A&S # I207 Mar 2016

Page 1


CONTENTS

Mar 2016 www.asmag.com

iNtegrated systeM

What is Prerequisite for

Intelligence

VMS in a

Scalability

City Surveillance Project

Integration

............................... 40

Usability

News Feature

Honeywell-UTC Talks May Have Failed, but Market Still Up for Mergers......................................... 24 P. 40

Market update

Middle East Tests the Flexibility of Global Solution Providers ................ 26 Improved Public Services Accelerates Identity Authentication in Middle East ......... 34 sMart techNology

Alarms Seek a Makeover for Smarter Security ................................... 46 Vertical solutioN

Modern ATMs Get New Layers of Protection ....................................... 52

P. 46

iNterNet oF thiNgs

Beacon Technology Provides Better Shopping Experience............... 55 ViewpoiNt

Creating Stable Ethernet Transmission for IP Surveillance in Retail Chain Stores ........................... 60 sMahoMe MAR 2016 â—? www.asmag.com

New Directions in Smart Home at CES 2016 .......................................... 62 Contents..................................................14 Editor’s Note ...........................................16 Application Cases...................................18

14

P. 52

Products of the Month............................22 New Products .........................................66 Show Preview .........................................72

P. 55 Show Calendar .......................................73 Companies in This Issue.........................75


a&s International, published by Messe Frankfurt New Era Business Media Ltd., is a monthly professional publication for channel players in the worldwide electronic security industry since 1997. It updates importers, distributors, OEM/ODM searchers, systems integrators, and other product purchasers on product sources and identifies developments in Video Surveillance, Access Control, Biometrics, Intrusion Alarm, Intercom/Video Door Phone, Home Automation, and other fields relevant to electronic security.

ISSN 1997-6267 中華郵政北台字第1571號 執照登記為雜誌交寄

Who is Your Best Partner?

John Shi

Executive Editor-in-Chief

Hubert Duh Charlie Wong

Managing Director / Publisher General Manager

Editorial

got a chance to talk to a major distributor in the Middle East in January. Some interesting discussion between us was surrounded by their criteria to select their manufacturing “partners.” Our conversation made me recall that in the past, when IP wasn’t that widespread in different projects and areas, the conversation between buyers and suppliers was usually about product specifications and its unit price. And then the buyers might try to find the best features or specifications by comparing all their selections. However, their buying behavior and mindset have changed a lot, and I would say gotten much more complicated, especially facing IP installations and complex integration of multiple systems and different brands in a large-scale project. That is why major security buyers now focus more on how to find long-term “partners” instead of just “box-moving” products.

MAR 2016 ● www.asmag.com

This value-added distributor told me that his focus is always on innovative solutions and how the brands can ensure the best compatibility and interoperability in a system to provide overall security — secondly, it would be the manufacturer’s local support toward their own products and then projects. His statement is quite true to the security business in the Middle East, which has the most advanced IP solution installations in the world.

Being innovative can probably be evaluated by software features and the challenges they can solve in certain applications or special, critical environments. I would say, the most difficult challenge might be the assurance of compatibility and interoperability. Even though some companies might say their systems can be easily integrated with their API or are compatible with current standards like ONVIF or PSIA, 100-percent integration is still very questionable. That is why this value-added distributor helps their customers, who are also considered to be their partners too, from pre-sales, design to product selection, even if some of the products are not from them. While selecting brands for their partners, this distributor also pays a lot of attention to the compatibility between the brands they represent here in this region. When IP starts to be installed in all different projects, suppliers and buyers do need to think more comprehensively and evaluate partners to make sure they can offer something valuable to their customers. Hope you enjoy this issue!

Editor-in-Chief Senior Consultant Senior Editor Reporter Reporter Reporter Reporter

as-pr@newera.messefrankfurt.com jill.lai@newera.messefrankfurt.com alf.chang@newera.messefrankfurt.com eifeh.strom@newera.messefrankfurt.com william.pao@newera.messefrankfurt.com lisa.hsu@newera.messefrankfurt.com prasanth.aby@newera.messefrankfurt.com emily.lin@newera.messefrankfurt.com

Executive Designer Designer Designer

gaven.lee@newera.messefrankfurt.com mao.chang@newera.messefrankfurt.com arthur.wu@newera.messefrankfurt.com

Manager

george.chang@newera.messefrankfurt.com

Art Design

Gaven Lee Mao Chang Arthur Wu Circulation

George Chang Michelle Chu

Marketing Coordinator michelle.chu@newera.messefrankfurt.com

Corporate Management

Collins Yuan Thomas Pin Chihung Lee

Group Manager Account Manager IT Manager

collins.yuan@newera.messefrankfurt.com thomas.pin@newera.messefrankfurt.com chihung.lee@newera.messefrankfurt.com

Manager Product Manager

willy.wang@newera.messefrankfurt.com jessica.yang@newera.messefrankfurt.com

Trade Fair Manager Project Manager Project Manager

echo.lin@newera.messefrankfurt.com eva.tsai@newera.messefrankfurt.com sandra.chen@newera.messefrankfurt.com

asmag.com

Willy Wang Jessica Yang Secutech

Echo Lin Eva Tsai Sandra Chen

International Advertising [Headquarters]

Juihui Lin Kay Yang Audrey Fang Nori Chang

Manager Operation Officer Coordinator Coordinator

juihui.lin@newera.messefrankfurt.com kay.yang@newera.messefrankfurt.com audrey.fang@newera.messefrankfurt.com nori.chang@newera.messefrankfurt.com

[Branches & Representatives]

Bobbie Ferraro Carolina Pattuelli Tenzile Cavus Evris Consolos Muris Hadzic Manish Gandhi Iris Lai Cliff Kang Y. C. Suh Takashi Komori Nguyen Thu Ha Aksenova Tatiana

U.S.A./Canada Europe (Italy) Europe (Turkey) Europe (U.K.) Southeast Europe India Taiwan China Korea Japan Vietnam Russia

bobbie@globetrottermedia.com produzione@ethosmedia.it tenzile.cavus@asturkiye.com evris@kemainternational.com management@asadria.com manish@abcindia.biz iris.lai@newera.messefrankfurt.com cliff.kang@newera.messefrankfurt.com ycsuh517@naver.com komori@asj-corp.jp project1@vietfair.vn aksenovata@ru-bezh.ru

Messe Frankfurt New Era Business Media Ltd. Taiwan Branch: 8F, No.288, Sec. 6, Civic Boulevard Xinyi District, Taipei City 11087, Taiwan Phone/886 2 8729 1099 Fax/886 2 2747 6617 Website/www.mfnewera.com Messe Frankfurt New Era Business Media Ltd., a company formed by Messe Frankfurt (HK) Ltd. and former A&S Group in 2009, is an integrated media service provider in the security industry. Our service covers magazines, websites, events, and trade shows. The portfolio of a&s magazines includes a&s International, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, and a&s Taiwan (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan, a&s Vietnam, and a&s Russia are licensed editions. For changes of address or subscription problems, contact us at mfne-circulation@newera.messefrankfurt.com Copyright© 2016 Messe Frankfurt New Era Business Media Ltd. All rights reserved. No part of this magazine may be republished, reprinted or redistributed in any forms, including electronic, without written consent from the publisher.

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, image, patent or trademark disputes from advertisements or among advertisers. Legal consultant: Julia S.H. Yu, Attorney at Law, First Law & IP Offices

jill.lai@newera.messefrankfurt.com

16

General Press Jill Lai Alf Chang Eifeh Strom William Pao Lisa Hsu Prasanth Aby Thomas Emily Lin


ApplicAtion cAses

>> Residential

Arecont Vision Secures US Residential Community

MAR 2016 ● www.asmag.com

Homeowners in Sherwood Lake Club, a private residential community in Kansas, have been subject to neighborhood mischief, pranks, and serious acts of vandalism. Residents are increasingly employing Arecont Vision’s megapixel cameras to address these issues. One such case is Tom Thomas, whose original high-definition analog camera system was plagued with issues such as poor image quality affecting facial recognition and nighttime image capture. When presented with the option of adding IP cameras as part of his security system upgrade, he decided to install Arecont Vision’s 3-megapixel cameras. The cameras proved to be the perfect solution for the front and side yard of his home. The cameras provided 360-degree, high resolution coverage of the 1-acre lot. Additional 2-megapixel cameras solved the problem of capturing the make and model as well as the license plates of fast moving automobiles. All images are then recorded by an OnSSI Ocularis-IS video management system. Since the system was installed, local law enforcement officials have used the captured images to help identify suspects and enable them to make actual arrests.

of new card access technology from Nedap Identification Systems. This security demonstration pilot is the first of its kind in the United States to include both long-range door and vehicle access technology from Nedap. The campus implemented a hands-free door access solution which enabled extended range authorization on a passive credential. A small form factor reader, the uPASS Access, which can be easily mounted on a standard door mullion was deployed, allowing for reading of credentials from up to two meters. These performance capabilities facilitated hands-free access authorization, making high throughput portals flow freely while maintaining security protocols. Nedap also installed long-range vehicle access readers and tags for Hollister’s school buses. This technology ensured that only authorized drivers driving an assigned district vehicle can enter or leave the premises and prevented vehicles undergoing maintenance from exiting the yard before it is released for service. In addition, the system creates a record of every event and documents which drivers were driving what vehicles on any given day.

Source: Memphis Daily News

>> Law Enforcement

Hikvision Aids Memphis Police Department

>> Education

Nedap Improves Security for US School District The Hollister school district in Missouri decided to upgrade its campus access control system with the addition

18

Panama, is comprised of 135 buildings spread over 37 acres. They required a system that can provide 24/7 operation all year round and is flexible and scalable enough to accommodate ongoing changes and expansion. AMV International Development, who was subcontracted for the project, selected Pelco by Schneider Electric’s video surveillance system for this installation. The video surveillance system incorporated a mix of nearly 900 fixed cameras as well as enclosures, camera dome, and PTZ dome systems. Deployed Sarix cameras featured SureVision technology, wide dynamic range with low light, and anti-bloom capabilities, all of which ensured good images under complex lighting conditions. Spectra HD integrated high-speed dome positioning systems allowed for responsive 360-degree continuous pan rotation for precision and fine control. All the video is fed to no less than six different control and storage rooms where the information is monitored, analyzed, and archived. The Endura IP video management system was chosen for this project for its reliability and around-the-clock monitoring capability. Customizable permission settings and unlimited user profiles enabled multiple access, driving greater return on security investment.

>> Public Services

Pelco Helps Secure New Panamanian Prison

La Gran Joya, a correctional facility in

The Memphis Police Department (MPD) in the U.S. wanted to explore ways to further protect the city’s critical infrastructure assets and eventually decided on a mix of three configurations: pole cameras, cameras attached to buildings, and mobile trailers employed at designated spots. Currently, the police department has established a network of around 600 of Hikvision Digital Technology’s analog and IP cameras throughout the city. The footage from these bullet and dome PTZ cameras, which were placed at various strategic points around Memphis, flows


back to the MPD Real Time Crime Center (RTCC). For the pole cameras, an enclosure was created to house the cameras and all of their related equipment: a DVR or NVR, an encoder, a power supply, and a router. The local Wi-Fi system enabled officers to pull up to an enclosure, connect to the network, and discreetly pull data without even exiting the car. Additionally, MPD has invested in mobile trailers that are each powered by generators or solar energy and equipped with two cameras. Officers in the RTCC use this to monitor and respond to events occurring at parking lots, malls, and special events.

>> Oil and Gas

Synectics to Protect Italian Onshore Project

Synectics surveillance solutions have been deployed as part of safety and security operations at the Tempa Rossa onshore development in southern Italy. The US$1.9 billion project — a joint development between Total and Shell — comprises eight production wells, a new oil processing center, an LPG storage center, and updated utilities/distribution infrastructure. Along with Synergy’s Command and Control platform, the end-to-end solution incorporates over 80 COEX camera stations (fixed and PTZ) with access control, intruder detection systems, integrated control, and safety systems. The surveillance brief also required full integrated factory acceptance testing prior to deployment. The support provided ensured that

high-quality, live or recorded visual data can always be paired with incident detection alarms in order to investigate and initiate response procedures. Whether triggered by people or processes, alerts will immediately prioritize image feed from the nearest available cameras. Synergy will also generate scenario-specific workflows to guide operators through appropriate protocols. Additionally, Synectics created macros to allow the operators to analyze “operation-ready” integration performance at the site.

>> Government

Teleste Secured UN Climate Convention in France

Teleste’s S-VMX mobility platform and Command and Capture application were used to protect the UN conference on climate change (COP21) in Paris which was attended by 180 chiefs of state and government officials, as well as 50,000 participants. On top of allowing police mobile teams to access the Paris video surveillance system and all its regular cameras, the platform offered additional access to video sources deployed specifically for the conference: drones, captive balloons with long-range cameras, and helicopter cameras. The platform offered different possibilities and functions for mobile operation, including push HD video from operating centers to mobile devices, control of mobile cameras from tablets, and high-quality video live streaming. Police officers were able to take video clips from their phone cameras and store

it in the central recording platform on the fly as evidence material, as well as localize phones and tablets in real time on georeferenced maps, together with camera control and positions. Based on an intelligent secure portal access, the platform was secured with the best of cryptographic technologies: PKI with RSA and multi-factor authentication, TLS, Blowfish, and AES.

>> Retail

March Networks Solution Used by US Global Retailer

Global lifestyle brand Cole Haan has selected March Networks and Diebold for an enterprise-class video solution that will help enhance security and resolve liability claims in all of its 117 North American locations. Acting on Diebold’s recommendation, Cole Haan decided to standardize on the March Networks’ intelligent video solution to replace a variety of older surveillance systems that were performing poorly and were increasingly costly to maintain. The new solution addresses all of the retailer’s key requirements, such as enabling the loss prevention team to conduct investigations remotely from its headquarters via the video management software. It also provided local control at the store level so managers can review video recorded at specific locations and download evidence for law enforcement immediately if an incident occurs. Currently, 90 stores are equipped with a March Networks hybrid NVR that captures videos from an average of eight surveillance cameras installed behind point-of-sale (POS) terminals, throughout the sales floor, in backroom offices, and at receiving doors. The recording platform allows for easy upgrading to high-definition or megapixel IP cameras if required.

>> Retail

Verint Systems Enhances US Retailer Operations

Boot Barn, America’s largest Western and work wear retailer, deployed Verint Systems’ video and situation intelligence solutions at various retail store locations to enhance operations and loss prevention efforts. With Verint EdgeVMS Vid-Center, field and loss prevention leaders can view live

19


Smartphones Can Now Provide Extra Protection for Lone Workers

Editor’s Note:

Look around and you will see nearly everyone with a smartphone in their hand. With the ever-growing number of smartphones being introduced in the consumer world, it won’t be long before we start to see more and more developers incorporating the use of smartphones for security applications. Without the need to purchase additional equipment to fulfill the user’s security requirements, smartphone apps or a dedicated smartphone itself may become a great solution for lone workers, who require extra security in remote areas, and could save valuable time with instant communication to base.

Eviid SEcurE viSual confirmation SmartphonE app

E

viid is a unique, patent-pending technology designed specifically for use in remote or hostile environments due to its evidential technology and reliable connectivity even via low-bandwidth satellite link. Eviid makes smartphone footage suitable for capturing or streaming business-critical, sensitive, or evidential information. In addition, all Eviid footage and metadata is tamper-evident, compressed on average 15-fold, and shared and stored securely in a controlled environment. • Automatically adds contextual data (time, data, GPS location, etc.) to each frame like a watermark, making it impossible to alter footage or metadata without leaving a trace • Footage compressed up to 20-fold before transmission for faster transfers • In critical situations, Eviid footage (live or recorded) can provide the visual confirmation Supplier: YRfree Technologies

needed by authorities to deploy help quickly • Allows for instant two-way video communication • Can work as a distress signal, transmitting video of a situation automatically along with positional data — either live or at the next possible opportunity • Works in low-bandwidth environments URL: www.eviid.com

cat S60 SmartphonE With intEgratEd thErmal camEra poWErEd by flir

T

he Cat S60 is the world’s first smartphone with an integrated thermal camera from FLIR Systems, allowing Cat phone users to be the first in the world to use their smartphone for a multitude of use cases, including: detecting heat loss around windows and doors, spotting moisture and missing insulation, identifying over-heating electrical appliances and circuitry, and seeing in complete darkness. • Strengthened die cast frame • Drop-proof to 1.8 meters, MIL spec 810G • Underwater 13-megapixel main camera with dual flash, 5-megapixel front-facing camera • Dedicated FLIR thermal camera app with MSX technology Supplier: Cat Phones

• Provides changeable heat palettes, temperature spot meter, and minimum, maximum, and average temperature data • Optimized battery performance (2,800 mAh)

URL: www.catphones.com

StaySafE buSinESS app

S

MAR 2016 ● www.asmag.com

taySafe Business is a smartphone app that can track the location of lone workers in real time and enable them to check-in safely after meetings, traveling, and lone-working sessions, whilst employers have full visibility through a secure, online hub — a web-based mapping portal which displays the location of each lone worker and updates in real time as workers change location. If a lone worker fails to check-in safely, the app will trigger an alert, which will be instantly received by the online hub as a pop-up alert. • The online hub locates the lone worker’s location on a map and provides real-time updates on their movements • A panic alert can be triggered by a lone worker at any time • Opt to receive SMS text or email notifications when staff is not in front of the computer • Set up alert management procedures within the hub to provide anyone monitoring lone workers Supplier: Safe Apps (StaySafe)

22

with a written procedure to follow, in the event of an alert • Note-taking feature: staff responsible for resolving alerts can add a note to any alert that is triggered • Can access all historical tracked sessions for every mobile app in the organization to give full visibility of the locations visited and any alerts triggered for each specific employee

URL: www.staysafeapp.com


Honeywell-UTC Talks May Have Failed, bUT

Market Still Up for MergerS

BY Prasanth Aby Thomas

recent reports of Honeywell’s intention to strike a deal with UtC that did not see the light of day strengthen market speculations on more M&a activities in the security industry.

MAR 2016 ● www.asmag.com

ergers and acquisitions (M&A) in the security industry have been grabbing headlines in the recent months. Close on the heels of Johnson Controls’ merger with Tyco International, reports revealed United Technologies (UTC) was in talks on a deal with Honeywell International over the past year, but pulled out due to regulatory concerns. Had the deal gone through, the result would have been a mammoth conglomerate with combined revenue of over US$90 billion and an overarching presence across different sectors including physical security. Such prospects could have given rise to doubts on the deal passing the antitrust review. Even if it did in the U.S., it wouldn’t take a skeptic to remember the ill-fated deal between United Technologies and General Electric that failed to go through the European Commission in 2001. Both companies now indicate there may not be any more talk on the matter, but that has not stopped Honeywell from going ahead with other M&A plans. Confirming the general market speculations that companies are actively looking at

24

options to tie up and strengthen their presence, in March, Honeywell said it bought the Francebased intrusion detection company RSI Video Technologies. The newly acquired company is expected to further strengthen Honeywell’s intrusion and alarm offering. This follows the company’ s agreement to buy the smoke detection and video security company Xtralis for $480 million from funds advised by Pacific Equity Partners and Blum Capital Partners in February. After the deal, which is expected to close in the second quarter, Xtralis would become a part of Honeywell Security and Fire, which is part of its automation and control division that covers about a third of its revenue. Xtralis’ smoke detection solutions secure several large companies, iconic sites, and critical infrastructure. The company pioneered the development of very early warning technology that can detect smoke in a facility at an early stage of a fire, which gives emergency responders additional time to help prevent or minimize damage. Headquartered in Dublin, Ireland, it has employees across Europe, Middle East, Africa, Asia Pacific, and the Americas, and over 30 years’ experience in the security field. Honeywell expects the deal to boost its presence in the market of providing security to critical infrastructure and high-value assets. “The acquisition of Xtralis will enhance Honeywell’s very early warning smoke detection portfolio, and bring unique capabilities in remote visual verification of fire and intrusion risks, advanced perimeter security technologies and video analytics software,” said Bruce Eric Anderson of Honeywell Automation and Control Solutions. “Xtralis strengthens Honeywell’s security and fire portfolio for critical infrastructure and high-value assets, and will benefit from Honeywell’s global scale and channels.” These acquisitions could also indicate Honeywell’s strategy for growth at the moment, since its recent profits had come from reduced costs rather than higher sales. Profits for the quarter ending December 31 were up 24.9 percent as expenses dropped 8.6 percent, while revenue fell 2.8 percent. In the markets, speculations abound on which companies would make the next move to join hands. A step from any of the major security manufacturers will have significant ramifications for the concerned distributors and systems integrators. M&As are an unavoidable part of modern businesses, the only question would be who comes out with the winning hand.


Middle East Tests the The biggest issue for the Middle East region lately is related to the shrinking oil price, rising terrorism threats, and regional conflicts. Economically, the region is experiencing difficulties, which does create some challenges for its security business. a&s interviewed some major security solution providers at this year’s Intersec to see how they are responding to their customers’ concern.

MAR 2016 ● www.asmag.com

he Middle East (ME) region has always been a promising land favored by investors from all over the world. Its leading petroleum reserve has made some countries, especially in the Gulf Cooperation Council (GCC), some of the wealthiest countries in the world since the 1960s. It is hard to imagine a modern city like Dubai was a small harbor city for fishing, pearling, and sea trade. Utilizing its oil and tourism income

26

to spur local infrastructure, such as roads, highways, telecommunications network, and public transportation, the region’s customers never need to compromise because of their budget. Albert Ryu, President and COO of IDIS said, “There are very fast projects. Unlike in the U.K., you

might have six months to respond to a tender; in the Middle East it can be six days. Customers want project specifications very fast, and very fast installations. So it is very fast moving market.” However, the situation has changed


Flexibility

BY Jill Lai

of Global Solution Providers

in the past three years and will continue to change in the coming years as these countries find a way to reduce its dependence on their oil revenue, which has decreased as a result of the oversupply of oil, decrease in global demand, increase in competition with US players, and strong US dollar.

ME SEcurity MarkEt GrowS DESpitE EconoMic Difficulty According to the International Monetary Fund (IMF), the average fiscal deficits of GCC members are expected to reach 13 percent of their GDP. Saudi Arabia faces a deficit of 21.6 percent in 2015 and 19.4 percent in 2016. The plummet of oil prices has caused a headache for GCC members.

Fortunately, security investment from local governments still remains high. The Sales Manager of Optex Europe said, “Government projects and royal projects will still continue to grow because there is a huge fear of terrorism. Certainly in the Emirates, we are seeing a higher level of interest in putting added layers of security in the royal

27


Improved Public Services Accelerate Identity Authentication Adoption in Middle East In addition to video surveillance, solutions for personal identification and access control are also in high demand in this region. This demand is usually driven by the local government’s plans to improve public services, with which includes identity verification for extra security. BY Jill Lai

MAR 2016 â—? www.asmag.com

o build a safer city, countries like the U.A.E. pay much attention to applying new technologies to improve its public services. For instance, civilians have to provide fingerprints for their passport and ID cards for personal identification. An Emirates ID card is also required when a member of the general public needs to go for any government purposes, such as health care institutes or others, or to board a plane, open a bank account, or check in to hotels. Since the use of the ID card is widespread, multiple identity management solutions have

34

been introduced to this region. David Massad, Marketing Leader of the Traffic Safety and Security Division at Security & Graphics Business Group in 3M Gulf provides an example with their latest solution in hospitality. For example, in hotels when guests are checking in, they ask for their passport. Instead of taking a copy and then a note of all the information from the passport, the hotel can scan it and automatically, with the software their partner has, it will pick up all the information and display it on the screen. It is very convenient for the hotel without doing extra paperwork. According to the company, since the introduction of the system, the government has started to ask some hotels to have the document reader ready at their desks. The government is very likely to be automatically connected to the hotel, so this document reader is very important for them. In addition to that, it can also identify if the ID is a fraud. The region also needs more advanced identification solutions for government agencies. Hadi Rabie Omer, Sales and Marketing Director for the Systems and Solutions Division at Emirates Photo Marketing (ePM), a systems integrator and reseller of access control and identification systems in Dubai, pointed out the


trend for identification solutions in public services. He said, “We think the portable identity verification solutions will be the future development, for the government agencies, such as ports, immigration, or health insurance. We have an anti-copy barcode solution, which uses mobile biometric verification by barcode, with which you can put the person’s fingerprint or his photo inside the barcode offline and you can check it offline. And, we can develop that software for the government agencies.”

The region needs more advanced identification solutions for government agencies to improve its public services. much higher than other places in the world. “There are different reasons to the spread of biometrics. Labor secure access is one reason, the other reason is the drive to increase productivity and improve the government services. Another growing sector for biometrics is the education sector, making sure that students attend classes,” said Alex Zarrabi, CEO of Touchless Biometric Systems (TBS), which is leading the industry with its patented technology in 3D-fingerprint touchless biometric systems.

Education

Biometrics continues its Wide Penetration Along with the high demand for advanced identification management solutions, regulations for biometrics are more flexible and the user acceptance is relatively high,

The Saudi Arabia Ministry of Education has made it mandatory for all public school students to record biometric details with the government. “This is a very strong market. Many universities use TBS solutions. We have a famous university in the Arab world, Umm Al-Qura University in Saudi Arabia, that has sixty buildings. Other projects here are hospitals thanks to the hygienic touchless 3D, enterprises, and major airlines. We have one major airline having installed hundreds of TBS readers across the whole country and we also have other

35


What is Prerequisite for

VMS in a City

In a city surveillance project, where cameras can easily surpass thousands, a good, powerful video management software (VMS) product is needed to accommodate these cameras, make sense of the data being produced, and drive operators to events that are relevant and critical. However, a good implementation requires the installer to understand what makes VMS effective and what to confirm with the end user before the project begins.

Scalability Integration Usability

MAR 2016 â—? www.asmag.com

40


SurVeillanCe Project BY William Pao

n order to keep a city safe, operators and law enforcement officials rely on video surveillance to detect and deal with theft, assaults, gang violence, drug dealing, and other criminal activities. Yet, monitoring video from thousands of cameras spread across the city can be a daunting challenge. A good video management software (VMS) product, therefore, is needed to keep the operator situationally aware at all times. “Major focuses for citywide surveillance are generally linked with allowing immediate reaction of the operator to the event,” said Aleksandr Jesikov, Account Manager at Luxriot. “A powerful software solution must offer all tools allowing users to be quickly notified of an issue via all necessary instruments. VMS becomes powerful not only by having these instruments, but also by having all functions self-explanatory and easy to configure.” “What a strong or powerful VMS should be doing is focusing in on what’s important to the security profile,” said Steve Birkmeier, VP of Sales and Business Development at Arteco. “Every camera

Steve Birkmeier, VP, Sales and Business Development, Arteco Andreas Conrad, Head, Product Management and Marketing, SeeTec Aleksandr Jesikov, Account Manager, Luxriot Benjamin Low, VP, Asia Pacific, Milestone Systems

Tony Luce, Director, Marketing and Business Development, Network Optix Jan van Rosenstil, Product Manager, VMS, Bosch Security Systems Mark Ross, Director, Cathexis Pervez Siddiqui, Director, Strategic Markets, Genetec

has a purpose. If the VMS is working correctly, it notifies the personnel when that purpose happens, and it’s treating all the other video differently. It discriminates that particular event and sends that information accordingly.”

Features Needed For City surveillaNCe vMs Since the number of cameras and other types of sensors can be overwhelmingly large, the VMS must be able to support these edge devices as well as present data generated by these devices to operators in a meaningful way, so they can easily understand the situation and respond accordingly. That said, below is a list of features that are needed for the VMS to work effectively in city surveillance.

Scalability

Every camera has a purpose. If the VMS is working correctly, it notifies the personnel when that purpose happens.

When deploying a city surveillance project, chances are the user will add more cameras over time. “In a lot of city surveillance projects that we have done, they have a very cautious budget to start with. Later on they see what the value is and they need to be able to add on easily and grow without having to completely replace the VMS,” said Mark Ross, Director of Cathexis. That said, the VMS on the backend must be able to easily and effectively handle the additional devices. “Systems have to be scalable to a large amount of cameras and devices. Scaling should be easy, so new cameras and servers should be added efficiently and easily,” said Andreas Conrad, Head of Product Management and Marketing at SeeTec.

41


AlArms Seek a

mAkeover for Smarter Security Intruder alarms have survived as one of the fundamental parts of a security system. With technological progress, they have evolved over time, integrating well with other security products like video surveillance and access control. But now as new concepts like smart homes become more popular, alarms look set to advance further, opening up several new possibilities. BY Prasanth Aby Thomas

he intruder alarm market, especially in developed economies, has always shown steady growth, unlike some other sectors of security that have remained more volatile. Reports suggest the American intrusion alarm market grew 3 to 5 percent over the last decade and is expected to grow at about 5 percent from US$1.4 billion in 2015 to $1.8 billion by 2019, according to IHS. The global outlook is even more promising. According to Research and Markets, the global intrusion detection market is expected to grow from $2.7 billion in 2014 to $5 billion by 2019, at an estimated CAGR of 13.2 percent. Another report from Marketsandmarkets suggests the home security solutions market alone could grow from $31.4 billion in 2015 to $47.5 billion by 2020, at an estimated CAGR of 8.7 percent. But alarms have come a long way from the

MAR 2016 â—? www.asmag.com

Hassan Uddin Ahmed, International Sales Manager, Pyronix

46

Daniela Hossmann, Head of Regional Business Unit Intrusion, EMEA, Bosch Sicherheitssysteme

Federica Pastorello, International Marketing Manager, EL.MO.

Alfred Tomasino, Engineer, Tre i Systems


individual units that could set off warning signals if a breach is detected. With the current market interest in making homes smarter, intrusion detection systems are becoming more and more sophisticated and intelligent. Alarms now are part of the larger framework of smarter homes, and the market is increasingly getting filled with sensors of various kinds and options to integrate them. The intrusion detection market is witnessing a rapid shift in its focus, from products that offer security, to those that can offer services that do more to improve overall life-quality. Moreover, markets are increasingly seeing the emergence of do-it-yourself (DIY) products that eliminate the need for professional installers. This situation is forcing the traditional security manufacturers to come up with adaptation strategies and methods to leverage their expertise to strengthen market presence.

From AlArms to smArt Homes Home automation systems that take advantage of a whole range of technologies, some of which are included under the umbrella term Internet of Things (IoT), is expected to be one of the key markets in the coming years. A visit to any of the technology trade shows these days will give a glimpse of the products that are coming up in this segment. Interestingly, most of what is seen now is considered to be just the tip of the iceberg, as the possibilities of connected devices are expected to be massive. Opportunities in the smart home segment have encouraged several new companies to enter the market, but most importantly, it is setting the stage for some

47


Modern ATMs Get new Layers of The role of ATMs has been growing in recent years. They are not only fast and convenient cash dispensers but also offer many other services, from currency exchange to bill payment. Creating a reliable and secure transaction environment for clients is a critical issue from both operational and customer service perspectives. The industry is trying to find additional avenues to secure transactions and is piloting biometric identification for use in ATMs.

ProTecT BY Israel Gogol, Freelancer

MAR 2016 ● www.asmag.com

illie Sutton was an American bank robber known for his innovative “career” and his successful jail breaks. When asked why he robbed banks, Sutton simply replied, “Because that’s where the money is.” Today, it seems bank branches are less focused on cashier services. Banks around the world have converted the way they work, relying more and more on mobile banking and networks of ATMs and information kiosks to serve their clients. In many places the branch experience is now limited to specific services which do not necessarily involve cash changing hands. A modern day Willie Sutton would no-doubt pay close attention to the ATM as a target for robbery. Since bank branches no longer

52

have safes with mounds of cash as before, ATMs, which often can hold several tens of thousands of dollars, become the target for criminals trying to gain access to money. Banks have to balance two demands: safeguard the money against robbery or fraud, and at the same time offer their clients an easy and seamless experience, providing a secure transaction without unnecessary burden for the clients.

Securing ATMs AgAinST PhySicAl ATTAck ATM security is an important topic addressed by international organizations such as ATMIA (ATM Industry Association) and EAST (European ATM Security Team). Attacks on ATMs can be divided into physical attacks, trying to reach the cash stored inside the ATM safe or fraud attempts. “Originally, starting in the 60s, physical security for ATMs was underdeveloped. Attacks soon started, as ATMs are spread around the globe, containing large quantities of cash and sitting close to public space. There are also many identical ATM units, which means that robbers can optimize their modus operandi and come up with faster and more successful ways to rob ATMs,” explained Pieter D. de Vlaam, Training and Certification Manager at Gunnebo, one of the world’s largest suppliers of ATM safes. According to de Vlaam, attacks on ATMs went through several stages of evolution. The first wave of attacks included breaking open the ATM with simple tools such as hammers and chisels — manufacturers answered the challenge by developing and implementing better safes. However, robbers did not sit still


Woody Chang, Marketing Manager, QNAP Systems Pieter D. de Vlaam, Training and Certification Manager, Gunnebo Karl Pardoe, Regional Sales Manager, U.K. and Ireland, March Networks

ion

and developed new methods of operations. “In the second stage the robbers started using torches and grinders, and eventually started gas blasting, a method in which robbers pry open the cash dispensing slot and pump gas into the ATM. The gas then detonates and blows apart the ATM from the inside giving the robbers access to the cash,” described de Vlaam. The next generation of attacks involves usage of solid explosives like Gelignite and PETN. Safe manufacturers are currently racing against robbers to provide adequate protection against the use of solid explosives.

Skimming and ATM Fraud Not all criminals choose to attack the ATM safe. Even though ATMs offer a very high potential for return, there are many difficulties due to better safes and newer protection standards. Many criminals resort to fraud attempts, using stolen cards or stealing card details using different skimming techniques. According to the US Secret Service, the agency in charge of fighting financial crime in the U.S., skimming costs American financial institutions about US$8 billion annually. A common modus operandi for robbers is to install clandestine card readers and spy cameras that copy magnetic card details. Once captured, the electronic data is encoded onto other cards and the captured PINs are used to withdraw money from customers’ accounts.

Video Surveillance

Many criminals resort to fraud attempts, using stolen cards or stealing card details using different skimming techniques.

More and more ATMs are using biometric identification (e.g., iris, fingerprint, face) for account access as an added layer of security.

Video surveillance is used extensively in ATM vestibules to record and detect fraud attempts. ATM surveillance equipment such as cameras and recorders needs to comply with specific small form factors and sometimes harsh environmental conditions. “There are three key requirements from video systems deployed in a banking environment. The first is central data integration, which guarantees that transaction data always resides behind secure firewalls in the corporate datacenter, in an environment compliant with the bank data and network operating policies. The second is real-time enterprise health management, so that system issues can be notified within seconds, and this ensures the video is up and running at all times. Finally, centralized management which enables the management of thousands of recorders from a single desktop in one location,” explained Karl Pardoe, Regional Sales Manager for the U.K. and Ireland in March Networks. However, besides the technical challenge, a successful solution requires the ability to interface with the bank’s transaction database to be able to detect fraud and provide a comprehensive security solution. “Our solution associates transactions in ATMs with the relevant video recording. When a suspicious transaction is detected by the bank, video feed can be quickly queried and accessed to assist investigation,” explained Cristina Velasco, Marketing Executive at Spain-based SCATI. “In addition to preventing fraud, it can also raise an immediate alarm in the event of physical aggression and sabotage at ATMs.”

53


NTERNET THINGS

OF

Beacon Technology Provides

Better Shopping Experience A recent report published by the Euro IT group says 2016 will be marked with an increase in online shopping and a growing market share of shopping done from mobile devices; use of beacon technology and RFID tags will also increase. The combination of RFID, beacons, and mobile devices is set to provide shoppers’ with an improved buying experience and increase retailers’ operational efficiency. BY Israel Gogol, Freelancer

T

he use of smartphones and tablets has made the combination of online and offline shopping a normal experience for many. Shoppers begin their purchasing journey with online research researching and comparing products. When in-store, patrons might use their phones to look for additional information or price comparison. According to Google, 85 percent of online shoppers start a purchase on one device and finish on another.

55


NTERNET THINGS

OF

According to Google, 85 percent of online shoppers start a purchase on one device and finish on another.

At NRF (National Retail Federation) 2016, Mike Rodgers, Chief Customer Officer of the American department store JCPenney, reflected on how 69 percent of the brand’s customers browse online before coming to a store, while 36 percent use mobile devices while in-store. Thus, retailers today need to ensure that they don’t lose out on customers in the divide between physical stores and e-commerce, by creating seamless, integrated experiences across all channels. To gain an understanding of the customer’s purchasing journey in the offline store, retailers turn to installing beacons to track and understand customers’ buying patterns. Beacon technology allows for advanced personalization of the shopping experience, combining the online and offline worlds. This is an additional source of competitive advantage for retailers. Beacons are Bluetooth-enabled devices that serve as proximity sensors that communicate with the shopper’s phone. The technology was introduced in 2013, and although still in its infancy, it is exponentially growing. Retailers will invest US$2.5 billion in the IoT (Internet of Things) within five years — mostly in beacons and RFID tags. By the end of 2018 it is predicted that retailers will have 3.5 billion active beacons installed and it is estimated that beacons will drive $44 billion in retail sales by 2016, up from $4 billion in 2015. Sid Mookerji, Global CEO at Software Paradigms International (SPI) pointed out that it is not only retailers pushing for the installation of solutions that combine the online and offline. According to him, this move is also driven by the customers themselves: “Millennials have lived in a connected world their entire lives and expect an omni-channel cross-platform seamless experience. Retailers need to break down the

How Beacon Technology Works

MAR 2016 ● www.asmag.com

Beacons strategically placed around stores connect to a customer’s Bluetooth-enabled smartphone app. A signal is sent to the phone and the app is opened. Once the app is opened, the retailer can provide the customer with information directly to their phone.

56

silos of separate platforms, competing departments and think about integrating their platforms to serve and attract their customers.” The IoT is becoming fundamental to delivering an enhanced consumer experience and driving operational efficiency. “Retailers will increasingly deploy IoT sensors and devices in their stores to capture new levels of data and drive better insight. These could be video, RFID, Wi-Fi, Bluetooth beacons, temperature or motion sensors,” said Alison Wiltshire, Global Practice Lead of Retail and Consumer Goods at BT Global Services. “Linking the data stream from these IoT sensors with other data will drive both real-time insights (for customer experience) and trend analytics (for planning purposes). For instance, connected merchandise (‘things’) using RFID tags not only allow optimization of inventory and replenishment, but also allows the product to have a ‘voice’ and inform a content management system what linked content should be displayed on adjacent screens or devices. These could


SMAhome

NewDirections in Smart Home at CES 2016 By a&s SMAhome

True to its hype, CES 2016 was one of world’s largest consumer electronics shows that housed several innovative launches and technological marvels. Shifting focus from mobile devices, this year’s show gave due importance to solutions in virtual reality, gaming, connected vehicles, drones, and IoT-related gadgets. Meanwhile, smart home was absolutely one of the highlights. Having interviewed dozens of smart home-related exhibitors at the mammoth showground, SMAhome presents five trends that could influence market developments that product developers should know.

1. Professional security sPecialists eye smart home

MAR 2016 ● www.asmag.com

As home security is ranked the top reason why users are interested in smart homes, professional security manufacturers are eyeing this market as an untapped business opportunity. Leading American security brands such as Honeywell, Tyco, Swann, First Alert, etc., all booked large spaces at CES to demonstrate their new offerings. Compared to suppliers from other backgrounds, these professional security specialists have an edge in security technology design for smart homes due to their vast experience in the field. However, smart home is all about solutions, which includes cross-brand devices, software, and even cloud services syncing together. Security pros who are used to closed-type systems should be aware of the current inclination to openness in smart home. Aesthetics in product design should not be overlooked either.

62

2. far from being “Diy-frienDly” A major portion of smart home exhibits at CES this year still needed professional installation or integration services. Furthermore, when asked about their best sales channel, more than half of the exhibitors said retail did not perform as well as they had anticipated, while revenue from professional channels or projects were the highest. It is obvious that the majority of smart home solution providers still rely on the professional services of builders, construction companies, or house renovators. This “not-so-DIY-friendly” aspect may hamper the adoption of smart home products in the after-builder market because of their extra costs of ownership to users. Yet, it should be noted that major home appliance brands are launching their connected home ecosystems. Bosch, Siemens, Whirlpool, Panasonic with its ORA, LG with its SmartThinq, Samsung with SmartThing, and ChangHong with IPP, are all making steady strides in this direction. With their ongoing market promotions and new business partnerships with service providers in home insurance, utility, or multi-system operators (MSOs), the transition into a “consumer technology-oriented” smart home could be faster than we expect.

3. “Working With nest” is the hyPe Thanks to the release of Nest Weave last October, “Works with Nest” was a popular tag seen at CES this year. Nest Weave enables direct device-todevice communication across networks including Wi-Fi and Thread, allowing developers to have end-to-end solutions that enable them to work with Nest, and use only parts of the program that meet their needs. According to Nest, Nest Weave solves many issues associated with connecting products in the home, including connecting power-constrained devices as well as devices that require low latency and redundancy. More than 11,000 developers have


accessed Nest’s APIs to connect with Nest products through the cloud – and 1 in 8 Nest homes are using “Works with Nest” integration. For OEMs and other Asian manufacturers that are interested in the US market but have integration difficulties, this program may be a solution.

4. sensitive to Data value Rather than highlighting technology, some smart home

exhibitors focused on data collected by connected sensors, devices, and smart applications, such as behavioral patterns. The sensitivity to data is turning smart home from a bunch of “nice-to-have” products into a “must-have” life helper. Not only do they give home owners accurate info on what is happening, but also provide options of precaution to possible incidents or any abnormal situations. Another interesting development seen at CES was Icontrol, Arrayent, DSR, Alya, and many other Internet of Things (IoT) or M2M platform designers displaying their products to end customers. By collaborating with different partners to exhibit in their booths, platform designers not only showed the extensibility of their ecosystem to potential OEM platform adopters, device makers, and key component providers, but also helped to educate the market on the value of the

63


LILIN Day and Night Full HD PTZ Dome IP Camera Features: • • • •

1 080p resolution with 20x optical zoom IP66 rain and dust resistant IR-cut filter for day/night operations H.264 and motion JPEG multi-profile video streaming • Wide dynamic range up to 90 dB • 3-year warranty and support ■ Merit LILIN/Taiwan ■ Email: sales@meritlilin.com

EverFocus 2-Megapixel Full HD Ultra Low Light Network Camera Features: • • • • •

1 /2.8” Sony progressive CMOS image sensor Full HD 1080p video, up to 60 fps Triple streams from H.265, H.264, and MJPEG Ultra-low light and true day/night function 3DNR/WDR/2-way audio/defog function supported • Triple power inputs supported: PoE/12VDC/24VAC ■ EverFocus Electronics/Taiwan ■ Email: sales@everfocus.com.tw

GKB NC 6960VD VeriFire IP Camera Features: • E arly-stage fire and smoke detection and notification • 1080p Full HD resolution, VeriFire is able to accurately detect fire and smoke with an average false alarm record far below the industry standard • VeriFire has an open API interface allowing customization by third-party specialist developers • ONVIF IP-based camera expandability • Remote-control management • Fast and proven fire camera ■ GKB Security/Taiwan ■ Email: sales@gkbsecurity.com

STROPS AVS Series Video Surveillance System Features: • U nique modular design separates electronics from battery which allows for fast, easy, and convenient servicing • Mobotix sensors provide high video resolution and activity notifications • Battery pack provides autonomous power for up to one week and can recharge itself • STROPS AddOn helps identify position on map and read camera status

ATEÏS Boutique PA/VA System

• O peration temperature from -30 to 60 degrees Celsius • Mobile network connection components provides excellent communication ■ STROPS Technologies/Latvia ■ Email: sales@stropstech.com

Features:

Hundure PXR-10/12 EM MIFARE Reader

Nedap uPASS Target UHF Reader

• P lug-n-play using auto-setup from the front panel • Eco-friendly product: high efficiency class-D amplifier and extremely low power consumption design during standby • Cost-effective, ease of installation and configuration • Control, management, and monitoring via web browser • Zone setting, paging with priority management, event and bell scheduler, and preset management • Paging, audio streaming, and Internet radio built-in

Features:

Features:

• S tylish and slim appearance design with tempered glass material • Provides RS-485 communication interface to suit for long distance installation • Wall-embedded design and two dimensions: PRX-12 for US market and PXR-10 for European market • Widen operation temperature range • Case sensor detection function

• • • •

■ ATEÏS South East/Singapore ■ Email: info@ateis-se.com.sg

■ Hundure Technology/Taiwan ■ Email: overseas@hundure.com

MAR 2016 ● www.asmag.com

66

eading up to 10 meters R Industrial reader design Operates with passive UHF tags (EPC GEN 2) Circular polarized camera (freedom of tag orientation) • Easy integration and installation • On-site adjustable read range (UHF tool) ■ Nedap Identification System/Netherlands ■ Email: info@nedap.com


67


Show PReview

Secutech 2016: Complementary Events Address Hottest Topics in the Security and Smart Home Sectors security and IT systems integrators to explore the possibility of future security solutions. It focuses on the deployment of new technologies — such as the Internet of Things (IoT) and big data — in smart cities, transportation, retail, and other business sectors in Asia. The speaker line-up is comprised of representatives from international leading brands, for instance, Intel, Siemens, ST Electronics, ICD Security Solutions, and Walmart.

Smart Home M2M Platform and Software Summit 2016 By Secutech

MAR 2016 ● www.asmag.com

ith less than two months until Secutech 2016 commences, the show will present the latest technologies and products to unlock the future of security solutions and smart cities. The annual event, scheduled to run from 19 to 21 April 2016 at the Taipei Nangang Exhibition Center in Taiwan, is renowned as one of the most influential exhibitions of its kind in Asia. As such, the show is positioned to assist industry players in establishing strategic partnerships and sharing knowledge of the field. Secutech 2016 is expected to utilize 35,873 square meters of exhibition space and accommodate over 500 leading manufacturers who are eager to promote their business by meeting over 26,000 trade visitors from all around the world. As yet, confirmed exhibiting brands include Hikvision Digital Technology, Dahua Technology, VIVOTEK, Merit LILIN, Hisharp, Wonwoo, TrendMicro, Tamron, Sony, Intel, Seagate Technology, Amroad, GKB Security, Heiman, SecuFirst, Sunmore, VStarCam, and Unitech. To aid participants in navigating the ever-evolving market, a series of industry activities will be organized alongside the product showcases. The program features top-ranked brands and prominent experts to highlight the industry development trends, covering key technologies and their applications.

Some of the event highlightS are aS followS: Asian Systems Integrator Forum The Forum is launched for the first time to serve pan-Asian

72

Secutech 2016 — featuring intelligent solutions for electronic security, home security, fire and safety —will be held from 19 to 21 April in Taipei, Taiwan.

RegisteR Now

Understanding the diversified software needs in smart home, the Summit gathers more than 10 Taiwan- and China-based platform designers, who will offer attendees an effective sourcing destination for optimal IoT platform solutions. In addition, speakers from Ayla Networks, Tricloud, Orbweb, Mivatek, Throughtek, and TrendMicro will interact with visitors and share their insights on some of the most concerned topics in the industry, such as connectivity, interoperability, data protection, and business models.

Z-Wave Gallery Co-organized by Z-Wave Alliance, the debut of Z-Wave Gallery in the SMAhome section will demonstrate the latest and best-performing applications in connected homes. Around 10 Z-Wave members have been selected to showcase their top-notch products with brand new designs and upgraded manufacturer management capabilities. They include Bt-star, Comodo, Mcohome, and TKB Home. Other interactive events at Secutech are the Intelligent Retail Demo, Intelligent Transportation Demo, Machine Vision Demo, SMAhome International Conference, and SMA 100 Express Center.


March – July 2016

WORLD SECURITY EXHIBITION DIRECTORY Exhibitions marked with ★ indicate a&s portfolio's scheduled participation. See a&s personally at these shows. Please refer to the "Yearly Show Calendar" at www.asmag.com/main/global_events.aspx.

March 2016

Safe Secure Pakistan • Date: 2016/03/01–03/03 • Venue: Pak-China Friendship Center, Islamabad, Pakistan • Tel: +92-21-111-734-266 • Email: info@safesecurepakistan.com • URL: www.safesecurepakistan.com

PROTECT • Date: 2016/03/02–03/03 • Venue: SMX Convention Center, Manila, Philippines • Tel: +632-818-6828 • Email: leverage@leverageinternational.com • URL: www.protect.leverageinternatonal.com

Security Show • Date: 2016/03/08–03/11 • Venue: Tokyo Big Sight, Tokyo, Japan • Tel: +81-3-3512-5670 • URL: www.shopbiz.jp/en/ss

MIPS • Date: 2016/03/14–03/17 • Venue: Expocentre Fairgrounds, Moscow, Russia • Tel: +7-499-750-08-28 • Email: security@ite-expo.ru • URL: www.securika-moscow.ru

ISC Brasil • Date: 2016/03/15–03/17 • Venue: Expo Center, Norte, Sao Paulo, Brazil • Tel: +55-11-3060-4893 • Email: ivan.romao@reedalcantara.com.br • URL: www.iscbrasil.com.br

ISC West • Date: 2016/04/06–04/08 • Venue: Sands Expo & Convetion Center, Las Vegas, U.S. • Tel: +1-203-840-5602 • Email: inquiry@isc.reedexpo.com • URL: www.iscwest.com

International Oil & Gas Security Conference

• Date: 2016/04/19–04/21 • Venue: Nangang Exhibition Center, Taipei, Taiwan • Tel: +886-2-2659-9080 • Email: echo.lin@newera.messefrankfurt.com • URL: www.secutech.com

• Date: 2016/05/11–05/12 • Venue: The Kia Oval, London, U.K. • Tel: +44-207-111-1615 • Email: cristinar@irn-international.com • URL: www.oilgassecurity.com

Secutech India

Securex South Africa

• Date: 2016/04/21–04/23 • Venue: Bombay Exhibition Center, Mumbai, India • Tel: +91-22-4286-3800 • Email: info@secutechexpo.com • URL: www.secutechindia.co.in

• Date: 2016/05/24–05/26 • Venue: Gallagher Convention Centre, Johannesburg, South Africa • Tel: +27-11-835-1565 • Email: info@specialised.com • URL: www.securex.co.za

Securex • Date: 2016/04/25–04/28 • Venue: Poznan Congress Center, Poznan, Poland • Tel: +48-61-869-2131 • Email: pcc@mtp.pl • URL: www.securex.pl

June 2016

IFSEC International • Date: 2016/06/21–06/23 • Venue: ExCel London, London, U.K. • Tel: +44-20-7921-5000 • Email: rachel.eaton@ubm.com • URL: www.ifsec.co.uk

Expo Seguridad • Date: 2016/04/26–04/28 • Venue: Centro Banamex, Mexico City, Mexico • Tel: +1-203-722-7351 • Email: marreola@reedexpo.com • URL: www.exposeguridadmexico.com

July 2016

SecProTec East Africa

May 2016

Asian Securitex • Date: 2016/05/04–05/06 • Venue: Hong Kong Convention & Exhibition Centre, Hong Kong • Tel: +852-2804-1500 • Email: xhibit@hkesallworld.com • URL: www.asiansecuritex.com

Exposec • Date: 2016/05/10–05/12 • Venue: Sao Paulo Expo Exhibition & Convention Center, Brazil • Tel: +55-11-5585-4355 • Email: international@cipanet.com.br • URL: www.exposec.tmp.br

• Date: 2016/07/12–07/14 • Venue: Kenyatta International Conference Centre (KICC), Nairobi, Kenya • Tel: +49-40-710070-51 • Email: stefan.freiberg@planetfair.de • URL: www.secproteceastafrica.com

Security Exhibition & Conference • Date: 2016/07/20–07/22 • Venue: Melbourne Convention & Exhibition Center, Melbourne, Australia • Tel: +61-3-9261-4660 • Email: aphillips@divcom.net.au • URL: www.securityexpo.com.au

73

MAR 2016 ● www.asmag.com

April 2016

Secutech International


Companies in This Issue PRODUCT OF THE MONTH • CAT PHONES • SAFE APPS (STAY SAFE) • YRFREE TECHNOLOGIES VIEWPOINT • ETHERWAN SYSTEMS NEWS FEATURE • HONEYWELL AuTOMATION ANd CONTROL SOLuTIONS MARKET UPDATE • 3M • BOSCH SECuRITY SYSTEMS • EMIRATES PHOTO MARKETING (EPM) • G4S • GRuNdIG • IdIS • IRIS Id SYSTEMS • MORPHO (SAFRAN)

• NIT • OPTEX EuROPE • PAXTON ACCESS • PELCO BY SCHNEIdER ELECTRIC • TOuCHLESS BIOMETRIC SYSTEMS • TELESTE • Wd INTEGRATED SYSTEM • ARTECO • BOSCH SECuRITY SYSTEMS • CATHEXIS • GENETEC • LuXRIOT • MILESTONE SYSTEMS • NETWORK OPTIX • SEETEC

• MARCH NETWORKS • QNAP SYSTEMS • SCATI SMART TECHNOLOGY • BOSCH SECuRITY SYSTEMS • EL.MO. • HONEYWELL SECuRITY & FIRE • PYRONIX • TRE I SYSTEMS • TYCO SECuRITY PROduCTS IOT • BT GLOBAL SERvICES • IBM • MOBSTAC • SCALA • SOFTWARE PARAdIGMS INTERNATIONAL

VERTICAL SOLUTION • GuNNEBO • IRIS Id SYSTEMS

Next Issue

Integrated System

Vertical Market

CENTRAL MANAGEMENT SYSTEMS (SMB)

vILLAS ANd HOTELS

Smart Device/Software LONG-dISTANCE TRANSMISSION ANd POWER SuPPLY

75


ADVERTISER INDEX

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

SURVEILLANCE PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

29

BOSCH SECURITY SYSTEMS

CCTV

GERMANY

apr.securitysystems@bosch.com

45

CHENGDU POWERVIEW SCIENCE AND TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

dennis@powerview.cn

17

CONNECTION TECHNOLOGY SYSTEMS INC.

SWITCH/CONVERTOR/ETHERNET MEDIA TAIWAN

sales@iConnectron.com

INSIDE FRONT COVER, 1 DAHUA TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseas@dahuatech.com

8

DYNACOLOR INC.

IP CAMERA / NVR

TAIWAN

info@dynacolor.com.tw

75

FOCTEK PHOTONICS, INC.

LENS

CHINA

sales@foctek-lens.com

25

FUZHOU FRAN M&E TECHNOLOGY DEVELOPMENT CO., LTD.

DOME COVER

CHINA

sales@fjsmt.com

9

GKB SECURITY CORPORATION

IP CAMERA / NVR / HD SDI CAMERA / HD SDI DVR TAIWAN

sales@gkbsecurity.com

5

HDPRO CO., LTD.

CCTV

KOREA

sales@hdprocctv.com

BACK COVER

HIKVISION DIGITAL TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

overseasbusiness@hikvision.com

21

IDIS CO., LTD.

SURVEILLANCE

KOREA

sales@idisglobal.com

4

MEERE COMPANY INC.

CAMERA

KOREA

sales@cube-eye.co.kr

10

MERIT LILIN ENT CO., LTD.

IP CAMERA / NVR

TAIWAN

sales@meritlilin.com

32, 33

NEXTCHIP CO., LTD.

CHIP

KOREA

sales@nextchip.com

38, 39

QIHAN TECHNOLOGY CO., LTD.

SURVEILLANCE

CHINA

marketing@qihan.cn

63

QUANZHOU SOUTHEAST PHOTOELECTRIC CO., LTD.

SURVEILLANCE

CHINA

sales@soest.cn

7

RICOM

LENS

CHINA

sales@forecam.com

2

RIFATRON CO., LTD.

DVR

KOREA

contact@rifatron.com

51

SHENZHEN COMMANDER TECHNOLOGY CO., LTD.

CASING

CHINA

sjw@yjdcase.com

12, 13

SONY CORPORATION DSBG. SYSTEM LSI DIVISION

SEMICONDUCTOR

JAPAN

-

INSIDE BACK COVER

TAMRON CO., LTD.

CAMERA

JAPAN

newbiz@tamron.co.jp

23

TECHPOINT INC.

CHIPSET

USA

dma@techpointinc.com

11

VIDEOTEC S.P.A.

IP CAMERA / SOFTWARE / VIDEOSERVER

ITALY

info@videotec.com

3

WEBGATE INC.

DVR

KOREA

support@webgateinc.com

15

ZEEANN CO., LTD.

CMOS IMAGE SENSOR

KOREA

sales@zeeann.com

INTRUSION ALARM PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

6

LINCE ITALIA S.P.A.

INTRUSION ALARM

ITALY

info@lince.net

67

SUPERIOR ELECTRONICS CORP.

ALARM

TAIWAN

info@superior-elec.com

ACCESS CONTROL PAGE NO.

ADVERTISER

MAJOR ITEM

COUNTRY

E-MAIL

35

GIGA-TMS INC.

RFID MODULE / LOCK / READER

TAIWAN

promag@gigatms.com.tw

43

HUNDURE TECHNOLOGY CO., LTD

READER

TAIWAN

overseas@hundure.com

Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent or trademark disputes from advertisements or among advertisers.

79


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.