CONTENTS
June 2016 www.asmag.com
VERTICAL SOLUTION
The Lowdown on Aviation Security Technology Practices
.........................................................................34 Airports Are Leading the Way in Transport Security .........................................................40 SPECIAL FEATURE
Defining New Systems Integrators in a More Connected World ..................................48
P. 34 INTEGRATED SYSTEM
Emerging Trends Address Parking Issues Value-Added Distribution in a Competitive Business Landscape ..................................54
P. 44
SMART TECHNOLOGY
More Storage or Better Codecs, Which Way Should the Industry Choose? ...............60 INDUSTRY REPORT
IP Security Systems: Stepping Stones for Cyberattacks ................................................66 SMAHOME JUN 2016 Ɣ www.asmag.com
What We Learn From the History of PCs to Make the Right Choices for Smart Homes ..70
Contents ...................................................14 Editor’s Note ............................................16 Application Cases ...................................18
14
P. 66
Products of the Month ...........................24 News Features ........................................28 Show Review...........................................72
P. 54 New Products ..........................................74 Companies in This Issue........................77 Show Calendar ........................................78
a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.
ISSN 1997-6267
Will the Chinese Conglomerates Take it All? ecutech, which was last held from April 19 to 21 in Taipei, is always a good place to meet buyers from all over the world to understand security distribution and the integration market. During the last show, the a&s editorial team sat down with several major distributors and systems integrators from Asia and other regions to talk about the latest challenges they face in their businesses and how they changed to maintain growth. The biggest challenge that was frequently mentioned was that of price competition from Chinese products. Two Chinese conglomerates have successfully taken away the majority of global market shares from other companies, which caused distributors and SIs to suffer, but on the other hand, this has motivated the affected companies to look for more value-added opportunities. However, will these two Chinese conglomerates continue to expand exponentially in the long-term future? I discussed this with some industry experts to draw conclusions on some challenges they might face in the near future.
JUN 2016 Ɣ www.asmag.com
According to the latest report from The Economist, China will most likely experience a “financial bust” or “abrupt slowdown” due to its “debt-to-GDP ratio soaring from 150 percent to nearly 260 percent over a decade.” If the country can’t find a long-term solution, China might experience a major financial
problem. Under these circumstances, these two big Chinese companies, who are also financially supported by their government, might need to find a way out in the long run.
John Shi
Executive Editor-in-Chief
Hubert Duh Charlie Wong
Managing Director / Publisher General Manager
Editorial
General Press Jill Lai Editor-in-Chief Alf Chang Senior Consultant William Pao Reporter Lisa Hsu Reporter Prasanth Aby ThomasReporter Emily Lin Editor
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Tzu-Yin Chien
Executive Designer Designer Designer
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com tzuyin.chien@newera.messefrankfurt.com
Officer
michelle.shih@newera.messefrankfurt.com
Circulation
Michelle Shih
Meanwhile, these companies also actively develop their end-to-end solutions for video surveillance and other product lines. Due to competition from rivals in the high-end projects market, these two Chinese companies might lose their chance to form partnerships with other third-party suppliers, if they grow too big. The above challenges are very likely to happen in the near future, which would explain why these two big Chinese companies are going to meet obstacles. Meanwhile, for the companies who are currently competing with Chinese products, I hope that this would inspire them to keep innovating and differentiating themselves through the solutions and value-added services they provide. In two articles featured in this issue, “Value-Added Distribution in a Competitive Business Landscape” and “Defining New Systems Integrators in a More Connected World,” we tried to provide some good ideas and examples from some leading distributors and systems integrators to define their future roles. Hope you enjoy it.
Corporate Management
Collins Yuan Thomas Pin Chihung Lee
Group Manager Account Manager IT Manager
collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
Manager
willy.wang@newera.messefrankfurt.com
Event Manager Project Manager Project Manager
peggy.wu@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com jason.cheng@newera.messefrankfurt.com
asmag.com
Willy Wang Secutech
Peggy Wu Eva Tsai Jason Cheng
International Advertising [Headquarters]
Fion Tsai Nori Chang Audrey Fang
Sales Manager Coordinator Coordinator
fion.tsai@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Osman Kanatli Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana
U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia
bobbie@globetrottermedia.com produzione@ethosmedia.it osman.kanatli@marmarafuar.com.tr evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
jill.lai@newera.messefrankfurt.com
16
中華郵政北台字第1571號 執照登記為雜誌交寄
APPLICATION CASES a&s presents snapshots of security cases from across the globe to provide up-to-date information on how products and solutions are being employed in different industries. flight plans for real-time passenger background checks including Advance Passenger Information (API) on arrival. Furthermore, the system creates smart management dashboards of relevant data for border control authorities, government, airport and airline companies.
>> Airport
Vision-Box Expedites Curaçao Airport Process
Curaçao International Airport, a busy travel hub in the Southern Caribbean region, has installed an integrated automated border control solution. Vision-Box was responsible for the design and implementation of an intelligent passenger flow system that combined hardware and intuitive graphical interfaces. With the resulting system, qualified locals and tourists can use eGates to quickly go through the clearance process. Passports can now be authenticated using document reader feeders and they can easily confirm their identities via facial biometric verification. They only need to look at a camera that would automatically take a biometric photo of their facial features and verify it against the information stored in a chip in their passports. The platform also provides border guards with real-time views of the passengers’ individual clearance process, allowing prompt responses to threats and centralized control of the whole security infrastructure. It was also integrated with various Airport Operational Database (AODB)
>> Education
>> Hospitality
Campbell University in North Carolina, U.S., decided to upgrade its video surveillance system after several new facilities were added to the campus. The old system consisted of around 150 analog and IP cameras deployed around the premises and it wanted to make the migration to IP for all of its future projects. The school wanted a more distributed network setup, leveraging individual servers that could be viewed from a single desktop. The university opted to go with Arteco Global’s eMotion software as it delivered all the benefits the school sought and more. The event-based video management software (VMS) solution featured built-in analytical features that allowed for unlimited number of user profiles in an expandable and scalable format, making it ideal for a wide variety of applications. The eMotion software also included intelligent options such as license plate recognition (LPR), privacy zones and Arteco Everywhere to remotely activate I/O devices right from the software client. Another benefit of this system is that the university is not pigeon-holed into using one particular type of camera since Arteco’s software conforms to ONVIF standards.
Planetaria Group, a four- and five-star hotel operating group in Italy, wanted to improve the video surveillance system at one of its properties, the Château Monfort in Milan. The hotel required a solution that will enable comprehensive monitoring of its premises 24/7. It was also very important to have access to technical support that can promptly resolve any performance issues. Having deployed March Networks’ video technology at another hotel, the operator selected their Command Enterprise VMS with server-based recording for this project. The solution consisted of 40 March Networks’ IP cameras and three 4-channel encoders to digitize video captured from existing analog cameras. It also included a Dell server pre-configured with Command Recording Server software and internal RAID5 storage to ensure redundant data protection, even in the event of a hard disk failure. The staff can use the Command client to display various interface screens for configuration and video review. System users are able to quickly search for recorded video by scanning thumbnail images and export video evidence together with explanatory notes for follow-up investigations by law enforcement officials.
Arteco Upgrades Security at US University
March Network Secures Milan Hotel
JUN 2016 Ɣ www.asmag.com
>> Infrastructure
Boon Edam Employed at Peruvian Port
Boon Edam turnstiles have been installed at the multipurpose North terminal of Callao in Peru. It was a part of a large-scale physical security plan to protect the marine terminal from criminal activity. For these type of terminals, it is critical to invest in
18
Smart Solutions for Outdoor Large-Scale Projects Solve Major Bandwidth Issues Editor’s Note:
When real-time monitoring and alerts are required for an outdoor large-scale project, more often than not, project owners experience major bandwidth issues that result in unstable transmission or bad quality footage. Now, a solution has arrived in the form of all-inclusive smart security systems that have an NVR and a camera, all in one place. By using high-end analytics software that only transmits data when needed, bandwidth issues can be easily solved.
AUGLLE EDGE SURVEILLANCE SOLUTION
A
uglle’s video viewer system runs directly on Auglle IP cameras and stores video directly onboard the camera. Customers can choose to store videos on SD cards, hard drives, solid state drives or to the cloud. With Auglle, there is no need for server-based recording. With built-in Wi-Fi and Ethernet ports or optional cellular modem, live and recorded video can be viewed from any PC, smart phone or smart tablet. Auglle’s inclusive smart analytics work 24/7, monitoring and providing real-time alerts. Alerts are transmitted via SMS, email or video push to any designated personnel. Alerts can be set up to fit user’s designated schedule. Auglle’s built-in power converter allows the camera to be installed in any location that has 205-90VAC, PoE or 12VDC. As an alert-driven system with inclusive onboard storage, Auglle cameras transmit alert messages which require minimal bandwidth. Video is viewed when requested and not constantly streamed back to the server-based storage. Because of these features, Auglle is an ideal surveillance camera solution for large-scale systems.
• • • • • •
Built-in high voltage converter allows the capability to convert from 305-90VAC down to 12VDC Full range onboard analytics provides real-time analysis of events and generates alerts Ability to install in remote and hard to reach locations with wireless capability ONVIF compliant Custom Cus tomiza izable ble an and d modu modular lar Edge storage provides high definition storage
Supplier: Auglle
URL: www.auglle.com
V5 SYSTEM PORTABLE SECURITY UNIT
V
5 System’s Portable Security Unit is a wireless, multi-sensor, portable security solution. This device is an edge computing IIoT platform with advanced onboard analytics, proprietary power management system, onboard storage and communications. It can be configured and installed in a matter of minutes, all packaged in a ruggedized enclosure for easy deployment and/or redeployments in any outdoor environment without the need for trenching and/or permits. The unit allows for video streaming over cellular connection or Wi-Fi and is not limited or tied to fixed power or data cables. V5 devices can be added to extend existing security systems outdoors or be deployed as a standalone solution.
JUN 2016 Ɣ www.asmag.com
• • • • • •
Self-powered lightweight V5 proprietary solar panels Onboard computing platform (Edge) On-edge real-time analytics Multi-sensor platform – video, GPS and temperature 4G LTE or Wi-Fi communication Video storage on edge (on the device) with the option of video storage on backend server
Supplier: V5 Systems
24
URL: www.v5systems.us
NEWS FEATURE
Hikvision Announces Its Acquisition of Pyronix Hikvision Digital Technology, the world's leading supplier of video surveillance products and soutions, has announced the acquistion of Pyronix, the U.K.-based intrusion alarm security firm. BY Hikvision Digital Technology
for significant investment in the U.K. and particularly in its or Pyronix, Rotherham and the region, the foreign U.K.-based manufacturing, with plans to dramatically expand direct investment that this will bring to the U.K. operations. We are delighted to welcome Pyronix to Hikvision will be huge. Julie Kenny CBE, DL, founder of group, and we look forward to growing the business through Pyronix, said: “The foreign direct investment that introduction of intruder alarm products to the global market.” this will bring to the U.K. will be huge. Hikvision Hikvision plans to apply Pyronix's expertise and know-how has big plans for the growth of Pyronix and the continued in intrusion detection systems to its leading position in the development globally. In the last 15 years, Hikvision has video surveillance market. The result, said Sebastian Herrera, demonstrated what can be achieved in the video surveillance the CEO of Pyronix, will mark the future of security systems. market. With this guidance, Pyronix can achieve great things in “Hikvision and Pyronix combined know-how will bring the global market place.” new advancements and innovative products to the market, Jiang Feng Zhi, recently appointed Chairman of Pyronix, converging two security commented on the technologies in video acquisition. “These are surveillance and intrusion exciting times for Pyronix Hikvision plans to apply Pyronix's detection.” and Hikvision as the two expertise and know-how in intrusion companies work together. detection systems to its leading position Hikvision has plans
in the video surveillance market.
JUN 2016 Ɣ www.asmag.com
28
Physical Security Companies Rush to Ensure Cybersecurity Ever since adopting IP technology, physical security systems have become susceptible to cyberattacks. Access control solutions and alarm systems that are connected to a network are also similarly vulnerable. BY Prasanth Aby Thomas
xperts have warned of cameras installed in public and private areas being configured insecurely that would allow attackers to easily access live or archived footage and seize control of the camera operations. One of the many ways that manufacturers are looking to improve security is by joining hands with cybersecurity companies. Last year, Panasonic announced plans to work with Symantec to come up with secure platforms for its video surveillance solutions. In a statement, Panasonic acknowledged security of surveillance data was becoming increasingly important as issues such as hacking, data breaches and tampering become widespread. “Through the relationship, Panasonic will combine Symantec’s highly reliable certificates and technology for detecting and analyzing cyber-attacks with its own in-house embedded cryptography technology to provide a highly secure and robust protection layer for its embedded surveillance products,” the statement said.
Dedicated Teams There are some companies that are assigning dedicated teams that would ensure cybersecurity. Tyco Security Products recently introduced its Cyber Protection Program, which would be led by a team responsible for monitoring the product development process and authorizing final product release to ensure compliance with secure development and best practices.
Deploying Secure Protocols Bosch Security Systems recently announced its building integration systems software that offered improved cyber protection in access control and alarm management systems. “New OSDP (Open Supervised Device Protocol) v2 Secure Channel controller-reader encryption is combined with established client-server and card-reader encryption to create continuous data security throughout each step of the access control process,” Bosch said in a statement. “Improved user account controls prevent unauthorized access, improving protection not only against external hackers but also against exploitation by internal offenders.”
One of the many ways that manufacturers are looking to improve security is by joining hands with cybersecurity companies.
It ’s n o t j u s t s u c h h a rdwa re manufacturers that are taking such steps. Early this year, VMS maker IPConfigure released the latest version of its platform that makes use of secure real-time transport protocol (SRTP) encryption technology. Most VMS transmit video and audio using HTTPS protocol, which was developed to secure web content, not particularly video. SRTP provides similar security as HTTPS but with lower latency, higher throughput and better quality. As physical security solutions become more and more integrated with other devices, cybersecurity would be a major cause of concern for solution providers as well as their customers. The coming days could see more efforts from solution providers to ensure surveillance data is as tamper-proof as possible.
29
BY Israel Gogol, Freelancer
Civil Aviation has been a popular target for terrorists for many years. Attacks on planes have a high and dramatic media profile and in most attack scenarios, the consequences can result in a very high death toll. New developments in video analytics try to provide airports with better situational awareness and investigation capabilities.
JUN 2016 Ć” www.asmag.com
34
ecent events have brought civil aviation security back to the center stage. Earlier in May, an EgyptAir flight from Paris to Cairo crashed in the Mediterranean Sea and authorities are considering it a possible act of terrorism. In addition, the ISIS-related attack at the Brussels airport and the bombing of Metrojet Flight 9268 above the Sinai Peninsula in October 2015 reminded the world of the necessity of securing airports and airlines. “Unfortunately, I have to say that while the threat scenarios evolve over time, the systems used to protect airports and air carriers are always behind,” said Omer Laviv, Aviation Security Specialist and CEO
of Athena, a security and intelligence solutions provider that is a subsidiary of the MER group of companies. “It seems that the decision makers are always waiting for a threat scenario to actually materialize, before countering the vulnerability that enabled the threat in the first place. Airports and airlines introduce new security measures, but always after an attack and not before. For example the ban on liquids, aerosols and gels above 100 ml. was implemented after a failed bombing attempt in 2006, while the liquid explosives threat was known since 1989.” Currently, different technologies are being employed by airports to deal with security threats. This can involve the detection of illegal tools and equipment
Bill Flind, CEO, Ipsotek
Udi Segal, Director, Vertical Marketing, Qognify
Omer Laviv, Aviation Rustom Kanga, CEO, Danny Peleg, Director, Security Specialist and iOmniscient Business Development, CEO, Athena Transportation, Qognify
35
Are Leading Airports the Way in Transport Security The number of tourists around the world has been growing exponentially with each passing year. Hence, transport network operators are constantly being challenged to seek out solutions that can enhance overall security. Airport security systems have emerged as good models to follow, especially for railway stations, as they are well-adapted to handle situations that are particular for this field field. BY Daniel Wan, Channel Marketing Manager, Security, U.K. and Ireland, Honeywell Security and Fire
JUN 2016 Ɣ www.asmag.com Ɣ www.asma mag. ma g cco om
Daniel Wan, Channel Marketing Manager, Security, U.K. and Ireland, Honeywell Security and Fire
40 0
irport ssecurity has a lot to live up to. According to the Interna International Air Transport Associ Association (IATA), an average of eight million pe people flew every day in 2013, with the vvast majority travelling through main airp airports. Airport staffing is also on the rise, as more restaurants, shops and other sservices arrive next to the runways. With this growin growing footfall to account for, airports are un understandably under considerable press pressure to maintain a round-the-clock, ffirst-class security system. Although airport security is one of the most heav heavily scrutinized in the world, other tran transport networks could still benefit from adopting the systems, a processes and approaches that are
best practice in the aviation industry. One transport network that should draw inspiration from airports is railway. Railway stations remain a top target for thieves in many countries — in the U.K., for example, four of the country’s top crime hot spots were major railway stations, based on figures released by the local police in 2013. The ever-present threat of crime means security managers are constantly on the lookout for new ways to keep passengers, staff and assets safe. Airports are well placed to provide inspiration. International airports have invested heavily in solutions and strategies that are specifically designed to better protect passengers and cargo, which is an excellent starting point
for railways looking to improve their security. This article will explore the parallels between airport and railway security and examine the best solutions that railways should be looking to adopt from airports.
PRE-EMPTING INCIDENTS Both airports and railway stations are some of the world’s busiest and most congested spaces. Picture the departure lounge at international airports during the summer holiday season or a major railway station during Friday rush hour. In both scenarios, the sheer number of people can be overwhelming. Airports approach this in an innovative way — by adopting a strategy that enables security managers to prevent scenarios from turning into incidents, rather than just reacting to events after they occur. If a passenger leaves his bag in one of the terminals and walks off, technologies such as
video analytics can help the security staff to spot the suspicious behavior in a busy crowd as it happens and pre-empt a potential problem. In addition, using a video management system to integrate several video feeds together into one single unified view makes it much easier to spot a person behaving in an unusual way and can quickly guide the security personnel to the source of concern. For larger railway stations in particular, this proactive approach to managing situations should serve as an inspiration.
ALWAYS ON 24/7/365 Both airport and railway transport networks never stop their operations, so their security systems must perform to the highest standards both day and night. Continuing to operate without interruption, no matter what the circumstances, is essential to securing both environments.
Take, for example, an incident when an airport suffers a power outage that affects the operational systems at the terminal. This failure can cause major flight delays and chaos, with big crowds moving around the building and demanding information about their flights. In this type of scenario, where staff attention is stretched to its limit, security is more important than ever. So how do airports ensure that they can deliver a 24/7/365 security solution that runs smoothly even in extreme circumstances like these? The answer lies in integrated security systems that are designed with automatic fail-over to back up systems. In the event of a power failure or a security risk, site security is immediately picked up and controlled by a secondary security site. Like how airports andrailway stations can be affected by adverse conditions outside of their control. Severe weather, flooding or fire can disrupt critical operational systems and put thousands of passengers at risk. Investing in back-up
41
EMERGING TRENDS ADDRESS PARKING ISSUES Incorporating smart technology, such as sensors and cameras, into parking management is not only reducing time spent by drivers searching for a parking spot, it’s also increasing operational efficiency and revenue for parking lot owners. BY Eifeh Strom, Freelancer
f there’s one thing every driver in the world has experienced, it’s the frustration of trying to find a parking space. Drivers waste time, fuel and energy searching for parking, whether it be on city streets or in parking lots. This not only creates extra traffic but also results in increased pollution in the air and enraged drivers on the roads. Latin America and APAC are projected to drive the smart parking management systems market in the coming years, according to a recent report by Persistence Market Research (PMR). Increased traffic congestion issues in these emerging regions were cited as drivers for this growth. With the rise of smart cities across the globe, more and more city governments and private parking lot owners are looking to improve the overall parking experience. The use of devices like smart sensors and integration with things like mobile payment are helping to not only reduce driver frustrations, but also improve operational efficiency and increase revenue for lot owners.
WORKING TO UNCOMPLICATE THE PROBLEM
The use of devices like sensors is helping drivers find available parking spaces and allowing parking managers to maximize their profits.
JUN 2016 Ɣ www.asmag.com
44
There has been debate about whether or not increasing the amount of available parking in a city helps or hurts traffic. Some argue that increasing its availability simply results in more people driving, meaning more drivers on the roads. At the same time, others argue that more parking spaces, if properly managed, help relieve traffic caused by people that can’t find a place to park. Regardless of which argument is “right,” one thing is certain — searching or “cruising” for parking definitely contributes
to slowed traffic. In fact, Marcus Zwick, Head of Innovation Management Mobility Division at Siemens noted the search for parking spaces causes one-third of traffic in European cities. “One of the challenges that parking lot managers are coping with, particularly on-street in cities, is that available parking spaces are not easy to find — they aren’t visible,” said Edwin Siemerink, SENSIT Proposition Manager at Nedap Mobility Solutions. The aim of smart parking, then, is to make these available spaces visible. However, the frustration of finding parking isn’t just about the time spent finding a parking space; it’s about other things like payment method and gas usage too. “Most of the challenges come from the unpleasant user experience caused by spending a lot of time on searching for a parking space, the complicated payment process and even the difficulty to locate where the car is parked,” said Bowen Han, Product Manager at Dahua Technology. Understanding these underlying challenges is key to developing a smart parking management system that can not just address these issues, but solve them in a manner that is both beneficial to drivers and parking owners. Luckily, with technology advanced as it is now, the number of companies working to maximize parking efficiency is on the rise.
UTILIZING TECHNOLOGY TO EASE DRIVER HEADACHES According to Navigant Research, sensor networks that detect vehicle occupancy are what provide the basic intelligence behind smart parking systems. In fact, its recent report found the installed base of sensor-enabled on-street smart parking spaces is expected to surpass one million worldwide by 2024. By utilizing sensors, software and smart data interpretation, the benefits of smart parking management are clear: “smart infrastructures save time, protect the environment and ultimately improve the quality of life for city dwellers,” said Zwick.
Source: Nedap Mobility Solutions Sensors that detect unoccupied parking spaces can not only be beneficial to the drivers, but also to parking lot operators who can immediately determine if it is being misused.
Kurt Buecheler, SVP, Marketing and Business Development, Streetline Edwin Siemerink, SENSIT Proposition Manager, Nedap Mobility Solutions Adler Wu, Product Manager, Vertical Solutions, Hikvision Digital Technology
The use of devices like sensors is helping drivers find available parking spaces and allowing parking managers to maximize their profits. “Our wireless parking sensor system SENSIT detects in real time whether or not an on-street parking space is available or not and for how long,” said Siemerink. “This information can be used to efficiently guide motorists to an available parking space. Our parking solution notifies parking enforcers in real time about the cars in overstay and the cars that misuse a dedicated parking space. Additionally, the real-time parking data from the sensors can be used to integrate in parking payment apps and displays.”
On-Trend Integrations Part of what makes smart systems smart is their ability to integrate with other devices, technologies and systems. For parking management companies, integration with third-party mobile apps and mobile payment are key trends worth paying attention to. With less and less people carrying cash, and more and more people looking to use payment methods such as Apple Pay, integrating various payment methods for the ease of drivers is an important part of the smart parking idea. “Mobile payment is no doubt a trend in every industry, and we absolutely want to build a smart parking system not only to benefit car drivers for a more convenient parking experience, but also provide a better management solution for parking lot operators,” Han said. Siemerink also highlighted payment integration among others. “The integration with payment apps, parking license apps, etc., will greatly improve the parking experience,” he said. “Combinations with apps from cities and shopping malls can be made to integrate parking data and further develop the customer experience of visitors. There are also interesting options with customer loyalty programs possible.”
45
Security systems integrators are faced with challenges on severa al fronts. Increase ed competition in the market has led to price wars among integrators themselves. Economic woes and political instability have caused end users to be more conservative as far as their se ecurity spending is concerned. All this has rendered integrators less and less profitable, and they must figure out ways to survive and stay ahead amid the adversity. BY William Pao
JUN 2016 Ć” www.asmag.com
DEFININGNEW SYSTEMS INTEGRATORS INAMORE CONNECTEDWORLD 48
ore an ore and d mo ore re,, sy syst s em st emss in nteegr g at ator orss fifind nd the hems msel elve vess cons co n um ns umed ed by ch hal alle lle leng nges in to t da d y’s se secu curirity ty mar arke ket.t Acco Ac cord co r in rd ing g to the he int nteg eeg gra rato t rss tha to h t we spo p ke witith h at a thi hs year ye a ’s Sec ar ecut cut u ec ech h Ta Taip ipei ip ei,, th ei t ese ch hal a le l ng nges es inc nclu lude lu de incre nccre reas ased ed comp co m et mp etititio ion, n the end nd user ser’s bu budg dget dg e con et o straaints and inccre on reas a in as ingl glyy co gl comp mple mp leex usser e dem e ands in to t da day’ y’’s co onn n ec ecte ted te d wo w rlld. d Thi hiss ar a titicl clee is to de cl defiine wha hatt cons co nstitiitu ns ute tess today’s system ms integrators an and find d out how w the heyy ririse se up to se o thes th esee ch es c al a lenges and n overcom me them.
BUDG BU D ET T CON ONST STRA RAIN INT T T e bi Th bigg gg ges e t ch hal a leng n e facing g integ e rators is the budget co onsstr trai a nt ai n s of o theiri end-user customer e s, who h reduce inve vest ve stme st ment me nt or spen en ndi ding wheen times aree ba bad. d “The econ ec onom on omyy in om n Thaaili and is not o so o we w ll. Th T ailand’s GDP P iss b lo be low w 3 perc rccen entt.t. The gov o ernm men entt and en nte t rprises are conc co onccer e ne n d wi with th whe here to inveest mon oneyy, and usuaally securirity se riityy willl be the h las a t on one,” said d Pic icha hai Si S hsobhon, M at Th MD hai aila aila land nd-b -b bas ased ed d Fac acililility Ma Manaage geme ment nt.. Anotheer in An nte teg grrat a or fro rom m Th T aila l nd d, Ba Banccherd Racht htap apat a tanaku k l, own w er of Thai Th ai IP P Cameera, ec e h ho oed tha hatt seent n im men ent.t.““ Th Thee econom my in Thailand is nott good go od. IfI the h pririva vate tee com ompa p ny n wants to get a neew system, he is afra raid id to o p y mo pa more re mon o ey. Hee mig i ht ht want to get it, butt if he payss more mon oneyy for thee be bett tter ter tec echn hnol o ogy, hee wo wo on' n t have v eno oug u h mo oneey … in thee fut u ure, e”” he h said d. Deecisi D e sion o s by the governmen nt or enter erpr er p is pr i es e to de dela lay orr out utririgh ig gh ht ca canc ncel po pr ojjec ects ct in n th thee mi m dst of a country’s politicall orr eecco on nom mic ic ins n ta tab biililitittyy can al ca also lso o be tr t ou o bl b in i g fo forr in inte tegr grator ors. s. “One ve s. verryy reen now owneed wo worlrldw wid ide maanu nufa fact fa ctur ct u err … th ur heey pl plan anne ned d tto o inv nvest in Thailillaan nd to o bui uilld d a new ew ffaacttor o y. y I quo otee the he pririce ice to th th and them d thee projeect ct alm lmo osst go got un unde und derw rway ay. On One ne day I got go ot a le lett tterr saying they ey wou uld ld lik ike to o po osstp po on ne th this iss pro roj oje jectt ject byy thrree b ee mon onth ths. s. Ano noth ther few e mon onth ths, s,, thi his proj prroj ojec ectt wa ec was ca canc ncelle elle el led du led du uee to the pollititic ical con ondi d tition ons,,” sa s id d Wis issa saawa wat at Ch Chot otbeenj njak akul ul, MD MD at FFiit ITT And d Solu So lutitiions. on nss..
COMP CO M ET TIT ITIO TIO ION IN INTE TE ENS NSIF FIES IES Ano An othe ot her ch her chal allleeng n e is inc ncre reeased reas assed d com mpe peetititition, no p ot on o ly from rivals w o in wh intr trod tr trod oducce lo ow w--pr pric icee Ch ic Chinese prod du uccts t but also frrom om those see from m nonno n-se nseecu secu c riityy dis isci sci cp pllin ines es. s. “A A lot o of ITT com omp pani n es do o syst ssyyst ste tem em inte ems teeg grratition ons on thee sid ons de aallre read ady. ad y Whe y. hen tth his is kkiind ind d of co omp mpan anyy co an come mes in me n, tth heeyy don’t know muc uch h ab abou out seecuririty tyy — they just know w thee spe peccss of th the equipment,” said d Sih hsobh sobh so bhon n. “When we recomme meend d to our customers, likke go overn veern rnme ment officers, they don’t’tt und ndeer erssttan nd — they always comp mp par a eo ou urss witith h proposals raised by ITT com mpaani nies es,, no n t knowing that while the heeirr spe pecs cs are r writtten re vveery ry well, in real life, the heyy ccaan’t n’’t be be use sed. d”” d.
IMPACT OF RECENT M&A DEALS ON SIs Sometimes the competition comes from forces that are beyond the integrator’s control, for example a merger and acquisition deal between a manufacturer and another systems integrator. “Let’s say the manufacturer that we have been working with for so long and from whom we normally get the product and solutions first suddenly acquires another SI, and tomorrow we are going to sit in the client office to present the same proposal of same product,” said Nicholas Yap, Director of Client Relationships for APAC at ICD Security Solutions, a Company of Convergint Technologies. “That will be a challenge, because I’m no longer that sure if I’ll get the best pricing from this manufacturer. I’m not sure there will be a privilege to the other company because they are under one umbrella. That’s definitely something that we would be worried about.”
49
BY William Pao
JUN 2016 Ɣ www.asmag.com
or security distributors, the market has become more competitive than ever due to the presence of more companies offering more choices for customers. “It’s getting tougher because you’re getting more players. You need to fight the price competition,” said Arnon Kulawongvanich, GM of Sales and Marketing at Bangkok OA Coms. “Normally we give customers a one-year warranty. But now with the competition, we give them extra six months or one year for free. In a lot of cases what we do is give them free after-sales service after the end of the warranty. Now that is extra costs on us,”
54
said Hylbert Chua, President of Alcon based in the Philippines.
IMPACT OF COMPETITION FROM CHINESE BRANDS A main reason for the cut-throat competition in the market is the prevalence of Chinese brands and products, which are offered at lower and lower prices. “The last few years, we saw Dahua, Hikvision, and many brands from China going into the Thai market. The last year I went to CPSE in China, I could buy a PTZ camera only for US$70 which was very cheap. For my main brand, the cheapest for PTZ is about $700,” said Bancherd Rachtapattanakul, Owner of Thai IP Camera. With Chinese products offered at low prices, it’s only natural for customers to select them. This is especially so in Asian markets where people are more pricesensitive. “To some clients, they would just say, ‘no other brands, except Hikvision,’” Chua said. “Is that a challenge for me? Yes,” said Wissawat Chotbenjakul, MD at Fit IT and Solutions based in Thailand. “When the customer wants something, they always
DISTRIBUTIONINA
COMPETITIVE BUSINESS LANDSCAPE
see the specifications sheet. The Chinese can write down anything.” “People are very careful. They don’t want to spend a lot,” said Mohamed Sirajudeen, International Sales Director at CMOS Dotcom based in Malaysia. “They just want to look for cheaper products. They just want to know how much less can I pay. That's a little difficult sometimes. When I see people, I tend to explain to them that they would want to invest in something lasting.” “In my country, the competition for us is Samsung, Sony, Panasonic and Axis. And then the Chinese companies came in two years ago, and now they are also getting brand awareness in Indonesia,”
said Johan Haryanto, Director of Hotware based in the country. “You can see several projects usually belonging to mid- to high- projects using products like VIVOTEK and Samsung, and now China companies also come in.” And even markets outside Asia have felt the impact of Chinese manufacturing. “In the Italian market you have some very historical brands, very important companies, but you have these big companies from China, and they are trying to give to the market their focus point,” said Alessandro Berio, MD at Videotecnologie. “If you try to fight Dahua or Hikvision with price, you lose.”
POOR CHANNEL MANAGEMENT Sometimes, the competition does not just come from China. It also has to do with the poor channel management by the vendor, especially the Asian ones, who deviate from the structured “two-tier” distribution approach and go directly to the systems integrator, leaving the distributor competing with the vendor. “The distribution business is becoming more challenging, especially with the
55
BY Israel Gogol, Freelancer
Storage is an important albeit often overlooked aspect of designing a video surveillance solution. Newer cameras and resolutions create an insatiable demand for more storage and storage costs can amount to 30 percent or more of project costs. New codecs and hybrid cloud storage can help reduce storage requirements. he prices of storage (price per GB) have been steadily going down for over 30 years. Terabyte drives are now available even to retail consumers. With such cheap prices, one would assume that storage will no longer be a consideration for video surveillance. Yet storage costs are still a fundamental part of surveillance projects. The advances in IP cameras require more and more storage. “I don’ t think that storage prices going down really had an impact on the overall macro. The cost of storage may have gone down 50 percent over the last three years but the quantity and image quality of cameras has gone up more than three times; where you used to have 1-megapixel before, now you see 3-megapixel, 4-, and even higher so the importance of codecs on the compressions and the chipsets is much more important than storage itself,” said Andy Hoang, COO of i3 International. Alastair McLeod, Group CEO of Veracity UK, voiced a different opinion. According to him, low storage prices mean that the need for more
JUN 2016 Ɣ www.asmag.com
MORE STORAGE OR BETTER CODECS, WHICH WAY SHOULD THE INDUSTRY CHOOSE? 60
Advances in surveillance storage systems and availability of larger and larger hard drives reduce the total cost of ownership of storage systems. The larger hard drives make RAID-based systems less attractive, but these are ideal for sequential storage systems, designed specifically for video surveillance,” he said. Lower prices mean that storage is no longer a bottle neck; this is an opportunity for systems to deliver more value. More storage at accessible prices allows buyers to retain information for longer periods of time and perform continuous recording. “In some instances lowering storage costs is an opportunity to raise the quality of the stored recordings especially as the use of video analytics increases,” added Jos Svendsen, Global Product Communications Manager at Milestone Systems.
HOW MUCH STORAGE DO WE NEED?
advanced compression is not as pressing. “We are already at that point! Look at the very slow take up of H.265. Advances in surveillance storage systems and availability of larger and larger hard drives reduce the total cost of ownership (TCO) of storage systems.
The standard recommendation regarding storage is to use the storage estimators provided by the camera vendors for better accuracy. Many manufacturers offer their own online calculators which often cover storage, bandwidth, power consumption or system requirements. However, considering the number of variable factors
involved, a calculator might not be enough. “The math is actually relatively simple, but there are so many different variables that go into the calculation: camera resolution, frame rate, compression technology, compression level, image complexity (scene activity and lighting conditions), percentage of motion, percentage of recording and expected retention time. You even have to consider variations across different cameras and DSP manufacturers, and whether any of these conditions will change based on an event (i.e., increasing frame rate or resolution during an alarm condition),” explained Brandon Reich, Senior Director of Surveillance Solutions at Pivot3. Jeffery Huang, APAC Surveillance Sales Manager at Synology, recommends conducting a field test. “In my experience, I often suggest customers to do a minimum viable test to calculate the storage their cameras need under certain circumstances (e.g., day indoor, day outdoor, night indoor, night outdoor). A good option is to record the storage for a day and then calculate according to the needed retention period. By doing this,
Bengt Christensson, Senior Director, Marketing, Ambarella Andy Hoang, COO, i3 International Jeffery Huang, APAC Surveillance Sales Manager, Synology Stefan Lundberg, Expert Technologies Engineer, Axis Communications Alastair McLeod, Group CEO, Veracity UK Jimmy Palatsoukas, Senior Product Marketing Manager, Genetec Brandon Reich, Senior Director, Surveillance Solutions, Pivot3 Jos Svendsen, Global Product Communications Manager, Milestone Systems
61
IP SECURITY SYSTEMS:
STEPPING STONES FOR CYBERATTACKS COMPILED BY the a&s editorial team (Source: SIA Education seminar at ISC West 2016)
The introduction of IP technology has made physical security systems – video surveillance, access control and alarm systems – susceptible to cyberattacks. However, the major risk lies not in an intruder seizing control of camera operations, but rather in their use of the physical security system as a stepping stone to obtain sensitive information inside the organization. An SIA Education seminar during ISC West attracted many attendees who came to listen to speakers from Tyco Security Products and Surveillance One discussing the topic.
n today’s connected world, IP-based security systems offer numerous breach points for cyberattacks. The vulnerability of these systems is quite a conundrum, so the biggest question is how we can make these physical security systems more secure.
RISKS ASSOCIATED WITH IP MIGRATION
JUN 2016 Ɣ www.asmag.com
Switching from analog to digital IP-based video surveillance systems can make systems more open. Although this move can benefit the users in many ways, the resulting system can pose as a threat to the organizational network. The reason is that IP-based security systems, whether it’s for video surveillance or access control, can run partially or entirely within the corporate network; thus, an unprotected system can become a “jumping board” for hackers to get into the private system.
66
POTENTIAL SECURITY BREACH POINTS This risk is not limited to the intruder taking control of the physical security system, but also includes the damage that can be inflicted when they gain access to the larger IT system. This understanding was one of the main conclusions made at the seminar. The risk and potential damage of an intruder exploiting the vulnerabilities inherent in a camera or VMS to gain access to other IT systems is the most serious aspect of cybersecurity as far as physical security systems are concerned. The first known cybersecurity attack that used this approach took place in August 2008 in Turkey. Unknown hackers took over the IP camera system guarding a British petroleum pipeline connecting the Caspian Sea to the Mediterranean. The attackers managed to hack into the system, disable the camera system and the alarm system, and then proceeded to manipulate the pressure in the pipeline until it exploded. To cover their tracks, the attackers deleted over 60 hours of video footage from the server. Luckily for the investigators, one infrared camera that was not connected to the same network captured the images of two men with laptop computers walking near the pipeline days before the explosion.
INADEQUATE SECURITY SYSTEM PROTECTION It is a paradox, but in many cases, operators neglect their physical security systems, making it less secure compared to other endpoints in the network. But if we take employees’ personal computers as an example, they are usually password-protected and the IT department makes it a point to regularly update security patches or change passwords. On the other hand, it is not uncommon to discover that the password for the video surveillance system is still the default one, one that
DETERMINING THE NEED FOR INCREASED SECURITY To circumvent possible attacks, many integrators add additional layers of defense. However, is it really worth the effort? To determine this, integrators can do two things: perform a balanced risk assessment that will evaluate the real risks their clients are facing or try to assign the risk an estimated monetary value.
RISK EVALUATION To estimate threat levels, integrators need to consider several factors: the intent and capabilities of the attackers, the vulnerabilities of the site and the consequences of such an attack. When there is a high threat level, integrators should alert their clients and make sure they make the needed changes to the size and scope of the project to ensure its security. For example, by deploying secure switches that can separate networks from one another and protect data transmission or use other hardened equipment to make sure it is harder to breach the network perimeter.
ESTIMATING MONETARY VALUE By assigning monetary value to risk, integrators and clients can keep costs under control and make sure they don’t “spend a million dollars on a 10,000 dollar problem.” The speakers recommended the following formula to estimate the monetary value of the security solution: Probability*Impact = Estimated Monetary Value. So for example, if the impact of an attack is the loss of 100,000 dollars, and the probability of an attack is 10 percent, then the monetary value of the solution is 10,000 dollars. In this case, investing more than that in securing the system might be overshooting.
can sometimes be easily accessed via a simple Google search. For IP cameras, an intruder can even walk up to the camera and use relatively simple technical tools to find out network details like IP addresses, user names, passwords and more.
CYBERATTACKS VARY IN TYPE AND STRATEGY Cybersecurity challenges are not theoretical but real and can lead to catastrophic failures. At the national level, the main threat of cyberattacks mostly comes from other nation states and terrorists. Nevertheless, there are also many criminals working independently. Common scenarios warn of cyberattackers taking over power plants or water facilities and bringing the country to a standstill. This scenario became a reality in December 2015 when a cyberattack caused a huge power outage in Ukraine, affecting 225,000 residents. Hackers installed malware that allowed them to remotely switch breakers in a way that enabled them to shut down the power grid. The attacks can take many forms. They can be as rudimentary as walking up to a camera and connecting to it physically. Conversely, they can be sophisticated operations like zero-day exploits, where attackers take advantage of security holes in the software that vendors are not aware of.
67
SMAhome
WHAT WE LEARN FROM THE HISTORY OF PCS TO MAKE THE RIGHT CHOICES FOR SMART HOMES By Dr. Christian Paetz, Z-Wave Europe (Originally published in a&s SMAhome issue 14)
JUN 2016 Ɣ www.asmag.com
Looking back into the history of the industrial world from the advent of the steam engine in the early 19th century, there is a clear pattern that describes how new technologies get deployed and how new markets are created. The most recent of these patterns – and certainly the only one a lot of us may remember – is the success story of the personal computer (PC) that created a whole new industry called Information Technology. What can the smart home market learn from this story? The smart home market has a very dynamic environment. Not only did the general market size grow with very solid double-digit figures, there is also a lot of churn rate in terms of brands, technology, companies and even business models. While this is quite normal for early technology markets where the players are still looking for the right way to maximize their business success, it makes it quite hard to form business predictions and make the right decisions to be ready for growth in the next few years. Fortunately this is not the first time in history a market is placed in this condition. The current situation in the smart home industry can be compared to that of the PC marketplace in the early 80s. IBM had just launched the personal computer, the first applications were available and people started to look at how they can start their own businesses based on this new device. In a remarkably short period of time, a whole new category of business was created – the so-called value added resellers. They were people with sufficient
70
technical knowledge that drove up PC deployment into the market by combining different parts of the solution – like printers, monitors and software – and selling them to early adopters of this new information technology. By no means was this an easy time, but a lot of companies that started in this interesting time became quite large and successful later on when the PC market became mainstream. It is interesting to note that in the early 80s, it was anything but clear that this technology platform would become the de-facto standard of the industry. Besides the more business-oriented and ugly IBM PC, there were also brands like Apple, Atari, Commodore, Sinclair, DEC, and Wang, to name a few. With the exception of Apple, younger people do not even remember the other names anymore. The IBM platform won the race but why? IBM did one thing right which was not to do anything to prevent other companies from using their platform. It opened up the ISA bus for third-party additions and did not block Microsoft from selling its MS-DOS to everybody. These two decisions helped turn the IBM platform, one of the pure vertical offerings of the early PC age, into an open ecosystem. A whole new industry, mainly located in Taiwan, was created around making all kinds of additions to the IBM system. The Western world was more focused on software applications, but they were all using the Microsoft OS as the common base to allow free exchange of software and files between different systems all based on a disk operating system (DOS). This was the very same ecosystem that saw a boom in new vertical offerings by both small and big companies, which helped create one of the most competitive, innovative and creative industries that lasted for several decades. On the other hand, those that featured closed solutions disappeared from the market. Looking at today's smart home market, we can see a very similar pattern. Again,
the majority of offerings aim to provide a complete solution under one brand, using a more or less proprietary technology based around a communication protocol and user interface. There are plenty of attempts from various industry players to unify the communication world and the user experience. Initiatives like Mosaiq, Brillo, Homekit (Apple), Thread, Alljoyn are providing more or less commercially driven platforms and it was expected that the early suppliers of the industry will adopt their architecture. So far none of these initiatives have reached any relevance in the market and this is due to several reasons. One reason is that these platforms usually replace a part of the functions existing offerings already have. Additionally, most of these offerings come from initiatives or companies that lack sufficient real-user experience in the smart home world to come up with offerings compelling enough to replace existing customer-proven systems. Lastly, these initiatives do not exhibit creativity nor innovation. One of the technologies that seem to be more and more adopted by smart home companies in the market is called Z-Wave. Technically Z-Wave is just one more wireless communication protocol based on the ITU Standard G.9959. It tries to copy the success pattern of the early PC days. Due to its strict certification program that only allows 100-percent interoperable devices to hit the market, it forced different companies with different products to work together in one single smart home system. All Z-Wave devices use one standardized ASIC (provided by either Sigma Designs or Mitsumi) and a standardized communication library (equivalent to the MS-DOS). This ensures that the underlying communications infrastructure is stable and interoperable. Every company – with different expertise in different domains of the smart home market like heating, lock, security, lighting, shades etc. – can differentiate their own
We see similarities between the Z-Wave ecosystem and the early PC industry, whereby both allow little companies to flourish in an ecosystem that provides a full solution.
products by design, price and function. But in terms of interoperability, they all have to meet certain requirements. So as long as the functions are related to interoperability, they have to meet certain requirements. In Z-Wave, they are called device profiles and this is equivalent to the IS bus where companies were free to make any kind of device as long as they did not mess up the signal exchange on the ISA bus slot. If history repeats itself, we should see this setup foster the creation of new product offerings and lead to better products at more attractive prices. It is certainly too early to tell but we already witnessed the introduction of more than 1,500 different devices to the market thus far, from companies that have adopted Z-Wave. The good thing about this is that the interoperability statement of Z-Wave was not an empty promise, it can be validated by its impressive track record. We see similarities between the Z-Wave ecosystem and the early PC industry, whereby both allow little companies to flourish in an ecosystem that provides a full solution. At the moment it is too early to see who will be the Compaqs, Dells, Acers and Toshibas of the smart home marketplace. However, by looking at the PC market, we can predict that they will not be based on proprietary technology, but rather on an ecosystem of complementary offerings. The exit of vertical proprietary systems in the PC industry took almost two decades (Sun Microsystems was the last one, surviving to the mid-2000s) but it was inevitable. Z-Wave has been out in the market for more than a decade already but has only reached limited market penetration. The PC market shows us that there is a certain inflection point where the move from proprietary to open ecosystems dramatically accelerates. Looking at the current adoption rate of Z-Wave by OEM manufacturers, integrators and sales channels, this inflection point may be closer than we all thought.
71
Elika 2101 Commercial Wireless Access Control and Telephone Entry System
Iris Digital Video System Eyz-On Camera Video Recorder
KMT SASO RB-100F Intelligent Radar Detector
Features:
Features:
• Ready to connect to VoIP, Wi-Fi, BLE and 3G/4G cellular • 10.4” full color HD display and full alphabet keyboard • Forced entry security shutdown feature • HD and night vision-enabled camera • IP65 certified enclosure • No software installation required
• • • • • •
• Frequency modulated continuous wave (FMCW) • Maximum detection distance 100 meters • Detection distance information • Human detection probability more than 99 percent • High immunity against noisy outdoor environment • Low false alarm rate on small animal events
■ Elika Access Systems/U.S. ■ Email: info@elikaaccess.com
Full-featured digital video recorder Advanced high-sensitivity IP camera Motion and surveillance recording Quick and easy programming Standard 32 GB storage Built-in 2 port switch
■ Iris Digital Video Systems/U.S. ■ Email: seethelight@iris-dvs.com
Features:
■ KMT/Korea ■ Email: overseas@isaso.com
American Dynamics victor VMS Features: • Designed to handle HD and megapixel cameras and manage real-time alarms and events • Includes advanced policy management, health monitoring, smart search and instant playback • Local storage video vaulting and external storage archiving • Heat mapping shows foot traffic patterns and consumer shopping activity
• Grants and restricts access to all features within the victor unified client by operator roles • Portable operator access from LAN, WAN or location to location ■ American Dynamics (Part of Tyco Security Products)/U.S. ■ Email: customerna@tycoint.com
TVS Infrared Thermal Imaging IP Camera 300/600 Series
Axis P1244 Network Camera
Features:
• HDTV 720p and 102-degree horizontal field of view • Easy, highly discreet installation • Axis’ Zipstream technology • Built-in microSD card slot • PoE
• Uncooled FPA with 640 x 480 pixels or 384 x 288 pixels • Clear and sharp resolution • IP66 enclosure rating for outdoor applications • Ethernet output • CVBS output (NTSC/PAL) • Video and power surge protection ■ Thermal Vision Systems/Korea ■ Email: james@tvscorporation.com
Features:
■ Axis Communications/Sweden ■ Email: axis-sap@axis.com
Anviz P7 PoE-Touch Fingerprint and RFID Access Control Features:
JUN 2016 Ɣ www.asmag.com
• Uses Anviz intelligent core algorithm • 3,000 fingerprints, 3,000 cards, 50,000 records • Optical waterproof fingerprint collection device, abrasion resistance, adapts to all kinds of fingerprints • Touch activation fingerprint sensor and keypad • Supports PoE power supply for both device and lock • RS485, mini USB and TCP/IP communications, Wiegand output ■ Anviz Global/U.S. ■ Email: sales@anviz.com
74
Grundig GRN-M1232N 32 Channel H.264 NVR
Dallmeier IPS 10000 SMAVIA Recorder
Honeywell H4D3PRV2 Performance Series IP Camera
Features:
Features:
Features:
• Local user interface on 3 video outputs, with independent multivision • Digital spot function to stream the CVBS spot monitor into network • Hot spare mode – working as failover server for another GRN • Multiplex (live/playback, recording, backup, networking) • Various recording features (normal, schedule, motion, alarm) • Controlled locally by USB mouse or remotely through Ethernet connection with CMS, web page and smartphone
• SMAVIA recording server appliance • Up to 100 audio and video channels • Storage system with JBOD option • Open platform • Rack mount • 3 RU
• 3 MP (20 fps) and Full HD 1080p (25/30 fps) image with 1/3” 3 MP sensor • True day/night capability, vivid color pictures by day and clear black-and-white pictures at night with mechanical IR cut filter • Low light capability with 3D noise reduction, saves storage and bandwidth with H.264 high profile codec • IR LEDs provide up to 30 meters of illumination in dimly lit night time scenes, depending on scene reflectance • Smart IR technology for even distribution of IR • Waterproof (IP66) and IK10 vandal-resistant camera housing
■ Dallmeier electronic/Germany ■ Email: info@dallmeier.com
■ Honeywell Security and Fire/U.S. ■ Email: comments.security@honeywell.com
■ Grundig Security/Germany ■ Email: info@grundig-security.com
ZKAccess Wireless Bridge Features: • 2.4 GHz wireless system with up to 300 foot range with nearest wireless router • Password verification, MAC address authentication, SSID suppression and advanced WPA encryption • Wireless bridge has built-in web server – no software or drivers needed • Low power consumption and up to 15kV electrostatic discharge protection
Geutebruck Security Management System G-SIM 5.1 Features: • Suitable for medium- to large-sized video security systems • Customizes dynamic maps • Powerful alarm management • Manipulation-proof exported files • Provides overview of entire security infrastructure, from process control to facility management ■ Geutebruck/Germany ■ Email: info@geutebrueck.com
• Power on LED, Ethernet link LED and signal strength LED • Appears to network devices as if an Ethernet cable is connecting the two network nodes ■ ZKAccess/U.S. ■ Email: sales@zkaccess.com
Wavestore VMS 6 Features: • Simultaneous view, control and management of live video, recorded footage, and integrated devices, all from one screen • Provides greater flexibility by enabling cameras to be fitted onto angled surfaces • Full SDK integration with ImmerVision lenses and Oncam cameras • Improved support for larger systems • Intelligent failover ■ Wavestore/U.K. ■ Email: info@wavestore.com
Genetec SV-32 v2 Hybrid – Analog and IP Network Security Appliance Features: • Built-in analog video capture cards guarantee a seamless transition to a networked video surveillance system • Can be used as a unified server and client workstation for both view and recording • Embedded SV control panel, a series of configuration wizards and an automatic update tool allows for rapid deployment • Systems scalable with up to 16 TB onboard storage • Offers 3-year hardware and software warranty ■ Genetec/Canada ■ Email: info@genetec.com
75
Companies in This Issue Products of the Month • AUGLLE • V5 SYSTEMS Vertical Solution • ATHENA (MER GROUP) • HONEYWELL SECURITY AND FIRE • IOMNISCIENT • IPSOTEK • QOGNIFY Integrated System • DAHUA TECHNOLOGY • HIKVISION DIGITAL TECHNOLOGY • NEDAP MOBILITY SOLUTIONS • SIEMENS • STREETLINE Special Feature • ADP TECH
• • • • • • • • • • • • • • • • • •
ADTECH SYSTEMS ALCON BANGKOK OA COMS BRIGHT OCEAN CMOS DOTCOM D-FLEX STRATEGIC SOLUTIONS E-GOZLEM EXPRESS SYSTEMS FACILITY MANAGEMENT FIT IT AND SOLUTIONS GAMMA SOLUTION HOTWARE ICD SECURITY SOLUTIONS JAWAD ELECTRONICS LEVEL NETDOC PROSYSTEMS SMART HOME SAFETY EQUIPMENT
Next Issue
• • • •
THAI IP CAMERA THANO TECHNOLOGIES VIDEOTECNOLOGIE ZARJA ELECTRONIKA
Smart Technology • AMBARELLA • AXIS COMMUNICATIONS • GENETEC • I3 INTERNATIONAL • QNAP SYSTEMS • SYNOLOGY • VERACITY UK • VIVOTEK Industry Report • SURVEILLANCE ONE • TYCO SECURITY PRODUCTS
Integrated System
Smart Device/Software
VISITOR MANAGEMENT SYSTEMS (SMART COMMERCIAL BUILDINGS)
LENS
Vertical Solution EVENT VENUES
77
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY E-MAIL
47
BOSCH SECURITY SYSTEMS
CCTV
GERMANY apr.securitysystems@bosch.com
21
CHENGDU POWERVIEW SCIENCE AND TECHNOLOGY CO., LTD. SURVEILLANCE
CHINA
dennis@powerview.cn
10
COMMAX CO., LTD.
SURVEILLANCE
KOREA
pcy@commax.co.kr
SURVEILLANCE
CHINA
overseas@dahuatech.com
CHINA
sales@fjsmt.com
INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD. 77
FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD. DOME COVER
11
HI SHARP ELECTRONICS CO., LTD.
CCTV / DVR / MONITOR / IP CAMERA / HD-SDI / TVI / AHD TAIWAN
sales@hisharp.com.tw
5
HDPRO CO., LTD.
CCTV
KOREA
sales@hdprocctv.com
BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
17
IDIS CO., LTD.
SURVEILLANCE
KOREA
sales@idisglobal.com
4
MEERE COMPANY INC.
CAMERA
KOREA
sales@cube-eye.co.kr
26, 27
QIHAN TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
marketing@qihan.cn
2
RIFATRON CO., LTD.
DVR
KOREA
contact@rifatron.com
33
SAMSUNG (HANWHA TECHWIN CO., LTD.)
CAMERA / DVR
KOREA
apriler@samsung.co.kr
63
SHENZHEN COMMANDER TECHNOLOGY CO., LTD.
CASING
CHINA
sjw@yjdcase.com
12, 13
SONY SEMICONDUCTOR SOLUTIONS CORPORATION
SEMICONDUCTOR
JAPAN
-
INSIDE BACK COVER
TAMRON CO., LTD.
CAMERA
JAPAN
newbiz@tamron.co.jp
6
TECHPOINT INC.
CHIPSET
USA
dma@techpointinc.com
15
VIDEOPARK TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@videopark.com.cn
7
VIDEOTEC S.P.A.
IP CAMERA / SOFTWARE / VIDEOSERVER
ITALY
info@videotec.com
19
VIVOTEK INC.
IP CAMERA / SOFTWARE / VIDEO SERVER
TAIWAN
sales@vivotek.com
3
WEBGATE INC.
DVR
KOREA
support@webgateinc.com
9
ZEEANN CO., LTD.
CMOS IMAGE SENSOR
KOREA
sales@zeeann.com
INTRUSION ALARM PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY E-MAIL
8
KMT CO., LTD.
ALARM
KOREA
overseas@isaso.com
ACCESS CONTROL PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY E-MAIL
41
GIGA-TMS INC.
RFID MODULE / LOCK / READER
TAIWAN
promag@gigatms.com.tw
79