CONTENTS
Mar 2016 www.asmag.com
iNtegrated systeM
What is Prerequisite for
Intelligence
VMS in a
Scalability
City Surveillance Project
Integration
............................... 40
Usability
News Feature
Honeywell-UTC Talks May Have Failed, but Market Still Up for Mergers......................................... 24 P. 40
Market update
Middle East Tests the Flexibility of Global Solution Providers ................ 26 Improved Public Services Accelerates Identity Authentication in Middle East ......... 34 sMart techNology
Alarms Seek a Makeover for Smarter Security ................................... 46 Vertical solutioN
Modern ATMs Get New Layers of Protection ....................................... 52
P. 46
iNterNet oF thiNgs
Beacon Technology Provides Better Shopping Experience............... 55 ViewpoiNt
Creating Stable Ethernet Transmission for IP Surveillance in Retail Chain Stores ........................... 60 sMahoMe MAR 2016 â—? www.asmag.com
New Directions in Smart Home at CES 2016 .......................................... 62 Contents..................................................14 Editor’s Note ...........................................16 Application Cases...................................18
14
P. 52
Products of the Month............................22 New Products .........................................66 Show Preview .........................................72
P. 55 Show Calendar .......................................73 Companies in This Issue.........................75
a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.
ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄
Who is Your Best Partner?
John Shi
Executive Editor-in-Chief
Hubert Duh Charlie Wong
Managing Director / Publisher General Manager
Editorial
got a chance to talk to a major distributor in the Middle East in January. Some interesting discussion between us was surrounded by their criteria to select their manufacturing “partners.” Our conversation made me recall that in the past, when IP wasn’t that widespread in different projects and areas, the conversation between buyers and suppliers was usually about product specifications and its unit price. And then the buyers might try to find the best features or specifications by comparing all their selections. However, their buying behavior and mindset have changed a lot, and I would say gotten much more complicated, especially facing IP installations and complex integration of multiple systems and different brands in a large-scale project. That is why major security buyers now focus more on how to find long-term “partners” instead of just “box-moving” products.
MAR 2016 ● www.asmag.com
This value-added distributor told me that his focus is always on innovative solutions and how the brands can ensure the best compatibility and interoperability in a system to provide overall security — secondly, it would be the manufacturer’s local support toward their own products and then projects. His statement is quite true to the security business in the Middle East, which has the most advanced IP solution installations in the world.
Being innovative can probably be evaluated by software features and the challenges they can solve in certain applications or special, critical environments. I would say, the most difficult challenge might be the assurance of compatibility and interoperability. Even though some companies might say their systems can be easily integrated with their API or are compatible with current standards like ONVIF or PSIA, 100-percent integration is still very questionable. That is why this value-added distributor helps their customers, who are also considered to be their partners too, from pre-sales, design to product selection, even if some of the products are not from them. While selecting brands for their partners, this distributor also pays a lot of attention to the compatibility between the brands they represent here in this region. When IP starts to be installed in all different projects, suppliers and buyers do need to think more comprehensively and evaluate partners to make sure they can offer something valuable to their customers. Hope you enjoy this issue!
Editor-in-Chief Senior Consultant Senior Editor Reporter Reporter Reporter Reporter
as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com
Executive Designer Designer Designer
gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com
Manager
george.chang@newera.messefrankfurt.com
Art Design
Gaven Lee Mao Chang Arthur Wu Circulation
George Chang Michelle Chu
Marketing Coordinator michelle.chu@newera.messefrankfurt.com
Corporate Management
Collins Yuan Thomas Pin Chihung Lee
Group Manager Account Manager IT Manager
collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com
Manager Product Manager
willy.wang@newera.messefrankfurt.com jessica.yang@newera.messefrankfurt.com
Trade Fair Manager Project Manager Project Manager
echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com sandra.chen@newera.messefrankfurt.com
asmag.com
Willy Wang Jessica Yang Secutech
Echo Lin Eva Tsai Sandra Chen
International Advertising [Headquarters]
Juihui Lin Kay Yang Audrey Fang Nori Chang
Manager Operation Officer Coordinator Coordinator
juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com
[Branches & Representatives]
Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana
U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia
bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru
Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices
jill.lai@newera.messefrankfurt.com
16
General Press Jill Lai Alf Chang Eifeh Strom William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin
ApplicAtion cAses
>> Residential
Arecont Vision Secures US Residential Community
MAR 2016 ● www.asmag.com
Homeowners in Sherwood Lake Club, a private residential community in Kansas, have been subject to neighborhood mischief, pranks, and serious acts of vandalism. Residents are increasingly employing Arecont Vision’s megapixel cameras to address these issues. One such case is Tom Thomas, whose original high-definition analog camera system was plagued with issues such as poor image quality affecting facial recognition and nighttime image capture. When presented with the option of adding IP cameras as part of his security system upgrade, he decided to install Arecont Vision’s 3-megapixel cameras. The cameras proved to be the perfect solution for the front and side yard of his home. The cameras provided 360-degree, high resolution coverage of the 1-acre lot. Additional 2-megapixel cameras solved the problem of capturing the make and model as well as the license plates of fast moving automobiles. All images are then recorded by an OnSSI Ocularis-IS video management system. Since the system was installed, local law enforcement officials have used the captured images to help identify suspects and enable them to make actual arrests.
of new card access technology from Nedap Identification Systems. This security demonstration pilot is the first of its kind in the United States to include both long-range door and vehicle access technology from Nedap. The campus implemented a hands-free door access solution which enabled extended range authorization on a passive credential. A small form factor reader, the uPASS Access, which can be easily mounted on a standard door mullion was deployed, allowing for reading of credentials from up to two meters. These performance capabilities facilitated hands-free access authorization, making high throughput portals flow freely while maintaining security protocols. Nedap also installed long-range vehicle access readers and tags for Hollister’s school buses. This technology ensured that only authorized drivers driving an assigned district vehicle can enter or leave the premises and prevented vehicles undergoing maintenance from exiting the yard before it is released for service. In addition, the system creates a record of every event and documents which drivers were driving what vehicles on any given day.
Source: Memphis Daily News
>> Law Enforcement
Hikvision Aids Memphis Police Department
>> Education
Nedap Improves Security for US School District The Hollister school district in Missouri decided to upgrade its campus access control system with the addition
18
Panama, is comprised of 135 buildings spread over 37 acres. They required a system that can provide 24/7 operation all year round and is flexible and scalable enough to accommodate ongoing changes and expansion. AMV International Development, who was subcontracted for the project, selected Pelco by Schneider Electric’s video surveillance system for this installation. The video surveillance system incorporated a mix of nearly 900 fixed cameras as well as enclosures, camera dome, and PTZ dome systems. Deployed Sarix cameras featured SureVision technology, wide dynamic range with low light, and anti-bloom capabilities, all of which ensured good images under complex lighting conditions. Spectra HD integrated high-speed dome positioning systems allowed for responsive 360-degree continuous pan rotation for precision and fine control. All the video is fed to no less than six different control and storage rooms where the information is monitored, analyzed, and archived. The Endura IP video management system was chosen for this project for its reliability and around-the-clock monitoring capability. Customizable permission settings and unlimited user profiles enabled multiple access, driving greater return on security investment.
>> Public Services
Pelco Helps Secure New Panamanian Prison
La Gran Joya, a correctional facility in
The Memphis Police Department (MPD) in the U.S. wanted to explore ways to further protect the city’s critical infrastructure assets and eventually decided on a mix of three configurations: pole cameras, cameras attached to buildings, and mobile trailers employed at designated spots. Currently, the police department has established a network of around 600 of Hikvision Digital Technology’s analog and IP cameras throughout the city. The footage from these bullet and dome PTZ cameras, which were placed at various strategic points around Memphis, flows
back to the MPD Real Time Crime Center (RTCC). For the pole cameras, an enclosure was created to house the cameras and all of their related equipment: a DVR or NVR, an encoder, a power supply, and a router. The local Wi-Fi system enabled officers to pull up to an enclosure, connect to the network, and discreetly pull data without even exiting the car. Additionally, MPD has invested in mobile trailers that are each powered by generators or solar energy and equipped with two cameras. Officers in the RTCC use this to monitor and respond to events occurring at parking lots, malls, and special events.
>> Oil and Gas
Synectics to Protect Italian Onshore Project
Synectics surveillance solutions have been deployed as part of safety and security operations at the Tempa Rossa onshore development in southern Italy. The US$1.9 billion project — a joint development between Total and Shell — comprises eight production wells, a new oil processing center, an LPG storage center, and updated utilities/distribution infrastructure. Along with Synergy’s Command and Control platform, the end-to-end solution incorporates over 80 COEX camera stations (fixed and PTZ) with access control, intruder detection systems, integrated control, and safety systems. The surveillance brief also required full integrated factory acceptance testing prior to deployment. The support provided ensured that
high-quality, live or recorded visual data can always be paired with incident detection alarms in order to investigate and initiate response procedures. Whether triggered by people or processes, alerts will immediately prioritize image feed from the nearest available cameras. Synergy will also generate scenario-specific workflows to guide operators through appropriate protocols. Additionally, Synectics created macros to allow the operators to analyze “operation-ready” integration performance at the site.
>> Government
Teleste Secured UN Climate Convention in France
Teleste’s S-VMX mobility platform and Command and Capture application were used to protect the UN conference on climate change (COP21) in Paris which was attended by 180 chiefs of state and government officials, as well as 50,000 participants. On top of allowing police mobile teams to access the Paris video surveillance system and all its regular cameras, the platform offered additional access to video sources deployed specifically for the conference: drones, captive balloons with long-range cameras, and helicopter cameras. The platform offered different possibilities and functions for mobile operation, including push HD video from operating centers to mobile devices, control of mobile cameras from tablets, and high-quality video live streaming. Police officers were able to take video clips from their phone cameras and store
it in the central recording platform on the fly as evidence material, as well as localize phones and tablets in real time on georeferenced maps, together with camera control and positions. Based on an intelligent secure portal access, the platform was secured with the best of cryptographic technologies: PKI with RSA and multi-factor authentication, TLS, Blowfish, and AES.
>> Retail
March Networks Solution Used by US Global Retailer
Global lifestyle brand Cole Haan has selected March Networks and Diebold for an enterprise-class video solution that will help enhance security and resolve liability claims in all of its 117 North American locations. Acting on Diebold’s recommendation, Cole Haan decided to standardize on the March Networks’ intelligent video solution to replace a variety of older surveillance systems that were performing poorly and were increasingly costly to maintain. The new solution addresses all of the retailer’s key requirements, such as enabling the loss prevention team to conduct investigations remotely from its headquarters via the video management software. It also provided local control at the store level so managers can review video recorded at specific locations and download evidence for law enforcement immediately if an incident occurs. Currently, 90 stores are equipped with a March Networks hybrid NVR that captures videos from an average of eight surveillance cameras installed behind point-of-sale (POS) terminals, throughout the sales floor, in backroom offices, and at receiving doors. The recording platform allows for easy upgrading to high-definition or megapixel IP cameras if required.
>> Retail
Verint Systems Enhances US Retailer Operations
Boot Barn, America’s largest Western and work wear retailer, deployed Verint Systems’ video and situation intelligence solutions at various retail store locations to enhance operations and loss prevention efforts. With Verint EdgeVMS Vid-Center, field and loss prevention leaders can view live
19
Smartphones Can Now Provide Extra Protection for Lone Workers
Editor’s Note:
Look around and you will see nearly everyone with a smartphone in their hand. With the ever-growing number of smartphones being introduced in the consumer world, it won’t be long before we start to see more and more developers incorporating the use of smartphones for security applications. Without the need to purchase additional equipment to fulfill the user’s security requirements, smartphone apps or a dedicated smartphone itself may become a great solution for lone workers, who require extra security in remote areas, and could save valuable time with instant communication to base.
Eviid SEcurE viSual confirmation SmartphonE app
E
viid is a unique, patent-pending technology designed specifically for use in remote or hostile environments due to its evidential technology and reliable connectivity even via low-bandwidth satellite link. Eviid makes smartphone footage suitable for capturing or streaming business-critical, sensitive, or evidential information. In addition, all Eviid footage and metadata is tamper-evident, compressed on average 15-fold, and shared and stored securely in a controlled environment. • Automatically adds contextual data (time, data, GPS location, etc.) to each frame like a watermark, making it impossible to alter footage or metadata without leaving a trace • Footage compressed up to 20-fold before transmission for faster transfers • In critical situations, Eviid footage (live or recorded) can provide the visual confirmation Supplier: YRfree Technologies
needed by authorities to deploy help quickly • Allows for instant two-way video communication • Can work as a distress signal, transmitting video of a situation automatically along with positional data — either live or at the next possible opportunity • Works in low-bandwidth environments URL: www.eviid.com
cat S60 SmartphonE With intEgratEd thErmal camEra poWErEd by flir
T
he Cat S60 is the world’s first smartphone with an integrated thermal camera from FLIR Systems, allowing Cat phone users to be the first in the world to use their smartphone for a multitude of use cases, including: detecting heat loss around windows and doors, spotting moisture and missing insulation, identifying over-heating electrical appliances and circuitry, and seeing in complete darkness. • Strengthened die cast frame • Drop-proof to 1.8 meters, MIL spec 810G • Underwater 13-megapixel main camera with dual flash, 5-megapixel front-facing camera • Dedicated FLIR thermal camera app with MSX technology Supplier: Cat Phones
• Provides changeable heat palettes, temperature spot meter, and minimum, maximum, and average temperature data • Optimized battery performance (2,800 mAh)
URL: www.catphones.com
StaySafE buSinESS app
S
MAR 2016 ● www.asmag.com
taySafe Business is a smartphone app that can track the location of lone workers in real time and enable them to check-in safely after meetings, traveling, and lone-working sessions, whilst employers have full visibility through a secure, online hub — a web-based mapping portal which displays the location of each lone worker and updates in real time as workers change location. If a lone worker fails to check-in safely, the app will trigger an alert, which will be instantly received by the online hub as a pop-up alert. • The online hub locates the lone worker’s location on a map and provides real-time updates on their movements • A panic alert can be triggered by a lone worker at any time • Opt to receive SMS text or email notifications when staff is not in front of the computer • Set up alert management procedures within the hub to provide anyone monitoring lone workers Supplier: Safe Apps (StaySafe)
22
with a written procedure to follow, in the event of an alert • Note-taking feature: staff responsible for resolving alerts can add a note to any alert that is triggered • Can access all historical tracked sessions for every mobile app in the organization to give full visibility of the locations visited and any alerts triggered for each specific employee
URL: www.staysafeapp.com
Honeywell-UTC Talks May Have Failed, bUT
Market Still Up for MergerS
BY Prasanth Aby Thomas
recent reports of Honeywell’s intention to strike a deal with UtC that did not see the light of day strengthen market speculations on more M&a activities in the security industry.
MAR 2016 ● www.asmag.com
ergers and acquisitions (M&A) in the security industry have been grabbing headlines in the recent months. Close on the heels of Johnson Controls’ merger with Tyco International, reports revealed United Technologies (UTC) was in talks on a deal with Honeywell International over the past year, but pulled out due to regulatory concerns. Had the deal gone through, the result would have been a mammoth conglomerate with combined revenue of over US$90 billion and an overarching presence across different sectors including physical security. Such prospects could have given rise to doubts on the deal passing the antitrust review. Even if it did in the U.S., it wouldn’t take a skeptic to remember the ill-fated deal between United Technologies and General Electric that failed to go through the European Commission in 2001. Both companies now indicate there may not be any more talk on the matter, but that has not stopped Honeywell from going ahead with other M&A plans. Confirming the general market speculations that companies are actively looking at
24
options to tie up and strengthen their presence, in March, Honeywell said it bought the Francebased intrusion detection company RSI Video Technologies. The newly acquired company is expected to further strengthen Honeywell’s intrusion and alarm offering. This follows the company’ s agreement to buy the smoke detection and video security company Xtralis for $480 million from funds advised by Pacific Equity Partners and Blum Capital Partners in February. After the deal, which is expected to close in the second quarter, Xtralis would become a part of Honeywell Security and Fire, which is part of its automation and control division that covers about a third of its revenue. Xtralis’ smoke detection solutions secure several large companies, iconic sites, and critical infrastructure. The company pioneered the development of very early warning technology that can detect smoke in a facility at an early stage of a fire, which gives emergency responders additional time to help prevent or minimize damage. Headquartered in Dublin, Ireland, it has employees across Europe, Middle East, Africa, Asia Pacific, and the Americas, and over 30 years’ experience in the security field. Honeywell expects the deal to boost its presence in the market of providing security to critical infrastructure and high-value assets. “The acquisition of Xtralis will enhance Honeywell’s very early warning smoke detection portfolio, and bring unique capabilities in remote visual verification of fire and intrusion risks, advanced perimeter security technologies and video analytics software,” said Bruce Eric Anderson of Honeywell Automation and Control Solutions. “Xtralis strengthens Honeywell’s security and fire portfolio for critical infrastructure and high-value assets, and will benefit from Honeywell’s global scale and channels.” These acquisitions could also indicate Honeywell’s strategy for growth at the moment, since its recent profits had come from reduced costs rather than higher sales. Profits for the quarter ending December 31 were up 24.9 percent as expenses dropped 8.6 percent, while revenue fell 2.8 percent. In the markets, speculations abound on which companies would make the next move to join hands. A step from any of the major security manufacturers will have significant ramifications for the concerned distributors and systems integrators. M&As are an unavoidable part of modern businesses, the only question would be who comes out with the winning hand.
Middle East Tests the The biggest issue for the Middle East region lately is related to the shrinking oil price, rising terrorism threats, and regional conflicts. Economically, the region is experiencing difficulties, which does create some challenges for its security business. a&s interviewed some major security solution providers at this year’s Intersec to see how they are responding to their customers’ concern.
MAR 2016 ● www.asmag.com
he Middle East (ME) region has always been a promising land favored by investors from all over the world. Its leading petroleum reserve has made some countries, especially in the Gulf Cooperation Council (GCC), some of the wealthiest countries in the world since the 1960s. It is hard to imagine a modern city like Dubai was a small harbor city for fishing, pearling, and sea trade. Utilizing its oil and tourism income
26
to spur local infrastructure, such as roads, highways, telecommunications network, and public transportation, the region’s customers never need to compromise because of their budget. Albert Ryu, President and COO of IDIS said, “There are very fast projects. Unlike in the U.K., you
might have six months to respond to a tender; in the Middle East it can be six days. Customers want project specifications very fast, and very fast installations. So it is very fast moving market.” However, the situation has changed
Flexibility
BY Jill Lai
of Global Solution Providers
in the past three years and will continue to change in the coming years as these countries find a way to reduce its dependence on their oil revenue, which has decreased as a result of the oversupply of oil, decrease in global demand, increase in competition with US players, and strong US dollar.
ME SEcurity MarkEt GrowS DESpitE EconoMic Difficulty According to the International Monetary Fund (IMF), the average fiscal deficits of GCC members are expected to reach 13 percent of their GDP. Saudi Arabia faces a deficit of 21.6 percent in 2015 and 19.4 percent in 2016. The plummet of oil prices has caused a headache for GCC members.
Fortunately, security investment from local governments still remains high. The Sales Manager of Optex Europe said, “Government projects and royal projects will still continue to grow because there is a huge fear of terrorism. Certainly in the Emirates, we are seeing a higher level of interest in putting added layers of security in the royal
27
Improved Public Services Accelerate Identity Authentication Adoption in Middle East In addition to video surveillance, solutions for personal identification and access control are also in high demand in this region. This demand is usually driven by the local government’s plans to improve public services, with which includes identity verification for extra security. BY Jill Lai
MAR 2016 â—? www.asmag.com
o build a safer city, countries like the U.A.E. pay much attention to applying new technologies to improve its public services. For instance, civilians have to provide fingerprints for their passport and ID cards for personal identification. An Emirates ID card is also required when a member of the general public needs to go for any government purposes, such as health care institutes or others, or to board a plane, open a bank account, or check in to hotels. Since the use of the ID card is widespread, multiple identity management solutions have
34
been introduced to this region. David Massad, Marketing Leader of the Traffic Safety and Security Division at Security & Graphics Business Group in 3M Gulf provides an example with their latest solution in hospitality. For example, in hotels when guests are checking in, they ask for their passport. Instead of taking a copy and then a note of all the information from the passport, the hotel can scan it and automatically, with the software their partner has, it will pick up all the information and display it on the screen. It is very convenient for the hotel without doing extra paperwork. According to the company, since the introduction of the system, the government has started to ask some hotels to have the document reader ready at their desks. The government is very likely to be automatically connected to the hotel, so this document reader is very important for them. In addition to that, it can also identify if the ID is a fraud. The region also needs more advanced identification solutions for government agencies. Hadi Rabie Omer, Sales and Marketing Director for the Systems and Solutions Division at Emirates Photo Marketing (ePM), a systems integrator and reseller of access control and identification systems in Dubai, pointed out the
trend for identification solutions in public services. He said, “We think the portable identity verification solutions will be the future development, for the government agencies, such as ports, immigration, or health insurance. We have an anti-copy barcode solution, which uses mobile biometric verification by barcode, with which you can put the person’s fingerprint or his photo inside the barcode offline and you can check it offline. And, we can develop that software for the government agencies.”
The region needs more advanced identification solutions for government agencies to improve its public services. much higher than other places in the world. “There are different reasons to the spread of biometrics. Labor secure access is one reason, the other reason is the drive to increase productivity and improve the government services. Another growing sector for biometrics is the education sector, making sure that students attend classes,” said Alex Zarrabi, CEO of Touchless Biometric Systems (TBS), which is leading the industry with its patented technology in 3D-fingerprint touchless biometric systems.
Education
Biometrics continues its Wide Penetration Along with the high demand for advanced identification management solutions, regulations for biometrics are more flexible and the user acceptance is relatively high,
The Saudi Arabia Ministry of Education has made it mandatory for all public school students to record biometric details with the government. “This is a very strong market. Many universities use TBS solutions. We have a famous university in the Arab world, Umm Al-Qura University in Saudi Arabia, that has sixty buildings. Other projects here are hospitals thanks to the hygienic touchless 3D, enterprises, and major airlines. We have one major airline having installed hundreds of TBS readers across the whole country and we also have other
35
What is Prerequisite for
VMS in a City
In a city surveillance project, where cameras can easily surpass thousands, a good, powerful video management software (VMS) product is needed to accommodate these cameras, make sense of the data being produced, and drive operators to events that are relevant and critical. However, a good implementation requires the installer to understand what makes VMS effective and what to confirm with the end user before the project begins.
Scalability Integration Usability
MAR 2016 â—? www.asmag.com
40
SurVeillanCe Project BY William Pao
n order to keep a city safe, operators and law enforcement officials rely on video surveillance to detect and deal with theft, assaults, gang violence, drug dealing, and other criminal activities. Yet, monitoring video from thousands of cameras spread across the city can be a daunting challenge. A good video management software (VMS) product, therefore, is needed to keep the operator situationally aware at all times. “Major focuses for citywide surveillance are generally linked with allowing immediate reaction of the operator to the event,” said Aleksandr Jesikov, Account Manager at Luxriot. “A powerful software solution must offer all tools allowing users to be quickly notified of an issue via all necessary instruments. VMS becomes powerful not only by having these instruments, but also by having all functions self-explanatory and easy to configure.” “What a strong or powerful VMS should be doing is focusing in on what’s important to the security profile,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. “Every camera
Steve Birkmeier, VP, Sales and Business Development, Arteco Andreas Conrad, Head, Product Management and Marketing, SeeTec Aleksandr Jesikov, Account Manager, Luxriot Benjamin Low, VP, Asia Pacific, Milestone Systems
Tony Luce, Director, Marketing and Business Development, Network Optix Jan van Rosenstil, Product Manager, VMS, Bosch Security Systems Mark Ross, Director, Cathexis Pervez Siddiqui, Director, Strategic Markets, Genetec
has a purpose. If the VMS is working correctly, it notifies the personnel when that purpose happens, and it’s treating all the other video differently. It discriminates that particular event and sends that information accordingly.”
Features Needed For City surveillaNCe vMs Since the number of cameras and other types of sensors can be overwhelmingly large, the VMS must be able to support these edge devices as well as present data generated by these devices to operators in a meaningful way, so they can easily understand the situation and respond accordingly. That said, below is a list of features that are needed for the VMS to work effectively in city surveillance.
Scalability
Every camera has a purpose. If the VMS is working correctly, it notifies the personnel when that purpose happens.
When deploying a city surveillance project, chances are the user will add more cameras over time. “In a lot of city surveillance projects that we have done, they have a very cautious budget to start with. Later on they see what the value is and they need to be able to add on easily and grow without having to completely replace the VMS,” said Mark Ross, Director of Cathexis. That said, the VMS on the backend must be able to easily and effectively handle the additional devices. “Systems have to be scalable to a large amount of cameras and devices. Scaling should be easy, so new cameras and servers should be added efficiently and easily,” said Andreas Conrad, Head of Product Management and Marketing at SeeTec.
41
AlArms Seek a
mAkeover for Smarter Security Intruder alarms have survived as one of the fundamental parts of a security system. With technological progress, they have evolved over time, integrating well with other security products like video surveillance and access control. But now as new concepts like smart homes become more popular, alarms look set to advance further, opening up several new possibilities. BY Prasanth Aby Thomas
he intruder alarm market, especially in developed economies, has always shown steady growth, unlike some other sectors of security that have remained more volatile. Reports suggest the American intrusion alarm market grew 3 to 5 percent over the last decade and is expected to grow at about 5 percent from US$1.4 billion in 2015 to $1.8 billion by 2019, according to IHS. The global outlook is even more promising. According to Research and Markets, the global intrusion detection market is expected to grow from $2.7 billion in 2014 to $5 billion by 2019, at an estimated CAGR of 13.2 percent. Another report from Marketsandmarkets suggests the home security solutions market alone could grow from $31.4 billion in 2015 to $47.5 billion by 2020, at an estimated CAGR of 8.7 percent. But alarms have come a long way from the
MAR 2016 â—? www.asmag.com
Hassan Uddin Ahmed, International Sales Manager, Pyronix
46
Daniela Hossmann, Head of Regional Business Unit Intrusion, EMEA, Bosch Sicherheitssysteme
Federica Pastorello, International Marketing Manager, EL.MO.
Alfred Tomasino, Engineer, Tre i Systems
individual units that could set off warning signals if a breach is detected. With the current market interest in making homes smarter, intrusion detection systems are becoming more and more sophisticated and intelligent. Alarms now are part of the larger framework of smarter homes, and the market is increasingly getting filled with sensors of various kinds and options to integrate them. The intrusion detection market is witnessing a rapid shift in its focus, from products that offer security, to those that can offer services that do more to improve overall life-quality. Moreover, markets are increasingly seeing the emergence of do-it-yourself (DIY) products that eliminate the need for professional installers. This situation is forcing the traditional security manufacturers to come up with adaptation strategies and methods to leverage their expertise to strengthen market presence.
From AlArms to smArt Homes Home automation systems that take advantage of a whole range of technologies, some of which are included under the umbrella term Internet of Things (IoT), is expected to be one of the key markets in the coming years. A visit to any of the technology trade shows these days will give a glimpse of the products that are coming up in this segment. Interestingly, most of what is seen now is considered to be just the tip of the iceberg, as the possibilities of connected devices are expected to be massive. Opportunities in the smart home segment have encouraged several new companies to enter the market, but most importantly, it is setting the stage for some
47
Modern ATMs Get new Layers of The role of ATMs has been growing in recent years. They are not only fast and convenient cash dispensers but also offer many other services, from currency exchange to bill payment. Creating a reliable and secure transaction environment for clients is a critical issue from both operational and customer service perspectives. The industry is trying to find additional avenues to secure transactions and is piloting biometric identification for use in ATMs.
ProTecT BY Israel Gogol, Freelancer
MAR 2016 ● www.asmag.com
illie Sutton was an American bank robber known for his innovative “career” and his successful jail breaks. When asked why he robbed banks, Sutton simply replied, “Because that’s where the money is.” Today, it seems bank branches are less focused on cashier services. Banks around the world have converted the way they work, relying more and more on mobile banking and networks of ATMs and information kiosks to serve their clients. In many places the branch experience is now limited to specific services which do not necessarily involve cash changing hands. A modern day Willie Sutton would no-doubt pay close attention to the ATM as a target for robbery. Since bank branches no longer
52
have safes with mounds of cash as before, ATMs, which often can hold several tens of thousands of dollars, become the target for criminals trying to gain access to money. Banks have to balance two demands: safeguard the money against robbery or fraud, and at the same time offer their clients an easy and seamless experience, providing a secure transaction without unnecessary burden for the clients.
Securing ATMs AgAinST PhySicAl ATTAck ATM security is an important topic addressed by international organizations such as ATMIA (ATM Industry Association) and EAST (European ATM Security Team). Attacks on ATMs can be divided into physical attacks, trying to reach the cash stored inside the ATM safe or fraud attempts. “Originally, starting in the 60s, physical security for ATMs was underdeveloped. Attacks soon started, as ATMs are spread around the globe, containing large quantities of cash and sitting close to public space. There are also many identical ATM units, which means that robbers can optimize their modus operandi and come up with faster and more successful ways to rob ATMs,” explained Pieter D. de Vlaam, Training and Certification Manager at Gunnebo, one of the world’s largest suppliers of ATM safes. According to de Vlaam, attacks on ATMs went through several stages of evolution. The first wave of attacks included breaking open the ATM with simple tools such as hammers and chisels — manufacturers answered the challenge by developing and implementing better safes. However, robbers did not sit still
Woody Chang, Marketing Manager, QNAP Systems Pieter D. de Vlaam, Training and Certification Manager, Gunnebo Karl Pardoe, Regional Sales Manager, U.K. and Ireland, March Networks
ion
and developed new methods of operations. “In the second stage the robbers started using torches and grinders, and eventually started gas blasting, a method in which robbers pry open the cash dispensing slot and pump gas into the ATM. The gas then detonates and blows apart the ATM from the inside giving the robbers access to the cash,” described de Vlaam. The next generation of attacks involves usage of solid explosives like Gelignite and PETN. Safe manufacturers are currently racing against robbers to provide adequate protection against the use of solid explosives.
Skimming and ATM Fraud Not all criminals choose to attack the ATM safe. Even though ATMs offer a very high potential for return, there are many difficulties due to better safes and newer protection standards. Many criminals resort to fraud attempts, using stolen cards or stealing card details using different skimming techniques. According to the US Secret Service, the agency in charge of fighting financial crime in the U.S., skimming costs American financial institutions about US$8 billion annually. A common modus operandi for robbers is to install clandestine card readers and spy cameras that copy magnetic card details. Once captured, the electronic data is encoded onto other cards and the captured PINs are used to withdraw money from customers’ accounts.
Video Surveillance
Many criminals resort to fraud attempts, using stolen cards or stealing card details using different skimming techniques.
More and more ATMs are using biometric identification (e.g., iris, fingerprint, face) for account access as an added layer of security.
Video surveillance is used extensively in ATM vestibules to record and detect fraud attempts. ATM surveillance equipment such as cameras and recorders needs to comply with specific small form factors and sometimes harsh environmental conditions. “There are three key requirements from video systems deployed in a banking environment. The first is central data integration, which guarantees that transaction data always resides behind secure firewalls in the corporate datacenter, in an environment compliant with the bank data and network operating policies. The second is real-time enterprise health management, so that system issues can be notified within seconds, and this ensures the video is up and running at all times. Finally, centralized management which enables the management of thousands of recorders from a single desktop in one location,” explained Karl Pardoe, Regional Sales Manager for the U.K. and Ireland in March Networks. However, besides the technical challenge, a successful solution requires the ability to interface with the bank’s transaction database to be able to detect fraud and provide a comprehensive security solution. “Our solution associates transactions in ATMs with the relevant video recording. When a suspicious transaction is detected by the bank, video feed can be quickly queried and accessed to assist investigation,” explained Cristina Velasco, Marketing Executive at Spain-based SCATI. “In addition to preventing fraud, it can also raise an immediate alarm in the event of physical aggression and sabotage at ATMs.”
53
NTERNET THINGS
OF
Beacon Technology Provides
Better Shopping Experience A recent report published by the Euro IT group says 2016 will be marked with an increase in online shopping and a growing market share of shopping done from mobile devices; use of beacon technology and RFID tags will also increase. The combination of RFID, beacons, and mobile devices is set to provide shoppers’ with an improved buying experience and increase retailers’ operational efficiency. BY Israel Gogol, Freelancer
T
he use of smartphones and tablets has made the combination of online and offline shopping a normal experience for many. Shoppers begin their purchasing journey with online research researching and comparing products. When in-store, patrons might use their phones to look for additional information or price comparison. According to Google, 85 percent of online shoppers start a purchase on one device and finish on another.
55
NTERNET THINGS
OF
According to Google, 85 percent of online shoppers start a purchase on one device and finish on another.
At NRF (National Retail Federation) 2016, Mike Rodgers, Chief Customer Officer of the American department store JCPenney, reflected on how 69 percent of the brand’s customers browse online before coming to a store, while 36 percent use mobile devices while in-store. Thus, retailers today need to ensure that they don’t lose out on customers in the divide between physical stores and e-commerce, by creating seamless, integrated experiences across all channels. To gain an understanding of the customer’s purchasing journey in the offline store, retailers turn to installing beacons to track and understand customers’ buying patterns. Beacon technology allows for advanced personalization of the shopping experience, combining the online and offline worlds. This is an additional source of competitive advantage for retailers. Beacons are Bluetooth-enabled devices that serve as proximity sensors that communicate with the shopper’s phone. The technology was introduced in 2013, and although still in its infancy, it is exponentially growing. Retailers will invest US$2.5 billion in the IoT (Internet of Things) within five years — mostly in beacons and RFID tags. By the end of 2018 it is predicted that retailers will have 3.5 billion active beacons installed and it is estimated that beacons will drive $44 billion in retail sales by 2016, up from $4 billion in 2015. Sid Mookerji, Global CEO at Software Paradigms International (SPI) pointed out that it is not only retailers pushing for the installation of solutions that combine the online and offline. According to him, this move is also driven by the customers themselves: “Millennials have lived in a connected world their entire lives and expect an omni-channel cross-platform seamless experience. Retailers need to break down the
How Beacon Technology Works
MAR 2016 ● www.asmag.com
Beacons strategically placed around stores connect to a customer’s Bluetooth-enabled smartphone app. A signal is sent to the phone and the app is opened. Once the app is opened, the retailer can provide the customer with information directly to their phone.
56
silos of separate platforms, competing departments and think about integrating their platforms to serve and attract their customers.” The IoT is becoming fundamental to delivering an enhanced consumer experience and driving operational efficiency. “Retailers will increasingly deploy IoT sensors and devices in their stores to capture new levels of data and drive better insight. These could be video, RFID, Wi-Fi, Bluetooth beacons, temperature or motion sensors,” said Alison Wiltshire, Global Practice Lead of Retail and Consumer Goods at BT Global Services. “Linking the data stream from these IoT sensors with other data will drive both real-time insights (for customer experience) and trend analytics (for planning purposes). For instance, connected merchandise (‘things’) using RFID tags not only allow optimization of inventory and replenishment, but also allows the product to have a ‘voice’ and inform a content management system what linked content should be displayed on adjacent screens or devices. These could
SMAhome
NewDirections in Smart Home at CES 2016 By a&s SMAhome
True to its hype, CES 2016 was one of world’s largest consumer electronics shows that housed several innovative launches and technological marvels. Shifting focus from mobile devices, this year’s show gave due importance to solutions in virtual reality, gaming, connected vehicles, drones, and IoT-related gadgets. Meanwhile, smart home was absolutely one of the highlights. Having interviewed dozens of smart home-related exhibitors at the mammoth showground, SMAhome presents five trends that could influence market developments that product developers should know.
1. Professional security sPecialists eye smart home
MAR 2016 ● www.asmag.com
As home security is ranked the top reason why users are interested in smart homes, professional security manufacturers are eyeing this market as an untapped business opportunity. Leading American security brands such as Honeywell, Tyco, Swann, First Alert, etc., all booked large spaces at CES to demonstrate their new offerings. Compared to suppliers from other backgrounds, these professional security specialists have an edge in security technology design for smart homes due to their vast experience in the field. However, smart home is all about solutions, which includes cross-brand devices, software, and even cloud services syncing together. Security pros who are used to closed-type systems should be aware of the current inclination to openness in smart home. Aesthetics in product design should not be overlooked either.
62
2. far from being “Diy-frienDly” A major portion of smart home exhibits at CES this year still needed professional installation or integration services. Furthermore, when asked about their best sales channel, more than half of the exhibitors said retail did not perform as well as they had anticipated, while revenue from professional channels or projects were the highest. It is obvious that the majority of smart home solution providers still rely on the professional services of builders, construction companies, or house renovators. This “not-so-DIY-friendly” aspect may hamper the adoption of smart home products in the after-builder market because of their extra costs of ownership to users. Yet, it should be noted that major home appliance brands are launching their connected home ecosystems. Bosch, Siemens, Whirlpool, Panasonic with its ORA, LG with its SmartThinq, Samsung with SmartThing, and ChangHong with IPP, are all making steady strides in this direction. With their ongoing market promotions and new business partnerships with service providers in home insurance, utility, or multi-system operators (MSOs), the transition into a “consumer technology-oriented” smart home could be faster than we expect.
3. “Working With nest” is the hyPe Thanks to the release of Nest Weave last October, “Works with Nest” was a popular tag seen at CES this year. Nest Weave enables direct device-todevice communication across networks including Wi-Fi and Thread, allowing developers to have end-to-end solutions that enable them to work with Nest, and use only parts of the program that meet their needs. According to Nest, Nest Weave solves many issues associated with connecting products in the home, including connecting power-constrained devices as well as devices that require low latency and redundancy. More than 11,000 developers have
accessed Nest’s APIs to connect with Nest products through the cloud – and 1 in 8 Nest homes are using “Works with Nest” integration. For OEMs and other Asian manufacturers that are interested in the US market but have integration difficulties, this program may be a solution.
4. sensitive to Data value Rather than highlighting technology, some smart home
exhibitors focused on data collected by connected sensors, devices, and smart applications, such as behavioral patterns. The sensitivity to data is turning smart home from a bunch of “nice-to-have” products into a “must-have” life helper. Not only do they give home owners accurate info on what is happening, but also provide options of precaution to possible incidents or any abnormal situations. Another interesting development seen at CES was Icontrol, Arrayent, DSR, Alya, and many other Internet of Things (IoT) or M2M platform designers displaying their products to end customers. By collaborating with different partners to exhibit in their booths, platform designers not only showed the extensibility of their ecosystem to potential OEM platform adopters, device makers, and key component providers, but also helped to educate the market on the value of the
63
LILIN Day and Night Full HD PTZ Dome IP Camera Features: • • • •
1 080p resolution with 20x optical zoom IP66 rain and dust resistant IR-cut filter for day/night operations H.264 and motion JPEG multi-profile video streaming • Wide dynamic range up to 90 dB • 3-year warranty and support ■ Merit LILIN/Taiwan ■ Email: sales@meritlilin.com
EverFocus 2-Megapixel Full HD Ultra Low Light Network Camera Features: • • • • •
1 /2.8” Sony progressive CMOS image sensor Full HD 1080p video, up to 60 fps Triple streams from H.265, H.264, and MJPEG Ultra-low light and true day/night function 3DNR/WDR/2-way audio/defog function supported • Triple power inputs supported: PoE/12VDC/24VAC ■ EverFocus Electronics/Taiwan ■ Email: sales@everfocus.com.tw
GKB NC 6960VD VeriFire IP Camera Features: • E arly-stage fire and smoke detection and notification • 1080p Full HD resolution, VeriFire is able to accurately detect fire and smoke with an average false alarm record far below the industry standard • VeriFire has an open API interface allowing customization by third-party specialist developers • ONVIF IP-based camera expandability • Remote-control management • Fast and proven fire camera ■ GKB Security/Taiwan ■ Email: sales@gkbsecurity.com
STROPS AVS Series Video Surveillance System Features: • U nique modular design separates electronics from battery which allows for fast, easy, and convenient servicing • Mobotix sensors provide high video resolution and activity notifications • Battery pack provides autonomous power for up to one week and can recharge itself • STROPS AddOn helps identify position on map and read camera status
ATEÏS Boutique PA/VA System
• O peration temperature from -30 to 60 degrees Celsius • Mobile network connection components provides excellent communication ■ STROPS Technologies/Latvia ■ Email: sales@stropstech.com
Features:
Hundure PXR-10/12 EM MIFARE Reader
Nedap uPASS Target UHF Reader
• P lug-n-play using auto-setup from the front panel • Eco-friendly product: high efficiency class-D amplifier and extremely low power consumption design during standby • Cost-effective, ease of installation and configuration • Control, management, and monitoring via web browser • Zone setting, paging with priority management, event and bell scheduler, and preset management • Paging, audio streaming, and Internet radio built-in
Features:
Features:
• S tylish and slim appearance design with tempered glass material • Provides RS-485 communication interface to suit for long distance installation • Wall-embedded design and two dimensions: PRX-12 for US market and PXR-10 for European market • Widen operation temperature range • Case sensor detection function
• • • •
■ ATEÏS South East/Singapore ■ Email: info@ateis-se.com.sg
■ Hundure Technology/Taiwan ■ Email: overseas@hundure.com
MAR 2016 ● www.asmag.com
66
eading up to 10 meters R Industrial reader design Operates with passive UHF tags (EPC GEN 2) Circular polarized camera (freedom of tag orientation) • Easy integration and installation • On-site adjustable read range (UHF tool) ■ Nedap Identification System/Netherlands ■ Email: info@nedap.com
67
Show PReview
Secutech 2016: Complementary Events Address Hottest Topics in the Security and Smart Home Sectors security and IT systems integrators to explore the possibility of future security solutions. It focuses on the deployment of new technologies — such as the Internet of Things (IoT) and big data — in smart cities, transportation, retail, and other business sectors in Asia. The speaker line-up is comprised of representatives from international leading brands, for instance, Intel, Siemens, ST Electronics, ICD Security Solutions, and Walmart.
Smart Home M2M Platform and Software Summit 2016 By Secutech
MAR 2016 ● www.asmag.com
ith less than two months until Secutech 2016 commences, the show will present the latest technologies and products to unlock the future of security solutions and smart cities. The annual event, scheduled to run from 19 to 21 April 2016 at the Taipei Nangang Exhibition Center in Taiwan, is renowned as one of the most influential exhibitions of its kind in Asia. As such, the show is positioned to assist industry players in establishing strategic partnerships and sharing knowledge of the field. Secutech 2016 is expected to utilize 35,873 square meters of exhibition space and accommodate over 500 leading manufacturers who are eager to promote their business by meeting over 26,000 trade visitors from all around the world. As yet, confirmed exhibiting brands include Hikvision Digital Technology, Dahua Technology, VIVOTEK, Merit LILIN, Hisharp, Wonwoo, TrendMicro, Tamron, Sony, Intel, Seagate Technology, Amroad, GKB Security, Heiman, SecuFirst, Sunmore, VStarCam, and Unitech. To aid participants in navigating the ever-evolving market, a series of industry activities will be organized alongside the product showcases. The program features top-ranked brands and prominent experts to highlight the industry development trends, covering key technologies and their applications.
Some of the event highlightS are aS followS: Asian Systems Integrator Forum The Forum is launched for the first time to serve pan-Asian
72
Secutech 2016 — featuring intelligent solutions for electronic security, home security, fire and safety —will be held from 19 to 21 April in Taipei, Taiwan.
RegisteR Now
Understanding the diversified software needs in smart home, the Summit gathers more than 10 Taiwan- and China-based platform designers, who will offer attendees an effective sourcing destination for optimal IoT platform solutions. In addition, speakers from Ayla Networks, Tricloud, Orbweb, Mivatek, Throughtek, and TrendMicro will interact with visitors and share their insights on some of the most concerned topics in the industry, such as connectivity, interoperability, data protection, and business models.
Z-Wave Gallery Co-organized by Z-Wave Alliance, the debut of Z-Wave Gallery in the SMAhome section will demonstrate the latest and best-performing applications in connected homes. Around 10 Z-Wave members have been selected to showcase their top-notch products with brand new designs and upgraded manufacturer management capabilities. They include Bt-star, Comodo, Mcohome, and TKB Home. Other interactive events at Secutech are the Intelligent Retail Demo, Intelligent Transportation Demo, Machine Vision Demo, SMAhome International Conference, and SMA 100 Express Center.
March – July 2016
WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.
March 2016
Safe Secure Pakistan • Date: 2016/03/01–03/03 • Venue: Pak-China Friendship Center, Islamabad, Pakistan • Tel: +92-21-111-734-266 • Email: info@safesecurepakistan.com • URL: www.safesecurepakistan.com
PROTECT • Date: 2016/03/02–03/03 • Venue: SMX Convention Center, Manila, Philippines • Tel: +632-818-6828 • Email: leverage@leverageinternational.com • URL: www.protect.leverageinternatonal.com
Security Show • Date: 2016/03/08–03/11 • Venue: Tokyo Big Sight, Tokyo, Japan • Tel: +81-3-3512-5670 • URL: www.shopbiz.jp/en/ss
MIPS • Date: 2016/03/14–03/17 • Venue: Expocentre Fairgrounds, Moscow, Russia • Tel: +7-499-750-08-28 • Email: security@ite-expo.ru • URL: www.securika-moscow.ru
ISC Brasil • Date: 2016/03/15–03/17 • Venue: Expo Center, Norte, Sao Paulo, Brazil • Tel: +55-11-3060-4893 • Email: ivan.romao@reedalcantara.com.br • URL: www.iscbrasil.com.br
ISC West • Date: 2016/04/06–04/08 • Venue: Sands Expo & Convetion Center, Las Vegas, U.S. • Tel: +1-203-840-5602 • Email: inquiry@isc.reedexpo.com • URL: www.iscwest.com
International Oil & Gas Security Conference
• Date: 2016/04/19–04/21 • Venue: Nangang Exhibition Center, Taipei, Taiwan • Tel: +886-2-2659-9080 • Email: echo.lin@newera.messefrankfurt.com • URL: www.secutech.com
• Date: 2016/05/11–05/12 • Venue: The Kia Oval, London, U.K. • Tel: +44-207-111-1615 • Email: cristinar@irn-international.com • URL: www.oilgassecurity.com
Secutech India
Securex South Africa
• Date: 2016/04/21–04/23 • Venue: Bombay Exhibition Center, Mumbai, India • Tel: +91-22-4286-3800 • Email: info@secutechexpo.com • URL: www.secutechindia.co.in
• Date: 2016/05/24–05/26 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: info@specialised.com • URL: www.securex.co.za
Securex • Date: 2016/04/25–04/28 • Venue: Poznan Congress Center, Poznan, Poland • Tel: +48-61-869-2131 • Email: pcc@mtp.pl • URL: www.securex.pl
June 2016
IFSEC International • Date: 2016/06/21–06/23 • Venue: ExCel London, London, U.K. • Tel: +44-20-7921-5000 • Email: rachel.eaton@ubm.com • URL: www.ifsec.co.uk
Expo Seguridad • Date: 2016/04/26–04/28 • Venue: Centro Banamex, Mexico City, Mexico • Tel: +1-203-722-7351 • Email: marreola@reedexpo.com • URL: www.exposeguridadmexico.com
July 2016
SecProTec East Africa
May 2016
Asian Securitex • Date: 2016/05/04–05/06 • Venue: Hong Kong Convention & Exhibition Centre, Hong Kong • Tel: +852-2804-1500 • Email: xhibit@hkesallworld.com • URL: www.asiansecuritex.com
Exposec • Date: 2016/05/10–05/12 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: international@cipanet.com.br • URL: www.exposec.tmp.br
• Date: 2016/07/12–07/14 • Venue: Kenyatta International Conference Centre (KICC), Nairobi, Kenya • Tel: +49-40-710070-51 • Email: stefan.freiberg@planetfair.de • URL: www.secproteceastafrica.com
Security Exhibition & Conference • Date: 2016/07/20–07/22 • Venue: Melbourne Convention & Exhibition Center, Melbourne, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au
73
MAR 2016 ● www.asmag.com
April 2016
Secutech International
Companies in This Issue PRODUCT OF THE MONTH • CAT PHONES • SAFE APPS (STAY SAFE) • YRFREE TECHNOLOGIES VIEWPOINT • ETHERWAN SYSTEMS NEWS FEATURE • HONEYWELL AuTOMATION ANd CONTROL SOLuTIONS MARKET UPDATE • 3M • BOSCH SECuRITY SYSTEMS • EMIRATES PHOTO MARKETING (EPM) • G4S • GRuNdIG • IdIS • IRIS Id SYSTEMS • MORPHO (SAFRAN)
• NIT • OPTEX EuROPE • PAXTON ACCESS • PELCO BY SCHNEIdER ELECTRIC • TOuCHLESS BIOMETRIC SYSTEMS • TELESTE • Wd INTEGRATED SYSTEM • ARTECO • BOSCH SECuRITY SYSTEMS • CATHEXIS • GENETEC • LuXRIOT • MILESTONE SYSTEMS • NETWORK OPTIX • SEETEC
• MARCH NETWORKS • QNAP SYSTEMS • SCATI SMART TECHNOLOGY • BOSCH SECuRITY SYSTEMS • EL.MO. • HONEYWELL SECuRITY & FIRE • PYRONIX • TRE I SYSTEMS • TYCO SECuRITY PROduCTS IOT • BT GLOBAL SERvICES • IBM • MOBSTAC • SCALA • SOFTWARE PARAdIGMS INTERNATIONAL
VERTICAL SOLUTION • GuNNEBO • IRIS Id SYSTEMS
Next Issue
Integrated System
Vertical Market
CENTRAL MANAGEMENT SYSTEMS (SMB)
vILLAS ANd HOTELS
Smart Device/Software LONG-dISTANCE TRANSMISSION ANd POWER SuPPLY
75
ADVERTISER INDEX
*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.
SURVEILLANCE PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
29
BOSCH SECURITY SYSTEMS
CCTV
GERMANY
apr.securitysystems@bosch.com
45
CHENGDU POWERVIEW SCIENCE AND TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
dennis@powerview.cn
17
CONNECTION TECHNOLOGY SYSTEMS INC.
SWITCH/CONVERTOR/ETHERNET MEDIA TAIWAN
sales@iConnectron.com
INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseas@dahuatech.com
8
DYNACOLOR INC.
IP CAMERA / NVR
TAIWAN
info@dynacolor.com.tw
75
FOCTEK PHOTONICS, INC.
LENS
CHINA
sales@foctek-lens.com
25
FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.
DOME COVER
CHINA
sales@fjsmt.com
9
GKB SECURITY CORPORATION
IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR TAIWAN
sales@gkbsecurity.com
5
HDPRO CO., LTD.
CCTV
KOREA
sales@hdprocctv.com
BACK COVER
HIKVISION DIGITAL TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
overseasbusiness@hikvision.com
21
IDIS CO., LTD.
SURVEILLANCE
KOREA
sales@idisglobal.com
4
MEERE COMPANY INC.
CAMERA
KOREA
sales@cube-eye.co.kr
10
MERIT LILIN ENT CO., LTD.
IP CAMERA / NVR
TAIWAN
sales@meritlilin.com
32, 33
NEXTCHIP CO., LTD.
CHIP
KOREA
sales@nextchip.com
38, 39
QIHAN TECHNOLOGY CO., LTD.
SURVEILLANCE
CHINA
marketing@qihan.cn
63
QUANZHOU SOUTHEAST PHOTOELECTRIC CO., LTD.
SURVEILLANCE
CHINA
sales@soest.cn
7
RICOM
LENS
CHINA
sales@forecam.com
2
RIFATRON CO., LTD.
DVR
KOREA
contact@rifatron.com
51
SHENZHEN COMMANDER TECHNOLOGY CO., LTD.
CASING
CHINA
sjw@yjdcase.com
12, 13
SONY CORPORATION DSBG. SYSTEM LSI DIVISION
SEMICONDUCTOR
JAPAN
-
INSIDE BACK COVER
TAMRON CO., LTD.
CAMERA
JAPAN
newbiz@tamron.co.jp
23
TECHPOINT INC.
CHIPSET
USA
dma@techpointinc.com
11
VIDEOTEC S.P.A.
IP CAMERA / SOFTWARE / VIDEOSERVER
ITALY
info@videotec.com
3
WEBGATE INC.
DVR
KOREA
support@webgateinc.com
15
ZEEANN CO., LTD.
CMOS IMAGE SENSOR
KOREA
sales@zeeann.com
INTRUSION ALARM PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
6
LINCE ITALIA S.P.A.
INTRUSION ALARM
ITALY
info@lince.net
67
SUPERIOR ELECTRONICS CORP.
ALARM
TAIWAN
info@superior-elec.com
ACCESS CONTROL PAGE NO.
ADVERTISER
MAJOR ITEM
COUNTRY
35
GIGA-TMS INC.
RFID MODULE / LOCK / READER
TAIWAN
promag@gigatms.com.tw
43
HUNDURE TECHNOLOGY CO., LTD
READER
TAIWAN
overseas@hundure.com
Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.
79