its ability to reach consumers and provide them with better services and more choices across a variety of traditional security and automation technologies. Protectron is a provider of monitored security services in Canada. The acquisition brings ADT 400,000 residential and commercial customers including 31,000 contract monitoring accounts, and approximately $11million in associated recurring monthly revenue. Protectron will continue to be headquartered in Montreal under ADT’s ownership. It enjoys strong brand awareness, and ADT will continue using the Protectron name. As ADT strengthens its Canadian focus, the Company will relocate certain administrative functions that are now being run out of the U.S. to Canada.

Magal Awarded US$6.4M Contract to Secure International Airport in Kenya

Aimetis Strengthens Moroccan Casino Surveillance System

Magal Security Systems announced that it entered into a US$6.4 million turnkey contract with the Kenyan Airport Authority (KAA) to secure critical areas in Jomo Kenyatta International Airport, Nairobi, Kenya. The project includes multiple surveillance and access control technologies, integrated by Fortis4G — an advanced physical security information management (PSIM) system. The project is expected to be completed in the first half of 2015.

Johnson Controls Connects Stadium Technologies for World Soccer Championship in Brazil Johnson Controls is creating safe stadiums for fans and players who will compete at the upcoming World Cup in Brazil. Johnson Controls designed, installed, and integrated dozens of systems, including surveillance cameras, fire alarms, access control, telecommunications, and sound and building management controls. The security and fire systems activate surveillance cameras, crowd notifications, airflow shutdown, and gate access if an emergency situation occurs. These systems also work together to improve fans’ experience. The sound and telecommunications systems are connected to a new 100-square meter LED screen to help fans see and hear the action on the field. Johnson Controls joined individual systems into a single networking solution. This single solution helps stadium owners save critical resources by eliminating the need to manage multiple, duplicate, or discrete systems under various vendors, contracts, and proprietary protocols in the constantly-evolving technology marketplace. More than 600,000 tourists and 3 million Brazilians are expected to attend the matches in Brazil. The games will be broadcast to more than 200 countries on nearly 250 television channels.

2222

JUN 2014

Current analog cameras could not perform to the standard that a Moroccan casino was required to achieve. The need to cover all 17 of the Atlantic Palace gaming tables in Morocco at high frame rates throughout operational hours would produce enormous RAID demands. The casino required dome units that could optimize storage requirements by utilizing H.264 dual stream real-time compression, as well as a platform that could support multi-screen preview and playback, as a high-definition preview is crucial in gaming environments. An IP network which could function with minimal transmission delay using IP keyboards was high on the client’s requirements together with smooth pan, tilt, and zoom functionality that was also free of time lag. With all these challenges, Aimetis succssfully delivered a surveillance solution that satisfied the casino’s needs. The system was implemented by a Moroccan integrator. The speed domes being used are feature-rich, and their compact dimensions contribute to covert surveillance for minimal visitor distraction.

www.asmag.com

22


Products of the month

Integrated Access Control & Video Systems Come to Town

AMAG Symmetry Omnicast Plug-in (Integrated with Genetec VMS)

Key Features • Video tagging via commands sent from the Symmetry Command Center • Video tagging for pre- and post-alarms and events • Video search and full playback of tagged video • View live or recorded video from the virtual matrix • View live or recorded video from the interactive graphical maps • Video sequencing and camera tour facility

AMAG Technology’s Symmetry 7.0.1 access control system integrates with Genetec Omnicast 4.8 IP Video Management System (VMS). The Supplier: Symmetry Omnicast AMAG Technology Plug-in enables video rendering on Symmetry URL: SMS clients for live and www.amag.com archive sources, PTZ control of live cameras, event handling, video tagging for VMS alarms and events, and video search and playback control. End users can receive alarms and events generated by the Omnicast 4.8 IP VMS for use within Symmetry via event mapping.

Paxton Net2 Access Control System (Integrated with NUUO VMS)

Key Features • PC-based system • Central control of privileges • Manages hundreds of doors, 10,000 users • Event reporting • Integrates with other building systems

Net2 now integrates with Crystal 2.0 and Mainsconsole 5.0 to offer a complete user Supplier: experience with a range Paxton of sophisticated features. URL: Integration with the www.paxton.co.uk NUUO VMS allows users to link Paxton events directly with surveillance video, define instant actions for each trigger and receive notifications of alarm events as they occur, as well as perform keyword searches across servers. This integration will provide users with a complete operating experience, reaping the benefits of both access control and VMS under a single interface.

2622

JUN 2014

www.asmag.com

22


News Feature

Smart TVs

Open Up New Opportunities for Video Surveillance

n By William Pao

I

n March, Iveda, which specializes in cloud-based video surveillance, announced a partnership deal with a Taiwan smart TV manufacturer to have its solution bundled with the manufacturer’s TV sets. The partnership may very well become a new business model allowing users to operate video surveillance with more ease and convenience. The smart TV manufacturer is unnamed but billed as a major player with the third largest market share in Taiwan, generating

3222

JUN 2014

annual sales of 180,000 units. According to Iveda, its partner was looking for ways to generate more revenue and expand smart TV’s functionality. Targeting security as a means to achieve those objectives, the partner became the first in the industry to include security features in smart TV sets. Under the deal, the TV manufacturer bundles into its products Iveda’s plug-andplay security cameras and its software-asa-service cloud video hosting platform that comes with proprietary video

www.asmag.com

streaming and storage compression technologies, allowing users to handle surveillance as a service for a monthly fee. Recurring incomes for security services represent a new and attractive proposition for TV manufacturers. Smart TVs are next-generation television sets that are hooked directly to the Internet and in many ways transform the user experience. They enable users to do much more than just watch delivered contents; users can also download apps, stream music and videos, play interactive games, and enjoy other features that they normally would not be able to on their traditional TV sets. “TV is no longer a passive appliance in people’s homes. Cloud-based video surveillance is another application that makes smart TVs even smarter,” said David Ly, Chairman and CEO of Iveda. “It is a viable business model because TV manufacturers will continue to seek innovative products and services with true value to their customers, not just for entertainment, but other functionalities such as security.” In Ly’s words, managed video surveillance through smart TVs “will not only become a trend, it will become an

22


end-user expectation” as people gain awareness that such capabilities exist today. “The deal validates that video security does not need to be as complicated as traditional methods make it seem,” he said. With the partnership, Iveda hopes to widen its reach to more users that it couldn’t through traditional means. “The value for offering this type of solution is mass adoption of Iveda’s cloud video surveillance services,” Ly noted. “The opportunity to reach more potential customers who normally would not call a security company for anything … is what Iveda has accomplished here with our partner. So yes, we certainly expect growth and traction.” As for deploying the service in other regions, Ly gave an emphatic yes, saying Iveda is looking for new partnerships in new markets.

22

Iveda Takes Video Surveillance to the Cloud Iveda, founded in 2003 and headquartered in Mesa, U.S., specializes in cloud-based video surveillance, which represents another way of securing homes or other premises through video. With cloud-based video surveillance, also known as managed video as a service (MVaaS) or video surveillance as a service (VSaaS), the video is centrally hosted at a data center and can be accessed via a Web browser. Components that are needed in a traditional installation, such as DVRs, NVRs, and the related software, are no longer needed by users, who just need to log in ▲ David Ly, Chairman and CEO, Iveda and start to manage and control their videos via the PC or other Internet-connected devices. Iveda sees most of its customers in North America, although it has a subsidiary in Taiwan who has built ties with local clients in both public and private sectors.

JUN 2014

www.asmag.com

2233


VIEWPOINT

n By Fei Liu, R&D, Nedap Security Management

Why Data Protection in Physical Security Matters

T

o improve the transparency of data collection and processing, and to give people control over their personal data, the European Commission has proposed a new regulation for data protection — General Data Protection Regulation 2012/0011(COD) (GDPR) — and brought the issue to a new level. The GDPR has defined four roles in order to safeguard data rights: Data Protection Authority (DPA), data controller, data protection officer (DPO), and data processor, as shown in Figure 1. The DPA is the supervisory authority from member states, which monitors the application of the regulation and contributes to its consistent application throughout the European Union (EU). The data controller, DPO, and data processor are active at a company level, performing various data protection tasks. As with most other industries, physical security systems will be

3422

JUN 2014

influenced significantly by this new regulation. They generally collect, record, and process large amounts of personal data, some of which may be very critical and sensitive. For example, a physical security system often records very personal information about a cardholder, such as their name, social security number, employee number, and so on. It may also store a PIN code, fingerprints, and video footage

of the cardholder. If someone else were to use this person’s identity and authentication information, they could access restricted areas that they are unauthorized to enter. Security systems also record cardholders’ access events. So, by studying these events, you can easily trace someone’s behavior pattern. Currently, cardholders are often unaware of the personal data captured

▲ Figure 1: Various functions for data protection in the GDPR.

www.asmag.com

22


in a security system — for example how long it will be stored for, whether it has been stored safely, where the data has been distributed to, and whether it has been processed for other uses. All of the abovementioned doubts can make a cardholder feel insecure about a security system. Currently, security systems are most often viewed as protecting a building’s security, while the protection of cardholders’ personal data is often neglected and can be easily violated. A system administrator, for example, usually has the right to view logged events from all cardholders on the request of a criminal investigation. Such a right can be abused, however, by browsing the information with other purposes or even just for fun. This is a very typical case of data breach. The security of buildings and cardholder information are both very important, and should be protected. One should not conflict with the other; a well-designed system should be able to achieve a win-win situation for both.

How to Secure Security Systems There must certainly be an increased focus on information security to improve data protection in physical security systems. Data protection should be an integral part of physical identity and access management (PIAM) and physical security information management (PSIM), and the GDPR has provided a nice guideline. In general, a well-designed physical system should: • Include data protection and data security in the design phase. This means applying various technologies to perform database security, identity and access management, network connection security, secure data

22

▲ Fei Liu, R&D, Nedap Security Management

processing, and link authentication. • Ensure data subjects’ rights. It should provide full functionality to enable data subjects (for example cardholders) to access, obtain, edit, and erase their data. • Assist data controllers and DPOs in performing their tasks. In particular, the system should be able to: - Provide a platform to manage

and act on requests from data subjects and the supervisory authority. - Help data controllers and DPOs to define security policies and monitor data processing. - Monitor and report on data protection breaches, and perform specific tasks under the direction of data controllers and DPOs. Anyone installing a physical security system should consider the following aspects regarding data when they deploy the system. • The categories and retention time of personal data held in the system, and the reasons for collecting and processing this data. • What defines a data breach in the system. • The relationship between data held and relevant laws and regulations. • The relationship between data held and services provided. • How access and identity management can protect personal data in the system. • Establishing varying levels of access rights to the data in the system.

le rs peop mpowe e R P . he GD al data a(2), t n 0 o 1 s r e e l p c ti ily ir PR Ar nd eas trol the D a n r G o a c o e t l o t r fc ht ding is or he h ision o the rig v f o o h “Accor r t i p g e w ) cessin alia, th ubjects f their the pro g e, inter n (data s d i d u l asure o r r c a e n g i e d r s n t a ight on igh g, the r ication ormati f f n i Such r i t l n c i i e f e r o l b t to pr ccess, standa hority ht of a of objec g t i under r h e g i on aut h r i t t , e c a h e t t t o a , r ion p ta al d t data pensat ain da t n person m b e o t o e c o p t o t t right n. the com he righ as the peratio t with l o data, t l n e i g a w l n i p s a process e a com dings e data lawful to lodg l procee n a u g rge. Th e l a n a h g c n f m i o o r r e b na sed fre lting f t withi and to i c u c s r je e e b r x u e s s mage eral be e data and da in gen rom th l f l s a t h s s e iu ights to requ - Fei L Such r spond e r l l a ller sh f time.” contro eriod o p e l b a reason JUN 2014

www.asmag.com

2235


Industry Report

How

B

ig data is a buzz word. Many industries have tried to reply by analyzing big data to make good predictions on everything ranging from weather forecasts to decision making in different forms and subjects. However, why has the security industry also become so fascinated by “big data?� The reason could be traced back to the 2013 Boston Marathon Bombing investigation. The United States successfully crowdsourced information from social media, like Twitter and Facebook, and multiple video surveillance cameras to quickly identify and locate the criminals. This lesson opened the eyes of the whole world to learn the power of using mass data provided by the public, and more importantly, the different resources from security systems.

3822

JUN 2014

and Revolutionize However, many experts also pointed out current security systems do not provide much information before an event even though they are connected to an IP network. Therefore, the industry has been trying to figure out how to make security equipment get involved in pre-event management and also play an active role in preventing crimes or disasters, instead of merely acting as a tool for post-event investigation. Of course,

www.asmag.com

first of all, networkability is definitely a must in security devices, then, each device must be connected, like multiple sensors, to provide data. Then, there is intelligent video (or VCA), which is getting more important since it helps to make security information meaningful. By using intelligent video, security systems can produce loss prevention data or heat maps for retailers. Whenever the video security systems are connected

22


“Big data” and the “Internet of Things” (IoT) now are not only discussed in the IT and communications industries, but they are also ready to influence and even upturn the security industry. While we anticipate a connected society, the world is also vulnerable to malicious physical and cyber security attacks. Fortunately, security technologies have evolved and developed to prevent any disasters from happening.

1

2

7 1 2 3 4 5

3

8

4

9

Masa Karahashi, Senior VP, Engineering, 3VR April Daltron-Noblitt, Director of Vertical Marketing, Allegion Lee Odess, VP of Marketing at Brivo Systems and GM of Brivo Labs Scott Schafer, Executive VP of Sales, Marketing, and Service, Arecont Vision Andy Teich, President and CEO, FLIR Systems

6 7 8

5

6

10

Andrew Elvish, VP of Marketing and Communication, Genetec Courtney Mamuscia, Global Communications Director, Verint Video & Situation Intelligence Solutions, Verint Systems Craig Dahlman, Director-Analog Video Products of Video Line of Business, Pelco by Schneider Electric

11

Karl Erik Traberg, Head of Corporate Communications and Business Development, Milestone Systems Jeremy Hyatt, Director of Global Public Relations, HID Global 11 Bill Spence, VP of Sales, North America, Europe and Australia, Lumidigm 9

10

n By JILL LAI

“Internet of Things” the Security Industry with “external” WiFi-enabled tracking devices, the shop can better prevent perspective shoplifters and plan their marketing campaigns. Secondarily, it needs a proactive situational awareness tool, something like physical security information management software (PSIM), to seamlessly integrate different security and non-security equipment and further provide an immediate response to events.

22

In addition, through cloud computing, all the data is processed in the cloud; therefore, people are starting to wonder who is able to access this data and how to protect the integrity of the data. In the physical security world, we may also care about who is in my space and where these visitors are going and what they are doing. Therefore, identity management may play a vital role in the trend of big data.

JUN 2014

To sum up, when the world starts to look into “big data” and how IoT can benefit everyone, the trend forces the security industry to gradually switch their attention to data and content beyond product specifications to better fit the needs of a connected world. Major technologies providers have started to add more value to security information/ content with their unique approaches.

www.asmag.com

2239


Intelligent Video Solution Solutions

Counting on Intelligence:

Retail Wises Up October 2013, shrinkage due to shoplifting, employee fraud/ theft, etc., cost the global retail market $112 billion in 2012. That is where intelligent solutions come in. Where old security systems failed to prevent shrinkage and optimize marketing strategies, intelligent solutions are picking up the slack and proving their worth.

n By EIFEH STROM

I

n 2012 the aggregate retail revenue of the world’s top 250 retailers amounted to approximately US$4.3 trillion, a composite year-over-year revenue growth rate of 4.9 percent, according to the Global Powers of Retailing 2014 report by Deloitte Touche Tohmatsu. Although economic conditions that year were a bit rough, leading retailers across the globe continued to grow. However, with growth comes the desire to not just sustain it, but capitalize on it. The benefits of intelligent solutions in the retail sphere are helping global retailers do just that. As more and more retailers are starting to realize the benefits not only for security, but for marketing, efficiency, and management as well, the number of retailers adopting intelligent solutions such as “smart” cameras is growing. In fact, the global intelligent video surveillance market in the retail industry is forecast to grow at a CAGR of 27.1 percent over the period of 2012 to 2016, according to an October 2013 report by Infiniti Research. This increase in retail adoption of analytics is also obvious in the number of security providers coming out with retail-targeted analytics solutions. Sales and return on investment (ROI) have become increasingly important for brick-and-mortar retailers who are now competing with the convenience of online shopping thanks to the Internet. In an age where the click of a button can deliver anything ranging from clothing to furniture to groceries on one’s doorstep, brick-and-mortar retailers are even more conscious of the importance of good marketing, loss prevention, and operational efficiency to name a few. According to the Global Retail Theft Barometer published in

4822

JUN 2014

Benefiting From Intelligence The retail market is not known to have a lot of extra money laying around to throw at fancy technology; however, as the price for intelligent solutions come down, some retailers are realizing the investment is worth the price tag. While retailers in the more high-end luxury market are more likely to be able to afford such intelligent solutions, those in the middle market looking to boost sales are also starting to look towards intelligence. Furthermore, not every intelligent system is created equal. Different stores need different functions, and since the price often depends on the features needed, it is possibly for mid-end retailers to find intelligent solutions that fit their budgetary scope. Retailers in the middle range not needing as many or as advanced functions may opt for a more cost-effective solution comprised of a NVR and camera with only basic intelligent features. This solution gives the retailers some of the benefits of intelligence without breaking the bank. Regardless of the degree of intelligence a retailer chooses to deploy, the ability to improve space optimization, stock monitoring, shop floor tracking, shopper behavior, bottlenecks, queue lengths, staffing levels, etc., are just some of the benefits retailers can expect from an intelligent video solution. With a wide range of features, video content analysis (VCA) software, also known as video analytics, has much to offer retailers in terms of business intelligence (BI). Whether on the edge or integrated into a video management system (VMS), the BI data gathered from VCA features such as face recognition, heat mapping, people counting, and dwell time provide businesses with immediate ROI. But how does it do this? The Beginner’s Guide to Video Business Intelligence by 3xLOGIC puts it this way, “Technologies that aggregate the vast amount of disparate data — video data, transactional data, structured

www.asmag.com

22


and unstructured data — that is generated today, and distils that data into relevant business intelligence that can be easily understood and acted upon; that’s video business intelligence.” The idea of actionable intelligence, turning video data into more than just images on a screen, giving that data value, that is how analytics transforms a retailer’s security camera system into more than just video surveillance.

Case Study: Analytics Optimizes Croatian Retailer’s Marketing While the benefits of analytics is easy to talk about, actually seeing it might be harder; however, Croatian retailer Pevec not only saw the benefits, they utilized and made the most of it. As a retail chain store, Pevec has always taken security seriously, installing video surveillance cameras in each of their 13 stores since their opening. Having heard of the benefits analytics could add to their marketing, Pevec installed a number of RIVA cameras with onboard analytics. The intelligent cameras would not only extend the retailer’s existing security system, the onboard people-counting filter would count customers, which would help the marketing department optimize marketing activities and plan sales space. The built-in people-counting filter provided the retailer with important and invaluable data. By counting the number of customers, the marketing department was able to determine the number of visitors during a promotion period and whether the number of customers increased, which if it did was considered short-term success. This success could then be measured in long-term success by seeing if after the promotion ended, whether those acquired customers continued to return to the store. People-counting data also helped the retailer determine how many of the customers entering were actually making purchases, which was done by comparing the data with the cash desk data. With the data, the marketing department was able to deduce the effectiveness of their marketing strategy. If the majority of customers do not turn into buyers, this indicates that the product range, product presentation, and/or product placement needs to be changed. If the number of customers drops but the majority are buyers, this indicates that the company should pursue more marketing activities. Also, comparing the peoplecounting data of the different stores within the chain gave the retailer better insight into the strengths and weaknesses of each of its branches.

22

JUN 2014

In addition to marketing optimization, people-counting data also helped the retailer increase operational efficiency. By analyzing data for customer traffic during specific times — daytime, weekends, holidays, seasonal periods, etc. — Pevec was able to better utilize their manpower by adjusting the number of employees on staff according to customer traffic. The use of real-time data also helped the stores manage queue lengths and diffuse bottlenecks during peak hours.

Graduating to Smarter Operations Although price remains a deciding factor for many retailers regarding the feasibility of deploying an intelligent solution, the price of such solutions is going down, meaning soon enough price will no longer be a viable excuse. Combine declining prices with the obvious ROI provided by analytics in terms of business intelligence and it seems that intelligence should be able to find a comfortable home in the retail area sometime in the future.

www.asmag.com

2249


Product Exploration

Beyond Opening Doors:

Access Control Management Rules n By William Pao

5022

JUN 2014

www.asmag.com

22


A

Efficiency and cost reduction can be provided in a variety of ways through access control solutions.

ccess control remains a major segment of the physical security market and is set to enjoy continued growth. In a recently study, IHS Technology predicted that the global market size for electronic access control will top US$3.5 billion this year, driven by returning growth in the Americas, the Middle East, and Africa. High demand for access control has created opportunities for new products and technologies. One of them is access control management software, which can be useful to users from different verticals. “These may include education, healthcare, retail, transportation, manufacturing and Industrial, sports and leisure, museums, data centers, corporate, airport authorities, and ports,” said Steve Barton, CTO of Software & Controls at Pacom. With strong demand and business from different vertical markets, access control management software’s popularity and growth are set to endure.

Integration Drives Efficiency Access control management software has evolved over the years from being a simple software application with basic functions to being a cutting-edge technology that allows users to access and retrieve information about an access-related event more easily and quickly. On top of that, the increase in integration and interoperability has continued to grow. Today’s access control management software can integrate not only with other security systems, such as video and intrusion detection, but also with non-security systems such as HR, room booking, cashless payments, elevator controls, and visitor management. The resulting optimization in efficiency can help the end-user organization in many ways.

22

JUN 2014

www.asmag.com

2251


Product Exploration

Access Control Management

Empowers Verticals n By William Pao

Education

R

egardless of the vertical, end users can benefit from access control management software, which not only helps keep companies/organizations safe but also contributes to more efficient operations and workflow. Determining what end users’ primary focuses of management are and what they look for in their access control solutions is the first step towards successful deployment.

Tom Su, Sales Manager, Hundure Technology

Richard White, VP and GM of Electronics, Allegion

Daniel McVeagh, Senior Product Manager for Access, Gallagher

5822

JUN 2014

Education, whether at a primary, secondary, or higher level, is often cited as one of the vertical markets that needs cutting-edge access control solutions the most, especially after campus violence has become more rampant in the U.S. A NAPCO Security Technologies white paper on school security points out that since 1980, there have been 137 fatal school shootings that killed 297 victims in America. However, safety aside, schools are also looking for ways to extract the potential of their students’ ID credentials by integrating them with more functions. This is especially the case in colleges, where students are faced with the need to enter or exit school buildings or dorms as well as borrow books, make cashless payments, and reserve equipment. “They want to integrate all the above mentioned features together into their campus card,” said Tom Su, Sales Manager at Hundure Technology. To achieve those objectives, schools are looking to integrate a variety of subsystems into their access control management software. “For higher education institutes, integrated subsystems include meal plans, vending, video, distress systems, and mass notification. For K-12, cost-effective lock-down capabilities and visitor management are also required,” said Richard White, VP and GM of Electronics at Allegion. Integrating these systems into a seamless whole can result in many benefits, said Harm Radstaak, MD of Identity & Access Management for EMEA, HID Global. “They significantly improve safety and security for students, staff, faculty, and visitors. They also deliver cost savings and an easy migration path to future capabilities when needed,” said Radstaak, whose company was responsible for helping the Academy of Art University in San Francisco transition from a lock-and-key environment to an integrated access control system, which enables students to use their ID cards to not only open doors but also make secure purchases and gain access to Urban Knights athletic events. “The university has realized a number of important benefits from its new access control system, including documented reductions in theft even as enrollment has increased, and an improved campus experience,” Radstaak said.

www.asmag.com

22


Product Exploration Healthcare Another vertical that highly demands cutting-edge access control management software is healthcare, which is also faced with the need to secure a diverse group of people including patients, doctors/nurses, administrators, and volunteers, against a variety of emergency situations such as fires, earthquakes, or fights that break out from time to time at hospitals. Other focuses of management include granting emergency personnel expedited access to patients’ wards or intensive care units, and protecting patients’ data from theft or leakage to other parties. Subsystems integrated into access control management software vary based on end users’ specific needs and requirements. For example, access control integrated with visitor management makes sure that those without access rights stay away from critical areas such as radiology, pharmacy, and pediatric wards. Elevator controls, meanwhile, are valuable in allowing medical staff to reach certain floors in the quickest manner. “Saving lives has absolute priority and requires unhindered access, and the access control management system must therefore be prepared for this eventuality,” said Nancy Wanders, Sales Manager of Global Clients at Nedap Security Management, adding her company’s solution is built around the purpose of rescuing people. “The ER team often has its own special cards. Held in front of any card reader they initiate elevator priority control. The elevator that is especially reserved for the emergency team is ordered to the appropriate floor. Only when this card is used, the elevator will go to the selected floor with priority,” she said. At the same time, the access control management system must converge with logical access control to make sure there is no theft or leakage of patients’ data, which has become mostly digitized in an increasingly digital world. “With the right infrastructure in place, healthcare institutions can meet today’s security and compliance needs while continually improving security and convenience, protecting patient privacy, and increasing the ongoing value of their investment,” Radstaak said.

6022

JUN 2014

Government For government agencies, the focus of access control management is high-assurance and multi-factor authentication. “This would include technologies such as biometrics and encryption,” said Jason Ouellette, Product Line Director for Access Control at Tyco Security Products. “The need is to be highly secure and highly protected by nature of what is physically being protected.” Among subsystems typically integrated with government access control management software are HR, visitor management, video, alarms, and encryption devices for communications that need to comply with FIPS standards. According to Ouellette, government users look for software that can handle high-assurance government credentials such as PIV, CAC, and TWIC, along with intrusion zone support. “The ability to handle high-assurance credentials allows highly important facilities, such as government buildings and embassies, to put into place an extra layer of security to keep the wrong people out while allowing the proper people access,” he said. Users also want their management software to be able to change authentication levels based on the imminence of danger faced by government personnel. “Buildings such as government and municipalities require a high-assurance badge, but when the threat level is moved up, there is opportunity to increase the level of authentication as required to include a second factor such as a PIN or a biometric. Access control authentication changes as the need/threat changes,” Ouellette said. All this contributes to a safer and more secure environment for government personnel, said Daniel McVeagh, Senior Product Manager for Access at Gallagher. “The benefit is ensuring government facility security cannot be easily compromised. We support a wide range of security and interoperability standards, ensuring government sites are well protected and can leverage their security system investment with integrations into others,” he said.

www.asmag.com

22


Special Feature

How Much Does Cost Reduction Really Cost You? n By Alf Chang, a&s Consultant

S

ome dishonest manufacturers simply claim that they choose different materials to optimize the interoperability of different components. However, the ugly truth is that it is done to “lower� the total production cost. Material substitutions can occur in all components, from resistors and chips to single or layered circuit boards, wiring connectors, relay designs, voltage stabilizers, and many more. Likewise, the external casing material, paint selection, fans and jacks used are also possible places to make alterations. But as mentioned above, these alterations are done to lower costs in order to boost competitiveness, despite the serious impact it has on product performance.

The Problems Coming from Material Selection Some problems surface quickly, while others only emerge due to the influences of certain environmental or operational factors. Nevertheless, any problem is a headache for users and integrators. Below are some common problems resulting from production cost reductions.

6822

JUN 2014

www.asmag.com

Lenses For lenses, cost reductions usually happen with the replacement of the metal molding components with plastic materials. As a result, two problems arise: A. The lens may or may not be tightly sealed with the rest of the camera due to its elasticity. Plastic molds may lose elasticity, shrink, curve in, or curl up with time, or even worse, change shape as temperatures change. This is almost impossible to avoid with plastic, which affects the accuracy of focal alignment. B. In addition, without a piece of metal that serves as adequate grounding, external electromagnetic signals can easily interfere with the auto-iris lens and damage the signal output, leaving interference lines on images.

Cameras The makeup of a camera involves complex circuit and structural designs, including optics, electric wirings, mechanical structures, network modules, and many more. Hence, cost reduction measures to substitute these components may create the following problems: A. Traditionally, security cameras use a sophisticated locking screw ring to

22


adjust the back focus through rotation. To cut down costs, some manufacturers use a metal strip or loosen/tighten the screws to stabilize the back focus. These substitutions do save on production costs, but over time cause cameras to easily become “out of focus” due to vibrations, requiring further manual adjustment by the installer. B. To save on costs related to circuit boards, some manufacturers combine the imaging sensor and the DSP/ ISP into a single double-layered and double-sided board. Because two individual boards have been shrunk down into one, three problems may occur: 1. Crowded soldering on a circuit board could result in solder skipping or false soldering and could even lead to a short circuit. 2. The simplified board design allows network cameras to become smaller as a whole; however, as the size gets smaller, the heat dissipation mechanism can be compromised. 3. The overcrowding of the pieces of

components on the circuit board makes it difficult to maintain or repair. Therefore, instead of repairing a broken circuit board, the manufacturer would just replace it with a new one. It is a faster solution, but it can take a great toll on installers’ maintenance service. C. Unless the camera uses power over Ethernet (PoE), to lower the production cost, some manufacturers may simply change its AC/DC power supply to switching mode power supply (SMPS) and simplify the interior power module and voltage stabilizer at the same time. Three problems could surface as a result: 1. Voltage and current flow could be very unstable and fluctuate wildly, thus overheating and damaging the camera. 2. When the external power supply becomes too heavy, the surge protection device (SPD) can be easily penetrated; cameras designed with the substitution or elimination of SPDs or lightning arresters are at greater risk of such damage. 3. In case of lightning strikes, the SMPS

▲ Cost reductions usually happen with the replacement of the metal molding components with plastic materials.

22

JUN 2014

The external casing material, paint selection, fans and jacks used are also possible places to make alterations. could become so sensitive that it would pick up the lightning-induced current and cause damage to the circuit board, which may be too vulnerable to handle strong currents. D. When downgrading electronic components, electrical connections and transmissions in the interior of a camera can be problematic, leading to impedance mismatching to 75Ω. As a consequence, the images shown can be overlapping, too bright, and full of jittery OSD or noise lines. E. Some manufacturers may eliminate the output of video (CVBS) signals or switch the BNC connector to the cheaper RCA jack, even in some network cameras without automatic focus. It may cause a short circuit or loose connection of the BNC connector. Because there is no CVBS output in the camera, installers may spend extra time adjusting the camera focus. F. To substitute the coding component in network cameras, there are two kinds of common selections: applicationspecific integrated circuit (ASIC) and

www.asmag.com

2269


Vertical Market

Lights, Camera, ENERGY!

Energy

is the New As recently as a decade ago, the smart home market was largely reserved only for the high-end luxury segments. Today, smart home solutions are not as cost-prohibitive, and have become more readily available to the middle-class sectors. No longer just a luxury toy, it has also brought about a realization that energy management and energy savings are fast becoming not just a new trend, but a new way of life. n By Steve Chin (Adapted from SMAhome)

because of trending energy saving solutions, which have recently begun to spring up all around the EMEA region.

Keep the Future Bright, Turn Off Your Lights

W

ith rising electricity costs, as well as regulations and awareness of global warming, adoption of smart home systems in Europe are being realized. Although most of the market is still dominated by high-end systems in luxury homes, the barrier is fast opening up for middle-class sectors to enter the market, especially

7222

JUN 2014

The Europeans are especially concerned about energy savings because of their feelings of environmental responsibilities and also because of lower energy costs. When we look at the German market, Ana Cristina, CMO for BrightOn, further points out that with Germany being arguably the biggest market in Europe, especially in regards

www.asmag.com

to consumer electronics, it is definitely important to take a broader look into the country. Furthermore, according to BSRIA, Germany accounts for roughly 45 percent of the European smart home market, followed by France and the U.K. at 10 percent and 8 percent, respectively. Europe’s smart home market is expected to grow to about US$0.6 billion by 2014, with mid-range systems contributing much to the growth. The German market will be up near $416 million by 2015, which is around 50 percent of Europe’s smart home market. While commercial light applications are still the predominant market for smart homes, demand in the residential

22


Pushing For Energy Management Solutions

Management

Trend

sector is rising, as Germany’s transition to renewable energy and phasing out of nuclear power has driven up the cost of electricity, which is now the second highest in Europe. Homeowners are increasingly looking for other methods to save on electricity bills. An industry expert further explains that Europe is becoming increasingly sensitive about nuclear power, with the consensus that there needs to be a need to look at other alternative sources of energy. He further added, “there’s definitely a high density of people concerned about fossil fuels. Not just with governments, but also the people are looking into renewable energy sources. Germany is the leader into this research now.” The expert also cites the fact that this could have economic benefits also. “We see this as an opportunity. We have the engineering capabilities.” The UK market is projected to grow to near $70 million by 2015. With energy prices rising, and people becoming more and more acutely aware, the technology has become even more advanced. However, Philipp Schuster, Regional Director of Loxone U.K., believes that the U.K. is still lagging behind other European countries, especially in countries like Germany, Austria, and Scandinavia. However, he does mention that people are becoming more and more conscious of their energy usage, and they are looking at extra services to save on energy and heating costs. “The market is

22

certainly expanding,” Schuster says. Some of the reasons that the U.K. currently lags behind other European countries is also because of extreme temperature climates experienced in the northern parts of Europe, where places like Scandinavia experience far colder temperatures than the U.K., thereby forcing them to look into better heating efficiency, as their energy bills are higher and they feel the pinch earlier. Another factor is older housing stocks, which lack modern house construction styles.

Government Incentives

Germany

45%

France / UK

18%

Scandinavian Countries

10%

Others

27%

▲ The European home automation energy savings market grasp; Germany is the current leader by a huge margin.

JUN 2014

Governments, not just companies and the general population are taking notice of this issue. Providing incentives and passing regulations to new building codes are just some examples. In Germany, there are building regulations now with strict laws regarding electrical installations in new infrastructures that make the entire house very safe. This is also a way to manage energy usage and conservation of energy. The industry expert explained that there are “standards of technology,” which is basically a gentleman’s agreement but not officially law. However, it is widely followed in Germany now, which mandates everything from

Realizing the Value in Value-Added Energy Management At its core, home automation is still a comparatively new market for the security industry in Europe. Because of the global economic recession, security companies have started looking elsewhere for other ways of kick-starting their businesses. One of the things trending right now in the EMEA region is energy management and energy savings. As an added-value service, it is not hard to picture that bundled with security could be a number of simple energy management devices that could easily be installed. Juan Madrid, West Europe Area Manager for Fermax, mentioned that energy savings is becoming a real trending topic. Along with various government directives being implemented, he also says, “it’s more related to added-values from integrators and how fast end-users can get their returns of investments. It’s growing, and we cannot expect that it will stop.” Rishi Lodhia, CEO of Panasonic Cameramanager, also emphasized the importance of looking into value-added services, and how it can incorporate attractive and affordable solutions for their customers. Lodhia also explained that energy savings is very important, being much more attractive now than home security solutions.

www.asmag.com

2273


Company Spotlight

Dahua Draws Road Map to be Global Leader

(home automation), will also bring the industry more new opportunities. ” With the future of the security industry looking bright, Dahua has set a new revenue growth goal in 2014, hoping to reach US$1.6 billion by the end of 2016.

Global Expansion To help Dahua reach their goal of $1.6 billion by 2016, the company is planning to expand their overseas operations. Localization through the deepening of their ties with existing local partners overseas is at the core of the company’s expansion strategy. One of their latest strategies is to set up overseas supporting offices in both the U.S. and Europe. The U.S.

The U.S. is still the second biggest single security market after China. To further cater to the demands of Dahua’s OEM partners, the company plans to establish its first overseas supporting office in Los Angeles, California, this year. n BY THE a&s EDITORIAL TEAM

Dahua continues to be an OEM supplier to most parts of Europe. Markets that are currently selling under Dahua’s original brand are mostly southern European countries like Italy, Spain, Portugal, and Greece. The European market has contributed greatly to the company’s overall revenue; therefore, how to render more services to local OEM partners and distributors is the company’s next phase to enhance their market place in the region.

L

ooking into the future, the company is not willing to rest on its current achievements. In order to take up more market share globally, Liquan Fu, President of Dahua Technology, has made clear road maps for the company to become a leading, total security solution provider. Fu said, “The technological development

8222

Europe

JUN 2014

of cloud computing and trend of ‘Internet of Things’ both stimulate new demands in the security field, such as data management and the fusion of audio and video. In the era of ‘big data,’ video surveillance is going to play a vital role. On the other hand, besides the government sector, the rise of the private sector, especially residential

www.asmag.com

Russia

Russia, where over 90 percent of the country’s products are imported, is one of Dahua's main focuses. Safe cities are the biggest project in Russia right now, which provides Dahua with high expectations for its future development.

22


Advertorial

India

Dahua has claimed to be the largest surveillance product supplier in India through their partnership with Aditya Infotech. Further localization of their services is one way Dahua has maintained their dominance in India. The company has plans to soon launch a customer service hotline in the country to deal with customer inquiries. Additionally, a maintenance center will be opened in New Delhi, along with repair shops throughout major cities in India. Dahua also plans to increase the budgets spent on local exhibitions in India’s finance and transportation sectors. Products will also be released almost simultaneously in both China and India. Latin America

Latin America is one region Dahua sees as having a lot of potential. Due to the friendly relationship between Latin America and China, as well as the openness of local clients to Chinese products, Dahua has seen some significant growth in the region, particularly in countries like Brazil, Mexico, and Columbia.

proof tests, and transport simulation testing). Also, Dahua’s latest showroom, reminiscent of an Apple store, has stunned people. The company said its R&D approach will focus on the following technologies: HDCVI to further expedite the popularity of HD, as anti-interference and analog prices have made it easier for HD; intelligence in traffic cameras and video synopsis; and platforms for big data, such as the model DSS7016D, an all-in-one platform that can immediately access over 100 surveillance cameras. This model features a user-friendly graphical user interface (GUI) and is easy to install and operate, which not only makes IP-based equipment accessible to users of analog systems, but also easy to install. The company’s focus prior to the $1.6 billion goal was video; however, Dahua also has ventured into access control and alarm products. Currently, the company is even producing their own lenses. By doing this, Dahua is positioning itself to become a real total solution provider.

The home market will also be a focal point for Dahua. The company’s smart home products integrate both audio and video signals and cloud storage. In fact, Dahua’s smart home gateway won both the Red Dot Design and iF Design awards.

Transformation Into a Solution and Service Provider Dahua aims to make sure their products are on par with other prestigious international brands. In China, the company has been repositioning itself as both a solution and service provider, instead of a mere manufacturer of surveillance equipment. As part of this transformation, Dahua has set up new divisions to tap into China’s electrical power distribution business and security service business. The 1,000-person security service team also sells equipment including CMS, intrusion alarms, and video. Most of the company’s clients are from the banking sector. In the future, Dahua will soon be able to use this position to take up more market share in some overseas countries.

R&D and Quality Control

Achieving Goals by any Means

As security is a technology-laden industry, R&D investment usually plays an important role in maintaining a company’s growth. Dahua will invest about 10 percent of their resources in R&D and increase their R&D manpower to 4,500 from the existing 3,500; supply chain management will be conducted by an independent department. In addition to keeping a closer eye on quality assurance management, they are also paying closer attention to equipment testing (e.g. ALT tests, mechanical aging tests, thermal shock tests, salt spray tests, dust tests, water

Dahua estimates that it will take three years (2013-2015) for their mainstream products to reach the standards of the world’s major brands. The company hopes to reach their goal of $1.6 billion by increasing their overseas revenue; however, China will still remain their priority. In terms of products, the company plans to continue improving and developing its technology. Although their goal may not be an easy one, Dahua is making sure they have all the means necessary to achieve this goal by 2016.

22

▲ Liquan Fu, President, Dahua Technology

JUN 2014

www.asmag.com

2283


Companies in This Issue Products of the Month • AMAG • AXIS COMMUNICATIONS • INDIGOVISION • PAXTON • SALTO SYSTEMS

News Feature • IVEDA

Viewpoint • NEDAP SECURITY MANAGEMENT

Product Exploration • ALLEGION • AMAG

Next Issue

• GALLAGHER • FRONTIER SECURITY • HID GLOBAL • HUNDURE TECHNOLOGY • NEDAP security management • PACOM • TDSI • TYCO SECURITY PRODUCTS

• MILESTONE SYSTEMS • MOBOTIX • PELCO by SCHNEIDER ELECTRIC • zwipe • TYCO INTEGRATED SECURITY • VERINT SYSTEMS

Industry Report

• VIDICORE

• 3VR • ALLEGION • ARECONT VISION • BRIVO LABS • FLIR SYSTEMS • GENETEC • HID GLOBAL • LUMIDIGM

Vertical Market

Intelligent Video Solution

• PANASONIC CAMERAMANAGER • FERMAX • LOXONE

Product Exploration

Intelligent Video Solution

WIRELESS ELECTRONIC LOCKS

BANKING

Vertical Market

Special Feature

RETAIL

DATA PROTECTION IN IP-BASED SECURITY SYSTEMS

The easiest way to

Pick Up the World of Security Leading security magazine provides you: • In-depth and unbiased market information • Technology breakthrough • Project and solution design advice

22

JUN 2014

www.asmag.com

22 101



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.